1 /* BGP-4, BGP-4+ daemon program
2 * Copyright (C) 1996, 97, 98, 99, 2000 Kunihiro Ishiguro
4 * This file is part of GNU Zebra.
6 * GNU Zebra is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License as published by the
8 * Free Software Foundation; either version 2, or (at your option) any
11 * GNU Zebra is distributed in the hope that it will be useful, but
12 * WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * General Public License for more details.
16 * You should have received a copy of the GNU General Public License along
17 * with this program; see the file COPYING; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
29 #include "sockunion.h"
38 #include "workqueue.h"
46 #include "frr_pthread.h"
49 #include "bgpd/bgpd.h"
50 #include "bgpd/bgp_table.h"
51 #include "bgpd/bgp_aspath.h"
52 #include "bgpd/bgp_route.h"
53 #include "bgpd/bgp_dump.h"
54 #include "bgpd/bgp_debug.h"
55 #include "bgpd/bgp_community.h"
56 #include "bgpd/bgp_attr.h"
57 #include "bgpd/bgp_regex.h"
58 #include "bgpd/bgp_clist.h"
59 #include "bgpd/bgp_fsm.h"
60 #include "bgpd/bgp_packet.h"
61 #include "bgpd/bgp_zebra.h"
62 #include "bgpd/bgp_open.h"
63 #include "bgpd/bgp_filter.h"
64 #include "bgpd/bgp_nexthop.h"
65 #include "bgpd/bgp_damp.h"
66 #include "bgpd/bgp_mplsvpn.h"
68 #include "bgpd/rfapi/bgp_rfapi_cfg.h"
69 #include "bgpd/rfapi/rfapi_backend.h"
71 #include "bgpd/bgp_evpn.h"
72 #include "bgpd/bgp_advertise.h"
73 #include "bgpd/bgp_network.h"
74 #include "bgpd/bgp_vty.h"
75 #include "bgpd/bgp_mpath.h"
76 #include "bgpd/bgp_nht.h"
77 #include "bgpd/bgp_updgrp.h"
78 #include "bgpd/bgp_bfd.h"
79 #include "bgpd/bgp_memory.h"
80 #include "bgpd/bgp_evpn_vty.h"
81 #include "bgpd/bgp_keepalives.h"
82 #include "bgpd/bgp_io.h"
83 #include "bgpd/bgp_ecommunity.h"
84 #include "bgpd/bgp_flowspec.h"
85 #include "bgpd/bgp_labelpool.h"
86 #include "bgpd/bgp_pbr.h"
88 DEFINE_MTYPE_STATIC(BGPD
, PEER_TX_SHUTDOWN_MSG
, "Peer shutdown message (TX)");
89 DEFINE_QOBJ_TYPE(bgp_master
)
91 DEFINE_QOBJ_TYPE(peer
)
93 /* BGP process wide configuration. */
94 static struct bgp_master bgp_master
;
96 /* BGP process wide configuration pointer to export. */
97 struct bgp_master
*bm
;
99 /* BGP community-list. */
100 struct community_list_handler
*bgp_clist
;
102 unsigned int multipath_num
= MULTIPATH_NUM
;
104 static void bgp_if_finish(struct bgp
*bgp
);
105 static void peer_drop_dynamic_neighbor(struct peer
*peer
);
107 extern struct zclient
*zclient
;
109 /* handle main socket creation or deletion */
110 static int bgp_check_main_socket(bool create
, struct bgp
*bgp
)
112 static int bgp_server_main_created
;
114 if (create
== true) {
115 if (bgp_server_main_created
)
117 if (bgp_socket(bgp
, bm
->port
, bm
->address
) < 0)
118 return BGP_ERR_INVALID_VALUE
;
119 bgp_server_main_created
= 1;
122 if (!bgp_server_main_created
)
125 bgp_server_main_created
= 0;
129 void bgp_session_reset(struct peer
*peer
)
131 if (peer
->doppelganger
&& (peer
->doppelganger
->status
!= Deleted
)
132 && !(CHECK_FLAG(peer
->doppelganger
->flags
, PEER_FLAG_CONFIG_NODE
)))
133 peer_delete(peer
->doppelganger
);
135 BGP_EVENT_ADD(peer
, BGP_Stop
);
139 * During session reset, we may delete the doppelganger peer, which would
140 * be the next node to the current node. If the session reset was invoked
141 * during walk of peer list, we would end up accessing the freed next
142 * node. This function moves the next node along.
144 static void bgp_session_reset_safe(struct peer
*peer
, struct listnode
**nnode
)
149 n
= (nnode
) ? *nnode
: NULL
;
150 npeer
= (n
) ? listgetdata(n
) : NULL
;
152 if (peer
->doppelganger
&& (peer
->doppelganger
->status
!= Deleted
)
153 && !(CHECK_FLAG(peer
->doppelganger
->flags
,
154 PEER_FLAG_CONFIG_NODE
))) {
155 if (peer
->doppelganger
== npeer
)
156 /* nnode and *nnode are confirmed to be non-NULL here */
157 *nnode
= (*nnode
)->next
;
158 peer_delete(peer
->doppelganger
);
161 BGP_EVENT_ADD(peer
, BGP_Stop
);
164 /* BGP global flag manipulation. */
165 int bgp_option_set(int flag
)
169 case BGP_OPT_MULTIPLE_INSTANCE
:
170 case BGP_OPT_CONFIG_CISCO
:
171 case BGP_OPT_NO_LISTEN
:
172 SET_FLAG(bm
->options
, flag
);
175 return BGP_ERR_INVALID_FLAG
;
180 int bgp_option_unset(int flag
)
183 case BGP_OPT_MULTIPLE_INSTANCE
:
184 if (listcount(bm
->bgp
) > 1)
185 return BGP_ERR_MULTIPLE_INSTANCE_USED
;
188 case BGP_OPT_CONFIG_CISCO
:
189 UNSET_FLAG(bm
->options
, flag
);
192 return BGP_ERR_INVALID_FLAG
;
197 int bgp_option_check(int flag
)
199 return CHECK_FLAG(bm
->options
, flag
);
202 /* BGP flag manipulation. */
203 int bgp_flag_set(struct bgp
*bgp
, int flag
)
205 SET_FLAG(bgp
->flags
, flag
);
209 int bgp_flag_unset(struct bgp
*bgp
, int flag
)
211 UNSET_FLAG(bgp
->flags
, flag
);
215 int bgp_flag_check(struct bgp
*bgp
, int flag
)
217 return CHECK_FLAG(bgp
->flags
, flag
);
220 /* Internal function to set BGP structure configureation flag. */
221 static void bgp_config_set(struct bgp
*bgp
, int config
)
223 SET_FLAG(bgp
->config
, config
);
226 static void bgp_config_unset(struct bgp
*bgp
, int config
)
228 UNSET_FLAG(bgp
->config
, config
);
231 static int bgp_config_check(struct bgp
*bgp
, int config
)
233 return CHECK_FLAG(bgp
->config
, config
);
236 /* Set BGP router identifier. */
237 static int bgp_router_id_set(struct bgp
*bgp
, const struct in_addr
*id
)
240 struct listnode
*node
, *nnode
;
242 if (IPV4_ADDR_SAME(&bgp
->router_id
, id
))
245 /* EVPN uses router id in RD, withdraw them */
246 if (is_evpn_enabled())
247 bgp_evpn_handle_router_id_update(bgp
, TRUE
);
249 IPV4_ADDR_COPY(&bgp
->router_id
, id
);
251 /* Set all peer's local identifier with this value. */
252 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
253 IPV4_ADDR_COPY(&peer
->local_id
, id
);
255 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
256 peer
->last_reset
= PEER_DOWN_RID_CHANGE
;
257 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
258 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
262 /* EVPN uses router id in RD, update them */
263 if (is_evpn_enabled())
264 bgp_evpn_handle_router_id_update(bgp
, FALSE
);
269 void bgp_router_id_zebra_bump(vrf_id_t vrf_id
, const struct prefix
*router_id
)
271 struct listnode
*node
, *nnode
;
274 if (vrf_id
== VRF_DEFAULT
) {
275 /* Router-id change for default VRF has to also update all
277 for (ALL_LIST_ELEMENTS(bm
->bgp
, node
, nnode
, bgp
)) {
278 if (bgp
->inst_type
== BGP_INSTANCE_TYPE_VRF
)
281 bgp
->router_id_zebra
= router_id
->u
.prefix4
;
282 if (!bgp
->router_id_static
.s_addr
)
283 bgp_router_id_set(bgp
, &router_id
->u
.prefix4
);
286 bgp
= bgp_lookup_by_vrf_id(vrf_id
);
288 bgp
->router_id_zebra
= router_id
->u
.prefix4
;
290 if (!bgp
->router_id_static
.s_addr
)
291 bgp_router_id_set(bgp
, &router_id
->u
.prefix4
);
296 int bgp_router_id_static_set(struct bgp
*bgp
, struct in_addr id
)
298 bgp
->router_id_static
= id
;
299 bgp_router_id_set(bgp
, id
.s_addr
? &id
: &bgp
->router_id_zebra
);
303 /* BGP's cluster-id control. */
304 int bgp_cluster_id_set(struct bgp
*bgp
, struct in_addr
*cluster_id
)
307 struct listnode
*node
, *nnode
;
309 if (bgp_config_check(bgp
, BGP_CONFIG_CLUSTER_ID
)
310 && IPV4_ADDR_SAME(&bgp
->cluster_id
, cluster_id
))
313 IPV4_ADDR_COPY(&bgp
->cluster_id
, cluster_id
);
314 bgp_config_set(bgp
, BGP_CONFIG_CLUSTER_ID
);
316 /* Clear all IBGP peer. */
317 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
318 if (peer
->sort
!= BGP_PEER_IBGP
)
321 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
322 peer
->last_reset
= PEER_DOWN_CLID_CHANGE
;
323 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
324 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
330 int bgp_cluster_id_unset(struct bgp
*bgp
)
333 struct listnode
*node
, *nnode
;
335 if (!bgp_config_check(bgp
, BGP_CONFIG_CLUSTER_ID
))
338 bgp
->cluster_id
.s_addr
= 0;
339 bgp_config_unset(bgp
, BGP_CONFIG_CLUSTER_ID
);
341 /* Clear all IBGP peer. */
342 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
343 if (peer
->sort
!= BGP_PEER_IBGP
)
346 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
347 peer
->last_reset
= PEER_DOWN_CLID_CHANGE
;
348 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
349 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
355 /* time_t value that is monotonicly increasing
356 * and uneffected by adjustments to system clock
358 time_t bgp_clock(void)
366 /* BGP timer configuration. */
367 int bgp_timers_set(struct bgp
*bgp
, uint32_t keepalive
, uint32_t holdtime
)
369 bgp
->default_keepalive
=
370 (keepalive
< holdtime
/ 3 ? keepalive
: holdtime
/ 3);
371 bgp
->default_holdtime
= holdtime
;
376 int bgp_timers_unset(struct bgp
*bgp
)
378 bgp
->default_keepalive
= BGP_DEFAULT_KEEPALIVE
;
379 bgp
->default_holdtime
= BGP_DEFAULT_HOLDTIME
;
384 /* BGP confederation configuration. */
385 int bgp_confederation_id_set(struct bgp
*bgp
, as_t as
)
388 struct listnode
*node
, *nnode
;
392 return BGP_ERR_INVALID_AS
;
394 /* Remember - were we doing confederation before? */
395 already_confed
= bgp_config_check(bgp
, BGP_CONFIG_CONFEDERATION
);
397 bgp_config_set(bgp
, BGP_CONFIG_CONFEDERATION
);
399 /* If we were doing confederation already, this is just an external
400 AS change. Just Reset EBGP sessions, not CONFED sessions. If we
401 were not doing confederation before, reset all EBGP sessions. */
402 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
403 /* We're looking for peers who's AS is not local or part of our
405 if (already_confed
) {
406 if (peer_sort(peer
) == BGP_PEER_EBGP
) {
408 if (BGP_IS_VALID_STATE_FOR_NOTIF(
411 PEER_DOWN_CONFED_ID_CHANGE
;
413 peer
, BGP_NOTIFY_CEASE
,
414 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
416 bgp_session_reset_safe(peer
, &nnode
);
419 /* Not doign confederation before, so reset every
422 if (peer_sort(peer
) != BGP_PEER_IBGP
) {
423 /* Reset the local_as to be our EBGP one */
424 if (peer_sort(peer
) == BGP_PEER_EBGP
)
426 if (BGP_IS_VALID_STATE_FOR_NOTIF(
429 PEER_DOWN_CONFED_ID_CHANGE
;
431 peer
, BGP_NOTIFY_CEASE
,
432 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
434 bgp_session_reset_safe(peer
, &nnode
);
441 int bgp_confederation_id_unset(struct bgp
*bgp
)
444 struct listnode
*node
, *nnode
;
447 bgp_config_unset(bgp
, BGP_CONFIG_CONFEDERATION
);
449 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
450 /* We're looking for peers who's AS is not local */
451 if (peer_sort(peer
) != BGP_PEER_IBGP
) {
452 peer
->local_as
= bgp
->as
;
453 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
454 peer
->last_reset
= PEER_DOWN_CONFED_ID_CHANGE
;
455 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
456 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
460 bgp_session_reset_safe(peer
, &nnode
);
466 /* Is an AS part of the confed or not? */
467 int bgp_confederation_peers_check(struct bgp
*bgp
, as_t as
)
474 for (i
= 0; i
< bgp
->confed_peers_cnt
; i
++)
475 if (bgp
->confed_peers
[i
] == as
)
481 /* Add an AS to the confederation set. */
482 int bgp_confederation_peers_add(struct bgp
*bgp
, as_t as
)
485 struct listnode
*node
, *nnode
;
488 return BGP_ERR_INVALID_BGP
;
491 return BGP_ERR_INVALID_AS
;
493 if (bgp_confederation_peers_check(bgp
, as
))
496 if (bgp
->confed_peers
)
498 XREALLOC(MTYPE_BGP_CONFED_LIST
, bgp
->confed_peers
,
499 (bgp
->confed_peers_cnt
+ 1) * sizeof(as_t
));
502 XMALLOC(MTYPE_BGP_CONFED_LIST
,
503 (bgp
->confed_peers_cnt
+ 1) * sizeof(as_t
));
505 bgp
->confed_peers
[bgp
->confed_peers_cnt
] = as
;
506 bgp
->confed_peers_cnt
++;
508 if (bgp_config_check(bgp
, BGP_CONFIG_CONFEDERATION
)) {
509 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
510 if (peer
->as
== as
) {
511 peer
->local_as
= bgp
->as
;
512 if (BGP_IS_VALID_STATE_FOR_NOTIF(
515 PEER_DOWN_CONFED_PEER_CHANGE
;
517 peer
, BGP_NOTIFY_CEASE
,
518 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
520 bgp_session_reset_safe(peer
, &nnode
);
527 /* Delete an AS from the confederation set. */
528 int bgp_confederation_peers_remove(struct bgp
*bgp
, as_t as
)
533 struct listnode
*node
, *nnode
;
538 if (!bgp_confederation_peers_check(bgp
, as
))
541 for (i
= 0; i
< bgp
->confed_peers_cnt
; i
++)
542 if (bgp
->confed_peers
[i
] == as
)
543 for (j
= i
+ 1; j
< bgp
->confed_peers_cnt
; j
++)
544 bgp
->confed_peers
[j
- 1] = bgp
->confed_peers
[j
];
546 bgp
->confed_peers_cnt
--;
548 if (bgp
->confed_peers_cnt
== 0) {
549 if (bgp
->confed_peers
)
550 XFREE(MTYPE_BGP_CONFED_LIST
, bgp
->confed_peers
);
551 bgp
->confed_peers
= NULL
;
554 XREALLOC(MTYPE_BGP_CONFED_LIST
, bgp
->confed_peers
,
555 bgp
->confed_peers_cnt
* sizeof(as_t
));
557 /* Now reset any peer who's remote AS has just been removed from the
559 if (bgp_config_check(bgp
, BGP_CONFIG_CONFEDERATION
)) {
560 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
561 if (peer
->as
== as
) {
562 peer
->local_as
= bgp
->confed_id
;
563 if (BGP_IS_VALID_STATE_FOR_NOTIF(
566 PEER_DOWN_CONFED_PEER_CHANGE
;
568 peer
, BGP_NOTIFY_CEASE
,
569 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
571 bgp_session_reset_safe(peer
, &nnode
);
579 /* Local preference configuration. */
580 int bgp_default_local_preference_set(struct bgp
*bgp
, uint32_t local_pref
)
585 bgp
->default_local_pref
= local_pref
;
590 int bgp_default_local_preference_unset(struct bgp
*bgp
)
595 bgp
->default_local_pref
= BGP_DEFAULT_LOCAL_PREF
;
600 /* Local preference configuration. */
601 int bgp_default_subgroup_pkt_queue_max_set(struct bgp
*bgp
, uint32_t queue_size
)
606 bgp
->default_subgroup_pkt_queue_max
= queue_size
;
611 int bgp_default_subgroup_pkt_queue_max_unset(struct bgp
*bgp
)
615 bgp
->default_subgroup_pkt_queue_max
=
616 BGP_DEFAULT_SUBGROUP_PKT_QUEUE_MAX
;
621 /* Listen limit configuration. */
622 int bgp_listen_limit_set(struct bgp
*bgp
, int listen_limit
)
627 bgp
->dynamic_neighbors_limit
= listen_limit
;
632 int bgp_listen_limit_unset(struct bgp
*bgp
)
637 bgp
->dynamic_neighbors_limit
= BGP_DYNAMIC_NEIGHBORS_LIMIT_DEFAULT
;
642 int bgp_map_afi_safi_iana2int(iana_afi_t pkt_afi
, iana_safi_t pkt_safi
,
643 afi_t
*afi
, safi_t
*safi
)
645 /* Map from IANA values to internal values, return error if
646 * values are unrecognized.
648 *afi
= afi_iana2int(pkt_afi
);
649 *safi
= safi_iana2int(pkt_safi
);
650 if (*afi
== AFI_MAX
|| *safi
== SAFI_MAX
)
656 int bgp_map_afi_safi_int2iana(afi_t afi
, safi_t safi
, iana_afi_t
*pkt_afi
,
657 iana_safi_t
*pkt_safi
)
659 /* Map from internal values to IANA values, return error if
660 * internal values are bad (unexpected).
662 if (afi
== AFI_MAX
|| safi
== SAFI_MAX
)
664 *pkt_afi
= afi_int2iana(afi
);
665 *pkt_safi
= safi_int2iana(safi
);
669 struct peer_af
*peer_af_create(struct peer
*peer
, afi_t afi
, safi_t safi
)
677 afid
= afindex(afi
, safi
);
678 if (afid
>= BGP_AF_MAX
)
681 assert(peer
->peer_af_array
[afid
] == NULL
);
683 /* Allocate new peer af */
684 af
= XCALLOC(MTYPE_BGP_PEER_AF
, sizeof(struct peer_af
));
687 zlog_err("Could not create af structure for peer %s",
692 peer
->peer_af_array
[afid
] = af
;
701 struct peer_af
*peer_af_find(struct peer
*peer
, afi_t afi
, safi_t safi
)
708 afid
= afindex(afi
, safi
);
709 if (afid
>= BGP_AF_MAX
)
712 return peer
->peer_af_array
[afid
];
715 int peer_af_delete(struct peer
*peer
, afi_t afi
, safi_t safi
)
723 afid
= afindex(afi
, safi
);
724 if (afid
>= BGP_AF_MAX
)
727 af
= peer
->peer_af_array
[afid
];
731 bgp_stop_announce_route_timer(af
);
733 if (PAF_SUBGRP(af
)) {
734 if (BGP_DEBUG(update_groups
, UPDATE_GROUPS
))
735 zlog_debug("u%" PRIu64
":s%" PRIu64
" remove peer %s",
736 af
->subgroup
->update_group
->id
,
737 af
->subgroup
->id
, peer
->host
);
740 update_subgroup_remove_peer(af
->subgroup
, af
);
742 peer
->peer_af_array
[afid
] = NULL
;
743 XFREE(MTYPE_BGP_PEER_AF
, af
);
747 /* Peer comparison function for sorting. */
748 int peer_cmp(struct peer
*p1
, struct peer
*p2
)
750 if (p1
->group
&& !p2
->group
)
753 if (!p1
->group
&& p2
->group
)
756 if (p1
->group
== p2
->group
) {
757 if (p1
->conf_if
&& !p2
->conf_if
)
760 if (!p1
->conf_if
&& p2
->conf_if
)
763 if (p1
->conf_if
&& p2
->conf_if
)
764 return if_cmp_name_func(p1
->conf_if
, p2
->conf_if
);
766 return strcmp(p1
->group
->name
, p2
->group
->name
);
768 return sockunion_cmp(&p1
->su
, &p2
->su
);
771 static unsigned int peer_hash_key_make(void *p
)
773 struct peer
*peer
= p
;
774 return sockunion_hash(&peer
->su
);
777 static int peer_hash_same(const void *p1
, const void *p2
)
779 const struct peer
*peer1
= p1
;
780 const struct peer
*peer2
= p2
;
781 return (sockunion_same(&peer1
->su
, &peer2
->su
)
782 && CHECK_FLAG(peer1
->flags
, PEER_FLAG_CONFIG_NODE
)
783 == CHECK_FLAG(peer2
->flags
, PEER_FLAG_CONFIG_NODE
));
786 void peer_flag_inherit(struct peer
*peer
, uint32_t flag
)
790 /* Skip if peer is not a peer-group member. */
791 if (!peer_group_active(peer
))
794 /* Unset override flag to signal inheritance from peer-group. */
795 UNSET_FLAG(peer
->flags_override
, flag
);
798 * Inherit flag state from peer-group. If the flag of the peer-group is
799 * not being inverted, the peer must inherit the inverse of the current
800 * peer-group flag state.
802 group_val
= CHECK_FLAG(peer
->group
->conf
->flags
, flag
);
803 if (!CHECK_FLAG(peer
->group
->conf
->flags_invert
, flag
)
804 && CHECK_FLAG(peer
->flags_invert
, flag
))
805 COND_FLAG(peer
->flags
, flag
, !group_val
);
807 COND_FLAG(peer
->flags
, flag
, group_val
);
810 int peer_af_flag_check(struct peer
*peer
, afi_t afi
, safi_t safi
, uint32_t flag
)
812 return CHECK_FLAG(peer
->af_flags
[afi
][safi
], flag
);
815 void peer_af_flag_inherit(struct peer
*peer
, afi_t afi
, safi_t safi
,
820 /* Skip if peer is not a peer-group member. */
821 if (!peer_group_active(peer
))
824 /* Unset override flag to signal inheritance from peer-group. */
825 UNSET_FLAG(peer
->af_flags_override
[afi
][safi
], flag
);
828 * Inherit flag state from peer-group. If the flag of the peer-group is
829 * not being inverted, the peer must inherit the inverse of the current
830 * peer-group flag state.
832 group_val
= CHECK_FLAG(peer
->group
->conf
->af_flags
[afi
][safi
], flag
);
833 if (!CHECK_FLAG(peer
->group
->conf
->af_flags_invert
[afi
][safi
], flag
)
834 && CHECK_FLAG(peer
->af_flags_invert
[afi
][safi
], flag
))
835 COND_FLAG(peer
->af_flags
[afi
][safi
], flag
, !group_val
);
837 COND_FLAG(peer
->af_flags
[afi
][safi
], flag
, group_val
);
840 static bool peergroup_flag_check(struct peer
*peer
, uint32_t flag
)
842 if (!peer_group_active(peer
)) {
843 if (CHECK_FLAG(peer
->flags_invert
, flag
))
844 return !CHECK_FLAG(peer
->flags
, flag
);
846 return !!CHECK_FLAG(peer
->flags
, flag
);
849 return !!CHECK_FLAG(peer
->flags_override
, flag
);
852 static bool peergroup_af_flag_check(struct peer
*peer
, afi_t afi
, safi_t safi
,
855 if (!peer_group_active(peer
)) {
856 if (CHECK_FLAG(peer
->af_flags_invert
[afi
][safi
], flag
))
857 return !peer_af_flag_check(peer
, afi
, safi
, flag
);
859 return !!peer_af_flag_check(peer
, afi
, safi
, flag
);
862 return !!CHECK_FLAG(peer
->af_flags_override
[afi
][safi
], flag
);
865 static bool peergroup_filter_check(struct peer
*peer
, afi_t afi
, safi_t safi
,
866 uint8_t type
, int direct
)
868 struct bgp_filter
*filter
;
870 if (peer_group_active(peer
))
871 return !!CHECK_FLAG(peer
->filter_override
[afi
][safi
][direct
],
874 filter
= &peer
->filter
[afi
][safi
];
876 case PEER_FT_DISTRIBUTE_LIST
:
877 return !!(filter
->dlist
[direct
].name
);
878 case PEER_FT_FILTER_LIST
:
879 return !!(filter
->aslist
[direct
].name
);
880 case PEER_FT_PREFIX_LIST
:
881 return !!(filter
->plist
[direct
].name
);
882 case PEER_FT_ROUTE_MAP
:
883 return !!(filter
->map
[direct
].name
);
884 case PEER_FT_UNSUPPRESS_MAP
:
885 return !!(filter
->usmap
.name
);
891 /* Reset all address family specific configuration. */
892 static void peer_af_flag_reset(struct peer
*peer
, afi_t afi
, safi_t safi
)
895 struct bgp_filter
*filter
;
896 char orf_name
[BUFSIZ
];
898 filter
= &peer
->filter
[afi
][safi
];
900 /* Clear neighbor filter and route-map */
901 for (i
= FILTER_IN
; i
< FILTER_MAX
; i
++) {
902 if (filter
->dlist
[i
].name
) {
903 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->dlist
[i
].name
);
904 filter
->dlist
[i
].name
= NULL
;
906 if (filter
->plist
[i
].name
) {
907 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->plist
[i
].name
);
908 filter
->plist
[i
].name
= NULL
;
910 if (filter
->aslist
[i
].name
) {
911 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->aslist
[i
].name
);
912 filter
->aslist
[i
].name
= NULL
;
915 for (i
= RMAP_IN
; i
< RMAP_MAX
; i
++) {
916 if (filter
->map
[i
].name
) {
917 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->map
[i
].name
);
918 filter
->map
[i
].name
= NULL
;
922 /* Clear unsuppress map. */
923 if (filter
->usmap
.name
)
924 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->usmap
.name
);
925 filter
->usmap
.name
= NULL
;
926 filter
->usmap
.map
= NULL
;
928 /* Clear neighbor's all address family flags. */
929 peer
->af_flags
[afi
][safi
] = 0;
931 /* Clear neighbor's all address family sflags. */
932 peer
->af_sflags
[afi
][safi
] = 0;
934 /* Clear neighbor's all address family capabilities. */
935 peer
->af_cap
[afi
][safi
] = 0;
938 peer
->orf_plist
[afi
][safi
] = NULL
;
939 sprintf(orf_name
, "%s.%d.%d", peer
->host
, afi
, safi
);
940 prefix_bgp_orf_remove_all(afi
, orf_name
);
942 /* Set default neighbor send-community. */
943 if (!bgp_option_check(BGP_OPT_CONFIG_CISCO
)) {
944 SET_FLAG(peer
->af_flags
[afi
][safi
], PEER_FLAG_SEND_COMMUNITY
);
945 SET_FLAG(peer
->af_flags
[afi
][safi
],
946 PEER_FLAG_SEND_EXT_COMMUNITY
);
947 SET_FLAG(peer
->af_flags
[afi
][safi
],
948 PEER_FLAG_SEND_LARGE_COMMUNITY
);
950 SET_FLAG(peer
->af_flags_invert
[afi
][safi
],
951 PEER_FLAG_SEND_COMMUNITY
);
952 SET_FLAG(peer
->af_flags_invert
[afi
][safi
],
953 PEER_FLAG_SEND_EXT_COMMUNITY
);
954 SET_FLAG(peer
->af_flags_invert
[afi
][safi
],
955 PEER_FLAG_SEND_LARGE_COMMUNITY
);
958 /* Clear neighbor default_originate_rmap */
959 if (peer
->default_rmap
[afi
][safi
].name
)
960 XFREE(MTYPE_ROUTE_MAP_NAME
, peer
->default_rmap
[afi
][safi
].name
);
961 peer
->default_rmap
[afi
][safi
].name
= NULL
;
962 peer
->default_rmap
[afi
][safi
].map
= NULL
;
964 /* Clear neighbor maximum-prefix */
965 peer
->pmax
[afi
][safi
] = 0;
966 peer
->pmax_threshold
[afi
][safi
] = MAXIMUM_PREFIX_THRESHOLD_DEFAULT
;
969 /* peer global config reset */
970 static void peer_global_config_reset(struct peer
*peer
)
974 peer
->change_local_as
= 0;
975 peer
->ttl
= (peer_sort(peer
) == BGP_PEER_IBGP
? MAXTTL
: 1);
976 if (peer
->update_source
) {
977 sockunion_free(peer
->update_source
);
978 peer
->update_source
= NULL
;
980 if (peer
->update_if
) {
981 XFREE(MTYPE_PEER_UPDATE_SOURCE
, peer
->update_if
);
982 peer
->update_if
= NULL
;
985 if (peer_sort(peer
) == BGP_PEER_IBGP
)
986 peer
->v_routeadv
= BGP_DEFAULT_IBGP_ROUTEADV
;
988 peer
->v_routeadv
= BGP_DEFAULT_EBGP_ROUTEADV
;
990 /* These are per-peer specific flags and so we must preserve them */
991 saved_flags
|= CHECK_FLAG(peer
->flags
, PEER_FLAG_IFPEER_V6ONLY
);
992 saved_flags
|= CHECK_FLAG(peer
->flags
, PEER_FLAG_SHUTDOWN
);
994 SET_FLAG(peer
->flags
, saved_flags
);
999 peer
->v_connect
= BGP_DEFAULT_CONNECT_RETRY
;
1001 /* Reset some other configs back to defaults. */
1002 peer
->v_start
= BGP_INIT_START_TIMER
;
1003 peer
->password
= NULL
;
1004 peer
->local_id
= peer
->bgp
->router_id
;
1005 peer
->v_holdtime
= peer
->bgp
->default_holdtime
;
1006 peer
->v_keepalive
= peer
->bgp
->default_keepalive
;
1008 bfd_info_free(&(peer
->bfd_info
));
1010 /* Set back the CONFIG_NODE flag. */
1011 SET_FLAG(peer
->flags
, PEER_FLAG_CONFIG_NODE
);
1014 /* Check peer's AS number and determines if this peer is IBGP or EBGP */
1015 static inline bgp_peer_sort_t
peer_calc_sort(struct peer
*peer
)
1022 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
1023 if (peer
->as_type
== AS_INTERNAL
)
1024 return BGP_PEER_IBGP
;
1026 else if (peer
->as_type
== AS_EXTERNAL
)
1027 return BGP_PEER_EBGP
;
1029 else if (peer
->as_type
== AS_SPECIFIED
&& peer
->as
)
1030 return (bgp
->as
== peer
->as
? BGP_PEER_IBGP
1036 assert(peer
->group
);
1037 peer1
= listnode_head(peer
->group
->peer
);
1042 return BGP_PEER_INTERNAL
;
1046 if (bgp
&& CHECK_FLAG(bgp
->config
, BGP_CONFIG_CONFEDERATION
)) {
1047 if (peer
->local_as
== 0)
1048 return BGP_PEER_INTERNAL
;
1050 if (peer
->local_as
== peer
->as
) {
1051 if (bgp
->as
== bgp
->confed_id
) {
1052 if (peer
->local_as
== bgp
->as
)
1053 return BGP_PEER_IBGP
;
1055 return BGP_PEER_EBGP
;
1057 if (peer
->local_as
== bgp
->confed_id
)
1058 return BGP_PEER_EBGP
;
1060 return BGP_PEER_IBGP
;
1064 if (bgp_confederation_peers_check(bgp
, peer
->as
))
1065 return BGP_PEER_CONFED
;
1067 return BGP_PEER_EBGP
;
1069 if (peer
->as_type
!= AS_SPECIFIED
)
1070 return (peer
->as_type
== AS_INTERNAL
? BGP_PEER_IBGP
1073 return (peer
->local_as
== 0
1075 : peer
->local_as
== peer
->as
? BGP_PEER_IBGP
1080 /* Calculate and cache the peer "sort" */
1081 bgp_peer_sort_t
peer_sort(struct peer
*peer
)
1083 peer
->sort
= peer_calc_sort(peer
);
1087 static void peer_free(struct peer
*peer
)
1089 assert(peer
->status
== Deleted
);
1093 /* this /ought/ to have been done already through bgp_stop earlier,
1094 * but just to be sure..
1096 bgp_timer_set(peer
);
1097 bgp_reads_off(peer
);
1098 bgp_writes_off(peer
);
1099 assert(!peer
->t_write
);
1100 assert(!peer
->t_read
);
1101 BGP_EVENT_FLUSH(peer
);
1103 pthread_mutex_destroy(&peer
->io_mtx
);
1105 /* Free connected nexthop, if present */
1106 if (CHECK_FLAG(peer
->flags
, PEER_FLAG_CONFIG_NODE
)
1107 && !peer_dynamic_neighbor(peer
))
1108 bgp_delete_connected_nexthop(family2afi(peer
->su
.sa
.sa_family
),
1111 XFREE(MTYPE_PEER_TX_SHUTDOWN_MSG
, peer
->tx_shutdown_message
);
1114 XFREE(MTYPE_PEER_DESC
, peer
->desc
);
1118 /* Free allocated host character. */
1120 XFREE(MTYPE_BGP_PEER_HOST
, peer
->host
);
1124 if (peer
->domainname
) {
1125 XFREE(MTYPE_BGP_PEER_HOST
, peer
->domainname
);
1126 peer
->domainname
= NULL
;
1130 XFREE(MTYPE_BGP_PEER_IFNAME
, peer
->ifname
);
1131 peer
->ifname
= NULL
;
1134 /* Update source configuration. */
1135 if (peer
->update_source
) {
1136 sockunion_free(peer
->update_source
);
1137 peer
->update_source
= NULL
;
1140 if (peer
->update_if
) {
1141 XFREE(MTYPE_PEER_UPDATE_SOURCE
, peer
->update_if
);
1142 peer
->update_if
= NULL
;
1145 if (peer
->notify
.data
)
1146 XFREE(MTYPE_TMP
, peer
->notify
.data
);
1147 memset(&peer
->notify
, 0, sizeof(struct bgp_notify
));
1149 if (peer
->clear_node_queue
)
1150 work_queue_free_and_null(&peer
->clear_node_queue
);
1152 bgp_sync_delete(peer
);
1154 if (peer
->conf_if
) {
1155 XFREE(MTYPE_PEER_CONF_IF
, peer
->conf_if
);
1156 peer
->conf_if
= NULL
;
1159 bfd_info_free(&(peer
->bfd_info
));
1161 bgp_unlock(peer
->bgp
);
1163 memset(peer
, 0, sizeof(struct peer
));
1165 XFREE(MTYPE_BGP_PEER
, peer
);
1168 /* increase reference count on a struct peer */
1169 struct peer
*peer_lock_with_caller(const char *name
, struct peer
*peer
)
1171 assert(peer
&& (peer
->lock
>= 0));
1174 zlog_debug("%s peer_lock %p %d", name
, peer
, peer
->lock
);
1182 /* decrease reference count on a struct peer
1183 * struct peer is freed and NULL returned if last reference
1185 struct peer
*peer_unlock_with_caller(const char *name
, struct peer
*peer
)
1187 assert(peer
&& (peer
->lock
> 0));
1190 zlog_debug("%s peer_unlock %p %d", name
, peer
, peer
->lock
);
1195 if (peer
->lock
== 0) {
1203 /* Allocate new peer object, implicitely locked. */
1204 struct peer
*peer_new(struct bgp
*bgp
)
1211 /* bgp argument is absolutely required */
1216 /* Allocate new peer. */
1217 peer
= XCALLOC(MTYPE_BGP_PEER
, sizeof(struct peer
));
1219 /* Set default value. */
1221 peer
->v_start
= BGP_INIT_START_TIMER
;
1222 peer
->v_connect
= BGP_DEFAULT_CONNECT_RETRY
;
1223 peer
->status
= Idle
;
1224 peer
->ostatus
= Idle
;
1225 peer
->cur_event
= peer
->last_event
= peer
->last_major_event
= 0;
1226 peer
->bgp
= bgp_lock(bgp
);
1227 peer
= peer_lock(peer
); /* initial reference */
1228 peer
->password
= NULL
;
1230 /* Set default flags. */
1231 FOREACH_AFI_SAFI (afi
, safi
) {
1232 if (!bgp_option_check(BGP_OPT_CONFIG_CISCO
)) {
1233 SET_FLAG(peer
->af_flags
[afi
][safi
],
1234 PEER_FLAG_SEND_COMMUNITY
);
1235 SET_FLAG(peer
->af_flags
[afi
][safi
],
1236 PEER_FLAG_SEND_EXT_COMMUNITY
);
1237 SET_FLAG(peer
->af_flags
[afi
][safi
],
1238 PEER_FLAG_SEND_LARGE_COMMUNITY
);
1240 SET_FLAG(peer
->af_flags_invert
[afi
][safi
],
1241 PEER_FLAG_SEND_COMMUNITY
);
1242 SET_FLAG(peer
->af_flags_invert
[afi
][safi
],
1243 PEER_FLAG_SEND_EXT_COMMUNITY
);
1244 SET_FLAG(peer
->af_flags_invert
[afi
][safi
],
1245 PEER_FLAG_SEND_LARGE_COMMUNITY
);
1249 /* set nexthop-unchanged for l2vpn evpn by default */
1250 SET_FLAG(peer
->af_flags
[AFI_L2VPN
][SAFI_EVPN
],
1251 PEER_FLAG_NEXTHOP_UNCHANGED
);
1253 SET_FLAG(peer
->sflags
, PEER_STATUS_CAPABILITY_OPEN
);
1255 /* Create buffers. */
1256 peer
->ibuf
= stream_fifo_new();
1257 peer
->obuf
= stream_fifo_new();
1258 pthread_mutex_init(&peer
->io_mtx
, NULL
);
1260 /* We use a larger buffer for peer->obuf_work in the event that:
1261 * - We RX a BGP_UPDATE where the attributes alone are just
1262 * under BGP_MAX_PACKET_SIZE
1263 * - The user configures an outbound route-map that does many as-path
1264 * prepends or adds many communities. At most they can have
1265 * CMD_ARGC_MAX args in a route-map so there is a finite limit on how
1266 * large they can make the attributes.
