]> git.proxmox.com Git - mirror_frr.git/blob - lib/vrf.c
zebra/lib: code cleaning
[mirror_frr.git] / lib / vrf.c
1 /*
2 * VRF functions.
3 * Copyright (C) 2014 6WIND S.A.
4 *
5 * This file is part of GNU Zebra.
6 *
7 * GNU Zebra is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published
9 * by the Free Software Foundation; either version 2, or (at your
10 * option) any later version.
11 *
12 * GNU Zebra is distributed in the hope that it will be useful, but
13 * WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * General Public License for more details.
16 *
17 * You should have received a copy of the GNU General Public License along
18 * with this program; see the file COPYING; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
20 */
21
22 #include <zebra.h>
23
24 /* for basename */
25 #include <libgen.h>
26
27 #include "if.h"
28 #include "vrf.h"
29 #include "vrf_int.h"
30 #include "prefix.h"
31 #include "table.h"
32 #include "log.h"
33 #include "memory.h"
34 #include "command.h"
35 #include "ns.h"
36 #include "privs.h"
37 #include "nexthop_group.h"
38 #include "lib_errors.h"
39
40 /* default VRF ID value used when VRF backend is not NETNS */
41 #define VRF_DEFAULT_INTERNAL 0
42 #define VRF_DEFAULT_NAME_INTERNAL "default"
43
44 DEFINE_MTYPE_STATIC(LIB, VRF, "VRF")
45 DEFINE_MTYPE_STATIC(LIB, VRF_BITMAP, "VRF bit-map")
46
47 DEFINE_QOBJ_TYPE(vrf)
48
49 static __inline int vrf_id_compare(const struct vrf *, const struct vrf *);
50 static __inline int vrf_name_compare(const struct vrf *, const struct vrf *);
51
52 RB_GENERATE(vrf_id_head, vrf, id_entry, vrf_id_compare);
53 RB_GENERATE(vrf_name_head, vrf, name_entry, vrf_name_compare);
54
55 struct vrf_id_head vrfs_by_id = RB_INITIALIZER(&vrfs_by_id);
56 struct vrf_name_head vrfs_by_name = RB_INITIALIZER(&vrfs_by_name);
57
58 static int vrf_backend;
59 static struct zebra_privs_t *vrf_daemon_privs;
60 static char vrf_default_name[VRF_NAMSIZ] = VRF_DEFAULT_NAME_INTERNAL;
61
62 /*
63 * Turn on/off debug code
64 * for vrf.
65 */
66 int debug_vrf = 0;
67
68 /* Holding VRF hooks */
69 struct vrf_master {
70 int (*vrf_new_hook)(struct vrf *);
71 int (*vrf_delete_hook)(struct vrf *);
72 int (*vrf_enable_hook)(struct vrf *);
73 int (*vrf_disable_hook)(struct vrf *);
74 int (*vrf_update_name_hook)(struct vrf *vrf);
75 } vrf_master = {
76 0,
77 };
78
79 static int vrf_is_enabled(struct vrf *vrf);
80
81 /* VRF list existance check by name. */
82 struct vrf *vrf_lookup_by_name(const char *name)
83 {
84 struct vrf vrf;
85 strlcpy(vrf.name, name, sizeof(vrf.name));
86 return (RB_FIND(vrf_name_head, &vrfs_by_name, &vrf));
87 }
88
89 static __inline int vrf_id_compare(const struct vrf *a, const struct vrf *b)
90 {
91 return (a->vrf_id - b->vrf_id);
92 }
93
94 static int vrf_name_compare(const struct vrf *a, const struct vrf *b)
95 {
96 return strcmp(a->name, b->name);
97 }
98
99 /* if ns_id is different and not VRF_UNKNOWN,
100 * then update vrf identifier, and enable VRF
101 */
102 static void vrf_update_vrf_id(ns_id_t ns_id, void *opaqueptr)
103 {
104 ns_id_t vrf_id = (vrf_id_t)ns_id;
105 vrf_id_t old_vrf_id;
106 struct vrf *vrf = (struct vrf *)opaqueptr;
107
108 if (!vrf)
109 return;
110 old_vrf_id = vrf->vrf_id;
111 if (vrf_id == vrf->vrf_id)
112 return;
113 if (vrf->vrf_id != VRF_UNKNOWN)
114 RB_REMOVE(vrf_id_head, &vrfs_by_id, vrf);
115 vrf->vrf_id = vrf_id;
116 RB_INSERT(vrf_id_head, &vrfs_by_id, vrf);
117 if (old_vrf_id == VRF_UNKNOWN)
118 vrf_enable((struct vrf *)vrf);
119 }
120
121 int vrf_switch_to_netns(vrf_id_t vrf_id)
122 {
123 char *name;
124 struct vrf *vrf = vrf_lookup_by_id(vrf_id);
125
126 /* VRF is default VRF. silently ignore */
127 if (!vrf || vrf->vrf_id == VRF_DEFAULT)
128 return 1; /* 1 = default */
129 /* VRF has no NETNS backend. silently ignore */
130 if (vrf->data.l.netns_name[0] == '\0')
131 return 2; /* 2 = no netns */
132 name = ns_netns_pathname(NULL, vrf->data.l.netns_name);
133 if (debug_vrf)
134 zlog_debug("VRF_SWITCH: %s(%u)", name, vrf->vrf_id);
135 return ns_switch_to_netns(name);
136 }
137
138 int vrf_switchback_to_initial(void)
139 {
140 int ret = ns_switchback_to_initial();
141
142 if (ret == 0 && debug_vrf)
143 zlog_debug("VRF_SWITCHBACK");
144 return ret;
145 }
146
147 /* Get a VRF. If not found, create one.
