]> git.proxmox.com Git - mirror_frr.git/blob - zebra/zebra_evpn_mh.c
zebra: use ifindex vs ifp to avoid use-after-free on shutdown
[mirror_frr.git] / zebra / zebra_evpn_mh.c
1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /*
3 * Zebra EVPN multihoming code
4 *
5 * Copyright (C) 2019 Cumulus Networks, Inc.
6 * Anuradha Karuppiah
7 */
8
9 #include <zebra.h>
10
11 #include "command.h"
12 #include "hash.h"
13 #include "if.h"
14 #include "jhash.h"
15 #include "linklist.h"
16 #include "log.h"
17 #include "memory.h"
18 #include "prefix.h"
19 #include "stream.h"
20 #include "table.h"
21 #include "vlan.h"
22 #include "vxlan.h"
23
24 #include "zebra/zebra_router.h"
25 #include "zebra/debug.h"
26 #include "zebra/interface.h"
27 #include "zebra/rib.h"
28 #include "zebra/rt.h"
29 #include "zebra/rt_netlink.h"
30 #include "zebra/if_netlink.h"
31 #include "zebra/zebra_errors.h"
32 #include "zebra/zebra_l2.h"
33 #include "zebra/zebra_l2_bridge_if.h"
34 #include "zebra/zebra_ns.h"
35 #include "zebra/zebra_vrf.h"
36 #include "zebra/zebra_vxlan.h"
37 #include "zebra/zebra_vxlan_private.h"
38 #include "zebra/zebra_evpn.h"
39 #include "zebra/zebra_evpn_mac.h"
40 #include "zebra/zebra_router.h"
41 #include "zebra/zebra_evpn_mh.h"
42 #include "zebra/zebra_nhg.h"
43
44 DEFINE_MTYPE_STATIC(ZEBRA, ZACC_BD, "Access Broadcast Domain");
45 DEFINE_MTYPE_STATIC(ZEBRA, ZES, "Ethernet Segment");
46 DEFINE_MTYPE_STATIC(ZEBRA, ZES_EVI, "ES info per-EVI");
47 DEFINE_MTYPE_STATIC(ZEBRA, ZMH_INFO, "MH global info");
48 DEFINE_MTYPE_STATIC(ZEBRA, ZES_VTEP, "VTEP attached to the ES");
49 DEFINE_MTYPE_STATIC(ZEBRA, L2_NH, "L2 nexthop");
50
51 static void zebra_evpn_es_get_one_base_evpn(void);
52 static int zebra_evpn_es_evi_send_to_client(struct zebra_evpn_es *es,
53 struct zebra_evpn *zevpn, bool add);
54 static void zebra_evpn_local_es_del(struct zebra_evpn_es **esp);
55 static int zebra_evpn_local_es_update(struct zebra_if *zif, esi_t *esi);
56 static bool zebra_evpn_es_br_port_dplane_update(struct zebra_evpn_es *es,
57 const char *caller);
58 static void zebra_evpn_mh_uplink_cfg_update(struct zebra_if *zif, bool set);
59 static void zebra_evpn_mh_update_protodown_es(struct zebra_evpn_es *es,
60 bool resync_dplane);
61 static void zebra_evpn_mh_clear_protodown_es(struct zebra_evpn_es *es);
62 static void zebra_evpn_mh_startup_delay_timer_start(const char *rc);
63
64 esi_t zero_esi_buf, *zero_esi = &zero_esi_buf;
65
66 /*****************************************************************************/
67 /* Ethernet Segment to EVI association -
68 * 1. The ES-EVI entry is maintained as a RB tree per L2-VNI
69 * (struct zebra_evpn.es_evi_rb_tree).
70 * 2. Each local ES-EVI entry is sent to BGP which advertises it as an
71 * EAD-EVI (Type-1 EVPN) route
72 * 3. Local ES-EVI setup is re-evaluated on the following triggers -
73 * a. When an ESI is set or cleared on an access port.
74 * b. When an access port associated with an ESI is deleted.
75 * c. When VLAN member ship changes on an access port.
76 * d. When a VXLAN_IF is set or cleared on an access broadcast domain.
77 * e. When a L2-VNI is added or deleted for a VxLAN_IF.
78 * 4. Currently zebra doesn't remote ES-EVIs. Those are managed and maintained
79 * entirely in BGP which consolidates them into a remote ES. The remote ES
80 * is then sent to zebra which allocates a NHG for it.
81 */
82
83 /* compare ES-IDs for the ES-EVI RB tree maintained per-EVPN */
84 static int zebra_es_evi_rb_cmp(const struct zebra_evpn_es_evi *es_evi1,
85 const struct zebra_evpn_es_evi *es_evi2)
86 {
87 return memcmp(&es_evi1->es->esi, &es_evi2->es->esi, ESI_BYTES);
88 }
89 RB_GENERATE(zebra_es_evi_rb_head, zebra_evpn_es_evi,
90 rb_node, zebra_es_evi_rb_cmp);
91
92 /* allocate a new ES-EVI and insert it into the per-L2-VNI and per-ES
93 * tables.
94 */
95 static struct zebra_evpn_es_evi *zebra_evpn_es_evi_new(struct zebra_evpn_es *es,
96 struct zebra_evpn *zevpn)
97 {
98 struct zebra_evpn_es_evi *es_evi;
99
100 es_evi = XCALLOC(MTYPE_ZES_EVI, sizeof(struct zebra_evpn_es_evi));
101
102 es_evi->es = es;
103 es_evi->zevpn = zevpn;
104
105 /* insert into the EVPN-ESI rb tree */
106 RB_INSERT(zebra_es_evi_rb_head, &zevpn->es_evi_rb_tree, es_evi);
107
108 /* add to the ES's VNI list */
109 listnode_init(&es_evi->es_listnode, es_evi);
110 listnode_add(es->es_evi_list, &es_evi->es_listnode);
111
112 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
113 zlog_debug("es %s evi %d new",
114 es_evi->es->esi_str, es_evi->zevpn->vni);
115
116 return es_evi;
117 }
118
119 /* Evaluate if the es_evi is ready to be sent BGP -
120 * 1. If it is ready an add is sent to BGP
121 * 2. If it is not ready a del is sent (if the ES had been previously added
122 * to BGP).
123 */
124 static void zebra_evpn_es_evi_re_eval_send_to_client(
125 struct zebra_evpn_es_evi *es_evi)
126 {
127 bool old_ready;
128 bool new_ready;
129
130 old_ready = !!(es_evi->flags & ZEBRA_EVPNES_EVI_READY_FOR_BGP);
131
132 /* ES and L2-VNI have to be individually ready for BGP */
133 if ((es_evi->flags & ZEBRA_EVPNES_EVI_LOCAL) &&
134 (es_evi->es->flags & ZEBRA_EVPNES_READY_FOR_BGP) &&
135 zebra_evpn_send_to_client_ok(es_evi->zevpn))
136 es_evi->flags |= ZEBRA_EVPNES_EVI_READY_FOR_BGP;
137 else
138 es_evi->flags &= ~ZEBRA_EVPNES_EVI_READY_FOR_BGP;
139
140 new_ready = !!(es_evi->flags & ZEBRA_EVPNES_EVI_READY_FOR_BGP);
141
142 if (old_ready == new_ready)
143 return;
144
145 if (new_ready)
146 zebra_evpn_es_evi_send_to_client(es_evi->es, es_evi->zevpn,
147 true /* add */);
148 else
149 zebra_evpn_es_evi_send_to_client(es_evi->es, es_evi->zevpn,
150 false /* add */);
151 }
152
153 /* remove the ES-EVI from the per-L2-VNI and per-ES tables and free
154 * up the memory.
155 */
156 static void zebra_evpn_es_evi_free(struct zebra_evpn_es_evi *es_evi)
157 {
158 struct zebra_evpn_es *es = es_evi->es;
159 struct zebra_evpn *zevpn = es_evi->zevpn;
160
161 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
162 zlog_debug("es %s evi %d free",
163 es_evi->es->esi_str, es_evi->zevpn->vni);
164
165 /* remove from the ES's VNI list */
166 list_delete_node(es->es_evi_list, &es_evi->es_listnode);
167
168 /* remove from the VNI-ESI rb tree */
169 RB_REMOVE(zebra_es_evi_rb_head, &zevpn->es_evi_rb_tree, es_evi);
170
171 /* remove from the VNI-ESI rb tree */
172 XFREE(MTYPE_ZES_EVI, es_evi);
173 }
174
175 /* find the ES-EVI in the per-L2-VNI RB tree */
176 struct zebra_evpn_es_evi *zebra_evpn_es_evi_find(struct zebra_evpn_es *es,
177 struct zebra_evpn *zevpn)
178 {
179 struct zebra_evpn_es_evi es_evi;
180
181 es_evi.es = es;
182
183 return RB_FIND(zebra_es_evi_rb_head, &zevpn->es_evi_rb_tree, &es_evi);
184 }
185
186 /* Tell BGP about an ES-EVI deletion and then delete it */
187 static void zebra_evpn_local_es_evi_do_del(struct zebra_evpn_es_evi *es_evi)
188 {
189 if (!(es_evi->flags & ZEBRA_EVPNES_EVI_LOCAL))
190 return;
191
192 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
193 zlog_debug("local es %s evi %d del",
194 es_evi->es->esi_str, es_evi->zevpn->vni);
195
196 if (es_evi->flags & ZEBRA_EVPNES_EVI_READY_FOR_BGP) {
197 /* send a del only if add was sent for it earlier */
198 zebra_evpn_es_evi_send_to_client(es_evi->es,
199 es_evi->zevpn, false /* add */);
200 }
201
202 /* delete it from the EVPN's local list */
203 list_delete_node(es_evi->zevpn->local_es_evi_list,
204 &es_evi->l2vni_listnode);
205
206 es_evi->flags &= ~ZEBRA_EVPNES_EVI_LOCAL;
207 zebra_evpn_es_evi_free(es_evi);
208 }
209 static void zebra_evpn_local_es_evi_del(struct zebra_evpn_es *es,
210 struct zebra_evpn *zevpn)
211 {
212 struct zebra_evpn_es_evi *es_evi;
213
214 es_evi = zebra_evpn_es_evi_find(es, zevpn);
215 if (es_evi)
216 zebra_evpn_local_es_evi_do_del(es_evi);
217 }
218
219 /* If there are any existing MAC entries for this es/zevpn we need
220 * to install it in the dataplane.
221 *
222 * Note: primary purpose of this is to handle es del/re-add windows where
223 * sync MAC entries may be added by bgpd before the es-evi membership is
224 * created in the dataplane and in zebra
225 */
226 static void zebra_evpn_es_evi_mac_install(struct zebra_evpn_es_evi *es_evi)
227 {
228 struct zebra_mac *mac;
229 struct listnode *node;
230 struct zebra_evpn_es *es = es_evi->es;
231
232 if (listcount(es->mac_list) && IS_ZEBRA_DEBUG_EVPN_MH_ES)
233 zlog_debug("dp-mac install on es %s evi %d add", es->esi_str,
234 es_evi->zevpn->vni);
235
236 for (ALL_LIST_ELEMENTS_RO(es->mac_list, node, mac)) {
237 if (mac->zevpn != es_evi->zevpn)
238 continue;
239
240 if (!CHECK_FLAG(mac->flags, ZEBRA_MAC_LOCAL))
241 continue;
242
243 zebra_evpn_sync_mac_dp_install(mac, false, false, __func__);
244 }
245 }
246
247 /* Create an ES-EVI if it doesn't already exist and tell BGP */
248 static void zebra_evpn_local_es_evi_add(struct zebra_evpn_es *es,
249 struct zebra_evpn *zevpn)
250 {
251 struct zebra_evpn_es_evi *es_evi;
252
253 es_evi = zebra_evpn_es_evi_find(es, zevpn);
254 if (!es_evi) {
255 es_evi = zebra_evpn_es_evi_new(es, zevpn);
256 if (!es_evi)
257 return;
258
259 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
260 zlog_debug("local es %s evi %d add",
261 es_evi->es->esi_str, es_evi->zevpn->vni);
262 es_evi->flags |= ZEBRA_EVPNES_EVI_LOCAL;
263 /* add to the EVPN's local list */
264 listnode_init(&es_evi->l2vni_listnode, es_evi);
265 listnode_add(zevpn->local_es_evi_list, &es_evi->l2vni_listnode);
266
267 zebra_evpn_es_evi_re_eval_send_to_client(es_evi);
268
269 zebra_evpn_es_evi_mac_install(es_evi);
270 }
271 }
272
273 static void zebra_evpn_es_evi_show_entry(struct vty *vty,
274 struct zebra_evpn_es_evi *es_evi,
275 json_object *json_array)
276 {
277 char type_str[4];
278
279 if (json_array) {
280 json_object *json;
281 json_object *json_types;
282
283 /* Separate JSON object for each es-evi entry */
284 json = json_object_new_object();
285
286 json_object_string_add(json, "esi", es_evi->es->esi_str);
287 json_object_int_add(json, "vni", es_evi->zevpn->vni);
288 if (es_evi->flags & ZEBRA_EVPNES_EVI_LOCAL) {
289 json_types = json_object_new_array();
290 if (es_evi->flags & ZEBRA_EVPNES_EVI_LOCAL)
291 json_array_string_add(json_types, "local");
292 json_object_object_add(json, "type", json_types);
293 }
294
295 /* Add es-evi entry to json array */
296 json_object_array_add(json_array, json);
297 } else {
298 type_str[0] = '\0';
299 if (es_evi->flags & ZEBRA_EVPNES_EVI_LOCAL)
300 strlcat(type_str, "L", sizeof(type_str));
301
302 vty_out(vty, "%-8d %-30s %-4s\n",
303 es_evi->zevpn->vni, es_evi->es->esi_str,
304 type_str);
305 }
306 }
307
308 static void
309 zebra_evpn_es_evi_show_entry_detail(struct vty *vty,
310 struct zebra_evpn_es_evi *es_evi,
311 json_object *json_array)
312 {
313 char type_str[4];
314
315 if (json_array) {
316 json_object *json;
317 json_object *json_flags;
318
319 /* Separate JSON object for each es-evi entry */
320 json = json_object_new_object();
321
322 json_object_string_add(json, "esi", es_evi->es->esi_str);
323 json_object_int_add(json, "vni", es_evi->zevpn->vni);
324 if (es_evi->flags
325 & (ZEBRA_EVPNES_EVI_LOCAL
326 | ZEBRA_EVPNES_EVI_READY_FOR_BGP)) {
327 json_flags = json_object_new_array();
328 if (es_evi->flags & ZEBRA_EVPNES_EVI_LOCAL)
329 json_array_string_add(json_flags, "local");
330 if (es_evi->flags & ZEBRA_EVPNES_EVI_READY_FOR_BGP)
331 json_array_string_add(json_flags,
332 "readyForBgp");
333 json_object_object_add(json, "flags", json_flags);
334 }
335
336 /* Add es-evi entry to json array */
337 json_object_array_add(json_array, json);
338 } else {
339 type_str[0] = '\0';
340 if (es_evi->flags & ZEBRA_EVPNES_EVI_LOCAL)
341 strlcat(type_str, "L", sizeof(type_str));
342
343 vty_out(vty, "VNI %d ESI: %s\n",
344 es_evi->zevpn->vni, es_evi->es->esi_str);
345 vty_out(vty, " Type: %s\n", type_str);
346 vty_out(vty, " Ready for BGP: %s\n",
347 (es_evi->flags &
348 ZEBRA_EVPNES_EVI_READY_FOR_BGP) ?
349 "yes" : "no");
350 vty_out(vty, "\n");
351 }
352 }
353
354 static void zebra_evpn_es_evi_show_one_evpn(struct zebra_evpn *zevpn,
355 struct vty *vty,
356 json_object *json_array, int detail)
357 {
358 struct zebra_evpn_es_evi *es_evi;
359
360 RB_FOREACH(es_evi, zebra_es_evi_rb_head, &zevpn->es_evi_rb_tree) {
361 if (detail)
362 zebra_evpn_es_evi_show_entry_detail(vty, es_evi,
363 json_array);
364 else
365 zebra_evpn_es_evi_show_entry(vty, es_evi, json_array);
366 }
367 }
368
369 struct evpn_mh_show_ctx {
370 struct vty *vty;
371 json_object *json;
372 int detail;
373 };
374
375 static void zebra_evpn_es_evi_show_one_evpn_hash_cb(struct hash_bucket *bucket,
376 void *ctxt)
377 {
378 struct zebra_evpn *zevpn = (struct zebra_evpn *)bucket->data;
379 struct evpn_mh_show_ctx *wctx = (struct evpn_mh_show_ctx *)ctxt;
380
381 zebra_evpn_es_evi_show_one_evpn(zevpn, wctx->vty,
382 wctx->json, wctx->detail);
383 }
384
385 void zebra_evpn_es_evi_show(struct vty *vty, bool uj, int detail)
386 {
387 json_object *json_array = NULL;
388 struct zebra_vrf *zvrf;
389 struct evpn_mh_show_ctx wctx;
390
391 zvrf = zebra_vrf_get_evpn();
392 if (uj)
393 json_array = json_object_new_array();
394
395 memset(&wctx, 0, sizeof(wctx));
396 wctx.vty = vty;
397 wctx.json = json_array;
398 wctx.detail = detail;
399
400 if (!detail && !json_array) {
401 vty_out(vty, "Type: L local, R remote\n");
402 vty_out(vty, "%-8s %-30s %-4s\n", "VNI", "ESI", "Type");
403 }
404 /* Display all L2-VNIs */
405 hash_iterate(zvrf->evpn_table, zebra_evpn_es_evi_show_one_evpn_hash_cb,
406 &wctx);
407
408 if (uj)
409 vty_json(vty, json_array);
410 }
411
412 void zebra_evpn_es_evi_show_vni(struct vty *vty, bool uj, vni_t vni, int detail)
413 {
414 json_object *json_array = NULL;
415 struct zebra_evpn *zevpn;
416
417 zevpn = zebra_evpn_lookup(vni);
418 if (uj)
419 json_array = json_object_new_array();
420
421 if (zevpn) {
422 if (!detail && !json_array) {
423 vty_out(vty, "Type: L local, R remote\n");
424 vty_out(vty, "%-8s %-30s %-4s\n", "VNI", "ESI", "Type");
425 }
426 zebra_evpn_es_evi_show_one_evpn(zevpn, vty, json_array, detail);
427 } else {
428 if (!uj)
429 vty_out(vty, "VNI %d doesn't exist\n", vni);
430 }
431
432 if (uj)
433 vty_json(vty, json_array);
434 }
435
436 /* Initialize the ES tables maintained per-L2_VNI */
437 void zebra_evpn_es_evi_init(struct zebra_evpn *zevpn)
438 {
439 /* Initialize the ES-EVI RB tree */
440 RB_INIT(zebra_es_evi_rb_head, &zevpn->es_evi_rb_tree);
441
442 /* Initialize the local and remote ES lists maintained for quick
443 * walks by type
444 */
445 zevpn->local_es_evi_list = list_new();
446 listset_app_node_mem(zevpn->local_es_evi_list);
447 }
448
449 /* Cleanup the ES info maintained per- EVPN */
450 void zebra_evpn_es_evi_cleanup(struct zebra_evpn *zevpn)
451 {
452 struct zebra_evpn_es_evi *es_evi;
453 struct zebra_evpn_es_evi *es_evi_next;
454
455 RB_FOREACH_SAFE(es_evi, zebra_es_evi_rb_head,
456 &zevpn->es_evi_rb_tree, es_evi_next) {
457 zebra_evpn_local_es_evi_do_del(es_evi);
458 }
459
460 list_delete(&zevpn->local_es_evi_list);
461 zebra_evpn_es_clear_base_evpn(zevpn);
462 }
463
464 /* called when the oper state or bridge membership changes for the
465 * vxlan device
466 */
467 void zebra_evpn_update_all_es(struct zebra_evpn *zevpn)
468 {
469 struct zebra_evpn_es_evi *es_evi;
470 struct listnode *node;
471 struct interface *vlan_if;
472 struct interface *vxlan_if;
473 struct zebra_if *vxlan_zif;
474 struct zebra_vxlan_vni *vni;
475
476 /* the EVPN is now elgible as a base for EVPN-MH */
477 if (zebra_evpn_send_to_client_ok(zevpn))
478 zebra_evpn_es_set_base_evpn(zevpn);
479 else
480 zebra_evpn_es_clear_base_evpn(zevpn);
481
482 for (ALL_LIST_ELEMENTS_RO(zevpn->local_es_evi_list, node, es_evi))
483 zebra_evpn_es_evi_re_eval_send_to_client(es_evi);
484
485 /* reinstall SVI MAC */
486 vxlan_if = zevpn->vxlan_if;
487 if (vxlan_if) {
488 vxlan_zif = vxlan_if->info;
489 if (if_is_operative(vxlan_if)
490 && vxlan_zif->brslave_info.br_if) {
491 vni = zebra_vxlan_if_vni_find(vxlan_zif, zevpn->vni);
492 /* VLAN-VNI mappings may not exist */
493 if (vni) {
494 vlan_if = zvni_map_to_svi(
495 vni->access_vlan,
496 vxlan_zif->brslave_info.br_if);
497 if (vlan_if)
498 zebra_evpn_acc_bd_svi_mac_add(vlan_if);
499 }
500 }
501 }
502 }
503
504 /*****************************************************************************/
505 /* Access broadcast domains (BD)
506 * 1. These broadcast domains can be VLAN aware (in which case
507 * the key is VID) or VLAN unaware (in which case the key is
508 * 2. A VID-BD is created when a VLAN is associated with an access port or
509 * when the VLAN is associated with VXLAN_IF
510 * 3. A BD is translated into ES-EVI entries when a VNI is associated
511 * with the broadcast domain
512 */
513 /* Hash key for VLAN based broadcast domains */
514 static unsigned int zebra_evpn_acc_vl_hash_keymake(const void *p)
515 {
516 const struct zebra_evpn_access_bd *acc_bd = p;
517
518 return jhash_2words(acc_bd->vid, acc_bd->bridge_ifindex, 0);
519 }
520
521 /* Compare two VLAN based broadcast domains */
522 static bool zebra_evpn_acc_vl_cmp(const void *p1, const void *p2)
523 {
524 const struct zebra_evpn_access_bd *acc_bd1 = p1;
525 const struct zebra_evpn_access_bd *acc_bd2 = p2;
526
527 if (acc_bd1 == NULL && acc_bd2 == NULL)
528 return true;
529
530 if (acc_bd1 == NULL || acc_bd2 == NULL)
531 return false;
532
533 return ((acc_bd1->vid == acc_bd2->vid) &&
534 (acc_bd1->bridge_ifindex == acc_bd2->bridge_ifindex));
535 }
536
537 /* Lookup VLAN based broadcast domain */
538 struct zebra_evpn_access_bd *
539 zebra_evpn_acc_vl_find_index(vlanid_t vid, ifindex_t bridge_ifindex)
540 {
541 struct zebra_evpn_access_bd *acc_bd;
542 struct zebra_evpn_access_bd tmp;
543
544 tmp.vid = vid;
545 tmp.bridge_ifindex = bridge_ifindex;
546 acc_bd = hash_lookup(zmh_info->evpn_vlan_table, &tmp);
547
548 return acc_bd;
549 }
550
551 /* Lookup VLAN based broadcast domain */
552 struct zebra_evpn_access_bd *zebra_evpn_acc_vl_find(vlanid_t vid,
553 struct interface *br_if)
554 {
555 return zebra_evpn_acc_vl_find_index(vid, br_if->ifindex);
556 }
557
558 /* A new broadcast domain can be created when a VLAN member or VLAN<=>VxLAN_IF
559 * mapping is added.
