]> git.proxmox.com Git - mirror_frr.git/blob - zebra/zebra_evpn_mh.c
Merge pull request #10962 from louis-6wind/lfa-netlink
[mirror_frr.git] / zebra / zebra_evpn_mh.c
1 /*
2 * Zebra EVPN multihoming code
3 *
4 * Copyright (C) 2019 Cumulus Networks, Inc.
5 * Anuradha Karuppiah
6 *
7 * This file is part of FRR.
8 *
9 * FRR is free software; you can redistribute it and/or modify it
10 * under the terms of the GNU General Public License as published by the
11 * Free Software Foundation; either version 2, or (at your option) any
12 * later version.
13 *
14 * FRR is distributed in the hope that it will be useful, but
15 * WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
17 * General Public License for more details.
18 */
19
20 #include <zebra.h>
21
22 #include "command.h"
23 #include "hash.h"
24 #include "if.h"
25 #include "jhash.h"
26 #include "linklist.h"
27 #include "log.h"
28 #include "memory.h"
29 #include "prefix.h"
30 #include "stream.h"
31 #include "table.h"
32 #include "vlan.h"
33 #include "vxlan.h"
34
35 #include "zebra/zebra_router.h"
36 #include "zebra/debug.h"
37 #include "zebra/interface.h"
38 #include "zebra/rib.h"
39 #include "zebra/rt.h"
40 #include "zebra/rt_netlink.h"
41 #include "zebra/if_netlink.h"
42 #include "zebra/zebra_errors.h"
43 #include "zebra/zebra_l2.h"
44 #include "zebra/zebra_ns.h"
45 #include "zebra/zebra_vrf.h"
46 #include "zebra/zebra_vxlan.h"
47 #include "zebra/zebra_evpn.h"
48 #include "zebra/zebra_evpn_mac.h"
49 #include "zebra/zebra_vxlan_private.h"
50 #include "zebra/zebra_router.h"
51 #include "zebra/zebra_evpn_mh.h"
52 #include "zebra/zebra_nhg.h"
53
54 DEFINE_MTYPE_STATIC(ZEBRA, ZACC_BD, "Access Broadcast Domain");
55 DEFINE_MTYPE_STATIC(ZEBRA, ZES, "Ethernet Segment");
56 DEFINE_MTYPE_STATIC(ZEBRA, ZES_EVI, "ES info per-EVI");
57 DEFINE_MTYPE_STATIC(ZEBRA, ZMH_INFO, "MH global info");
58 DEFINE_MTYPE_STATIC(ZEBRA, ZES_VTEP, "VTEP attached to the ES");
59 DEFINE_MTYPE_STATIC(ZEBRA, L2_NH, "L2 nexthop");
60
61 static void zebra_evpn_es_get_one_base_evpn(void);
62 static int zebra_evpn_es_evi_send_to_client(struct zebra_evpn_es *es,
63 struct zebra_evpn *zevpn, bool add);
64 static void zebra_evpn_local_es_del(struct zebra_evpn_es **esp);
65 static int zebra_evpn_local_es_update(struct zebra_if *zif, esi_t *esi);
66 static bool zebra_evpn_es_br_port_dplane_update(struct zebra_evpn_es *es,
67 const char *caller);
68 static void zebra_evpn_mh_uplink_cfg_update(struct zebra_if *zif, bool set);
69 static void zebra_evpn_mh_update_protodown_es(struct zebra_evpn_es *es,
70 bool resync_dplane);
71 static void zebra_evpn_mh_clear_protodown_es(struct zebra_evpn_es *es);
72 static void zebra_evpn_mh_startup_delay_timer_start(const char *rc);
73
74 esi_t zero_esi_buf, *zero_esi = &zero_esi_buf;
75
76 /*****************************************************************************/
77 /* Ethernet Segment to EVI association -
78 * 1. The ES-EVI entry is maintained as a RB tree per L2-VNI
79 * (struct zebra_evpn.es_evi_rb_tree).
80 * 2. Each local ES-EVI entry is sent to BGP which advertises it as an
81 * EAD-EVI (Type-1 EVPN) route
82 * 3. Local ES-EVI setup is re-evaluated on the following triggers -
83 * a. When an ESI is set or cleared on an access port.
84 * b. When an access port associated with an ESI is deleted.
85 * c. When VLAN member ship changes on an access port.
86 * d. When a VXLAN_IF is set or cleared on an access broadcast domain.
87 * e. When a L2-VNI is added or deleted for a VxLAN_IF.
88 * 4. Currently zebra doesn't remote ES-EVIs. Those are managed and maintained
89 * entirely in BGP which consolidates them into a remote ES. The remote ES
90 * is then sent to zebra which allocates a NHG for it.
91 */
92
93 /* compare ES-IDs for the ES-EVI RB tree maintained per-EVPN */
94 static int zebra_es_evi_rb_cmp(const struct zebra_evpn_es_evi *es_evi1,
95 const struct zebra_evpn_es_evi *es_evi2)
96 {
97 return memcmp(&es_evi1->es->esi, &es_evi2->es->esi, ESI_BYTES);
98 }
99 RB_GENERATE(zebra_es_evi_rb_head, zebra_evpn_es_evi,
100 rb_node, zebra_es_evi_rb_cmp);
101
102 /* allocate a new ES-EVI and insert it into the per-L2-VNI and per-ES
103 * tables.
104 */
105 static struct zebra_evpn_es_evi *zebra_evpn_es_evi_new(struct zebra_evpn_es *es,
106 struct zebra_evpn *zevpn)
107 {
108 struct zebra_evpn_es_evi *es_evi;
109
110 es_evi = XCALLOC(MTYPE_ZES_EVI, sizeof(struct zebra_evpn_es_evi));
111
112 es_evi->es = es;
113 es_evi->zevpn = zevpn;
114
115 /* insert into the EVPN-ESI rb tree */
116 RB_INSERT(zebra_es_evi_rb_head, &zevpn->es_evi_rb_tree, es_evi);
117
118 /* add to the ES's VNI list */
119 listnode_init(&es_evi->es_listnode, es_evi);
120 listnode_add(es->es_evi_list, &es_evi->es_listnode);
121
122 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
123 zlog_debug("es %s evi %d new",
124 es_evi->es->esi_str, es_evi->zevpn->vni);
125
126 return es_evi;
127 }
128
129 /* Evaluate if the es_evi is ready to be sent BGP -
130 * 1. If it is ready an add is sent to BGP
131 * 2. If it is not ready a del is sent (if the ES had been previously added
132 * to BGP).
133 */
134 static void zebra_evpn_es_evi_re_eval_send_to_client(
135 struct zebra_evpn_es_evi *es_evi)
136 {
137 bool old_ready;
138 bool new_ready;
139
140 old_ready = !!(es_evi->flags & ZEBRA_EVPNES_EVI_READY_FOR_BGP);
141
142 /* ES and L2-VNI have to be individually ready for BGP */
143 if ((es_evi->flags & ZEBRA_EVPNES_EVI_LOCAL) &&
144 (es_evi->es->flags & ZEBRA_EVPNES_READY_FOR_BGP) &&
145 zebra_evpn_send_to_client_ok(es_evi->zevpn))
146 es_evi->flags |= ZEBRA_EVPNES_EVI_READY_FOR_BGP;
147 else
148 es_evi->flags &= ~ZEBRA_EVPNES_EVI_READY_FOR_BGP;
149
150 new_ready = !!(es_evi->flags & ZEBRA_EVPNES_EVI_READY_FOR_BGP);
151
152 if (old_ready == new_ready)
153 return;
154
155 if (new_ready)
156 zebra_evpn_es_evi_send_to_client(es_evi->es, es_evi->zevpn,
157 true /* add */);
158 else
159 zebra_evpn_es_evi_send_to_client(es_evi->es, es_evi->zevpn,
160 false /* add */);
161 }
162
163 /* remove the ES-EVI from the per-L2-VNI and per-ES tables and free
164 * up the memory.