1268 * Having a buffer with BGP_MAX_PACKET_SIZE_OVERFLOW allows us to avoid
1269 * bounds checking for every single attribute as we construct an
1273 stream_new(BGP_MAX_PACKET_SIZE
+ BGP_MAX_PACKET_SIZE_OVERFLOW
);
1275 ringbuf_new(BGP_MAX_PACKET_SIZE
* BGP_READ_PACKET_MAX
);
1277 peer
->scratch
= stream_new(BGP_MAX_PACKET_SIZE
);
1279 bgp_sync_init(peer
);
1281 /* Get service port number. */
1282 sp
= getservbyname("bgp", "tcp");
1283 peer
->port
= (sp
== NULL
) ? BGP_PORT_DEFAULT
: ntohs(sp
->s_port
);
1285 QOBJ_REG(peer
, peer
);
1290 * This function is invoked when a duplicate peer structure associated with
1291 * a neighbor is being deleted. If this about-to-be-deleted structure is
1292 * the one with all the config, then we have to copy over the info.
1294 void peer_xfer_config(struct peer
*peer_dst
, struct peer
*peer_src
)
1296 struct peer_af
*paf
;
1304 /* The following function is used by both peer group config copy to
1305 * individual peer and when we transfer config
1307 if (peer_src
->change_local_as
)
1308 peer_dst
->change_local_as
= peer_src
->change_local_as
;
1310 /* peer flags apply */
1311 peer_dst
->flags
= peer_src
->flags
;
1312 peer_dst
->cap
= peer_src
->cap
;
1314 peer_dst
->local_as
= peer_src
->local_as
;
1315 peer_dst
->port
= peer_src
->port
;
1316 (void)peer_sort(peer_dst
);
1317 peer_dst
->rmap_type
= peer_src
->rmap_type
;
1320 peer_dst
->holdtime
= peer_src
->holdtime
;
1321 peer_dst
->keepalive
= peer_src
->keepalive
;
1322 peer_dst
->connect
= peer_src
->connect
;
1323 peer_dst
->v_holdtime
= peer_src
->v_holdtime
;
1324 peer_dst
->v_keepalive
= peer_src
->v_keepalive
;
1325 peer_dst
->routeadv
= peer_src
->routeadv
;
1326 peer_dst
->v_routeadv
= peer_src
->v_routeadv
;
1328 /* password apply */
1329 if (peer_src
->password
&& !peer_dst
->password
)
1330 peer_dst
->password
=
1331 XSTRDUP(MTYPE_PEER_PASSWORD
, peer_src
->password
);
1333 FOREACH_AFI_SAFI (afi
, safi
) {
1334 peer_dst
->afc
[afi
][safi
] = peer_src
->afc
[afi
][safi
];
1335 peer_dst
->af_flags
[afi
][safi
] = peer_src
->af_flags
[afi
][safi
];
1336 peer_dst
->allowas_in
[afi
][safi
] =
1337 peer_src
->allowas_in
[afi
][safi
];
1338 peer_dst
->weight
[afi
][safi
] = peer_src
->weight
[afi
][safi
];
1341 for (afidx
= BGP_AF_START
; afidx
< BGP_AF_MAX
; afidx
++) {
1342 paf
= peer_src
->peer_af_array
[afidx
];
1344 peer_af_create(peer_dst
, paf
->afi
, paf
->safi
);
1347 /* update-source apply */
1348 if (peer_src
->update_source
) {
1349 if (peer_dst
->update_source
)
1350 sockunion_free(peer_dst
->update_source
);
1351 if (peer_dst
->update_if
) {
1352 XFREE(MTYPE_PEER_UPDATE_SOURCE
, peer_dst
->update_if
);
1353 peer_dst
->update_if
= NULL
;
1355 peer_dst
->update_source
=
1356 sockunion_dup(peer_src
->update_source
);
1357 } else if (peer_src
->update_if
) {
1358 if (peer_dst
->update_if
)
1359 XFREE(MTYPE_PEER_UPDATE_SOURCE
, peer_dst
->update_if
);
1360 if (peer_dst
->update_source
) {
1361 sockunion_free(peer_dst
->update_source
);
1362 peer_dst
->update_source
= NULL
;
1364 peer_dst
->update_if
=
1365 XSTRDUP(MTYPE_PEER_UPDATE_SOURCE
, peer_src
->update_if
);
1368 if (peer_src
->ifname
) {
1369 if (peer_dst
->ifname
)
1370 XFREE(MTYPE_BGP_PEER_IFNAME
, peer_dst
->ifname
);
1373 XSTRDUP(MTYPE_BGP_PEER_IFNAME
, peer_src
->ifname
);
1377 static int bgp_peer_conf_if_to_su_update_v4(struct peer
*peer
,
1378 struct interface
*ifp
)
1380 struct connected
*ifc
;
1383 struct listnode
*node
;
1385 /* If our IPv4 address on the interface is /30 or /31, we can derive the
1386 * IPv4 address of the other end.
1388 for (ALL_LIST_ELEMENTS_RO(ifp
->connected
, node
, ifc
)) {
1389 if (ifc
->address
&& (ifc
->address
->family
== AF_INET
)) {
1390 PREFIX_COPY_IPV4(&p
, CONNECTED_PREFIX(ifc
));
1391 if (p
.prefixlen
== 30) {
1392 peer
->su
.sa
.sa_family
= AF_INET
;
1393 addr
= ntohl(p
.u
.prefix4
.s_addr
);
1395 peer
->su
.sin
.sin_addr
.s_addr
=
1397 else if (addr
% 4 == 2)
1398 peer
->su
.sin
.sin_addr
.s_addr
=
1400 #ifdef HAVE_STRUCT_SOCKADDR_IN_SIN_LEN
1401 peer
->su
.sin
.sin_len
=
1402 sizeof(struct sockaddr_in
);
1403 #endif /* HAVE_STRUCT_SOCKADDR_IN_SIN_LEN */
1405 } else if (p
.prefixlen
== 31) {
1406 peer
->su
.sa
.sa_family
= AF_INET
;
1407 addr
= ntohl(p
.u
.prefix4
.s_addr
);
1409 peer
->su
.sin
.sin_addr
.s_addr
=
1412 peer
->su
.sin
.sin_addr
.s_addr
=
1414 #ifdef HAVE_STRUCT_SOCKADDR_IN_SIN_LEN
1415 peer
->su
.sin
.sin_len
=
1416 sizeof(struct sockaddr_in
);
1417 #endif /* HAVE_STRUCT_SOCKADDR_IN_SIN_LEN */
1419 } else if (bgp_debug_neighbor_events(peer
))
1421 "%s: IPv4 interface address is not /30 or /31, v4 session not started",
1429 static int bgp_peer_conf_if_to_su_update_v6(struct peer
*peer
,
1430 struct interface
*ifp
)
1432 struct nbr_connected
*ifc_nbr
;
1434 /* Have we learnt the peer's IPv6 link-local address? */
1435 if (ifp
->nbr_connected
1436 && (ifc_nbr
= listnode_head(ifp
->nbr_connected
))) {
1437 peer
->su
.sa
.sa_family
= AF_INET6
;
1438 memcpy(&peer
->su
.sin6
.sin6_addr
, &ifc_nbr
->address
->u
.prefix
,
1439 sizeof(struct in6_addr
));
1441 peer
->su
.sin6
.sin6_len
= sizeof(struct sockaddr_in6
);
1443 peer
->su
.sin6
.sin6_scope_id
= ifp
->ifindex
;
1451 * Set or reset the peer address socketunion structure based on the
1452 * learnt/derived peer address. If the address has changed, update the
1453 * password on the listen socket, if needed.
1455 void bgp_peer_conf_if_to_su_update(struct peer
*peer
)
1457 struct interface
*ifp
;
1459 int peer_addr_updated
= 0;
1465 * Our peer structure is stored in the bgp->peerhash
1466 * release it before we modify anything.
1468 hash_release(peer
->bgp
->peerhash
, peer
);
1470 prev_family
= peer
->su
.sa
.sa_family
;
1471 if ((ifp
= if_lookup_by_name(peer
->conf_if
, peer
->bgp
->vrf_id
))) {
1473 /* If BGP unnumbered is not "v6only", we first see if we can
1475 * peer's IPv4 address.
1477 if (!CHECK_FLAG(peer
->flags
, PEER_FLAG_IFPEER_V6ONLY
))
1479 bgp_peer_conf_if_to_su_update_v4(peer
, ifp
);
1481 /* If "v6only" or we can't derive peer's IPv4 address, see if
1483 * learnt the peer's IPv6 link-local address. This is from the
1485 * IPv6 address in router advertisement.
1487 if (!peer_addr_updated
)
1489 bgp_peer_conf_if_to_su_update_v6(peer
, ifp
);
1491 /* If we could derive the peer address, we may need to install the
1493 * configured for the peer, if any, on the listen socket. Otherwise,
1495 * that peer's address is not available and uninstall the password, if
1498 if (peer_addr_updated
) {
1499 if (CHECK_FLAG(peer
->flags
, PEER_FLAG_PASSWORD
)
1500 && prev_family
== AF_UNSPEC
)
1503 if (CHECK_FLAG(peer
->flags
, PEER_FLAG_PASSWORD
)
1504 && prev_family
!= AF_UNSPEC
)
1505 bgp_md5_unset(peer
);
1506 peer
->su
.sa
.sa_family
= AF_UNSPEC
;
1507 memset(&peer
->su
.sin6
.sin6_addr
, 0, sizeof(struct in6_addr
));
1511 * Since our su changed we need to del/add peer to the peerhash
1513 hash_get(peer
->bgp
->peerhash
, peer
, hash_alloc_intern
);
1516 static void bgp_recalculate_afi_safi_bestpaths(struct bgp
*bgp
, afi_t afi
,
1519 struct bgp_node
*rn
, *nrn
;
1521 for (rn
= bgp_table_top(bgp
->rib
[afi
][safi
]); rn
;
1522 rn
= bgp_route_next(rn
)) {
1523 if (rn
->info
!= NULL
) {
1524 /* Special handling for 2-level routing
1526 if (safi
== SAFI_MPLS_VPN
|| safi
== SAFI_ENCAP
1527 || safi
== SAFI_EVPN
) {
1528 for (nrn
= bgp_table_top(
1529 (struct bgp_table
*)(rn
->info
));
1530 nrn
; nrn
= bgp_route_next(nrn
))
1531 bgp_process(bgp
, nrn
, afi
, safi
);
1533 bgp_process(bgp
, rn
, afi
, safi
);
1538 /* Force a bestpath recalculation for all prefixes. This is used
1539 * when 'bgp bestpath' commands are entered.
1541 void bgp_recalculate_all_bestpaths(struct bgp
*bgp
)
1546 FOREACH_AFI_SAFI (afi
, safi
) {
1547 bgp_recalculate_afi_safi_bestpaths(bgp
, afi
, safi
);
1551 /* Create new BGP peer. */
1552 struct peer
*peer_create(union sockunion
*su
, const char *conf_if
,
1553 struct bgp
*bgp
, as_t local_as
, as_t remote_as
,
1554 int as_type
, afi_t afi
, safi_t safi
,
1555 struct peer_group
*group
)
1559 char buf
[SU_ADDRSTRLEN
];
1561 peer
= peer_new(bgp
);
1563 peer
->conf_if
= XSTRDUP(MTYPE_PEER_CONF_IF
, conf_if
);
1564 bgp_peer_conf_if_to_su_update(peer
);
1566 XFREE(MTYPE_BGP_PEER_HOST
, peer
->host
);
1567 peer
->host
= XSTRDUP(MTYPE_BGP_PEER_HOST
, conf_if
);
1570 sockunion2str(su
, buf
, SU_ADDRSTRLEN
);
1572 XFREE(MTYPE_BGP_PEER_HOST
, peer
->host
);
1573 peer
->host
= XSTRDUP(MTYPE_BGP_PEER_HOST
, buf
);
1575 peer
->local_as
= local_as
;
1576 peer
->as
= remote_as
;
1577 peer
->as_type
= as_type
;
1578 peer
->local_id
= bgp
->router_id
;
1579 peer
->v_holdtime
= bgp
->default_holdtime
;
1580 peer
->v_keepalive
= bgp
->default_keepalive
;
1581 peer
->v_routeadv
= (peer_sort(peer
) == BGP_PEER_IBGP
)
1582 ? BGP_DEFAULT_IBGP_ROUTEADV
1583 : BGP_DEFAULT_EBGP_ROUTEADV
;
1585 peer
= peer_lock(peer
); /* bgp peer list reference */
1586 peer
->group
= group
;
1587 listnode_add_sort(bgp
->peer
, peer
);
1588 hash_get(bgp
->peerhash
, peer
, hash_alloc_intern
);
1590 /* Adjust update-group coalesce timer heuristics for # peers. */
1591 if (bgp
->heuristic_coalesce
) {
1592 long ct
= BGP_DEFAULT_SUBGROUP_COALESCE_TIME
1594 * BGP_PEER_ADJUST_SUBGROUP_COALESCE_TIME
);
1595 bgp
->coalesce_time
= MIN(BGP_MAX_SUBGROUP_COALESCE_TIME
, ct
);
1598 active
= peer_active(peer
);
1600 /* Last read and reset time set */
1601 peer
->readtime
= peer
->resettime
= bgp_clock();
1603 /* Default TTL set. */
1604 peer
->ttl
= (peer
->sort
== BGP_PEER_IBGP
) ? MAXTTL
: 1;
1606 SET_FLAG(peer
->flags
, PEER_FLAG_CONFIG_NODE
);
1609 peer
->afc
[afi
][safi
] = 1;
1610 peer_af_create(peer
, afi
, safi
);
1613 /* auto shutdown if configured */
1614 if (bgp
->autoshutdown
)
1615 peer_flag_set(peer
, PEER_FLAG_SHUTDOWN
);
1616 /* Set up peer's events and timers. */
1617 else if (!active
&& peer_active(peer
))
1618 bgp_timer_set(peer
);
1623 /* Make accept BGP peer. This function is only called from the test code */
1624 struct peer
*peer_create_accept(struct bgp
*bgp
)
1628 peer
= peer_new(bgp
);
1630 peer
= peer_lock(peer
); /* bgp peer list reference */
1631 listnode_add_sort(bgp
->peer
, peer
);
1637 * Return true if we have a peer configured to use this afi/safi
1639 int bgp_afi_safi_peer_exists(struct bgp
*bgp
, afi_t afi
, safi_t safi
)
1641 struct listnode
*node
;
1644 for (ALL_LIST_ELEMENTS_RO(bgp
->peer
, node
, peer
)) {
1645 if (!CHECK_FLAG(peer
->flags
, PEER_FLAG_CONFIG_NODE
))
1648 if (peer
->afc
[afi
][safi
])
1655 /* Change peer's AS number. */
1656 void peer_as_change(struct peer
*peer
, as_t as
, int as_specified
)
1658 bgp_peer_sort_t type
;
1661 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
1662 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
1663 peer
->last_reset
= PEER_DOWN_REMOTE_AS_CHANGE
;
1664 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
1665 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
1667 bgp_session_reset(peer
);
1669 type
= peer_sort(peer
);
1671 peer
->as_type
= as_specified
;
1673 if (bgp_config_check(peer
->bgp
, BGP_CONFIG_CONFEDERATION
)
1674 && !bgp_confederation_peers_check(peer
->bgp
, as
)
1675 && peer
->bgp
->as
!= as
)
1676 peer
->local_as
= peer
->bgp
->confed_id
;
1678 peer
->local_as
= peer
->bgp
->as
;
1680 /* Advertisement-interval reset */
1681 if (!CHECK_FLAG(peer
->flags
, PEER_FLAG_ROUTEADV
)) {
1682 peer
->v_routeadv
= (peer_sort(peer
) == BGP_PEER_IBGP
)
1683 ? BGP_DEFAULT_IBGP_ROUTEADV
1684 : BGP_DEFAULT_EBGP_ROUTEADV
;
1688 if (peer_sort(peer
) == BGP_PEER_IBGP
)
1690 else if (type
== BGP_PEER_IBGP
)
1693 /* reflector-client reset */
1694 if (peer_sort(peer
) != BGP_PEER_IBGP
) {
1695 UNSET_FLAG(peer
->af_flags
[AFI_IP
][SAFI_UNICAST
],
1696 PEER_FLAG_REFLECTOR_CLIENT
);
1697 UNSET_FLAG(peer
->af_flags
[AFI_IP
][SAFI_MULTICAST
],
1698 PEER_FLAG_REFLECTOR_CLIENT
);
1699 UNSET_FLAG(peer
->af_flags
[AFI_IP
][SAFI_LABELED_UNICAST
],
1700 PEER_FLAG_REFLECTOR_CLIENT
);
1701 UNSET_FLAG(peer
->af_flags
[AFI_IP
][SAFI_MPLS_VPN
],
1702 PEER_FLAG_REFLECTOR_CLIENT
);
1703 UNSET_FLAG(peer
->af_flags
[AFI_IP
][SAFI_ENCAP
],
1704 PEER_FLAG_REFLECTOR_CLIENT
);
1705 UNSET_FLAG(peer
->af_flags
[AFI_IP
][SAFI_FLOWSPEC
],
1706 PEER_FLAG_REFLECTOR_CLIENT
);
1707 UNSET_FLAG(peer
->af_flags
[AFI_IP6
][SAFI_UNICAST
],
1708 PEER_FLAG_REFLECTOR_CLIENT
);
1709 UNSET_FLAG(peer
->af_flags
[AFI_IP6
][SAFI_MULTICAST
],
1710 PEER_FLAG_REFLECTOR_CLIENT
);
1711 UNSET_FLAG(peer
->af_flags
[AFI_IP6
][SAFI_LABELED_UNICAST
],
1712 PEER_FLAG_REFLECTOR_CLIENT
);
1713 UNSET_FLAG(peer
->af_flags
[AFI_IP6
][SAFI_MPLS_VPN
],
1714 PEER_FLAG_REFLECTOR_CLIENT
);
1715 UNSET_FLAG(peer
->af_flags
[AFI_IP6
][SAFI_ENCAP
],
1716 PEER_FLAG_REFLECTOR_CLIENT
);
1717 UNSET_FLAG(peer
->af_flags
[AFI_IP6
][SAFI_FLOWSPEC
],
1718 PEER_FLAG_REFLECTOR_CLIENT
);
1719 UNSET_FLAG(peer
->af_flags
[AFI_L2VPN
][SAFI_EVPN
],
1720 PEER_FLAG_REFLECTOR_CLIENT
);
1723 /* local-as reset */
1724 if (peer_sort(peer
) != BGP_PEER_EBGP
) {
1725 peer
->change_local_as
= 0;
1726 peer_flag_unset(peer
, PEER_FLAG_LOCAL_AS
);
1727 peer_flag_unset(peer
, PEER_FLAG_LOCAL_AS_NO_PREPEND
);
1728 peer_flag_unset(peer
, PEER_FLAG_LOCAL_AS_REPLACE_AS
);
1732 /* If peer does not exist, create new one. If peer already exists,
1733 set AS number to the peer. */
1734 int peer_remote_as(struct bgp
*bgp
, union sockunion
*su
, const char *conf_if
,
1735 as_t
*as
, int as_type
, afi_t afi
, safi_t safi
)
1741 peer
= peer_lookup_by_conf_if(bgp
, conf_if
);
1743 peer
= peer_lookup(bgp
, su
);
1746 /* Not allowed for a dynamic peer. */
1747 if (peer_dynamic_neighbor(peer
)) {
1749 return BGP_ERR_INVALID_FOR_DYNAMIC_PEER
;
1752 /* When this peer is a member of peer-group. */
1754 if (peer
->group
->conf
->as
) {
1755 /* Return peer group's AS number. */
1756 *as
= peer
->group
->conf
->as
;
1757 return BGP_ERR_PEER_GROUP_MEMBER
;
1759 if (peer_sort(peer
->group
->conf
) == BGP_PEER_IBGP
) {
1760 if ((as_type
!= AS_INTERNAL
)
1761 && (bgp
->as
!= *as
)) {
1763 return BGP_ERR_PEER_GROUP_PEER_TYPE_DIFFERENT
;
1766 if ((as_type
!= AS_EXTERNAL
)
1767 && (bgp
->as
== *as
)) {
1769 return BGP_ERR_PEER_GROUP_PEER_TYPE_DIFFERENT
;
1774 /* Existing peer's AS number change. */
1775 if (((peer
->as_type
== AS_SPECIFIED
) && peer
->as
!= *as
)
1776 || (peer
->as_type
!= as_type
))
1777 peer_as_change(peer
, *as
, as_type
);
1780 return BGP_ERR_NO_INTERFACE_CONFIG
;
1782 /* If the peer is not part of our confederation, and its not an
1783 iBGP peer then spoof the source AS */
1784 if (bgp_config_check(bgp
, BGP_CONFIG_CONFEDERATION
)
1785 && !bgp_confederation_peers_check(bgp
, *as
)
1787 local_as
= bgp
->confed_id
;
1791 /* If this is IPv4 unicast configuration and "no bgp default
1792 ipv4-unicast" is specified. */
1794 if (bgp_flag_check(bgp
, BGP_FLAG_NO_DEFAULT_IPV4
)
1795 && afi
== AFI_IP
&& safi
== SAFI_UNICAST
)
1796 peer_create(su
, conf_if
, bgp
, local_as
, *as
, as_type
, 0,
1799 peer_create(su
, conf_if
, bgp
, local_as
, *as
, as_type
,
1806 static void peer_group2peer_config_copy_af(struct peer_group
*group
,
1807 struct peer
*peer
, afi_t afi
,
1811 int out
= FILTER_OUT
;
1813 uint32_t pflags_ovrd
;
1814 uint8_t *pfilter_ovrd
;
1818 pflags_ovrd
= peer
->af_flags_override
[afi
][safi
];
1819 pfilter_ovrd
= &peer
->filter_override
[afi
][safi
][in
];
1821 /* peer af_flags apply */
1822 flags_tmp
= conf
->af_flags
[afi
][safi
] & ~pflags_ovrd
;
1823 flags_tmp
^= conf
->af_flags_invert
[afi
][safi
]
1824 ^ peer
->af_flags_invert
[afi
][safi
];
1825 flags_tmp
&= ~pflags_ovrd
;
1827 UNSET_FLAG(peer
->af_flags
[afi
][safi
], ~pflags_ovrd
);
1828 SET_FLAG(peer
->af_flags
[afi
][safi
], flags_tmp
);
1829 SET_FLAG(peer
->af_flags_invert
[afi
][safi
],
1830 conf
->af_flags_invert
[afi
][safi
]);
1832 /* maximum-prefix */
1833 if (!CHECK_FLAG(pflags_ovrd
, PEER_FLAG_MAX_PREFIX
)) {
1834 PEER_ATTR_INHERIT(peer
, group
, pmax
[afi
][safi
]);
1835 PEER_ATTR_INHERIT(peer
, group
, pmax_threshold
[afi
][safi
]);
1836 PEER_ATTR_INHERIT(peer
, group
, pmax_restart
[afi
][safi
]);
1840 if (!CHECK_FLAG(pflags_ovrd
, PEER_FLAG_ALLOWAS_IN
))
1841 PEER_ATTR_INHERIT(peer
, group
, allowas_in
[afi
][safi
]);
1844 if (!CHECK_FLAG(pflags_ovrd
, PEER_FLAG_WEIGHT
))
1845 PEER_ATTR_INHERIT(peer
, group
, weight
[afi
][safi
]);
1847 /* default-originate route-map */
1848 if (!CHECK_FLAG(pflags_ovrd
, PEER_FLAG_DEFAULT_ORIGINATE
)) {
1849 PEER_STR_ATTR_INHERIT(peer
, group
, default_rmap
[afi
][safi
].name
,
1850 MTYPE_ROUTE_MAP_NAME
);
1851 PEER_ATTR_INHERIT(peer
, group
, default_rmap
[afi
][safi
].map
);
1854 /* inbound filter apply */
1855 if (!CHECK_FLAG(pfilter_ovrd
[in
], PEER_FT_DISTRIBUTE_LIST
)) {
1856 PEER_STR_ATTR_INHERIT(peer
, group
,
1857 filter
[afi
][safi
].dlist
[in
].name
,
1858 MTYPE_BGP_FILTER_NAME
);
1859 PEER_ATTR_INHERIT(peer
, group
,
1860 filter
[afi
][safi
].dlist
[in
].alist
);
1863 if (!CHECK_FLAG(pfilter_ovrd
[in
], PEER_FT_PREFIX_LIST
)) {
1864 PEER_STR_ATTR_INHERIT(peer
, group
,
1865 filter
[afi
][safi
].plist
[in
].name
,
1866 MTYPE_BGP_FILTER_NAME
);
1867 PEER_ATTR_INHERIT(peer
, group
,
1868 filter
[afi
][safi
].plist
[in
].plist
);
1871 if (!CHECK_FLAG(pfilter_ovrd
[in
], PEER_FT_FILTER_LIST
)) {
1872 PEER_STR_ATTR_INHERIT(peer
, group
,
1873 filter
[afi
][safi
].aslist
[in
].name
,
1874 MTYPE_BGP_FILTER_NAME
);
1875 PEER_ATTR_INHERIT(peer
, group
,
1876 filter
[afi
][safi
].aslist
[in
].aslist
);
1879 if (!CHECK_FLAG(pfilter_ovrd
[RMAP_IN
], PEER_FT_ROUTE_MAP
)) {
1880 PEER_STR_ATTR_INHERIT(peer
, group
,
1881 filter
[afi
][safi
].map
[in
].name
,
1882 MTYPE_BGP_FILTER_NAME
);
1883 PEER_ATTR_INHERIT(peer
, group
,
1884 filter
[afi
][safi
].map
[RMAP_IN
].map
);
1887 /* outbound filter apply */
1888 if (!CHECK_FLAG(pfilter_ovrd
[out
], PEER_FT_DISTRIBUTE_LIST
)) {
1889 PEER_STR_ATTR_INHERIT(peer
, group
,
1890 filter
[afi
][safi
].dlist
[out
].name
,
1891 MTYPE_BGP_FILTER_NAME
);
1892 PEER_ATTR_INHERIT(peer
, group
,
1893 filter
[afi
][safi
].dlist
[out
].alist
);
1896 if (!CHECK_FLAG(pfilter_ovrd
[out
], PEER_FT_PREFIX_LIST
)) {
1897 PEER_STR_ATTR_INHERIT(peer
, group
,
1898 filter
[afi
][safi
].plist
[out
].name
,
1899 MTYPE_BGP_FILTER_NAME
);
1900 PEER_ATTR_INHERIT(peer
, group
,
1901 filter
[afi
][safi
].plist
[out
].plist
);
1904 if (!CHECK_FLAG(pfilter_ovrd
[out
], PEER_FT_FILTER_LIST
)) {
1905 PEER_STR_ATTR_INHERIT(peer
, group
,
1906 filter
[afi
][safi
].aslist
[out
].name
,
1907 MTYPE_BGP_FILTER_NAME
);
1908 PEER_ATTR_INHERIT(peer
, group
,
1909 filter
[afi
][safi
].aslist
[out
].aslist
);
1912 if (!CHECK_FLAG(pfilter_ovrd
[RMAP_OUT
], PEER_FT_ROUTE_MAP
)) {
1913 PEER_STR_ATTR_INHERIT(peer
, group
,
1914 filter
[afi
][safi
].map
[RMAP_OUT
].name
,
1915 MTYPE_BGP_FILTER_NAME
);
1916 PEER_ATTR_INHERIT(peer
, group
,
1917 filter
[afi
][safi
].map
[RMAP_OUT
].map
);
1920 /* nondirectional filter apply */
1921 if (!CHECK_FLAG(pfilter_ovrd
[0], PEER_FT_UNSUPPRESS_MAP
)) {
1922 PEER_STR_ATTR_INHERIT(peer
, group
, filter
[afi
][safi
].usmap
.name
,
1923 MTYPE_BGP_FILTER_NAME
);
1924 PEER_ATTR_INHERIT(peer
, group
, filter
[afi
][safi
].usmap
.map
);
1928 static int peer_activate_af(struct peer
*peer
, afi_t afi
, safi_t safi
)
1932 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
1933 zlog_err("%s was called for peer-group %s", __func__
,
1938 /* Do not activate a peer for both SAFI_UNICAST and SAFI_LABELED_UNICAST
1940 if ((safi
== SAFI_UNICAST
&& peer
->afc
[afi
][SAFI_LABELED_UNICAST
])
1941 || (safi
== SAFI_LABELED_UNICAST
&& peer
->afc
[afi
][SAFI_UNICAST
]))
1942 return BGP_ERR_PEER_SAFI_CONFLICT
;
1944 /* Nothing to do if we've already activated this peer */
1945 if (peer
->afc
[afi
][safi
])
1948 if (peer_af_create(peer
, afi
, safi
) == NULL
)
1951 active
= peer_active(peer
);
1952 peer
->afc
[afi
][safi
] = 1;
1955 peer_group2peer_config_copy_af(peer
->group
, peer
, afi
, safi
);
1957 if (!active
&& peer_active(peer
)) {
1958 bgp_timer_set(peer
);
1960 if (peer
->status
== Established
) {
1961 if (CHECK_FLAG(peer
->cap
, PEER_CAP_DYNAMIC_RCV
)) {
1962 peer
->afc_adv
[afi
][safi
] = 1;
1963 bgp_capability_send(peer
, afi
, safi
,
1965 CAPABILITY_ACTION_SET
);
1966 if (peer
->afc_recv
[afi
][safi
]) {
1967 peer
->afc_nego
[afi
][safi
] = 1;
1968 bgp_announce_route(peer
, afi
, safi
);
1971 peer
->last_reset
= PEER_DOWN_AF_ACTIVATE
;
1972 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
1973 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
1976 if (peer
->status
== OpenSent
|| peer
->status
== OpenConfirm
) {
1977 peer
->last_reset
= PEER_DOWN_AF_ACTIVATE
;
1978 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
1979 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
1986 /* Activate the peer or peer group for specified AFI and SAFI. */
1987 int peer_activate(struct peer
*peer
, afi_t afi
, safi_t safi
)
1990 struct peer_group
*group
;
1991 struct listnode
*node
, *nnode
;
1992 struct peer
*tmp_peer
;
1995 /* Nothing to do if we've already activated this peer */
1996 if (peer
->afc
[afi
][safi
])
2001 /* This is a peer-group so activate all of the members of the
2002 * peer-group as well */
2003 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
2005 /* Do not activate a peer for both SAFI_UNICAST and
2006 * SAFI_LABELED_UNICAST */
2007 if ((safi
== SAFI_UNICAST
2008 && peer
->afc
[afi
][SAFI_LABELED_UNICAST
])
2009 || (safi
== SAFI_LABELED_UNICAST
2010 && peer
->afc
[afi
][SAFI_UNICAST
]))
2011 return BGP_ERR_PEER_SAFI_CONFLICT
;
2013 peer
->afc
[afi
][safi
] = 1;
2014 group
= peer
->group
;
2016 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, tmp_peer
)) {
2017 ret
|= peer_activate_af(tmp_peer
, afi
, safi
);
2020 ret
|= peer_activate_af(peer
, afi
, safi
);
2023 /* If this is the first peer to be activated for this
2024 * afi/labeled-unicast recalc bestpaths to trigger label allocation */
2025 if (safi
== SAFI_LABELED_UNICAST
2026 && !bgp
->allocate_mpls_labels
[afi
][SAFI_UNICAST
]) {
2028 if (BGP_DEBUG(zebra
, ZEBRA
))
2030 "peer(s) are now active for labeled-unicast, allocate MPLS labels");
2032 bgp
->allocate_mpls_labels
[afi
][SAFI_UNICAST
] = 1;
2033 bgp_recalculate_afi_safi_bestpaths(bgp
, afi
, SAFI_UNICAST
);
2036 if (safi
== SAFI_FLOWSPEC
) {
2037 /* connect to table manager */
2038 bgp_zebra_init_tm_connect(bgp
);
2043 static int non_peergroup_deactivate_af(struct peer
*peer
, afi_t afi
,
2046 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
2047 zlog_err("%s was called for peer-group %s", __func__
,
2052 /* Nothing to do if we've already deactivated this peer */
2053 if (!peer
->afc
[afi
][safi
])
2056 /* De-activate the address family configuration. */
2057 peer
->afc
[afi
][safi
] = 0;
2059 if (peer_af_delete(peer
, afi
, safi
) != 0) {
2060 zlog_err("couldn't delete af structure for peer %s",
2065 if (peer
->status
== Established
) {
2066 if (CHECK_FLAG(peer
->cap
, PEER_CAP_DYNAMIC_RCV
)) {
2067 peer
->afc_adv
[afi
][safi
] = 0;
2068 peer
->afc_nego
[afi
][safi
] = 0;
2070 if (peer_active_nego(peer
)) {
2071 bgp_capability_send(peer
, afi
, safi
,
2073 CAPABILITY_ACTION_UNSET
);
2074 bgp_clear_route(peer
, afi
, safi
);
2075 peer
->pcount
[afi
][safi
] = 0;
2077 peer
->last_reset
= PEER_DOWN_NEIGHBOR_DELETE
;
2078 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
2079 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
2082 peer
->last_reset
= PEER_DOWN_NEIGHBOR_DELETE
;
2083 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
2084 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
2091 int peer_deactivate(struct peer
*peer
, afi_t afi
, safi_t safi
)
2094 struct peer_group
*group
;
2095 struct peer
*tmp_peer
;
2096 struct listnode
*node
, *nnode
;
2099 /* Nothing to do if we've already de-activated this peer */
2100 if (!peer
->afc
[afi
][safi
])
2103 /* This is a peer-group so de-activate all of the members of the
2104 * peer-group as well */
2105 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
2106 peer
->afc
[afi
][safi
] = 0;
2107 group
= peer
->group
;
2109 if (peer_af_delete(peer
, afi
, safi
) != 0) {
2110 zlog_err("couldn't delete af structure for peer %s",
2114 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, tmp_peer
)) {
2115 ret
|= non_peergroup_deactivate_af(tmp_peer
, afi
, safi
);
2118 ret
|= non_peergroup_deactivate_af(peer
, afi
, safi
);
2123 /* If this is the last peer to be deactivated for this
2124 * afi/labeled-unicast recalc bestpaths to trigger label deallocation */
2125 if (safi
== SAFI_LABELED_UNICAST
2126 && bgp
->allocate_mpls_labels
[afi
][SAFI_UNICAST
]
2127 && !bgp_afi_safi_peer_exists(bgp
, afi
, safi
)) {
2129 if (BGP_DEBUG(zebra
, ZEBRA
))
2131 "peer(s) are no longer active for labeled-unicast, deallocate MPLS labels");
2133 bgp
->allocate_mpls_labels
[afi
][SAFI_UNICAST
] = 0;
2134 bgp_recalculate_afi_safi_bestpaths(bgp
, afi
, SAFI_UNICAST
);
2139 int peer_afc_set(struct peer
*peer
, afi_t afi
, safi_t safi
, int enable
)
2142 return peer_activate(peer
, afi
, safi
);
2144 return peer_deactivate(peer
, afi
, safi
);
2147 static void peer_nsf_stop(struct peer
*peer
)
2152 UNSET_FLAG(peer
->sflags
, PEER_STATUS_NSF_WAIT
);
2153 UNSET_FLAG(peer
->sflags
, PEER_STATUS_NSF_MODE
);
2155 for (afi
= AFI_IP
; afi
< AFI_MAX
; afi
++)
2156 for (safi
= SAFI_UNICAST
; safi
<= SAFI_MPLS_VPN
; safi
++)
2157 peer
->nsf
[afi
][safi
] = 0;
2159 if (peer
->t_gr_restart
) {
2160 BGP_TIMER_OFF(peer
->t_gr_restart
);
2161 if (bgp_debug_neighbor_events(peer
))
2162 zlog_debug("%s graceful restart timer stopped",
2165 if (peer
->t_gr_stale
) {
2166 BGP_TIMER_OFF(peer
->t_gr_stale
);
2167 if (bgp_debug_neighbor_events(peer
))
2169 "%s graceful restart stalepath timer stopped",
2172 bgp_clear_route_all(peer
);
2175 /* Delete peer from confguration.