560 */
561 static struct zebra_evpn_access_bd *
562 zebra_evpn_acc_vl_new(vlanid_t vid, struct interface *br_if)
563 {
564 struct zebra_evpn_access_bd *acc_bd;
565 struct interface *vlan_if;
566
567 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
568 zlog_debug("access vlan %d bridge %s add", vid, br_if->name);
569
570 acc_bd = XCALLOC(MTYPE_ZACC_BD, sizeof(struct zebra_evpn_access_bd));
571
572 acc_bd->vid = vid;
573 acc_bd->bridge_ifindex = br_if->ifindex;
574 acc_bd->bridge_zif = (struct zebra_if *)br_if->info;
575
576 /* Initialize the mbr list */
577 acc_bd->mbr_zifs = list_new();
578
579 /* Add to hash */
580 (void)hash_get(zmh_info->evpn_vlan_table, acc_bd, hash_alloc_intern);
581
582 /* check if an svi exists for the vlan */
583 vlan_if = zvni_map_to_svi(vid, br_if);
584 if (vlan_if) {
585 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
586 zlog_debug("vlan %d bridge %s SVI %s set", vid,
587 br_if->name, vlan_if->name);
588 acc_bd->vlan_zif = vlan_if->info;
589 }
590 return acc_bd;
591 }
592
593 /* Free VLAN based broadcast domain -
594 * This just frees appropriate memory, caller should have taken other
595 * needed actions.
596 */
597 static void zebra_evpn_acc_vl_free(struct zebra_evpn_access_bd *acc_bd)
598 {
599 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
600 zlog_debug("access vlan %d del", acc_bd->vid);
601
602 if (acc_bd->vlan_zif && acc_bd->zevpn && acc_bd->zevpn->mac_table)
603 zebra_evpn_mac_svi_del(acc_bd->vlan_zif->ifp, acc_bd->zevpn);
604
605 /* cleanup resources maintained against the ES */
606 list_delete(&acc_bd->mbr_zifs);
607
608 /* remove EVI from various tables */
609 hash_release(zmh_info->evpn_vlan_table, acc_bd);
610
611 XFREE(MTYPE_ZACC_BD, acc_bd);
612 }
613
614 static void zebra_evpn_acc_vl_cleanup_all(struct hash_bucket *bucket, void *arg)
615 {
616 struct zebra_evpn_access_bd *acc_bd = bucket->data;
617
618 zebra_evpn_acc_vl_free(acc_bd);
619 }
620
621 /* called when a bd mbr is removed or VxLAN_IF is diassociated from the access
622 * VLAN
623 */
624 static void zebra_evpn_acc_bd_free_on_deref(struct zebra_evpn_access_bd *acc_bd)
625 {
626 if (!list_isempty(acc_bd->mbr_zifs) || acc_bd->vxlan_zif)
627 return;
628
629 /* Remove this access_bd from bridge hash table */
630 zebra_l2_bridge_if_vlan_access_bd_deref(acc_bd);
631
632 /* if there are no references free the EVI */
633 zebra_evpn_acc_vl_free(acc_bd);
634 }
635
636 static struct zebra_evpn_access_bd *
637 zebra_evpn_acc_bd_alloc_on_ref(vlanid_t vid, struct interface *br_if)
638 {
639 struct zebra_evpn_access_bd *acc_bd = NULL;
640
641 assert(br_if && br_if->info);
642 acc_bd = zebra_evpn_acc_vl_new(vid, br_if);
643 if (acc_bd)
644 /* Add this access_bd to bridge hash table */
645 zebra_l2_bridge_if_vlan_access_bd_ref(acc_bd);
646
647 return acc_bd;
648 }
649
650 /* called when a SVI is goes up/down */
651 void zebra_evpn_acc_bd_svi_set(struct zebra_if *vlan_zif,
652 struct zebra_if *br_zif, bool is_up)
653 {
654 struct zebra_evpn_access_bd *acc_bd;
655 uint16_t vid;
656 struct zebra_if *tmp_br_zif = br_zif;
657
658 if (!tmp_br_zif) {
659 if (!vlan_zif->link || !vlan_zif->link->info)
660 return;
661
662 tmp_br_zif = vlan_zif->link->info;
663 }
664
665 /* ignore vlan unaware bridges */
666 if (!IS_ZEBRA_IF_BRIDGE_VLAN_AWARE(tmp_br_zif))
667 return;
668
669 vid = vlan_zif->l2info.vl.vid;
670 acc_bd = zebra_evpn_acc_vl_find(vid, tmp_br_zif->ifp);
671 if (!acc_bd)
672 return;
673
674 if (is_up) {
675 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
676 zlog_debug("vlan %d bridge %s SVI %s set", vid,
677 tmp_br_zif->ifp->name, vlan_zif->ifp->name);
678
679 acc_bd->vlan_zif = vlan_zif;
680 if (acc_bd->zevpn)
681 zebra_evpn_mac_svi_add(acc_bd->vlan_zif->ifp,
682 acc_bd->zevpn);
683 } else if (acc_bd->vlan_zif) {
684 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
685 zlog_debug("vlan %d bridge %s SVI clear", vid,
686 tmp_br_zif->ifp->name);
687 acc_bd->vlan_zif = NULL;
688 if (acc_bd->zevpn && acc_bd->zevpn->mac_table)
689 zebra_evpn_mac_svi_del(vlan_zif->ifp, acc_bd->zevpn);
690 }
691 }
692
693 /* On some events macs are force-flushed. This api can be used to reinstate
694 * the svi-mac after such cleanup-events.
695 */
696 void zebra_evpn_acc_bd_svi_mac_add(struct interface *vlan_if)
697 {
698 zebra_evpn_acc_bd_svi_set(vlan_if->info, NULL,
699 if_is_operative(vlan_if));
700 }
701
702 /* called when a EVPN-L2VNI is set or cleared against a BD */
703 static void zebra_evpn_acc_bd_evpn_set(struct zebra_evpn_access_bd *acc_bd,
704 struct zebra_evpn *zevpn,
705 struct zebra_evpn *old_zevpn)
706 {
707 struct zebra_if *zif;
708 struct listnode *node;
709
710 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
711 zlog_debug("access vlan %d bridge %s l2-vni %u set",
712 acc_bd->vid, acc_bd->bridge_zif->ifp->name,
713 zevpn ? zevpn->vni : 0);
714
715 for (ALL_LIST_ELEMENTS_RO(acc_bd->mbr_zifs, node, zif)) {
716 if (!zif->es_info.es)
717 continue;
718
719 if (zevpn)
720 zebra_evpn_local_es_evi_add(zif->es_info.es, zevpn);
721 else if (old_zevpn)
722 zebra_evpn_local_es_evi_del(zif->es_info.es, old_zevpn);
723 }
724
725 if (acc_bd->vlan_zif) {
726 if (zevpn)
727 zebra_evpn_mac_svi_add(acc_bd->vlan_zif->ifp,
728 acc_bd->zevpn);
729 else if (old_zevpn && old_zevpn->mac_table)
730 zebra_evpn_mac_svi_del(acc_bd->vlan_zif->ifp,
731 old_zevpn);
732 }
733 }
734
735 /* handle VLAN->VxLAN_IF association */
736 void zebra_evpn_vl_vxl_ref(uint16_t vid, vni_t vni_id,
737 struct zebra_if *vxlan_zif)
738 {
739 vni_t old_vni;
740 struct zebra_evpn_access_bd *acc_bd;
741 struct zebra_evpn *old_zevpn;
742 struct interface *br_if;
743
744 if (!vid)
745 return;
746
747 if (!vni_id)
748 return;
749
750 br_if = vxlan_zif->brslave_info.br_if;
751
752 if (!br_if)
753 return;
754
755 acc_bd = zebra_evpn_acc_vl_find(vid, br_if);
756 if (!acc_bd)
757 acc_bd = zebra_evpn_acc_bd_alloc_on_ref(vid, br_if);
758
759 old_vni = acc_bd->vni;
760
761 if (vni_id == old_vni)
762 return;
763
764 acc_bd->vni = vni_id;
765 acc_bd->vxlan_zif = vxlan_zif;
766
767 old_zevpn = acc_bd->zevpn;
768 acc_bd->zevpn = zebra_evpn_lookup(vni_id);
769 if (acc_bd->zevpn == old_zevpn)
770 return;
771
772 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
773 zlog_debug("access vlan %d vni %u ref", acc_bd->vid, vni_id);
774
775 if (old_zevpn)
776 zebra_evpn_acc_bd_evpn_set(acc_bd, NULL, old_zevpn);
777
778 if (acc_bd->zevpn)
779 zebra_evpn_acc_bd_evpn_set(acc_bd, acc_bd->zevpn, NULL);
780 }
781
782 /* handle VLAN->VxLAN_IF deref */
783 void zebra_evpn_vl_vxl_deref(uint16_t vid, vni_t vni_id,
784 struct zebra_if *vxlan_zif)
785 {
786 struct interface *br_if;
787 struct zebra_evpn_access_bd *acc_bd;
788
789 if (!vid)
790 return;
791
792 if (!vni_id)
793 return;
794
795 br_if = vxlan_zif->brslave_info.br_if;
796 if (!br_if)
797 return;
798
799 acc_bd = zebra_evpn_acc_vl_find(vid, br_if);
800 if (!acc_bd)
801 return;
802
803 /* clear vxlan_if only if it matches */
804 if (acc_bd->vni != vni_id)
805 return;
806
807 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
808 zlog_debug("access vlan %d bridge %s vni %u deref", acc_bd->vid,
809 br_if->name, vni_id);
810
811 if (acc_bd->zevpn)
812 zebra_evpn_acc_bd_evpn_set(acc_bd, NULL, acc_bd->zevpn);
813
814 acc_bd->zevpn = NULL;
815 acc_bd->vxlan_zif = NULL;
816 acc_bd->vni = 0;
817
818 /* if there are no other references the access_bd can be freed */
819 zebra_evpn_acc_bd_free_on_deref(acc_bd);
820 }
821
822 /* handle BridgeIf<->AccessBD cleanup */
823 void zebra_evpn_access_bd_bridge_cleanup(vlanid_t vid, struct interface *br_if,
824 struct zebra_evpn_access_bd *acc_bd)
825 {
826 struct zebra_evpn *zevpn;
827
828 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
829 zlog_debug("access bd vlan %d bridge %s cleanup", acc_bd->vid,
830 br_if->name);
831
832 zevpn = acc_bd->zevpn;
833 if (zevpn)
834 zebra_evpn_acc_bd_evpn_set(acc_bd, NULL, zevpn);
835
836 /* cleanup resources maintained against the ES */
837 list_delete_all_node(acc_bd->mbr_zifs);
838
839 acc_bd->zevpn = NULL;
840 acc_bd->vxlan_zif = NULL;
841 acc_bd->vni = 0;
842 acc_bd->bridge_zif = NULL;
843
844 /* if there are no other references the access_bd can be freed */
845 zebra_evpn_acc_bd_free_on_deref(acc_bd);
846 }
847
848 /* handle EVPN add/del */
849 void zebra_evpn_vxl_evpn_set(struct zebra_if *zif, struct zebra_evpn *zevpn,
850 bool set)
851 {
852 struct zebra_vxlan_vni *vni;
853 struct zebra_evpn_access_bd *acc_bd;
854 ifindex_t br_ifindex;
855
856 if (!zif)
857 return;
858
859 /* locate access_bd associated with the vxlan device */
860 vni = zebra_vxlan_if_vni_find(zif, zevpn->vni);
861 if (!vni)
862 return;
863
864 /* Use the index as the pointer can be stale (deleted) */
865 br_ifindex = zif->brslave_info.bridge_ifindex;
866 if (!zif->brslave_info.br_if || br_ifindex == IFINDEX_INTERNAL)
867 return;
868
869 acc_bd = zebra_evpn_acc_vl_find_index(vni->access_vlan, br_ifindex);
870 if (!acc_bd)
871 return;
872
873 if (set) {
874 zebra_evpn_es_set_base_evpn(zevpn);
875 if (acc_bd->zevpn != zevpn) {
876 acc_bd->zevpn = zevpn;
877 zebra_evpn_acc_bd_evpn_set(acc_bd, zevpn, NULL);
878 }
879 } else {
880 if (acc_bd->zevpn) {
881 struct zebra_evpn *old_zevpn = acc_bd->zevpn;
882 acc_bd->zevpn = NULL;
883 zebra_evpn_acc_bd_evpn_set(acc_bd, NULL, old_zevpn);
884 }
885 }
886 }
887
888 /* handle addition of new VLAN members */
889 void zebra_evpn_vl_mbr_ref(uint16_t vid, struct zebra_if *zif)
890 {
891 struct interface *br_if;
892 struct zebra_evpn_access_bd *acc_bd;
893
894 if (!vid)
895 return;
896
897 br_if = zif->brslave_info.br_if;
898 if (!br_if)
899 return;
900
901 acc_bd = zebra_evpn_acc_vl_find(vid, br_if);
902 if (!acc_bd)
903 acc_bd = zebra_evpn_acc_bd_alloc_on_ref(vid, br_if);
904
905 if (listnode_lookup(acc_bd->mbr_zifs, zif))
906 return;
907
908 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
909 zlog_debug("access vlan %d bridge %s mbr %s ref", vid,
910 br_if->name, zif->ifp->name);
911
912 listnode_add(acc_bd->mbr_zifs, zif);
913 if (acc_bd->zevpn && zif->es_info.es)
914 zebra_evpn_local_es_evi_add(zif->es_info.es, acc_bd->zevpn);
915 }
916
917 /* handle deletion of VLAN members */
918 void zebra_evpn_vl_mbr_deref(uint16_t vid, struct zebra_if *zif)
919 {
920 struct interface *br_if;
921 struct zebra_evpn_access_bd *acc_bd;
922 struct listnode *node;
923
924 if (!vid)
925 return;
926
927 br_if = zif->brslave_info.br_if;
928 if (!br_if)
929 return;
930
931 acc_bd = zebra_evpn_acc_vl_find(vid, br_if);
932 if (!acc_bd)
933 return;
934
935 node = listnode_lookup(acc_bd->mbr_zifs, zif);
936 if (!node)
937 return;
938
939 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
940 zlog_debug("access vlan %d bridge %s mbr %s deref", vid,
941 br_if->name, zif->ifp->name);
942
943 list_delete_node(acc_bd->mbr_zifs, node);
944
945 if (acc_bd->zevpn && zif->es_info.es)
946 zebra_evpn_local_es_evi_del(zif->es_info.es, acc_bd->zevpn);
947
948 /* if there are no other references the access_bd can be freed */
949 zebra_evpn_acc_bd_free_on_deref(acc_bd);
950 }
951
952 static void zebra_evpn_acc_vl_adv_svi_mac_cb(struct hash_bucket *bucket,
953 void *ctxt)
954 {
955 struct zebra_evpn_access_bd *acc_bd = bucket->data;
956
957 if (acc_bd->vlan_zif && acc_bd->zevpn)
958 zebra_evpn_mac_svi_add(acc_bd->vlan_zif->ifp, acc_bd->zevpn);
959 }
960
961 /* called when advertise SVI MAC is enabled on the switch */
962 static void zebra_evpn_acc_vl_adv_svi_mac_all(void)
963 {
964 hash_iterate(zmh_info->evpn_vlan_table,
965 zebra_evpn_acc_vl_adv_svi_mac_cb, NULL);
966 }
967
968 static void zebra_evpn_acc_vl_json_fill(struct zebra_evpn_access_bd *acc_bd,
969 json_object *json, bool detail)
970 {
971 json_object_int_add(json, "vlan", acc_bd->vid);
972 if (acc_bd->vxlan_zif)
973 json_object_string_add(json, "vxlanIf",
974 acc_bd->vxlan_zif->ifp->name);
975 if (acc_bd->zevpn)
976 json_object_int_add(json, "vni", acc_bd->zevpn->vni);
977 if (acc_bd->mbr_zifs)
978 json_object_int_add(json, "memberIfCount",
979 listcount(acc_bd->mbr_zifs));
980
981 if (detail) {
982 json_object *json_mbrs;
983 json_object *json_mbr;
984 struct zebra_if *zif;
985 struct listnode *node;
986
987
988 json_mbrs = json_object_new_array();
989 for (ALL_LIST_ELEMENTS_RO(acc_bd->mbr_zifs, node, zif)) {
990 json_mbr = json_object_new_object();
991 json_object_string_add(json_mbr, "ifName",
992 zif->ifp->name);
993 json_object_array_add(json_mbrs, json_mbr);
994 }
995 json_object_object_add(json, "members", json_mbrs);
996 }
997 }
998
999 static void zebra_evpn_acc_vl_show_entry_detail(struct vty *vty,
1000 struct zebra_evpn_access_bd *acc_bd, json_object *json)
1001 {
1002 struct zebra_if *zif;
1003 struct listnode *node;
1004
1005 if (json) {
1006 zebra_evpn_acc_vl_json_fill(acc_bd, json, true);
1007 } else {
1008 vty_out(vty, "VLAN: %s.%u\n", acc_bd->bridge_zif->ifp->name,
1009 acc_bd->vid);
1010 vty_out(vty, " VxLAN Interface: %s\n",
1011 acc_bd->vxlan_zif ?