165 */
166 static void zebra_evpn_es_evi_free(struct zebra_evpn_es_evi *es_evi)
167 {
168 struct zebra_evpn_es *es = es_evi->es;
169 struct zebra_evpn *zevpn = es_evi->zevpn;
170
171 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
172 zlog_debug("es %s evi %d free",
173 es_evi->es->esi_str, es_evi->zevpn->vni);
174
175 /* remove from the ES's VNI list */
176 list_delete_node(es->es_evi_list, &es_evi->es_listnode);
177
178 /* remove from the VNI-ESI rb tree */
179 RB_REMOVE(zebra_es_evi_rb_head, &zevpn->es_evi_rb_tree, es_evi);
180
181 /* remove from the VNI-ESI rb tree */
182 XFREE(MTYPE_ZES_EVI, es_evi);
183 }
184
185 /* find the ES-EVI in the per-L2-VNI RB tree */
186 struct zebra_evpn_es_evi *zebra_evpn_es_evi_find(struct zebra_evpn_es *es,
187 struct zebra_evpn *zevpn)
188 {
189 struct zebra_evpn_es_evi es_evi;
190
191 es_evi.es = es;
192
193 return RB_FIND(zebra_es_evi_rb_head, &zevpn->es_evi_rb_tree, &es_evi);
194 }
195
196 /* Tell BGP about an ES-EVI deletion and then delete it */
197 static void zebra_evpn_local_es_evi_do_del(struct zebra_evpn_es_evi *es_evi)
198 {
199 if (!(es_evi->flags & ZEBRA_EVPNES_EVI_LOCAL))
200 return;
201
202 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
203 zlog_debug("local es %s evi %d del",
204 es_evi->es->esi_str, es_evi->zevpn->vni);
205
206 if (es_evi->flags & ZEBRA_EVPNES_EVI_READY_FOR_BGP) {
207 /* send a del only if add was sent for it earlier */
208 zebra_evpn_es_evi_send_to_client(es_evi->es,
209 es_evi->zevpn, false /* add */);
210 }
211
212 /* delete it from the EVPN's local list */
213 list_delete_node(es_evi->zevpn->local_es_evi_list,
214 &es_evi->l2vni_listnode);
215
216 es_evi->flags &= ~ZEBRA_EVPNES_EVI_LOCAL;
217 zebra_evpn_es_evi_free(es_evi);
218 }
219 static void zebra_evpn_local_es_evi_del(struct zebra_evpn_es *es,
220 struct zebra_evpn *zevpn)
221 {
222 struct zebra_evpn_es_evi *es_evi;
223
224 es_evi = zebra_evpn_es_evi_find(es, zevpn);
225 if (es_evi)
226 zebra_evpn_local_es_evi_do_del(es_evi);
227 }
228
229 /* If there are any existing MAC entries for this es/zevpn we need
230 * to install it in the dataplane.
231 *
232 * Note: primary purpose of this is to handle es del/re-add windows where
233 * sync MAC entries may be added by bgpd before the es-evi membership is
234 * created in the dataplane and in zebra
235 */
236 static void zebra_evpn_es_evi_mac_install(struct zebra_evpn_es_evi *es_evi)
237 {
238 struct zebra_mac *mac;
239 struct listnode *node;
240 struct zebra_evpn_es *es = es_evi->es;
241
242 if (listcount(es->mac_list) && IS_ZEBRA_DEBUG_EVPN_MH_ES)
243 zlog_debug("dp-mac install on es %s evi %d add", es->esi_str,
244 es_evi->zevpn->vni);
245
246 for (ALL_LIST_ELEMENTS_RO(es->mac_list, node, mac)) {
247 if (mac->zevpn != es_evi->zevpn)
248 continue;
249
250 if (!CHECK_FLAG(mac->flags, ZEBRA_MAC_LOCAL))
251 continue;
252
253 zebra_evpn_sync_mac_dp_install(mac, false, false, __func__);
254 }
255 }
256
257 /* Create an ES-EVI if it doesn't already exist and tell BGP */
258 static void zebra_evpn_local_es_evi_add(struct zebra_evpn_es *es,
259 struct zebra_evpn *zevpn)
260 {
261 struct zebra_evpn_es_evi *es_evi;
262
263 es_evi = zebra_evpn_es_evi_find(es, zevpn);
264 if (!es_evi) {
265 es_evi = zebra_evpn_es_evi_new(es, zevpn);
266 if (!es_evi)
267 return;
268
269 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
270 zlog_debug("local es %s evi %d add",
271 es_evi->es->esi_str, es_evi->zevpn->vni);
272 es_evi->flags |= ZEBRA_EVPNES_EVI_LOCAL;
273 /* add to the EVPN's local list */
274 listnode_init(&es_evi->l2vni_listnode, es_evi);
275 listnode_add(zevpn->local_es_evi_list, &es_evi->l2vni_listnode);
276
277 zebra_evpn_es_evi_re_eval_send_to_client(es_evi);
278
279 zebra_evpn_es_evi_mac_install(es_evi);
280 }
281 }
282
283 static void zebra_evpn_es_evi_show_entry(struct vty *vty,
284 struct zebra_evpn_es_evi *es_evi,
285 json_object *json_array)
286 {
287 char type_str[4];
288
289 if (json_array) {
290 json_object *json;
291 json_object *json_types;
292
293 /* Separate JSON object for each es-evi entry */
294 json = json_object_new_object();
295
296 json_object_string_add(json, "esi", es_evi->es->esi_str);
297 json_object_int_add(json, "vni", es_evi->zevpn->vni);
298 if (es_evi->flags & ZEBRA_EVPNES_EVI_LOCAL) {
299 json_types = json_object_new_array();
300 if (es_evi->flags & ZEBRA_EVPNES_EVI_LOCAL)
301 json_array_string_add(json_types, "local");
302 json_object_object_add(json, "type", json_types);
303 }
304
305 /* Add es-evi entry to json array */
306 json_object_array_add(json_array, json);
307 } else {
308 type_str[0] = '\0';
309 if (es_evi->flags & ZEBRA_EVPNES_EVI_LOCAL)
310 strlcat(type_str, "L", sizeof(type_str));
311
312 vty_out(vty, "%-8d %-30s %-4s\n",
313 es_evi->zevpn->vni, es_evi->es->esi_str,
314 type_str);
315 }
316 }
317
318 static void
319 zebra_evpn_es_evi_show_entry_detail(struct vty *vty,
320 struct zebra_evpn_es_evi *es_evi,
321 json_object *json_array)
322 {
323 char type_str[4];
324
325 if (json_array) {
326 json_object *json;
327 json_object *json_flags;
328
329 /* Separate JSON object for each es-evi entry */
330 json = json_object_new_object();
331
332 json_object_string_add(json, "esi", es_evi->es->esi_str);
333 json_object_int_add(json, "vni", es_evi->zevpn->vni);
334 if (es_evi->flags
335 & (ZEBRA_EVPNES_EVI_LOCAL
336 | ZEBRA_EVPNES_EVI_READY_FOR_BGP)) {
337 json_flags = json_object_new_array();
338 if (es_evi->flags & ZEBRA_EVPNES_EVI_LOCAL)
339 json_array_string_add(json_flags, "local");
340 if (es_evi->flags & ZEBRA_EVPNES_EVI_READY_FOR_BGP)
341 json_array_string_add(json_flags,
342 "readyForBgp");
343 json_object_object_add(json, "flags", json_flags);
344 }
345
346 /* Add es-evi entry to json array */
347 json_object_array_add(json_array, json);
348 } else {
349 type_str[0] = '\0';
350 if (es_evi->flags & ZEBRA_EVPNES_EVI_LOCAL)
351 strlcat(type_str, "L", sizeof(type_str));
352
353 vty_out(vty, "VNI %d ESI: %s\n",
354 es_evi->zevpn->vni, es_evi->es->esi_str);
355 vty_out(vty, " Type: %s\n", type_str);