2177 * The peer is moved to a dead-end "Deleted" neighbour-state, to allow
2178 * it to "cool off" and refcounts to hit 0, at which state it is freed.
2180 * This function /should/ take care to be idempotent, to guard against
2181 * it being called multiple times through stray events that come in
2182 * that happen to result in this function being called again. That
2183 * said, getting here for a "Deleted" peer is a bug in the neighbour
2186 int peer_delete(struct peer
*peer
)
2192 struct bgp_filter
*filter
;
2193 struct listnode
*pn
;
2196 assert(peer
->status
!= Deleted
);
2199 accept_peer
= CHECK_FLAG(peer
->sflags
, PEER_STATUS_ACCEPT_PEER
);
2201 bgp_reads_off(peer
);
2202 bgp_writes_off(peer
);
2203 assert(!CHECK_FLAG(peer
->thread_flags
, PEER_THREAD_WRITES_ON
));
2204 assert(!CHECK_FLAG(peer
->thread_flags
, PEER_THREAD_READS_ON
));
2206 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_NSF_WAIT
))
2207 peer_nsf_stop(peer
);
2209 SET_FLAG(peer
->flags
, PEER_FLAG_DELETE
);
2211 /* If this peer belongs to peer group, clear up the
2214 if (peer_dynamic_neighbor(peer
))
2215 peer_drop_dynamic_neighbor(peer
);
2217 if ((pn
= listnode_lookup(peer
->group
->peer
, peer
))) {
2219 peer
); /* group->peer list reference */
2220 list_delete_node(peer
->group
->peer
, pn
);
2225 /* Withdraw all information from routing table. We can not use
2226 * BGP_EVENT_ADD (peer, BGP_Stop) at here. Because the event is
2227 * executed after peer structure is deleted.
2229 peer
->last_reset
= PEER_DOWN_NEIGHBOR_DELETE
;
2231 UNSET_FLAG(peer
->flags
, PEER_FLAG_DELETE
);
2233 if (peer
->doppelganger
) {
2234 peer
->doppelganger
->doppelganger
= NULL
;
2235 peer
->doppelganger
= NULL
;
2238 UNSET_FLAG(peer
->sflags
, PEER_STATUS_ACCEPT_PEER
);
2239 bgp_fsm_change_status(peer
, Deleted
);
2241 /* Remove from NHT */
2242 if (CHECK_FLAG(peer
->flags
, PEER_FLAG_CONFIG_NODE
))
2243 bgp_unlink_nexthop_by_peer(peer
);
2245 /* Password configuration */
2246 if (CHECK_FLAG(peer
->flags
, PEER_FLAG_PASSWORD
)) {
2247 XFREE(MTYPE_PEER_PASSWORD
, peer
->password
);
2249 if (!accept_peer
&& !BGP_PEER_SU_UNSPEC(peer
)
2250 && !CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
))
2251 bgp_md5_unset(peer
);
2254 bgp_timer_set(peer
); /* stops all timers for Deleted */
2256 /* Delete from all peer list. */
2257 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)
2258 && (pn
= listnode_lookup(bgp
->peer
, peer
))) {
2259 peer_unlock(peer
); /* bgp peer list reference */
2260 list_delete_node(bgp
->peer
, pn
);
2261 hash_release(bgp
->peerhash
, peer
);
2266 stream_fifo_free(peer
->ibuf
);
2271 stream_fifo_free(peer
->obuf
);
2275 if (peer
->ibuf_work
) {
2276 ringbuf_del(peer
->ibuf_work
);
2277 peer
->ibuf_work
= NULL
;
2280 if (peer
->obuf_work
) {
2281 stream_free(peer
->obuf_work
);
2282 peer
->obuf_work
= NULL
;
2285 if (peer
->scratch
) {
2286 stream_free(peer
->scratch
);
2287 peer
->scratch
= NULL
;
2290 /* Local and remote addresses. */
2291 if (peer
->su_local
) {
2292 sockunion_free(peer
->su_local
);
2293 peer
->su_local
= NULL
;
2296 if (peer
->su_remote
) {
2297 sockunion_free(peer
->su_remote
);
2298 peer
->su_remote
= NULL
;
2301 /* Free filter related memory. */
2302 FOREACH_AFI_SAFI (afi
, safi
) {
2303 filter
= &peer
->filter
[afi
][safi
];
2305 for (i
= FILTER_IN
; i
< FILTER_MAX
; i
++) {
2306 if (filter
->dlist
[i
].name
) {
2307 XFREE(MTYPE_BGP_FILTER_NAME
,
2308 filter
->dlist
[i
].name
);
2309 filter
->dlist
[i
].name
= NULL
;
2312 if (filter
->plist
[i
].name
) {
2313 XFREE(MTYPE_BGP_FILTER_NAME
,
2314 filter
->plist
[i
].name
);
2315 filter
->plist
[i
].name
= NULL
;
2318 if (filter
->aslist
[i
].name
) {
2319 XFREE(MTYPE_BGP_FILTER_NAME
,
2320 filter
->aslist
[i
].name
);
2321 filter
->aslist
[i
].name
= NULL
;
2325 for (i
= RMAP_IN
; i
< RMAP_MAX
; i
++) {
2326 if (filter
->map
[i
].name
) {
2327 XFREE(MTYPE_BGP_FILTER_NAME
,
2328 filter
->map
[i
].name
);
2329 filter
->map
[i
].name
= NULL
;
2333 if (filter
->usmap
.name
) {
2334 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->usmap
.name
);
2335 filter
->usmap
.name
= NULL
;
2338 if (peer
->default_rmap
[afi
][safi
].name
) {
2339 XFREE(MTYPE_ROUTE_MAP_NAME
,
2340 peer
->default_rmap
[afi
][safi
].name
);
2341 peer
->default_rmap
[afi
][safi
].name
= NULL
;
2345 FOREACH_AFI_SAFI (afi
, safi
)
2346 peer_af_delete(peer
, afi
, safi
);
2348 if (peer
->hostname
) {
2349 XFREE(MTYPE_BGP_PEER_HOST
, peer
->hostname
);
2350 peer
->hostname
= NULL
;
2353 if (peer
->domainname
) {
2354 XFREE(MTYPE_BGP_PEER_HOST
, peer
->domainname
);
2355 peer
->domainname
= NULL
;
2358 peer_unlock(peer
); /* initial reference */
2363 static int peer_group_cmp(struct peer_group
*g1
, struct peer_group
*g2
)
2365 return strcmp(g1
->name
, g2
->name
);
2368 /* Peer group cofiguration. */
2369 static struct peer_group
*peer_group_new(void)
2371 return (struct peer_group
*)XCALLOC(MTYPE_PEER_GROUP
,
2372 sizeof(struct peer_group
));
2375 static void peer_group_free(struct peer_group
*group
)
2377 XFREE(MTYPE_PEER_GROUP
, group
);
2380 struct peer_group
*peer_group_lookup(struct bgp
*bgp
, const char *name
)
2382 struct peer_group
*group
;
2383 struct listnode
*node
, *nnode
;
2385 for (ALL_LIST_ELEMENTS(bgp
->group
, node
, nnode
, group
)) {
2386 if (strcmp(group
->name
, name
) == 0)
2392 struct peer_group
*peer_group_get(struct bgp
*bgp
, const char *name
)
2394 struct peer_group
*group
;
2397 group
= peer_group_lookup(bgp
, name
);
2401 group
= peer_group_new();
2404 XFREE(MTYPE_PEER_GROUP_HOST
, group
->name
);
2405 group
->name
= XSTRDUP(MTYPE_PEER_GROUP_HOST
, name
);
2406 group
->peer
= list_new();
2407 for (afi
= AFI_IP
; afi
< AFI_MAX
; afi
++)
2408 group
->listen_range
[afi
] = list_new();
2409 group
->conf
= peer_new(bgp
);
2410 if (!bgp_flag_check(bgp
, BGP_FLAG_NO_DEFAULT_IPV4
))
2411 group
->conf
->afc
[AFI_IP
][SAFI_UNICAST
] = 1;
2412 if (group
->conf
->host
)
2413 XFREE(MTYPE_BGP_PEER_HOST
, group
->conf
->host
);
2414 group
->conf
->host
= XSTRDUP(MTYPE_BGP_PEER_HOST
, name
);
2415 group
->conf
->group
= group
;
2416 group
->conf
->as
= 0;
2417 group
->conf
->ttl
= 1;
2418 group
->conf
->gtsm_hops
= 0;
2419 group
->conf
->v_routeadv
= BGP_DEFAULT_EBGP_ROUTEADV
;
2420 SET_FLAG(group
->conf
->sflags
, PEER_STATUS_GROUP
);
2421 listnode_add_sort(bgp
->group
, group
);
2426 static void peer_group2peer_config_copy(struct peer_group
*group
,
2436 peer
->as
= conf
->as
;
2439 if (!CHECK_FLAG(peer
->flags_override
, PEER_FLAG_LOCAL_AS
))
2440 peer
->change_local_as
= conf
->change_local_as
;
2443 peer
->ttl
= conf
->ttl
;
2446 peer
->gtsm_hops
= conf
->gtsm_hops
;
2448 /* peer flags apply */
2449 flags_tmp
= conf
->flags
& ~peer
->flags_override
;
2450 flags_tmp
^= conf
->flags_invert
^ peer
->flags_invert
;
2451 flags_tmp
&= ~peer
->flags_override
;
2453 UNSET_FLAG(peer
->flags
, ~peer
->flags_override
);
2454 SET_FLAG(peer
->flags
, flags_tmp
);
2455 SET_FLAG(peer
->flags_invert
, conf
->flags_invert
);
2457 /* peer timers apply */
2458 if (!CHECK_FLAG(peer
->flags_override
, PEER_FLAG_TIMER
)) {
2459 PEER_ATTR_INHERIT(peer
, group
, holdtime
);
2460 PEER_ATTR_INHERIT(peer
, group
, keepalive
);
2463 if (!CHECK_FLAG(peer
->flags_override
, PEER_FLAG_TIMER_CONNECT
)) {
2464 PEER_ATTR_INHERIT(peer
, group
, connect
);
2465 if (CHECK_FLAG(conf
->flags
, PEER_FLAG_TIMER_CONNECT
))
2466 peer
->v_connect
= conf
->connect
;
2468 peer
->v_connect
= BGP_DEFAULT_CONNECT_RETRY
;
2471 /* advertisement-interval apply */
2472 if (!CHECK_FLAG(peer
->flags_override
, PEER_FLAG_ROUTEADV
)) {
2473 PEER_ATTR_INHERIT(peer
, group
, routeadv
);
2474 if (CHECK_FLAG(conf
->flags
, PEER_FLAG_ROUTEADV
))
2475 peer
->v_routeadv
= conf
->routeadv
;
2477 peer
->v_routeadv
= (peer_sort(peer
) == BGP_PEER_IBGP
)
2478 ? BGP_DEFAULT_IBGP_ROUTEADV
2479 : BGP_DEFAULT_EBGP_ROUTEADV
;
2482 /* password apply */
2483 if (!CHECK_FLAG(peer
->flags_override
, PEER_FLAG_PASSWORD
))
2484 PEER_STR_ATTR_INHERIT(peer
, group
, password
,
2485 MTYPE_PEER_PASSWORD
);
2487 if (!BGP_PEER_SU_UNSPEC(peer
))
2490 /* update-source apply */
2491 if (!CHECK_FLAG(peer
->flags_override
, PEER_FLAG_UPDATE_SOURCE
)) {
2492 if (conf
->update_source
) {
2493 XFREE(MTYPE_PEER_UPDATE_SOURCE
, peer
->update_if
);
2494 PEER_SU_ATTR_INHERIT(peer
, group
, update_source
);
2495 } else if (conf
->update_if
) {
2496 sockunion_free(peer
->update_source
);
2497 PEER_STR_ATTR_INHERIT(peer
, group
, update_if
,
2498 MTYPE_PEER_UPDATE_SOURCE
);
2502 bgp_bfd_peer_group2peer_copy(conf
, peer
);
2505 /* Peer group's remote AS configuration. */
2506 int peer_group_remote_as(struct bgp
*bgp
, const char *group_name
, as_t
*as
,
2509 struct peer_group
*group
;
2511 struct listnode
*node
, *nnode
;
2513 group
= peer_group_lookup(bgp
, group_name
);
2517 if ((as_type
== group
->conf
->as_type
) && (group
->conf
->as
== *as
))
2521 /* When we setup peer-group AS number all peer group member's AS
2522 number must be updated to same number. */
2523 peer_as_change(group
->conf
, *as
, as_type
);
2525 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, peer
)) {
2526 if (((peer
->as_type
== AS_SPECIFIED
) && peer
->as
!= *as
)
2527 || (peer
->as_type
!= as_type
))
2528 peer_as_change(peer
, *as
, as_type
);
2534 int peer_group_delete(struct peer_group
*group
)
2538 struct prefix
*prefix
;
2540 struct listnode
*node
, *nnode
;
2545 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, peer
)) {
2546 other
= peer
->doppelganger
;
2548 if (other
&& other
->status
!= Deleted
) {
2549 other
->group
= NULL
;
2553 list_delete_and_null(&group
->peer
);
2555 for (afi
= AFI_IP
; afi
< AFI_MAX
; afi
++) {
2556 for (ALL_LIST_ELEMENTS(group
->listen_range
[afi
], node
, nnode
,
2558 prefix_free(prefix
);
2560 list_delete_and_null(&group
->listen_range
[afi
]);
2563 XFREE(MTYPE_PEER_GROUP_HOST
, group
->name
);
2566 bfd_info_free(&(group
->conf
->bfd_info
));
2568 group
->conf
->group
= NULL
;
2569 peer_delete(group
->conf
);
2571 /* Delete from all peer_group list. */
2572 listnode_delete(bgp
->group
, group
);
2574 peer_group_free(group
);
2579 int peer_group_remote_as_delete(struct peer_group
*group
)
2581 struct peer
*peer
, *other
;
2582 struct listnode
*node
, *nnode
;
2584 if ((group
->conf
->as_type
== AS_UNSPECIFIED
)
2585 || ((!group
->conf
->as
) && (group
->conf
->as_type
== AS_SPECIFIED
)))
2588 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, peer
)) {
2589 other
= peer
->doppelganger
;
2593 if (other
&& other
->status
!= Deleted
) {
2594 other
->group
= NULL
;
2598 list_delete_all_node(group
->peer
);
2600 group
->conf
->as
= 0;
2601 group
->conf
->as_type
= AS_UNSPECIFIED
;
2606 int peer_group_listen_range_add(struct peer_group
*group
, struct prefix
*range
)
2608 struct prefix
*prefix
;
2609 struct listnode
*node
, *nnode
;
2612 afi
= family2afi(range
->family
);
2614 /* Group needs remote AS configured. */
2615 if (group
->conf
->as_type
== AS_UNSPECIFIED
)
2616 return BGP_ERR_PEER_GROUP_NO_REMOTE_AS
;
2618 /* Ensure no duplicates. Currently we don't care about overlaps. */
2619 for (ALL_LIST_ELEMENTS(group
->listen_range
[afi
], node
, nnode
, prefix
)) {
2620 if (prefix_same(range
, prefix
))
2624 prefix
= prefix_new();
2625 prefix_copy(prefix
, range
);
2626 listnode_add(group
->listen_range
[afi
], prefix
);
2630 int peer_group_listen_range_del(struct peer_group
*group
, struct prefix
*range
)
2632 struct prefix
*prefix
, prefix2
;
2633 struct listnode
*node
, *nnode
;
2636 char buf
[PREFIX2STR_BUFFER
];
2638 afi
= family2afi(range
->family
);
2640 /* Identify the listen range. */
2641 for (ALL_LIST_ELEMENTS(group
->listen_range
[afi
], node
, nnode
, prefix
)) {
2642 if (prefix_same(range
, prefix
))
2647 return BGP_ERR_DYNAMIC_NEIGHBORS_RANGE_NOT_FOUND
;
2649 prefix2str(prefix
, buf
, sizeof(buf
));
2651 /* Dispose off any dynamic neighbors that exist due to this listen range
2653 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, peer
)) {
2654 if (!peer_dynamic_neighbor(peer
))
2657 sockunion2hostprefix(&peer
->su
, &prefix2
);
2658 if (prefix_match(prefix
, &prefix2
)) {
2659 if (bgp_debug_neighbor_events(peer
))
2661 "Deleting dynamic neighbor %s group %s upon "
2662 "delete of listen range %s",
2663 peer
->host
, group
->name
, buf
);
2668 /* Get rid of the listen range */
2669 listnode_delete(group
->listen_range
[afi
], prefix
);
2674 /* Bind specified peer to peer group. */
2675 int peer_group_bind(struct bgp
*bgp
, union sockunion
*su
, struct peer
*peer
,
2676 struct peer_group
*group
, as_t
*as
)
2678 int first_member
= 0;
2682 /* Lookup the peer. */
2684 peer
= peer_lookup(bgp
, su
);
2686 /* The peer exist, bind it to the peer-group */
2688 /* When the peer already belongs to a peer-group, check the
2690 if (peer_group_active(peer
)) {
2692 /* The peer is already bound to the peer-group,
2695 if (strcmp(peer
->group
->name
, group
->name
) == 0)
2698 return BGP_ERR_PEER_GROUP_CANT_CHANGE
;
2701 /* The peer has not specified a remote-as, inherit it from the
2703 if (peer
->as_type
== AS_UNSPECIFIED
) {
2704 peer
->as_type
= group
->conf
->as_type
;
2705 peer
->as
= group
->conf
->as
;
2708 if (!group
->conf
->as
) {
2709 if (peer_sort(group
->conf
) != BGP_PEER_INTERNAL
2710 && peer_sort(group
->conf
) != peer_sort(peer
)) {
2713 return BGP_ERR_PEER_GROUP_PEER_TYPE_DIFFERENT
;
2716 if (peer_sort(group
->conf
) == BGP_PEER_INTERNAL
)
2720 peer_group2peer_config_copy(group
, peer
);
2722 FOREACH_AFI_SAFI (afi
, safi
) {
2723 if (group
->conf
->afc
[afi
][safi
]) {
2724 peer
->afc
[afi
][safi
] = 1;
2726 if (peer_af_find(peer
, afi
, safi
)
2727 || peer_af_create(peer
, afi
, safi
)) {
2728 peer_group2peer_config_copy_af(
2729 group
, peer
, afi
, safi
);
2731 } else if (peer
->afc
[afi
][safi
])
2732 peer_deactivate(peer
, afi
, safi
);
2736 assert(group
&& peer
->group
== group
);
2738 listnode_delete(bgp
->peer
, peer
);
2740 peer
->group
= group
;
2741 listnode_add_sort(bgp
->peer
, peer
);
2743 peer
= peer_lock(peer
); /* group->peer list reference */
2744 listnode_add(group
->peer
, peer
);
2748 /* Advertisement-interval reset */
2749 if (!CHECK_FLAG(group
->conf
->flags
,
2750 PEER_FLAG_ROUTEADV
)) {
2751 group
->conf
->v_routeadv
=
2752 (peer_sort(group
->conf
)
2754 ? BGP_DEFAULT_IBGP_ROUTEADV
2755 : BGP_DEFAULT_EBGP_ROUTEADV
;
2758 /* ebgp-multihop reset */
2759 if (peer_sort(group
->conf
) == BGP_PEER_IBGP
)
2760 group
->conf
->ttl
= MAXTTL
;
2762 /* local-as reset */
2763 if (peer_sort(group
->conf
) != BGP_PEER_EBGP
) {
2764 group
->conf
->change_local_as
= 0;
2765 peer_flag_unset(group
->conf
,
2766 PEER_FLAG_LOCAL_AS
);
2767 peer_flag_unset(group
->conf
,
2768 PEER_FLAG_LOCAL_AS_NO_PREPEND
);
2769 peer_flag_unset(group
->conf
,
2770 PEER_FLAG_LOCAL_AS_REPLACE_AS
);
2774 SET_FLAG(peer
->flags
, PEER_FLAG_CONFIG_NODE
);
2776 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
2777 peer
->last_reset
= PEER_DOWN_RMAP_BIND
;
2778 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
2779 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
2781 bgp_session_reset(peer
);
2785 /* Create a new peer. */
2787 if ((group
->conf
->as_type
== AS_SPECIFIED
)
2788 && (!group
->conf
->as
)) {
2789 return BGP_ERR_PEER_GROUP_NO_REMOTE_AS
;
2792 peer
= peer_create(su
, NULL
, bgp
, bgp
->as
, group
->conf
->as
,
2793 group
->conf
->as_type
, 0, 0, group
);
2795 peer
= peer_lock(peer
); /* group->peer list reference */
2796 listnode_add(group
->peer
, peer
);
2798 peer_group2peer_config_copy(group
, peer
);
2800 /* If the peer-group is active for this afi/safi then activate
2802 FOREACH_AFI_SAFI (afi
, safi
) {
2803 if (group
->conf
->afc
[afi
][safi
]) {
2804 peer
->afc
[afi
][safi
] = 1;
2805 peer_af_create(peer
, afi
, safi
);
2806 peer_group2peer_config_copy_af(group
, peer
, afi
,
2808 } else if (peer
->afc
[afi
][safi
])
2809 peer_deactivate(peer
, afi
, safi
);
2812 SET_FLAG(peer
->flags
, PEER_FLAG_CONFIG_NODE
);
2814 /* Set up peer's events and timers. */
2815 if (peer_active(peer
))
2816 bgp_timer_set(peer
);
2822 int peer_group_unbind(struct bgp
*bgp
, struct peer
*peer
,
2823 struct peer_group
*group
)
2829 if (group
!= peer
->group
)
2830 return BGP_ERR_PEER_GROUP_MISMATCH
;
2832 FOREACH_AFI_SAFI (afi
, safi
) {
2833 if (peer
->afc
[afi
][safi
]) {
2834 peer
->afc
[afi
][safi
] = 0;
2835 peer_af_flag_reset(peer
, afi
, safi
);
2837 if (peer_af_delete(peer
, afi
, safi
) != 0) {
2839 "couldn't delete af structure for peer %s",
2845 assert(listnode_lookup(group
->peer
, peer
));
2846 peer_unlock(peer
); /* peer group list reference */
2847 listnode_delete(group
->peer
, peer
);
2849 other
= peer
->doppelganger
;
2851 if (group
->conf
->as
) {
2853 if (other
&& other
->status
!= Deleted
) {
2856 listnode_delete(group
->peer
, other
);
2858 other
->group
= NULL
;
2864 bgp_bfd_deregister_peer(peer
);
2865 peer_global_config_reset(peer
);
2867 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
2868 peer
->last_reset
= PEER_DOWN_RMAP_UNBIND
;
2869 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
2870 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
2872 bgp_session_reset(peer
);
2877 static int bgp_startup_timer_expire(struct thread
*thread
)
2881 bgp
= THREAD_ARG(thread
);
2882 bgp
->t_startup
= NULL
;
2888 * On shutdown we call the cleanup function which
2889 * does a free of the link list nodes, free up
2890 * the data we are pointing at too.
2892 static void bgp_vrf_string_name_delete(void *data
)
2896 XFREE(MTYPE_TMP
, vname
);
2899 /* BGP instance creation by `router bgp' commands. */
2900 static struct bgp
*bgp_create(as_t
*as
, const char *name
,
2901 enum bgp_instance_type inst_type
)
2907 if ((bgp
= XCALLOC(MTYPE_BGP
, sizeof(struct bgp
))) == NULL
)
2910 if (BGP_DEBUG(zebra
, ZEBRA
)) {
2911 if (inst_type
== BGP_INSTANCE_TYPE_DEFAULT
)
2912 zlog_debug("Creating Default VRF, AS %u", *as
);
2914 zlog_debug("Creating %s %s, AS %u",
2915 (inst_type
== BGP_INSTANCE_TYPE_VRF
)
2922 bgp
->heuristic_coalesce
= true;
2923 bgp
->inst_type
= inst_type
;
2924 bgp
->vrf_id
= (inst_type
== BGP_INSTANCE_TYPE_DEFAULT
) ? VRF_DEFAULT
2926 bgp
->peer_self
= peer_new(bgp
);
2927 if (bgp
->peer_self
->host
)
2928 XFREE(MTYPE_BGP_PEER_HOST
, bgp
->peer_self
->host
);
2929 bgp
->peer_self
->host
=
2930 XSTRDUP(MTYPE_BGP_PEER_HOST
, "Static announcement");
2931 if (bgp
->peer_self
->hostname
!= NULL
) {
2932 XFREE(MTYPE_BGP_PEER_HOST
, bgp
->peer_self
->hostname
);
2933 bgp
->peer_self
->hostname
= NULL
;
2935 if (cmd_hostname_get())
2936 bgp
->peer_self
->hostname
=
2937 XSTRDUP(MTYPE_BGP_PEER_HOST
, cmd_hostname_get());
2939 if (bgp
->peer_self
->domainname
!= NULL
) {
2940 XFREE(MTYPE_BGP_PEER_HOST
, bgp
->peer_self
->domainname
);
2941 bgp
->peer_self
->domainname
= NULL
;
2943 if (cmd_domainname_get())
2944 bgp
->peer_self
->domainname
=
2945 XSTRDUP(MTYPE_BGP_PEER_HOST
, cmd_domainname_get());
2946 bgp
->peer
= list_new();
2947 bgp
->peer
->cmp
= (int (*)(void *, void *))peer_cmp
;
2948 bgp
->peerhash
= hash_create(peer_hash_key_make
, peer_hash_same
,
2950 bgp
->peerhash
->max_size
= BGP_PEER_MAX_HASH_SIZE
;
2952 bgp
->group
= list_new();
2953 bgp
->group
->cmp
= (int (*)(void *, void *))peer_group_cmp
;
2955 FOREACH_AFI_SAFI (afi
, safi
) {
2956 bgp
->route
[afi
][safi
] = bgp_table_init(bgp
, afi
, safi
);
2957 bgp
->aggregate
[afi
][safi
] = bgp_table_init(bgp
, afi
, safi
);
2958 bgp
->rib
[afi
][safi
] = bgp_table_init(bgp
, afi
, safi
);
2960 /* Enable maximum-paths */
2961 bgp_maximum_paths_set(bgp
, afi
, safi
, BGP_PEER_EBGP
,
2963 bgp_maximum_paths_set(bgp
, afi
, safi
, BGP_PEER_IBGP
,
2967 bgp
->v_update_delay
= BGP_UPDATE_DELAY_DEF
;
2968 bgp
->default_local_pref
= BGP_DEFAULT_LOCAL_PREF
;
2969 bgp
->default_subgroup_pkt_queue_max
=
2970 BGP_DEFAULT_SUBGROUP_PKT_QUEUE_MAX
;
2971 bgp
->default_holdtime
= BGP_DEFAULT_HOLDTIME
;
2972 bgp
->default_keepalive
= BGP_DEFAULT_KEEPALIVE
;
2973 bgp
->restart_time
= BGP_DEFAULT_RESTART_TIME
;
2974 bgp
->stalepath_time
= BGP_DEFAULT_STALEPATH_TIME
;
2975 bgp
->dynamic_neighbors_limit
= BGP_DYNAMIC_NEIGHBORS_LIMIT_DEFAULT
;
2976 bgp
->dynamic_neighbors_count
= 0;
2977 #if DFLT_BGP_IMPORT_CHECK
2978 bgp_flag_set(bgp
, BGP_FLAG_IMPORT_CHECK
);
2980 #if DFLT_BGP_SHOW_HOSTNAME
2981 bgp_flag_set(bgp
, BGP_FLAG_SHOW_HOSTNAME
);
2983 #if DFLT_BGP_LOG_NEIGHBOR_CHANGES
2984 bgp_flag_set(bgp
, BGP_FLAG_LOG_NEIGHBOR_CHANGES
);
2986 #if DFLT_BGP_DETERMINISTIC_MED
2987 bgp_flag_set(bgp
, BGP_FLAG_DETERMINISTIC_MED
);
2989 bgp
->addpath_tx_id
= BGP_ADDPATH_TX_ID_FOR_DEFAULT_ORIGINATE
;
2994 if (inst_type
!= BGP_INSTANCE_TYPE_VRF
) {
2995 bgp
->rfapi
= bgp_rfapi_new(bgp
);
2997 assert(bgp
->rfapi_cfg
);
2999 #endif /* ENABLE_BGP_VNC */
3001 for (afi
= AFI_IP
; afi
< AFI_MAX
; afi
++) {
3002 bgp
->vpn_policy
[afi
].bgp
= bgp
;
3003 bgp
->vpn_policy
[afi
].afi
= afi
;
3004 bgp
->vpn_policy
[afi
].tovpn_label
= MPLS_LABEL_NONE
;
3005 bgp
->vpn_policy
[afi
].tovpn_zebra_vrf_label_last_sent
=
3008 bgp
->vpn_policy
[afi
].import_vrf
= list_new();
3009 bgp
->vpn_policy
[afi
].import_vrf
->del
=
3010 bgp_vrf_string_name_delete
;
3011 bgp
->vpn_policy
[afi
].export_vrf
= list_new();
3012 bgp
->vpn_policy
[afi
].export_vrf
->del
=
3013 bgp_vrf_string_name_delete
;
3016 bgp
->name
= XSTRDUP(MTYPE_BGP
, name
);
3018 /* TODO - The startup timer needs to be run for the whole of BGP
3020 thread_add_timer(bm
->master
, bgp_startup_timer_expire
, bgp
,
3021 bgp
->restart_time
, &bgp
->t_startup
);
3024 /* printable name we can use in debug messages */
3025 if (inst_type
== BGP_INSTANCE_TYPE_DEFAULT
) {
3026 bgp
->name_pretty
= XSTRDUP(MTYPE_BGP
, "VRF default");
3036 len
= 4 + 1 + strlen(n
) + 1; /* "view foo\0" */
3038 bgp
->name_pretty
= XCALLOC(MTYPE_BGP
, len
);
3039 snprintf(bgp
->name_pretty
, len
, "%s %s",
3040 (bgp
->inst_type
== BGP_INSTANCE_TYPE_VRF
)
3046 atomic_store_explicit(&bgp
->wpkt_quanta
, BGP_WRITE_PACKET_MAX
,
3047 memory_order_relaxed
);
3048 atomic_store_explicit(&bgp
->rpkt_quanta
, BGP_READ_PACKET_MAX
,
3049 memory_order_relaxed
);
3050 bgp
->coalesce_time
= BGP_DEFAULT_SUBGROUP_COALESCE_TIME
;
3054 update_bgp_group_init(bgp
);
3056 /* assign a unique rd id for auto derivation of vrf's RD */
3057 bf_assign_index(bm
->rd_idspace
, bgp
->vrf_rd_id
);
3064 /* Return the "default VRF" instance of BGP. */
3065 struct bgp
*bgp_get_default(void)
3068 struct listnode
*node
, *nnode
;
3070 for (ALL_LIST_ELEMENTS(bm
->bgp
, node
, nnode
, bgp
))
3071 if (bgp
->inst_type
== BGP_INSTANCE_TYPE_DEFAULT
)
3076 /* Lookup BGP entry. */
3077 struct bgp
*bgp_lookup(as_t as
, const char *name
)
3080 struct listnode
*node
, *nnode
;
3082 for (ALL_LIST_ELEMENTS(bm
->bgp
, node
, nnode
, bgp
))
3084 && ((bgp
->name
== NULL
&& name
== NULL
)
3085 || (bgp
->name
&& name
&& strcmp(bgp
->name
, name
) == 0)))
3090 /* Lookup BGP structure by view name. */
3091 struct bgp
*bgp_lookup_by_name(const char *name
)
3094 struct listnode
*node
, *nnode
;
3096 for (ALL_LIST_ELEMENTS(bm
->bgp
, node
, nnode
, bgp
))
3097 if ((bgp
->name
== NULL
&& name
== NULL
)
3098 || (bgp
->name
&& name
&& strcmp(bgp
->name
, name
) == 0))
3103 /* Lookup BGP instance based on VRF id. */
3104 /* Note: Only to be used for incoming messages from Zebra. */
3105 struct bgp
*bgp_lookup_by_vrf_id(vrf_id_t vrf_id
)
3109 /* Lookup VRF (in tree) and follow link. */
3110 vrf
= vrf_lookup_by_id(vrf_id
);
3113 return (vrf
->info
) ? (struct bgp
*)vrf
->info
: NULL
;
3116 /* handle socket creation or deletion, if necessary
3117 * this is called for all new BGP instances
3119 int bgp_handle_socket(struct bgp
*bgp
, struct vrf
*vrf
, vrf_id_t old_vrf_id
,
3124 /* Create BGP server socket, if listen mode not disabled */
3125 if (!bgp
|| bgp_option_check(BGP_OPT_NO_LISTEN
))
3127 if (bgp
->inst_type
== BGP_INSTANCE_TYPE_VRF
) {
3129 * suppress vrf socket
3131 if (create
== FALSE
) {
3132 bgp_close_vrf_socket(bgp
);
3136 return BGP_ERR_INVALID_VALUE
;
3138 * if vrf_id did not change
3140 if (vrf
->vrf_id
== old_vrf_id
)
3142 if (old_vrf_id
!= VRF_UNKNOWN
) {
3143 /* look for old socket. close it. */
3144 bgp_close_vrf_socket(bgp
);
3146 /* if backend is not yet identified ( VRF_UNKNOWN) then
3147 * creation will be done later
3149 if (vrf
->vrf_id
== VRF_UNKNOWN
)
3151 ret
= bgp_socket(bgp
, bm
->port
, bm
->address
);
3153 return BGP_ERR_INVALID_VALUE
;
3156 return bgp_check_main_socket(create
, bgp
);
3159 /* Called from VTY commands. */
3160 int bgp_get(struct bgp
**bgp_val
, as_t
*as
, const char *name
,
3161 enum bgp_instance_type inst_type
)
3164 struct vrf
*vrf
= NULL
;
3166 /* Multiple instance check. */
3167 if (bgp_option_check(BGP_OPT_MULTIPLE_INSTANCE
)) {
3169 bgp
= bgp_lookup_by_name(name
);
3171 bgp
= bgp_get_default();
3173 /* Already exists. */
3175 if (bgp
->as
!= *as
) {
3177 return BGP_ERR_INSTANCE_MISMATCH
;
3179 if (bgp
->inst_type
!= inst_type
)
3180 return BGP_ERR_INSTANCE_MISMATCH
;
3185 /* BGP instance name can not be specified for single instance.