1012 acc_bd->vxlan_zif->ifp->name : "-");
1013 vty_out(vty, " SVI: %s\n",
1014 acc_bd->vlan_zif ? acc_bd->vlan_zif->ifp->name : "-");
1015 if (acc_bd->zevpn)
1016 vty_out(vty, " L2-VNI: %d\n", acc_bd->zevpn->vni);
1017 else {
1018 vty_out(vty, " L2-VNI: 0\n");
1019 vty_out(vty, " L3-VNI: %d\n", acc_bd->vni);
1020 }
1021 vty_out(vty, " Member Count: %d\n",
1022 listcount(acc_bd->mbr_zifs));
1023 vty_out(vty, " Members: \n");
1024 for (ALL_LIST_ELEMENTS_RO(acc_bd->mbr_zifs, node, zif))
1025 vty_out(vty, " %s\n", zif->ifp->name);
1026 vty_out(vty, "\n");
1027 }
1028 }
1029
1030 static void zebra_evpn_acc_vl_show_entry(struct vty *vty,
1031 struct zebra_evpn_access_bd *acc_bd, json_object *json)
1032 {
1033 if (json) {
1034 zebra_evpn_acc_vl_json_fill(acc_bd, json, false);
1035 } else {
1036 vty_out(vty, "%-5s.%-5u %-15s %-8d %-15s %u\n",
1037 acc_bd->bridge_zif->ifp->name, acc_bd->vid,
1038 acc_bd->vlan_zif ? acc_bd->vlan_zif->ifp->name : "-",
1039 acc_bd->zevpn ? acc_bd->zevpn->vni : 0,
1040 acc_bd->vxlan_zif ? acc_bd->vxlan_zif->ifp->name : "-",
1041 listcount(acc_bd->mbr_zifs));
1042 }
1043 }
1044
1045 static void zebra_evpn_acc_vl_show_hash(struct hash_bucket *bucket, void *ctxt)
1046 {
1047 struct evpn_mh_show_ctx *wctx = ctxt;
1048 struct zebra_evpn_access_bd *acc_bd = bucket->data;
1049 json_object *json = NULL;
1050
1051 if (wctx->json)
1052 json = json_object_new_object();
1053 if (wctx->detail)
1054 zebra_evpn_acc_vl_show_entry_detail(wctx->vty, acc_bd, json);
1055 else
1056 zebra_evpn_acc_vl_show_entry(wctx->vty, acc_bd, json);
1057 if (json)
1058 json_object_array_add(wctx->json, json);
1059 }
1060
1061 void zebra_evpn_acc_vl_show(struct vty *vty, bool uj)
1062 {
1063 struct evpn_mh_show_ctx wctx;
1064 json_object *json_array = NULL;
1065
1066 if (uj)
1067 json_array = json_object_new_array();
1068
1069 memset(&wctx, 0, sizeof(wctx));
1070 wctx.vty = vty;
1071 wctx.json = json_array;
1072 wctx.detail = false;
1073
1074 if (!uj)
1075 vty_out(vty, "%-12s %-15s %-8s %-15s %s\n", "VLAN", "SVI",
1076 "L2-VNI", "VXLAN-IF", "# Members");
1077
1078 hash_iterate(zmh_info->evpn_vlan_table, zebra_evpn_acc_vl_show_hash,
1079 &wctx);
1080
1081 if (uj)
1082 vty_json(vty, json_array);
1083 }
1084
1085 void zebra_evpn_acc_vl_show_detail(struct vty *vty, bool uj)
1086 {
1087 struct evpn_mh_show_ctx wctx;
1088 json_object *json_array = NULL;
1089
1090 if (uj)
1091 json_array = json_object_new_array();
1092 memset(&wctx, 0, sizeof(wctx));
1093 wctx.vty = vty;
1094 wctx.json = json_array;
1095 wctx.detail = true;
1096
1097 hash_iterate(zmh_info->evpn_vlan_table, zebra_evpn_acc_vl_show_hash,
1098 &wctx);
1099
1100 if (uj)
1101 vty_json(vty, json_array);
1102 }
1103
1104 void zebra_evpn_acc_vl_show_vid(struct vty *vty, bool uj, vlanid_t vid,
1105 struct interface *br_if)
1106 {
1107 json_object *json = NULL;
1108 struct zebra_evpn_access_bd *acc_bd;
1109
1110 if (uj)
1111 json = json_object_new_object();
1112
1113 acc_bd = zebra_evpn_acc_vl_find(vid, br_if);
1114 if (acc_bd) {
1115 zebra_evpn_acc_vl_show_entry_detail(vty, acc_bd, json);
1116 } else {
1117 if (!json)
1118 vty_out(vty, "VLAN %s.%u not present\n", br_if->name,
1119 vid);
1120 }
1121
1122 if (uj)
1123 vty_json(vty, json);
1124 }
1125
1126 /* Initialize VLAN member bitmap on an interface. Although VLAN membership
1127 * is independent of EVPN we only process it if its of interest to EVPN-MH
1128 * i.e. on access ports that can be setup as Ethernet Segments. And that is
1129 * intended as an optimization.
1130 */
1131 void zebra_evpn_if_init(struct zebra_if *zif)
1132 {
1133 if (!zebra_evpn_is_if_es_capable(zif))
1134 return;
1135
1136 if (!bf_is_inited(zif->vlan_bitmap))
1137 bf_init(zif->vlan_bitmap, IF_VLAN_BITMAP_MAX);
1138
1139 /* if an es_id and sysmac are already present against the interface
1140 * activate it
1141 */
1142 zebra_evpn_local_es_update(zif, &zif->es_info.esi);
1143 }
1144
1145 /* handle deletion of an access port by removing it from all associated
1146 * broadcast domains.
1147 */
1148 void zebra_evpn_if_cleanup(struct zebra_if *zif)
1149 {
1150 vlanid_t vid;
1151 struct zebra_evpn_es *es;
1152
1153 if (bf_is_inited(zif->vlan_bitmap)) {
1154 bf_for_each_set_bit(zif->vlan_bitmap, vid, IF_VLAN_BITMAP_MAX)
1155 {
1156 zebra_evpn_vl_mbr_deref(vid, zif);
1157 }
1158
1159 bf_free(zif->vlan_bitmap);
1160 }
1161
1162 /* Delete associated Ethernet Segment */
1163 es = zif->es_info.es;
1164 if (es)
1165 zebra_evpn_local_es_del(&es);
1166 }
1167
1168 /*****************************************************************************
1169 * L2 NH/NHG Management
1170 * A L2 NH entry is programmed in the kernel for every ES-VTEP entry. This
1171 * NH is then added to the L2-ECMP-NHG associated with the ES.
1172 */
1173 static uint32_t zebra_evpn_nhid_alloc(struct zebra_evpn_es *es)
1174 {
1175 uint32_t id;
1176 uint32_t nh_id;
1177
1178 bf_assign_index(zmh_info->nh_id_bitmap, id);
1179
1180 if (!id)
1181 return 0;
1182
1183 if (es) {
1184 nh_id = id | EVPN_NHG_ID_TYPE_BIT;
1185 /* Add to NHG hash */
1186 es->nhg_id = nh_id;
1187 (void)hash_get(zmh_info->nhg_table, es, hash_alloc_intern);
1188 } else {
1189 nh_id = id | EVPN_NH_ID_TYPE_BIT;
1190 }
1191
1192 return nh_id;
1193 }
1194
1195 static void zebra_evpn_nhid_free(uint32_t nh_id, struct zebra_evpn_es *es)
1196 {
1197 uint32_t id = (nh_id & EVPN_NH_ID_VAL_MASK);
1198
1199 if (!id)
1200 return;
1201
1202 if (es) {
1203 hash_release(zmh_info->nhg_table, es);
1204 es->nhg_id = 0;
1205 }
1206
1207 bf_release_index(zmh_info->nh_id_bitmap, id);
1208 }
1209
1210 static unsigned int zebra_evpn_nh_ip_hash_keymake(const void *p)
1211 {
1212 const struct zebra_evpn_l2_nh *nh = p;
1213
1214 return jhash_1word(nh->vtep_ip.s_addr, 0);
1215 }
1216
1217 static bool zebra_evpn_nh_ip_cmp(const void *p1, const void *p2)
1218 {
1219 const struct zebra_evpn_l2_nh *nh1 = p1;
1220 const struct zebra_evpn_l2_nh *nh2 = p2;
1221
1222 if (nh1 == NULL && nh2 == NULL)
1223 return true;
1224
1225 if (nh1 == NULL || nh2 == NULL)
1226 return false;
1227
1228 return (nh1->vtep_ip.s_addr == nh2->vtep_ip.s_addr);
1229 }
1230
1231 static unsigned int zebra_evpn_nhg_hash_keymake(const void *p)
1232 {
1233 const struct zebra_evpn_es *es = p;
1234
1235 return jhash_1word(es->nhg_id, 0);
1236 }
1237
1238 static bool zebra_evpn_nhg_cmp(const void *p1, const void *p2)
1239 {
1240 const struct zebra_evpn_es *es1 = p1;
1241 const struct zebra_evpn_es *es2 = p2;
1242
1243 if (es1 == NULL && es2 == NULL)
1244 return true;
1245
1246 if (es1 == NULL || es2 == NULL)
1247 return false;
1248
1249 return (es1->nhg_id == es2->nhg_id);
1250 }
1251
1252 /* Lookup ES using the NHG id associated with it */
1253 static struct zebra_evpn_es *zebra_evpn_nhg_find(uint32_t nhg_id)
1254 {
1255 struct zebra_evpn_es *es;
1256 struct zebra_evpn_es tmp;
1257
1258 tmp.nhg_id = nhg_id;
1259 es = hash_lookup(zmh_info->nhg_table, &tmp);
1260
1261 return es;
1262 }
1263
1264 /* Returns TRUE if the NHG is associated with a local ES */
1265 bool zebra_evpn_nhg_is_local_es(uint32_t nhg_id,
1266 struct zebra_evpn_es **local_es)
1267 {
1268 struct zebra_evpn_es *es;
1269
1270 es = zebra_evpn_nhg_find(nhg_id);
1271 if (es && (es->flags & ZEBRA_EVPNES_LOCAL)) {
1272 *local_es = es;
1273 return true;
1274 }
1275
1276 *local_es = NULL;
1277 return false;
1278 }
1279
1280 /* update remote macs associated with the ES */
1281 static void zebra_evpn_nhg_mac_update(struct zebra_evpn_es *es)
1282 {
1283 struct zebra_mac *mac;
1284 struct listnode *node;
1285 bool local_via_nw;
1286
1287 local_via_nw = zebra_evpn_es_local_mac_via_network_port(es);
1288 if (IS_ZEBRA_DEBUG_EVPN_MH_ES || IS_ZEBRA_DEBUG_EVPN_MH_MAC)
1289 zlog_debug("mac update on es %s nhg %s", es->esi_str,
1290 (es->flags & ZEBRA_EVPNES_NHG_ACTIVE)
1291 ? "activate"
1292 : "de-activate");
1293
1294 for (ALL_LIST_ELEMENTS_RO(es->mac_list, node, mac)) {
1295 if (CHECK_FLAG(mac->flags, ZEBRA_MAC_REMOTE)
1296 || (local_via_nw && CHECK_FLAG(mac->flags, ZEBRA_MAC_LOCAL)
1297 && zebra_evpn_mac_is_static(mac))) {
1298 if (es->flags & ZEBRA_EVPNES_NHG_ACTIVE) {
1299 if (IS_ZEBRA_DEBUG_EVPN_MH_MAC)
1300 zlog_debug(
1301 "%smac %pEA install via es %s nhg 0x%x",
1302 (mac->flags & ZEBRA_MAC_REMOTE)
1303 ? "rem"
1304 : "local-nw",
1305 &mac->macaddr, es->esi_str,
1306 es->nhg_id);
1307 zebra_evpn_rem_mac_install(
1308 mac->zevpn, mac, false /*was_static*/);
1309 } else {
1310 if (IS_ZEBRA_DEBUG_EVPN_MH_MAC)
1311 zlog_debug(
1312 "%smac %pEA un-install es %s",
1313 (mac->flags & ZEBRA_MAC_REMOTE)
1314 ? "rem"
1315 : "local-nw",
1316 &mac->macaddr, es->esi_str);
1317 zebra_evpn_rem_mac_uninstall(mac->zevpn, mac,
1318 true /*force*/);
1319 }
1320 }
1321 }
1322 }
1323
1324 /* The MAC ECMP group is activated on the first VTEP */
1325 static void zebra_evpn_nhg_update(struct zebra_evpn_es *es)
1326 {
1327 uint32_t nh_cnt = 0;
1328 struct nh_grp nh_ids[ES_VTEP_MAX_CNT];
1329 struct zebra_evpn_es_vtep *es_vtep;
1330 struct listnode *node;
1331
1332 if (!es->nhg_id)
1333 return;
1334
1335 for (ALL_LIST_ELEMENTS_RO(es->es_vtep_list, node, es_vtep)) {
1336 if (!es_vtep->nh)
1337 continue;
1338
1339 if (nh_cnt >= ES_VTEP_MAX_CNT)
1340 break;
1341
1342 memset(&nh_ids[nh_cnt], 0, sizeof(struct nh_grp));
1343 nh_ids[nh_cnt].id = es_vtep->nh->nh_id;
1344 ++nh_cnt;
1345 }
1346
1347 if (nh_cnt) {
1348 if (IS_ZEBRA_DEBUG_EVPN_MH_NH) {
1349 char nh_str[ES_VTEP_LIST_STR_SZ];
1350 uint32_t i;
1351 char nh_buf[16];
1352
1353 nh_str[0] = '\0';
1354 for (i = 0; i < nh_cnt; ++i) {
1355 snprintf(nh_buf, sizeof(nh_buf), "%u ",
1356 nh_ids[i].id);
1357 strlcat(nh_str, nh_buf, sizeof(nh_str));
1358 }
1359 zlog_debug("es %s nhg %u add %s", es->esi_str,
1360 es->nhg_id, nh_str);
1361 }
1362
1363 kernel_upd_mac_nhg(es->nhg_id, nh_cnt, nh_ids);
1364 if (!(es->flags & ZEBRA_EVPNES_NHG_ACTIVE)) {
1365 es->flags |= ZEBRA_EVPNES_NHG_ACTIVE;
1366 /* add backup NHG to the br-port */
1367 if ((es->flags & ZEBRA_EVPNES_LOCAL))
1368 zebra_evpn_es_br_port_dplane_update(es,
1369 __func__);
1370 zebra_evpn_nhg_mac_update(es);
1371 }
1372 } else {
1373 if (es->flags & ZEBRA_EVPNES_NHG_ACTIVE) {
1374 if (IS_ZEBRA_DEBUG_EVPN_MH_NH)
1375 zlog_debug("es %s nhg %u del", es->esi_str,
1376 es->nhg_id);
1377 es->flags &= ~ZEBRA_EVPNES_NHG_ACTIVE;
1378 /* remove backup NHG from the br-port */
1379 if ((es->flags & ZEBRA_EVPNES_LOCAL))
1380 zebra_evpn_es_br_port_dplane_update(es,
1381 __func__);
1382 zebra_evpn_nhg_mac_update(es);
1383 kernel_del_mac_nhg(es->nhg_id);
1384 }
1385 }
1386
1387 }
1388
1389 static void zebra_evpn_es_l2_nh_show_entry(struct zebra_evpn_l2_nh *nh,
1390 struct vty *vty,
1391 json_object *json_array)
1392 {
1393 if (json_array) {
1394 json_object *json = NULL;
1395
1396 json = json_object_new_object();
1397 json_object_string_addf(json, "vtep", "%pI4", &nh->vtep_ip);
1398 json_object_int_add(json, "nhId", nh->nh_id);
1399 json_object_int_add(json, "refCnt", nh->ref_cnt);
1400
1401 json_object_array_add(json_array, json);
1402 } else {
1403 vty_out(vty, "%-16pI4 %-10u %u\n", &nh->vtep_ip, nh->nh_id,
1404 nh->ref_cnt);
1405 }
1406 }
1407
1408 static void zebra_evpn_l2_nh_show_cb(struct hash_bucket *bucket, void *ctxt)
1409 {
1410 struct zebra_evpn_l2_nh *nh = (struct zebra_evpn_l2_nh *)bucket->data;
1411 struct evpn_mh_show_ctx *wctx = (struct evpn_mh_show_ctx *)ctxt;
1412
1413 zebra_evpn_es_l2_nh_show_entry(nh, wctx->vty, wctx->json);
1414 }
1415
1416 void zebra_evpn_l2_nh_show(struct vty *vty, bool uj)
1417 {
1418 struct evpn_mh_show_ctx wctx;
1419 json_object *json_array = NULL;
1420
1421 if (uj) {
1422 json_array = json_object_new_array();
1423 } else {
1424 vty_out(vty, "%-16s %-10s %s\n", "VTEP", "NH id", "#ES");
1425 }
1426
1427 memset(&wctx, 0, sizeof(wctx));
1428 wctx.vty = vty;
1429 wctx.json = json_array;
1430
1431 hash_iterate(zmh_info->nh_ip_table, zebra_evpn_l2_nh_show_cb, &wctx);
1432
1433 if (uj)
1434 vty_json(vty, json_array);
1435 }
1436
1437 static struct zebra_evpn_l2_nh *zebra_evpn_l2_nh_find(struct in_addr vtep_ip)
1438 {
1439 struct zebra_evpn_l2_nh *nh;
1440 struct zebra_evpn_l2_nh tmp;
1441
1442 tmp.vtep_ip.s_addr = vtep_ip.s_addr;
1443 nh = hash_lookup(zmh_info->nh_ip_table, &tmp);
1444
1445 return nh;
1446 }
1447
1448 static struct zebra_evpn_l2_nh *zebra_evpn_l2_nh_alloc(struct in_addr vtep_ip)
1449 {
1450 struct zebra_evpn_l2_nh *nh;
1451
1452 nh = XCALLOC(MTYPE_L2_NH, sizeof(*nh));
1453 nh->vtep_ip = vtep_ip;
1454 (void)hash_get(zmh_info->nh_ip_table, nh, hash_alloc_intern);
1455
1456 nh->nh_id = zebra_evpn_nhid_alloc(NULL);
1457 if (!nh->nh_id) {
1458 hash_release(zmh_info->nh_ip_table, nh);
1459 XFREE(MTYPE_L2_NH, nh);
1460 return NULL;
1461 }
1462
1463 /* install the NH in the dataplane */
1464 kernel_upd_mac_nh(nh->nh_id, nh->vtep_ip);
1465
1466 return nh;
1467 }
1468
1469 static void zebra_evpn_l2_nh_free(struct zebra_evpn_l2_nh *nh)
1470 {
1471 /* delete the NH from the dataplane */
1472 kernel_del_mac_nh(nh->nh_id);
1473
1474 zebra_evpn_nhid_free(nh->nh_id, NULL);
1475 hash_release(zmh_info->nh_ip_table, nh);
1476 XFREE(MTYPE_L2_NH, nh);
1477 }
1478
1479 static void zebra_evpn_l2_nh_es_vtep_ref(struct zebra_evpn_es_vtep *es_vtep)
1480 {
1481 if (es_vtep->nh)
1482 return;
1483
1484 es_vtep->nh = zebra_evpn_l2_nh_find(es_vtep->vtep_ip);
1485 if (!es_vtep->nh)
1486 es_vtep->nh = zebra_evpn_l2_nh_alloc(es_vtep->vtep_ip);
1487
1488 if (!es_vtep->nh) {
1489 zlog_warn("es %s vtep %pI4 nh ref failed", es_vtep->es->esi_str,
1490 &es_vtep->vtep_ip);
1491 return;
1492 }
1493
1494 ++es_vtep->nh->ref_cnt;
1495
1496 if (IS_ZEBRA_DEBUG_EVPN_MH_NH)
1497 zlog_debug("es %s vtep %pI4 nh %u ref %u", es_vtep->es->esi_str,
1498 &es_vtep->vtep_ip, es_vtep->nh->nh_id,
1499 es_vtep->nh->ref_cnt);
1500
1501 /* add the NH to the parent NHG */
1502 zebra_evpn_nhg_update(es_vtep->es);
1503 }
1504
1505 static void zebra_evpn_l2_nh_es_vtep_deref(struct zebra_evpn_es_vtep *es_vtep)
1506 {
1507 struct zebra_evpn_l2_nh *nh = es_vtep->nh;
1508
1509 if (!nh)
1510 return;
1511
1512 es_vtep->nh = NULL;
1513 if (nh->ref_cnt)
1514 --nh->ref_cnt;
1515
1516 if (IS_ZEBRA_DEBUG_EVPN_MH_NH)
1517 zlog_debug("es %s vtep %pI4 nh %u deref %u",
1518 es_vtep->es->esi_str, &es_vtep->vtep_ip, nh->nh_id,
1519 nh->ref_cnt);
1520
1521 /* remove the NH from the parent NHG */
1522 zebra_evpn_nhg_update(es_vtep->es);
1523
1524 /* uninstall the NH */
1525 if (!nh->ref_cnt)
1526 zebra_evpn_l2_nh_free(nh);
1527 }
1528
1529 /*****************************************************************************/
1530 /* Ethernet Segment Management
1531 * 1. Ethernet Segment is a collection of links attached to the same
1532 * server (MHD) or switch (MHN)
1533 * 2. An Ethernet Segment can span multiple PEs and is identified by the
1534 * 10-byte ES-ID.
1535 * 3. Zebra manages the local ESI configuration.
1536 * 4. It also maintains the aliasing that maps an ESI (local or remote)
1537 * to one or more PEs/VTEPs.