148 * Arg:
149 * name - The name of the vrf. May be NULL if unknown.
150 * vrf_id - The vrf_id of the vrf. May be VRF_UNKNOWN if unknown
151 * Description: Please note that this routine can be called with just the name
152 * and 0 vrf-id
153 */
154 struct vrf *vrf_get(vrf_id_t vrf_id, const char *name)
155 {
156 struct vrf *vrf = NULL;
157 int new = 0;
158
159 if (debug_vrf)
160 zlog_debug("VRF_GET: %s(%u)", name == NULL ? "(NULL)" : name,
161 vrf_id);
162
163 /* Nothing to see, move along here */
164 if (!name && vrf_id == VRF_UNKNOWN)
165 return NULL;
166
167 /* attempt to find already available VRF
168 */
169 if (name)
170 vrf = vrf_lookup_by_name(name);
171 if (vrf && vrf_id != VRF_UNKNOWN
172 && vrf->vrf_id != VRF_UNKNOWN
173 && vrf->vrf_id != vrf_id) {
174 zlog_debug("VRF_GET: avoid %s creation(%u), same name exists (%u)",
175 name, vrf_id, vrf->vrf_id);
176 return NULL;
177 }
178 /* Try to find VRF both by ID and name */
179 if (!vrf && vrf_id != VRF_UNKNOWN)
180 vrf = vrf_lookup_by_id(vrf_id);
181
182 if (vrf == NULL) {
183 vrf = XCALLOC(MTYPE_VRF, sizeof(struct vrf));
184 vrf->vrf_id = VRF_UNKNOWN;
185 QOBJ_REG(vrf, vrf);
186 new = 1;
187
188 if (debug_vrf)
189 zlog_debug("VRF(%u) %s is created.", vrf_id,
190 (name) ? name : "(NULL)");
191 }
192
193 /* Set identifier */
194 if (vrf_id != VRF_UNKNOWN && vrf->vrf_id == VRF_UNKNOWN) {
195 vrf->vrf_id = vrf_id;
196 RB_INSERT(vrf_id_head, &vrfs_by_id, vrf);
197 }
198
199 /* Set name */
200 if (name && vrf->name[0] != '\0' && strcmp(name, vrf->name)) {
201 RB_REMOVE(vrf_name_head, &vrfs_by_name, vrf);
202 strlcpy(vrf->name, name, sizeof(vrf->name));
203 RB_INSERT(vrf_name_head, &vrfs_by_name, vrf);
204 } else if (name && vrf->name[0] == '\0') {
205 strlcpy(vrf->name, name, sizeof(vrf->name));
206 RB_INSERT(vrf_name_head, &vrfs_by_name, vrf);
207 }
208 if (new &&vrf_master.vrf_new_hook)
209 (*vrf_master.vrf_new_hook)(vrf);
210
211 return vrf;
212 }
213
214 /* Delete a VRF. This is called when the underlying VRF goes away, a
215 * pre-configured VRF is deleted or when shutting down (vrf_terminate()).
216 */
217 void vrf_delete(struct vrf *vrf)
218 {
219 if (debug_vrf)
220 zlog_debug("VRF %u is to be deleted.", vrf->vrf_id);
221
222 if (vrf_is_enabled(vrf))
223 vrf_disable(vrf);
224
225 /* If the VRF is user configured, it'll stick around, just remove
226 * the ID mapping. Interfaces assigned to this VRF should've been
227 * removed already as part of the VRF going down.
228 */
229 if (vrf_is_user_cfged(vrf)) {
230 if (vrf->vrf_id != VRF_UNKNOWN) {
231 /* Delete any VRF interfaces - should be only
232 * the VRF itself, other interfaces should've
233 * been moved out of the VRF.