3188 return BGP_ERR_MULTIPLE_INSTANCE_NOT_SET
;
3190 /* Get default BGP structure if exists. */
3191 bgp
= bgp_get_default();
3194 if (bgp
->as
!= *as
) {
3196 return BGP_ERR_AS_MISMATCH
;
3203 bgp
= bgp_create(as
, name
, inst_type
);
3204 bgp_router_id_set(bgp
, &bgp
->router_id_zebra
);
3205 bgp_address_init(bgp
);
3206 bgp_tip_hash_init(bgp
);
3210 bgp
->t_rmap_def_originate_eval
= NULL
;
3212 /* If Default instance or VRF, link to the VRF structure, if present. */
3213 if (bgp
->inst_type
== BGP_INSTANCE_TYPE_DEFAULT
3214 || bgp
->inst_type
== BGP_INSTANCE_TYPE_VRF
) {
3215 vrf
= bgp_vrf_lookup_by_instance_type(bgp
);
3217 bgp_vrf_link(bgp
, vrf
);
3219 /* BGP server socket already processed if BGP instance
3220 * already part of the list
3222 bgp_handle_socket(bgp
, vrf
, VRF_UNKNOWN
, true);
3223 listnode_add(bm
->bgp
, bgp
);
3225 if (IS_BGP_INST_KNOWN_TO_ZEBRA(bgp
))
3226 bgp_zebra_instance_register(bgp
);
3233 * Make BGP instance "up". Applies only to VRFs (non-default) and
3234 * implies the VRF has been learnt from Zebra.
3236 void bgp_instance_up(struct bgp
*bgp
)
3239 struct listnode
*node
, *next
;
3241 /* Register with zebra. */
3242 bgp_zebra_instance_register(bgp
);
3244 /* Kick off any peers that may have been configured. */
3245 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, next
, peer
)) {
3246 if (!BGP_PEER_START_SUPPRESSED(peer
))
3247 BGP_EVENT_ADD(peer
, BGP_Start
);
3250 /* Process any networks that have been configured. */
3251 bgp_static_add(bgp
);
3255 * Make BGP instance "down". Applies only to VRFs (non-default) and
3256 * implies the VRF has been deleted by Zebra.
3258 void bgp_instance_down(struct bgp
*bgp
)
3261 struct listnode
*node
;
3262 struct listnode
*next
;
3265 if (bgp
->t_rmap_def_originate_eval
) {
3266 BGP_TIMER_OFF(bgp
->t_rmap_def_originate_eval
);
3267 bgp_unlock(bgp
); /* TODO - This timer is started with a lock -
3271 /* Bring down peers, so corresponding routes are purged. */
3272 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, next
, peer
)) {
3273 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
))
3274 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
3275 BGP_NOTIFY_CEASE_ADMIN_SHUTDOWN
);
3277 bgp_session_reset(peer
);
3280 /* Purge network and redistributed routes. */
3281 bgp_purge_static_redist_routes(bgp
);
3283 /* Cleanup registered nexthops (flags) */
3284 bgp_cleanup_nexthops(bgp
);
3287 /* Delete BGP instance. */
3288 int bgp_delete(struct bgp
*bgp
)
3291 struct peer_group
*group
;
3292 struct listnode
*node
, *next
;
3298 THREAD_OFF(bgp
->t_startup
);
3300 if (BGP_DEBUG(zebra
, ZEBRA
)) {
3301 if (bgp
->inst_type
== BGP_INSTANCE_TYPE_DEFAULT
)
3302 zlog_debug("Deleting Default VRF");
3304 zlog_debug("Deleting %s %s",
3305 (bgp
->inst_type
== BGP_INSTANCE_TYPE_VRF
)
3311 /* unmap from RT list */
3312 bgp_evpn_vrf_delete(bgp
);
3315 if (bgp
->t_rmap_def_originate_eval
) {
3316 BGP_TIMER_OFF(bgp
->t_rmap_def_originate_eval
);
3317 bgp_unlock(bgp
); /* TODO - This timer is started with a lock -
3321 /* Inform peers we're going down. */
3322 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, next
, peer
)) {
3323 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
))
3324 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
3325 BGP_NOTIFY_CEASE_ADMIN_SHUTDOWN
);
3328 /* Delete static routes (networks). */
3329 bgp_static_delete(bgp
);
3331 /* Unset redistribution. */
3332 for (afi
= AFI_IP
; afi
< AFI_MAX
; afi
++)
3333 for (i
= 0; i
< ZEBRA_ROUTE_MAX
; i
++)
3334 if (i
!= ZEBRA_ROUTE_BGP
)
3335 bgp_redistribute_unset(bgp
, afi
, i
, 0);
3337 /* Free peers and peer-groups. */
3338 for (ALL_LIST_ELEMENTS(bgp
->group
, node
, next
, group
))
3339 peer_group_delete(group
);
3341 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, next
, peer
))
3344 if (bgp
->peer_self
) {
3345 peer_delete(bgp
->peer_self
);
3346 bgp
->peer_self
= NULL
;
3349 update_bgp_group_free(bgp
);
3351 /* TODO - Other memory may need to be freed - e.g., NHT */
3356 bgp_cleanup_routes(bgp
);
3358 for (afi
= 0; afi
< AFI_MAX
; ++afi
) {
3359 if (!bgp
->vpn_policy
[afi
].import_redirect_rtlist
)
3362 &bgp
->vpn_policy
[afi
]
3363 .import_redirect_rtlist
);
3364 bgp
->vpn_policy
[afi
].import_redirect_rtlist
= NULL
;
3366 /* Remove visibility via the master list - there may however still be
3367 * routes to be processed still referencing the struct bgp.
3369 listnode_delete(bm
->bgp
, bgp
);
3371 /* Deregister from Zebra, if needed */
3372 if (IS_BGP_INST_KNOWN_TO_ZEBRA(bgp
))
3373 bgp_zebra_instance_deregister(bgp
);
3375 /* Free interfaces in this instance. */
3378 vrf
= bgp_vrf_lookup_by_instance_type(bgp
);
3379 bgp_handle_socket(bgp
, vrf
, VRF_UNKNOWN
, false);
3381 bgp_vrf_unlink(bgp
, vrf
);
3383 thread_master_free_unused(bm
->master
);
3384 bgp_unlock(bgp
); /* initial reference */
3389 void bgp_free(struct bgp
*bgp
)
3393 struct bgp_table
*table
;
3394 struct bgp_node
*rn
;
3395 struct bgp_rmap
*rmap
;
3399 list_delete_and_null(&bgp
->group
);
3400 list_delete_and_null(&bgp
->peer
);
3402 if (bgp
->peerhash
) {
3403 hash_free(bgp
->peerhash
);
3404 bgp
->peerhash
= NULL
;
3407 FOREACH_AFI_SAFI (afi
, safi
) {
3408 /* Special handling for 2-level routing tables. */
3409 if (safi
== SAFI_MPLS_VPN
|| safi
== SAFI_ENCAP
3410 || safi
== SAFI_EVPN
) {
3411 for (rn
= bgp_table_top(bgp
->rib
[afi
][safi
]); rn
;
3412 rn
= bgp_route_next(rn
)) {
3413 table
= (struct bgp_table
*)rn
->info
;
3414 bgp_table_finish(&table
);
3417 if (bgp
->route
[afi
][safi
])
3418 bgp_table_finish(&bgp
->route
[afi
][safi
]);
3419 if (bgp
->aggregate
[afi
][safi
])
3420 bgp_table_finish(&bgp
->aggregate
[afi
][safi
]);
3421 if (bgp
->rib
[afi
][safi
])
3422 bgp_table_finish(&bgp
->rib
[afi
][safi
]);
3423 rmap
= &bgp
->table_map
[afi
][safi
];
3425 XFREE(MTYPE_ROUTE_MAP_NAME
, rmap
->name
);
3428 bgp_scan_finish(bgp
);
3429 bgp_address_destroy(bgp
);
3430 bgp_tip_hash_destroy(bgp
);
3432 /* release the auto RD id */
3433 bf_release_index(bm
->rd_idspace
, bgp
->vrf_rd_id
);
3435 bgp_evpn_cleanup(bgp
);
3436 bgp_pbr_cleanup(bgp
);
3438 for (afi
= AFI_IP
; afi
< AFI_MAX
; afi
++) {
3439 vpn_policy_direction_t dir
;
3441 if (bgp
->vpn_policy
[afi
].import_vrf
)
3442 list_delete_and_null(&bgp
->vpn_policy
[afi
].import_vrf
);
3443 if (bgp
->vpn_policy
[afi
].export_vrf
)
3444 list_delete_and_null(&bgp
->vpn_policy
[afi
].export_vrf
);
3446 dir
= BGP_VPN_POLICY_DIR_FROMVPN
;
3447 if (bgp
->vpn_policy
[afi
].rtlist
[dir
])
3448 ecommunity_free(&bgp
->vpn_policy
[afi
].rtlist
[dir
]);
3449 dir
= BGP_VPN_POLICY_DIR_TOVPN
;
3450 if (bgp
->vpn_policy
[afi
].rtlist
[dir
])
3451 ecommunity_free(&bgp
->vpn_policy
[afi
].rtlist
[dir
]);
3455 XFREE(MTYPE_BGP
, bgp
->name
);
3456 if (bgp
->name_pretty
)
3457 XFREE(MTYPE_BGP
, bgp
->name_pretty
);
3459 XFREE(MTYPE_BGP
, bgp
);
3462 struct peer
*peer_lookup_by_conf_if(struct bgp
*bgp
, const char *conf_if
)
3465 struct listnode
*node
, *nnode
;
3471 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
))
3472 if (peer
->conf_if
&& !strcmp(peer
->conf_if
, conf_if
)
3473 && !CHECK_FLAG(peer
->sflags
,
3474 PEER_STATUS_ACCEPT_PEER
))
3476 } else if (bm
->bgp
!= NULL
) {
3477 struct listnode
*bgpnode
, *nbgpnode
;
3479 for (ALL_LIST_ELEMENTS(bm
->bgp
, bgpnode
, nbgpnode
, bgp
))
3480 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
))
3482 && !strcmp(peer
->conf_if
, conf_if
)
3483 && !CHECK_FLAG(peer
->sflags
,
3484 PEER_STATUS_ACCEPT_PEER
))
3490 struct peer
*peer_lookup_by_hostname(struct bgp
*bgp
, const char *hostname
)
3493 struct listnode
*node
, *nnode
;
3499 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
))
3500 if (peer
->hostname
&& !strcmp(peer
->hostname
, hostname
)
3501 && !CHECK_FLAG(peer
->sflags
,
3502 PEER_STATUS_ACCEPT_PEER
))
3504 } else if (bm
->bgp
!= NULL
) {
3505 struct listnode
*bgpnode
, *nbgpnode
;
3507 for (ALL_LIST_ELEMENTS(bm
->bgp
, bgpnode
, nbgpnode
, bgp
))
3508 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
))
3510 && !strcmp(peer
->hostname
, hostname
)
3511 && !CHECK_FLAG(peer
->sflags
,
3512 PEER_STATUS_ACCEPT_PEER
))
3518 struct peer
*peer_lookup(struct bgp
*bgp
, union sockunion
*su
)
3520 struct peer
*peer
= NULL
;
3521 struct peer tmp_peer
;
3523 memset(&tmp_peer
, 0, sizeof(struct peer
));
3526 * We do not want to find the doppelganger peer so search for the peer
3528 * the hash that has PEER_FLAG_CONFIG_NODE
3530 SET_FLAG(tmp_peer
.flags
, PEER_FLAG_CONFIG_NODE
);
3535 peer
= hash_lookup(bgp
->peerhash
, &tmp_peer
);
3536 } else if (bm
->bgp
!= NULL
) {
3537 struct listnode
*bgpnode
, *nbgpnode
;
3539 for (ALL_LIST_ELEMENTS(bm
->bgp
, bgpnode
, nbgpnode
, bgp
)) {
3540 peer
= hash_lookup(bgp
->peerhash
, &tmp_peer
);
3549 struct peer
*peer_create_bind_dynamic_neighbor(struct bgp
*bgp
,
3550 union sockunion
*su
,
3551 struct peer_group
*group
)
3557 /* Create peer first; we've already checked group config is valid. */
3558 peer
= peer_create(su
, NULL
, bgp
, bgp
->as
, group
->conf
->as
,
3559 group
->conf
->as_type
, 0, 0, group
);
3564 peer
= peer_lock(peer
);
3565 listnode_add(group
->peer
, peer
);
3567 peer_group2peer_config_copy(group
, peer
);
3570 * Bind peer for all AFs configured for the group. We don't call
3571 * peer_group_bind as that is sub-optimal and does some stuff we don't
3574 FOREACH_AFI_SAFI (afi
, safi
) {
3575 if (!group
->conf
->afc
[afi
][safi
])
3577 peer
->afc
[afi
][safi
] = 1;
3579 if (!peer_af_find(peer
, afi
, safi
))
3580 peer_af_create(peer
, afi
, safi
);
3582 peer_group2peer_config_copy_af(group
, peer
, afi
, safi
);
3585 /* Mark as dynamic, but also as a "config node" for other things to
3587 SET_FLAG(peer
->flags
, PEER_FLAG_DYNAMIC_NEIGHBOR
);
3588 SET_FLAG(peer
->flags
, PEER_FLAG_CONFIG_NODE
);
3594 peer_group_lookup_dynamic_neighbor_range(struct peer_group
*group
,
3595 struct prefix
*prefix
)
3597 struct listnode
*node
, *nnode
;
3598 struct prefix
*range
;
3601 afi
= family2afi(prefix
->family
);
3603 if (group
->listen_range
[afi
])
3604 for (ALL_LIST_ELEMENTS(group
->listen_range
[afi
], node
, nnode
,
3606 if (prefix_match(range
, prefix
))
3613 peer_group_lookup_dynamic_neighbor(struct bgp
*bgp
, struct prefix
*prefix
,
3614 struct prefix
**listen_range
)
3616 struct prefix
*range
= NULL
;
3617 struct peer_group
*group
= NULL
;
3618 struct listnode
*node
, *nnode
;
3620 *listen_range
= NULL
;
3622 for (ALL_LIST_ELEMENTS(bgp
->group
, node
, nnode
, group
))
3623 if ((range
= peer_group_lookup_dynamic_neighbor_range(
3626 } else if (bm
->bgp
!= NULL
) {
3627 struct listnode
*bgpnode
, *nbgpnode
;
3629 for (ALL_LIST_ELEMENTS(bm
->bgp
, bgpnode
, nbgpnode
, bgp
))
3630 for (ALL_LIST_ELEMENTS(bgp
->group
, node
, nnode
, group
))
3631 if ((range
= peer_group_lookup_dynamic_neighbor_range(
3637 *listen_range
= range
;
3638 return (group
&& range
) ? group
: NULL
;
3641 struct peer
*peer_lookup_dynamic_neighbor(struct bgp
*bgp
, union sockunion
*su
)
3643 struct peer_group
*group
;
3646 struct prefix prefix
;
3647 struct prefix
*listen_range
;
3649 char buf
[PREFIX2STR_BUFFER
];
3650 char buf1
[PREFIX2STR_BUFFER
];
3652 sockunion2hostprefix(su
, &prefix
);
3654 /* See if incoming connection matches a configured listen range. */
3655 group
= peer_group_lookup_dynamic_neighbor(bgp
, &prefix
, &listen_range
);
3666 prefix2str(&prefix
, buf
, sizeof(buf
));
3667 prefix2str(listen_range
, buf1
, sizeof(buf1
));
3669 if (bgp_debug_neighbor_events(NULL
))
3671 "Dynamic Neighbor %s matches group %s listen range %s",
3672 buf
, group
->name
, buf1
);
3674 /* Are we within the listen limit? */
3675 dncount
= gbgp
->dynamic_neighbors_count
;
3677 if (dncount
>= gbgp
->dynamic_neighbors_limit
) {
3678 if (bgp_debug_neighbor_events(NULL
))
3679 zlog_debug("Dynamic Neighbor %s rejected - at limit %d",
3680 inet_sutop(su
, buf
),
3681 gbgp
->dynamic_neighbors_limit
);
3685 /* Ensure group is not disabled. */
3686 if (CHECK_FLAG(group
->conf
->flags
, PEER_FLAG_SHUTDOWN
)) {
3687 if (bgp_debug_neighbor_events(NULL
))
3689 "Dynamic Neighbor %s rejected - group %s disabled",
3694 /* Check that at least one AF is activated for the group. */
3695 if (!peer_group_af_configured(group
)) {
3696 if (bgp_debug_neighbor_events(NULL
))
3698 "Dynamic Neighbor %s rejected - no AF activated for group %s",
3703 /* Create dynamic peer and bind to associated group. */
3704 peer
= peer_create_bind_dynamic_neighbor(gbgp
, su
, group
);
3707 gbgp
->dynamic_neighbors_count
= ++dncount
;
3709 if (bgp_debug_neighbor_events(peer
))
3710 zlog_debug("%s Dynamic Neighbor added, group %s count %d",
3711 peer
->host
, group
->name
, dncount
);
3716 static void peer_drop_dynamic_neighbor(struct peer
*peer
)
3719 if (peer
->group
->bgp
) {
3720 dncount
= peer
->group
->bgp
->dynamic_neighbors_count
;
3722 peer
->group
->bgp
->dynamic_neighbors_count
= --dncount
;
3724 if (bgp_debug_neighbor_events(peer
))
3725 zlog_debug("%s dropped from group %s, count %d", peer
->host
,
3726 peer
->group
->name
, dncount
);
3729 /* If peer is configured at least one address family return 1. */
3730 int peer_active(struct peer
*peer
)
3732 if (BGP_PEER_SU_UNSPEC(peer
))
3734 if (peer
->afc
[AFI_IP
][SAFI_UNICAST
] || peer
->afc
[AFI_IP
][SAFI_MULTICAST
]
3735 || peer
->afc
[AFI_IP
][SAFI_LABELED_UNICAST
]
3736 || peer
->afc
[AFI_IP
][SAFI_MPLS_VPN
] || peer
->afc
[AFI_IP
][SAFI_ENCAP
]
3737 || peer
->afc
[AFI_IP
][SAFI_FLOWSPEC
]
3738 || peer
->afc
[AFI_IP6
][SAFI_UNICAST
]
3739 || peer
->afc
[AFI_IP6
][SAFI_MULTICAST
]
3740 || peer
->afc
[AFI_IP6
][SAFI_LABELED_UNICAST
]
3741 || peer
->afc
[AFI_IP6
][SAFI_MPLS_VPN
]
3742 || peer
->afc
[AFI_IP6
][SAFI_ENCAP
]
3743 || peer
->afc
[AFI_IP6
][SAFI_FLOWSPEC
]
3744 || peer
->afc
[AFI_L2VPN
][SAFI_EVPN
])
3749 /* If peer is negotiated at least one address family return 1. */
3750 int peer_active_nego(struct peer
*peer
)
3752 if (peer
->afc_nego
[AFI_IP
][SAFI_UNICAST
]
3753 || peer
->afc_nego
[AFI_IP
][SAFI_MULTICAST
]
3754 || peer
->afc_nego
[AFI_IP
][SAFI_LABELED_UNICAST
]
3755 || peer
->afc_nego
[AFI_IP
][SAFI_MPLS_VPN
]
3756 || peer
->afc_nego
[AFI_IP
][SAFI_ENCAP
]
3757 || peer
->afc_nego
[AFI_IP
][SAFI_FLOWSPEC
]
3758 || peer
->afc_nego
[AFI_IP6
][SAFI_UNICAST
]
3759 || peer
->afc_nego
[AFI_IP6
][SAFI_MULTICAST
]
3760 || peer
->afc_nego
[AFI_IP6
][SAFI_LABELED_UNICAST
]
3761 || peer
->afc_nego
[AFI_IP6
][SAFI_MPLS_VPN
]
3762 || peer
->afc_nego
[AFI_IP6
][SAFI_ENCAP
]
3763 || peer
->afc_nego
[AFI_IP6
][SAFI_FLOWSPEC
]
3764 || peer
->afc_nego
[AFI_L2VPN
][SAFI_EVPN
])
3769 /* peer_flag_change_type. */
3770 enum peer_change_type
{
3773 peer_change_reset_in
,
3774 peer_change_reset_out
,
3777 static void peer_change_action(struct peer
*peer
, afi_t afi
, safi_t safi
,
3778 enum peer_change_type type
)
3780 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
))
3783 if (peer
->status
!= Established
)
3786 if (type
== peer_change_reset
) {
3787 /* If we're resetting session, we've to delete both peer struct
3789 if ((peer
->doppelganger
)
3790 && (peer
->doppelganger
->status
!= Deleted
)
3791 && (!CHECK_FLAG(peer
->doppelganger
->flags
,
3792 PEER_FLAG_CONFIG_NODE
)))
3793 peer_delete(peer
->doppelganger
);
3795 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
3796 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
3797 } else if (type
== peer_change_reset_in
) {
3798 if (CHECK_FLAG(peer
->cap
, PEER_CAP_REFRESH_OLD_RCV
)
3799 || CHECK_FLAG(peer
->cap
, PEER_CAP_REFRESH_NEW_RCV
))
3800 bgp_route_refresh_send(peer
, afi
, safi
, 0, 0, 0);
3802 if ((peer
->doppelganger
)
3803 && (peer
->doppelganger
->status
!= Deleted
)
3804 && (!CHECK_FLAG(peer
->doppelganger
->flags
,
3805 PEER_FLAG_CONFIG_NODE
)))
3806 peer_delete(peer
->doppelganger
);
3808 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
3809 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
3811 } else if (type
== peer_change_reset_out
) {
3812 update_group_adjust_peer(peer_af_find(peer
, afi
, safi
));
3813 bgp_announce_route(peer
, afi
, safi
);
3817 struct peer_flag_action
{
3821 /* This flag can be set for peer-group member. */
3822 uint8_t not_for_member
;
3824 /* Action when the flag is changed. */
3825 enum peer_change_type type
;
3827 /* Peer down cause */
3831 static const struct peer_flag_action peer_flag_action_list
[] = {
3832 {PEER_FLAG_PASSIVE
, 0, peer_change_reset
},
3833 {PEER_FLAG_SHUTDOWN
, 0, peer_change_reset
},
3834 {PEER_FLAG_DONT_CAPABILITY
, 0, peer_change_none
},
3835 {PEER_FLAG_OVERRIDE_CAPABILITY
, 0, peer_change_none
},
3836 {PEER_FLAG_STRICT_CAP_MATCH
, 0, peer_change_none
},
3837 {PEER_FLAG_DYNAMIC_CAPABILITY
, 0, peer_change_reset
},
3838 {PEER_FLAG_DISABLE_CONNECTED_CHECK
, 0, peer_change_reset
},
3839 {PEER_FLAG_CAPABILITY_ENHE
, 0, peer_change_reset
},
3840 {PEER_FLAG_ENFORCE_FIRST_AS
, 0, peer_change_reset_in
},
3841 {PEER_FLAG_ROUTEADV
, 0, peer_change_none
},
3842 {PEER_FLAG_TIMER
, 0, peer_change_none
},
3843 {PEER_FLAG_TIMER_CONNECT
, 0, peer_change_none
},
3844 {PEER_FLAG_PASSWORD
, 0, peer_change_none
},
3845 {PEER_FLAG_LOCAL_AS
, 0, peer_change_none
},
3846 {PEER_FLAG_LOCAL_AS_NO_PREPEND
, 0, peer_change_none
},
3847 {PEER_FLAG_LOCAL_AS_REPLACE_AS
, 0, peer_change_none
},
3848 {PEER_FLAG_UPDATE_SOURCE
, 0, peer_change_none
},
3851 static const struct peer_flag_action peer_af_flag_action_list
[] = {
3852 {PEER_FLAG_SEND_COMMUNITY
, 1, peer_change_reset_out
},
3853 {PEER_FLAG_SEND_EXT_COMMUNITY
, 1, peer_change_reset_out
},
3854 {PEER_FLAG_SEND_LARGE_COMMUNITY
, 1, peer_change_reset_out
},
3855 {PEER_FLAG_NEXTHOP_SELF
, 1, peer_change_reset_out
},
3856 {PEER_FLAG_REFLECTOR_CLIENT
, 1, peer_change_reset
},
3857 {PEER_FLAG_RSERVER_CLIENT
, 1, peer_change_reset
},
3858 {PEER_FLAG_SOFT_RECONFIG
, 0, peer_change_reset_in
},
3859 {PEER_FLAG_AS_PATH_UNCHANGED
, 1, peer_change_reset_out
},
3860 {PEER_FLAG_NEXTHOP_UNCHANGED
, 1, peer_change_reset_out
},
3861 {PEER_FLAG_MED_UNCHANGED
, 1, peer_change_reset_out
},
3862 {PEER_FLAG_DEFAULT_ORIGINATE
, 0, peer_change_none
},
3863 {PEER_FLAG_REMOVE_PRIVATE_AS
, 1, peer_change_reset_out
},
3864 {PEER_FLAG_ALLOWAS_IN
, 0, peer_change_reset_in
},
3865 {PEER_FLAG_ALLOWAS_IN_ORIGIN
, 0, peer_change_reset_in
},
3866 {PEER_FLAG_ORF_PREFIX_SM
, 1, peer_change_reset
},
3867 {PEER_FLAG_ORF_PREFIX_RM
, 1, peer_change_reset
},
3868 {PEER_FLAG_MAX_PREFIX
, 0, peer_change_none
},
3869 {PEER_FLAG_MAX_PREFIX_WARNING
, 0, peer_change_none
},
3870 {PEER_FLAG_NEXTHOP_LOCAL_UNCHANGED
, 0, peer_change_reset_out
},
3871 {PEER_FLAG_FORCE_NEXTHOP_SELF
, 1, peer_change_reset_out
},
3872 {PEER_FLAG_REMOVE_PRIVATE_AS_ALL
, 1, peer_change_reset_out
},
3873 {PEER_FLAG_REMOVE_PRIVATE_AS_REPLACE
, 1, peer_change_reset_out
},
3874 {PEER_FLAG_AS_OVERRIDE
, 1, peer_change_reset_out
},
3875 {PEER_FLAG_REMOVE_PRIVATE_AS_ALL_REPLACE
, 1, peer_change_reset_out
},
3876 {PEER_FLAG_ADDPATH_TX_ALL_PATHS
, 1, peer_change_reset
},
3877 {PEER_FLAG_ADDPATH_TX_BESTPATH_PER_AS
, 1, peer_change_reset
},
3878 {PEER_FLAG_WEIGHT
, 0, peer_change_reset_in
},
3881 /* Proper action set. */
3882 static int peer_flag_action_set(const struct peer_flag_action
*action_list
,
3883 int size
, struct peer_flag_action
*action
,
3890 const struct peer_flag_action
*match
= NULL
;
3892 /* Check peer's frag action. */
3893 for (i
= 0; i
< size
; i
++) {
3894 match
= &action_list
[i
];
3896 if (match
->flag
== 0)
3899 if (match
->flag
& flag
) {
3902 if (match
->type
== peer_change_reset_in
)
3904 if (match
->type
== peer_change_reset_out
)
3906 if (match
->type
== peer_change_reset
) {
3910 if (match
->not_for_member
)
3911 action
->not_for_member
= 1;
3915 /* Set peer clear type. */
3916 if (reset_in
&& reset_out
)
3917 action
->type
= peer_change_reset
;
3919 action
->type
= peer_change_reset_in
;
3921 action
->type
= peer_change_reset_out
;
3923 action
->type
= peer_change_none
;
3928 static void peer_flag_modify_action(struct peer
*peer
, uint32_t flag
)
3930 if (flag
== PEER_FLAG_SHUTDOWN
) {
3931 if (CHECK_FLAG(peer
->flags
, flag
)) {
3932 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_NSF_WAIT
))
3933 peer_nsf_stop(peer
);
3935 UNSET_FLAG(peer
->sflags
, PEER_STATUS_PREFIX_OVERFLOW
);
3936 if (peer
->t_pmax_restart
) {
3937 BGP_TIMER_OFF(peer
->t_pmax_restart
);
3938 if (bgp_debug_neighbor_events(peer
))
3940 "%s Maximum-prefix restart timer canceled",
3944 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_NSF_WAIT
))
3945 peer_nsf_stop(peer
);
3947 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
3948 char *msg
= peer
->tx_shutdown_message
;
3951 if (!msg
&& peer_group_active(peer
))
3952 msg
= peer
->group
->conf
3953 ->tx_shutdown_message
;
3954 msglen
= msg
? strlen(msg
) : 0;
3959 uint8_t msgbuf
[129];
3962 memcpy(msgbuf
+ 1, msg
, msglen
);
3964 bgp_notify_send_with_data(
3965 peer
, BGP_NOTIFY_CEASE
,
3966 BGP_NOTIFY_CEASE_ADMIN_SHUTDOWN
,
3967 msgbuf
, msglen
+ 1);
3970 peer
, BGP_NOTIFY_CEASE
,
3971 BGP_NOTIFY_CEASE_ADMIN_SHUTDOWN
);
3973 bgp_session_reset(peer
);
3975 peer
->v_start
= BGP_INIT_START_TIMER
;
3976 BGP_EVENT_ADD(peer
, BGP_Stop
);
3978 } else if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
3979 if (flag
== PEER_FLAG_DYNAMIC_CAPABILITY
)
3980 peer
->last_reset
= PEER_DOWN_CAPABILITY_CHANGE
;
3981 else if (flag
== PEER_FLAG_PASSIVE
)
3982 peer
->last_reset
= PEER_DOWN_PASSIVE_CHANGE
;
3983 else if (flag
== PEER_FLAG_DISABLE_CONNECTED_CHECK
)
3984 peer
->last_reset
= PEER_DOWN_MULTIHOP_CHANGE
;
3986 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
3987 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
3989 bgp_session_reset(peer
);
3992 /* Change specified peer flag. */
3993 static int peer_flag_modify(struct peer
*peer
, uint32_t flag
, int set
)
3997 bool invert
, member_invert
;
3998 struct peer
*member
;
3999 struct listnode
*node
, *nnode
;
4000 struct peer_flag_action action
;
4002 memset(&action
, 0, sizeof(struct peer_flag_action
));
4003 size
= sizeof peer_flag_action_list
/ sizeof(struct peer_flag_action
);
4005 invert
= CHECK_FLAG(peer
->flags_invert
, flag
);
4006 found
= peer_flag_action_set(peer_flag_action_list
, size
, &action
,
4009 /* Abort if no flag action exists. */
4011 return BGP_ERR_INVALID_FLAG
;
4013 /* Check for flag conflict: STRICT_CAP_MATCH && OVERRIDE_CAPABILITY */
4014 if (set
&& CHECK_FLAG(peer
->flags
| flag
, PEER_FLAG_STRICT_CAP_MATCH
)
4015 && CHECK_FLAG(peer
->flags
| flag
, PEER_FLAG_OVERRIDE_CAPABILITY
))
4016 return BGP_ERR_PEER_FLAG_CONFLICT
;
4018 /* Handle flag updates where desired state matches current state. */
4019 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4020 if (set
&& CHECK_FLAG(peer
->flags
, flag
)) {
4021 COND_FLAG(peer
->flags_override
, flag
, !invert
);
4025 if (!set
&& !CHECK_FLAG(peer
->flags
, flag
)) {
4026 COND_FLAG(peer
->flags_override
, flag
, invert
);
4031 /* Inherit from peer-group or set/unset flags accordingly. */
4032 if (peer_group_active(peer
) && set
== invert
)
4033 peer_flag_inherit(peer
, flag
);
4035 COND_FLAG(peer
->flags
, flag
, set
);
4037 /* Check if handling a regular peer. */
4038 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4039 /* Update flag override state accordingly. */
4040 COND_FLAG(peer
->flags_override
, flag
, set
!= invert
);
4042 /* Execute flag action on peer. */
4043 if (action
.type
== peer_change_reset
)
4044 peer_flag_modify_action(peer
, flag
);
4046 /* Skip peer-group mechanics for regular peers. */
4051 * Update peer-group members, unless they are explicitely overriding
4052 * peer-group configuration.