356 vty_out(vty, " Ready for BGP: %s\n",
357 (es_evi->flags &
358 ZEBRA_EVPNES_EVI_READY_FOR_BGP) ?
359 "yes" : "no");
360 vty_out(vty, "\n");
361 }
362 }
363
364 static void zebra_evpn_es_evi_show_one_evpn(struct zebra_evpn *zevpn,
365 struct vty *vty,
366 json_object *json_array, int detail)
367 {
368 struct zebra_evpn_es_evi *es_evi;
369
370 RB_FOREACH(es_evi, zebra_es_evi_rb_head, &zevpn->es_evi_rb_tree) {
371 if (detail)
372 zebra_evpn_es_evi_show_entry_detail(vty, es_evi,
373 json_array);
374 else
375 zebra_evpn_es_evi_show_entry(vty, es_evi, json_array);
376 }
377 }
378
379 struct evpn_mh_show_ctx {
380 struct vty *vty;
381 json_object *json;
382 int detail;
383 };
384
385 static void zebra_evpn_es_evi_show_one_evpn_hash_cb(struct hash_bucket *bucket,
386 void *ctxt)
387 {
388 struct zebra_evpn *zevpn = (struct zebra_evpn *)bucket->data;
389 struct evpn_mh_show_ctx *wctx = (struct evpn_mh_show_ctx *)ctxt;
390
391 zebra_evpn_es_evi_show_one_evpn(zevpn, wctx->vty,
392 wctx->json, wctx->detail);
393 }
394
395 void zebra_evpn_es_evi_show(struct vty *vty, bool uj, int detail)
396 {
397 json_object *json_array = NULL;
398 struct zebra_vrf *zvrf;
399 struct evpn_mh_show_ctx wctx;
400
401 zvrf = zebra_vrf_get_evpn();
402 if (uj)
403 json_array = json_object_new_array();
404
405 memset(&wctx, 0, sizeof(wctx));
406 wctx.vty = vty;
407 wctx.json = json_array;
408 wctx.detail = detail;
409
410 if (!detail && !json_array) {
411 vty_out(vty, "Type: L local, R remote\n");
412 vty_out(vty, "%-8s %-30s %-4s\n", "VNI", "ESI", "Type");
413 }
414 /* Display all L2-VNIs */
415 hash_iterate(zvrf->evpn_table, zebra_evpn_es_evi_show_one_evpn_hash_cb,
416 &wctx);
417
418 if (uj)
419 vty_json(vty, json_array);
420 }
421
422 void zebra_evpn_es_evi_show_vni(struct vty *vty, bool uj, vni_t vni, int detail)
423 {
424 json_object *json_array = NULL;
425 struct zebra_evpn *zevpn;
426
427 zevpn = zebra_evpn_lookup(vni);
428 if (uj)
429 json_array = json_object_new_array();
430
431 if (zevpn) {
432 if (!detail && !json_array) {
433 vty_out(vty, "Type: L local, R remote\n");
434 vty_out(vty, "%-8s %-30s %-4s\n", "VNI", "ESI", "Type");
435 }
436 zebra_evpn_es_evi_show_one_evpn(zevpn, vty, json_array, detail);
437 } else {
438 if (!uj)
439 vty_out(vty, "VNI %d doesn't exist\n", vni);
440 }
441
442 if (uj)
443 vty_json(vty, json_array);
444 }
445
446 /* Initialize the ES tables maintained per-L2_VNI */
447 void zebra_evpn_es_evi_init(struct zebra_evpn *zevpn)
448 {
449 /* Initialize the ES-EVI RB tree */
450 RB_INIT(zebra_es_evi_rb_head, &zevpn->es_evi_rb_tree);
451
452 /* Initialize the local and remote ES lists maintained for quick
453 * walks by type
454 */
455 zevpn->local_es_evi_list = list_new();
456 listset_app_node_mem(zevpn->local_es_evi_list);
457 }
458
459 /* Cleanup the ES info maintained per- EVPN */
460 void zebra_evpn_es_evi_cleanup(struct zebra_evpn *zevpn)
461 {
462 struct zebra_evpn_es_evi *es_evi;
463 struct zebra_evpn_es_evi *es_evi_next;
464
465 RB_FOREACH_SAFE(es_evi, zebra_es_evi_rb_head,
466 &zevpn->es_evi_rb_tree, es_evi_next) {
467 zebra_evpn_local_es_evi_do_del(es_evi);
468 }
469
470 list_delete(&zevpn->local_es_evi_list);
471 zebra_evpn_es_clear_base_evpn(zevpn);
472 }
473
474 /* called when the oper state or bridge membership changes for the
475 * vxlan device
476 */
477 void zebra_evpn_update_all_es(struct zebra_evpn *zevpn)
478 {
479 struct zebra_evpn_es_evi *es_evi;
480 struct listnode *node;
481 struct interface *vlan_if;
482 struct interface *vxlan_if;
483 struct zebra_if *vxlan_zif;
484
485 /* the EVPN is now elgible as a base for EVPN-MH */
486 if (zebra_evpn_send_to_client_ok(zevpn))
487 zebra_evpn_es_set_base_evpn(zevpn);
488 else
489 zebra_evpn_es_clear_base_evpn(zevpn);
490
491 for (ALL_LIST_ELEMENTS_RO(zevpn->local_es_evi_list, node, es_evi))
492 zebra_evpn_es_evi_re_eval_send_to_client(es_evi);
493
494 /* reinstall SVI MAC */
495 vxlan_if = zevpn->vxlan_if;
496 if (vxlan_if) {
497 vxlan_zif = vxlan_if->info;
498 if (if_is_operative(vxlan_if)
499 && vxlan_zif->brslave_info.br_if) {
500 vlan_if = zvni_map_to_svi(
501 vxlan_zif->l2info.vxl.access_vlan,
502 vxlan_zif->brslave_info.br_if);
503 if (vlan_if)
504 zebra_evpn_acc_bd_svi_mac_add(vlan_if);
505 }
506 }
507 }
508
509 /*****************************************************************************/
510 /* Access broadcast domains (BD)
511 * 1. These broadcast domains can be VLAN aware (in which case
512 * the key is VID) or VLAN unaware (in which case the key is
513 * 2. A VID-BD is created when a VLAN is associated with an access port or
514 * when the VLAN is associated with VXLAN_IF
515 * 3. A BD is translated into ES-EVI entries when a VNI is associated
516 * with the broadcast domain
517 */
518 /* Hash key for VLAN based broadcast domains */
519 static unsigned int zebra_evpn_acc_vl_hash_keymake(const void *p)
520 {
521 const struct zebra_evpn_access_bd *acc_bd = p;
522
523 return jhash_1word(acc_bd->vid, 0);
524 }
525
526 /* Compare two VLAN based broadcast domains */
527 static bool zebra_evpn_acc_vl_cmp(const void *p1, const void *p2)
528 {
529 const struct zebra_evpn_access_bd *acc_bd1 = p1;
530 const struct zebra_evpn_access_bd *acc_bd2 = p2;
531
532 if (acc_bd1 == NULL && acc_bd2 == NULL)
533 return true;
534
535 if (acc_bd1 == NULL || acc_bd2 == NULL)
536 return false;
537
538 return (acc_bd1->vid == acc_bd2->vid);
539 }
540
541 /* Lookup VLAN based broadcast domain */
542 static struct zebra_evpn_access_bd *zebra_evpn_acc_vl_find(vlanid_t vid)
543 {
544 struct zebra_evpn_access_bd *acc_bd;
545 struct zebra_evpn_access_bd tmp;
546
547 tmp.vid = vid;
548 acc_bd = hash_lookup(zmh_info->evpn_vlan_table, &tmp);
549
550 return acc_bd;
551 }
552
553 /* A new broadcast domain can be created when a VLAN member or VLAN<=>VxLAN_IF
554 * mapping is added.
555 */
556 static struct zebra_evpn_access_bd *
557 zebra_evpn_acc_vl_new(vlanid_t vid, struct interface *br_if)
558 {
559 struct zebra_evpn_access_bd *acc_bd;
560 struct interface *vlan_if;
561
562 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
563 zlog_debug("access vlan %d add", vid);
564
565 acc_bd = XCALLOC(MTYPE_ZACC_BD, sizeof(struct zebra_evpn_access_bd));
566
567 acc_bd->vid = vid;
568
569 /* Initialize the mbr list */
570 acc_bd->mbr_zifs = list_new();
571
572 /* Add to hash */
573 (void)hash_get(zmh_info->evpn_vlan_table, acc_bd, hash_alloc_intern);
574
575 /* check if an svi exists for the vlan */
576 if (br_if) {
577 vlan_if = zvni_map_to_svi(vid, br_if);
578 if (vlan_if) {
579 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
580 zlog_debug("vlan %d SVI %s set", vid,
581 vlan_if->name);
582 acc_bd->vlan_zif = vlan_if->info;
583 }
584 }
585 return acc_bd;
586 }
587
588 /* Free VLAN based broadcast domain -
589 * This just frees appropriate memory, caller should have taken other
590 * needed actions.
591 */
592 static void zebra_evpn_acc_vl_free(struct zebra_evpn_access_bd *acc_bd)
593 {
594 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
595 zlog_debug("access vlan %d del", acc_bd->vid);
596
597 if (acc_bd->vlan_zif && acc_bd->zevpn && acc_bd->zevpn->mac_table)
598 zebra_evpn_mac_svi_del(acc_bd->vlan_zif->ifp, acc_bd->zevpn);
599
600 /* cleanup resources maintained against the ES */
601 list_delete(&acc_bd->mbr_zifs);
602
603 /* remove EVI from various tables */
604 hash_release(zmh_info->evpn_vlan_table, acc_bd);
605
606 XFREE(MTYPE_ZACC_BD, acc_bd);
607 }
608
609 static void zebra_evpn_acc_vl_cleanup_all(struct hash_bucket *bucket, void *arg)
610 {
611 struct zebra_evpn_access_bd *acc_bd = bucket->data;
612
613 zebra_evpn_acc_vl_free(acc_bd);
614 }
615
616 /* called when a bd mbr is removed or VxLAN_IF is diassociated from the access
617 * VLAN
618 */
619 static void zebra_evpn_acc_bd_free_on_deref(struct zebra_evpn_access_bd *acc_bd)
620 {
621 if (!list_isempty(acc_bd->mbr_zifs) || acc_bd->vxlan_zif)
622 return;
623
624 /* if there are no references free the EVI */
625 zebra_evpn_acc_vl_free(acc_bd);
626 }
627
628 /* called when a SVI is goes up/down */
629 void zebra_evpn_acc_bd_svi_set(struct zebra_if *vlan_zif,
630 struct zebra_if *br_zif, bool is_up)
631 {
632 struct zebra_evpn_access_bd *acc_bd;
633 struct zebra_l2info_bridge *br;
634 uint16_t vid;
635 struct zebra_if *tmp_br_zif = br_zif;
636
637 if (!tmp_br_zif) {
638 if (!vlan_zif->link || !vlan_zif->link->info)
639 return;
640
641 tmp_br_zif = vlan_zif->link->info;
642 }
643
644 br = &tmp_br_zif->l2info.br;
645 /* ignore vlan unaware bridges */
646 if (!br->vlan_aware)
647 return;
648
649 vid = vlan_zif->l2info.vl.vid;
650 acc_bd = zebra_evpn_acc_vl_find(vid);
651 if (!acc_bd)
652 return;
653
654 if (is_up) {
655 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
656 zlog_debug("vlan %d SVI %s set", vid,
657 vlan_zif->ifp->name);
658
659 acc_bd->vlan_zif = vlan_zif;
660 if (acc_bd->zevpn)
661 zebra_evpn_mac_svi_add(acc_bd->vlan_zif->ifp,
662 acc_bd->zevpn);
663 } else if (acc_bd->vlan_zif) {
664 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
665 zlog_debug("vlan %d SVI clear", vid);
666 acc_bd->vlan_zif = NULL;
667 if (acc_bd->zevpn && acc_bd->zevpn->mac_table)
668 zebra_evpn_mac_svi_del(vlan_zif->ifp, acc_bd->zevpn);
669 }
670 }
671
672 /* On some events macs are force-flushed. This api can be used to reinstate
673 * the svi-mac after such cleanup-events.