1538 * 5. remote ESs are added by BGP (on rxing EAD Type-1 routes)
1539 */
1540 /* A list of remote VTEPs is maintained for each ES. This list includes -
1541 * 1. VTEPs for which we have imported the ESR i.e. ES-peers
1542 * 2. VTEPs that have an "active" ES-EVI VTEP i.e. EAD-per-ES and EAD-per-EVI
1543 * have been imported into one or more EVPNs
1544 */
1545 static int zebra_evpn_es_vtep_cmp(void *p1, void *p2)
1546 {
1547 const struct zebra_evpn_es_vtep *es_vtep1 = p1;
1548 const struct zebra_evpn_es_vtep *es_vtep2 = p2;
1549
1550 return es_vtep1->vtep_ip.s_addr - es_vtep2->vtep_ip.s_addr;
1551 }
1552
1553 static struct zebra_evpn_es_vtep *zebra_evpn_es_vtep_new(
1554 struct zebra_evpn_es *es, struct in_addr vtep_ip)
1555 {
1556 struct zebra_evpn_es_vtep *es_vtep;
1557
1558 es_vtep = XCALLOC(MTYPE_ZES_VTEP, sizeof(*es_vtep));
1559
1560 es_vtep->es = es;
1561 es_vtep->vtep_ip.s_addr = vtep_ip.s_addr;
1562 listnode_init(&es_vtep->es_listnode, es_vtep);
1563 listnode_add_sort(es->es_vtep_list, &es_vtep->es_listnode);
1564
1565 return es_vtep;
1566 }
1567
1568 static void zebra_evpn_es_vtep_free(struct zebra_evpn_es_vtep *es_vtep)
1569 {
1570 struct zebra_evpn_es *es = es_vtep->es;
1571
1572 list_delete_node(es->es_vtep_list, &es_vtep->es_listnode);
1573 /* update the L2-NHG associated with the ES */
1574 zebra_evpn_l2_nh_es_vtep_deref(es_vtep);
1575 XFREE(MTYPE_ZES_VTEP, es_vtep);
1576 }
1577
1578
1579 /* check if VTEP is already part of the list */
1580 static struct zebra_evpn_es_vtep *zebra_evpn_es_vtep_find(
1581 struct zebra_evpn_es *es, struct in_addr vtep_ip)
1582 {
1583 struct listnode *node = NULL;
1584 struct zebra_evpn_es_vtep *es_vtep;
1585
1586 for (ALL_LIST_ELEMENTS_RO(es->es_vtep_list, node, es_vtep)) {
1587 if (es_vtep->vtep_ip.s_addr == vtep_ip.s_addr)
1588 return es_vtep;
1589 }
1590 return NULL;
1591 }
1592
1593 /* flush all the dataplane br-port info associated with the ES */
1594 static bool zebra_evpn_es_br_port_dplane_clear(struct zebra_evpn_es *es)
1595 {
1596 struct in_addr sph_filters[ES_VTEP_MAX_CNT];
1597
1598 if (!(es->flags & ZEBRA_EVPNES_BR_PORT))
1599 return false;
1600
1601 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
1602 zlog_debug("es %s br-port dplane clear", es->esi_str);
1603
1604 memset(&sph_filters, 0, sizeof(sph_filters));
1605 dplane_br_port_update(es->zif->ifp, false /* non_df */, 0, sph_filters,
1606 0 /* backup_nhg_id */);
1607 return true;
1608 }
1609
1610 static inline bool
1611 zebra_evpn_es_br_port_dplane_update_needed(struct zebra_evpn_es *es)
1612 {
1613 return (es->flags & ZEBRA_EVPNES_NON_DF)
1614 || (es->flags & ZEBRA_EVPNES_NHG_ACTIVE)
1615 || listcount(es->es_vtep_list);
1616 }
1617
1618 /* returns TRUE if dplane entry was updated */
1619 static bool zebra_evpn_es_br_port_dplane_update(struct zebra_evpn_es *es,
1620 const char *caller)
1621 {
1622 uint32_t backup_nhg_id;
1623 struct in_addr sph_filters[ES_VTEP_MAX_CNT];
1624 struct listnode *node = NULL;
1625 struct zebra_evpn_es_vtep *es_vtep;
1626 uint32_t sph_filter_cnt = 0;
1627
1628 if (!(es->flags & ZEBRA_EVPNES_LOCAL))
1629 return zebra_evpn_es_br_port_dplane_clear(es);
1630
1631 /* If the ES is not a bridge port there is nothing
1632 * in the dataplane
1633 */
1634 if (!(es->flags & ZEBRA_EVPNES_BR_PORT))
1635 return false;
1636
1637 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
1638 zlog_debug("es %s br-port dplane update by %s", es->esi_str,
1639 caller);
1640 backup_nhg_id = (es->flags & ZEBRA_EVPNES_NHG_ACTIVE) ? es->nhg_id : 0;
1641
1642 memset(&sph_filters, 0, sizeof(sph_filters));
1643 if (es->flags & ZEBRA_EVPNES_BYPASS) {
1644 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
1645 zlog_debug(
1646 "es %s SPH filter disabled as it is in bypass",
1647 es->esi_str);
1648 } else {
1649 if (listcount(es->es_vtep_list) > ES_VTEP_MAX_CNT) {
1650 zlog_warn("es %s vtep count %d exceeds filter cnt %d",
1651 es->esi_str, listcount(es->es_vtep_list),
1652 ES_VTEP_MAX_CNT);
1653 } else {
1654 for (ALL_LIST_ELEMENTS_RO(es->es_vtep_list, node,
1655 es_vtep)) {
1656 if (es_vtep->flags
1657 & ZEBRA_EVPNES_VTEP_DEL_IN_PROG)
1658 continue;
1659 sph_filters[sph_filter_cnt] = es_vtep->vtep_ip;
1660 ++sph_filter_cnt;
1661 }
1662 }
1663 }
1664
1665 dplane_br_port_update(es->zif->ifp, !!(es->flags & ZEBRA_EVPNES_NON_DF),
1666 sph_filter_cnt, sph_filters, backup_nhg_id);
1667
1668 return true;
1669 }
1670
1671 /* returns TRUE if dplane entry was updated */
1672 static bool zebra_evpn_es_df_change(struct zebra_evpn_es *es, bool new_non_df,
1673 const char *caller, const char *reason)
1674 {
1675 bool old_non_df;
1676
1677 old_non_df = !!(es->flags & ZEBRA_EVPNES_NON_DF);
1678
1679 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
1680 zlog_debug("df-change es %s %s to %s; %s: %s", es->esi_str,
1681 old_non_df ? "non-df" : "df",
1682 new_non_df ? "non-df" : "df", caller, reason);
1683
1684 if (old_non_df == new_non_df)
1685 return false;
1686
1687 if (new_non_df)
1688 es->flags |= ZEBRA_EVPNES_NON_DF;
1689 else
1690 es->flags &= ~ZEBRA_EVPNES_NON_DF;
1691
1692 /* update non-DF block filter in the dataplane */
1693 return zebra_evpn_es_br_port_dplane_update(es, __func__);
1694 }
1695
1696
1697 /* returns TRUE if dplane entry was updated */
1698 static bool zebra_evpn_es_run_df_election(struct zebra_evpn_es *es,
1699 const char *caller)
1700 {
1701 struct listnode *node = NULL;
1702 struct zebra_evpn_es_vtep *es_vtep;
1703 bool new_non_df = false;
1704
1705 /* If the ES is not ready (i.e. not completely configured) there
1706 * is no need to setup the BUM block filter
1707 */
1708 if (!(es->flags & ZEBRA_EVPNES_LOCAL)
1709 || (es->flags & ZEBRA_EVPNES_BYPASS)
1710 || !zmh_info->es_originator_ip.s_addr)
1711 return zebra_evpn_es_df_change(es, new_non_df, caller,
1712 "not-ready");
1713
1714 /* if oper-state is down DF filtering must be on. when the link comes
1715 * up again dataplane should block BUM till FRR has had the chance
1716 * to run DF election again
1717 */
1718 if (!(es->flags & ZEBRA_EVPNES_OPER_UP)) {
1719 new_non_df = true;
1720 return zebra_evpn_es_df_change(es, new_non_df, caller,
1721 "oper-down");
1722 }
1723
1724 /* ES was just created; we need to wait for the peers to rx the
1725 * our Type-4 routes and for the switch to import the peers' Type-4
1726 * routes
1727 */
1728 if (es->df_delay_timer) {
1729 new_non_df = true;
1730 return zebra_evpn_es_df_change(es, new_non_df, caller,
1731 "df-delay");
1732 }
1733
1734 for (ALL_LIST_ELEMENTS_RO(es->es_vtep_list, node, es_vtep)) {
1735 /* Only VTEPs that have advertised the ESR can participate
1736 * in DF election
1737 */
1738 if (!(es_vtep->flags & ZEBRA_EVPNES_VTEP_RXED_ESR))
1739 continue;
1740
1741 /* If the DF alg is not the same we should fall back to
1742 * service-carving. But as service-carving is not supported
1743 * we will stop forwarding BUM
1744 */
1745 if (es_vtep->df_alg != EVPN_MH_DF_ALG_PREF) {
1746 new_non_df = true;
1747 break;
1748 }
1749
1750 /* Peer VTEP wins DF election if -
1751 * the peer-VTEP has higher preference (or)
1752 * the pref is the same but peer's IP address is lower
1753 */
1754 if ((es_vtep->df_pref > es->df_pref)
1755 || ((es_vtep->df_pref == es->df_pref)
1756 && (es_vtep->vtep_ip.s_addr
1757 < zmh_info->es_originator_ip.s_addr))) {
1758 new_non_df = true;
1759 break;
1760 }
1761 }
1762
1763 return zebra_evpn_es_df_change(es, new_non_df, caller, "elected");
1764 }
1765
1766 static void zebra_evpn_es_vtep_add(struct zebra_evpn_es *es,
1767 struct in_addr vtep_ip, bool esr_rxed,
1768 uint8_t df_alg, uint16_t df_pref)
1769 {
1770 struct zebra_evpn_es_vtep *es_vtep;
1771 bool old_esr_rxed;
1772 bool dplane_updated = false;
1773
1774 es_vtep = zebra_evpn_es_vtep_find(es, vtep_ip);
1775
1776 if (!es_vtep) {
1777 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
1778 zlog_debug("es %s vtep %pI4 add",
1779 es->esi_str, &vtep_ip);
1780 es_vtep = zebra_evpn_es_vtep_new(es, vtep_ip);
1781 /* update the L2-NHG associated with the ES */
1782 zebra_evpn_l2_nh_es_vtep_ref(es_vtep);
1783 }
1784
1785 old_esr_rxed = !!(es_vtep->flags & ZEBRA_EVPNES_VTEP_RXED_ESR);
1786 if ((old_esr_rxed != esr_rxed) || (es_vtep->df_alg != df_alg)
1787 || (es_vtep->df_pref != df_pref)) {
1788 /* If any of the DF election params changed we need to re-run
1789 * DF election
1790 */
1791 if (esr_rxed)
1792 es_vtep->flags |= ZEBRA_EVPNES_VTEP_RXED_ESR;
1793 else
1794 es_vtep->flags &= ~ZEBRA_EVPNES_VTEP_RXED_ESR;
1795 es_vtep->df_alg = df_alg;
1796 es_vtep->df_pref = df_pref;
1797 dplane_updated = zebra_evpn_es_run_df_election(es, __func__);
1798 }
1799 /* add the vtep to the SPH list */
1800 if (!dplane_updated && (es->flags & ZEBRA_EVPNES_LOCAL))
1801 zebra_evpn_es_br_port_dplane_update(es, __func__);
1802 }
1803
1804 static void zebra_evpn_es_vtep_del(struct zebra_evpn_es *es,
1805 struct in_addr vtep_ip)
1806 {
1807 struct zebra_evpn_es_vtep *es_vtep;
1808 bool dplane_updated = false;
1809
1810 es_vtep = zebra_evpn_es_vtep_find(es, vtep_ip);
1811
1812 if (es_vtep) {
1813 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
1814 zlog_debug("es %s vtep %pI4 del",
1815 es->esi_str, &vtep_ip);
1816 es_vtep->flags |= ZEBRA_EVPNES_VTEP_DEL_IN_PROG;
1817 if (es_vtep->flags & ZEBRA_EVPNES_VTEP_RXED_ESR) {
1818 es_vtep->flags &= ~ZEBRA_EVPNES_VTEP_RXED_ESR;
1819 dplane_updated =
1820 zebra_evpn_es_run_df_election(es, __func__);
1821 }
1822 /* remove the vtep from the SPH list */
1823 if (!dplane_updated && (es->flags & ZEBRA_EVPNES_LOCAL))
1824 zebra_evpn_es_br_port_dplane_update(es, __func__);
1825 zebra_evpn_es_vtep_free(es_vtep);
1826 }
1827 }
1828
1829 /* compare ES-IDs for the global ES RB tree */
1830 static int zebra_es_rb_cmp(const struct zebra_evpn_es *es1,
1831 const struct zebra_evpn_es *es2)
1832 {
1833 return memcmp(&es1->esi, &es2->esi, ESI_BYTES);
1834 }
1835 RB_GENERATE(zebra_es_rb_head, zebra_evpn_es, rb_node, zebra_es_rb_cmp);
1836
1837 /* Lookup ES */
1838 struct zebra_evpn_es *zebra_evpn_es_find(const esi_t *esi)
1839 {
1840 struct zebra_evpn_es tmp;
1841
1842 memcpy(&tmp.esi, esi, sizeof(esi_t));
1843 return RB_FIND(zebra_es_rb_head, &zmh_info->es_rb_tree, &tmp);
1844 }
1845
1846 /* A new local es is created when a local-es-id and sysmac is configured
1847 * against an interface.
1848 */
1849 static struct zebra_evpn_es *zebra_evpn_es_new(const esi_t *esi)
1850 {
1851 struct zebra_evpn_es *es;
1852
1853 if (!memcmp(esi, zero_esi, sizeof(esi_t)))
1854 return NULL;
1855
1856 es = XCALLOC(MTYPE_ZES, sizeof(struct zebra_evpn_es));
1857
1858 /* fill in ESI */
1859 memcpy(&es->esi, esi, sizeof(esi_t));
1860 esi_to_str(&es->esi, es->esi_str, sizeof(es->esi_str));
1861
1862 /* Add to rb_tree */
1863 RB_INSERT(zebra_es_rb_head, &zmh_info->es_rb_tree, es);
1864
1865 /* Initialise the ES-EVI list */
1866 es->es_evi_list = list_new();
1867 listset_app_node_mem(es->es_evi_list);
1868
1869 /* Initialise the VTEP list */
1870 es->es_vtep_list = list_new();
1871 listset_app_node_mem(es->es_vtep_list);
1872 es->es_vtep_list->cmp = zebra_evpn_es_vtep_cmp;
1873
1874 /* mac entries associated with the ES */
1875 es->mac_list = list_new();
1876 listset_app_node_mem(es->mac_list);
1877
1878 /* reserve a NHG */
1879 es->nhg_id = zebra_evpn_nhid_alloc(es);
1880
1881 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
1882 zlog_debug("es %s nhg %u new", es->esi_str, es->nhg_id);
1883
1884 return es;
1885 }
1886
1887 /* Free a given ES -
1888 * This just frees appropriate memory, caller should have taken other
1889 * needed actions.
1890 */
1891 static void zebra_evpn_es_free(struct zebra_evpn_es **esp)
1892 {
1893 struct zebra_evpn_es *es = *esp;
1894
1895 /* If the ES has a local or remote reference it cannot be freed.
1896 * Free is also prevented if there are MAC entries referencing
1897 * it.
1898 */
1899 if ((es->flags & (ZEBRA_EVPNES_LOCAL | ZEBRA_EVPNES_REMOTE)) ||
1900 listcount(es->mac_list))
1901 return;
1902
1903 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
1904 zlog_debug("es %s free", es->esi_str);
1905
1906 /* If the NHG is still installed uninstall it and free the id */
1907 if (es->flags & ZEBRA_EVPNES_NHG_ACTIVE) {
1908 es->flags &= ~ZEBRA_EVPNES_NHG_ACTIVE;
1909 kernel_del_mac_nhg(es->nhg_id);
1910 }
1911 zebra_evpn_nhid_free(es->nhg_id, es);
1912
1913 /* cleanup resources maintained against the ES */
1914 list_delete(&es->es_evi_list);
1915 list_delete(&es->es_vtep_list);
1916 list_delete(&es->mac_list);
1917
1918 /* remove from the VNI-ESI rb tree */
1919 RB_REMOVE(zebra_es_rb_head, &zmh_info->es_rb_tree, es);
1920
1921 XFREE(MTYPE_ZES, es);
1922
1923 *esp = NULL;
1924 }
1925
1926 /* Inform BGP about local ES addition */
1927 static int zebra_evpn_es_send_add_to_client(struct zebra_evpn_es *es)
1928 {
1929 struct zserv *client;
1930 struct stream *s;
1931 uint8_t oper_up;
1932 bool bypass;
1933
1934 client = zserv_find_client(ZEBRA_ROUTE_BGP, 0);
1935 /* BGP may not be running. */
1936 if (!client)
1937 return 0;
1938
1939 s = stream_new(ZEBRA_MAX_PACKET_SIZ);
1940
1941 zclient_create_header(s, ZEBRA_LOCAL_ES_ADD, zebra_vrf_get_evpn_id());
1942 stream_put(s, &es->esi, sizeof(esi_t));
1943 stream_put_ipv4(s, zmh_info->es_originator_ip.s_addr);
1944 oper_up = !!(es->flags & ZEBRA_EVPNES_OPER_UP);
1945 stream_putc(s, oper_up);
1946 stream_putw(s, es->df_pref);
1947 bypass = !!(es->flags & ZEBRA_EVPNES_BYPASS);
1948 stream_putc(s, bypass);
1949
1950 /* Write packet size. */
1951 stream_putw_at(s, 0, stream_get_endp(s));
1952
1953 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
1954 zlog_debug(
1955 "send add local es %s %pI4 active %u df_pref %u%s to %s",
1956 es->esi_str, &zmh_info->es_originator_ip, oper_up,
1957 es->df_pref, bypass ? " bypass" : "",
1958 zebra_route_string(client->proto));
1959
1960 client->local_es_add_cnt++;
1961 return zserv_send_message(client, s);
1962 }
1963
1964 /* Inform BGP about local ES deletion */
1965 static int zebra_evpn_es_send_del_to_client(struct zebra_evpn_es *es)
1966 {
1967 struct zserv *client;
1968 struct stream *s;
1969
1970 client = zserv_find_client(ZEBRA_ROUTE_BGP, 0);
1971 /* BGP may not be running. */
1972 if (!client)
1973 return 0;
1974
1975 s = stream_new(ZEBRA_MAX_PACKET_SIZ);
1976 stream_reset(s);
1977
1978 zclient_create_header(s, ZEBRA_LOCAL_ES_DEL, zebra_vrf_get_evpn_id());
1979 stream_put(s, &es->esi, sizeof(esi_t));
1980
1981 /* Write packet size. */
1982 stream_putw_at(s, 0, stream_get_endp(s));
1983
1984 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
1985 zlog_debug("send del local es %s to %s", es->esi_str,
1986 zebra_route_string(client->proto));
1987
1988 client->local_es_del_cnt++;
1989 return zserv_send_message(client, s);
1990 }
1991
1992 static void zebra_evpn_es_re_eval_send_to_client(struct zebra_evpn_es *es,
1993 bool es_evi_re_reval)
1994 {
1995 bool old_ready;
1996 bool new_ready;
1997 struct listnode *node;
1998 struct zebra_evpn_es_evi *es_evi;
1999
2000 old_ready = !!(es->flags & ZEBRA_EVPNES_READY_FOR_BGP);
2001
2002 if ((es->flags & ZEBRA_EVPNES_LOCAL) &&
2003 zmh_info->es_originator_ip.s_addr)
2004 es->flags |= ZEBRA_EVPNES_READY_FOR_BGP;
2005 else
2006 es->flags &= ~ZEBRA_EVPNES_READY_FOR_BGP;
2007
2008 new_ready = !!(es->flags & ZEBRA_EVPNES_READY_FOR_BGP);
2009 if (old_ready == new_ready)
2010 return;
2011
2012 if (new_ready)
2013 zebra_evpn_es_send_add_to_client(es);
2014 else
2015 zebra_evpn_es_send_del_to_client(es);
2016
2017 /* re-eval associated EVIs */
2018 if (es_evi_re_reval) {
2019 for (ALL_LIST_ELEMENTS_RO(es->es_evi_list, node, es_evi)) {
2020 if (!(es_evi->flags & ZEBRA_EVPNES_EVI_LOCAL))
2021 continue;
2022 zebra_evpn_es_evi_re_eval_send_to_client(es_evi);
2023 }
2024 }
2025 }
2026
2027 void zebra_evpn_es_send_all_to_client(bool add)
2028 {
2029 struct listnode *es_node;
2030 struct listnode *evi_node;
2031 struct zebra_evpn_es *es;
2032 struct zebra_evpn_es_evi *es_evi;
2033
2034 if (!zmh_info)
2035 return;
2036
2037 for (ALL_LIST_ELEMENTS_RO(zmh_info->local_es_list, es_node, es)) {
2038 if (es->flags & ZEBRA_EVPNES_READY_FOR_BGP) {
2039 if (add)
2040 zebra_evpn_es_send_add_to_client(es);
2041 for (ALL_LIST_ELEMENTS_RO(es->es_evi_list,
2042 evi_node, es_evi)) {
2043 if (!(es_evi->flags &
2044 ZEBRA_EVPNES_EVI_READY_FOR_BGP))
2045 continue;
2046
2047 if (add)
2048 zebra_evpn_es_evi_send_to_client(
2049 es, es_evi->zevpn,
2050 true /* add */);
2051 else
2052 zebra_evpn_es_evi_send_to_client(
2053 es, es_evi->zevpn,
2054 false /* add */);
2055 }
2056 if (!add)
2057 zebra_evpn_es_send_del_to_client(es);
2058 }
2059 }
2060 }
2061
2062 /* walk the vlan bitmap associated with the zif and create or delete
2063 * es_evis for all vlans associated with a VNI.
2064 * XXX: This API is really expensive. optimize later if possible.