234 */
235 if_terminate(vrf);
236 RB_REMOVE(vrf_id_head, &vrfs_by_id, vrf);
237 vrf->vrf_id = VRF_UNKNOWN;
238 }
239 return;
240 }
241
242 if (vrf_master.vrf_delete_hook)
243 (*vrf_master.vrf_delete_hook)(vrf);
244
245 QOBJ_UNREG(vrf);
246 if_terminate(vrf);
247
248 if (vrf->vrf_id != VRF_UNKNOWN)
249 RB_REMOVE(vrf_id_head, &vrfs_by_id, vrf);
250 if (vrf->name[0] != '\0')
251 RB_REMOVE(vrf_name_head, &vrfs_by_name, vrf);
252
253 XFREE(MTYPE_VRF, vrf);
254 }
255
256 /* Look up a VRF by identifier. */
257 struct vrf *vrf_lookup_by_id(vrf_id_t vrf_id)
258 {
259 struct vrf vrf;
260 vrf.vrf_id = vrf_id;
261 return (RB_FIND(vrf_id_head, &vrfs_by_id, &vrf));
262 }
263
264 /*
265 * Enable a VRF - that is, let the VRF be ready to use.
266 * The VRF_ENABLE_HOOK callback will be called to inform
267 * that they can allocate resources in this VRF.
268 *
269 * RETURN: 1 - enabled successfully; otherwise, 0.
270 */
271 int vrf_enable(struct vrf *vrf)
272 {
273 if (vrf_is_enabled(vrf))
274 return 1;
275
276 if (debug_vrf)
277 zlog_debug("VRF %u is enabled.", vrf->vrf_id);
278
279 SET_FLAG(vrf->status, VRF_ACTIVE);
280
281 if (vrf_master.vrf_enable_hook)
282 (*vrf_master.vrf_enable_hook)(vrf);
283
284 /*
285 * If we have any nexthop group entries that
286 * are awaiting vrf initialization then
287 * let's let people know about it
288 */
289 nexthop_group_enable_vrf(vrf);
290
291 return 1;
292 }
293
294 /*
295 * Disable a VRF - that is, let the VRF be unusable.
296 * The VRF_DELETE_HOOK callback will be called to inform
297 * that they must release the resources in the VRF.
298 */
299 void vrf_disable(struct vrf *vrf)
300 {
301 if (!vrf_is_enabled(vrf))
302 return;
303
304 UNSET_FLAG(vrf->status, VRF_ACTIVE);
305
306 if (debug_vrf)
307 zlog_debug("VRF %u is to be disabled.", vrf->vrf_id);
308
309 /* Till now, nothing to be done for the default VRF. */
310 // Pending: see why this statement.
311
312 if (vrf_master.vrf_disable_hook)
313 (*vrf_master.vrf_disable_hook)(vrf);
314 }
315
316 const char *vrf_id_to_name(vrf_id_t vrf_id)
317 {
318 struct vrf *vrf;
319
320 vrf = vrf_lookup_by_id(vrf_id);
321 if (vrf)
322 return vrf->name;
323
324 return "n/a";
325 }
326
327 vrf_id_t vrf_name_to_id(const char *name)
328 {
329 struct vrf *vrf;
330 vrf_id_t vrf_id = VRF_DEFAULT; // Pending: need a way to return invalid
331 // id/ routine not used.
332
333 vrf = vrf_lookup_by_name(name);
334 if (vrf)
335 vrf_id = vrf->vrf_id;
336
337 return vrf_id;
338 }
339
340 /* Get the data pointer of the specified VRF. If not found, create one. */
341 void *vrf_info_get(vrf_id_t vrf_id)
342 {
343 struct vrf *vrf = vrf_get(vrf_id, NULL);
344 return vrf->info;
345 }
346
347 /* Look up the data pointer of the specified VRF. */
348 void *vrf_info_lookup(vrf_id_t vrf_id)
349 {
350 struct vrf *vrf = vrf_lookup_by_id(vrf_id);
351 return vrf ? vrf->info : NULL;
352 }
353
354 /*
355 * VRF hash for storing set or not.