4054 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
4055 /* Skip peers with overridden configuration. */
4056 if (CHECK_FLAG(member
->flags_override
, flag
))
4059 /* Check if only member without group is inverted. */
4061 CHECK_FLAG(member
->flags_invert
, flag
) && !invert
;
4063 /* Skip peers with equivalent configuration. */
4064 if (set
!= member_invert
&& CHECK_FLAG(member
->flags
, flag
))
4067 if (set
== member_invert
&& !CHECK_FLAG(member
->flags
, flag
))
4070 /* Update flag on peer-group member. */
4071 COND_FLAG(member
->flags
, flag
, set
!= member_invert
);
4073 /* Execute flag action on peer-group member. */
4074 if (action
.type
== peer_change_reset
)
4075 peer_flag_modify_action(member
, flag
);
4081 int peer_flag_set(struct peer
*peer
, uint32_t flag
)
4083 return peer_flag_modify(peer
, flag
, 1);
4086 int peer_flag_unset(struct peer
*peer
, uint32_t flag
)
4088 return peer_flag_modify(peer
, flag
, 0);
4091 static int peer_af_flag_modify(struct peer
*peer
, afi_t afi
, safi_t safi
,
4092 uint32_t flag
, bool set
)
4096 int addpath_tx_used
;
4097 bool invert
, member_invert
;
4099 struct peer
*member
;
4100 struct listnode
*node
, *nnode
;
4101 struct peer_flag_action action
;
4103 memset(&action
, 0, sizeof(struct peer_flag_action
));
4104 size
= sizeof peer_af_flag_action_list
4105 / sizeof(struct peer_flag_action
);
4107 invert
= CHECK_FLAG(peer
->af_flags_invert
[afi
][safi
], flag
);
4108 found
= peer_flag_action_set(peer_af_flag_action_list
, size
, &action
,
4111 /* Abort if flag action exists. */
4113 return BGP_ERR_INVALID_FLAG
;
4115 /* Special check for reflector client. */
4116 if (flag
& PEER_FLAG_REFLECTOR_CLIENT
4117 && peer_sort(peer
) != BGP_PEER_IBGP
)
4118 return BGP_ERR_NOT_INTERNAL_PEER
;
4120 /* Special check for remove-private-AS. */
4121 if (flag
& PEER_FLAG_REMOVE_PRIVATE_AS
4122 && peer_sort(peer
) == BGP_PEER_IBGP
)
4123 return BGP_ERR_REMOVE_PRIVATE_AS
;
4125 /* as-override is not allowed for IBGP peers */
4126 if (flag
& PEER_FLAG_AS_OVERRIDE
&& peer_sort(peer
) == BGP_PEER_IBGP
)
4127 return BGP_ERR_AS_OVERRIDE
;
4129 /* Handle flag updates where desired state matches current state. */
4130 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4131 if (set
&& CHECK_FLAG(peer
->af_flags
[afi
][safi
], flag
)) {
4132 COND_FLAG(peer
->af_flags_override
[afi
][safi
], flag
,
4137 if (!set
&& !CHECK_FLAG(peer
->af_flags
[afi
][safi
], flag
)) {
4138 COND_FLAG(peer
->af_flags_override
[afi
][safi
], flag
,
4145 * For EVPN we implicitly set the NEXTHOP_UNCHANGED flag,
4146 * if we are setting/unsetting flags which conflict with this flag
4147 * handle accordingly
4149 if (afi
== AFI_L2VPN
&& safi
== SAFI_EVPN
) {
4153 * if we are setting NEXTHOP_SELF, we need to unset the
4154 * NEXTHOP_UNCHANGED flag
4156 if (CHECK_FLAG(flag
, PEER_FLAG_NEXTHOP_SELF
) ||
4157 CHECK_FLAG(flag
, PEER_FLAG_FORCE_NEXTHOP_SELF
))
4158 UNSET_FLAG(peer
->af_flags
[afi
][safi
],
4159 PEER_FLAG_NEXTHOP_UNCHANGED
);
4163 * if we are unsetting NEXTHOP_SELF, we need to set the
4164 * NEXTHOP_UNCHANGED flag to reset the defaults for EVPN
4166 if (CHECK_FLAG(flag
, PEER_FLAG_NEXTHOP_SELF
) ||
4167 CHECK_FLAG(flag
, PEER_FLAG_FORCE_NEXTHOP_SELF
))
4168 SET_FLAG(peer
->af_flags
[afi
][safi
],
4169 PEER_FLAG_NEXTHOP_UNCHANGED
);
4173 /* Inherit from peer-group or set/unset flags accordingly. */
4174 if (peer_group_active(peer
) && set
== invert
)
4175 peer_af_flag_inherit(peer
, afi
, safi
, flag
);
4177 COND_FLAG(peer
->af_flags
[afi
][safi
], flag
, set
);
4179 /* Execute action when peer is established. */
4180 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)
4181 && peer
->status
== Established
) {
4182 if (!set
&& flag
== PEER_FLAG_SOFT_RECONFIG
)
4183 bgp_clear_adj_in(peer
, afi
, safi
);
4185 if (flag
== PEER_FLAG_REFLECTOR_CLIENT
)
4186 peer
->last_reset
= PEER_DOWN_RR_CLIENT_CHANGE
;
4187 else if (flag
== PEER_FLAG_RSERVER_CLIENT
)
4188 peer
->last_reset
= PEER_DOWN_RS_CLIENT_CHANGE
;
4189 else if (flag
== PEER_FLAG_ORF_PREFIX_SM
)
4190 peer
->last_reset
= PEER_DOWN_CAPABILITY_CHANGE
;
4191 else if (flag
== PEER_FLAG_ORF_PREFIX_RM
)
4192 peer
->last_reset
= PEER_DOWN_CAPABILITY_CHANGE
;
4194 peer_change_action(peer
, afi
, safi
, action
.type
);
4198 /* Check if handling a regular peer. */
4199 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4200 COND_FLAG(peer
->af_flags_override
[afi
][safi
], flag
,
4204 * Update peer-group members, unless they are explicitely
4205 * overriding peer-group configuration.
4207 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
,
4209 /* Skip peers with overridden configuration. */
4210 if (CHECK_FLAG(member
->af_flags_override
[afi
][safi
],
4214 /* Check if only member without group is inverted. */
4216 CHECK_FLAG(member
->af_flags_invert
[afi
][safi
],
4220 /* Skip peers with equivalent configuration. */
4221 if (set
!= member_invert
4222 && CHECK_FLAG(member
->af_flags
[afi
][safi
], flag
))
4225 if (set
== member_invert
4226 && !CHECK_FLAG(member
->af_flags
[afi
][safi
], flag
))
4229 /* Update flag on peer-group member. */
4230 COND_FLAG(member
->af_flags
[afi
][safi
], flag
,
4231 set
!= member_invert
);
4233 /* Execute flag action on peer-group member. */
4234 if (member
->status
== Established
) {
4235 if (!set
&& flag
== PEER_FLAG_SOFT_RECONFIG
)
4236 bgp_clear_adj_in(member
, afi
, safi
);
4238 if (flag
== PEER_FLAG_REFLECTOR_CLIENT
)
4239 member
->last_reset
=
4240 PEER_DOWN_RR_CLIENT_CHANGE
;
4242 == PEER_FLAG_RSERVER_CLIENT
)
4243 member
->last_reset
=
4244 PEER_DOWN_RS_CLIENT_CHANGE
;
4246 == PEER_FLAG_ORF_PREFIX_SM
)
4247 member
->last_reset
=
4248 PEER_DOWN_CAPABILITY_CHANGE
;
4250 == PEER_FLAG_ORF_PREFIX_RM
)
4251 member
->last_reset
=
4252 PEER_DOWN_CAPABILITY_CHANGE
;
4254 peer_change_action(member
, afi
, safi
,
4261 /* Track if addpath TX is in use */
4262 if (flag
& (PEER_FLAG_ADDPATH_TX_ALL_PATHS
4263 | PEER_FLAG_ADDPATH_TX_BESTPATH_PER_AS
)) {
4265 addpath_tx_used
= 0;
4268 addpath_tx_used
= 1;
4270 if (flag
& PEER_FLAG_ADDPATH_TX_BESTPATH_PER_AS
) {
4271 if (!bgp_flag_check(
4272 bgp
, BGP_FLAG_DETERMINISTIC_MED
)) {
4274 "%s: enabling bgp deterministic-med, this is required"
4275 " for addpath-tx-bestpath-per-AS",
4279 BGP_FLAG_DETERMINISTIC_MED
);
4280 bgp_recalculate_all_bestpaths(bgp
);
4284 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
,
4286 if (CHECK_FLAG(member
->af_flags
[afi
][safi
],
4287 PEER_FLAG_ADDPATH_TX_ALL_PATHS
)
4289 member
->af_flags
[afi
][safi
],
4290 PEER_FLAG_ADDPATH_TX_BESTPATH_PER_AS
)) {
4291 addpath_tx_used
= 1;
4297 bgp
->addpath_tx_used
[afi
][safi
] = addpath_tx_used
;
4303 int peer_af_flag_set(struct peer
*peer
, afi_t afi
, safi_t safi
, uint32_t flag
)
4305 return peer_af_flag_modify(peer
, afi
, safi
, flag
, 1);
4308 int peer_af_flag_unset(struct peer
*peer
, afi_t afi
, safi_t safi
, uint32_t flag
)
4310 return peer_af_flag_modify(peer
, afi
, safi
, flag
, 0);
4314 int peer_tx_shutdown_message_set(struct peer
*peer
, const char *msg
)
4316 XFREE(MTYPE_PEER_TX_SHUTDOWN_MSG
, peer
->tx_shutdown_message
);
4317 peer
->tx_shutdown_message
=
4318 msg
? XSTRDUP(MTYPE_PEER_TX_SHUTDOWN_MSG
, msg
) : NULL
;
4322 int peer_tx_shutdown_message_unset(struct peer
*peer
)
4324 XFREE(MTYPE_PEER_TX_SHUTDOWN_MSG
, peer
->tx_shutdown_message
);
4329 /* EBGP multihop configuration. */
4330 int peer_ebgp_multihop_set(struct peer
*peer
, int ttl
)
4332 struct peer_group
*group
;
4333 struct listnode
*node
, *nnode
;
4336 if (peer
->sort
== BGP_PEER_IBGP
|| peer
->conf_if
)
4339 /* see comment in peer_ttl_security_hops_set() */
4340 if (ttl
!= MAXTTL
) {
4341 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4342 group
= peer
->group
;
4343 if (group
->conf
->gtsm_hops
!= 0)
4344 return BGP_ERR_NO_EBGP_MULTIHOP_WITH_TTLHACK
;
4346 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
,
4348 if (peer1
->sort
== BGP_PEER_IBGP
)
4351 if (peer1
->gtsm_hops
!= 0)
4352 return BGP_ERR_NO_EBGP_MULTIHOP_WITH_TTLHACK
;
4355 if (peer
->gtsm_hops
!= 0)
4356 return BGP_ERR_NO_EBGP_MULTIHOP_WITH_TTLHACK
;
4362 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4363 if (peer
->fd
>= 0 && peer
->sort
!= BGP_PEER_IBGP
) {
4364 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
))
4365 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
4366 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4368 bgp_session_reset(peer
);
4371 group
= peer
->group
;
4372 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, peer
)) {
4373 if (peer
->sort
== BGP_PEER_IBGP
)
4376 peer
->ttl
= group
->conf
->ttl
;
4378 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
))
4379 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
4380 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4382 bgp_session_reset(peer
);
4388 int peer_ebgp_multihop_unset(struct peer
*peer
)
4390 struct peer_group
*group
;
4391 struct listnode
*node
, *nnode
;
4393 if (peer
->sort
== BGP_PEER_IBGP
)
4396 if (peer
->gtsm_hops
!= 0 && peer
->ttl
!= MAXTTL
)
4397 return BGP_ERR_NO_EBGP_MULTIHOP_WITH_TTLHACK
;
4399 if (peer_group_active(peer
))
4400 peer
->ttl
= peer
->group
->conf
->ttl
;
4404 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4405 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
))
4406 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
4407 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4409 bgp_session_reset(peer
);
4411 group
= peer
->group
;
4412 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, peer
)) {
4413 if (peer
->sort
== BGP_PEER_IBGP
)
4418 if (peer
->fd
>= 0) {
4419 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
))
4421 peer
, BGP_NOTIFY_CEASE
,
4422 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4424 bgp_session_reset(peer
);
4431 /* Neighbor description. */
4432 int peer_description_set(struct peer
*peer
, const char *desc
)
4435 XFREE(MTYPE_PEER_DESC
, peer
->desc
);
4437 peer
->desc
= XSTRDUP(MTYPE_PEER_DESC
, desc
);
4442 int peer_description_unset(struct peer
*peer
)
4445 XFREE(MTYPE_PEER_DESC
, peer
->desc
);
4452 /* Neighbor update-source. */
4453 int peer_update_source_if_set(struct peer
*peer
, const char *ifname
)
4455 struct peer
*member
;
4456 struct listnode
*node
, *nnode
;
4458 /* Set flag and configuration on peer. */
4459 peer_flag_set(peer
, PEER_FLAG_UPDATE_SOURCE
);
4460 if (peer
->update_if
) {
4461 if (strcmp(peer
->update_if
, ifname
) == 0)
4463 XFREE(MTYPE_PEER_UPDATE_SOURCE
, peer
->update_if
);
4465 peer
->update_if
= XSTRDUP(MTYPE_PEER_UPDATE_SOURCE
, ifname
);
4466 sockunion_free(peer
->update_source
);
4467 peer
->update_source
= NULL
;
4469 /* Check if handling a regular peer. */
4470 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4471 /* Send notification or reset peer depending on state. */
4472 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
4473 peer
->last_reset
= PEER_DOWN_UPDATE_SOURCE_CHANGE
;
4474 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
4475 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4477 bgp_session_reset(peer
);
4479 /* Skip peer-group mechanics for regular peers. */
4484 * Set flag and configuration on all peer-group members, unless they are
4485 * explicitely overriding peer-group configuration.
4487 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
4488 /* Skip peers with overridden configuration. */
4489 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_UPDATE_SOURCE
))
4492 /* Skip peers with the same configuration. */
4493 if (member
->update_if
) {
4494 if (strcmp(member
->update_if
, ifname
) == 0)
4496 XFREE(MTYPE_PEER_UPDATE_SOURCE
, member
->update_if
);
4499 /* Set flag and configuration on peer-group member. */
4500 SET_FLAG(member
->flags
, PEER_FLAG_UPDATE_SOURCE
);
4501 member
->update_if
= XSTRDUP(MTYPE_PEER_UPDATE_SOURCE
, ifname
);
4502 sockunion_free(member
->update_source
);
4503 member
->update_source
= NULL
;
4505 /* Send notification or reset peer depending on state. */
4506 if (BGP_IS_VALID_STATE_FOR_NOTIF(member
->status
)) {
4507 member
->last_reset
= PEER_DOWN_UPDATE_SOURCE_CHANGE
;
4508 bgp_notify_send(member
, BGP_NOTIFY_CEASE
,
4509 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4511 bgp_session_reset(member
);
4517 int peer_update_source_addr_set(struct peer
*peer
, const union sockunion
*su
)
4519 struct peer
*member
;
4520 struct listnode
*node
, *nnode
;
4522 /* Set flag and configuration on peer. */
4523 peer_flag_set(peer
, PEER_FLAG_UPDATE_SOURCE
);
4524 if (peer
->update_source
) {
4525 if (sockunion_cmp(peer
->update_source
, su
) == 0)
4527 sockunion_free(peer
->update_source
);
4529 peer
->update_source
= sockunion_dup(su
);
4530 XFREE(MTYPE_PEER_UPDATE_SOURCE
, peer
->update_if
);
4532 /* Check if handling a regular peer. */
4533 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4534 /* Send notification or reset peer depending on state. */
4535 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
4536 peer
->last_reset
= PEER_DOWN_UPDATE_SOURCE_CHANGE
;
4537 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
4538 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4540 bgp_session_reset(peer
);
4542 /* Skip peer-group mechanics for regular peers. */
4547 * Set flag and configuration on all peer-group members, unless they are
4548 * explicitely overriding peer-group configuration.
4550 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
4551 /* Skip peers with overridden configuration. */
4552 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_UPDATE_SOURCE
))
4555 /* Skip peers with the same configuration. */
4556 if (member
->update_source
) {
4557 if (sockunion_cmp(member
->update_source
, su
) == 0)
4559 sockunion_free(member
->update_source
);
4562 /* Set flag and configuration on peer-group member. */
4563 SET_FLAG(member
->flags
, PEER_FLAG_UPDATE_SOURCE
);
4564 member
->update_source
= sockunion_dup(su
);
4565 XFREE(MTYPE_PEER_UPDATE_SOURCE
, member
->update_if
);
4567 /* Send notification or reset peer depending on state. */
4568 if (BGP_IS_VALID_STATE_FOR_NOTIF(member
->status
)) {
4569 member
->last_reset
= PEER_DOWN_UPDATE_SOURCE_CHANGE
;
4570 bgp_notify_send(member
, BGP_NOTIFY_CEASE
,
4571 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4573 bgp_session_reset(member
);
4579 int peer_update_source_unset(struct peer
*peer
)
4581 struct peer
*member
;
4582 struct listnode
*node
, *nnode
;
4584 if (!CHECK_FLAG(peer
->flags
, PEER_FLAG_UPDATE_SOURCE
))
4587 /* Inherit configuration from peer-group if peer is member. */
4588 if (peer_group_active(peer
)) {
4589 peer_flag_inherit(peer
, PEER_FLAG_UPDATE_SOURCE
);
4590 PEER_SU_ATTR_INHERIT(peer
, peer
->group
, update_source
);
4591 PEER_STR_ATTR_INHERIT(peer
, peer
->group
, update_if
,
4592 MTYPE_PEER_UPDATE_SOURCE
);
4594 /* Otherwise remove flag and configuration from peer. */
4595 peer_flag_unset(peer
, PEER_FLAG_UPDATE_SOURCE
);
4596 sockunion_free(peer
->update_source
);
4597 peer
->update_source
= NULL
;
4598 XFREE(MTYPE_PEER_UPDATE_SOURCE
, peer
->update_if
);
4601 /* Check if handling a regular peer. */
4602 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4603 /* Send notification or reset peer depending on state. */
4604 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
4605 peer
->last_reset
= PEER_DOWN_UPDATE_SOURCE_CHANGE
;
4606 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
4607 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4609 bgp_session_reset(peer
);
4611 /* Skip peer-group mechanics for regular peers. */
4616 * Set flag and configuration on all peer-group members, unless they are
4617 * explicitely overriding peer-group configuration.
4619 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
4620 /* Skip peers with overridden configuration. */
4621 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_UPDATE_SOURCE
))
4624 /* Skip peers with the same configuration. */
4625 if (!CHECK_FLAG(member
->flags
, PEER_FLAG_UPDATE_SOURCE
)
4626 && !member
->update_source
&& !member
->update_if
)
4629 /* Remove flag and configuration on peer-group member. */
4630 UNSET_FLAG(member
->flags
, PEER_FLAG_UPDATE_SOURCE
);
4631 sockunion_free(member
->update_source
);
4632 member
->update_source
= NULL
;
4633 XFREE(MTYPE_PEER_UPDATE_SOURCE
, member
->update_if
);
4635 /* Send notification or reset peer depending on state. */
4636 if (BGP_IS_VALID_STATE_FOR_NOTIF(member
->status
)) {
4637 member
->last_reset
= PEER_DOWN_UPDATE_SOURCE_CHANGE
;
4638 bgp_notify_send(member
, BGP_NOTIFY_CEASE
,
4639 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4641 bgp_session_reset(member
);
4647 int peer_default_originate_set(struct peer
*peer
, afi_t afi
, safi_t safi
,
4650 struct peer
*member
;
4651 struct listnode
*node
, *nnode
;
4653 /* Set flag and configuration on peer. */
4654 peer_af_flag_set(peer
, afi
, safi
, PEER_FLAG_DEFAULT_ORIGINATE
);
4656 if (!peer
->default_rmap
[afi
][safi
].name
4657 || strcmp(rmap
, peer
->default_rmap
[afi
][safi
].name
) != 0) {
4658 if (peer
->default_rmap
[afi
][safi
].name
)
4659 XFREE(MTYPE_ROUTE_MAP_NAME
,
4660 peer
->default_rmap
[afi
][safi
].name
);
4662 peer
->default_rmap
[afi
][safi
].name
=
4663 XSTRDUP(MTYPE_ROUTE_MAP_NAME
, rmap
);
4664 peer
->default_rmap
[afi
][safi
].map
=
4665 route_map_lookup_by_name(rmap
);
4668 if (peer
->default_rmap
[afi
][safi
].name
)
4669 XFREE(MTYPE_ROUTE_MAP_NAME
,
4670 peer
->default_rmap
[afi
][safi
].name
);
4672 peer
->default_rmap
[afi
][safi
].name
= NULL
;
4673 peer
->default_rmap
[afi
][safi
].map
= NULL
;
4676 /* Check if handling a regular peer. */
4677 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4678 /* Update peer route announcements. */
4679 if (peer
->status
== Established
&& peer
->afc_nego
[afi
][safi
]) {
4680 update_group_adjust_peer(peer_af_find(peer
, afi
, safi
));
4681 bgp_default_originate(peer
, afi
, safi
, 0);
4682 bgp_announce_route(peer
, afi
, safi
);
4685 /* Skip peer-group mechanics for regular peers. */
4690 * Set flag and configuration on all peer-group members, unless they are
4691 * explicitely overriding peer-group configuration.
4693 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
4694 /* Skip peers with overridden configuration. */
4695 if (CHECK_FLAG(member
->af_flags_override
[afi
][safi
],
4696 PEER_FLAG_DEFAULT_ORIGINATE
))
4699 /* Set flag and configuration on peer-group member. */
4700 SET_FLAG(member
->af_flags
[afi
][safi
],
4701 PEER_FLAG_DEFAULT_ORIGINATE
);
4703 if (member
->default_rmap
[afi
][safi
].name
)
4704 XFREE(MTYPE_ROUTE_MAP_NAME
,
4705 member
->default_rmap
[afi
][safi
].name
);
4707 member
->default_rmap
[afi
][safi
].name
=
4708 XSTRDUP(MTYPE_ROUTE_MAP_NAME
, rmap
);
4709 member
->default_rmap
[afi
][safi
].map
=
4710 route_map_lookup_by_name(rmap
);
4713 /* Update peer route announcements. */
4714 if (member
->status
== Established
4715 && member
->afc_nego
[afi
][safi
]) {
4716 update_group_adjust_peer(
4717 peer_af_find(member
, afi
, safi
));
4718 bgp_default_originate(member
, afi
, safi
, 0);
4719 bgp_announce_route(member
, afi
, safi
);
4726 int peer_default_originate_unset(struct peer
*peer
, afi_t afi
, safi_t safi
)
4728 struct peer
*member
;
4729 struct listnode
*node
, *nnode
;
4731 /* Inherit configuration from peer-group if peer is member. */
4732 if (peer_group_active(peer
)) {
4733 peer_af_flag_inherit(peer
, afi
, safi
,
4734 PEER_FLAG_DEFAULT_ORIGINATE
);
4735 PEER_STR_ATTR_INHERIT(peer
, peer
->group
,
4736 default_rmap
[afi
][safi
].name
,
4737 MTYPE_ROUTE_MAP_NAME
);
4738 PEER_ATTR_INHERIT(peer
, peer
->group
,
4739 default_rmap
[afi
][safi
].map
);
4741 /* Otherwise remove flag and configuration from peer. */
4742 peer_af_flag_unset(peer
, afi
, safi
,
4743 PEER_FLAG_DEFAULT_ORIGINATE
);
4744 if (peer
->default_rmap
[afi
][safi
].name
)
4745 XFREE(MTYPE_ROUTE_MAP_NAME
,
4746 peer
->default_rmap
[afi
][safi
].name
);
4747 peer
->default_rmap
[afi
][safi
].name
= NULL
;
4748 peer
->default_rmap
[afi
][safi
].map
= NULL
;
4751 /* Check if handling a regular peer. */
4752 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4753 /* Update peer route announcements. */
4754 if (peer
->status
== Established
&& peer
->afc_nego
[afi
][safi
]) {
4755 update_group_adjust_peer(peer_af_find(peer
, afi
, safi
));
4756 bgp_default_originate(peer
, afi
, safi
, 1);
4757 bgp_announce_route(peer
, afi
, safi
);
4760 /* Skip peer-group mechanics for regular peers. */
4765 * Remove flag and configuration from all peer-group members, unless
4766 * they are explicitely overriding peer-group configuration.
4768 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
4769 /* Skip peers with overridden configuration. */
4770 if (CHECK_FLAG(member
->af_flags_override
[afi
][safi
],
4771 PEER_FLAG_DEFAULT_ORIGINATE
))
4774 /* Remove flag and configuration on peer-group member. */
4775 UNSET_FLAG(peer
->af_flags
[afi
][safi
],
4776 PEER_FLAG_DEFAULT_ORIGINATE
);
4777 if (peer
->default_rmap
[afi
][safi
].name
)
4778 XFREE(MTYPE_ROUTE_MAP_NAME
,
4779 peer
->default_rmap
[afi
][safi
].name
);
4780 peer
->default_rmap
[afi
][safi
].name
= NULL
;
4781 peer
->default_rmap
[afi
][safi
].map
= NULL
;
4783 /* Update peer route announcements. */
4784 if (peer
->status
== Established
&& peer
->afc_nego
[afi
][safi
]) {
4785 update_group_adjust_peer(peer_af_find(peer
, afi
, safi
));
4786 bgp_default_originate(peer
, afi
, safi
, 1);
4787 bgp_announce_route(peer
, afi
, safi
);
4794 int peer_port_set(struct peer
*peer
, uint16_t port
)
4800 int peer_port_unset(struct peer
*peer
)
4802 peer
->port
= BGP_PORT_DEFAULT
;
4807 * Helper function that is called after the name of the policy
4808 * being used by a peer has changed (AF specific). Automatically
4809 * initiates inbound or outbound processing as needed.
4811 static void peer_on_policy_change(struct peer
*peer
, afi_t afi
, safi_t safi
,
4815 update_group_adjust_peer(peer_af_find(peer
, afi
, safi
));
4816 if (peer
->status
== Established
)
4817 bgp_announce_route(peer
, afi
, safi
);
4819 if (peer
->status
!= Established
)
4822 if (CHECK_FLAG(peer
->af_flags
[afi
][safi
],
4823 PEER_FLAG_SOFT_RECONFIG
))
4824 bgp_soft_reconfig_in(peer
, afi
, safi
);
4825 else if (CHECK_FLAG(peer
->cap
, PEER_CAP_REFRESH_OLD_RCV
)
4826 || CHECK_FLAG(peer
->cap
, PEER_CAP_REFRESH_NEW_RCV
))
4827 bgp_route_refresh_send(peer
, afi
, safi
, 0, 0, 0);
4832 /* neighbor weight. */
4833 int peer_weight_set(struct peer
*peer
, afi_t afi
, safi_t safi
, uint16_t weight
)
4835 struct peer
*member
;
4836 struct listnode
*node
, *nnode
;
4838 /* Set flag and configuration on peer. */
4839 peer_af_flag_set(peer
, afi
, safi
, PEER_FLAG_WEIGHT
);
4840 if (peer
->weight
[afi
][safi
] != weight
) {
4841 peer
->weight
[afi
][safi
] = weight
;
4842 peer_on_policy_change(peer
, afi
, safi
, 0);
4845 /* Skip peer-group mechanics for regular peers. */
4846 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
))
4850 * Set flag and configuration on all peer-group members, unless they are
4851 * explicitely overriding peer-group configuration.
4853 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
4854 /* Skip peers with overridden configuration. */
4855 if (CHECK_FLAG(member
->af_flags_override
[afi
][safi
],
4859 /* Set flag and configuration on peer-group member. */
4860 SET_FLAG(member
->af_flags
[afi
][safi
], PEER_FLAG_WEIGHT
);
4861 if (member
->weight
[afi
][safi
] != weight
) {
4862 member
->weight
[afi
][safi
] = weight
;
4863 peer_on_policy_change(member
, afi
, safi
, 0);
4870 int peer_weight_unset(struct peer
*peer
, afi_t afi
, safi_t safi
)
4872 struct peer
*member
;
4873 struct listnode
*node
, *nnode
;
4875 if (!CHECK_FLAG(peer
->af_flags
[afi
][safi
], PEER_FLAG_WEIGHT
))
4878 /* Inherit configuration from peer-group if peer is member. */
4879 if (peer_group_active(peer
)) {
4880 peer_af_flag_inherit(peer
, afi
, safi
, PEER_FLAG_WEIGHT
);
4881 PEER_ATTR_INHERIT(peer
, peer
->group
, weight
[afi
][safi
]);
4883 peer_on_policy_change(peer
, afi
, safi
, 0);
4887 /* Remove flag and configuration from peer. */
4888 peer_af_flag_unset(peer
, afi
, safi
, PEER_FLAG_WEIGHT
);
4889 peer
->weight
[afi
][safi
] = 0;
4890 peer_on_policy_change(peer
, afi
, safi
, 0);
4892 /* Skip peer-group mechanics for regular peers. */
4893 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
))
4897 * Remove flag and configuration from all peer-group members, unless
4898 * they are explicitely overriding peer-group configuration.
4900 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
4901 /* Skip peers with overridden configuration. */
4902 if (CHECK_FLAG(member
->af_flags_override
[afi
][safi
],
4906 /* Skip peers where flag is already disabled. */
4907 if (!CHECK_FLAG(member
->af_flags
[afi
][safi
], PEER_FLAG_WEIGHT
))
4910 /* Remove flag and configuration on peer-group member. */
4911 UNSET_FLAG(member
->af_flags
[afi
][safi
], PEER_FLAG_WEIGHT
);
4912 member
->weight
[afi
][safi
] = 0;
4913 peer_on_policy_change(member
, afi
, safi
, 0);
4919 int peer_timers_set(struct peer
*peer
, uint32_t keepalive
, uint32_t holdtime
)
4921 struct peer
*member
;
4922 struct listnode
*node
, *nnode
;
4924 if (keepalive
> 65535)
4925 return BGP_ERR_INVALID_VALUE
;
4927 if (holdtime
> 65535)
4928 return BGP_ERR_INVALID_VALUE
;
4930 if (holdtime
< 3 && holdtime
!= 0)
4931 return BGP_ERR_INVALID_VALUE
;
4933 /* Set flag and configuration on peer. */
4934 peer_flag_set(peer
, PEER_FLAG_TIMER
);
4935 peer
->holdtime
= holdtime
;
4936 peer
->keepalive
= (keepalive
< holdtime
/ 3 ? keepalive
: holdtime
/ 3);
4938 /* Skip peer-group mechanics for regular peers. */
4939 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
))
4943 * Set flag and configuration on all peer-group members, unless they are
4944 * explicitely overriding peer-group configuration.
4946 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
4947 /* Skip peers with overridden configuration. */
4948 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_TIMER
))
4951 /* Set flag and configuration on peer-group member. */
4952 SET_FLAG(member
->flags
, PEER_FLAG_TIMER
);
4953 PEER_ATTR_INHERIT(peer
, peer
->group
, holdtime
);
4954 PEER_ATTR_INHERIT(peer
, peer
->group
, keepalive
);
4960 int peer_timers_unset(struct peer
*peer
)
4962 struct peer
*member
;
4963 struct listnode
*node
, *nnode
;
4965 /* Inherit configuration from peer-group if peer is member. */
4966 if (peer_group_active(peer
)) {
4967 peer_flag_inherit(peer
, PEER_FLAG_TIMER
);
4968 PEER_ATTR_INHERIT(peer
, peer
->group
, holdtime
);
4969 PEER_ATTR_INHERIT(peer
, peer
->group
, keepalive
);
4971 /* Otherwise remove flag and configuration from peer. */
4972 peer_flag_unset(peer
, PEER_FLAG_TIMER
);
4974 peer
->keepalive
= 0;
4977 /* Skip peer-group mechanics for regular peers. */
4978 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
))
4982 * Remove flag and configuration from all peer-group members, unless
4983 * they are explicitely overriding peer-group configuration.
4985 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
4986 /* Skip peers with overridden configuration. */
4987 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_TIMER
))
4990 /* Remove flag and configuration on peer-group member. */
4991 UNSET_FLAG(member
->flags
, PEER_FLAG_TIMER
);
4992 member
->holdtime
= 0;
4993 member
->keepalive
= 0;
4999 int peer_timers_connect_set(struct peer
*peer
, uint32_t connect
)
5001 struct peer
*member
;
5002 struct listnode
*node
, *nnode
;
5004 if (connect
> 65535)
5005 return BGP_ERR_INVALID_VALUE
;
5007 /* Set flag and configuration on peer. */
5008 peer_flag_set(peer
, PEER_FLAG_TIMER_CONNECT
);
5009 peer
->connect
= connect
;
5010 peer
->v_connect
= connect
;
5012 /* Skip peer-group mechanics for regular peers. */
5013 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
))
5017 * Set flag and configuration on all peer-group members, unless they are
5018 * explicitely overriding peer-group configuration.
5020 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5021 /* Skip peers with overridden configuration. */
5022 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_TIMER_CONNECT
))
5025 /* Set flag and configuration on peer-group member. */
5026 SET_FLAG(member
->flags
, PEER_FLAG_TIMER_CONNECT
);
5027 member
->connect
= connect
;
5028 member
->v_connect
= connect
;
5034 int peer_timers_connect_unset(struct peer
*peer
)
5036 struct peer
*member
;
5037 struct listnode
*node
, *nnode
;
5039 /* Inherit configuration from peer-group if peer is member. */
5040 if (peer_group_active(peer
)) {
5041 peer_flag_inherit(peer
, PEER_FLAG_TIMER_CONNECT
);
5042 PEER_ATTR_INHERIT(peer
, peer
->group
, connect
);
5044 /* Otherwise remove flag and configuration from peer. */
5045 peer_flag_unset(peer
, PEER_FLAG_TIMER_CONNECT
);
5049 /* Set timer with fallback to default value. */
5051 peer
->v_connect
= peer
->connect
;
5053 peer
->v_connect
= BGP_DEFAULT_CONNECT_RETRY
;
5055 /* Skip peer-group mechanics for regular peers. */
5056 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
))
5060 * Remove flag and configuration from all peer-group members, unless
5061 * they are explicitely overriding peer-group configuration.
5063 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5064 /* Skip peers with overridden configuration. */
5065 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_TIMER_CONNECT
))
5068 /* Remove flag and configuration on peer-group member. */
5069 UNSET_FLAG(member
->flags
, PEER_FLAG_TIMER_CONNECT
);
5070 member
->connect
= 0;
5071 member
->v_connect
= BGP_DEFAULT_CONNECT_RETRY
;
5077 int peer_advertise_interval_set(struct peer
*peer
, uint32_t routeadv
)
5079 struct peer
*member
;
5080 struct listnode
*node
, *nnode
;
5083 return BGP_ERR_INVALID_VALUE
;
5085 /* Set flag and configuration on peer. */
5086 peer_flag_set(peer
, PEER_FLAG_ROUTEADV
);
5087 peer
->routeadv
= routeadv
;
5088 peer
->v_routeadv
= routeadv
;
5090 /* Check if handling a regular peer. */
5091 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
5092 /* Update peer route announcements. */
5093 update_group_adjust_peer_afs(peer
);
5094 if (peer
->status
== Established
)
5095 bgp_announce_route_all(peer
);
5097 /* Skip peer-group mechanics for regular peers. */
5102 * Set flag and configuration on all peer-group members, unless they are
5103 * explicitely overriding peer-group configuration.
5105 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5106 /* Skip peers with overridden configuration. */
5107 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_ROUTEADV
))
5110 /* Set flag and configuration on peer-group member. */
5111 SET_FLAG(member
->flags
, PEER_FLAG_ROUTEADV
);
5112 member
->routeadv
= routeadv
;
5113 member
->v_routeadv
= routeadv
;
5115 /* Update peer route announcements. */
5116 update_group_adjust_peer_afs(member
);
5117 if (member
->status
== Established
)
5118 bgp_announce_route_all(member
);
5124 int peer_advertise_interval_unset(struct peer
*peer
)
5126 struct peer
*member
;
5127 struct listnode
*node
, *nnode
;
5129 /* Inherit configuration from peer-group if peer is member. */
5130 if (peer_group_active(peer
)) {
5131 peer_flag_inherit(peer
, PEER_FLAG_ROUTEADV
);
5132 PEER_ATTR_INHERIT(peer
, peer
->group
, routeadv
);
5134 /* Otherwise remove flag and configuration from peer. */
5135 peer_flag_unset(peer
, PEER_FLAG_ROUTEADV
);
5139 /* Set timer with fallback to default value. */
5141 peer
->v_routeadv
= peer
->routeadv
;
5143 peer
->v_routeadv
= (peer
->sort
== BGP_PEER_IBGP
)
5144 ? BGP_DEFAULT_IBGP_ROUTEADV
5145 : BGP_DEFAULT_EBGP_ROUTEADV
;
5147 /* Check if handling a regular peer. */
5148 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
5149 /* Update peer route announcements. */
5150 update_group_adjust_peer_afs(peer
);
5151 if (peer
->status
== Established
)
5152 bgp_announce_route_all(peer
);
5154 /* Skip peer-group mechanics for regular peers. */
5159 * Remove flag and configuration from all peer-group members, unless
5160 * they are explicitely overriding peer-group configuration.