2065 */
2066 static void zebra_evpn_es_setup_evis(struct zebra_evpn_es *es)
2067 {
2068 struct zebra_if *zif = es->zif;
2069 uint16_t vid;
2070 struct zebra_evpn_access_bd *acc_bd;
2071
2072 if (!bf_is_inited(zif->vlan_bitmap))
2073 return;
2074
2075 bf_for_each_set_bit(zif->vlan_bitmap, vid, IF_VLAN_BITMAP_MAX) {
2076 acc_bd = zebra_evpn_acc_vl_find(vid, zif->brslave_info.br_if);
2077 if (acc_bd->zevpn)
2078 zebra_evpn_local_es_evi_add(es, acc_bd->zevpn);
2079 }
2080 }
2081
2082 static void zebra_evpn_flush_local_mac(struct zebra_mac *mac,
2083 struct interface *ifp)
2084 {
2085 vlanid_t vid;
2086 struct zebra_if *zif;
2087 struct interface *br_ifp;
2088 struct zebra_vxlan_vni *vni;
2089
2090 zif = ifp->info;
2091 br_ifp = zif->brslave_info.br_if;
2092 if (!br_ifp)
2093 return;
2094
2095 if (mac->zevpn->vxlan_if) {
2096 zif = mac->zevpn->vxlan_if->info;
2097 vni = zebra_vxlan_if_vni_find(zif, mac->zevpn->vni);
2098 vid = vni->access_vlan;
2099 } else {
2100 vid = 0;
2101 }
2102
2103 /* delete the local mac from the dataplane */
2104 dplane_local_mac_del(ifp, br_ifp, vid, &mac->macaddr);
2105 /* delete the local mac in zebra */
2106 zebra_evpn_del_local_mac(mac->zevpn, mac, true);
2107 }
2108
2109 static void zebra_evpn_es_flush_local_macs(struct zebra_evpn_es *es,
2110 struct interface *ifp, bool add)
2111 {
2112 struct zebra_mac *mac;
2113 struct listnode *node;
2114 struct listnode *nnode;
2115
2116 for (ALL_LIST_ELEMENTS(es->mac_list, node, nnode, mac)) {
2117 if (!CHECK_FLAG(mac->flags, ZEBRA_MAC_LOCAL))
2118 continue;
2119
2120 /* If ES is being attached/detached from the access port we
2121 * need to clear local activity and peer activity and start
2122 * over */
2123 if (IS_ZEBRA_DEBUG_EVPN_MH_MAC)
2124 zlog_debug("VNI %u mac %pEA update; local ES %s %s",
2125 mac->zevpn->vni,
2126 &mac->macaddr,
2127 es->esi_str, add ? "add" : "del");
2128 zebra_evpn_flush_local_mac(mac, ifp);
2129 }
2130 }
2131
2132 void zebra_evpn_es_local_br_port_update(struct zebra_if *zif)
2133 {
2134 struct zebra_evpn_es *es = zif->es_info.es;
2135 bool old_br_port = !!(es->flags & ZEBRA_EVPNES_BR_PORT);
2136 bool new_br_port;
2137
2138 if (zif->brslave_info.bridge_ifindex != IFINDEX_INTERNAL)
2139 es->flags |= ZEBRA_EVPNES_BR_PORT;
2140 else
2141 es->flags &= ~ZEBRA_EVPNES_BR_PORT;
2142
2143 new_br_port = !!(es->flags & ZEBRA_EVPNES_BR_PORT);
2144 if (old_br_port == new_br_port)
2145 return;
2146
2147 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
2148 zlog_debug("es %s br_port change old %u new %u", es->esi_str,
2149 old_br_port, new_br_port);
2150
2151 /* update the dataplane br_port attrs */
2152 if (new_br_port && zebra_evpn_es_br_port_dplane_update_needed(es))
2153 zebra_evpn_es_br_port_dplane_update(es, __func__);
2154 }
2155
2156 /* On config of first local-ES turn off DAD */
2157 static void zebra_evpn_mh_dup_addr_detect_off(void)
2158 {
2159 struct zebra_vrf *zvrf;
2160 bool old_detect;
2161 bool new_detect;
2162
2163 if (zmh_info->flags & ZEBRA_EVPN_MH_DUP_ADDR_DETECT_OFF)
2164 return;
2165
2166 zvrf = zebra_vrf_get_evpn();
2167 old_detect = zebra_evpn_do_dup_addr_detect(zvrf);
2168 zmh_info->flags |= ZEBRA_EVPN_MH_DUP_ADDR_DETECT_OFF;
2169 new_detect = zebra_evpn_do_dup_addr_detect(zvrf);
2170
2171 if (old_detect && !new_detect) {
2172 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
2173 zlog_debug(
2174 "evpn-mh config caused DAD addr detect chg from %s to %s",
2175 old_detect ? "on" : "off",
2176 new_detect ? "on" : "off");
2177 zebra_vxlan_clear_dup_detect_vni_all(zvrf);
2178 }
2179 }
2180
2181 /* On config of first local-ES turn off advertisement of STALE/DELAY/PROBE
2182 * neighbors
2183 */
2184 static void zebra_evpn_mh_advertise_reach_neigh_only(void)
2185 {
2186 if (zmh_info->flags & ZEBRA_EVPN_MH_ADV_REACHABLE_NEIGH_ONLY)
2187 return;
2188
2189 zmh_info->flags |= ZEBRA_EVPN_MH_ADV_REACHABLE_NEIGH_ONLY;
2190 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
2191 zlog_debug("evpn-mh: only REACHABLE neigh advertised");
2192
2193 /* XXX - if STALE/DELAY/PROBE neighs were previously advertised we
2194 * need to withdraw them
2195 */
2196 }
2197
2198 /* On config of first local-ES turn on advertisement of local SVI-MAC */
2199 static void zebra_evpn_mh_advertise_svi_mac(void)
2200 {
2201 if (zmh_info->flags & ZEBRA_EVPN_MH_ADV_SVI_MAC)
2202 return;
2203
2204 zmh_info->flags |= ZEBRA_EVPN_MH_ADV_SVI_MAC;
2205 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
2206 zlog_debug("evpn-mh: advertise SVI MAC");
2207
2208 /* walk through all SVIs and see if we need to advertise the MAC */
2209 zebra_evpn_acc_vl_adv_svi_mac_all();
2210 }
2211
2212 static void zebra_evpn_es_df_delay_exp_cb(struct event *t)
2213 {
2214 struct zebra_evpn_es *es;
2215
2216 es = EVENT_ARG(t);
2217
2218 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
2219 zlog_debug("es %s df-delay expired", es->esi_str);
2220
2221 zebra_evpn_es_run_df_election(es, __func__);
2222 }
2223
2224 /* currently there is no global config to turn on MH instead we use
2225 * the addition of the first local Ethernet Segment as the trigger to
2226 * init MH specific processing
2227 */
2228 static void zebra_evpn_mh_on_first_local_es(void)
2229 {
2230 zebra_evpn_mh_dup_addr_detect_off();
2231 zebra_evpn_mh_advertise_reach_neigh_only();
2232 zebra_evpn_mh_advertise_svi_mac();
2233 }
2234
2235 static void zebra_evpn_es_local_info_set(struct zebra_evpn_es *es,
2236 struct zebra_if *zif)
2237 {
2238 if (es->flags & ZEBRA_EVPNES_LOCAL)
2239 return;
2240
2241 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
2242 zlog_debug("local es %s add; nhg %u if %s", es->esi_str,
2243 es->nhg_id, zif->ifp->name);
2244
2245 zebra_evpn_mh_on_first_local_es();
2246
2247 es->flags |= ZEBRA_EVPNES_LOCAL;
2248 listnode_init(&es->local_es_listnode, es);
2249 listnode_add(zmh_info->local_es_list, &es->local_es_listnode);
2250
2251 /* attach es to interface */
2252 zif->es_info.es = es;
2253 es->df_pref = zif->es_info.df_pref ? zif->es_info.df_pref
2254 : EVPN_MH_DF_PREF_DEFAULT;
2255
2256 /* attach interface to es */
2257 es->zif = zif;
2258 if (if_is_operative(zif->ifp))
2259 es->flags |= ZEBRA_EVPNES_OPER_UP;
2260
2261 if (zif->brslave_info.bridge_ifindex != IFINDEX_INTERNAL)
2262 es->flags |= ZEBRA_EVPNES_BR_PORT;
2263
2264 /* inherit the bypass flag from the interface */
2265 if (zif->flags & ZIF_FLAG_LACP_BYPASS)
2266 es->flags |= ZEBRA_EVPNES_BYPASS;
2267
2268 /* setup base-vni if one doesn't already exist; the ES will get sent
2269 * to BGP as a part of that process
2270 */
2271 if (!zmh_info->es_base_evpn)
2272 zebra_evpn_es_get_one_base_evpn();
2273 else
2274 /* send notification to bgp */
2275 zebra_evpn_es_re_eval_send_to_client(es,
2276 false /* es_evi_re_reval */);
2277
2278 /* Start the DF delay timer on the local ES */
2279 if (!es->df_delay_timer)
2280 event_add_timer(zrouter.master, zebra_evpn_es_df_delay_exp_cb,
2281 es, ZEBRA_EVPN_MH_DF_DELAY_TIME,
2282 &es->df_delay_timer);
2283
2284 /* See if the local VTEP can function as DF on the ES */
2285 if (!zebra_evpn_es_run_df_election(es, __func__)) {
2286 /* check if the dplane entry needs to be re-programmed as a
2287 * result of some thing other than DF status change
2288 */
2289 if (zebra_evpn_es_br_port_dplane_update_needed(es))
2290 zebra_evpn_es_br_port_dplane_update(es, __func__);
2291 }
2292
2293
2294 /* Setup ES-EVIs for all VxLAN stretched VLANs associated with
2295 * the zif
2296 */
2297 zebra_evpn_es_setup_evis(es);
2298 /* if there any local macs referring to the ES as dest we
2299 * need to clear the contents and start over
2300 */
2301 zebra_evpn_es_flush_local_macs(es, zif->ifp, true);
2302
2303 /* inherit EVPN protodown flags on the access port */
2304 zebra_evpn_mh_update_protodown_es(es, true /*resync_dplane*/);
2305 }
2306
2307 static void zebra_evpn_es_local_info_clear(struct zebra_evpn_es **esp)
2308 {
2309 struct zebra_if *zif;
2310 struct zebra_evpn_es *es = *esp;
2311 bool dplane_updated = false;
2312
2313 if (!(es->flags & ZEBRA_EVPNES_LOCAL))
2314 return;
2315
2316 zif = es->zif;
2317
2318 /* if there any local macs referring to the ES as dest we
2319 * need to clear the contents and start over
2320 */
2321 zebra_evpn_es_flush_local_macs(es, zif->ifp, false);
2322
2323 es->flags &= ~(ZEBRA_EVPNES_LOCAL | ZEBRA_EVPNES_READY_FOR_BGP);
2324
2325 EVENT_OFF(es->df_delay_timer);
2326
2327 /* clear EVPN protodown flags on the access port */
2328 zebra_evpn_mh_clear_protodown_es(es);
2329
2330 /* remove the DF filter */
2331 dplane_updated = zebra_evpn_es_run_df_election(es, __func__);
2332
2333 /* flush the BUM filters and backup NHG */
2334 if (!dplane_updated)
2335 zebra_evpn_es_br_port_dplane_clear(es);
2336
2337 /* clear the es from the parent interface */
2338 zif->es_info.es = NULL;
2339 es->zif = NULL;
2340
2341 /* clear all local flags associated with the ES */
2342 es->flags &= ~(ZEBRA_EVPNES_OPER_UP | ZEBRA_EVPNES_BR_PORT
2343 | ZEBRA_EVPNES_BYPASS);
2344
2345 /* remove from the ES list */
2346 list_delete_node(zmh_info->local_es_list, &es->local_es_listnode);
2347
2348 /* free up the ES if there is no remote reference */
2349 zebra_evpn_es_free(esp);
2350 }
2351
2352 /* Delete an ethernet segment and inform BGP */
2353 static void zebra_evpn_local_es_del(struct zebra_evpn_es **esp)
2354 {
2355 struct zebra_evpn_es_evi *es_evi;
2356 struct listnode *node = NULL;
2357 struct listnode *nnode = NULL;
2358 struct zebra_if *zif;
2359 struct zebra_evpn_es *es = *esp;
2360
2361 if (!CHECK_FLAG(es->flags, ZEBRA_EVPNES_LOCAL))
2362 return;
2363
2364 if (IS_ZEBRA_DEBUG_EVPN_MH_ES) {
2365 zif = es->zif;
2366 zlog_debug("local es %s del; nhg %u if %s", es->esi_str,
2367 es->nhg_id, zif ? zif->ifp->name : "-");
2368 }
2369
2370 /* remove all ES-EVIs associated with the ES */
2371 for (ALL_LIST_ELEMENTS(es->es_evi_list, node, nnode, es_evi))
2372 zebra_evpn_local_es_evi_do_del(es_evi);
2373
2374 /* send a del if the ES had been sent to BGP earlier */
2375 if (es->flags & ZEBRA_EVPNES_READY_FOR_BGP)
2376 zebra_evpn_es_send_del_to_client(es);
2377
2378 zebra_evpn_es_local_info_clear(esp);
2379 }
2380
2381 /* eval remote info associated with the ES */
2382 static void zebra_evpn_es_remote_info_re_eval(struct zebra_evpn_es **esp)
2383 {
2384 struct zebra_evpn_es *es = *esp;
2385
2386 /* if there are remote VTEPs the ES-EVI is classified as "remote" */
2387 if (listcount(es->es_vtep_list)) {
2388 if (!(es->flags & ZEBRA_EVPNES_REMOTE)) {
2389 es->flags |= ZEBRA_EVPNES_REMOTE;
2390 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
2391 zlog_debug("remote es %s add; nhg %u",
2392 es->esi_str, es->nhg_id);
2393 }
2394 } else {
2395 if (es->flags & ZEBRA_EVPNES_REMOTE) {
2396 es->flags &= ~ZEBRA_EVPNES_REMOTE;
2397 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
2398 zlog_debug("remote es %s del; nhg %u",
2399 es->esi_str, es->nhg_id);
2400 zebra_evpn_es_free(esp);
2401 }
2402 }
2403 }
2404
2405 /* A new local es is created when a local-es-id and sysmac is configured
2406 * against an interface.
2407 */
2408 static int zebra_evpn_local_es_update(struct zebra_if *zif, esi_t *esi)
2409 {
2410 struct zebra_evpn_es *old_es = zif->es_info.es;
2411 struct zebra_evpn_es *es;
2412
2413 if (old_es && !memcmp(&old_es->esi, esi, sizeof(*esi)))
2414 /* dup - nothing to be done */
2415 return 0;
2416
2417 /* release the old_es against the zif */
2418 if (old_es)
2419 zebra_evpn_local_es_del(&old_es);
2420
2421 es = zebra_evpn_es_find(esi);
2422 if (es) {
2423 /* if it exists against another interface flag an error */
2424 if (es->zif && es->zif != zif)
2425 return -1;
2426 } else {
2427 /* create new es */
2428 es = zebra_evpn_es_new(esi);
2429 }
2430
2431 memcpy(&zif->es_info.esi, esi, sizeof(*esi));
2432 if (es)
2433 zebra_evpn_es_local_info_set(es, zif);
2434
2435 return 0;
2436 }
2437
2438 static int zebra_evpn_type3_esi_update(struct zebra_if *zif, uint32_t lid,
2439 struct ethaddr *sysmac)
2440 {
2441 struct zebra_evpn_es *old_es = zif->es_info.es;
2442 esi_t esi;
2443 int offset = 0;
2444 int field_bytes = 0;
2445
2446 /* Complete config of the ES-ID bootstraps the ES */
2447 if (!lid || is_zero_mac(sysmac)) {
2448 /* clear old esi */
2449 memset(&zif->es_info.esi, 0, sizeof(zif->es_info.esi));
2450 /* if in ES is attached to zif delete it */
2451 if (old_es)
2452 zebra_evpn_local_es_del(&old_es);
2453 return 0;
2454 }
2455
2456 /* build 10-byte type-3-ESI -
2457 * Type(1-byte), MAC(6-bytes), ES-LID (3-bytes)
2458 */
2459 field_bytes = 1;
2460 esi.val[offset] = ESI_TYPE_MAC;
2461 offset += field_bytes;
2462
2463 field_bytes = ETH_ALEN;
2464 memcpy(&esi.val[offset], (uint8_t *)sysmac, field_bytes);
2465 offset += field_bytes;
2466
2467 esi.val[offset++] = (uint8_t)(lid >> 16);
2468 esi.val[offset++] = (uint8_t)(lid >> 8);
2469 esi.val[offset++] = (uint8_t)lid;
2470
2471 return zebra_evpn_local_es_update(zif, &esi);
2472 }
2473
2474 int zebra_evpn_remote_es_del(const esi_t *esi, struct in_addr vtep_ip)
2475 {
2476 char buf[ESI_STR_LEN];
2477 struct zebra_evpn_es *es;
2478
2479 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
2480 zlog_debug("remote es %s vtep %pI4 del",
2481 esi_to_str(esi, buf, sizeof(buf)), &vtep_ip);
2482
2483 es = zebra_evpn_es_find(esi);
2484 if (!es) {
2485 zlog_warn("remote es %s vtep %pI4 del failed, es missing",
2486 esi_to_str(esi, buf, sizeof(buf)), &vtep_ip);
2487 return -1;
2488 }
2489
2490 zebra_evpn_es_vtep_del(es, vtep_ip);
2491 zebra_evpn_es_remote_info_re_eval(&es);
2492
2493 return 0;
2494 }
2495
2496 /* force delete a remote ES on the way down */
2497 static void zebra_evpn_remote_es_flush(struct zebra_evpn_es **esp)
2498 {
2499 struct zebra_evpn_es_vtep *es_vtep;
2500 struct listnode *node;
2501 struct listnode *nnode;
2502 struct zebra_evpn_es *es = *esp;
2503
2504 for (ALL_LIST_ELEMENTS(es->es_vtep_list, node, nnode, es_vtep)) {
2505 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
2506 zlog_debug("es %s vtep %pI4 flush",
2507 es->esi_str,
2508 &es_vtep->vtep_ip);
2509 zebra_evpn_es_vtep_free(es_vtep);
2510 }
2511 zebra_evpn_es_remote_info_re_eval(esp);
2512 }
2513
2514 int zebra_evpn_remote_es_add(const esi_t *esi, struct in_addr vtep_ip,
2515 bool esr_rxed, uint8_t df_alg, uint16_t df_pref)
2516 {
2517 char buf[ESI_STR_LEN];
2518 struct zebra_evpn_es *es;
2519
2520 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
2521 zlog_debug("remote es %s vtep %pI4 add %s df_alg %d df_pref %d",
2522 esi_to_str(esi, buf, sizeof(buf)),
2523 &vtep_ip, esr_rxed ? "esr" : "", df_alg,
2524 df_pref);
2525
2526 es = zebra_evpn_es_find(esi);
2527 if (!es) {
2528 es = zebra_evpn_es_new(esi);
2529 if (!es) {
2530 zlog_warn(
2531 "remote es %s vtep %pI4 add failed, es missing",
2532 esi_to_str(esi, buf, sizeof(buf)), &vtep_ip);
2533 return -1;
2534 }
2535 }
2536
2537 if (df_alg != EVPN_MH_DF_ALG_PREF)
2538 zlog_warn(
2539 "remote es %s vtep %pI4 add %s with unsupported df_alg %d",
2540 esi_to_str(esi, buf, sizeof(buf)), &vtep_ip,
2541 esr_rxed ? "esr" : "", df_alg);
2542
2543 zebra_evpn_es_vtep_add(es, vtep_ip, esr_rxed, df_alg, df_pref);
2544 zebra_evpn_es_remote_info_re_eval(&es);
2545
2546 return 0;
2547 }
2548
2549 void zebra_evpn_proc_remote_es(ZAPI_HANDLER_ARGS)
2550 {
2551 struct stream *s;
2552 struct in_addr vtep_ip;
2553 esi_t esi;
2554
2555 if (!is_evpn_enabled()) {
2556 zlog_debug(
2557 "%s: EVPN not enabled yet we received a es_add zapi call",
2558 __func__);
2559 return;
2560 }
2561
2562 memset(&esi, 0, sizeof(esi_t));
2563 s = msg;
2564
2565 STREAM_GET(&esi, s, sizeof(esi_t));
2566 STREAM_GET(&vtep_ip.s_addr, s, sizeof(vtep_ip.s_addr));
2567
2568 if (hdr->command == ZEBRA_REMOTE_ES_VTEP_ADD) {
2569 uint32_t zapi_flags;
2570 uint8_t df_alg;
2571 uint16_t df_pref;
2572 bool esr_rxed;
2573
2574 STREAM_GETL(s, zapi_flags);
2575 esr_rxed = (zapi_flags & ZAPI_ES_VTEP_FLAG_ESR_RXED) ? true
2576 : false;
2577 STREAM_GETC(s, df_alg);
2578 STREAM_GETW(s, df_pref);
2579 zebra_rib_queue_evpn_rem_es_add(&esi, &vtep_ip, esr_rxed,
2580 df_alg, df_pref);
2581 } else {
2582 zebra_rib_queue_evpn_rem_es_del(&esi, &vtep_ip);
2583 }
2584
2585 stream_failure:
2586 return;
2587 }
2588
2589 void zebra_evpn_es_mac_deref_entry(struct zebra_mac *mac)
2590 {
2591 struct zebra_evpn_es *es = mac->es;
2592
2593 mac->es = NULL;
2594 if (!es)
2595 return;
2596
2597 list_delete_node(es->mac_list, &mac->es_listnode);
2598 if (!listcount(es->mac_list))
2599 zebra_evpn_es_free(&es);
2600 }
2601
2602 /* Associate a MAC entry with a local or remote ES. Returns false if there
2603 * was no ES change.