356 */
357 struct vrf_bit_set {
358 vrf_id_t vrf_id;
359 bool set;
360 };
361
362 static unsigned int vrf_hash_bitmap_key(void *data)
363 {
364 struct vrf_bit_set *bit = data;
365
366 return bit->vrf_id;
367 }
368
369 static int vrf_hash_bitmap_cmp(const void *a, const void *b)
370 {
371 const struct vrf_bit_set *bit1 = a;
372 const struct vrf_bit_set *bit2 = b;
373
374 return bit1->vrf_id == bit2->vrf_id;
375 }
376
377 static void *vrf_hash_bitmap_alloc(void *data)
378 {
379 struct vrf_bit_set *copy = data;
380 struct vrf_bit_set *bit;
381
382 bit = XMALLOC(MTYPE_VRF_BITMAP, sizeof(*bit));
383 bit->vrf_id = copy->vrf_id;
384
385 return bit;
386 }
387
388 static void vrf_hash_bitmap_free(void *data)
389 {
390 struct vrf_bit_set *bit = data;
391
392 XFREE(MTYPE_VRF_BITMAP, bit);
393 }
394
395 vrf_bitmap_t vrf_bitmap_init(void)
396 {
397 return hash_create_size(32, vrf_hash_bitmap_key, vrf_hash_bitmap_cmp,
398 "VRF BIT HASH");
399 }
400
401 void vrf_bitmap_free(vrf_bitmap_t bmap)
402 {
403 struct hash *vrf_hash = bmap;
404
405 if (vrf_hash == NULL)
406 return;
407
408 hash_clean(vrf_hash, vrf_hash_bitmap_free);
409 hash_free(vrf_hash);
410 }
411
412 void vrf_bitmap_set(vrf_bitmap_t bmap, vrf_id_t vrf_id)
413 {
414 struct vrf_bit_set lookup = { .vrf_id = vrf_id };
415 struct hash *vrf_hash = bmap;
416 struct vrf_bit_set *bit;
417
418 if (vrf_hash == NULL || vrf_id == VRF_UNKNOWN)
419 return;
420
421 bit = hash_get(vrf_hash, &lookup, vrf_hash_bitmap_alloc);
422 bit->set = true;
423 }
424
425 void vrf_bitmap_unset(vrf_bitmap_t bmap, vrf_id_t vrf_id)
426 {
427 struct vrf_bit_set lookup = { .vrf_id = vrf_id };
428 struct hash *vrf_hash = bmap;
429 struct vrf_bit_set *bit;
430
431 if (vrf_hash == NULL || vrf_id == VRF_UNKNOWN)
432 return;
433
434 bit = hash_get(vrf_hash, &lookup, vrf_hash_bitmap_alloc);
435 bit->set = false;
436 }
437
438 int vrf_bitmap_check(vrf_bitmap_t bmap, vrf_id_t vrf_id)
439 {
440 struct vrf_bit_set lookup = { .vrf_id = vrf_id };
441 struct hash *vrf_hash = bmap;
442 struct vrf_bit_set *bit;
443
444 if (vrf_hash == NULL || vrf_id == VRF_UNKNOWN)
445 return 0;
446
447 bit = hash_lookup(vrf_hash, &lookup);
448 if (bit)
449 return bit->set;
450
451 return 0;
452 }
453
454 static void vrf_autocomplete(vector comps, struct cmd_token *token)
455 {
456 struct vrf *vrf = NULL;
457
458 RB_FOREACH (vrf, vrf_name_head, &vrfs_by_name)
459 vector_set(comps, XSTRDUP(MTYPE_COMPLETION, vrf->name));
460 }
461
462 static const struct cmd_variable_handler vrf_var_handlers[] = {
463 {
464 .varname = "vrf",
465 .completions = vrf_autocomplete,
466 },
467 {.completions = NULL},
468 };
469
470 /* Initialize VRF module. */
471 void vrf_init(int (*create)(struct vrf *), int (*enable)(struct vrf *),
472 int (*disable)(struct vrf *), int (*delete)(struct vrf *),
473 int ((*update)(struct vrf *)))
474 {
475 struct vrf *default_vrf;
476
477 /* initialise NS, in case VRF backend if NETNS */
478 ns_init();
479 if (debug_vrf)
480 zlog_debug("%s: Initializing VRF subsystem",
481 __PRETTY_FUNCTION__);
482
483 vrf_master.vrf_new_hook = create;
484 vrf_master.vrf_enable_hook = enable;
485 vrf_master.vrf_disable_hook = disable;
486 vrf_master.vrf_delete_hook = delete;
487 vrf_master.vrf_update_name_hook = update;
488
489 /* The default VRF always exists. */
490 default_vrf = vrf_get(VRF_DEFAULT, VRF_DEFAULT_NAME);
491 if (!default_vrf) {
492 flog_err(LIB_ERR_VRF_START,
493 "vrf_init: failed to create the default VRF!");
494 exit(1);