674 */
675 void zebra_evpn_acc_bd_svi_mac_add(struct interface *vlan_if)
676 {
677 zebra_evpn_acc_bd_svi_set(vlan_if->info, NULL,
678 if_is_operative(vlan_if));
679 }
680
681 /* called when a EVPN-L2VNI is set or cleared against a BD */
682 static void zebra_evpn_acc_bd_evpn_set(struct zebra_evpn_access_bd *acc_bd,
683 struct zebra_evpn *zevpn,
684 struct zebra_evpn *old_zevpn)
685 {
686 struct zebra_if *zif;
687 struct listnode *node;
688
689 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
690 zlog_debug("access vlan %d l2-vni %u set",
691 acc_bd->vid, zevpn ? zevpn->vni : 0);
692
693 for (ALL_LIST_ELEMENTS_RO(acc_bd->mbr_zifs, node, zif)) {
694 if (!zif->es_info.es)
695 continue;
696
697 if (zevpn)
698 zebra_evpn_local_es_evi_add(zif->es_info.es, zevpn);
699 else if (old_zevpn)
700 zebra_evpn_local_es_evi_del(zif->es_info.es, old_zevpn);
701 }
702
703 if (acc_bd->vlan_zif) {
704 if (zevpn)
705 zebra_evpn_mac_svi_add(acc_bd->vlan_zif->ifp,
706 acc_bd->zevpn);
707 else if (old_zevpn && old_zevpn->mac_table)
708 zebra_evpn_mac_svi_del(acc_bd->vlan_zif->ifp,
709 old_zevpn);
710 }
711 }
712
713 /* handle VLAN->VxLAN_IF association */
714 void zebra_evpn_vl_vxl_ref(uint16_t vid, struct zebra_if *vxlan_zif)
715 {
716 struct zebra_evpn_access_bd *acc_bd;
717 struct zebra_if *old_vxlan_zif;
718 struct zebra_evpn *old_zevpn;
719
720 if (!vid)
721 return;
722
723 acc_bd = zebra_evpn_acc_vl_find(vid);
724 if (!acc_bd)
725 acc_bd = zebra_evpn_acc_vl_new(vid,
726 vxlan_zif->brslave_info.br_if);
727
728 old_vxlan_zif = acc_bd->vxlan_zif;
729 acc_bd->vxlan_zif = vxlan_zif;
730 if (vxlan_zif == old_vxlan_zif)
731 return;
732
733 old_zevpn = acc_bd->zevpn;
734 acc_bd->zevpn = zebra_evpn_lookup(vxlan_zif->l2info.vxl.vni);
735 if (acc_bd->zevpn == old_zevpn)
736 return;
737
738 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
739 zlog_debug("access vlan %d vni %u ref",
740 acc_bd->vid, vxlan_zif->l2info.vxl.vni);
741
742 if (old_zevpn)
743 zebra_evpn_acc_bd_evpn_set(acc_bd, NULL, old_zevpn);
744
745 if (acc_bd->zevpn)
746 zebra_evpn_acc_bd_evpn_set(acc_bd, acc_bd->zevpn, NULL);
747 }
748
749 /* handle VLAN->VxLAN_IF deref */
750 void zebra_evpn_vl_vxl_deref(uint16_t vid, struct zebra_if *vxlan_zif)
751 {
752 struct zebra_evpn_access_bd *acc_bd;
753
754 if (!vid)
755 return;
756
757 acc_bd = zebra_evpn_acc_vl_find(vid);
758 if (!acc_bd)
759 return;
760
761 /* clear vxlan_if only if it matches */
762 if (acc_bd->vxlan_zif != vxlan_zif)
763 return;
764
765 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
766 zlog_debug("access vlan %d vni %u deref",
767 acc_bd->vid, vxlan_zif->l2info.vxl.vni);
768
769 if (acc_bd->zevpn)
770 zebra_evpn_acc_bd_evpn_set(acc_bd, NULL, acc_bd->zevpn);
771
772 acc_bd->zevpn = NULL;
773 acc_bd->vxlan_zif = NULL;
774
775 /* if there are no other references the access_bd can be freed */
776 zebra_evpn_acc_bd_free_on_deref(acc_bd);
777 }
778
779 /* handle EVPN add/del */
780 void zebra_evpn_vxl_evpn_set(struct zebra_if *zif, struct zebra_evpn *zevpn,
781 bool set)
782 {
783 struct zebra_l2info_vxlan *vxl;
784 struct zebra_evpn_access_bd *acc_bd;
785
786 if (!zif)
787 return;
788
789 /* locate access_bd associated with the vxlan device */
790 vxl = &zif->l2info.vxl;
791 acc_bd = zebra_evpn_acc_vl_find(vxl->access_vlan);
792 if (!acc_bd)
793 return;
794
795 if (set) {
796 zebra_evpn_es_set_base_evpn(zevpn);
797 if (acc_bd->zevpn != zevpn) {
798 acc_bd->zevpn = zevpn;
799 zebra_evpn_acc_bd_evpn_set(acc_bd, zevpn, NULL);
800 }
801 } else {
802 if (acc_bd->zevpn) {
803 struct zebra_evpn *old_zevpn = acc_bd->zevpn;
804 acc_bd->zevpn = NULL;
805 zebra_evpn_acc_bd_evpn_set(acc_bd, NULL, old_zevpn);
806 }
807 }
808 }
809
810 /* handle addition of new VLAN members */
811 void zebra_evpn_vl_mbr_ref(uint16_t vid, struct zebra_if *zif)
812 {
813 struct zebra_evpn_access_bd *acc_bd;
814
815 if (!vid)
816 return;
817
818 acc_bd = zebra_evpn_acc_vl_find(vid);
819 if (!acc_bd)
820 acc_bd = zebra_evpn_acc_vl_new(vid, zif->brslave_info.br_if);
821
822 if (listnode_lookup(acc_bd->mbr_zifs, zif))
823 return;
824
825 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
826 zlog_debug("access vlan %d mbr %s ref",
827 vid, zif->ifp->name);
828
829 listnode_add(acc_bd->mbr_zifs, zif);
830 if (acc_bd->zevpn && zif->es_info.es)
831 zebra_evpn_local_es_evi_add(zif->es_info.es, acc_bd->zevpn);
832 }
833
834 /* handle deletion of VLAN members */
835 void zebra_evpn_vl_mbr_deref(uint16_t vid, struct zebra_if *zif)
836 {
837 struct zebra_evpn_access_bd *acc_bd;
838 struct listnode *node;
839
840 if (!vid)
841 return;
842
843 acc_bd = zebra_evpn_acc_vl_find(vid);
844 if (!acc_bd)
845 return;
846
847 node = listnode_lookup(acc_bd->mbr_zifs, zif);
848 if (!node)
849 return;
850
851 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
852 zlog_debug("access vlan %d mbr %s deref",
853 vid, zif->ifp->name);
854
855 list_delete_node(acc_bd->mbr_zifs, node);
856
857 if (acc_bd->zevpn && zif->es_info.es)
858 zebra_evpn_local_es_evi_del(zif->es_info.es, acc_bd->zevpn);
859
860 /* if there are no other references the access_bd can be freed */
861 zebra_evpn_acc_bd_free_on_deref(acc_bd);
862 }
863
864 static void zebra_evpn_acc_vl_adv_svi_mac_cb(struct hash_bucket *bucket,
865 void *ctxt)
866 {
867 struct zebra_evpn_access_bd *acc_bd = bucket->data;
868
869 if (acc_bd->vlan_zif && acc_bd->zevpn)
870 zebra_evpn_mac_svi_add(acc_bd->vlan_zif->ifp, acc_bd->zevpn);
871 }
872
873 /* called when advertise SVI MAC is enabled on the switch */
874 static void zebra_evpn_acc_vl_adv_svi_mac_all(void)
875 {
876 hash_iterate(zmh_info->evpn_vlan_table,
877 zebra_evpn_acc_vl_adv_svi_mac_cb, NULL);
878 }
879
880 static void zebra_evpn_acc_vl_json_fill(struct zebra_evpn_access_bd *acc_bd,
881 json_object *json, bool detail)
882 {
883 json_object_int_add(json, "vlan", acc_bd->vid);
884 if (acc_bd->vxlan_zif)
885 json_object_string_add(json, "vxlanIf",
886 acc_bd->vxlan_zif->ifp->name);
887 if (acc_bd->zevpn)
888 json_object_int_add(json, "vni", acc_bd->zevpn->vni);
889 if (acc_bd->mbr_zifs)
890 json_object_int_add(json, "memberIfCount",
891 listcount(acc_bd->mbr_zifs));
892
893 if (detail) {
894 json_object *json_mbrs;
895 json_object *json_mbr;
896 struct zebra_if *zif;
897 struct listnode *node;
898
899
900 json_mbrs = json_object_new_array();
901 for (ALL_LIST_ELEMENTS_RO(acc_bd->mbr_zifs, node, zif)) {
902 json_mbr = json_object_new_object();
903 json_object_string_add(json_mbr, "ifName",
904 zif->ifp->name);
905 json_object_array_add(json_mbrs, json_mbr);
906 }
907 json_object_object_add(json, "members", json_mbrs);
908 }
909 }
910
911 static void zebra_evpn_acc_vl_show_entry_detail(struct vty *vty,
912 struct zebra_evpn_access_bd *acc_bd, json_object *json)
913 {
914 struct zebra_if *zif;
915 struct listnode *node;
916
917 if (json) {
918 zebra_evpn_acc_vl_json_fill(acc_bd, json, true);
919 } else {
920 vty_out(vty, "VLAN: %u\n", acc_bd->vid);
921 vty_out(vty, " VxLAN Interface: %s\n",
922 acc_bd->vxlan_zif ?