2604 */
2605 bool zebra_evpn_es_mac_ref_entry(struct zebra_mac *mac,
2606 struct zebra_evpn_es *es)
2607 {
2608 if (mac->es == es)
2609 return false;
2610
2611 if (mac->es)
2612 zebra_evpn_es_mac_deref_entry(mac);
2613
2614 if (!es)
2615 return true;
2616
2617 mac->es = es;
2618 listnode_init(&mac->es_listnode, mac);
2619 listnode_add(es->mac_list, &mac->es_listnode);
2620
2621 return true;
2622 }
2623
2624 bool zebra_evpn_es_mac_ref(struct zebra_mac *mac, const esi_t *esi)
2625 {
2626 struct zebra_evpn_es *es;
2627
2628 es = zebra_evpn_es_find(esi);
2629 if (!es) {
2630 /* If non-zero esi implicitly create a new ES */
2631 if (memcmp(esi, zero_esi, sizeof(esi_t))) {
2632 es = zebra_evpn_es_new(esi);
2633 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
2634 zlog_debug("auto es %s add on mac ref",
2635 es->esi_str);
2636 }
2637 }
2638
2639 return zebra_evpn_es_mac_ref_entry(mac, es);
2640 }
2641
2642 /* Inform BGP about local ES-EVI add or del */
2643 static int zebra_evpn_es_evi_send_to_client(struct zebra_evpn_es *es,
2644 struct zebra_evpn *zevpn, bool add)
2645 {
2646 struct zserv *client;
2647 struct stream *s;
2648
2649 client = zserv_find_client(ZEBRA_ROUTE_BGP, 0);
2650 /* BGP may not be running. */
2651 if (!client)
2652 return 0;
2653
2654 s = stream_new(ZEBRA_MAX_PACKET_SIZ);
2655
2656 zclient_create_header(s,
2657 add ? ZEBRA_LOCAL_ES_EVI_ADD : ZEBRA_LOCAL_ES_EVI_DEL,
2658 zebra_vrf_get_evpn_id());
2659 stream_put(s, &es->esi, sizeof(esi_t));
2660 stream_putl(s, zevpn->vni);
2661
2662 /* Write packet size. */
2663 stream_putw_at(s, 0, stream_get_endp(s));
2664
2665 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
2666 zlog_debug("send %s local es %s evi %u to %s",
2667 add ? "add" : "del",
2668 es->esi_str, zevpn->vni,
2669 zebra_route_string(client->proto));
2670
2671 client->local_es_add_cnt++;
2672 return zserv_send_message(client, s);
2673 }
2674
2675 /* sysmac part of a local ESI has changed */
2676 static int zebra_evpn_es_sys_mac_update(struct zebra_if *zif,
2677 struct ethaddr *sysmac)
2678 {
2679 int rv;
2680
2681 rv = zebra_evpn_type3_esi_update(zif, zif->es_info.lid, sysmac);
2682 if (!rv)
2683 memcpy(&zif->es_info.sysmac, sysmac, sizeof(struct ethaddr));
2684
2685 return rv;
2686 }
2687
2688 /* local-ID part of ESI has changed */
2689 static int zebra_evpn_es_lid_update(struct zebra_if *zif, uint32_t lid)
2690 {
2691 int rv;
2692
2693 rv = zebra_evpn_type3_esi_update(zif, lid, &zif->es_info.sysmac);
2694 if (!rv)
2695 zif->es_info.lid = lid;
2696
2697 return rv;
2698 }
2699
2700 /* type-0 esi has changed */
2701 static int zebra_evpn_es_type0_esi_update(struct zebra_if *zif, esi_t *esi)
2702 {
2703 int rv;
2704
2705 rv = zebra_evpn_local_es_update(zif, esi);
2706
2707 /* clear the old es_lid, es_sysmac - type-0 is being set so old
2708 * type-3 params need to be flushed
2709 */
2710 memset(&zif->es_info.sysmac, 0, sizeof(struct ethaddr));
2711 zif->es_info.lid = 0;
2712
2713 return rv;
2714 }
2715
2716 void zebra_evpn_es_cleanup(void)
2717 {
2718 struct zebra_evpn_es *es;
2719 struct zebra_evpn_es *es_next;
2720
2721 RB_FOREACH_SAFE(es, zebra_es_rb_head,
2722 &zmh_info->es_rb_tree, es_next) {
2723 zebra_evpn_local_es_del(&es);
2724 if (es)
2725 zebra_evpn_remote_es_flush(&es);
2726 }
2727 }
2728
2729 static void zebra_evpn_es_df_pref_update(struct zebra_if *zif, uint16_t df_pref)
2730 {
2731 struct zebra_evpn_es *es;
2732 uint16_t tmp_pref;
2733
2734 if (zif->es_info.df_pref == df_pref)
2735 return;
2736
2737 zif->es_info.df_pref = df_pref;
2738 es = zif->es_info.es;
2739
2740 if (!es)
2741 return;
2742
2743 tmp_pref = zif->es_info.df_pref ? zif->es_info.df_pref
2744 : EVPN_MH_DF_PREF_DEFAULT;
2745
2746 if (es->df_pref == tmp_pref)
2747 return;
2748
2749 es->df_pref = tmp_pref;
2750 /* run df election */
2751 zebra_evpn_es_run_df_election(es, __func__);
2752 /* notify bgp */
2753 if (es->flags & ZEBRA_EVPNES_READY_FOR_BGP)
2754 zebra_evpn_es_send_add_to_client(es);
2755 }
2756
2757 /* If bypass mode on an es changed we set all local macs to
2758 * inactive and drop the sync info
2759 */
2760 static void zebra_evpn_es_bypass_update_macs(struct zebra_evpn_es *es,
2761 struct interface *ifp, bool bypass)
2762 {
2763 struct zebra_mac *mac;
2764 struct listnode *node;
2765 struct listnode *nnode;
2766 struct zebra_if *zif;
2767
2768 /* Flush all MACs linked to the ES */
2769 for (ALL_LIST_ELEMENTS(es->mac_list, node, nnode, mac)) {
2770 if (!CHECK_FLAG(mac->flags, ZEBRA_MAC_LOCAL))
2771 continue;
2772
2773 if (IS_ZEBRA_DEBUG_EVPN_MH_MAC)
2774 zlog_debug("VNI %u mac %pEA %s update es %s",
2775 mac->zevpn->vni,
2776 &mac->macaddr,
2777 bypass ? "bypass" : "non-bypass",
2778 es->esi_str);
2779 zebra_evpn_flush_local_mac(mac, ifp);
2780 }
2781
2782 /* While in bypass-mode locally learnt MACs are linked
2783 * to the access port instead of the ES
2784 */
2785 zif = ifp->info;
2786 if (!zif->mac_list)
2787 return;
2788
2789 for (ALL_LIST_ELEMENTS(zif->mac_list, node, nnode, mac)) {
2790 if (!CHECK_FLAG(mac->flags, ZEBRA_MAC_LOCAL))
2791 continue;
2792
2793 if (IS_ZEBRA_DEBUG_EVPN_MH_MAC)
2794 zlog_debug("VNI %u mac %pEA %s update ifp %s",
2795 mac->zevpn->vni,
2796 &mac->macaddr,
2797 bypass ? "bypass" : "non-bypass", ifp->name);
2798 zebra_evpn_flush_local_mac(mac, ifp);
2799 }
2800 }
2801
2802 void zebra_evpn_es_bypass_update(struct zebra_evpn_es *es,
2803 struct interface *ifp, bool bypass)
2804 {
2805 bool old_bypass;
2806 bool dplane_updated;
2807
2808 old_bypass = !!(es->flags & ZEBRA_EVPNES_BYPASS);
2809 if (old_bypass == bypass)
2810 return;
2811
2812 if (bypass)
2813 es->flags |= ZEBRA_EVPNES_BYPASS;
2814 else
2815 es->flags &= ~ZEBRA_EVPNES_BYPASS;
2816
2817 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
2818 zlog_debug("bond %s es %s lacp bypass changed to %s", ifp->name,
2819 es->esi_str, bypass ? "on" : "off");
2820
2821 /* send bypass update to BGP */
2822 if (es->flags & ZEBRA_EVPNES_READY_FOR_BGP)
2823 zebra_evpn_es_send_add_to_client(es);
2824
2825 zebra_evpn_es_bypass_update_macs(es, ifp, bypass);
2826
2827 /* re-run DF election */
2828 dplane_updated = zebra_evpn_es_run_df_election(es, __func__);
2829
2830 /* disable SPH filter */
2831 if (!dplane_updated && (es->flags & ZEBRA_EVPNES_LOCAL)
2832 && (listcount(es->es_vtep_list) > ES_VTEP_MAX_CNT))
2833 zebra_evpn_es_br_port_dplane_update(es, __func__);
2834 }
2835
2836 static void zebra_evpn_es_bypass_cfg_update(struct zebra_if *zif, bool bypass)
2837 {
2838 bool old_bypass = !!(zif->es_info.flags & ZIF_CFG_ES_FLAG_BYPASS);
2839
2840 if (old_bypass == bypass)
2841 return;
2842
2843 if (bypass)
2844 zif->es_info.flags |= ZIF_CFG_ES_FLAG_BYPASS;
2845 else
2846 zif->es_info.flags &= ~ZIF_CFG_ES_FLAG_BYPASS;
2847
2848
2849 if (zif->es_info.es)
2850 zebra_evpn_es_bypass_update(zif->es_info.es, zif->ifp, bypass);
2851 }
2852
2853
2854 /* Only certain types of access ports can be setup as an Ethernet Segment */
2855 bool zebra_evpn_is_if_es_capable(struct zebra_if *zif)
2856 {
2857 if (zif->zif_type == ZEBRA_IF_BOND)
2858 return true;
2859
2860 /* relax the checks to allow config to be applied in zebra
2861 * before interface is rxed from the kernel
2862 */
2863 if (zif->ifp->ifindex == IFINDEX_INTERNAL)
2864 return true;
2865
2866 /* XXX: allow swpX i.e. a regular ethernet port to be an ES link too */
2867 return false;
2868 }
2869
2870 void zebra_evpn_if_es_print(struct vty *vty, json_object *json,
2871 struct zebra_if *zif)
2872 {
2873 char buf[ETHER_ADDR_STRLEN];
2874 char esi_buf[ESI_STR_LEN];
2875
2876 if (json) {
2877 json_object *json_evpn;
2878
2879 json_evpn = json_object_new_object();
2880 json_object_object_add(json, "evpnMh", json_evpn);
2881
2882 if (zif->es_info.lid || !is_zero_mac(&zif->es_info.sysmac)) {
2883 json_object_int_add(json_evpn, "esId",
2884 zif->es_info.lid);
2885 json_object_string_add(
2886 json_evpn, "esSysmac",
2887 prefix_mac2str(&zif->es_info.sysmac, buf,
2888 sizeof(buf)));
2889 } else if (memcmp(&zif->es_info.esi, zero_esi,
2890 sizeof(*zero_esi))) {
2891 json_object_string_add(json_evpn, "esId",
2892 esi_to_str(&zif->es_info.esi,
2893 esi_buf,
2894 sizeof(esi_buf)));
2895 }
2896
2897 if (zif->flags & ZIF_FLAG_EVPN_MH_UPLINK)
2898 json_object_string_add(
2899 json_evpn, "uplink",
2900 CHECK_FLAG(zif->flags,
2901 ZIF_FLAG_EVPN_MH_UPLINK_OPER_UP)
2902 ? "up"
2903 : "down");
2904 } else {
2905 char mh_buf[80];
2906 bool vty_print = false;
2907
2908 mh_buf[0] = '\0';
2909 strlcat(mh_buf, " EVPN-MH:", sizeof(mh_buf));
2910 if (zif->es_info.lid || !is_zero_mac(&zif->es_info.sysmac)) {
2911 vty_print = true;
2912 snprintf(mh_buf + strlen(mh_buf),
2913 sizeof(mh_buf) - strlen(mh_buf),
2914 " ES id %u ES sysmac %s", zif->es_info.lid,
2915 prefix_mac2str(&zif->es_info.sysmac, buf,
2916 sizeof(buf)));
2917 } else if (memcmp(&zif->es_info.esi, zero_esi,
2918 sizeof(*zero_esi))) {
2919 vty_print = true;
2920 snprintf(mh_buf + strnlen(mh_buf, sizeof(mh_buf)),
2921 sizeof(mh_buf)
2922 - strnlen(mh_buf, sizeof(mh_buf)),
2923 " ES id %s",
2924 esi_to_str(&zif->es_info.esi, esi_buf,
2925 sizeof(esi_buf)));
2926 }
2927
2928 if (zif->flags & ZIF_FLAG_EVPN_MH_UPLINK) {
2929 vty_print = true;
2930 if (zif->flags & ZIF_FLAG_EVPN_MH_UPLINK_OPER_UP)
2931 strlcat(mh_buf, " uplink (up)", sizeof(mh_buf));
2932 else
2933 strlcat(mh_buf, " uplink (down)",
2934 sizeof(mh_buf));
2935 }
2936
2937 if (vty_print)
2938 vty_out(vty, "%s\n", mh_buf);
2939 }
2940 }
2941
2942 static void zebra_evpn_local_mac_oper_state_change(struct zebra_evpn_es *es)
2943 {
2944 struct zebra_mac *mac;
2945 struct listnode *node;
2946
2947 /* If fast-failover is supported by the dataplane via the use
2948 * of an ES backup NHG there is nothing to be done in the
2949 * control plane
2950 */
2951 if (!(zmh_info->flags & ZEBRA_EVPN_MH_REDIRECT_OFF))
2952 return;
2953
2954 if (IS_ZEBRA_DEBUG_EVPN_MH_ES || IS_ZEBRA_DEBUG_EVPN_MH_MAC)
2955 zlog_debug("mac slow-fail on es %s %s ", es->esi_str,
2956 (es->flags & ZEBRA_EVPNES_OPER_UP) ? "up" : "down");
2957
2958 for (ALL_LIST_ELEMENTS_RO(es->mac_list, node, mac)) {
2959 if (!(mac->flags & ZEBRA_MAC_LOCAL)
2960 || !zebra_evpn_mac_is_static(mac))
2961 continue;
2962
2963 if (es->flags & ZEBRA_EVPNES_OPER_UP) {
2964 if (IS_ZEBRA_DEBUG_EVPN_MH_MAC)
2965 zlog_debug(
2966 "VNI %u mac %pEA move to acc %s es %s %s ",
2967 mac->zevpn->vni,
2968 &mac->macaddr,
2969 es->zif->ifp->name, es->esi_str,
2970 (es->flags & ZEBRA_EVPNES_OPER_UP)
2971 ? "up"
2972 : "down");
2973 /* switch the local macs to access port */
2974 if (zebra_evpn_sync_mac_dp_install(
2975 mac, false /*set_inactive*/,
2976 false /*force_clear_static*/, __func__)
2977 < 0)
2978 /* if the local mac install fails get rid of the
2979 * old rem entry
2980 */
2981 zebra_evpn_rem_mac_uninstall(mac->zevpn, mac,
2982 true /*force*/);
2983 } else {
2984 /* switch the local macs to network port. if there
2985 * is no active NHG we don't bother deleting the MAC;
2986 * that is left up to the dataplane to handle.
2987 */
2988 if (!(es->flags & ZEBRA_EVPNES_NHG_ACTIVE))
2989 continue;
2990 if (IS_ZEBRA_DEBUG_EVPN_MH_MAC)
2991 zlog_debug(
2992 "VNI %u mac %pEA move to nhg %u es %s %s ",
2993 mac->zevpn->vni,
2994 &mac->macaddr,
2995 es->nhg_id, es->esi_str,
2996 (es->flags & ZEBRA_EVPNES_OPER_UP)
2997 ? "up"
2998 : "down");
2999 zebra_evpn_rem_mac_install(mac->zevpn, mac,
3000 true /*was_static*/);
3001 }
3002 }
3003 }
3004
3005 void zebra_evpn_es_if_oper_state_change(struct zebra_if *zif, bool up)
3006 {
3007 struct zebra_evpn_es *es = zif->es_info.es;
3008 bool old_up = !!(es->flags & ZEBRA_EVPNES_OPER_UP);
3009
3010 if (old_up == up)
3011 return;
3012
3013 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
3014 zlog_debug("es %s state changed to %s ",
3015 es->esi_str,
3016 up ? "up" : "down");
3017 if (up)
3018 es->flags |= ZEBRA_EVPNES_OPER_UP;
3019 else
3020 es->flags &= ~ZEBRA_EVPNES_OPER_UP;
3021
3022 zebra_evpn_es_run_df_election(es, __func__);
3023 zebra_evpn_local_mac_oper_state_change(es);
3024
3025 /* inform BGP of the ES oper state change */
3026 if (es->flags & ZEBRA_EVPNES_READY_FOR_BGP)
3027 zebra_evpn_es_send_add_to_client(es);
3028 }
3029
3030 static char *zebra_evpn_es_vtep_str(char *vtep_str, struct zebra_evpn_es *es,
3031 uint8_t vtep_str_size)
3032 {
3033 struct zebra_evpn_es_vtep *zvtep;
3034 struct listnode *node;
3035 bool first = true;
3036 char ip_buf[INET6_ADDRSTRLEN];
3037
3038 vtep_str[0] = '\0';
3039 for (ALL_LIST_ELEMENTS_RO(es->es_vtep_list, node, zvtep)) {
3040 if (first) {
3041 first = false;
3042 strlcat(vtep_str,
3043 inet_ntop(AF_INET, &zvtep->vtep_ip, ip_buf,
3044 sizeof(ip_buf)),
3045 vtep_str_size);
3046 } else {
3047 strlcat(vtep_str, ",", vtep_str_size);
3048 strlcat(vtep_str,
3049 inet_ntop(AF_INET, &zvtep->vtep_ip, ip_buf,
3050 sizeof(ip_buf)),
3051 vtep_str_size);
3052 }
3053 }
3054 return vtep_str;
3055 }
3056
3057 static void zebra_evpn_es_json_vtep_fill(struct zebra_evpn_es *es,
3058 json_object *json_vteps)
3059 {
3060 struct zebra_evpn_es_vtep *es_vtep;
3061 struct listnode *node;
3062 json_object *json_vtep_entry;
3063 char alg_buf[EVPN_DF_ALG_STR_LEN];
3064
3065 for (ALL_LIST_ELEMENTS_RO(es->es_vtep_list, node, es_vtep)) {
3066 json_vtep_entry = json_object_new_object();
3067 json_object_string_addf(json_vtep_entry, "vtep", "%pI4",
3068 &es_vtep->vtep_ip);
3069 if (es_vtep->flags & ZEBRA_EVPNES_VTEP_RXED_ESR) {
3070 json_object_string_add(
3071 json_vtep_entry, "dfAlgorithm",
3072 evpn_es_df_alg2str(es_vtep->df_alg, alg_buf,
3073 sizeof(alg_buf)));
3074 json_object_int_add(json_vtep_entry, "dfPreference",
3075 es_vtep->df_pref);
3076 }
3077 if (es_vtep->nh)
3078 json_object_int_add(json_vtep_entry, "nexthopId",
3079 es_vtep->nh->nh_id);
3080 json_object_array_add(json_vteps, json_vtep_entry);
3081 }
3082 }
3083
3084 static void zebra_evpn_es_show_entry(struct vty *vty, struct zebra_evpn_es *es,
3085 json_object *json_array)
3086 {
3087 char type_str[5];
3088 char vtep_str[ES_VTEP_LIST_STR_SZ];
3089
3090 if (json_array) {
3091 json_object *json = NULL;
3092 json_object *json_vteps;
3093 json_object *json_flags;
3094
3095 json = json_object_new_object();
3096 json_object_string_add(json, "esi", es->esi_str);
3097
3098 if (es->flags
3099 & (ZEBRA_EVPNES_LOCAL | ZEBRA_EVPNES_REMOTE
3100 | ZEBRA_EVPNES_NON_DF)) {
3101 json_flags = json_object_new_array();
3102 if (es->flags & ZEBRA_EVPNES_LOCAL)
3103 json_array_string_add(json_flags, "local");
3104 if (es->flags & ZEBRA_EVPNES_REMOTE)
3105 json_array_string_add(json_flags, "remote");
3106 if (es->flags & ZEBRA_EVPNES_NON_DF)
3107 json_array_string_add(json_flags, "nonDF");
3108 if (es->flags & ZEBRA_EVPNES_BYPASS)
3109 json_array_string_add(json_flags, "bypass");
3110 json_object_object_add(json, "flags", json_flags);
3111 }
3112
3113 if (es->zif)
3114 json_object_string_add(json, "accessPort",
3115 es->zif->ifp->name);
3116
3117 if (listcount(es->es_vtep_list)) {
3118 json_vteps = json_object_new_array();
3119 zebra_evpn_es_json_vtep_fill(es, json_vteps);
3120 json_object_object_add(json, "vteps", json_vteps);
3121 }
3122 json_object_array_add(json_array, json);
3123 } else {
3124 type_str[0] = '\0';
3125 if (es->flags & ZEBRA_EVPNES_LOCAL)
3126 strlcat(type_str, "L", sizeof(type_str));
3127 if (es->flags & ZEBRA_EVPNES_REMOTE)
3128 strlcat(type_str, "R", sizeof(type_str));
3129 if (es->flags & ZEBRA_EVPNES_NON_DF)
3130 strlcat(type_str, "N", sizeof(type_str));
3131 if (es->flags & ZEBRA_EVPNES_BYPASS)
3132 strlcat(type_str, "B", sizeof(type_str));
3133
3134 zebra_evpn_es_vtep_str(vtep_str, es, sizeof(vtep_str));
3135
3136 vty_out(vty, "%-30s %-4s %-21s %s\n",
3137 es->esi_str, type_str,
3138 es->zif ? es->zif->ifp->name : "-",
3139 vtep_str);
3140 }
3141 }
3142
3143 static void zebra_evpn_es_show_entry_detail(struct vty *vty,
3144 struct zebra_evpn_es *es, json_object *json)
3145 {
3146 char type_str[80];
3147 char alg_buf[EVPN_DF_ALG_STR_LEN];
3148 struct zebra_evpn_es_vtep *es_vtep;
3149 struct listnode *node;
3150 char thread_buf[EVENT_TIMER_STRLEN];
3151
3152 if (json) {
3153 json_object *json_vteps;
3154 json_object *json_flags;
3155
3156 json_object_string_add(json, "esi", es->esi_str);
3157 if (es->zif)
3158 json_object_string_add(json, "accessPort",
3159 es->zif->ifp->name);
3160
3161
3162 if (es->flags) {
3163 json_flags = json_object_new_array();
3164 if (es->flags & ZEBRA_EVPNES_LOCAL)
3165 json_array_string_add(json_flags, "local");
3166 if (es->flags & ZEBRA_EVPNES_REMOTE)
3167 json_array_string_add(json_flags, "remote");
3168 if (es->flags & ZEBRA_EVPNES_LOCAL &&
3169 !(es->flags & ZEBRA_EVPNES_NON_DF))
3170 json_array_string_add(json_flags, "df");
3171 if (es->flags & ZEBRA_EVPNES_NON_DF)
3172 json_array_string_add(json_flags, "nonDF");
3173 if (es->flags & ZEBRA_EVPNES_BYPASS)
3174 json_array_string_add(json_flags, "bypass");
3175 if (es->flags & ZEBRA_EVPNES_READY_FOR_BGP)
3176 json_array_string_add(json_flags,
3177 "readyForBgp");
3178 if (es->flags & ZEBRA_EVPNES_BR_PORT)
3179 json_array_string_add(json_flags, "bridgePort");
3180 if (es->flags & ZEBRA_EVPNES_OPER_UP)
3181 json_array_string_add(json_flags, "operUp");
3182 if (es->flags & ZEBRA_EVPNES_NHG_ACTIVE)
3183 json_array_string_add(json_flags,
3184 "nexthopGroupActive");
3185 json_object_object_add(json, "flags", json_flags);
3186 }
3187
3188 json_object_int_add(json, "vniCount",
3189 listcount(es->es_evi_list));
3190 json_object_int_add(json, "macCount", listcount(es->mac_list));
3191 json_object_int_add(json, "dfPreference", es->df_pref);
3192 if (es->df_delay_timer)
3193 json_object_string_add(
3194 json, "dfDelayTimer",
3195 event_timer_to_hhmmss(thread_buf,
3196 sizeof(thread_buf),
3197 es->df_delay_timer));
3198 json_object_int_add(json, "nexthopGroup", es->nhg_id);
3199 if (listcount(es->es_vtep_list)) {
3200 json_vteps = json_object_new_array();
3201 zebra_evpn_es_json_vtep_fill(es, json_vteps);
3202 json_object_object_add(json, "vteps", json_vteps);
3203 }
3204 } else {
3205 type_str[0] = '\0';
3206 if (es->flags & ZEBRA_EVPNES_LOCAL)
3207 strlcat(type_str, "Local", sizeof(type_str));
3208 if (es->flags & ZEBRA_EVPNES_REMOTE) {
3209 if (strnlen(type_str, sizeof(type_str)))
3210 strlcat(type_str, ",", sizeof(type_str));
3211 strlcat(type_str, "Remote", sizeof(type_str));
3212 }
3213
3214 vty_out(vty, "ESI: %s\n", es->esi_str);
3215 vty_out(vty, " Type: %s\n", type_str);
3216 vty_out(vty, " Interface: %s\n",
3217 (es->zif) ?