5162 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5163 /* Skip peers with overridden configuration. */
5164 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_ROUTEADV
))
5167 /* Remove flag and configuration on peer-group member. */
5168 UNSET_FLAG(member
->flags
, PEER_FLAG_ROUTEADV
);
5169 member
->routeadv
= 0;
5170 member
->v_routeadv
= (member
->sort
== BGP_PEER_IBGP
)
5171 ? BGP_DEFAULT_IBGP_ROUTEADV
5172 : BGP_DEFAULT_EBGP_ROUTEADV
;
5174 /* Update peer route announcements. */
5175 update_group_adjust_peer_afs(member
);
5176 if (member
->status
== Established
)
5177 bgp_announce_route_all(member
);
5183 /* neighbor interface */
5184 void peer_interface_set(struct peer
*peer
, const char *str
)
5187 XFREE(MTYPE_BGP_PEER_IFNAME
, peer
->ifname
);
5188 peer
->ifname
= XSTRDUP(MTYPE_BGP_PEER_IFNAME
, str
);
5191 void peer_interface_unset(struct peer
*peer
)
5194 XFREE(MTYPE_BGP_PEER_IFNAME
, peer
->ifname
);
5195 peer
->ifname
= NULL
;
5199 int peer_allowas_in_set(struct peer
*peer
, afi_t afi
, safi_t safi
,
5200 int allow_num
, int origin
)
5202 struct peer
*member
;
5203 struct listnode
*node
, *nnode
;
5205 if (!origin
&& (allow_num
< 1 || allow_num
> 10))
5206 return BGP_ERR_INVALID_VALUE
;
5208 /* Set flag and configuration on peer. */
5209 peer_af_flag_set(peer
, afi
, safi
, PEER_FLAG_ALLOWAS_IN
);
5211 if (peer
->allowas_in
[afi
][safi
] != 0
5212 || !CHECK_FLAG(peer
->af_flags
[afi
][safi
],
5213 PEER_FLAG_ALLOWAS_IN_ORIGIN
)) {
5214 peer_af_flag_set(peer
, afi
, safi
,
5215 PEER_FLAG_ALLOWAS_IN_ORIGIN
);
5216 peer
->allowas_in
[afi
][safi
] = 0;
5217 peer_on_policy_change(peer
, afi
, safi
, 0);
5220 if (peer
->allowas_in
[afi
][safi
] != allow_num
5221 || CHECK_FLAG(peer
->af_flags
[afi
][safi
],
5222 PEER_FLAG_ALLOWAS_IN_ORIGIN
)) {
5224 peer_af_flag_unset(peer
, afi
, safi
,
5225 PEER_FLAG_ALLOWAS_IN_ORIGIN
);
5226 peer
->allowas_in
[afi
][safi
] = allow_num
;
5227 peer_on_policy_change(peer
, afi
, safi
, 0);
5231 /* Skip peer-group mechanics for regular peers. */
5232 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
))
5236 * Set flag and configuration on all peer-group members, unless
5237 * they are explicitely overriding peer-group configuration.
5239 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5240 /* Skip peers with overridden configuration. */
5241 if (CHECK_FLAG(member
->af_flags_override
[afi
][safi
],
5242 PEER_FLAG_ALLOWAS_IN
))
5245 /* Set flag and configuration on peer-group member. */
5246 SET_FLAG(member
->af_flags
[afi
][safi
], PEER_FLAG_ALLOWAS_IN
);
5248 if (member
->allowas_in
[afi
][safi
] != 0
5249 || !CHECK_FLAG(member
->af_flags
[afi
][safi
],
5250 PEER_FLAG_ALLOWAS_IN_ORIGIN
)) {
5251 SET_FLAG(member
->af_flags
[afi
][safi
],
5252 PEER_FLAG_ALLOWAS_IN_ORIGIN
);
5253 member
->allowas_in
[afi
][safi
] = 0;
5254 peer_on_policy_change(peer
, afi
, safi
, 0);
5257 if (member
->allowas_in
[afi
][safi
] != allow_num
5258 || CHECK_FLAG(member
->af_flags
[afi
][safi
],
5259 PEER_FLAG_ALLOWAS_IN_ORIGIN
)) {
5260 UNSET_FLAG(member
->af_flags
[afi
][safi
],
5261 PEER_FLAG_ALLOWAS_IN_ORIGIN
);
5262 member
->allowas_in
[afi
][safi
] = allow_num
;
5263 peer_on_policy_change(peer
, afi
, safi
, 0);
5271 int peer_allowas_in_unset(struct peer
*peer
, afi_t afi
, safi_t safi
)
5273 struct peer
*member
;
5274 struct listnode
*node
, *nnode
;
5276 /* Skip peer if flag is already disabled. */
5277 if (!CHECK_FLAG(peer
->af_flags
[afi
][safi
], PEER_FLAG_ALLOWAS_IN
))
5280 /* Inherit configuration from peer-group if peer is member. */
5281 if (peer_group_active(peer
)) {
5282 peer_af_flag_inherit(peer
, afi
, safi
, PEER_FLAG_ALLOWAS_IN
);
5283 peer_af_flag_inherit(peer
, afi
, safi
,
5284 PEER_FLAG_ALLOWAS_IN_ORIGIN
);
5285 PEER_ATTR_INHERIT(peer
, peer
->group
, allowas_in
[afi
][safi
]);
5286 peer_on_policy_change(peer
, afi
, safi
, 0);
5291 /* Remove flag and configuration from peer. */
5292 peer_af_flag_unset(peer
, afi
, safi
, PEER_FLAG_ALLOWAS_IN
);
5293 peer_af_flag_unset(peer
, afi
, safi
, PEER_FLAG_ALLOWAS_IN_ORIGIN
);
5294 peer
->allowas_in
[afi
][safi
] = 0;
5295 peer_on_policy_change(peer
, afi
, safi
, 0);
5297 /* Skip peer-group mechanics if handling a regular peer. */
5298 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
))
5302 * Remove flags and configuration from all peer-group members, unless
5303 * they are explicitely overriding peer-group configuration.
5305 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5306 /* Skip peers with overridden configuration. */
5307 if (CHECK_FLAG(member
->af_flags_override
[afi
][safi
],
5308 PEER_FLAG_ALLOWAS_IN
))
5311 /* Skip peers where flag is already disabled. */
5312 if (!CHECK_FLAG(member
->af_flags
[afi
][safi
],
5313 PEER_FLAG_ALLOWAS_IN
))
5316 /* Remove flags and configuration on peer-group member. */
5317 UNSET_FLAG(member
->af_flags
[afi
][safi
], PEER_FLAG_ALLOWAS_IN
);
5318 UNSET_FLAG(member
->af_flags
[afi
][safi
],
5319 PEER_FLAG_ALLOWAS_IN_ORIGIN
);
5320 member
->allowas_in
[afi
][safi
] = 0;
5321 peer_on_policy_change(member
, afi
, safi
, 0);
5327 int peer_local_as_set(struct peer
*peer
, as_t as
, int no_prepend
,
5330 bool old_no_prepend
, old_replace_as
;
5331 struct bgp
*bgp
= peer
->bgp
;
5332 struct peer
*member
;
5333 struct listnode
*node
, *nnode
;
5335 if (peer_sort(peer
) != BGP_PEER_EBGP
5336 && peer_sort(peer
) != BGP_PEER_INTERNAL
)
5337 return BGP_ERR_LOCAL_AS_ALLOWED_ONLY_FOR_EBGP
;
5340 return BGP_ERR_CANNOT_HAVE_LOCAL_AS_SAME_AS
;
5343 return BGP_ERR_CANNOT_HAVE_LOCAL_AS_SAME_AS_REMOTE_AS
;
5345 /* Save previous flag states. */
5347 !!CHECK_FLAG(peer
->flags
, PEER_FLAG_LOCAL_AS_NO_PREPEND
);
5349 !!CHECK_FLAG(peer
->flags
, PEER_FLAG_LOCAL_AS_REPLACE_AS
);
5351 /* Set flag and configuration on peer. */
5352 peer_flag_set(peer
, PEER_FLAG_LOCAL_AS
);
5353 peer_flag_modify(peer
, PEER_FLAG_LOCAL_AS_NO_PREPEND
, no_prepend
);
5354 peer_flag_modify(peer
, PEER_FLAG_LOCAL_AS_REPLACE_AS
, replace_as
);
5356 if (peer
->change_local_as
== as
&& old_no_prepend
== no_prepend
5357 && old_replace_as
== replace_as
)
5359 peer
->change_local_as
= as
;
5361 /* Check if handling a regular peer. */
5362 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
5363 /* Send notification or reset peer depending on state. */
5364 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
5365 peer
->last_reset
= PEER_DOWN_LOCAL_AS_CHANGE
;
5366 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
5367 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
5369 bgp_session_reset(peer
);
5371 /* Skip peer-group mechanics for regular peers. */
5376 * Set flag and configuration on all peer-group members, unless they are
5377 * explicitely overriding peer-group configuration.
5379 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5380 /* Skip peers with overridden configuration. */
5381 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_LOCAL_AS
))
5384 /* Skip peers with the same configuration. */
5385 old_no_prepend
= CHECK_FLAG(member
->flags
,
5386 PEER_FLAG_LOCAL_AS_NO_PREPEND
);
5387 old_replace_as
= CHECK_FLAG(member
->flags
,
5388 PEER_FLAG_LOCAL_AS_REPLACE_AS
);
5389 if (member
->change_local_as
== as
5390 && CHECK_FLAG(member
->flags
, PEER_FLAG_LOCAL_AS
)
5391 && old_no_prepend
== no_prepend
5392 && old_replace_as
== replace_as
)
5395 /* Set flag and configuration on peer-group member. */
5396 SET_FLAG(member
->flags
, PEER_FLAG_LOCAL_AS
);
5397 COND_FLAG(member
->flags
, PEER_FLAG_LOCAL_AS_NO_PREPEND
,
5399 COND_FLAG(member
->flags
, PEER_FLAG_LOCAL_AS_REPLACE_AS
,
5401 member
->change_local_as
= as
;
5403 /* Send notification or stop peer depending on state. */
5404 if (BGP_IS_VALID_STATE_FOR_NOTIF(member
->status
)) {
5405 member
->last_reset
= PEER_DOWN_LOCAL_AS_CHANGE
;
5406 bgp_notify_send(member
, BGP_NOTIFY_CEASE
,
5407 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
5409 BGP_EVENT_ADD(member
, BGP_Stop
);
5415 int peer_local_as_unset(struct peer
*peer
)
5417 struct peer
*member
;
5418 struct listnode
*node
, *nnode
;
5420 if (!CHECK_FLAG(peer
->flags
, PEER_FLAG_LOCAL_AS
))
5423 /* Inherit configuration from peer-group if peer is member. */
5424 if (peer_group_active(peer
)) {
5425 peer_flag_inherit(peer
, PEER_FLAG_LOCAL_AS
);
5426 peer_flag_inherit(peer
, PEER_FLAG_LOCAL_AS_NO_PREPEND
);
5427 peer_flag_inherit(peer
, PEER_FLAG_LOCAL_AS_REPLACE_AS
);
5428 PEER_ATTR_INHERIT(peer
, peer
->group
, change_local_as
);
5430 /* Otherwise remove flag and configuration from peer. */
5431 peer_flag_unset(peer
, PEER_FLAG_LOCAL_AS
);
5432 peer_flag_unset(peer
, PEER_FLAG_LOCAL_AS_NO_PREPEND
);
5433 peer_flag_unset(peer
, PEER_FLAG_LOCAL_AS_REPLACE_AS
);
5434 peer
->change_local_as
= 0;
5437 /* Check if handling a regular peer. */
5438 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
5439 /* Send notification or stop peer depending on state. */
5440 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
5441 peer
->last_reset
= PEER_DOWN_LOCAL_AS_CHANGE
;
5442 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
5443 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
5445 BGP_EVENT_ADD(peer
, BGP_Stop
);
5447 /* Skip peer-group mechanics for regular peers. */
5452 * Remove flag and configuration from all peer-group members, unless
5453 * they are explicitely overriding peer-group configuration.
5455 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5456 /* Skip peers with overridden configuration. */
5457 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_LOCAL_AS
))
5460 /* Remove flag and configuration on peer-group member. */
5461 UNSET_FLAG(member
->flags
, PEER_FLAG_LOCAL_AS
);
5462 UNSET_FLAG(member
->flags
, PEER_FLAG_LOCAL_AS_NO_PREPEND
);
5463 UNSET_FLAG(member
->flags
, PEER_FLAG_LOCAL_AS_REPLACE_AS
);
5464 member
->change_local_as
= 0;
5466 /* Send notification or stop peer depending on state. */
5467 if (BGP_IS_VALID_STATE_FOR_NOTIF(member
->status
)) {
5468 member
->last_reset
= PEER_DOWN_LOCAL_AS_CHANGE
;
5469 bgp_notify_send(member
, BGP_NOTIFY_CEASE
,
5470 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
5472 bgp_session_reset(member
);
5478 /* Set password for authenticating with the peer. */
5479 int peer_password_set(struct peer
*peer
, const char *password
)
5481 struct peer
*member
;
5482 struct listnode
*node
, *nnode
;
5483 int len
= password
? strlen(password
) : 0;
5484 int ret
= BGP_SUCCESS
;
5486 if ((len
< PEER_PASSWORD_MINLEN
) || (len
> PEER_PASSWORD_MAXLEN
))
5487 return BGP_ERR_INVALID_VALUE
;
5489 /* Set flag and configuration on peer. */
5490 peer_flag_set(peer
, PEER_FLAG_PASSWORD
);
5491 if (peer
->password
&& strcmp(peer
->password
, password
) == 0)
5493 XFREE(MTYPE_PEER_PASSWORD
, peer
->password
);
5494 peer
->password
= XSTRDUP(MTYPE_PEER_PASSWORD
, password
);
5496 /* Check if handling a regular peer. */
5497 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
5498 /* Send notification or reset peer depending on state. */
5499 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
))
5500 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
5501 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
5503 bgp_session_reset(peer
);
5506 * Attempt to install password on socket and skip peer-group
5509 if (BGP_PEER_SU_UNSPEC(peer
))
5511 return (bgp_md5_set(peer
) >= 0) ? BGP_SUCCESS
5512 : BGP_ERR_TCPSIG_FAILED
;
5516 * Set flag and configuration on all peer-group members, unless they are
5517 * explicitely overriding peer-group configuration.
5519 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5520 /* Skip peers with overridden configuration. */
5521 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_PASSWORD
))
5524 /* Skip peers with the same password. */
5525 if (member
->password
&& strcmp(member
->password
, password
) == 0)
5528 /* Set flag and configuration on peer-group member. */
5529 SET_FLAG(member
->flags
, PEER_FLAG_PASSWORD
);
5530 if (member
->password
)
5531 XFREE(MTYPE_PEER_PASSWORD
, member
->password
);
5532 member
->password
= XSTRDUP(MTYPE_PEER_PASSWORD
, password
);
5534 /* Send notification or reset peer depending on state. */
5535 if (BGP_IS_VALID_STATE_FOR_NOTIF(member
->status
))
5536 bgp_notify_send(member
, BGP_NOTIFY_CEASE
,
5537 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
5539 bgp_session_reset(member
);
5541 /* Attempt to install password on socket. */
5542 if (!BGP_PEER_SU_UNSPEC(member
) && bgp_md5_set(member
) < 0)
5543 ret
= BGP_ERR_TCPSIG_FAILED
;
5549 int peer_password_unset(struct peer
*peer
)
5551 struct peer
*member
;
5552 struct listnode
*node
, *nnode
;
5554 if (!CHECK_FLAG(peer
->flags
, PEER_FLAG_PASSWORD
))
5557 /* Inherit configuration from peer-group if peer is member. */
5558 if (peer_group_active(peer
)) {
5559 peer_flag_inherit(peer
, PEER_FLAG_PASSWORD
);
5560 PEER_STR_ATTR_INHERIT(peer
, peer
->group
, password
,
5561 MTYPE_PEER_PASSWORD
);
5563 /* Otherwise remove flag and configuration from peer. */
5564 peer_flag_unset(peer
, PEER_FLAG_PASSWORD
);
5565 XFREE(MTYPE_PEER_PASSWORD
, peer
->password
);
5568 /* Check if handling a regular peer. */
5569 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
5570 /* Send notification or reset peer depending on state. */
5571 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
))
5572 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
5573 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
5575 bgp_session_reset(peer
);
5577 /* Attempt to uninstall password on socket. */
5578 if (!BGP_PEER_SU_UNSPEC(peer
))
5579 bgp_md5_unset(peer
);
5581 /* Skip peer-group mechanics for regular peers. */
5586 * Remove flag and configuration from all peer-group members, unless
5587 * they are explicitely overriding peer-group configuration.
5589 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5590 /* Skip peers with overridden configuration. */
5591 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_PASSWORD
))
5594 /* Remove flag and configuration on peer-group member. */
5595 UNSET_FLAG(member
->flags
, PEER_FLAG_PASSWORD
);
5596 XFREE(MTYPE_PEER_PASSWORD
, member
->password
);
5598 /* Send notification or reset peer depending on state. */
5599 if (BGP_IS_VALID_STATE_FOR_NOTIF(member
->status
))
5600 bgp_notify_send(member
, BGP_NOTIFY_CEASE
,
5601 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
5603 bgp_session_reset(member
);
5605 /* Attempt to uninstall password on socket. */
5606 if (!BGP_PEER_SU_UNSPEC(member
))
5607 bgp_md5_unset(member
);
5614 /* Set distribute list to the peer. */
5615 int peer_distribute_set(struct peer
*peer
, afi_t afi
, safi_t safi
, int direct
,
5618 struct peer
*member
;
5619 struct bgp_filter
*filter
;
5620 struct listnode
*node
, *nnode
;
5622 if (direct
!= FILTER_IN
&& direct
!= FILTER_OUT
)
5623 return BGP_ERR_INVALID_VALUE
;
5625 /* Set configuration on peer. */
5626 filter
= &peer
->filter
[afi
][safi
];
5627 if (filter
->plist
[direct
].name
)
5628 return BGP_ERR_PEER_FILTER_CONFLICT
;
5629 if (filter
->dlist
[direct
].name
)
5630 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->dlist
[direct
].name
);
5631 filter
->dlist
[direct
].name
= XSTRDUP(MTYPE_BGP_FILTER_NAME
, name
);
5632 filter
->dlist
[direct
].alist
= access_list_lookup(afi
, name
);
5634 /* Check if handling a regular peer. */
5635 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
5636 /* Set override-flag and process peer route updates. */
5637 SET_FLAG(peer
->filter_override
[afi
][safi
][direct
],
5638 PEER_FT_DISTRIBUTE_LIST
);
5639 peer_on_policy_change(peer
, afi
, safi
,
5640 (direct
== FILTER_OUT
) ? 1 : 0);
5642 /* Skip peer-group mechanics for regular peers. */
5647 * Set configuration on all peer-group members, un less they are
5648 * explicitely overriding peer-group configuration.
5650 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5651 /* Skip peers with overridden configuration. */
5652 if (CHECK_FLAG(member
->filter_override
[afi
][safi
][direct
],
5653 PEER_FT_DISTRIBUTE_LIST
))
5656 /* Set configuration on peer-group member. */
5657 filter
= &member
->filter
[afi
][safi
];
5658 if (filter
->dlist
[direct
].name
)
5659 XFREE(MTYPE_BGP_FILTER_NAME
,
5660 filter
->dlist
[direct
].name
);
5661 filter
->dlist
[direct
].name
=
5662 XSTRDUP(MTYPE_BGP_FILTER_NAME
, name
);
5663 filter
->dlist
[direct
].alist
= access_list_lookup(afi
, name
);
5665 /* Process peer route updates. */
5666 peer_on_policy_change(member
, afi
, safi
,
5667 (direct
== FILTER_OUT
) ? 1 : 0);
5673 int peer_distribute_unset(struct peer
*peer
, afi_t afi
, safi_t safi
, int direct
)
5675 struct peer
*member
;
5676 struct bgp_filter
*filter
;
5677 struct listnode
*node
, *nnode
;
5679 if (direct
!= FILTER_IN
&& direct
!= FILTER_OUT
)
5680 return BGP_ERR_INVALID_VALUE
;
5682 /* Unset override-flag unconditionally. */
5683 UNSET_FLAG(peer
->filter_override
[afi
][safi
][direct
],
5684 PEER_FT_DISTRIBUTE_LIST
);
5686 /* Inherit configuration from peer-group if peer is member. */
5687 if (peer_group_active(peer
)) {
5688 PEER_STR_ATTR_INHERIT(peer
, peer
->group
,
5689 filter
[afi
][safi
].dlist
[direct
].name
,
5690 MTYPE_BGP_FILTER_NAME
);
5691 PEER_ATTR_INHERIT(peer
, peer
->group
,
5692 filter
[afi
][safi
].dlist
[direct
].alist
);
5694 /* Otherwise remove configuration from peer. */
5695 filter
= &peer
->filter
[afi
][safi
];
5696 if (filter
->dlist
[direct
].name
)
5697 XFREE(MTYPE_BGP_FILTER_NAME
,
5698 filter
->dlist
[direct
].name
);
5699 filter
->dlist
[direct
].name
= NULL
;
5700 filter
->dlist
[direct
].alist
= NULL
;
5703 /* Check if handling a regular peer. */
5704 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
5705 /* Process peer route updates. */
5706 peer_on_policy_change(peer
, afi
, safi
,
5707 (direct
== FILTER_OUT
) ? 1 : 0);
5709 /* Skip peer-group mechanics for regular peers. */
5714 * Remove configuration on all peer-group members, unless they are
5715 * explicitely overriding peer-group configuration.
5717 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5718 /* Skip peers with overridden configuration. */
5719 if (CHECK_FLAG(member
->filter_override
[afi
][safi
][direct
],
5720 PEER_FT_DISTRIBUTE_LIST
))
5723 /* Remove configuration on peer-group member. */
5724 filter
= &member
->filter
[afi
][safi
];
5725 if (filter
->dlist
[direct
].name
)
5726 XFREE(MTYPE_BGP_FILTER_NAME
,
5727 filter
->dlist
[direct
].name
);
5728 filter
->dlist
[direct
].name
= NULL
;
5729 filter
->dlist
[direct
].alist
= NULL
;
5731 /* Process peer route updates. */
5732 peer_on_policy_change(member
, afi
, safi
,
5733 (direct
== FILTER_OUT
) ? 1 : 0);
5739 /* Update distribute list. */
5740 static void peer_distribute_update(struct access_list
*access
)
5745 struct listnode
*mnode
, *mnnode
;
5746 struct listnode
*node
, *nnode
;
5749 struct peer_group
*group
;
5750 struct bgp_filter
*filter
;
5752 for (ALL_LIST_ELEMENTS(bm
->bgp
, mnode
, mnnode
, bgp
)) {
5754 update_group_policy_update(bgp
, BGP_POLICY_FILTER_LIST
,
5755 access
->name
, 0, 0);
5756 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
5757 FOREACH_AFI_SAFI (afi
, safi
) {
5758 filter
= &peer
->filter
[afi
][safi
];
5760 for (direct
= FILTER_IN
; direct
< FILTER_MAX
;
5762 if (filter
->dlist
[direct
].name
)
5763 filter
->dlist
[direct
]
5764 .alist
= access_list_lookup(
5766 filter
->dlist
[direct
]
5769 filter
->dlist
[direct
].alist
=
5774 for (ALL_LIST_ELEMENTS(bgp
->group
, node
, nnode
, group
)) {
5775 FOREACH_AFI_SAFI (afi
, safi
) {
5776 filter
= &group
->conf
->filter
[afi
][safi
];
5778 for (direct
= FILTER_IN
; direct
< FILTER_MAX
;
5780 if (filter
->dlist
[direct
].name
)
5781 filter
->dlist
[direct
]
5782 .alist
= access_list_lookup(
5784 filter
->dlist
[direct
]
5787 filter
->dlist
[direct
].alist
=
5793 vnc_prefix_list_update(bgp
);
5798 /* Set prefix list to the peer. */
5799 int peer_prefix_list_set(struct peer
*peer
, afi_t afi
, safi_t safi
, int direct
,
5802 struct peer
*member
;
5803 struct bgp_filter
*filter
;
5804 struct listnode
*node
, *nnode
;
5806 if (direct
!= FILTER_IN
&& direct
!= FILTER_OUT
)
5807 return BGP_ERR_INVALID_VALUE
;
5809 /* Set configuration on peer. */
5810 filter
= &peer
->filter
[afi
][safi
];
5811 if (filter
->dlist
[direct
].name
)
5812 return BGP_ERR_PEER_FILTER_CONFLICT
;
5813 if (filter
->plist
[direct
].name
)
5814 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->plist
[direct
].name
);
5815 filter
->plist
[direct
].name
= XSTRDUP(MTYPE_BGP_FILTER_NAME
, name
);
5816 filter
->plist
[direct
].plist
= prefix_list_lookup(afi
, name
);
5818 /* Check if handling a regular peer. */
5819 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
5820 /* Set override-flag and process peer route updates. */
5821 SET_FLAG(peer
->filter_override
[afi
][safi
][direct
],
5822 PEER_FT_PREFIX_LIST
);
5823 peer_on_policy_change(peer
, afi
, safi
,
5824 (direct
== FILTER_OUT
) ? 1 : 0);
5826 /* Skip peer-group mechanics for regular peers. */
5831 * Set configuration on all peer-group members, unless they are
5832 * explicitely overriding peer-group configuration.
5834 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5835 /* Skip peers with overridden configuration. */
5836 if (CHECK_FLAG(member
->filter_override
[afi
][safi
][direct
],
5837 PEER_FT_PREFIX_LIST
))
5840 /* Set configuration on peer-group member. */
5841 filter
= &member
->filter
[afi
][safi
];
5842 if (filter
->plist
[direct
].name
)
5843 XFREE(MTYPE_BGP_FILTER_NAME
,
5844 filter
->plist
[direct
].name
);
5845 filter
->plist
[direct
].name
=
5846 XSTRDUP(MTYPE_BGP_FILTER_NAME
, name
);
5847 filter
->plist
[direct
].plist
= prefix_list_lookup(afi
, name
);
5849 /* Process peer route updates. */
5850 peer_on_policy_change(member
, afi
, safi
,
5851 (direct
== FILTER_OUT
) ? 1 : 0);
5857 int peer_prefix_list_unset(struct peer
*peer
, afi_t afi
, safi_t safi
,
5860 struct peer
*member
;
5861 struct bgp_filter
*filter
;
5862 struct listnode
*node
, *nnode
;
5864 if (direct
!= FILTER_IN
&& direct
!= FILTER_OUT
)
5865 return BGP_ERR_INVALID_VALUE
;
5867 /* Unset override-flag unconditionally. */
5868 UNSET_FLAG(peer
->filter_override
[afi
][safi
][direct
],
5869 PEER_FT_PREFIX_LIST
);
5871 /* Inherit configuration from peer-group if peer is member. */
5872 if (peer_group_active(peer
)) {
5873 PEER_STR_ATTR_INHERIT(peer
, peer
->group
,
5874 filter
[afi
][safi
].plist
[direct
].name
,
5875 MTYPE_BGP_FILTER_NAME
);
5876 PEER_ATTR_INHERIT(peer
, peer
->group
,
5877 filter
[afi
][safi
].plist
[direct
].plist
);
5879 /* Otherwise remove configuration from peer. */
5880 filter
= &peer
->filter
[afi
][safi
];
5881 if (filter
->plist
[direct
].name
)
5882 XFREE(MTYPE_BGP_FILTER_NAME
,
5883 filter
->plist
[direct
].name
);
5884 filter
->plist
[direct
].name
= NULL
;
5885 filter
->plist
[direct
].plist
= NULL
;
5888 /* Check if handling a regular peer. */
5889 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
5890 /* Process peer route updates. */
5891 peer_on_policy_change(peer
, afi
, safi
,
5892 (direct
== FILTER_OUT
) ? 1 : 0);
5894 /* Skip peer-group mechanics for regular peers. */
5899 * Remove configuration on all peer-group members, unless they are
5900 * explicitely overriding peer-group configuration.
5902 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5903 /* Skip peers with overridden configuration. */
5904 if (CHECK_FLAG(member
->filter_override
[afi
][safi
][direct
],
5905 PEER_FT_PREFIX_LIST
))
5908 /* Remove configuration on peer-group member. */
5909 filter
= &member
->filter
[afi
][safi
];
5910 if (filter
->plist
[direct
].name
)
5911 XFREE(MTYPE_BGP_FILTER_NAME
,
5912 filter
->plist
[direct
].name
);
5913 filter
->plist
[direct
].name
= NULL
;
5914 filter
->plist
[direct
].plist
= NULL
;
5916 /* Process peer route updates. */
5917 peer_on_policy_change(member
, afi
, safi
,
5918 (direct
== FILTER_OUT
) ? 1 : 0);
5924 /* Update prefix-list list. */
5925 static void peer_prefix_list_update(struct prefix_list
*plist
)
5927 struct listnode
*mnode
, *mnnode
;
5928 struct listnode
*node
, *nnode
;
5931 struct peer_group
*group
;
5932 struct bgp_filter
*filter
;
5937 for (ALL_LIST_ELEMENTS(bm
->bgp
, mnode
, mnnode
, bgp
)) {
5940 * Update the prefix-list on update groups.
5942 update_group_policy_update(
5943 bgp
, BGP_POLICY_PREFIX_LIST
,
5944 plist
? prefix_list_name(plist
) : NULL
, 0, 0);
5946 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
5947 FOREACH_AFI_SAFI (afi
, safi
) {
5948 filter
= &peer
->filter
[afi
][safi
];
5950 for (direct
= FILTER_IN
; direct
< FILTER_MAX
;
5952 if (filter
->plist
[direct
].name
)
5953 filter
->plist
[direct
]
5954 .plist
= prefix_list_lookup(
5956 filter
->plist
[direct
]
5959 filter
->plist
[direct
].plist
=
5964 for (ALL_LIST_ELEMENTS(bgp
->group
, node
, nnode
, group
)) {
5965 FOREACH_AFI_SAFI (afi
, safi
) {
5966 filter
= &group
->conf
->filter
[afi
][safi
];
5968 for (direct
= FILTER_IN
; direct
< FILTER_MAX
;
5970 if (filter
->plist
[direct
].name
)
5971 filter
->plist
[direct
]
5972 .plist
= prefix_list_lookup(
5974 filter
->plist
[direct
]
5977 filter
->plist
[direct
].plist
=
5985 int peer_aslist_set(struct peer
*peer
, afi_t afi
, safi_t safi
, int direct
,
5988 struct peer
*member
;
5989 struct bgp_filter
*filter
;
5990 struct listnode
*node
, *nnode
;
5992 if (direct
!= FILTER_IN
&& direct
!= FILTER_OUT
)
5993 return BGP_ERR_INVALID_VALUE
;
5995 /* Set configuration on peer. */
5996 filter
= &peer
->filter
[afi
][safi
];
5997 if (filter
->aslist
[direct
].name
)
5998 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->aslist
[direct
].name
);
5999 filter
->aslist
[direct
].name
= XSTRDUP(MTYPE_BGP_FILTER_NAME
, name
);
6000 filter
->aslist
[direct
].aslist
= as_list_lookup(name
);
6002 /* Check if handling a regular peer. */
6003 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6004 /* Set override-flag and process peer route updates. */
6005 SET_FLAG(peer
->filter_override
[afi
][safi
][direct
],
6006 PEER_FT_FILTER_LIST
);
6007 peer_on_policy_change(peer
, afi
, safi
,
6008 (direct
== FILTER_OUT
) ? 1 : 0);
6010 /* Skip peer-group mechanics for regular peers. */
6015 * Set configuration on all peer-group members, unless they are
6016 * explicitely overriding peer-group configuration.
6018 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
6019 /* Skip peers with overridden configuration. */
6020 if (CHECK_FLAG(member
->filter_override
[afi
][safi
][direct
],
6021 PEER_FT_FILTER_LIST
))
6024 /* Set configuration on peer-group member. */
6025 filter
= &member
->filter
[afi
][safi
];
6026 if (filter
->aslist
[direct
].name
)
6027 XFREE(MTYPE_BGP_FILTER_NAME
,
6028 filter
->aslist
[direct
].name
);
6029 filter
->aslist
[direct
].name
=
6030 XSTRDUP(MTYPE_BGP_FILTER_NAME
, name
);
6031 filter
->aslist
[direct
].aslist
= as_list_lookup(name
);
6033 /* Process peer route updates. */
6034 peer_on_policy_change(member
, afi
, safi
,
6035 (direct
== FILTER_OUT
) ? 1 : 0);
6041 int peer_aslist_unset(struct peer
*peer
, afi_t afi
, safi_t safi
, int direct
)
6043 struct peer
*member
;
6044 struct bgp_filter
*filter
;
6045 struct listnode
*node
, *nnode
;
6047 if (direct
!= FILTER_IN
&& direct
!= FILTER_OUT
)
6048 return BGP_ERR_INVALID_VALUE
;
6050 /* Unset override-flag unconditionally. */
6051 UNSET_FLAG(peer
->filter_override
[afi
][safi
][direct
],
6052 PEER_FT_FILTER_LIST
);
6054 /* Inherit configuration from peer-group if peer is member. */
6055 if (peer_group_active(peer
)) {
6056 PEER_STR_ATTR_INHERIT(peer
, peer
->group
,
6057 filter
[afi
][safi
].aslist
[direct
].name
,
6058 MTYPE_BGP_FILTER_NAME
);
6059 PEER_ATTR_INHERIT(peer
, peer
->group
,
6060 filter
[afi
][safi
].aslist
[direct
].aslist
);
6062 /* Otherwise remove configuration from peer. */
6063 filter
= &peer
->filter
[afi
][safi
];
6064 if (filter
->aslist
[direct
].name
)
6065 XFREE(MTYPE_BGP_FILTER_NAME
,
6066 filter
->aslist
[direct
].name
);
6067 filter
->aslist
[direct
].name
= NULL
;
6068 filter
->aslist
[direct
].aslist
= NULL
;
6071 /* Check if handling a regular peer. */
6072 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6073 /* Process peer route updates. */
6074 peer_on_policy_change(peer
, afi
, safi
,
6075 (direct
== FILTER_OUT
) ? 1 : 0);
6077 /* Skip peer-group mechanics for regular peers. */
6082 * Remove configuration on all peer-group members, unless they are
6083 * explicitely overriding peer-group configuration.
6085 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
6086 /* Skip peers with overridden configuration. */
6087 if (CHECK_FLAG(member
->filter_override
[afi
][safi
][direct
],
6088 PEER_FT_FILTER_LIST
))
6091 /* Remove configuration on peer-group member. */
6092 filter
= &member
->filter
[afi
][safi
];
6093 if (filter
->aslist
[direct
].name
)
6094 XFREE(MTYPE_BGP_FILTER_NAME
,
6095 filter
->aslist
[direct
].name
);
6096 filter
->aslist
[direct
].name
= NULL
;
6097 filter
->aslist
[direct
].aslist
= NULL
;
6099 /* Process peer route updates. */
6100 peer_on_policy_change(member
, afi
, safi
,
6101 (direct
== FILTER_OUT
) ? 1 : 0);
6107 static void peer_aslist_update(const char *aslist_name
)
6112 struct listnode
*mnode
, *mnnode
;
6113 struct listnode
*node
, *nnode
;
6116 struct peer_group
*group
;
6117 struct bgp_filter
*filter
;
6119 for (ALL_LIST_ELEMENTS(bm
->bgp
, mnode
, mnnode
, bgp
)) {
6120 update_group_policy_update(bgp
, BGP_POLICY_FILTER_LIST
,
6123 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
6124 FOREACH_AFI_SAFI (afi
, safi
) {
6125 filter
= &peer
->filter
[afi
][safi
];
6127 for (direct
= FILTER_IN
; direct
< FILTER_MAX
;
6129 if (filter
->aslist
[direct
].name
)
6130 filter
->aslist
[direct
]
6131 .aslist
= as_list_lookup(
6132 filter
->aslist
[direct
]
6135 filter
->aslist
[direct
].aslist
=
6140 for (ALL_LIST_ELEMENTS(bgp
->group
, node
, nnode
, group
)) {
6141 FOREACH_AFI_SAFI (afi
, safi
) {
6142 filter
= &group
->conf
->filter
[afi
][safi
];
6144 for (direct
= FILTER_IN
; direct
< FILTER_MAX
;
6146 if (filter
->aslist
[direct
].name
)
6147 filter
->aslist
[direct
]
6148 .aslist
= as_list_lookup(
6149 filter
->aslist
[direct
]
6152 filter
->aslist
[direct
].aslist
=
6160 static void peer_aslist_add(char *aslist_name
)
6162 peer_aslist_update(aslist_name
);
6163 route_map_notify_dependencies((char *)aslist_name
,
6164 RMAP_EVENT_ASLIST_ADDED
);
6167 static void peer_aslist_del(const char *aslist_name
)
6169 peer_aslist_update(aslist_name
);
6170 route_map_notify_dependencies(aslist_name
, RMAP_EVENT_ASLIST_DELETED
);
6174 int peer_route_map_set(struct peer
*peer
, afi_t afi
, safi_t safi
, int direct
,
6177 struct peer
*member
;
6178 struct bgp_filter
*filter
;
6179 struct listnode
*node
, *nnode
;
6181 if (direct
!= RMAP_IN
&& direct
!= RMAP_OUT
)
6182 return BGP_ERR_INVALID_VALUE
;
6184 /* Set configuration on peer. */
6185 filter
= &peer
->filter
[afi
][safi
];
6186 if (filter
->map
[direct
].name
)
6187 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->map
[direct
].name
);
6188 filter
->map
[direct
].name
= XSTRDUP(MTYPE_BGP_FILTER_NAME
, name
);
6189 filter
->map
[direct
].map
= route_map_lookup_by_name(name
);
6191 /* Check if handling a regular peer. */
6192 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6193 /* Set override-flag and process peer route updates. */
6194 SET_FLAG(peer
->filter_override
[afi
][safi
][direct
],
6196 peer_on_policy_change(peer
, afi
, safi
,
6197 (direct
== RMAP_OUT
) ? 1 : 0);
6199 /* Skip peer-group mechanics for regular peers. */
6204 * Set configuration on all peer-group members, unless they are
6205 * explicitely overriding peer-group configuration.