923 acc_bd->vxlan_zif->ifp->name : "-");
924 vty_out(vty, " SVI: %s\n",
925 acc_bd->vlan_zif ? acc_bd->vlan_zif->ifp->name : "-");
926 vty_out(vty, " L2-VNI: %d\n",
927 acc_bd->zevpn ? acc_bd->zevpn->vni : 0);
928 vty_out(vty, " Member Count: %d\n",
929 listcount(acc_bd->mbr_zifs));
930 vty_out(vty, " Members: \n");
931 for (ALL_LIST_ELEMENTS_RO(acc_bd->mbr_zifs, node, zif))
932 vty_out(vty, " %s\n", zif->ifp->name);
933 vty_out(vty, "\n");
934 }
935 }
936
937 static void zebra_evpn_acc_vl_show_entry(struct vty *vty,
938 struct zebra_evpn_access_bd *acc_bd, json_object *json)
939 {
940 if (json) {
941 zebra_evpn_acc_vl_json_fill(acc_bd, json, false);
942 } else {
943 vty_out(vty, "%-5u %-15s %-8d %-15s %u\n", acc_bd->vid,
944 acc_bd->vlan_zif ? acc_bd->vlan_zif->ifp->name : "-",
945 acc_bd->zevpn ? acc_bd->zevpn->vni : 0,
946 acc_bd->vxlan_zif ? acc_bd->vxlan_zif->ifp->name : "-",
947 listcount(acc_bd->mbr_zifs));
948 }
949 }
950
951 static void zebra_evpn_acc_vl_show_hash(struct hash_bucket *bucket, void *ctxt)
952 {
953 struct evpn_mh_show_ctx *wctx = ctxt;
954 struct zebra_evpn_access_bd *acc_bd = bucket->data;
955 json_object *json = NULL;
956
957 if (wctx->json)
958 json = json_object_new_object();
959 if (wctx->detail)
960 zebra_evpn_acc_vl_show_entry_detail(wctx->vty, acc_bd, json);
961 else
962 zebra_evpn_acc_vl_show_entry(wctx->vty, acc_bd, json);
963 if (json)
964 json_object_array_add(wctx->json, json);
965 }
966
967 void zebra_evpn_acc_vl_show(struct vty *vty, bool uj)
968 {
969 struct evpn_mh_show_ctx wctx;
970 json_object *json_array = NULL;
971
972 if (uj)
973 json_array = json_object_new_array();
974
975 memset(&wctx, 0, sizeof(wctx));
976 wctx.vty = vty;
977 wctx.json = json_array;
978 wctx.detail = false;
979
980 if (!uj)
981 vty_out(vty, "%-5s %-15s %-8s %-15s %s\n", "VLAN", "SVI",
982 "L2-VNI", "VXLAN-IF", "# Members");
983
984 hash_iterate(zmh_info->evpn_vlan_table, zebra_evpn_acc_vl_show_hash,
985 &wctx);
986
987 if (uj)
988 vty_json(vty, json_array);
989 }
990
991 void zebra_evpn_acc_vl_show_detail(struct vty *vty, bool uj)
992 {
993 struct evpn_mh_show_ctx wctx;
994 json_object *json_array = NULL;
995
996 if (uj)
997 json_array = json_object_new_array();
998 memset(&wctx, 0, sizeof(wctx));
999 wctx.vty = vty;
1000 wctx.json = json_array;
1001 wctx.detail = true;
1002
1003 hash_iterate(zmh_info->evpn_vlan_table, zebra_evpn_acc_vl_show_hash,
1004 &wctx);
1005
1006 if (uj)
1007 vty_json(vty, json_array);
1008 }
1009
1010 void zebra_evpn_acc_vl_show_vid(struct vty *vty, bool uj, vlanid_t vid)
1011 {
1012 json_object *json = NULL;
1013 struct zebra_evpn_access_bd *acc_bd;
1014
1015 if (uj)
1016 json = json_object_new_object();
1017
1018 acc_bd = zebra_evpn_acc_vl_find(vid);
1019 if (acc_bd) {
1020 zebra_evpn_acc_vl_show_entry_detail(vty, acc_bd, json);
1021 } else {
1022 if (!json)
1023 vty_out(vty, "VLAN %u not present\n", vid);
1024 }
1025
1026 if (uj)
1027 vty_json(vty, json);
1028 }
1029
1030 /* Initialize VLAN member bitmap on an interface. Although VLAN membership
1031 * is independent of EVPN we only process it if its of interest to EVPN-MH
1032 * i.e. on access ports that can be setup as Ethernet Segments. And that is
1033 * intended as an optimization.
1034 */
1035 void zebra_evpn_if_init(struct zebra_if *zif)
1036 {
1037 if (!zebra_evpn_is_if_es_capable(zif))
1038 return;
1039
1040 if (!bf_is_inited(zif->vlan_bitmap))
1041 bf_init(zif->vlan_bitmap, IF_VLAN_BITMAP_MAX);
1042
1043 /* if an es_id and sysmac are already present against the interface
1044 * activate it
1045 */
1046 zebra_evpn_local_es_update(zif, &zif->es_info.esi);
1047 }
1048
1049 /* handle deletion of an access port by removing it from all associated
1050 * broadcast domains.
1051 */
1052 void zebra_evpn_if_cleanup(struct zebra_if *zif)
1053 {
1054 vlanid_t vid;
1055 struct zebra_evpn_es *es;
1056
1057 if (bf_is_inited(zif->vlan_bitmap)) {
1058 bf_for_each_set_bit(zif->vlan_bitmap, vid, IF_VLAN_BITMAP_MAX)
1059 {
1060 zebra_evpn_vl_mbr_deref(vid, zif);
1061 }
1062
1063 bf_free(zif->vlan_bitmap);
1064 }
1065
1066 /* Delete associated Ethernet Segment */
1067 es = zif->es_info.es;
1068 if (es)
1069 zebra_evpn_local_es_del(&es);
1070 }
1071
1072 /*****************************************************************************
1073 * L2 NH/NHG Management
1074 * A L2 NH entry is programmed in the kernel for every ES-VTEP entry. This
1075 * NH is then added to the L2-ECMP-NHG associated with the ES.