495 }
496 if (vrf_is_backend_netns()) {
497 struct ns *ns;
498
499 strlcpy(default_vrf->data.l.netns_name,
500 VRF_DEFAULT_NAME, NS_NAMSIZ);
501 ns = ns_lookup(ns_get_default_id());
502 ns->vrf_ctxt = default_vrf;
503 default_vrf->ns_ctxt = ns;
504 }
505
506 /* Enable the default VRF. */
507 if (!vrf_enable(default_vrf)) {
508 flog_err(LIB_ERR_VRF_START,
509 "vrf_init: failed to enable the default VRF!");
510 exit(1);
511 }
512
513 cmd_variable_handler_register(vrf_var_handlers);
514 }
515
516 /* Terminate VRF module. */
517 void vrf_terminate(void)
518 {
519 struct vrf *vrf;
520
521 if (debug_vrf)
522 zlog_debug("%s: Shutting down vrf subsystem",
523 __PRETTY_FUNCTION__);
524
525 while (!RB_EMPTY(vrf_id_head, &vrfs_by_id)) {
526 vrf = RB_ROOT(vrf_id_head, &vrfs_by_id);
527
528 /* Clear configured flag and invoke delete. */
529 UNSET_FLAG(vrf->status, VRF_CONFIGURED);
530 vrf_delete(vrf);
531 }
532
533 while (!RB_EMPTY(vrf_name_head, &vrfs_by_name)) {
534 vrf = RB_ROOT(vrf_name_head, &vrfs_by_name);
535
536 /* Clear configured flag and invoke delete. */
537 UNSET_FLAG(vrf->status, VRF_CONFIGURED);
538 vrf_delete(vrf);
539 }
540 }
541
542 static int vrf_default_accepts_vrf(int type)
543 {
544 const char *fname = NULL;
545 char buf[32] = {0x0};
546 int ret = 0;
547 FILE *fd = NULL;
548
549 /*
550 * TCP & UDP services running in the default VRF context (ie., not bound
551 * to any VRF device) can work across all VRF domains by enabling the
552 * tcp_l3mdev_accept and udp_l3mdev_accept sysctl options:
553 * sysctl -w net.ipv4.tcp_l3mdev_accept=1
554 * sysctl -w net.ipv4.udp_l3mdev_accept=1
555 */
556 if (type == SOCK_STREAM)
557 fname = "/proc/sys/net/ipv4/tcp_l3mdev_accept";
558 else if (type == SOCK_DGRAM)
559 fname = "/proc/sys/net/ipv4/udp_l3mdev_accept";
560 else
561 return ret;
562 fd = fopen(fname, "r");
563 if (fd == NULL)
564 return ret;
565 fgets(buf, 32, fd);
566 ret = atoi(buf);
567 fclose(fd);
568 return ret;
569 }
570
571 /* Create a socket for the VRF. */
572 int vrf_socket(int domain, int type, int protocol, vrf_id_t vrf_id,
573 char *interfacename)
574 {
575 int ret, save_errno, ret2;
576
577 ret = vrf_switch_to_netns(vrf_id);
578 if (ret < 0)
579 flog_err_sys(LIB_ERR_SOCKET, "%s: Can't switch to VRF %u (%s)",
580 __func__, vrf_id, safe_strerror(errno));
581
582 if (ret > 0 && interfacename && vrf_default_accepts_vrf(type)) {
583 zlog_err("VRF socket not used since net.ipv4.%s_l3mdev_accept != 0",
584 (type == SOCK_STREAM ? "tcp" : "udp"));
585 errno = EEXIST; /* not sure if this is the best error... */
586 return -2;
587 }
588
589 ret = socket(domain, type, protocol);
590 save_errno = errno;
591 ret2 = vrf_switchback_to_initial();
592 if (ret2 < 0)
593 flog_err_sys(LIB_ERR_SOCKET,
594 "%s: Can't switchback from VRF %u (%s)", __func__,
595 vrf_id, safe_strerror(errno));
596 errno = save_errno;
597 if (ret <= 0)
598 return ret;
599 ret2 = vrf_bind(vrf_id, ret, interfacename);
600 if (ret2 < 0) {
601 close(ret);
602 ret = ret2;
603 }
604 return ret;
605 }
606
607 int vrf_is_backend_netns(void)
608 {
609 return (vrf_backend == VRF_BACKEND_NETNS);
610 }
611
612 int vrf_get_backend(void)
613 {
614 return vrf_backend;
615 }
616
617 void vrf_configure_backend(int vrf_backend_netns)
618 {
619 vrf_backend = vrf_backend_netns;
620 }
621
622 int vrf_handler_create(struct vty *vty, const char *vrfname,
623 struct vrf **vrf)
624 {
625 struct vrf *vrfp;
626
627 if (strlen(vrfname) > VRF_NAMSIZ) {
628 if (vty)