6207 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
6208 /* Skip peers with overridden configuration. */
6209 if (CHECK_FLAG(member
->filter_override
[afi
][safi
][direct
],
6213 /* Set configuration on peer-group member. */
6214 filter
= &member
->filter
[afi
][safi
];
6215 if (filter
->map
[direct
].name
)
6216 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->map
[direct
].name
);
6217 filter
->map
[direct
].name
= XSTRDUP(MTYPE_BGP_FILTER_NAME
, name
);
6218 filter
->map
[direct
].map
= route_map_lookup_by_name(name
);
6220 /* Process peer route updates. */
6221 peer_on_policy_change(member
, afi
, safi
,
6222 (direct
== RMAP_OUT
) ? 1 : 0);
6227 /* Unset route-map from the peer. */
6228 int peer_route_map_unset(struct peer
*peer
, afi_t afi
, safi_t safi
, int direct
)
6230 struct peer
*member
;
6231 struct bgp_filter
*filter
;
6232 struct listnode
*node
, *nnode
;
6234 if (direct
!= RMAP_IN
&& direct
!= RMAP_OUT
)
6235 return BGP_ERR_INVALID_VALUE
;
6237 /* Unset override-flag unconditionally. */
6238 UNSET_FLAG(peer
->filter_override
[afi
][safi
][direct
], PEER_FT_ROUTE_MAP
);
6240 /* Inherit configuration from peer-group if peer is member. */
6241 if (peer_group_active(peer
)) {
6242 PEER_STR_ATTR_INHERIT(peer
, peer
->group
,
6243 filter
[afi
][safi
].map
[direct
].name
,
6244 MTYPE_BGP_FILTER_NAME
);
6245 PEER_ATTR_INHERIT(peer
, peer
->group
,
6246 filter
[afi
][safi
].map
[direct
].map
);
6248 /* Otherwise remove configuration from peer. */
6249 filter
= &peer
->filter
[afi
][safi
];
6250 if (filter
->map
[direct
].name
)
6251 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->map
[direct
].name
);
6252 filter
->map
[direct
].name
= NULL
;
6253 filter
->map
[direct
].map
= NULL
;
6256 /* Check if handling a regular peer. */
6257 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6258 /* Process peer route updates. */
6259 peer_on_policy_change(peer
, afi
, safi
,
6260 (direct
== RMAP_OUT
) ? 1 : 0);
6262 /* Skip peer-group mechanics for regular peers. */
6267 * Remove configuration on all peer-group members, unless they are
6268 * explicitely overriding peer-group configuration.
6270 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
6271 /* Skip peers with overridden configuration. */
6272 if (CHECK_FLAG(member
->filter_override
[afi
][safi
][direct
],
6276 /* Remove configuration on peer-group member. */
6277 filter
= &member
->filter
[afi
][safi
];
6278 if (filter
->map
[direct
].name
)
6279 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->map
[direct
].name
);
6280 filter
->map
[direct
].name
= NULL
;
6281 filter
->map
[direct
].map
= NULL
;
6283 /* Process peer route updates. */
6284 peer_on_policy_change(member
, afi
, safi
,
6285 (direct
== RMAP_OUT
) ? 1 : 0);
6291 /* Set unsuppress-map to the peer. */
6292 int peer_unsuppress_map_set(struct peer
*peer
, afi_t afi
, safi_t safi
,
6295 struct peer
*member
;
6296 struct bgp_filter
*filter
;
6297 struct listnode
*node
, *nnode
;
6299 /* Set configuration on peer. */
6300 filter
= &peer
->filter
[afi
][safi
];
6301 if (filter
->usmap
.name
)
6302 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->usmap
.name
);
6303 filter
->usmap
.name
= XSTRDUP(MTYPE_BGP_FILTER_NAME
, name
);
6304 filter
->usmap
.map
= route_map_lookup_by_name(name
);
6306 /* Check if handling a regular peer. */
6307 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6308 /* Set override-flag and process peer route updates. */
6309 SET_FLAG(peer
->filter_override
[afi
][safi
][0],
6310 PEER_FT_UNSUPPRESS_MAP
);
6311 peer_on_policy_change(peer
, afi
, safi
, 1);
6313 /* Skip peer-group mechanics for regular peers. */
6318 * Set configuration on all peer-group members, unless they are
6319 * explicitely overriding peer-group configuration.
6321 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
6322 /* Skip peers with overridden configuration. */
6323 if (CHECK_FLAG(member
->filter_override
[afi
][safi
][0],
6324 PEER_FT_UNSUPPRESS_MAP
))
6327 /* Set configuration on peer-group member. */
6328 filter
= &member
->filter
[afi
][safi
];
6329 if (filter
->usmap
.name
)
6330 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->usmap
.name
);
6331 filter
->usmap
.name
= XSTRDUP(MTYPE_BGP_FILTER_NAME
, name
);
6332 filter
->usmap
.map
= route_map_lookup_by_name(name
);
6334 /* Process peer route updates. */
6335 peer_on_policy_change(member
, afi
, safi
, 1);
6341 /* Unset route-map from the peer. */
6342 int peer_unsuppress_map_unset(struct peer
*peer
, afi_t afi
, safi_t safi
)
6344 struct peer
*member
;
6345 struct bgp_filter
*filter
;
6346 struct listnode
*node
, *nnode
;
6348 /* Unset override-flag unconditionally. */
6349 UNSET_FLAG(peer
->filter_override
[afi
][safi
][0], PEER_FT_UNSUPPRESS_MAP
);
6351 /* Inherit configuration from peer-group if peer is member. */
6352 if (peer_group_active(peer
)) {
6353 PEER_STR_ATTR_INHERIT(peer
, peer
->group
,
6354 filter
[afi
][safi
].usmap
.name
,
6355 MTYPE_BGP_FILTER_NAME
);
6356 PEER_ATTR_INHERIT(peer
, peer
->group
,
6357 filter
[afi
][safi
].usmap
.map
);
6359 /* Otherwise remove configuration from peer. */
6360 filter
= &peer
->filter
[afi
][safi
];
6361 if (filter
->usmap
.name
)
6362 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->usmap
.name
);
6363 filter
->usmap
.name
= NULL
;
6364 filter
->usmap
.map
= NULL
;
6367 /* Check if handling a regular peer. */
6368 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6369 /* Process peer route updates. */
6370 peer_on_policy_change(peer
, afi
, safi
, 1);
6372 /* Skip peer-group mechanics for regular peers. */
6377 * Remove configuration on all peer-group members, unless they are
6378 * explicitely overriding peer-group configuration.
6380 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
6381 /* Skip peers with overridden configuration. */
6382 if (CHECK_FLAG(member
->filter_override
[afi
][safi
][0],
6383 PEER_FT_UNSUPPRESS_MAP
))
6386 /* Remove configuration on peer-group member. */
6387 filter
= &member
->filter
[afi
][safi
];
6388 if (filter
->usmap
.name
)
6389 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->usmap
.name
);
6390 filter
->usmap
.name
= NULL
;
6391 filter
->usmap
.map
= NULL
;
6393 /* Process peer route updates. */
6394 peer_on_policy_change(member
, afi
, safi
, 1);
6400 int peer_maximum_prefix_set(struct peer
*peer
, afi_t afi
, safi_t safi
,
6401 uint32_t max
, uint8_t threshold
, int warning
,
6404 struct peer
*member
;
6405 struct listnode
*node
, *nnode
;
6407 /* Set flags and configuration on peer. */
6408 peer_af_flag_set(peer
, afi
, safi
, PEER_FLAG_MAX_PREFIX
);
6410 peer_af_flag_set(peer
, afi
, safi
, PEER_FLAG_MAX_PREFIX_WARNING
);
6412 peer_af_flag_unset(peer
, afi
, safi
,
6413 PEER_FLAG_MAX_PREFIX_WARNING
);
6415 peer
->pmax
[afi
][safi
] = max
;
6416 peer
->pmax_threshold
[afi
][safi
] = threshold
;
6417 peer
->pmax_restart
[afi
][safi
] = restart
;
6419 /* Check if handling a regular peer. */
6420 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6421 /* Re-check if peer violates maximum-prefix. */
6422 if ((peer
->status
== Established
) && (peer
->afc
[afi
][safi
]))
6423 bgp_maximum_prefix_overflow(peer
, afi
, safi
, 1);
6425 /* Skip peer-group mechanics for regular peers. */
6430 * Set flags and configuration on all peer-group members, unless they
6431 * are explicitely overriding peer-group configuration.
6433 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
6434 /* Skip peers with overridden configuration. */
6435 if (CHECK_FLAG(member
->af_flags_override
[afi
][safi
],
6436 PEER_FLAG_MAX_PREFIX
))
6439 /* Set flag and configuration on peer-group member. */
6440 member
->pmax
[afi
][safi
] = max
;
6441 member
->pmax_threshold
[afi
][safi
] = threshold
;
6442 member
->pmax_restart
[afi
][safi
] = restart
;
6444 SET_FLAG(member
->af_flags
[afi
][safi
],
6445 PEER_FLAG_MAX_PREFIX_WARNING
);
6447 UNSET_FLAG(member
->af_flags
[afi
][safi
],
6448 PEER_FLAG_MAX_PREFIX_WARNING
);
6450 /* Re-check if peer violates maximum-prefix. */
6451 if ((member
->status
== Established
) && (member
->afc
[afi
][safi
]))
6452 bgp_maximum_prefix_overflow(member
, afi
, safi
, 1);
6458 int peer_maximum_prefix_unset(struct peer
*peer
, afi_t afi
, safi_t safi
)
6460 struct peer
*member
;
6461 struct listnode
*node
, *nnode
;
6463 /* Inherit configuration from peer-group if peer is member. */
6464 if (peer_group_active(peer
)) {
6465 peer_af_flag_inherit(peer
, afi
, safi
, PEER_FLAG_MAX_PREFIX
);
6466 peer_af_flag_inherit(peer
, afi
, safi
,
6467 PEER_FLAG_MAX_PREFIX_WARNING
);
6468 PEER_ATTR_INHERIT(peer
, peer
->group
, pmax
[afi
][safi
]);
6469 PEER_ATTR_INHERIT(peer
, peer
->group
, pmax_threshold
[afi
][safi
]);
6470 PEER_ATTR_INHERIT(peer
, peer
->group
, pmax_restart
[afi
][safi
]);
6475 /* Remove flags and configuration from peer. */
6476 peer_af_flag_unset(peer
, afi
, safi
, PEER_FLAG_MAX_PREFIX
);
6477 peer_af_flag_unset(peer
, afi
, safi
, PEER_FLAG_MAX_PREFIX_WARNING
);
6478 peer
->pmax
[afi
][safi
] = 0;
6479 peer
->pmax_threshold
[afi
][safi
] = 0;
6480 peer
->pmax_restart
[afi
][safi
] = 0;
6483 * Remove flags and configuration from all peer-group members, unless
6484 * they are explicitely overriding peer-group configuration.
6486 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
6487 /* Skip peers with overridden configuration. */
6488 if (CHECK_FLAG(member
->af_flags_override
[afi
][safi
],
6489 PEER_FLAG_MAX_PREFIX
))
6492 /* Remove flag and configuration on peer-group member. */
6493 UNSET_FLAG(member
->af_flags
[afi
][safi
], PEER_FLAG_MAX_PREFIX
);
6494 UNSET_FLAG(member
->af_flags
[afi
][safi
],
6495 PEER_FLAG_MAX_PREFIX_WARNING
);
6496 member
->pmax
[afi
][safi
] = 0;
6497 member
->pmax_threshold
[afi
][safi
] = 0;
6498 member
->pmax_restart
[afi
][safi
] = 0;
6504 int is_ebgp_multihop_configured(struct peer
*peer
)
6506 struct peer_group
*group
;
6507 struct listnode
*node
, *nnode
;
6510 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6511 group
= peer
->group
;
6512 if ((peer_sort(peer
) != BGP_PEER_IBGP
)
6513 && (group
->conf
->ttl
!= 1))
6516 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, peer1
)) {
6517 if ((peer_sort(peer1
) != BGP_PEER_IBGP
)
6518 && (peer1
->ttl
!= 1))
6522 if ((peer_sort(peer
) != BGP_PEER_IBGP
) && (peer
->ttl
!= 1))
6528 /* Set # of hops between us and BGP peer. */
6529 int peer_ttl_security_hops_set(struct peer
*peer
, int gtsm_hops
)
6531 struct peer_group
*group
;
6532 struct listnode
*node
, *nnode
;
6535 zlog_debug("peer_ttl_security_hops_set: set gtsm_hops to %d for %s",
6536 gtsm_hops
, peer
->host
);
6538 /* We cannot configure ttl-security hops when ebgp-multihop is already
6539 set. For non peer-groups, the check is simple. For peer-groups,
6541 slightly messy, because we need to check both the peer-group
6543 and all peer-group members for any trace of ebgp-multihop
6545 before actually applying the ttl-security rules. Cisco really made a
6546 mess of this configuration parameter, and OpenBGPD got it right.
6549 if ((peer
->gtsm_hops
== 0) && (peer
->sort
!= BGP_PEER_IBGP
)) {
6550 if (is_ebgp_multihop_configured(peer
))
6551 return BGP_ERR_NO_EBGP_MULTIHOP_WITH_TTLHACK
;
6553 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6554 peer
->gtsm_hops
= gtsm_hops
;
6556 /* Calling ebgp multihop also resets the session.
6557 * On restart, NHT will get setup correctly as will the
6558 * min & max ttls on the socket. The return value is
6561 ret
= peer_ebgp_multihop_set(peer
, MAXTTL
);
6566 group
= peer
->group
;
6567 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
,
6569 peer
->gtsm_hops
= group
->conf
->gtsm_hops
;
6571 /* Calling ebgp multihop also resets the
6573 * On restart, NHT will get setup correctly as
6575 * min & max ttls on the socket. The return
6579 peer_ebgp_multihop_set(peer
, MAXTTL
);
6583 /* Post the first gtsm setup or if its ibgp, maxttl setting
6585 * necessary, just set the minttl.
6587 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6588 peer
->gtsm_hops
= gtsm_hops
;
6591 sockopt_minttl(peer
->su
.sa
.sa_family
, peer
->fd
,
6592 MAXTTL
+ 1 - gtsm_hops
);
6593 if ((peer
->status
< Established
) && peer
->doppelganger
6594 && (peer
->doppelganger
->fd
>= 0))
6595 sockopt_minttl(peer
->su
.sa
.sa_family
,
6596 peer
->doppelganger
->fd
,
6597 MAXTTL
+ 1 - gtsm_hops
);
6599 group
= peer
->group
;
6600 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
,
6602 peer
->gtsm_hops
= group
->conf
->gtsm_hops
;
6604 /* Change setting of existing peer
6605 * established then change value (may break
6607 * not established yet (teardown session and
6609 * no session then do nothing (will get
6610 * handled by next connection)
6612 if (peer
->fd
>= 0 && peer
->gtsm_hops
!= 0)
6614 peer
->su
.sa
.sa_family
, peer
->fd
,
6615 MAXTTL
+ 1 - peer
->gtsm_hops
);
6616 if ((peer
->status
< Established
)
6617 && peer
->doppelganger
6618 && (peer
->doppelganger
->fd
>= 0))
6619 sockopt_minttl(peer
->su
.sa
.sa_family
,
6620 peer
->doppelganger
->fd
,
6621 MAXTTL
+ 1 - gtsm_hops
);
6629 int peer_ttl_security_hops_unset(struct peer
*peer
)
6631 struct peer_group
*group
;
6632 struct listnode
*node
, *nnode
;
6635 zlog_debug("peer_ttl_security_hops_unset: set gtsm_hops to zero for %s",
6638 /* if a peer-group member, then reset to peer-group default rather than
6640 if (peer_group_active(peer
))
6641 peer
->gtsm_hops
= peer
->group
->conf
->gtsm_hops
;
6643 peer
->gtsm_hops
= 0;
6645 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6646 /* Invoking ebgp_multihop_set will set the TTL back to the
6648 * value as well as restting the NHT and such. The session is
6651 if (peer
->sort
== BGP_PEER_EBGP
)
6652 ret
= peer_ebgp_multihop_unset(peer
);
6655 sockopt_minttl(peer
->su
.sa
.sa_family
, peer
->fd
,
6658 if ((peer
->status
< Established
) && peer
->doppelganger
6659 && (peer
->doppelganger
->fd
>= 0))
6660 sockopt_minttl(peer
->su
.sa
.sa_family
,
6661 peer
->doppelganger
->fd
, 0);
6664 group
= peer
->group
;
6665 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, peer
)) {
6666 peer
->gtsm_hops
= 0;
6667 if (peer
->sort
== BGP_PEER_EBGP
)
6668 ret
= peer_ebgp_multihop_unset(peer
);
6671 sockopt_minttl(peer
->su
.sa
.sa_family
,
6674 if ((peer
->status
< Established
)
6675 && peer
->doppelganger
6676 && (peer
->doppelganger
->fd
>= 0))
6677 sockopt_minttl(peer
->su
.sa
.sa_family
,
6678 peer
->doppelganger
->fd
,
6688 * If peer clear is invoked in a loop for all peers on the BGP instance,
6689 * it may end up freeing the doppelganger, and if this was the next node
6690 * to the current node, we would end up accessing the freed next node.
6691 * Pass along additional parameter which can be updated if next node
6692 * is freed; only required when walking the peer list on BGP instance.
6694 int peer_clear(struct peer
*peer
, struct listnode
**nnode
)
6696 if (!CHECK_FLAG(peer
->flags
, PEER_FLAG_SHUTDOWN
)) {
6697 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_PREFIX_OVERFLOW
)) {
6698 UNSET_FLAG(peer
->sflags
, PEER_STATUS_PREFIX_OVERFLOW
);
6699 if (peer
->t_pmax_restart
) {
6700 BGP_TIMER_OFF(peer
->t_pmax_restart
);
6701 if (bgp_debug_neighbor_events(peer
))
6703 "%s Maximum-prefix restart timer canceled",
6706 BGP_EVENT_ADD(peer
, BGP_Start
);
6710 peer
->v_start
= BGP_INIT_START_TIMER
;
6711 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
))
6712 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
6713 BGP_NOTIFY_CEASE_ADMIN_RESET
);
6715 bgp_session_reset_safe(peer
, nnode
);
6720 int peer_clear_soft(struct peer
*peer
, afi_t afi
, safi_t safi
,
6721 enum bgp_clear_type stype
)
6723 struct peer_af
*paf
;
6725 if (peer
->status
!= Established
)
6728 if (!peer
->afc
[afi
][safi
])
6729 return BGP_ERR_AF_UNCONFIGURED
;
6731 peer
->rtt
= sockopt_tcp_rtt(peer
->fd
);
6733 if (stype
== BGP_CLEAR_SOFT_OUT
|| stype
== BGP_CLEAR_SOFT_BOTH
) {
6734 /* Clear the "neighbor x.x.x.x default-originate" flag */
6735 paf
= peer_af_find(peer
, afi
, safi
);
6736 if (paf
&& paf
->subgroup
6737 && CHECK_FLAG(paf
->subgroup
->sflags
,
6738 SUBGRP_STATUS_DEFAULT_ORIGINATE
))
6739 UNSET_FLAG(paf
->subgroup
->sflags
,
6740 SUBGRP_STATUS_DEFAULT_ORIGINATE
);
6742 bgp_announce_route(peer
, afi
, safi
);
6745 if (stype
== BGP_CLEAR_SOFT_IN_ORF_PREFIX
) {
6746 if (CHECK_FLAG(peer
->af_cap
[afi
][safi
],
6747 PEER_CAP_ORF_PREFIX_SM_ADV
)
6748 && (CHECK_FLAG(peer
->af_cap
[afi
][safi
],
6749 PEER_CAP_ORF_PREFIX_RM_RCV
)
6750 || CHECK_FLAG(peer
->af_cap
[afi
][safi
],
6751 PEER_CAP_ORF_PREFIX_RM_OLD_RCV
))) {
6752 struct bgp_filter
*filter
= &peer
->filter
[afi
][safi
];
6753 uint8_t prefix_type
;
6755 if (CHECK_FLAG(peer
->af_cap
[afi
][safi
],
6756 PEER_CAP_ORF_PREFIX_RM_RCV
))
6757 prefix_type
= ORF_TYPE_PREFIX
;
6759 prefix_type
= ORF_TYPE_PREFIX_OLD
;
6761 if (filter
->plist
[FILTER_IN
].plist
) {
6762 if (CHECK_FLAG(peer
->af_sflags
[afi
][safi
],
6763 PEER_STATUS_ORF_PREFIX_SEND
))
6764 bgp_route_refresh_send(
6765 peer
, afi
, safi
, prefix_type
,
6767 bgp_route_refresh_send(peer
, afi
, safi
,
6769 REFRESH_IMMEDIATE
, 0);
6771 if (CHECK_FLAG(peer
->af_sflags
[afi
][safi
],
6772 PEER_STATUS_ORF_PREFIX_SEND
))
6773 bgp_route_refresh_send(
6774 peer
, afi
, safi
, prefix_type
,
6775 REFRESH_IMMEDIATE
, 1);
6777 bgp_route_refresh_send(peer
, afi
, safi
,
6784 if (stype
== BGP_CLEAR_SOFT_IN
|| stype
== BGP_CLEAR_SOFT_BOTH
6785 || stype
== BGP_CLEAR_SOFT_IN_ORF_PREFIX
) {
6786 /* If neighbor has soft reconfiguration inbound flag.
6787 Use Adj-RIB-In database. */
6788 if (CHECK_FLAG(peer
->af_flags
[afi
][safi
],
6789 PEER_FLAG_SOFT_RECONFIG
))
6790 bgp_soft_reconfig_in(peer
, afi
, safi
);
6792 /* If neighbor has route refresh capability, send route
6794 message to the peer. */
6795 if (CHECK_FLAG(peer
->cap
, PEER_CAP_REFRESH_OLD_RCV
)
6796 || CHECK_FLAG(peer
->cap
, PEER_CAP_REFRESH_NEW_RCV
))
6797 bgp_route_refresh_send(peer
, afi
, safi
, 0, 0,
6800 return BGP_ERR_SOFT_RECONFIG_UNCONFIGURED
;
6806 /* Display peer uptime.*/
6807 char *peer_uptime(time_t uptime2
, char *buf
, size_t len
, uint8_t use_json
,
6810 time_t uptime1
, epoch_tbuf
;
6813 /* Check buffer length. */
6814 if (len
< BGP_UPTIME_LEN
) {
6816 zlog_warn("peer_uptime (): buffer shortage %lu",
6817 (unsigned long)len
);
6818 /* XXX: should return status instead of buf... */
6819 snprintf(buf
, len
, "<error> ");
6824 /* If there is no connection has been done before print `never'. */
6827 json_object_string_add(json
, "peerUptime", "never");
6828 json_object_int_add(json
, "peerUptimeMsec", 0);
6830 snprintf(buf
, len
, "never");
6834 /* Get current time. */
6835 uptime1
= bgp_clock();
6837 tm
= gmtime(&uptime1
);
6839 if (uptime1
< ONE_DAY_SECOND
)
6840 snprintf(buf
, len
, "%02d:%02d:%02d", tm
->tm_hour
, tm
->tm_min
,
6842 else if (uptime1
< ONE_WEEK_SECOND
)
6843 snprintf(buf
, len
, "%dd%02dh%02dm", tm
->tm_yday
, tm
->tm_hour
,
6845 else if (uptime1
< ONE_YEAR_SECOND
)
6846 snprintf(buf
, len
, "%02dw%dd%02dh", tm
->tm_yday
/ 7,
6847 tm
->tm_yday
- ((tm
->tm_yday
/ 7) * 7), tm
->tm_hour
);
6849 snprintf(buf
, len
, "%02dy%02dw%dd", tm
->tm_year
- 70,
6851 tm
->tm_yday
- ((tm
->tm_yday
/ 7) * 7));
6854 epoch_tbuf
= time(NULL
) - uptime1
;
6855 json_object_string_add(json
, "peerUptime", buf
);
6856 json_object_int_add(json
, "peerUptimeMsec", uptime1
* 1000);
6857 json_object_int_add(json
, "peerUptimeEstablishedEpoch",
6864 static void bgp_config_write_filter(struct vty
*vty
, struct peer
*peer
,
6865 afi_t afi
, safi_t safi
)
6867 struct bgp_filter
*filter
;
6871 filter
= &peer
->filter
[afi
][safi
];
6873 /* distribute-list. */
6874 if (peergroup_filter_check(peer
, afi
, safi
, PEER_FT_DISTRIBUTE_LIST
,
6876 vty_out(vty
, " neighbor %s distribute-list %s in\n", addr
,
6877 filter
->dlist
[FILTER_IN
].name
);
6879 if (peergroup_filter_check(peer
, afi
, safi
, PEER_FT_DISTRIBUTE_LIST
,
6881 vty_out(vty
, " neighbor %s distribute-list %s out\n", addr
,
6882 filter
->dlist
[FILTER_OUT
].name
);
6885 if (peergroup_filter_check(peer
, afi
, safi
, PEER_FT_PREFIX_LIST
,
6887 vty_out(vty
, " neighbor %s prefix-list %s in\n", addr
,
6888 filter
->plist
[FILTER_IN
].name
);
6890 if (peergroup_filter_check(peer
, afi
, safi
, PEER_FT_PREFIX_LIST
,
6892 vty_out(vty
, " neighbor %s prefix-list %s out\n", addr
,
6893 filter
->plist
[FILTER_OUT
].name
);
6896 if (peergroup_filter_check(peer
, afi
, safi
, PEER_FT_ROUTE_MAP
, RMAP_IN
))
6897 vty_out(vty
, " neighbor %s route-map %s in\n", addr
,
6898 filter
->map
[RMAP_IN
].name
);
6900 if (peergroup_filter_check(peer
, afi
, safi
, PEER_FT_ROUTE_MAP
,
6902 vty_out(vty
, " neighbor %s route-map %s out\n", addr
,
6903 filter
->map
[RMAP_OUT
].name
);
6905 /* unsuppress-map */
6906 if (peergroup_filter_check(peer
, afi
, safi
, PEER_FT_UNSUPPRESS_MAP
, 0))
6907 vty_out(vty
, " neighbor %s unsuppress-map %s\n", addr
,
6908 filter
->usmap
.name
);
6911 if (peergroup_filter_check(peer
, afi
, safi
, PEER_FT_FILTER_LIST
,
6913 vty_out(vty
, " neighbor %s filter-list %s in\n", addr
,
6914 filter
->aslist
[FILTER_IN
].name
);
6916 if (peergroup_filter_check(peer
, afi
, safi
, PEER_FT_FILTER_LIST
,
6918 vty_out(vty
, " neighbor %s filter-list %s out\n", addr
,
6919 filter
->aslist
[FILTER_OUT
].name
);
6922 /* BGP peer configuration display function. */
6923 static void bgp_config_write_peer_global(struct vty
*vty
, struct bgp
*bgp
,
6926 struct peer
*g_peer
= NULL
;
6927 char buf
[SU_ADDRSTRLEN
];
6929 int if_pg_printed
= FALSE
;
6930 int if_ras_printed
= FALSE
;
6932 /* Skip dynamic neighbors. */
6933 if (peer_dynamic_neighbor(peer
))
6937 addr
= peer
->conf_if
;
6941 /************************************
6942 ****** Global to the neighbor ******
6943 ************************************/
6944 if (peer
->conf_if
) {
6945 if (CHECK_FLAG(peer
->flags
, PEER_FLAG_IFPEER_V6ONLY
))
6946 vty_out(vty
, " neighbor %s interface v6only", addr
);
6948 vty_out(vty
, " neighbor %s interface", addr
);
6950 if (peer_group_active(peer
)) {
6951 vty_out(vty
, " peer-group %s", peer
->group
->name
);
6952 if_pg_printed
= TRUE
;
6953 } else if (peer
->as_type
== AS_SPECIFIED
) {
6954 vty_out(vty
, " remote-as %u", peer
->as
);
6955 if_ras_printed
= TRUE
;
6956 } else if (peer
->as_type
== AS_INTERNAL
) {
6957 vty_out(vty
, " remote-as internal");
6958 if_ras_printed
= TRUE
;
6959 } else if (peer
->as_type
== AS_EXTERNAL
) {
6960 vty_out(vty
, " remote-as external");
6961 if_ras_printed
= TRUE
;
6967 /* remote-as and peer-group */
6968 /* peer is a member of a peer-group */
6969 if (peer_group_active(peer
)) {
6970 g_peer
= peer
->group
->conf
;
6972 if (g_peer
->as_type
== AS_UNSPECIFIED
&& !if_ras_printed
) {
6973 if (peer
->as_type
== AS_SPECIFIED
) {
6974 vty_out(vty
, " neighbor %s remote-as %u\n",
6976 } else if (peer
->as_type
== AS_INTERNAL
) {
6978 " neighbor %s remote-as internal\n",
6980 } else if (peer
->as_type
== AS_EXTERNAL
) {
6982 " neighbor %s remote-as external\n",
6987 /* For swpX peers we displayed the peer-group
6988 * via 'neighbor swpX interface peer-group WORD' */
6990 vty_out(vty
, " neighbor %s peer-group %s\n", addr
,
6994 /* peer is NOT a member of a peer-group */
6996 /* peer is a peer-group, declare the peer-group */
6997 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6998 vty_out(vty
, " neighbor %s peer-group\n", addr
);
7001 if (!if_ras_printed
) {
7002 if (peer
->as_type
== AS_SPECIFIED
) {
7003 vty_out(vty
, " neighbor %s remote-as %u\n",
7005 } else if (peer
->as_type
== AS_INTERNAL
) {
7007 " neighbor %s remote-as internal\n",
7009 } else if (peer
->as_type
== AS_EXTERNAL
) {
7011 " neighbor %s remote-as external\n",
7018 if (peergroup_flag_check(peer
, PEER_FLAG_LOCAL_AS
)) {
7019 vty_out(vty
, " neighbor %s local-as %u", addr
,
7020 peer
->change_local_as
);
7021 if (peergroup_flag_check(peer
, PEER_FLAG_LOCAL_AS_NO_PREPEND
))
7022 vty_out(vty
, " no-prepend");
7023 if (peergroup_flag_check(peer
, PEER_FLAG_LOCAL_AS_REPLACE_AS
))
7024 vty_out(vty
, " replace-as");
7030 vty_out(vty
, " neighbor %s description %s\n", addr
, peer
->desc
);
7034 if (peergroup_flag_check(peer
, PEER_FLAG_SHUTDOWN
)) {
7035 if (peer
->tx_shutdown_message
)
7036 vty_out(vty
, " neighbor %s shutdown message %s\n", addr
,
7037 peer
->tx_shutdown_message
);
7039 vty_out(vty
, " neighbor %s shutdown\n", addr
);
7043 if (peer
->bfd_info
) {
7044 if (!peer_group_active(peer
) || !g_peer
->bfd_info
) {
7045 bgp_bfd_peer_config_write(vty
, peer
, addr
);
7050 if (peergroup_flag_check(peer
, PEER_FLAG_PASSWORD
))
7051 vty_out(vty
, " neighbor %s password %s\n", addr
,
7055 if (CHECK_FLAG(peer
->flags
, PEER_FLAG_LONESOUL
)) {
7056 if (!peer_group_active(peer
)) {
7057 vty_out(vty
, " neighbor %s solo\n", addr
);
7062 if (peer
->port
!= BGP_PORT_DEFAULT
) {
7063 vty_out(vty
, " neighbor %s port %d\n", addr
, peer
->port
);
7066 /* Local interface name */
7068 vty_out(vty
, " neighbor %s interface %s\n", addr
, peer
->ifname
);
7072 if (peergroup_flag_check(peer
, PEER_FLAG_PASSIVE
))
7073 vty_out(vty
, " neighbor %s passive\n", addr
);
7076 if (peer
->sort
!= BGP_PEER_IBGP
&& peer
->ttl
!= 1
7077 && !(peer
->gtsm_hops
!= 0 && peer
->ttl
== MAXTTL
)) {
7078 if (!peer_group_active(peer
) || g_peer
->ttl
!= peer
->ttl
) {
7079 vty_out(vty
, " neighbor %s ebgp-multihop %d\n", addr
,
7084 /* ttl-security hops */
7085 if (peer
->gtsm_hops
!= 0) {
7086 if (!peer_group_active(peer
)
7087 || g_peer
->gtsm_hops
!= peer
->gtsm_hops
) {
7088 vty_out(vty
, " neighbor %s ttl-security hops %d\n",
7089 addr
, peer
->gtsm_hops
);
7093 /* disable-connected-check */
7094 if (peergroup_flag_check(peer
, PEER_FLAG_DISABLE_CONNECTED_CHECK
))
7095 vty_out(vty
, " neighbor %s disable-connected-check\n", addr
);
7097 /* enforce-first-as */
7098 if (peergroup_flag_check(peer
, PEER_FLAG_ENFORCE_FIRST_AS
))
7099 vty_out(vty
, " neighbor %s enforce-first-as\n", addr
);
7102 if (peergroup_flag_check(peer
, PEER_FLAG_UPDATE_SOURCE
)) {
7103 if (peer
->update_source
)
7104 vty_out(vty
, " neighbor %s update-source %s\n", addr
,
7105 sockunion2str(peer
->update_source
, buf
,
7107 else if (peer
->update_if
)
7108 vty_out(vty
, " neighbor %s update-source %s\n", addr
,
7112 /* advertisement-interval */
7113 if (peergroup_flag_check(peer
, PEER_FLAG_ROUTEADV
))
7114 vty_out(vty
, " neighbor %s advertisement-interval %u\n", addr