1076 */
1077 static uint32_t zebra_evpn_nhid_alloc(struct zebra_evpn_es *es)
1078 {
1079 uint32_t id;
1080 uint32_t nh_id;
1081
1082 bf_assign_index(zmh_info->nh_id_bitmap, id);
1083
1084 if (!id)
1085 return 0;
1086
1087 if (es) {
1088 nh_id = id | EVPN_NHG_ID_TYPE_BIT;
1089 /* Add to NHG hash */
1090 es->nhg_id = nh_id;
1091 (void)hash_get(zmh_info->nhg_table, es, hash_alloc_intern);
1092 } else {
1093 nh_id = id | EVPN_NH_ID_TYPE_BIT;
1094 }
1095
1096 return nh_id;
1097 }
1098
1099 static void zebra_evpn_nhid_free(uint32_t nh_id, struct zebra_evpn_es *es)
1100 {
1101 uint32_t id = (nh_id & EVPN_NH_ID_VAL_MASK);
1102
1103 if (!id)
1104 return;
1105
1106 if (es) {
1107 hash_release(zmh_info->nhg_table, es);
1108 es->nhg_id = 0;
1109 }
1110
1111 bf_release_index(zmh_info->nh_id_bitmap, id);
1112 }
1113
1114 static unsigned int zebra_evpn_nh_ip_hash_keymake(const void *p)
1115 {
1116 const struct zebra_evpn_l2_nh *nh = p;
1117
1118 return jhash_1word(nh->vtep_ip.s_addr, 0);
1119 }
1120
1121 static bool zebra_evpn_nh_ip_cmp(const void *p1, const void *p2)
1122 {
1123 const struct zebra_evpn_l2_nh *nh1 = p1;
1124 const struct zebra_evpn_l2_nh *nh2 = p2;
1125
1126 if (nh1 == NULL && nh2 == NULL)
1127 return true;
1128
1129 if (nh1 == NULL || nh2 == NULL)
1130 return false;
1131
1132 return (nh1->vtep_ip.s_addr == nh2->vtep_ip.s_addr);
1133 }
1134
1135 static unsigned int zebra_evpn_nhg_hash_keymake(const void *p)
1136 {
1137 const struct zebra_evpn_es *es = p;
1138
1139 return jhash_1word(es->nhg_id, 0);
1140 }
1141
1142 static bool zebra_evpn_nhg_cmp(const void *p1, const void *p2)
1143 {
1144 const struct zebra_evpn_es *es1 = p1;
1145 const struct zebra_evpn_es *es2 = p2;
1146
1147 if (es1 == NULL && es2 == NULL)
1148 return true;
1149
1150 if (es1 == NULL || es2 == NULL)
1151 return false;
1152
1153 return (es1->nhg_id == es2->nhg_id);
1154 }
1155
1156 /* Lookup ES using the NHG id associated with it */
1157 static struct zebra_evpn_es *zebra_evpn_nhg_find(uint32_t nhg_id)
1158 {
1159 struct zebra_evpn_es *es;
1160 struct zebra_evpn_es tmp;
1161
1162 tmp.nhg_id = nhg_id;
1163 es = hash_lookup(zmh_info->nhg_table, &tmp);
1164
1165 return es;
1166 }
1167
1168 /* Returns TRUE if the NHG is associated with a local ES */
1169 bool zebra_evpn_nhg_is_local_es(uint32_t nhg_id,
1170 struct zebra_evpn_es **local_es)
1171 {
1172 struct zebra_evpn_es *es;
1173
1174 es = zebra_evpn_nhg_find(nhg_id);
1175 if (es && (es->flags & ZEBRA_EVPNES_LOCAL)) {
1176 *local_es = es;
1177 return true;
1178 }
1179
1180 *local_es = NULL;
1181 return false;
1182 }
1183
1184 /* update remote macs associated with the ES */
1185 static void zebra_evpn_nhg_mac_update(struct zebra_evpn_es *es)
1186 {
1187 struct zebra_mac *mac;
1188 struct listnode *node;
1189 bool local_via_nw;
1190
1191 local_via_nw = zebra_evpn_es_local_mac_via_network_port(es);
1192 if (IS_ZEBRA_DEBUG_EVPN_MH_ES || IS_ZEBRA_DEBUG_EVPN_MH_MAC)
1193 zlog_debug("mac update on es %s nhg %s", es->esi_str,
1194 (es->flags & ZEBRA_EVPNES_NHG_ACTIVE)
1195 ? "activate"
1196 : "de-activate");
1197
1198 for (ALL_LIST_ELEMENTS_RO(es->mac_list, node, mac)) {
1199 if (CHECK_FLAG(mac->flags, ZEBRA_MAC_REMOTE)
1200 || (local_via_nw && CHECK_FLAG(mac->flags, ZEBRA_MAC_LOCAL)
1201 && zebra_evpn_mac_is_static(mac))) {
1202 if (es->flags & ZEBRA_EVPNES_NHG_ACTIVE) {
1203 if (IS_ZEBRA_DEBUG_EVPN_MH_MAC)
1204 zlog_debug(
1205 "%smac %pEA install via es %s nhg 0x%x",
1206 (mac->flags & ZEBRA_MAC_REMOTE)
1207 ? "rem"
1208 : "local-nw",
1209 &mac->macaddr, es->esi_str,
1210 es->nhg_id);
1211 zebra_evpn_rem_mac_install(
1212 mac->zevpn, mac, false /*was_static*/);
1213 } else {
1214 if (IS_ZEBRA_DEBUG_EVPN_MH_MAC)
1215 zlog_debug(
1216 "%smac %pEA un-install es %s",
1217 (mac->flags & ZEBRA_MAC_REMOTE)
1218 ? "rem"
1219 : "local-nw",
1220 &mac->macaddr, es->esi_str);
1221 zebra_evpn_rem_mac_uninstall(mac->zevpn, mac,
1222 true /*force*/);
1223 }
1224 }
1225 }
1226 }
1227
1228 /* The MAC ECMP group is activated on the first VTEP */
1229 static void zebra_evpn_nhg_update(struct zebra_evpn_es *es)
1230 {
1231 uint32_t nh_cnt = 0;
1232 struct nh_grp nh_ids[ES_VTEP_MAX_CNT];
1233 struct zebra_evpn_es_vtep *es_vtep;
1234 struct listnode *node;
1235
1236 if (!es->nhg_id)
1237 return;
1238
1239 for (ALL_LIST_ELEMENTS_RO(es->es_vtep_list, node, es_vtep)) {
1240 if (!es_vtep->nh)
1241 continue;
1242
1243 if (nh_cnt >= ES_VTEP_MAX_CNT)
1244 break;
1245
1246 memset(&nh_ids[nh_cnt], 0, sizeof(struct nh_grp));
1247 nh_ids[nh_cnt].id = es_vtep->nh->nh_id;
1248 ++nh_cnt;
1249 }
1250
1251 if (nh_cnt) {
1252 if (IS_ZEBRA_DEBUG_EVPN_MH_NH) {
1253 char nh_str[ES_VTEP_LIST_STR_SZ];
1254 uint32_t i;
1255 char nh_buf[16];
1256
1257 nh_str[0] = '\0';
1258 for (i = 0; i < nh_cnt; ++i) {
1259 snprintf(nh_buf, sizeof(nh_buf), "%u ",
1260 nh_ids[i].id);
1261 strlcat(nh_str, nh_buf, sizeof(nh_str));
1262 }
1263 zlog_debug("es %s nhg %u add %s", es->esi_str,
1264 es->nhg_id, nh_str);
1265 }
1266
1267 kernel_upd_mac_nhg(es->nhg_id, nh_cnt, nh_ids);
1268 if (!(es->flags & ZEBRA_EVPNES_NHG_ACTIVE)) {
1269 es->flags |= ZEBRA_EVPNES_NHG_ACTIVE;
1270 /* add backup NHG to the br-port */
1271 if ((es->flags & ZEBRA_EVPNES_LOCAL))
1272 zebra_evpn_es_br_port_dplane_update(es,
1273 __func__);
1274 zebra_evpn_nhg_mac_update(es);
1275 }
1276 } else {
1277 if (es->flags & ZEBRA_EVPNES_NHG_ACTIVE) {
1278 if (IS_ZEBRA_DEBUG_EVPN_MH_NH)
1279 zlog_debug("es %s nhg %u del", es->esi_str,
1280 es->nhg_id);
1281 es->flags &= ~ZEBRA_EVPNES_NHG_ACTIVE;
1282 /* remove backup NHG from the br-port */
1283 if ((es->flags & ZEBRA_EVPNES_LOCAL))
1284 zebra_evpn_es_br_port_dplane_update(es,
1285 __func__);
1286 zebra_evpn_nhg_mac_update(es);
1287 kernel_del_mac_nhg(es->nhg_id);
1288 }
1289 }
1290
1291 }
1292
1293 static void zebra_evpn_es_l2_nh_show_entry(struct zebra_evpn_l2_nh *nh,
1294 struct vty *vty,
1295 json_object *json_array)
1296 {
1297 if (json_array) {
1298 json_object *json = NULL;
1299
1300 json = json_object_new_object();
1301 json_object_string_addf(json, "vtep", "%pI4", &nh->vtep_ip);
1302 json_object_int_add(json, "nhId", nh->nh_id);
1303 json_object_int_add(json, "refCnt", nh->ref_cnt);
1304
1305 json_object_array_add(json_array, json);
1306 } else {
1307 vty_out(vty, "%-16pI4 %-10u %u\n", &nh->vtep_ip, nh->nh_id,
1308 nh->ref_cnt);
1309 }
1310 }
1311
1312 static void zebra_evpn_l2_nh_show_cb(struct hash_bucket *bucket, void *ctxt)
1313 {