629 vty_out(vty,
630 "%% VRF name %s invalid: length exceeds %d bytes\n",
631 vrfname, VRF_NAMSIZ);
632 else
633 zlog_warn(
634 "%% VRF name %s invalid: length exceeds %d bytes\n",
635 vrfname, VRF_NAMSIZ);
636 return CMD_WARNING_CONFIG_FAILED;
637 }
638
639 vrfp = vrf_get(VRF_UNKNOWN, vrfname);
640
641 if (vty)
642 VTY_PUSH_CONTEXT(VRF_NODE, vrfp);
643
644 if (vrf)
645 *vrf = vrfp;
646 return CMD_SUCCESS;
647 }
648
649 int vrf_netns_handler_create(struct vty *vty, struct vrf *vrf, char *pathname,
650 ns_id_t ns_id, ns_id_t internal_ns_id)
651 {
652 struct ns *ns = NULL;
653
654 if (!vrf)
655 return CMD_WARNING_CONFIG_FAILED;
656 if (vrf->vrf_id != VRF_UNKNOWN && vrf->ns_ctxt == NULL) {
657 if (vty)
658 vty_out(vty,
659 "VRF %u is already configured with VRF %s\n",
660 vrf->vrf_id, vrf->name);
661 else
662 zlog_warn("VRF %u is already configured with VRF %s\n",
663 vrf->vrf_id, vrf->name);
664 return CMD_WARNING_CONFIG_FAILED;
665 }
666 if (vrf->ns_ctxt != NULL) {
667 ns = (struct ns *)vrf->ns_ctxt;
668 if (!strcmp(ns->name, pathname)) {
669 if (vty)
670 vty_out(vty,
671 "VRF %u already configured with NETNS %s\n",
672 vrf->vrf_id, ns->name);
673 else
674 zlog_warn(
675 "VRF %u already configured with NETNS %s",
676 vrf->vrf_id, ns->name);
677 return CMD_WARNING_CONFIG_FAILED;
678 }
679 }
680 ns = ns_lookup_name(pathname);
681 if (ns && ns->vrf_ctxt) {
682 struct vrf *vrf2 = (struct vrf *)ns->vrf_ctxt;
683
684 if (vrf2 == vrf)
685 return CMD_SUCCESS;
686 if (vty)
687 vty_out(vty,
688 "NS %s is already configured"
689 " with VRF %u(%s)\n",
690 ns->name, vrf2->vrf_id, vrf2->name);
691 else
692 zlog_warn("NS %s is already configured with VRF %u(%s)",
693 ns->name, vrf2->vrf_id, vrf2->name);
694 return CMD_WARNING_CONFIG_FAILED;
695 }
696 ns = ns_get_created(ns, pathname, ns_id);
697 ns->internal_ns_id = internal_ns_id;
698 ns->vrf_ctxt = (void *)vrf;
699 vrf->ns_ctxt = (void *)ns;
700 /* update VRF netns NAME */
701 strlcpy(vrf->data.l.netns_name, basename(pathname), NS_NAMSIZ);
702
703 if (!ns_enable(ns, vrf_update_vrf_id)) {
704 if (vty)
705 vty_out(vty, "Can not associate NS %u with NETNS %s\n",
706 ns->ns_id, ns->name);
707 else
708 zlog_warn("Can not associate NS %u with NETNS %s",
709 ns->ns_id, ns->name);
710 return CMD_WARNING_CONFIG_FAILED;
711 }
712
713 return CMD_SUCCESS;
714 }
715
716 int vrf_is_mapped_on_netns(struct vrf *vrf)
717 {
718 if (!vrf || vrf->data.l.netns_name[0] == '\0')
719 return 0;
720 return 1;
721 }
722
723 /* vrf CLI commands */
724 DEFUN_NOSH(vrf_exit,
725 vrf_exit_cmd,
726 "exit-vrf",
727 "Exit current mode and down to previous mode\n")
728 {
729 /* We have to set vrf context to default vrf */
730 VTY_PUSH_CONTEXT(VRF_NODE, vrf_get(VRF_DEFAULT, VRF_DEFAULT_NAME));
731 vty->node = CONFIG_NODE;
732 return CMD_SUCCESS;
733 }
734
735 DEFUN_NOSH (vrf,
736 vrf_cmd,
737 "vrf NAME",
738 "Select a VRF to configure\n"
739 "VRF's name\n")
740 {
741 int idx_name = 1;
742 const char *vrfname = argv[idx_name]->arg;
743
744 return vrf_handler_create(vty, vrfname, NULL);
745 }
746
747 DEFUN (no_vrf,
748 no_vrf_cmd,
749 "no vrf NAME",
750 NO_STR
751 "Delete a pseudo VRF's configuration\n"
752 "VRF's name\n")
753 {
754 const char *vrfname = argv[2]->arg;
755
756 struct vrf *vrfp;
757
758 vrfp = vrf_lookup_by_name(vrfname);
759
760 if (vrfp == NULL) {
761 vty_out(vty, "%% VRF %s does not exist\n", vrfname);
762 return CMD_WARNING_CONFIG_FAILED;
763 }
764
765 if (CHECK_FLAG(vrfp->status, VRF_ACTIVE)) {