3218 es->zif->ifp->name : "-");
3219 if (es->flags & ZEBRA_EVPNES_LOCAL) {
3220 vty_out(vty, " State: %s\n",
3221 (es->flags & ZEBRA_EVPNES_OPER_UP) ? "up"
3222 : "down");
3223 vty_out(vty, " Bridge port: %s\n",
3224 (es->flags & ZEBRA_EVPNES_BR_PORT) ? "yes"
3225 : "no");
3226 }
3227 vty_out(vty, " Ready for BGP: %s\n",
3228 (es->flags & ZEBRA_EVPNES_READY_FOR_BGP) ?
3229 "yes" : "no");
3230 if (es->flags & ZEBRA_EVPNES_BYPASS)
3231 vty_out(vty, " LACP bypass: on\n");
3232 vty_out(vty, " VNI Count: %d\n", listcount(es->es_evi_list));
3233 vty_out(vty, " MAC Count: %d\n", listcount(es->mac_list));
3234 if (es->flags & ZEBRA_EVPNES_LOCAL)
3235 vty_out(vty, " DF status: %s \n",
3236 (es->flags & ZEBRA_EVPNES_NON_DF) ? "non-df"
3237 : "df");
3238 if (es->df_delay_timer)
3239 vty_out(vty, " DF delay: %s\n",
3240 event_timer_to_hhmmss(thread_buf,
3241 sizeof(thread_buf),
3242 es->df_delay_timer));
3243 vty_out(vty, " DF preference: %u\n", es->df_pref);
3244 vty_out(vty, " Nexthop group: %u\n", es->nhg_id);
3245 vty_out(vty, " VTEPs:\n");
3246 for (ALL_LIST_ELEMENTS_RO(es->es_vtep_list, node, es_vtep)) {
3247 vty_out(vty, " %pI4",
3248 &es_vtep->vtep_ip);
3249 if (es_vtep->flags & ZEBRA_EVPNES_VTEP_RXED_ESR)
3250 vty_out(vty, " df_alg: %s df_pref: %d",
3251 evpn_es_df_alg2str(es_vtep->df_alg,
3252 alg_buf,
3253 sizeof(alg_buf)),
3254 es_vtep->df_pref);
3255 vty_out(vty, " nh: %u\n",
3256 es_vtep->nh ? es_vtep->nh->nh_id : 0);
3257 }
3258
3259 vty_out(vty, "\n");
3260 }
3261 }
3262
3263 void zebra_evpn_es_show(struct vty *vty, bool uj)
3264 {
3265 struct zebra_evpn_es *es;
3266 json_object *json_array = NULL;
3267
3268 if (uj) {
3269 json_array = json_object_new_array();
3270 } else {
3271 vty_out(vty, "Type: B bypass, L local, R remote, N non-DF\n");
3272 vty_out(vty, "%-30s %-4s %-21s %s\n",
3273 "ESI", "Type", "ES-IF", "VTEPs");
3274 }
3275
3276 RB_FOREACH(es, zebra_es_rb_head, &zmh_info->es_rb_tree)
3277 zebra_evpn_es_show_entry(vty, es, json_array);
3278
3279 if (uj)
3280 vty_json(vty, json_array);
3281 }
3282
3283 void zebra_evpn_es_show_detail(struct vty *vty, bool uj)
3284 {
3285 struct zebra_evpn_es *es;
3286 json_object *json_array = NULL;
3287
3288 if (uj)
3289 json_array = json_object_new_array();
3290
3291 RB_FOREACH (es, zebra_es_rb_head, &zmh_info->es_rb_tree) {
3292 json_object *json = NULL;
3293
3294 if (uj)
3295 json = json_object_new_object();
3296 zebra_evpn_es_show_entry_detail(vty, es, json);
3297 if (uj)
3298 json_object_array_add(json_array, json);
3299 }
3300
3301 if (uj)
3302 vty_json(vty, json_array);
3303 }
3304
3305 void zebra_evpn_es_show_esi(struct vty *vty, bool uj, esi_t *esi)
3306 {
3307 struct zebra_evpn_es *es;
3308 char esi_str[ESI_STR_LEN];
3309 json_object *json = NULL;
3310
3311 if (uj)
3312 json = json_object_new_object();
3313
3314 es = zebra_evpn_es_find(esi);
3315
3316 if (es) {
3317 zebra_evpn_es_show_entry_detail(vty, es, json);
3318 } else {
3319 if (!uj) {
3320 esi_to_str(esi, esi_str, sizeof(esi_str));
3321 vty_out(vty, "ESI %s does not exist\n", esi_str);
3322 }
3323 }
3324
3325 if (uj)
3326 vty_json(vty, json);
3327 }
3328
3329 int zebra_evpn_mh_if_write(struct vty *vty, struct interface *ifp)
3330 {
3331 struct zebra_if *zif = ifp->info;
3332 char buf[ETHER_ADDR_STRLEN];
3333 bool type_3_esi = false;
3334 char esi_buf[ESI_STR_LEN];
3335
3336 if (zif->es_info.lid) {
3337 vty_out(vty, " evpn mh es-id %u\n", zif->es_info.lid);
3338 type_3_esi = true;
3339 }
3340
3341 if (!is_zero_mac(&zif->es_info.sysmac)) {
3342 vty_out(vty, " evpn mh es-sys-mac %s\n",
3343 prefix_mac2str(&zif->es_info.sysmac,
3344 buf, sizeof(buf)));
3345 type_3_esi = true;
3346 }
3347
3348 if (!type_3_esi
3349 && memcmp(&zif->es_info.esi, zero_esi, sizeof(*zero_esi)))
3350 vty_out(vty, " evpn mh es-id %s\n",
3351 esi_to_str(&zif->es_info.esi, esi_buf, sizeof(esi_buf)));
3352
3353 if (zif->es_info.df_pref)
3354 vty_out(vty, " evpn mh es-df-pref %u\n", zif->es_info.df_pref);
3355
3356 if (zif->flags & ZIF_FLAG_EVPN_MH_UPLINK)
3357 vty_out(vty, " evpn mh uplink\n");
3358
3359 return 0;
3360 }
3361
3362 #include "zebra/zebra_evpn_mh_clippy.c"
3363 /* CLI for setting an ES in bypass mode */
3364 DEFPY_HIDDEN(zebra_evpn_es_bypass, zebra_evpn_es_bypass_cmd,
3365 "[no] evpn mh bypass",
3366 NO_STR "EVPN\n" EVPN_MH_VTY_STR "set bypass mode\n")
3367 {
3368 VTY_DECLVAR_CONTEXT(interface, ifp);
3369 struct zebra_if *zif;
3370
3371 zif = ifp->info;
3372
3373 if (no) {
3374 zebra_evpn_es_bypass_cfg_update(zif, false);
3375 } else {
3376 if (!zebra_evpn_is_if_es_capable(zif)) {
3377 vty_out(vty,
3378 "%% DF bypass cannot be associated with this interface type\n");
3379 return CMD_WARNING;
3380 }
3381 zebra_evpn_es_bypass_cfg_update(zif, true);
3382 }
3383 return CMD_SUCCESS;
3384 }
3385
3386 /* CLI for configuring DF preference part for an ES */
3387 DEFPY(zebra_evpn_es_pref, zebra_evpn_es_pref_cmd,
3388 "[no$no] evpn mh es-df-pref [(1-65535)$df_pref]",
3389 NO_STR "EVPN\n" EVPN_MH_VTY_STR
3390 "preference value used for DF election\n"
3391 "pref\n")
3392 {
3393 VTY_DECLVAR_CONTEXT(interface, ifp);
3394 struct zebra_if *zif;
3395
3396 zif = ifp->info;
3397
3398 if (no) {
3399 zebra_evpn_es_df_pref_update(zif, 0);
3400 } else {
3401 if (!zebra_evpn_is_if_es_capable(zif)) {
3402 vty_out(vty,
3403 "%% DF preference cannot be associated with this interface type\n");
3404 return CMD_WARNING;
3405 }
3406 zebra_evpn_es_df_pref_update(zif, df_pref);
3407 }
3408 return CMD_SUCCESS;
3409 }
3410
3411 /* CLI for setting up sysmac part of ESI on an access port */
3412 DEFPY(zebra_evpn_es_sys_mac,
3413 zebra_evpn_es_sys_mac_cmd,
3414 "[no$no] evpn mh es-sys-mac [X:X:X:X:X:X$mac]",
3415 NO_STR
3416 "EVPN\n"
3417 EVPN_MH_VTY_STR
3418 "Ethernet segment system MAC\n"
3419 MAC_STR
3420 )
3421 {
3422 VTY_DECLVAR_CONTEXT(interface, ifp);
3423 struct zebra_if *zif;
3424 int ret = 0;
3425
3426 zif = ifp->info;
3427
3428 if (no) {
3429 static struct ethaddr zero_mac;
3430
3431 ret = zebra_evpn_es_sys_mac_update(zif, &zero_mac);
3432 if (ret == -1) {
3433 vty_out(vty, "%% Failed to clear ES sysmac\n");
3434 return CMD_WARNING;
3435 }
3436 } else {
3437
3438 if (!zebra_evpn_is_if_es_capable(zif)) {
3439 vty_out(vty,
3440 "%% ESI cannot be associated with this interface type\n");
3441 return CMD_WARNING;
3442 }
3443
3444 if (!mac || is_zero_mac(&mac->eth_addr)) {
3445 vty_out(vty, "%% ES sysmac value is invalid\n");
3446 return CMD_WARNING;
3447 }
3448
3449 ret = zebra_evpn_es_sys_mac_update(zif, &mac->eth_addr);
3450 if (ret == -1) {
3451 vty_out(vty,
3452 "%% ESI already exists on a different interface\n");
3453 return CMD_WARNING;
3454 }
3455 }
3456 return CMD_SUCCESS;
3457 }
3458
3459 /* CLI for setting up local-ID part of ESI on an access port */
3460 DEFPY(zebra_evpn_es_id,
3461 zebra_evpn_es_id_cmd,
3462 "[no$no] evpn mh es-id [(1-16777215)$es_lid | NAME$esi_str]",
3463 NO_STR
3464 "EVPN\n"
3465 EVPN_MH_VTY_STR
3466 "Ethernet segment identifier\n"
3467 "local discriminator\n"
3468 "10-byte ID - 00:AA:BB:CC:DD:EE:FF:GG:HH:II\n"
3469 )
3470 {
3471 VTY_DECLVAR_CONTEXT(interface, ifp);
3472 struct zebra_if *zif;
3473 int ret = 0;
3474 esi_t esi;
3475
3476 zif = ifp->info;
3477
3478 if (no) {
3479 if (zif->es_info.lid)
3480 ret = zebra_evpn_es_lid_update(zif, 0);
3481 else if (memcmp(&zif->es_info.esi, zero_esi, sizeof(*zero_esi)))
3482 ret = zebra_evpn_es_type0_esi_update(zif, zero_esi);
3483
3484 if (ret == -1) {
3485 vty_out(vty,
3486 "%% Failed to clear ES local id or ESI name\n");
3487 return CMD_WARNING;
3488 }
3489 } else {
3490 if (!zebra_evpn_is_if_es_capable(zif)) {
3491 vty_out(vty,
3492 "%% ESI cannot be associated with this interface type\n");
3493 return CMD_WARNING;
3494 }
3495
3496 if (esi_str) {
3497 if (!str_to_esi(esi_str, &esi)) {
3498 vty_out(vty, "%% Malformed ESI name\n");
3499 return CMD_WARNING;
3500 }
3501 ret = zebra_evpn_es_type0_esi_update(zif, &esi);
3502 } else {
3503 if (!es_lid) {
3504 vty_out(vty,
3505 "%% Specify ES local id or ESI name\n");
3506 return CMD_WARNING;
3507 }
3508 ret = zebra_evpn_es_lid_update(zif, es_lid);
3509 }
3510
3511 if (ret == -1) {
3512 vty_out(vty,
3513 "%% ESI already exists on a different interface\n");
3514 return CMD_WARNING;
3515 }
3516 }
3517 return CMD_SUCCESS;
3518 }
3519
3520 /* CLI for tagging an interface as an uplink */
3521 DEFPY(zebra_evpn_mh_uplink, zebra_evpn_mh_uplink_cmd, "[no] evpn mh uplink",
3522 NO_STR "EVPN\n" EVPN_MH_VTY_STR "uplink to the VxLAN core\n")
3523 {
3524 VTY_DECLVAR_CONTEXT(interface, ifp);
3525 struct zebra_if *zif;
3526
3527 zif = ifp->info;
3528 zebra_evpn_mh_uplink_cfg_update(zif, no ? false : true);
3529
3530 return CMD_SUCCESS;
3531 }
3532
3533 void zebra_evpn_mh_json(json_object *json)
3534 {
3535 json_object *json_array;
3536 char thread_buf[EVENT_TIMER_STRLEN];
3537
3538 json_object_int_add(json, "macHoldtime", zmh_info->mac_hold_time);
3539 json_object_int_add(json, "neighHoldtime", zmh_info->neigh_hold_time);
3540 json_object_int_add(json, "startupDelay", zmh_info->startup_delay_time);
3541 json_object_string_add(
3542 json, "startupDelayTimer",
3543 event_timer_to_hhmmss(thread_buf, sizeof(thread_buf),
3544 zmh_info->startup_delay_timer));
3545 json_object_int_add(json, "uplinkConfigCount",
3546 zmh_info->uplink_cfg_cnt);
3547 json_object_int_add(json, "uplinkActiveCount",
3548 zmh_info->uplink_oper_up_cnt);
3549
3550 if (zmh_info->protodown_rc) {
3551 json_array = json_object_new_array();
3552 if (CHECK_FLAG(zmh_info->protodown_rc,
3553 ZEBRA_PROTODOWN_EVPN_STARTUP_DELAY))
3554 json_object_array_add(
3555 json_array,
3556 json_object_new_string("startupDelay"));
3557 if (CHECK_FLAG(zmh_info->protodown_rc,
3558 ZEBRA_PROTODOWN_EVPN_UPLINK_DOWN))
3559 json_object_array_add(
3560 json_array,
3561 json_object_new_string("uplinkDown"));
3562 json_object_object_add(json, "protodownReasons", json_array);
3563 }
3564 }
3565
3566 void zebra_evpn_mh_print(struct vty *vty)
3567 {
3568 char pd_buf[ZEBRA_PROTODOWN_RC_STR_LEN];
3569 char thread_buf[EVENT_TIMER_STRLEN];
3570
3571 vty_out(vty, "EVPN MH:\n");
3572 vty_out(vty, " mac-holdtime: %ds, neigh-holdtime: %ds\n",
3573 zmh_info->mac_hold_time, zmh_info->neigh_hold_time);
3574 vty_out(vty, " startup-delay: %ds, start-delay-timer: %s\n",
3575 zmh_info->startup_delay_time,
3576 event_timer_to_hhmmss(thread_buf, sizeof(thread_buf),
3577 zmh_info->startup_delay_timer));
3578 vty_out(vty, " uplink-cfg-cnt: %u, uplink-active-cnt: %u\n",
3579 zmh_info->uplink_cfg_cnt, zmh_info->uplink_oper_up_cnt);
3580 if (zmh_info->protodown_rc)
3581 vty_out(vty, " protodown reasons: %s\n",
3582 zebra_protodown_rc_str(zmh_info->protodown_rc, pd_buf,
3583 sizeof(pd_buf)));
3584 }
3585
3586 /*****************************************************************************/
3587 /* A base L2-VNI is maintained to derive parameters such as ES originator-IP.