1314 struct zebra_evpn_l2_nh *nh = (struct zebra_evpn_l2_nh *)bucket->data;
1315 struct evpn_mh_show_ctx *wctx = (struct evpn_mh_show_ctx *)ctxt;
1316
1317 zebra_evpn_es_l2_nh_show_entry(nh, wctx->vty, wctx->json);
1318 }
1319
1320 void zebra_evpn_l2_nh_show(struct vty *vty, bool uj)
1321 {
1322 struct evpn_mh_show_ctx wctx;
1323 json_object *json_array = NULL;
1324
1325 if (uj) {
1326 json_array = json_object_new_array();
1327 } else {
1328 vty_out(vty, "%-16s %-10s %s\n", "VTEP", "NH id", "#ES");
1329 }
1330
1331 memset(&wctx, 0, sizeof(wctx));
1332 wctx.vty = vty;
1333 wctx.json = json_array;
1334
1335 hash_iterate(zmh_info->nh_ip_table, zebra_evpn_l2_nh_show_cb, &wctx);
1336
1337 if (uj)
1338 vty_json(vty, json_array);
1339 }
1340
1341 static struct zebra_evpn_l2_nh *zebra_evpn_l2_nh_find(struct in_addr vtep_ip)
1342 {
1343 struct zebra_evpn_l2_nh *nh;
1344 struct zebra_evpn_l2_nh tmp;
1345
1346 tmp.vtep_ip.s_addr = vtep_ip.s_addr;
1347 nh = hash_lookup(zmh_info->nh_ip_table, &tmp);
1348
1349 return nh;
1350 }
1351
1352 static struct zebra_evpn_l2_nh *zebra_evpn_l2_nh_alloc(struct in_addr vtep_ip)
1353 {
1354 struct zebra_evpn_l2_nh *nh;
1355
1356 nh = XCALLOC(MTYPE_L2_NH, sizeof(*nh));
1357 nh->vtep_ip = vtep_ip;
1358 (void)hash_get(zmh_info->nh_ip_table, nh, hash_alloc_intern);
1359
1360 nh->nh_id = zebra_evpn_nhid_alloc(NULL);
1361 if (!nh->nh_id) {
1362 hash_release(zmh_info->nh_ip_table, nh);
1363 XFREE(MTYPE_L2_NH, nh);
1364 return NULL;
1365 }
1366
1367 /* install the NH in the dataplane */
1368 kernel_upd_mac_nh(nh->nh_id, nh->vtep_ip);
1369
1370 return nh;
1371 }
1372
1373 static void zebra_evpn_l2_nh_free(struct zebra_evpn_l2_nh *nh)
1374 {
1375 /* delete the NH from the dataplane */
1376 kernel_del_mac_nh(nh->nh_id);
1377
1378 zebra_evpn_nhid_free(nh->nh_id, NULL);
1379 hash_release(zmh_info->nh_ip_table, nh);
1380 XFREE(MTYPE_L2_NH, nh);
1381 }
1382
1383 static void zebra_evpn_l2_nh_es_vtep_ref(struct zebra_evpn_es_vtep *es_vtep)
1384 {
1385 if (es_vtep->nh)
1386 return;
1387
1388 es_vtep->nh = zebra_evpn_l2_nh_find(es_vtep->vtep_ip);
1389 if (!es_vtep->nh)
1390 es_vtep->nh = zebra_evpn_l2_nh_alloc(es_vtep->vtep_ip);
1391
1392 if (!es_vtep->nh) {
1393 zlog_warn("es %s vtep %pI4 nh ref failed", es_vtep->es->esi_str,
1394 &es_vtep->vtep_ip);
1395 return;
1396 }
1397
1398 ++es_vtep->nh->ref_cnt;
1399
1400 if (IS_ZEBRA_DEBUG_EVPN_MH_NH)
1401 zlog_debug("es %s vtep %pI4 nh %u ref %u", es_vtep->es->esi_str,
1402 &es_vtep->vtep_ip, es_vtep->nh->nh_id,
1403 es_vtep->nh->ref_cnt);
1404
1405 /* add the NH to the parent NHG */
1406 zebra_evpn_nhg_update(es_vtep->es);
1407 }
1408
1409 static void zebra_evpn_l2_nh_es_vtep_deref(struct zebra_evpn_es_vtep *es_vtep)
1410 {
1411 struct zebra_evpn_l2_nh *nh = es_vtep->nh;
1412
1413 if (!nh)
1414 return;
1415
1416 es_vtep->nh = NULL;
1417 if (nh->ref_cnt)
1418 --nh->ref_cnt;
1419
1420 if (IS_ZEBRA_DEBUG_EVPN_MH_NH)
1421 zlog_debug("es %s vtep %pI4 nh %u deref %u",
1422 es_vtep->es->esi_str, &es_vtep->vtep_ip, nh->nh_id,
1423 nh->ref_cnt);
1424
1425 /* remove the NH from the parent NHG */
1426 zebra_evpn_nhg_update(es_vtep->es);
1427
1428 /* uninstall the NH */
1429 if (!nh->ref_cnt)
1430 zebra_evpn_l2_nh_free(nh);
1431 }
1432
1433 /*****************************************************************************/
1434 /* Ethernet Segment Management
1435 * 1. Ethernet Segment is a collection of links attached to the same
1436 * server (MHD) or switch (MHN)
1437 * 2. An Ethernet Segment can span multiple PEs and is identified by the
1438 * 10-byte ES-ID.
1439 * 3. Zebra manages the local ESI configuration.
1440 * 4. It also maintains the aliasing that maps an ESI (local or remote)
1441 * to one or more PEs/VTEPs.
1442 * 5. remote ESs are added by BGP (on rxing EAD Type-1 routes)
1443 */
1444 /* A list of remote VTEPs is maintained for each ES. This list includes -
1445 * 1. VTEPs for which we have imported the ESR i.e. ES-peers
1446 * 2. VTEPs that have an "active" ES-EVI VTEP i.e. EAD-per-ES and EAD-per-EVI
1447 * have been imported into one or more EVPNs
1448 */
1449 static int zebra_evpn_es_vtep_cmp(void *p1, void *p2)
1450 {
1451 const struct zebra_evpn_es_vtep *es_vtep1 = p1;
1452 const struct zebra_evpn_es_vtep *es_vtep2 = p2;
1453
1454 return es_vtep1->vtep_ip.s_addr - es_vtep2->vtep_ip.s_addr;
1455 }
1456
1457 static struct zebra_evpn_es_vtep *zebra_evpn_es_vtep_new(
1458 struct zebra_evpn_es *es, struct in_addr vtep_ip)
1459 {
1460 struct zebra_evpn_es_vtep *es_vtep;
1461
1462 es_vtep = XCALLOC(MTYPE_ZES_VTEP, sizeof(*es_vtep));
1463
1464 es_vtep->es = es;
1465 es_vtep->vtep_ip.s_addr = vtep_ip.s_addr;
1466 listnode_init(&es_vtep->es_listnode, es_vtep);
1467 listnode_add_sort(es->es_vtep_list, &es_vtep->es_listnode);
1468
1469 return es_vtep;
1470 }
1471
1472 static void zebra_evpn_es_vtep_free(struct zebra_evpn_es_vtep *es_vtep)
1473 {
1474 struct zebra_evpn_es *es = es_vtep->es;
1475
1476 list_delete_node(es->es_vtep_list, &es_vtep->es_listnode);
1477 /* update the L2-NHG associated with the ES */
1478 zebra_evpn_l2_nh_es_vtep_deref(es_vtep);
1479 XFREE(MTYPE_ZES_VTEP, es_vtep);
1480 }
1481
1482
1483 /* check if VTEP is already part of the list */
1484 static struct zebra_evpn_es_vtep *zebra_evpn_es_vtep_find(
1485 struct zebra_evpn_es *es, struct in_addr vtep_ip)
1486 {
1487 struct listnode *node = NULL;
1488 struct zebra_evpn_es_vtep *es_vtep;
1489
1490 for (ALL_LIST_ELEMENTS_RO(es->es_vtep_list, node, es_vtep)) {
1491 if (es_vtep->vtep_ip.s_addr == vtep_ip.s_addr)
1492 return es_vtep;
1493 }
1494 return NULL;
1495 }
1496
1497 /* flush all the dataplane br-port info associated with the ES */
1498 static bool zebra_evpn_es_br_port_dplane_clear(struct zebra_evpn_es *es)
1499 {
1500 struct in_addr sph_filters[ES_VTEP_MAX_CNT];
1501
1502 if (!(es->flags & ZEBRA_EVPNES_BR_PORT))
1503 return false;
1504
1505 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
1506 zlog_debug("es %s br-port dplane clear", es->esi_str);
1507
1508 memset(&sph_filters, 0, sizeof(sph_filters));
1509 dplane_br_port_update(es->zif->ifp, false /* non_df */, 0, sph_filters,
1510 0 /* backup_nhg_id */);
1511 return true;
1512 }
1513
1514 static inline bool
1515 zebra_evpn_es_br_port_dplane_update_needed(struct zebra_evpn_es *es)
1516 {
1517 return (es->flags & ZEBRA_EVPNES_NON_DF)
1518 || (es->flags & ZEBRA_EVPNES_NHG_ACTIVE)
1519 || listcount(es->es_vtep_list);
1520 }
1521
1522 /* returns TRUE if dplane entry was updated */