766 vty_out(vty, "%% Only inactive VRFs can be deleted\n");
767 return CMD_WARNING_CONFIG_FAILED;
768 }
769
770 /* Clear configured flag and invoke delete. */
771 UNSET_FLAG(vrfp->status, VRF_CONFIGURED);
772 vrf_delete(vrfp);
773
774 return CMD_SUCCESS;
775 }
776
777
778 struct cmd_node vrf_node = {VRF_NODE, "%s(config-vrf)# ", 1};
779
780 DEFUN_NOSH (vrf_netns,
781 vrf_netns_cmd,
782 "netns NAME",
783 "Attach VRF to a Namespace\n"
784 "The file name in " NS_RUN_DIR ", or a full pathname\n")
785 {
786 int idx_name = 1, ret;
787 char *pathname = ns_netns_pathname(vty, argv[idx_name]->arg);
788
789 VTY_DECLVAR_CONTEXT(vrf, vrf);
790
791 if (!pathname)
792 return CMD_WARNING_CONFIG_FAILED;
793
794 frr_elevate_privs(vrf_daemon_privs) {
795 ret = vrf_netns_handler_create(vty, vrf, pathname,
796 NS_UNKNOWN, NS_UNKNOWN);
797 }
798 return ret;
799 }
800
801 DEFUN_NOSH (no_vrf_netns,
802 no_vrf_netns_cmd,
803 "no netns [NAME]",
804 NO_STR
805 "Detach VRF from a Namespace\n"
806 "The file name in " NS_RUN_DIR ", or a full pathname\n")
807 {
808 struct ns *ns = NULL;
809
810 VTY_DECLVAR_CONTEXT(vrf, vrf);
811
812 if (!vrf_is_backend_netns()) {
813 vty_out(vty, "VRF backend is not Netns. Aborting\n");
814 return CMD_WARNING_CONFIG_FAILED;
815 }
816 if (!vrf->ns_ctxt) {
817 vty_out(vty, "VRF %s(%u) is not configured with NetNS\n",
818 vrf->name, vrf->vrf_id);
819 return CMD_WARNING_CONFIG_FAILED;
820 }
821
822 ns = (struct ns *)vrf->ns_ctxt;
823
824 ns->vrf_ctxt = NULL;
825 vrf_disable(vrf);
826 /* vrf ID from VRF is necessary for Zebra
827 * so that propagate to other clients is done
828 */
829 ns_delete(ns);
830 vrf->ns_ctxt = NULL;
831 return CMD_SUCCESS;
832 }
833
834 /*
835 * Debug CLI for vrf's
836 */
837 DEFUN (vrf_debug,
838 vrf_debug_cmd,
839 "debug vrf",
840 DEBUG_STR
841 "VRF Debugging\n")
842 {
843 debug_vrf = 1;
844
845 return CMD_SUCCESS;
846 }
847
848 DEFUN (no_vrf_debug,
849 no_vrf_debug_cmd,
850 "no debug vrf",
851 NO_STR
852 DEBUG_STR
853 "VRF Debugging\n")
854 {
855 debug_vrf = 0;
856
857 return CMD_SUCCESS;
858 }
859
860 static int vrf_write_host(struct vty *vty)
861 {
862 if (debug_vrf)
863 vty_out(vty, "debug vrf\n");
864
865 return 1;
866 }
867
868 static struct cmd_node vrf_debug_node = {VRF_DEBUG_NODE, "", 1};
869
870 void vrf_install_commands(void)
871 {
872 install_node(&vrf_debug_node, vrf_write_host);
873
874 install_element(CONFIG_NODE, &vrf_debug_cmd);
875 install_element(ENABLE_NODE, &vrf_debug_cmd);
876 install_element(CONFIG_NODE, &no_vrf_debug_cmd);
877 install_element(ENABLE_NODE, &no_vrf_debug_cmd);
878 }
879
880 void vrf_cmd_init(int (*writefunc)(struct vty *vty),
881 struct zebra_privs_t *daemon_privs)
882 {
883 install_element(CONFIG_NODE, &vrf_cmd);
884 install_element(CONFIG_NODE, &no_vrf_cmd);
885 install_node(&vrf_node, writefunc);
886 install_default(VRF_NODE);
887 install_element(VRF_NODE, &vrf_exit_cmd);
888 if (vrf_is_backend_netns() && ns_have_netns()) {
889 /* Install NS commands. */
890 vrf_daemon_privs = daemon_privs;
891 install_element(VRF_NODE, &vrf_netns_cmd);
892 install_element(VRF_NODE, &no_vrf_netns_cmd);
893 }
894 }
895
896 void vrf_set_default_name(const char *default_name)
897 {
898 struct vrf *def_vrf;
899 struct vrf *vrf_with_default_name = NULL;
900
901 def_vrf = vrf_lookup_by_id(VRF_DEFAULT);
902 assert(default_name);
903 vrf_with_default_name = vrf_lookup_by_name(default_name);
904 if (vrf_with_default_name && vrf_with_default_name != def_vrf) {