3588 * XXX: once single vxlan device model becomes available this will not be
3589 * necessary
3590 */
3591 /* called when a new vni is added or becomes oper up or becomes a bridge port */
3592 void zebra_evpn_es_set_base_evpn(struct zebra_evpn *zevpn)
3593 {
3594 struct listnode *node;
3595 struct zebra_evpn_es *es;
3596
3597 if (zmh_info->es_base_evpn) {
3598 if (zmh_info->es_base_evpn != zevpn) {
3599 /* unrelated EVPN; ignore it */
3600 return;
3601 }
3602 /* check if the local vtep-ip has changed */
3603 } else {
3604 /* check if the EVPN can be used as base EVPN */
3605 if (!zebra_evpn_send_to_client_ok(zevpn))
3606 return;
3607
3608 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
3609 zlog_debug("es base vni set to %d",
3610 zevpn->vni);
3611 zmh_info->es_base_evpn = zevpn;
3612 }
3613
3614 /* update local VTEP-IP */
3615 if (zmh_info->es_originator_ip.s_addr ==
3616 zmh_info->es_base_evpn->local_vtep_ip.s_addr)
3617 return;
3618
3619 zmh_info->es_originator_ip.s_addr =
3620 zmh_info->es_base_evpn->local_vtep_ip.s_addr;
3621
3622 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
3623 zlog_debug("es originator ip set to %pI4",
3624 &zmh_info->es_base_evpn->local_vtep_ip);
3625
3626 /* if originator ip changes we need to update bgp */
3627 for (ALL_LIST_ELEMENTS_RO(zmh_info->local_es_list, node, es)) {
3628 zebra_evpn_es_run_df_election(es, __func__);
3629
3630 if (es->flags & ZEBRA_EVPNES_READY_FOR_BGP)
3631 zebra_evpn_es_send_add_to_client(es);
3632 else
3633 zebra_evpn_es_re_eval_send_to_client(es,
3634 true /* es_evi_re_reval */);
3635 }
3636 }
3637
3638 /* called when a vni is removed or becomes oper down or is removed from a
3639 * bridge
3640 */
3641 void zebra_evpn_es_clear_base_evpn(struct zebra_evpn *zevpn)
3642 {
3643 struct listnode *node;
3644 struct zebra_evpn_es *es;
3645
3646 if (zmh_info->es_base_evpn != zevpn)
3647 return;
3648
3649 zmh_info->es_base_evpn = NULL;
3650 /* lost current base EVPN; try to find a new one */
3651 zebra_evpn_es_get_one_base_evpn();
3652
3653 /* couldn't locate an eligible base evpn */
3654 if (!zmh_info->es_base_evpn && zmh_info->es_originator_ip.s_addr) {
3655 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
3656 zlog_debug("es originator ip cleared");
3657
3658 zmh_info->es_originator_ip.s_addr = 0;
3659 /* lost originator ip */
3660 for (ALL_LIST_ELEMENTS_RO(zmh_info->local_es_list, node, es)) {
3661 zebra_evpn_es_re_eval_send_to_client(es,
3662 true /* es_evi_re_reval */);
3663 }
3664 }
3665 }
3666
3667 /* Locate an "eligible" L2-VNI to follow */
3668 static int zebra_evpn_es_get_one_base_evpn_cb(struct hash_bucket *b, void *data)
3669 {
3670 struct zebra_evpn *zevpn = b->data;
3671
3672 zebra_evpn_es_set_base_evpn(zevpn);
3673
3674 if (zmh_info->es_base_evpn)
3675 return HASHWALK_ABORT;
3676
3677 return HASHWALK_CONTINUE;
3678 }
3679
3680 /* locate a base_evpn to follow for the purposes of common params like
3681 * originator IP
3682 */
3683 static void zebra_evpn_es_get_one_base_evpn(void)
3684 {
3685 struct zebra_vrf *zvrf;
3686
3687 zvrf = zebra_vrf_get_evpn();
3688 hash_walk(zvrf->evpn_table, zebra_evpn_es_get_one_base_evpn_cb, NULL);
3689 }
3690
3691 /*****************************************************************************
3692 * local ethernet segments can be error-disabled if the switch is not
3693 * ready to start transmitting traffic via the VxLAN overlay
3694 */
3695 bool zebra_evpn_is_es_bond(struct interface *ifp)
3696 {
3697 struct zebra_if *zif = ifp->info;
3698
3699 return !!(struct zebra_if *)zif->es_info.es;
3700 }
3701
3702 bool zebra_evpn_is_es_bond_member(struct interface *ifp)
3703 {
3704 struct zebra_if *zif = ifp->info;
3705
3706 return IS_ZEBRA_IF_BOND_SLAVE(zif->ifp) && zif->bondslave_info.bond_if
3707 && ((struct zebra_if *)zif->bondslave_info.bond_if->info)
3708 ->es_info.es;
3709 }
3710
3711 void zebra_evpn_mh_update_protodown_bond_mbr(struct zebra_if *zif, bool clear,
3712 const char *caller)
3713 {
3714 bool new_protodown;
3715 uint32_t old_protodown_rc = 0;
3716 uint32_t new_protodown_rc = 0;
3717 uint32_t protodown_rc = 0;
3718
3719 if (!clear) {
3720 struct zebra_if *bond_zif;
3721
3722 bond_zif = zif->bondslave_info.bond_if->info;
3723 protodown_rc = bond_zif->protodown_rc;
3724 }
3725
3726 old_protodown_rc = zif->protodown_rc;
3727 new_protodown_rc = (old_protodown_rc & ~ZEBRA_PROTODOWN_EVPN_ALL);
3728 new_protodown_rc |= (protodown_rc & ZEBRA_PROTODOWN_EVPN_ALL);
3729 new_protodown = !!new_protodown_rc;
3730
3731 if (IS_ZEBRA_DEBUG_EVPN_MH_ES && (new_protodown_rc != old_protodown_rc))
3732 zlog_debug(
3733 "%s bond mbr %s protodown_rc changed; old 0x%x new 0x%x",
3734 caller, zif->ifp->name, old_protodown_rc,
3735 new_protodown_rc);
3736
3737 if (zebra_if_update_protodown_rc(zif->ifp, new_protodown,
3738 new_protodown_rc) == 0) {
3739 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
3740 zlog_debug("%s protodown %s", zif->ifp->name,
3741 new_protodown ? "on" : "off");
3742 }
3743 }
3744
3745 /* The bond members inherit the protodown reason code from the bond */
3746 static void zebra_evpn_mh_update_protodown_bond(struct zebra_if *bond_zif)
3747 {
3748 struct zebra_if *zif;
3749 struct listnode *node;
3750
3751 if (!bond_zif->bond_info.mbr_zifs)
3752 return;
3753
3754 for (ALL_LIST_ELEMENTS_RO(bond_zif->bond_info.mbr_zifs, node, zif)) {
3755 zebra_evpn_mh_update_protodown_bond_mbr(zif, false /*clear*/,
3756 __func__);
3757 }
3758 }
3759
3760 /* The global EVPN MH protodown rc is applied to all local ESs */
3761 static void zebra_evpn_mh_update_protodown_es(struct zebra_evpn_es *es,
3762 bool resync_dplane)
3763 {
3764 struct zebra_if *zif;
3765 uint32_t old_protodown_rc;
3766
3767 zif = es->zif;
3768 /* if the reason code is the same bail unless it is a new
3769 * ES bond in that case we would need to ensure that the
3770 * dplane is really in sync with zebra
3771 */
3772 if (!resync_dplane
3773 && (zif->protodown_rc & ZEBRA_PROTODOWN_EVPN_ALL)
3774 == (zmh_info->protodown_rc & ZEBRA_PROTODOWN_EVPN_ALL))
3775 return;
3776
3777 old_protodown_rc = zif->protodown_rc;
3778 zif->protodown_rc &= ~ZEBRA_PROTODOWN_EVPN_ALL;
3779 zif->protodown_rc |=
3780 (zmh_info->protodown_rc & ZEBRA_PROTODOWN_EVPN_ALL);
3781
3782 if (IS_ZEBRA_DEBUG_EVPN_MH_ES
3783 && (old_protodown_rc != zif->protodown_rc))
3784 zlog_debug(
3785 "es %s ifp %s protodown_rc changed; old 0x%x new 0x%x",
3786 es->esi_str, zif->ifp->name, old_protodown_rc,
3787 zif->protodown_rc);
3788
3789 /* update dataplane with the new protodown setting */
3790 zebra_evpn_mh_update_protodown_bond(zif);
3791 }
3792
3793 static void zebra_evpn_mh_clear_protodown_es(struct zebra_evpn_es *es)
3794 {
3795 struct zebra_if *zif;
3796 uint32_t old_protodown_rc;
3797
3798 zif = es->zif;
3799 if (!(zif->protodown_rc & ZEBRA_PROTODOWN_EVPN_ALL))
3800 return;
3801
3802 old_protodown_rc = zif->protodown_rc;
3803 zif->protodown_rc &= ~ZEBRA_PROTODOWN_EVPN_ALL;
3804
3805 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
3806 zlog_debug(
3807 "clear: es %s ifp %s protodown_rc cleared; old 0x%x new 0x%x",
3808 es->esi_str, zif->ifp->name, old_protodown_rc,
3809 zif->protodown_rc);
3810
3811 /* update dataplane with the new protodown setting */
3812 zebra_evpn_mh_update_protodown_bond(zif);
3813 }
3814
3815 static void zebra_evpn_mh_update_protodown_es_all(void)
3816 {
3817 struct listnode *node;
3818 struct zebra_evpn_es *es;
3819
3820 for (ALL_LIST_ELEMENTS_RO(zmh_info->local_es_list, node, es))
3821 zebra_evpn_mh_update_protodown_es(es, false /*resync_dplane*/);
3822 }
3823
3824 static void zebra_evpn_mh_update_protodown(uint32_t protodown_rc, bool set)
3825 {
3826 uint32_t old_protodown_rc = zmh_info->protodown_rc;
3827
3828 if (set) {
3829 if ((protodown_rc & zmh_info->protodown_rc) == protodown_rc)
3830 return;
3831
3832 zmh_info->protodown_rc |= protodown_rc;
3833 } else {
3834 if (!(protodown_rc & zmh_info->protodown_rc))
3835 return;
3836 zmh_info->protodown_rc &= ~protodown_rc;
3837 }
3838
3839 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
3840 zlog_debug("mh protodown_rc changed; old 0x%x new 0x%x",
3841 old_protodown_rc, zmh_info->protodown_rc);
3842 zebra_evpn_mh_update_protodown_es_all();
3843 }
3844
3845 static inline bool zebra_evpn_mh_is_all_uplinks_down(void)
3846 {
3847 return zmh_info->uplink_cfg_cnt && !zmh_info->uplink_oper_up_cnt;
3848 }
3849
3850 static void zebra_evpn_mh_uplink_oper_flags_update(struct zebra_if *zif,
3851 bool set)
3852 {
3853 if (set && if_is_operative(zif->ifp)) {
3854 if (!(zif->flags & ZIF_FLAG_EVPN_MH_UPLINK_OPER_UP)) {
3855 zif->flags |= ZIF_FLAG_EVPN_MH_UPLINK_OPER_UP;
3856 ++zmh_info->uplink_oper_up_cnt;
3857 }
3858 } else {
3859 if (zif->flags & ZIF_FLAG_EVPN_MH_UPLINK_OPER_UP) {
3860 zif->flags &= ~ZIF_FLAG_EVPN_MH_UPLINK_OPER_UP;
3861 if (zmh_info->uplink_oper_up_cnt)
3862 --zmh_info->uplink_oper_up_cnt;
3863 }
3864 }
3865 }
3866
3867 static void zebra_evpn_mh_uplink_cfg_update(struct zebra_if *zif, bool set)
3868 {
3869 bool old_protodown = zebra_evpn_mh_is_all_uplinks_down();
3870 bool new_protodown;
3871
3872 if (set) {
3873 if (zif->flags & ZIF_FLAG_EVPN_MH_UPLINK)
3874 return;
3875
3876 zif->flags |= ZIF_FLAG_EVPN_MH_UPLINK;
3877 ++zmh_info->uplink_cfg_cnt;
3878 } else {
3879 if (!(zif->flags & ZIF_FLAG_EVPN_MH_UPLINK))
3880 return;
3881
3882 zif->flags &= ~ZIF_FLAG_EVPN_MH_UPLINK;
3883 if (zmh_info->uplink_cfg_cnt)
3884 --zmh_info->uplink_cfg_cnt;
3885 }
3886
3887 zebra_evpn_mh_uplink_oper_flags_update(zif, set);
3888 new_protodown = zebra_evpn_mh_is_all_uplinks_down();
3889 if (old_protodown == new_protodown)
3890 return;
3891
3892 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
3893 zlog_debug(
3894 "mh-uplink-cfg-chg on if %s/%d %s uplinks cfg %u up %u",
3895 zif->ifp->name, zif->ifp->ifindex, set ? "set" : "down",
3896 zmh_info->uplink_cfg_cnt, zmh_info->uplink_oper_up_cnt);
3897
3898 zebra_evpn_mh_update_protodown(ZEBRA_PROTODOWN_EVPN_UPLINK_DOWN,
3899 new_protodown);
3900 }
3901
3902 void zebra_evpn_mh_uplink_oper_update(struct zebra_if *zif)
3903 {
3904 bool old_protodown = zebra_evpn_mh_is_all_uplinks_down();
3905 bool new_protodown;
3906
3907 zebra_evpn_mh_uplink_oper_flags_update(zif, true /*set*/);
3908
3909 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
3910 zlog_debug(
3911 "mh-uplink-oper-chg on if %s/%d %s; uplinks cfg %u up %u",
3912 zif->ifp->name, zif->ifp->ifindex,
3913 if_is_operative(zif->ifp) ? "up" : "down",
3914 zmh_info->uplink_cfg_cnt, zmh_info->uplink_oper_up_cnt);
3915
3916 new_protodown = zebra_evpn_mh_is_all_uplinks_down();
3917 if (old_protodown == new_protodown)
3918 return;
3919
3920 /* if protodown_rc XXX_UPLINK_DOWN is about to be cleared
3921 * fire up the start-up delay timer to allow the EVPN network
3922 * to converge (Type-2 routes need to be advertised and processed)
3923 */
3924 if (!new_protodown && (zmh_info->uplink_oper_up_cnt == 1))
3925 zebra_evpn_mh_startup_delay_timer_start("uplink-up");
3926
3927 zebra_evpn_mh_update_protodown(ZEBRA_PROTODOWN_EVPN_UPLINK_DOWN,
3928 new_protodown);
3929 }
3930
3931 static void zebra_evpn_mh_startup_delay_exp_cb(struct event *t)
3932 {
3933 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
3934 zlog_debug("startup-delay expired");
3935
3936 zebra_evpn_mh_update_protodown(ZEBRA_PROTODOWN_EVPN_STARTUP_DELAY,
3937 false /* set */);
3938 }
3939
3940 static void zebra_evpn_mh_startup_delay_timer_start(const char *rc)
3941 {
3942 if (zmh_info->startup_delay_timer) {
3943 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
3944 zlog_debug("startup-delay timer cancelled");
3945 EVENT_OFF(zmh_info->startup_delay_timer);
3946 }
3947
3948 if (zmh_info->startup_delay_time) {
3949 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
3950 zlog_debug(
3951 "startup-delay timer started for %d sec on %s",
3952 zmh_info->startup_delay_time, rc);
3953 event_add_timer(zrouter.master,
3954 zebra_evpn_mh_startup_delay_exp_cb, NULL,
3955 zmh_info->startup_delay_time,
3956 &zmh_info->startup_delay_timer);
3957 zebra_evpn_mh_update_protodown(
3958 ZEBRA_PROTODOWN_EVPN_STARTUP_DELAY, true /* set */);
3959 } else {
3960 zebra_evpn_mh_update_protodown(
3961 ZEBRA_PROTODOWN_EVPN_STARTUP_DELAY, false /* set */);
3962 }
3963 }
3964
3965 /*****************************************************************************
3966 * Nexthop management: nexthops associated with Type-2 routes that have
3967 * an ES as destination are consolidated by BGP into a per-VRF nh->rmac
3968 * mapping which is the installed as a remote neigh/fdb entry with a
3969 * dummy (type-1) prefix referencing it.
3970 * This handling is needed because Type-2 routes with ES as dest use NHG
3971 * that are setup using EAD routes (i.e. such NHGs do not include the
3972 * RMAC info).
3973 ****************************************************************************/
3974 void zebra_evpn_proc_remote_nh(ZAPI_HANDLER_ARGS)
3975 {
3976 struct stream *s;
3977 vrf_id_t vrf_id;
3978 struct ipaddr nh;
3979 struct ethaddr rmac;
3980 struct prefix_evpn dummy_prefix;
3981 size_t min_len = 4 + sizeof(nh);
3982
3983 s = msg;
3984
3985 /*
3986 * Ensure that the stream sent to us is long enough
3987 */
3988 if (hdr->command == ZEBRA_EVPN_REMOTE_NH_ADD)
3989 min_len += sizeof(rmac);
3990 if (hdr->length < min_len)
3991 return;
3992
3993 vrf_id = stream_getl(s);
3994 stream_get(&nh, s, sizeof(nh));
3995
3996 memset(&dummy_prefix, 0, sizeof(dummy_prefix));
3997 dummy_prefix.family = AF_EVPN;
3998 dummy_prefix.prefixlen = (sizeof(struct evpn_addr) * 8);
3999 dummy_prefix.prefix.route_type = 1; /* XXX - fixup to type-1 def */
4000 dummy_prefix.prefix.ead_addr.ip.ipa_type = nh.ipa_type;
4001
4002 if (hdr->command == ZEBRA_EVPN_REMOTE_NH_ADD) {
4003 stream_get(&rmac, s, sizeof(rmac));
4004 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
4005 zlog_debug(
4006 "evpn remote nh %d %pIA rmac %pEA add pfx %pFX",
4007 vrf_id, &nh, &rmac, &dummy_prefix);
4008 zebra_rib_queue_evpn_route_add(vrf_id, &rmac, &nh,
4009 (struct prefix *)&dummy_prefix);
4010 } else {
4011 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
4012 zlog_debug("evpn remote nh %d %pIA del pfx %pFX",
4013 vrf_id, &nh, &dummy_prefix);
4014 zebra_rib_queue_evpn_route_del(vrf_id, &nh,
4015 (struct prefix *)&dummy_prefix);
4016 }
4017 }
4018
4019 /*****************************************************************************/
4020 void zebra_evpn_mh_config_write(struct vty *vty)
4021 {
4022 if (zmh_info->mac_hold_time != ZEBRA_EVPN_MH_MAC_HOLD_TIME_DEF)
4023 vty_out(vty, "evpn mh mac-holdtime %d\n",
4024 zmh_info->mac_hold_time);
4025
4026 if (zmh_info->neigh_hold_time != ZEBRA_EVPN_MH_NEIGH_HOLD_TIME_DEF)
4027 vty_out(vty, "evpn mh neigh-holdtime %d\n",
4028 zmh_info->neigh_hold_time);
4029
4030 if (zmh_info->startup_delay_time != ZEBRA_EVPN_MH_STARTUP_DELAY_DEF)
4031 vty_out(vty, "evpn mh startup-delay %d\n",
4032 zmh_info->startup_delay_time);
4033
4034 if (zmh_info->flags & ZEBRA_EVPN_MH_REDIRECT_OFF)
4035 vty_out(vty, "evpn mh redirect-off\n");
4036 }
4037
4038 int zebra_evpn_mh_neigh_holdtime_update(struct vty *vty,
4039 uint32_t duration, bool set_default)
4040 {
4041 if (set_default)
4042 duration = ZEBRA_EVPN_MH_NEIGH_HOLD_TIME_DEF;
4043
4044 zmh_info->neigh_hold_time = duration;
4045
4046 return 0;
4047 }
4048
4049 int zebra_evpn_mh_mac_holdtime_update(struct vty *vty,
4050 uint32_t duration, bool set_default)
4051 {
4052 if (set_default)
4053 duration = ZEBRA_EVPN_MH_MAC_HOLD_TIME_DEF;
4054
4055 zmh_info->mac_hold_time = duration;
4056
4057 return 0;
4058 }
4059
4060 int zebra_evpn_mh_startup_delay_update(struct vty *vty, uint32_t duration,
4061 bool set_default)
4062 {
4063 if (set_default)
4064 duration = ZEBRA_EVPN_MH_STARTUP_DELAY_DEF;
4065
4066 zmh_info->startup_delay_time = duration;
4067
4068 /* if startup_delay_timer is running allow it to be adjusted
4069 * up or down
4070 */
4071 if (zmh_info->startup_delay_timer)
4072 zebra_evpn_mh_startup_delay_timer_start("config");
4073
4074 return 0;
4075 }
4076
4077 int zebra_evpn_mh_redirect_off(struct vty *vty, bool redirect_off)
4078 {
4079 /* This knob needs to be set before ESs are configured
4080 * i.e. cannot be changed on the fly
4081 */
4082 if (redirect_off)
4083 zmh_info->flags |= ZEBRA_EVPN_MH_REDIRECT_OFF;
4084 else
4085 zmh_info->flags &= ~ZEBRA_EVPN_MH_REDIRECT_OFF;
4086
4087 return 0;
4088 }
4089
4090 void zebra_evpn_interface_init(void)
4091 {
4092 install_element(INTERFACE_NODE, &zebra_evpn_es_id_cmd);
4093 install_element(INTERFACE_NODE, &zebra_evpn_es_sys_mac_cmd);
4094 install_element(INTERFACE_NODE, &zebra_evpn_es_pref_cmd);
4095 install_element(INTERFACE_NODE, &zebra_evpn_es_bypass_cmd);
4096 install_element(INTERFACE_NODE, &zebra_evpn_mh_uplink_cmd);
4097 }
4098
4099 void zebra_evpn_mh_init(void)
4100 {
4101 zrouter.mh_info = XCALLOC(MTYPE_ZMH_INFO, sizeof(*zrouter.mh_info));
4102
4103 zmh_info->mac_hold_time = ZEBRA_EVPN_MH_MAC_HOLD_TIME_DEF;
4104 zmh_info->neigh_hold_time = ZEBRA_EVPN_MH_NEIGH_HOLD_TIME_DEF;
4105 /* setup ES tables */
4106 RB_INIT(zebra_es_rb_head, &zmh_info->es_rb_tree);
4107 zmh_info->local_es_list = list_new();
4108 listset_app_node_mem(zmh_info->local_es_list);
4109
4110 bf_init(zmh_info->nh_id_bitmap, EVPN_NH_ID_MAX);
4111 bf_assign_zero_index(zmh_info->nh_id_bitmap);
4112 zmh_info->nhg_table = hash_create(zebra_evpn_nhg_hash_keymake,
4113 zebra_evpn_nhg_cmp, "l2 NHG table");
4114 zmh_info->nh_ip_table =
4115 hash_create(zebra_evpn_nh_ip_hash_keymake, zebra_evpn_nh_ip_cmp,
4116 "l2 NH IP table");
4117
4118 /* setup broadcast domain tables */
4119 zmh_info->evpn_vlan_table = hash_create(zebra_evpn_acc_vl_hash_keymake,
4120 zebra_evpn_acc_vl_cmp, "access VLAN hash table");
4121
4122 zmh_info->startup_delay_time = ZEBRA_EVPN_MH_STARTUP_DELAY_DEF;
4123 zebra_evpn_mh_startup_delay_timer_start("init");
4124 }
4125
4126 void zebra_evpn_mh_terminate(void)
4127 {
4128 list_delete(&zmh_info->local_es_list);
4129
4130 hash_iterate(zmh_info->evpn_vlan_table,
4131 zebra_evpn_acc_vl_cleanup_all, NULL);
4132 hash_free(zmh_info->evpn_vlan_table);
4133 hash_free(zmh_info->nhg_table);
4134 hash_free(zmh_info->nh_ip_table);
4135 bf_free(zmh_info->nh_id_bitmap);
4136
4137 XFREE(MTYPE_ZMH_INFO, zrouter.mh_info);
4138 }