,
7118 if (peergroup_flag_check(peer
, PEER_FLAG_TIMER
))
7119 vty_out(vty
, " neighbor %s timers %u %u\n", addr
,
7120 peer
->keepalive
, peer
->holdtime
);
7122 /* timers connect */
7123 if (peergroup_flag_check(peer
, PEER_FLAG_TIMER_CONNECT
))
7124 vty_out(vty
, " neighbor %s timers connect %u\n", addr
,
7127 /* capability dynamic */
7128 if (peergroup_flag_check(peer
, PEER_FLAG_DYNAMIC_CAPABILITY
))
7129 vty_out(vty
, " neighbor %s capability dynamic\n", addr
);
7131 /* capability extended-nexthop */
7132 if (peergroup_flag_check(peer
, PEER_FLAG_CAPABILITY_ENHE
)) {
7133 if (CHECK_FLAG(peer
->flags_invert
, PEER_FLAG_CAPABILITY_ENHE
))
7135 " no neighbor %s capability extended-nexthop\n",
7139 " neighbor %s capability extended-nexthop\n",
7143 /* dont-capability-negotiation */
7144 if (peergroup_flag_check(peer
, PEER_FLAG_DONT_CAPABILITY
))
7145 vty_out(vty
, " neighbor %s dont-capability-negotiate\n", addr
);
7147 /* override-capability */
7148 if (peergroup_flag_check(peer
, PEER_FLAG_OVERRIDE_CAPABILITY
))
7149 vty_out(vty
, " neighbor %s override-capability\n", addr
);
7151 /* strict-capability-match */
7152 if (peergroup_flag_check(peer
, PEER_FLAG_STRICT_CAP_MATCH
))
7153 vty_out(vty
, " neighbor %s strict-capability-match\n", addr
);
7156 /* BGP peer configuration display function. */
7157 static void bgp_config_write_peer_af(struct vty
*vty
, struct bgp
*bgp
,
7158 struct peer
*peer
, afi_t afi
, safi_t safi
)
7160 struct peer
*g_peer
= NULL
;
7162 bool flag_scomm
, flag_secomm
, flag_slcomm
;
7164 /* Skip dynamic neighbors. */
7165 if (peer_dynamic_neighbor(peer
))
7169 addr
= peer
->conf_if
;
7173 /************************************
7174 ****** Per AF to the neighbor ******
7175 ************************************/
7176 if (peer_group_active(peer
)) {
7177 g_peer
= peer
->group
->conf
;
7179 /* If the peer-group is active but peer is not, print a 'no
7181 if (g_peer
->afc
[afi
][safi
] && !peer
->afc
[afi
][safi
]) {
7182 vty_out(vty
, " no neighbor %s activate\n", addr
);
7185 /* If the peer-group is not active but peer is, print an
7187 else if (!g_peer
->afc
[afi
][safi
] && peer
->afc
[afi
][safi
]) {
7188 vty_out(vty
, " neighbor %s activate\n", addr
);
7191 if (peer
->afc
[afi
][safi
]) {
7192 if ((afi
== AFI_IP
) && (safi
== SAFI_UNICAST
)) {
7193 if (bgp_flag_check(bgp
,
7194 BGP_FLAG_NO_DEFAULT_IPV4
)) {
7195 vty_out(vty
, " neighbor %s activate\n",
7199 vty_out(vty
, " neighbor %s activate\n", addr
);
7201 if ((afi
== AFI_IP
) && (safi
== SAFI_UNICAST
)) {
7202 if (!bgp_flag_check(bgp
,
7203 BGP_FLAG_NO_DEFAULT_IPV4
)) {
7205 " no neighbor %s activate\n",
7212 /* addpath TX knobs */
7213 if (peergroup_af_flag_check(peer
, afi
, safi
,
7214 PEER_FLAG_ADDPATH_TX_ALL_PATHS
)) {
7215 vty_out(vty
, " neighbor %s addpath-tx-all-paths\n", addr
);
7218 if (peergroup_af_flag_check(peer
, afi
, safi
,
7219 PEER_FLAG_ADDPATH_TX_BESTPATH_PER_AS
)) {
7220 vty_out(vty
, " neighbor %s addpath-tx-bestpath-per-AS\n",
7224 /* ORF capability. */
7225 if (peergroup_af_flag_check(peer
, afi
, safi
, PEER_FLAG_ORF_PREFIX_SM
)
7226 || peergroup_af_flag_check(peer
, afi
, safi
,
7227 PEER_FLAG_ORF_PREFIX_RM
)) {
7228 vty_out(vty
, " neighbor %s capability orf prefix-list", addr
);
7230 if (peergroup_af_flag_check(peer
, afi
, safi
,
7231 PEER_FLAG_ORF_PREFIX_SM
)
7232 && peergroup_af_flag_check(peer
, afi
, safi
,
7233 PEER_FLAG_ORF_PREFIX_RM
))
7234 vty_out(vty
, " both");
7235 else if (peergroup_af_flag_check(peer
, afi
, safi
,
7236 PEER_FLAG_ORF_PREFIX_SM
))
7237 vty_out(vty
, " send");
7239 vty_out(vty
, " receive");
7243 /* Route reflector client. */
7244 if (peergroup_af_flag_check(peer
, afi
, safi
,
7245 PEER_FLAG_REFLECTOR_CLIENT
)) {
7246 vty_out(vty
, " neighbor %s route-reflector-client\n", addr
);
7249 /* next-hop-self force */
7250 if (peergroup_af_flag_check(peer
, afi
, safi
,
7251 PEER_FLAG_FORCE_NEXTHOP_SELF
)) {
7252 vty_out(vty
, " neighbor %s next-hop-self force\n", addr
);
7256 if (peergroup_af_flag_check(peer
, afi
, safi
, PEER_FLAG_NEXTHOP_SELF
)) {
7257 vty_out(vty
, " neighbor %s next-hop-self\n", addr
);
7260 /* remove-private-AS */
7261 if (peergroup_af_flag_check(peer
, afi
, safi
,
7262 PEER_FLAG_REMOVE_PRIVATE_AS_ALL_REPLACE
)) {
7263 vty_out(vty
, " neighbor %s remove-private-AS all replace-AS\n",
7267 else if (peergroup_af_flag_check(peer
, afi
, safi
,
7268 PEER_FLAG_REMOVE_PRIVATE_AS_REPLACE
)) {
7269 vty_out(vty
, " neighbor %s remove-private-AS replace-AS\n",
7273 else if (peergroup_af_flag_check(peer
, afi
, safi
,
7274 PEER_FLAG_REMOVE_PRIVATE_AS_ALL
)) {
7275 vty_out(vty
, " neighbor %s remove-private-AS all\n", addr
);
7278 else if (peergroup_af_flag_check(peer
, afi
, safi
,
7279 PEER_FLAG_REMOVE_PRIVATE_AS
)) {
7280 vty_out(vty
, " neighbor %s remove-private-AS\n", addr
);
7284 if (peergroup_af_flag_check(peer
, afi
, safi
, PEER_FLAG_AS_OVERRIDE
)) {
7285 vty_out(vty
, " neighbor %s as-override\n", addr
);
7288 /* send-community print. */
7289 flag_scomm
= peergroup_af_flag_check(peer
, afi
, safi
,
7290 PEER_FLAG_SEND_COMMUNITY
);
7291 flag_secomm
= peergroup_af_flag_check(peer
, afi
, safi
,
7292 PEER_FLAG_SEND_EXT_COMMUNITY
);
7293 flag_slcomm
= peergroup_af_flag_check(peer
, afi
, safi
,
7294 PEER_FLAG_SEND_LARGE_COMMUNITY
);
7296 if (!bgp_option_check(BGP_OPT_CONFIG_CISCO
)) {
7297 if (flag_scomm
&& flag_secomm
&& flag_slcomm
) {
7298 vty_out(vty
, " no neighbor %s send-community all\n",
7303 " no neighbor %s send-community\n",
7307 " no neighbor %s send-community extended\n",
7312 " no neighbor %s send-community large\n",
7316 if (flag_scomm
&& flag_secomm
&& flag_slcomm
) {
7317 vty_out(vty
, " neighbor %s send-community all\n",
7319 } else if (flag_scomm
&& flag_secomm
) {
7320 vty_out(vty
, " neighbor %s send-community both\n",
7324 vty_out(vty
, " neighbor %s send-community\n",
7328 " neighbor %s send-community extended\n",
7332 " neighbor %s send-community large\n",
7337 /* Default information */
7338 if (peergroup_af_flag_check(peer
, afi
, safi
,
7339 PEER_FLAG_DEFAULT_ORIGINATE
)) {
7340 vty_out(vty
, " neighbor %s default-originate", addr
);
7342 if (peer
->default_rmap
[afi
][safi
].name
)
7343 vty_out(vty
, " route-map %s",
7344 peer
->default_rmap
[afi
][safi
].name
);
7349 /* Soft reconfiguration inbound. */
7350 if (peergroup_af_flag_check(peer
, afi
, safi
, PEER_FLAG_SOFT_RECONFIG
)) {
7351 vty_out(vty
, " neighbor %s soft-reconfiguration inbound\n",
7355 /* maximum-prefix. */
7356 if (peergroup_af_flag_check(peer
, afi
, safi
, PEER_FLAG_MAX_PREFIX
)) {
7357 vty_out(vty
, " neighbor %s maximum-prefix %lu", addr
,
7358 peer
->pmax
[afi
][safi
]);
7360 if (peer
->pmax_threshold
[afi
][safi
]
7361 != MAXIMUM_PREFIX_THRESHOLD_DEFAULT
)
7362 vty_out(vty
, " %u", peer
->pmax_threshold
[afi
][safi
]);
7363 if (peer_af_flag_check(peer
, afi
, safi
,
7364 PEER_FLAG_MAX_PREFIX_WARNING
))
7365 vty_out(vty
, " warning-only");
7366 if (peer
->pmax_restart
[afi
][safi
])
7367 vty_out(vty
, " restart %u",
7368 peer
->pmax_restart
[afi
][safi
]);
7373 /* Route server client. */
7374 if (peergroup_af_flag_check(peer
, afi
, safi
,
7375 PEER_FLAG_RSERVER_CLIENT
)) {
7376 vty_out(vty
, " neighbor %s route-server-client\n", addr
);
7379 /* Nexthop-local unchanged. */
7380 if (peergroup_af_flag_check(peer
, afi
, safi
,
7381 PEER_FLAG_NEXTHOP_LOCAL_UNCHANGED
)) {
7382 vty_out(vty
, " neighbor %s nexthop-local unchanged\n", addr
);
7385 /* allowas-in <1-10> */
7386 if (peergroup_af_flag_check(peer
, afi
, safi
, PEER_FLAG_ALLOWAS_IN
)) {
7387 if (peer_af_flag_check(peer
, afi
, safi
,
7388 PEER_FLAG_ALLOWAS_IN_ORIGIN
)) {
7389 vty_out(vty
, " neighbor %s allowas-in origin\n", addr
);
7390 } else if (peer
->allowas_in
[afi
][safi
] == 3) {
7391 vty_out(vty
, " neighbor %s allowas-in\n", addr
);
7393 vty_out(vty
, " neighbor %s allowas-in %d\n", addr
,
7394 peer
->allowas_in
[afi
][safi
]);
7399 if (peergroup_af_flag_check(peer
, afi
, safi
, PEER_FLAG_WEIGHT
))
7400 vty_out(vty
, " neighbor %s weight %lu\n", addr
,
7401 peer
->weight
[afi
][safi
]);
7404 bgp_config_write_filter(vty
, peer
, afi
, safi
);
7406 /* atribute-unchanged. */
7407 if (peer_af_flag_check(peer
, afi
, safi
, PEER_FLAG_AS_PATH_UNCHANGED
)
7408 || (safi
!= SAFI_EVPN
7409 && peer_af_flag_check(peer
, afi
, safi
,
7410 PEER_FLAG_NEXTHOP_UNCHANGED
))
7411 || peer_af_flag_check(peer
, afi
, safi
, PEER_FLAG_MED_UNCHANGED
)) {
7413 if (!peer_group_active(peer
)
7414 || peergroup_af_flag_check(peer
, afi
, safi
,
7415 PEER_FLAG_AS_PATH_UNCHANGED
)
7416 || peergroup_af_flag_check(peer
, afi
, safi
,
7417 PEER_FLAG_NEXTHOP_UNCHANGED
)
7418 || peergroup_af_flag_check(peer
, afi
, safi
,
7419 PEER_FLAG_MED_UNCHANGED
)) {
7422 " neighbor %s attribute-unchanged%s%s%s\n",
7424 peer_af_flag_check(peer
, afi
, safi
,
7425 PEER_FLAG_AS_PATH_UNCHANGED
)
7428 peer_af_flag_check(peer
, afi
, safi
,
7429 PEER_FLAG_NEXTHOP_UNCHANGED
)
7432 peer_af_flag_check(peer
, afi
, safi
,
7433 PEER_FLAG_MED_UNCHANGED
)
7440 /* Address family based peer configuration display. */
7441 static void bgp_config_write_family(struct vty
*vty
, struct bgp
*bgp
, afi_t afi
,
7445 struct peer_group
*group
;
7446 struct listnode
*node
, *nnode
;
7449 vty_frame(vty
, " !\n address-family ");
7450 if (afi
== AFI_IP
) {
7451 if (safi
== SAFI_UNICAST
)
7452 vty_frame(vty
, "ipv4 unicast");
7453 else if (safi
== SAFI_LABELED_UNICAST
)
7454 vty_frame(vty
, "ipv4 labeled-unicast");
7455 else if (safi
== SAFI_MULTICAST
)
7456 vty_frame(vty
, "ipv4 multicast");
7457 else if (safi
== SAFI_MPLS_VPN
)
7458 vty_frame(vty
, "ipv4 vpn");
7459 else if (safi
== SAFI_ENCAP
)
7460 vty_frame(vty
, "ipv4 encap");
7461 else if (safi
== SAFI_FLOWSPEC
)
7462 vty_frame(vty
, "ipv4 flowspec");
7463 } else if (afi
== AFI_IP6
) {
7464 if (safi
== SAFI_UNICAST
)
7465 vty_frame(vty
, "ipv6 unicast");
7466 else if (safi
== SAFI_LABELED_UNICAST
)
7467 vty_frame(vty
, "ipv6 labeled-unicast");
7468 else if (safi
== SAFI_MULTICAST
)
7469 vty_frame(vty
, "ipv6 multicast");
7470 else if (safi
== SAFI_MPLS_VPN
)
7471 vty_frame(vty
, "ipv6 vpn");
7472 else if (safi
== SAFI_ENCAP
)
7473 vty_frame(vty
, "ipv6 encap");
7474 else if (safi
== SAFI_FLOWSPEC
)
7475 vty_frame(vty
, "ipv6 flowspec");
7476 } else if (afi
== AFI_L2VPN
) {
7477 if (safi
== SAFI_EVPN
)
7478 vty_frame(vty
, "l2vpn evpn");
7480 vty_frame(vty
, "\n");
7482 bgp_config_write_distance(vty
, bgp
, afi
, safi
);
7484 bgp_config_write_network(vty
, bgp
, afi
, safi
);
7486 bgp_config_write_redistribute(vty
, bgp
, afi
, safi
);
7488 for (ALL_LIST_ELEMENTS(bgp
->group
, node
, nnode
, group
))
7489 bgp_config_write_peer_af(vty
, bgp
, group
->conf
, afi
, safi
);
7491 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
7492 /* Skip dynamic neighbors. */
7493 if (peer_dynamic_neighbor(peer
))
7496 /* Do not display doppelganger peers */
7497 if (CHECK_FLAG(peer
->flags
, PEER_FLAG_CONFIG_NODE
))
7498 bgp_config_write_peer_af(vty
, bgp
, peer
, afi
, safi
);
7501 bgp_config_write_maxpaths(vty
, bgp
, afi
, safi
);
7502 bgp_config_write_table_map(vty
, bgp
, afi
, safi
);
7504 if (safi
== SAFI_EVPN
)
7505 bgp_config_write_evpn_info(vty
, bgp
, afi
, safi
);
7507 if (safi
== SAFI_FLOWSPEC
)
7508 bgp_fs_config_write_pbr(vty
, bgp
, afi
, safi
);
7510 if (safi
== SAFI_UNICAST
) {
7511 bgp_vpn_policy_config_write_afi(vty
, bgp
, afi
);
7512 if (CHECK_FLAG(bgp
->af_flags
[afi
][safi
],
7513 BGP_CONFIG_VRF_TO_MPLSVPN_EXPORT
)) {
7515 vty_out(vty
, " export vpn\n");
7517 if (CHECK_FLAG(bgp
->af_flags
[afi
][safi
],
7518 BGP_CONFIG_MPLSVPN_TO_VRF_IMPORT
)) {
7520 vty_out(vty
, " import vpn\n");
7522 if (CHECK_FLAG(bgp
->af_flags
[afi
][safi
],
7523 BGP_CONFIG_VRF_TO_VRF_IMPORT
)) {
7524 struct listnode
*node
;
7527 for (ALL_LIST_ELEMENTS_RO(
7528 bgp
->vpn_policy
[afi
].import_vrf
, node
,
7530 vty_out(vty
, " import vrf %s\n", name
);
7534 vty_endframe(vty
, " exit-address-family\n");
7537 /* clang-format off */
7538 #if defined(VERSION_TYPE_DEV) && CONFDATE > 20180517
7539 CPP_NOTICE("bgpd: remove 'bgp enforce-first-as' config migration from bgp_config_write")
7541 /* clang-format on */
7543 int bgp_config_write(struct vty
*vty
)
7547 struct peer_group
*group
;
7549 struct listnode
*node
, *nnode
;
7550 struct listnode
*mnode
, *mnnode
;
7552 /* BGP Multiple instance. */
7553 if (!bgp_option_check(BGP_OPT_MULTIPLE_INSTANCE
)) {
7554 vty_out(vty
, "no bgp multiple-instance\n");
7558 /* BGP Config type. */
7559 if (bgp_option_check(BGP_OPT_CONFIG_CISCO
)) {
7560 vty_out(vty
, "bgp config-type cisco\n");
7564 if (bm
->rmap_update_timer
!= RMAP_DEFAULT_UPDATE_TIMER
)
7565 vty_out(vty
, "bgp route-map delay-timer %u\n",
7566 bm
->rmap_update_timer
);
7569 vty_out(vty
, "!\n");
7571 /* BGP configuration. */
7572 for (ALL_LIST_ELEMENTS(bm
->bgp
, mnode
, mnnode
, bgp
)) {
7574 /* skip all auto created vrf as they dont have user config */
7575 if (CHECK_FLAG(bgp
->vrf_flags
, BGP_VRF_AUTO
))
7578 /* Migrate deprecated 'bgp enforce-first-as'
7579 * config to 'neighbor * enforce-first-as' configs
7581 if (bgp_flag_check(bgp
, BGP_FLAG_ENFORCE_FIRST_AS
)) {
7582 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
))
7583 peer_flag_set(peer
, PEER_FLAG_ENFORCE_FIRST_AS
);
7584 bgp_flag_unset(bgp
, BGP_FLAG_ENFORCE_FIRST_AS
);
7587 /* Router bgp ASN */
7588 vty_out(vty
, "router bgp %u", bgp
->as
);
7590 if (bgp_option_check(BGP_OPT_MULTIPLE_INSTANCE
)) {
7592 vty_out(vty
, " %s %s",
7594 == BGP_INSTANCE_TYPE_VIEW
)
7601 /* No Synchronization */
7602 if (bgp_option_check(BGP_OPT_CONFIG_CISCO
))
7603 vty_out(vty
, " no synchronization\n");
7605 /* BGP fast-external-failover. */
7606 if (CHECK_FLAG(bgp
->flags
, BGP_FLAG_NO_FAST_EXT_FAILOVER
))
7607 vty_out(vty
, " no bgp fast-external-failover\n");
7609 /* BGP router ID. */
7610 if (bgp
->router_id_static
.s_addr
!= 0)
7611 vty_out(vty
, " bgp router-id %s\n",
7612 inet_ntoa(bgp
->router_id_static
));
7614 /* BGP log-neighbor-changes. */
7615 if (!!bgp_flag_check(bgp
, BGP_FLAG_LOG_NEIGHBOR_CHANGES
)
7616 != DFLT_BGP_LOG_NEIGHBOR_CHANGES
)
7617 vty_out(vty
, " %sbgp log-neighbor-changes\n",
7619 BGP_FLAG_LOG_NEIGHBOR_CHANGES
)
7623 /* BGP configuration. */
7624 if (bgp_flag_check(bgp
, BGP_FLAG_ALWAYS_COMPARE_MED
))
7625 vty_out(vty
, " bgp always-compare-med\n");
7627 /* BGP default ipv4-unicast. */
7628 if (bgp_flag_check(bgp
, BGP_FLAG_NO_DEFAULT_IPV4
))
7629 vty_out(vty
, " no bgp default ipv4-unicast\n");
7631 /* BGP default local-preference. */
7632 if (bgp
->default_local_pref
!= BGP_DEFAULT_LOCAL_PREF
)
7633 vty_out(vty
, " bgp default local-preference %u\n",
7634 bgp
->default_local_pref
);
7636 /* BGP default show-hostname */
7637 if (!!bgp_flag_check(bgp
, BGP_FLAG_SHOW_HOSTNAME
)
7638 != DFLT_BGP_SHOW_HOSTNAME
)
7639 vty_out(vty
, " %sbgp default show-hostname\n",
7640 bgp_flag_check(bgp
, BGP_FLAG_SHOW_HOSTNAME
)
7644 /* BGP default subgroup-pkt-queue-max. */
7645 if (bgp
->default_subgroup_pkt_queue_max
7646 != BGP_DEFAULT_SUBGROUP_PKT_QUEUE_MAX
)
7647 vty_out(vty
, " bgp default subgroup-pkt-queue-max %u\n",
7648 bgp
->default_subgroup_pkt_queue_max
);
7650 /* BGP default autoshutdown neighbors */
7651 if (bgp
->autoshutdown
)
7652 vty_out(vty
, " bgp default shutdown\n");
7654 /* BGP client-to-client reflection. */
7655 if (bgp_flag_check(bgp
, BGP_FLAG_NO_CLIENT_TO_CLIENT
))
7656 vty_out(vty
, " no bgp client-to-client reflection\n");
7658 /* BGP cluster ID. */
7659 if (CHECK_FLAG(bgp
->config
, BGP_CONFIG_CLUSTER_ID
))
7660 vty_out(vty
, " bgp cluster-id %s\n",
7661 inet_ntoa(bgp
->cluster_id
));
7663 /* Disable ebgp connected nexthop check */
7664 if (bgp_flag_check(bgp
, BGP_FLAG_DISABLE_NH_CONNECTED_CHK
))
7666 " bgp disable-ebgp-connected-route-check\n");
7668 /* Confederation identifier*/
7669 if (CHECK_FLAG(bgp
->config
, BGP_CONFIG_CONFEDERATION
))
7670 vty_out(vty
, " bgp confederation identifier %i\n",
7673 /* Confederation peer */
7674 if (bgp
->confed_peers_cnt
> 0) {
7677 vty_out(vty
, " bgp confederation peers");
7679 for (i
= 0; i
< bgp
->confed_peers_cnt
; i
++)
7680 vty_out(vty
, " %u", bgp
->confed_peers
[i
]);
7685 /* BGP deterministic-med. */
7686 if (!!bgp_flag_check(bgp
, BGP_FLAG_DETERMINISTIC_MED
)
7687 != DFLT_BGP_DETERMINISTIC_MED
)
7688 vty_out(vty
, " %sbgp deterministic-med\n",
7689 bgp_flag_check(bgp
, BGP_FLAG_DETERMINISTIC_MED
)
7693 /* BGP update-delay. */
7694 bgp_config_write_update_delay(vty
, bgp
);
7696 if (bgp
->v_maxmed_onstartup
7697 != BGP_MAXMED_ONSTARTUP_UNCONFIGURED
) {
7698 vty_out(vty
, " bgp max-med on-startup %u",
7699 bgp
->v_maxmed_onstartup
);
7700 if (bgp
->maxmed_onstartup_value
7701 != BGP_MAXMED_VALUE_DEFAULT
)
7703 bgp
->maxmed_onstartup_value
);
7706 if (bgp
->v_maxmed_admin
!= BGP_MAXMED_ADMIN_UNCONFIGURED
) {
7707 vty_out(vty
, " bgp max-med administrative");
7708 if (bgp
->maxmed_admin_value
!= BGP_MAXMED_VALUE_DEFAULT
)
7709 vty_out(vty
, " %u", bgp
->maxmed_admin_value
);
7714 bgp_config_write_wpkt_quanta(vty
, bgp
);
7716 bgp_config_write_rpkt_quanta(vty
, bgp
);
7719 bgp_config_write_coalesce_time(vty
, bgp
);
7721 /* BGP graceful-restart. */
7722 if (bgp
->stalepath_time
!= BGP_DEFAULT_STALEPATH_TIME
)
7724 " bgp graceful-restart stalepath-time %u\n",
7725 bgp
->stalepath_time
);
7726 if (bgp
->restart_time
!= BGP_DEFAULT_RESTART_TIME
)
7727 vty_out(vty
, " bgp graceful-restart restart-time %u\n",
7729 if (bgp_flag_check(bgp
, BGP_FLAG_GRACEFUL_RESTART
))
7730 vty_out(vty
, " bgp graceful-restart\n");
7732 /* BGP graceful-shutdown */
7733 if (bgp_flag_check(bgp
, BGP_FLAG_GRACEFUL_SHUTDOWN
))
7734 vty_out(vty
, " bgp graceful-shutdown\n");
7736 /* BGP graceful-restart Preserve State F bit. */
7737 if (bgp_flag_check(bgp
, BGP_FLAG_GR_PRESERVE_FWD
))
7739 " bgp graceful-restart preserve-fw-state\n");
7741 /* BGP bestpath method. */
7742 if (bgp_flag_check(bgp
, BGP_FLAG_ASPATH_IGNORE
))
7743 vty_out(vty
, " bgp bestpath as-path ignore\n");
7744 if (bgp_flag_check(bgp
, BGP_FLAG_ASPATH_CONFED
))
7745 vty_out(vty
, " bgp bestpath as-path confed\n");
7747 if (bgp_flag_check(bgp
, BGP_FLAG_ASPATH_MULTIPATH_RELAX
)) {
7748 if (bgp_flag_check(bgp
,
7749 BGP_FLAG_MULTIPATH_RELAX_AS_SET
)) {
7751 " bgp bestpath as-path multipath-relax as-set\n");
7754 " bgp bestpath as-path multipath-relax\n");
7758 if (bgp_flag_check(bgp
, BGP_FLAG_RR_ALLOW_OUTBOUND_POLICY
)) {
7760 " bgp route-reflector allow-outbound-policy\n");
7762 if (bgp_flag_check(bgp
, BGP_FLAG_COMPARE_ROUTER_ID
))
7763 vty_out(vty
, " bgp bestpath compare-routerid\n");
7764 if (bgp_flag_check(bgp
, BGP_FLAG_MED_CONFED
)
7765 || bgp_flag_check(bgp
, BGP_FLAG_MED_MISSING_AS_WORST
)) {
7766 vty_out(vty
, " bgp bestpath med");
7767 if (bgp_flag_check(bgp
, BGP_FLAG_MED_CONFED
))
7768 vty_out(vty
, " confed");
7769 if (bgp_flag_check(bgp
, BGP_FLAG_MED_MISSING_AS_WORST
))
7770 vty_out(vty
, " missing-as-worst");
7774 /* BGP network import check. */
7775 if (!!bgp_flag_check(bgp
, BGP_FLAG_IMPORT_CHECK
)
7776 != DFLT_BGP_IMPORT_CHECK
)
7777 vty_out(vty
, " %sbgp network import-check\n",
7778 bgp_flag_check(bgp
, BGP_FLAG_IMPORT_CHECK
)
7782 /* BGP flag dampening. */
7783 if (CHECK_FLAG(bgp
->af_flags
[AFI_IP
][SAFI_UNICAST
],
7784 BGP_CONFIG_DAMPENING
))
7785 bgp_config_write_damp(vty
);
7787 /* BGP timers configuration. */
7788 if (bgp
->default_keepalive
!= BGP_DEFAULT_KEEPALIVE
7789 && bgp
->default_holdtime
!= BGP_DEFAULT_HOLDTIME
)
7790 vty_out(vty
, " timers bgp %u %u\n",
7791 bgp
->default_keepalive
, bgp
->default_holdtime
);
7794 for (ALL_LIST_ELEMENTS(bgp
->group
, node
, nnode
, group
)) {
7795 bgp_config_write_peer_global(vty
, bgp
, group
->conf
);
7798 /* Normal neighbor configuration. */
7799 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
7800 if (CHECK_FLAG(peer
->flags
, PEER_FLAG_CONFIG_NODE
))
7801 bgp_config_write_peer_global(vty
, bgp
, peer
);
7804 /* listen range and limit for dynamic BGP neighbors */
7805 bgp_config_write_listen(vty
, bgp
);
7807 /* No auto-summary */
7808 if (bgp_option_check(BGP_OPT_CONFIG_CISCO
))
7809 vty_out(vty
, " no auto-summary\n");
7811 /* IPv4 unicast configuration. */
7812 bgp_config_write_family(vty
, bgp
, AFI_IP
, SAFI_UNICAST
);
7814 /* IPv4 multicast configuration. */
7815 bgp_config_write_family(vty
, bgp
, AFI_IP
, SAFI_MULTICAST
);
7817 /* IPv4 labeled-unicast configuration. */
7818 bgp_config_write_family(vty
, bgp
, AFI_IP
, SAFI_LABELED_UNICAST
);
7820 /* IPv4 VPN configuration. */
7821 bgp_config_write_family(vty
, bgp
, AFI_IP
, SAFI_MPLS_VPN
);
7823 /* ENCAPv4 configuration. */
7824 bgp_config_write_family(vty
, bgp
, AFI_IP
, SAFI_ENCAP
);
7826 /* FLOWSPEC v4 configuration. */
7827 bgp_config_write_family(vty
, bgp
, AFI_IP
, SAFI_FLOWSPEC
);
7829 /* IPv6 unicast configuration. */
7830 bgp_config_write_family(vty
, bgp
, AFI_IP6
, SAFI_UNICAST
);
7832 /* IPv6 multicast configuration. */
7833 bgp_config_write_family(vty
, bgp
, AFI_IP6
, SAFI_MULTICAST
);
7835 /* IPv6 labeled-unicast configuration. */
7836 bgp_config_write_family(vty
, bgp
, AFI_IP6
,
7837 SAFI_LABELED_UNICAST
);
7839 /* IPv6 VPN configuration. */
7840 bgp_config_write_family(vty
, bgp
, AFI_IP6
, SAFI_MPLS_VPN
);
7842 /* ENCAPv6 configuration. */
7843 bgp_config_write_family(vty
, bgp
, AFI_IP6
, SAFI_ENCAP
);
7845 /* FLOWSPEC v6 configuration. */
7846 bgp_config_write_family(vty
, bgp
, AFI_IP6
, SAFI_FLOWSPEC
);
7848 /* EVPN configuration. */
7849 bgp_config_write_family(vty
, bgp
, AFI_L2VPN
, SAFI_EVPN
);
7852 bgp_rfapi_cfg_write(vty
, bgp
);
7855 vty_out(vty
, "!\n");
7860 void bgp_master_init(struct thread_master
*master
)
7864 memset(&bgp_master
, 0, sizeof(struct bgp_master
));
7867 bm
->bgp
= list_new();
7868 bm
->listen_sockets
= list_new();
7869 bm
->port
= BGP_PORT_DEFAULT
;
7870 bm
->master
= master
;
7871 bm
->start_time
= bgp_clock();
7872 bm
->t_rmap_update
= NULL
;
7873 bm
->rmap_update_timer
= RMAP_DEFAULT_UPDATE_TIMER
;
7874 bm
->terminating
= false;
7876 bgp_process_queue_init();
7878 /* init the rd id space.
7879 assign 0th index in the bitfield,
7880 so that we start with id 1
7882 bf_init(bm
->rd_idspace
, UINT16_MAX
);
7883 bf_assign_zero_index(bm
->rd_idspace
);
7885 /* Enable multiple instances by default. */
7886 bgp_option_set(BGP_OPT_MULTIPLE_INSTANCE
);
7888 /* mpls label dynamic allocation pool */
7889 bgp_lp_init(bm
->master
, &bm
->labelpool
);
7891 QOBJ_REG(bm
, bgp_master
);
7895 * Free up connected routes and interfaces for a BGP instance. Invoked upon
7896 * instance delete (non-default only) or BGP exit.
7898 static void bgp_if_finish(struct bgp
*bgp
)
7900 struct vrf
*vrf
= vrf_lookup_by_id(bgp
->vrf_id
);
7901 struct interface
*ifp
;
7903 if (bgp
->inst_type
== BGP_INSTANCE_TYPE_VIEW
|| !vrf
)
7906 FOR_ALL_INTERFACES (vrf
, ifp
) {
7907 struct listnode
*c_node
, *c_nnode
;
7908 struct connected
*c
;
7910 for (ALL_LIST_ELEMENTS(ifp
->connected
, c_node
, c_nnode
, c
))
7911 bgp_connected_delete(bgp
, c
);
7915 extern void bgp_snmp_init(void);
7917 static void bgp_viewvrf_autocomplete(vector comps
, struct cmd_token
*token
)
7919 struct vrf
*vrf
= NULL
;
7920 struct listnode
*next
;
7923 RB_FOREACH (vrf
, vrf_name_head
, &vrfs_by_name
) {
7924 if (vrf
->vrf_id
!= VRF_DEFAULT
)
7925 vector_set(comps
, XSTRDUP(MTYPE_COMPLETION
, vrf
->name
));
7928 for (ALL_LIST_ELEMENTS_RO(bm
->bgp
, next
, bgp
)) {
7929 if (bgp
->inst_type
!= BGP_INSTANCE_TYPE_VIEW
)
7932 vector_set(comps
, XSTRDUP(MTYPE_COMPLETION
, bgp
->name
));
7936 static const struct cmd_variable_handler bgp_viewvrf_var_handlers
[] = {
7937 {.tokenname
= "VIEWVRFNAME", .completions
= bgp_viewvrf_autocomplete
},
7938 {.completions
= NULL
},
7941 static void bgp_pthreads_init()
7945 struct frr_pthread_attr io
= {
7947 .start
= frr_pthread_attr_default
.start
,
7948 .stop
= frr_pthread_attr_default
.stop
,
7950 struct frr_pthread_attr ka
= {
7951 .id
= PTHREAD_KEEPALIVES
,
7952 .start
= bgp_keepalives_start
,
7953 .stop
= bgp_keepalives_stop
,
7955 frr_pthread_new(&io
, "BGP I/O thread");
7956 frr_pthread_new(&ka
, "BGP Keepalives thread");
7959 void bgp_pthreads_run()
7961 struct frr_pthread
*io
= frr_pthread_get(PTHREAD_IO
);
7962 struct frr_pthread
*ka
= frr_pthread_get(PTHREAD_KEEPALIVES
);
7964 frr_pthread_run(io
, NULL
);
7965 frr_pthread_run(ka
, NULL
);
7967 /* Wait until threads are ready. */
7968 frr_pthread_wait_running(io
);
7969 frr_pthread_wait_running(ka
);
7972 void bgp_pthreads_finish()
7974 frr_pthread_stop_all();
7975 frr_pthread_finish();
7981 /* allocates some vital data structures used by peer commands in
7984 /* pre-init pthreads */
7985 bgp_pthreads_init();
7988 bgp_zebra_init(bm
->master
);
7991 vnc_zebra_init(bm
->master
);
7994 /* BGP VTY commands installation. */
8002 bgp_route_map_init();
8003 bgp_scan_vty_init();
8008 bgp_ethernetvpn_init();
8009 bgp_flowspec_vty_init();
8011 /* Access list initialize. */
8013 access_list_add_hook(peer_distribute_update
);
8014 access_list_delete_hook(peer_distribute_update
);
8016 /* Filter list initialize. */
8018 as_list_add_hook(peer_aslist_add
);
8019 as_list_delete_hook(peer_aslist_del
);
8021 /* Prefix list initialize.*/
8023 prefix_list_add_hook(peer_prefix_list_update
);
8024 prefix_list_delete_hook(peer_prefix_list_update
);
8026 /* Community list initialize. */
8027 bgp_clist
= community_list_init();
8032 cmd_variable_handler_register(bgp_viewvrf_var_handlers
);
8035 void bgp_terminate(void)
8039 struct listnode
*node
, *nnode
;
8040 struct listnode
*mnode
, *mnnode
;
8044 /* Close the listener sockets first as this prevents peers from
8046 * to reconnect on receiving the peer unconfig message. In the presence
8047 * of a large number of peers this will ensure that no peer is left with
8048 * a dangling connection
8050 /* reverse bgp_master_init */
8053 if (bm
->listen_sockets
)
8054 list_delete_and_null(&bm
->listen_sockets
);
8056 for (ALL_LIST_ELEMENTS(bm
->bgp
, mnode
, mnnode
, bgp
))
8057 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
))
8058 if (peer
->status
== Established
8059 || peer
->status
== OpenSent
8060 || peer
->status
== OpenConfirm
)
8061 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
8062 BGP_NOTIFY_CEASE_PEER_UNCONFIG
);
8064 if (bm
->process_main_queue
)
8065 work_queue_free_and_null(&bm
->process_main_queue
);
8067 if (bm
->t_rmap_update
)
8068 BGP_TIMER_OFF(bm
->t_rmap_update
);