905 /* vrf name already used by an other VRF */
906 zlog_debug("VRF: %s, avoid changing name to %s, same name exists (%u)",
907 vrf_with_default_name->name, default_name,
908 vrf_with_default_name->vrf_id);
909 return;
910 }
911 snprintf(vrf_default_name, VRF_NAMSIZ, "%s", default_name);
912 if (def_vrf) {
913 RB_REMOVE(vrf_name_head, &vrfs_by_name, def_vrf);
914 strlcpy(def_vrf->data.l.netns_name,
915 vrf_default_name, NS_NAMSIZ);
916 strlcpy(def_vrf->name, vrf_default_name, sizeof(def_vrf->name));
917 RB_INSERT(vrf_name_head, &vrfs_by_name, def_vrf);
918 if (vrf_master.vrf_update_name_hook)
919 (*vrf_master.vrf_update_name_hook)(def_vrf);
920 }
921 }
922
923 const char *vrf_get_default_name(void)
924 {
925 return vrf_default_name;
926 }
927
928 vrf_id_t vrf_get_default_id(void)
929 {
930 /* backend netns is only known by zebra
931 * for other daemons, we return VRF_DEFAULT_INTERNAL
932 */
933 if (vrf_is_backend_netns())
934 return ns_get_default_id();
935 else
936 return VRF_DEFAULT_INTERNAL;
937 }
938
939 int vrf_bind(vrf_id_t vrf_id, int fd, char *name)
940 {
941 int ret = 0;
942
943 if (fd < 0 || name == NULL)
944 return fd;
945 if (vrf_is_mapped_on_netns(vrf_lookup_by_id(vrf_id)))
946 return fd;
947 #ifdef SO_BINDTODEVICE
948 ret = setsockopt(fd, SOL_SOCKET, SO_BINDTODEVICE, name, strlen(name)+1);
949 if (ret < 0)
950 zlog_debug("bind to interface %s failed, errno=%d", name,
951 errno);
952 #endif /* SO_BINDTODEVICE */
953 return ret;
954 }
955 int vrf_getaddrinfo(const char *node, const char *service,
956 const struct addrinfo *hints, struct addrinfo **res,
957 vrf_id_t vrf_id)
958 {
959 int ret, ret2, save_errno;
960
961 ret = vrf_switch_to_netns(vrf_id);
962 if (ret < 0)
963 flog_err_sys(LIB_ERR_SOCKET, "%s: Can't switch to VRF %u (%s)",
964 __func__, vrf_id, safe_strerror(errno));
965 ret = getaddrinfo(node, service, hints, res);
966 save_errno = errno;
967 ret2 = vrf_switchback_to_initial();
968 if (ret2 < 0)
969 flog_err_sys(LIB_ERR_SOCKET,
970 "%s: Can't switchback from VRF %u (%s)", __func__,
971 vrf_id, safe_strerror(errno));
972 errno = save_errno;
973 return ret;
974 }
975
976 int vrf_ioctl(vrf_id_t vrf_id, int d, unsigned long request, char *params)
977 {
978 int ret, saved_errno, rc;
979
980 ret = vrf_switch_to_netns(vrf_id);
981 if (ret < 0) {
982 flog_err_sys(LIB_ERR_SOCKET, "%s: Can't switch to VRF %u (%s)",
983 __func__, vrf_id, safe_strerror(errno));
984 return 0;
985 }
986 rc = ioctl(d, request, params);
987 saved_errno = errno;
988 ret = vrf_switchback_to_initial();
989 if (ret < 0)
990 flog_err_sys(LIB_ERR_SOCKET,
991 "%s: Can't switchback from VRF %u (%s)", __func__,
992 vrf_id, safe_strerror(errno));
993 errno = saved_errno;
994 return rc;
995 }
996
997 int vrf_sockunion_socket(const union sockunion *su, vrf_id_t vrf_id,
998 char *interfacename)
999 {
1000 int ret, save_errno, ret2;
1001
1002 ret = vrf_switch_to_netns(vrf_id);
1003 if (ret < 0)
1004 flog_err_sys(LIB_ERR_SOCKET, "%s: Can't switch to VRF %u (%s)",
1005 __func__, vrf_id, safe_strerror(errno));
1006 ret = sockunion_socket(su);
1007 save_errno = errno;
1008 ret2 = vrf_switchback_to_initial();
1009 if (ret2 < 0)
1010 flog_err_sys(LIB_ERR_SOCKET,
1011 "%s: Can't switchback from VRF %u (%s)", __func__,
1012 vrf_id, safe_strerror(errno));
1013 errno = save_errno;
1014
1015 if (ret <= 0)
1016 return ret;
1017 ret2 = vrf_bind(vrf_id, ret, interfacename);
1018 if (ret2 < 0) {
1019 close(ret);
1020 ret = ret2;
1021 }
1022 return ret;
1023 }