1523 static bool zebra_evpn_es_br_port_dplane_update(struct zebra_evpn_es *es,
1524 const char *caller)
1525 {
1526 uint32_t backup_nhg_id;
1527 struct in_addr sph_filters[ES_VTEP_MAX_CNT];
1528 struct listnode *node = NULL;
1529 struct zebra_evpn_es_vtep *es_vtep;
1530 uint32_t sph_filter_cnt = 0;
1531
1532 if (!(es->flags & ZEBRA_EVPNES_LOCAL))
1533 return zebra_evpn_es_br_port_dplane_clear(es);
1534
1535 /* If the ES is not a bridge port there is nothing
1536 * in the dataplane
1537 */
1538 if (!(es->flags & ZEBRA_EVPNES_BR_PORT))
1539 return false;
1540
1541 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
1542 zlog_debug("es %s br-port dplane update by %s", es->esi_str,
1543 caller);
1544 backup_nhg_id = (es->flags & ZEBRA_EVPNES_NHG_ACTIVE) ? es->nhg_id : 0;
1545
1546 memset(&sph_filters, 0, sizeof(sph_filters));
1547 if (es->flags & ZEBRA_EVPNES_BYPASS) {
1548 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
1549 zlog_debug(
1550 "es %s SPH filter disabled as it is in bypass",
1551 es->esi_str);
1552 } else {
1553 if (listcount(es->es_vtep_list) > ES_VTEP_MAX_CNT) {
1554 zlog_warn("es %s vtep count %d exceeds filter cnt %d",
1555 es->esi_str, listcount(es->es_vtep_list),
1556 ES_VTEP_MAX_CNT);
1557 } else {
1558 for (ALL_LIST_ELEMENTS_RO(es->es_vtep_list, node,
1559 es_vtep)) {
1560 if (es_vtep->flags
1561 & ZEBRA_EVPNES_VTEP_DEL_IN_PROG)
1562 continue;
1563 sph_filters[sph_filter_cnt] = es_vtep->vtep_ip;
1564 ++sph_filter_cnt;
1565 }
1566 }
1567 }
1568
1569 dplane_br_port_update(es->zif->ifp, !!(es->flags & ZEBRA_EVPNES_NON_DF),
1570 sph_filter_cnt, sph_filters, backup_nhg_id);
1571
1572 return true;
1573 }
1574
1575 /* returns TRUE if dplane entry was updated */
1576 static bool zebra_evpn_es_df_change(struct zebra_evpn_es *es, bool new_non_df,
1577 const char *caller, const char *reason)
1578 {
1579 bool old_non_df;
1580
1581 old_non_df = !!(es->flags & ZEBRA_EVPNES_NON_DF);
1582
1583 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
1584 zlog_debug("df-change es %s %s to %s; %s: %s", es->esi_str,
1585 old_non_df ? "non-df" : "df",
1586 new_non_df ? "non-df" : "df", caller, reason);
1587
1588 if (old_non_df == new_non_df)
1589 return false;
1590
1591 if (new_non_df)
1592 es->flags |= ZEBRA_EVPNES_NON_DF;
1593 else
1594 es->flags &= ~ZEBRA_EVPNES_NON_DF;
1595
1596 /* update non-DF block filter in the dataplane */
1597 return zebra_evpn_es_br_port_dplane_update(es, __func__);
1598 }
1599
1600
1601 /* returns TRUE if dplane entry was updated */
1602 static bool zebra_evpn_es_run_df_election(struct zebra_evpn_es *es,
1603 const char *caller)
1604 {
1605 struct listnode *node = NULL;
1606 struct zebra_evpn_es_vtep *es_vtep;
1607 bool new_non_df = false;
1608
1609 /* If the ES is not ready (i.e. not completely configured) there
1610 * is no need to setup the BUM block filter
1611 */
1612 if (!(es->flags & ZEBRA_EVPNES_LOCAL)
1613 || (es->flags & ZEBRA_EVPNES_BYPASS)
1614 || !zmh_info->es_originator_ip.s_addr)
1615 return zebra_evpn_es_df_change(es, new_non_df, caller,
1616 "not-ready");
1617
1618 /* if oper-state is down DF filtering must be on. when the link comes
1619 * up again dataplane should block BUM till FRR has had the chance
1620 * to run DF election again
1621 */
1622 if (!(es->flags & ZEBRA_EVPNES_OPER_UP)) {
1623 new_non_df = true;
1624 return zebra_evpn_es_df_change(es, new_non_df, caller,
1625 "oper-down");
1626 }
1627
1628 /* ES was just created; we need to wait for the peers to rx the
1629 * our Type-4 routes and for the switch to import the peers' Type-4
1630 * routes
1631 */
1632 if (es->df_delay_timer) {
1633 new_non_df = true;
1634 return zebra_evpn_es_df_change(es, new_non_df, caller,
1635 "df-delay");
1636 }
1637
1638 for (ALL_LIST_ELEMENTS_RO(es->es_vtep_list, node, es_vtep)) {
1639 /* Only VTEPs that have advertised the ESR can participate
1640 * in DF election
1641 */
1642 if (!(es_vtep->flags & ZEBRA_EVPNES_VTEP_RXED_ESR))
1643 continue;
1644
1645 /* If the DF alg is not the same we should fall back to
1646 * service-carving. But as service-carving is not supported
1647 * we will stop forwarding BUM
1648 */
1649 if (es_vtep->df_alg != EVPN_MH_DF_ALG_PREF) {
1650 new_non_df = true;
1651 break;
1652 }
1653
1654 /* Peer VTEP wins DF election if -
1655 * the peer-VTEP has higher preference (or)
1656 * the pref is the same but peer's IP address is lower
1657 */
1658 if ((es_vtep->df_pref > es->df_pref)
1659 || ((es_vtep->df_pref == es->df_pref)
1660 && (es_vtep->vtep_ip.s_addr
1661 < zmh_info->es_originator_ip.s_addr))) {
1662 new_non_df = true;
1663 break;
1664 }
1665 }
1666
1667 return zebra_evpn_es_df_change(es, new_non_df, caller, "elected");
1668 }
1669
1670 static void zebra_evpn_es_vtep_add(struct zebra_evpn_es *es,
1671 struct in_addr vtep_ip, bool esr_rxed,
1672 uint8_t df_alg, uint16_t df_pref)
1673 {
1674 struct zebra_evpn_es_vtep *es_vtep;
1675 bool old_esr_rxed;
1676 bool dplane_updated = false;
1677
1678 es_vtep = zebra_evpn_es_vtep_find(es, vtep_ip);
1679
1680 if (!es_vtep) {
1681 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
1682 zlog_debug("es %s vtep %pI4 add",
1683 es->esi_str, &vtep_ip);
1684 es_vtep = zebra_evpn_es_vtep_new(es, vtep_ip);
1685 /* update the L2-NHG associated with the ES */
1686 zebra_evpn_l2_nh_es_vtep_ref(es_vtep);
1687 }
1688
1689 old_esr_rxed = !!(es_vtep->flags & ZEBRA_EVPNES_VTEP_RXED_ESR);
1690 if ((old_esr_rxed != esr_rxed) || (es_vtep->df_alg != df_alg)
1691 || (es_vtep->df_pref != df_pref)) {
1692 /* If any of the DF election params changed we need to re-run
1693 * DF election
1694 */
1695 if (esr_rxed)
1696 es_vtep->flags |= ZEBRA_EVPNES_VTEP_RXED_ESR;
1697 else
1698 es_vtep->flags &= ~ZEBRA_EVPNES_VTEP_RXED_ESR;
1699 es_vtep->df_alg = df_alg;
1700 es_vtep->df_pref = df_pref;
1701 dplane_updated = zebra_evpn_es_run_df_election(es, __func__);
1702 }
1703 /* add the vtep to the SPH list */
1704 if (!dplane_updated && (es->flags & ZEBRA_EVPNES_LOCAL))
1705 zebra_evpn_es_br_port_dplane_update(es, __func__);
1706 }
1707
1708 static void zebra_evpn_es_vtep_del(struct zebra_evpn_es *es,
1709 struct in_addr vtep_ip)
1710 {
1711 struct zebra_evpn_es_vtep *es_vtep;
1712 bool dplane_updated = false;
1713
1714 es_vtep = zebra_evpn_es_vtep_find(es, vtep_ip);
1715
1716 if (es_vtep) {
1717 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
1718 zlog_debug("es %s vtep %pI4 del",
1719 es->esi_str, &vtep_ip);
1720 es_vtep->flags |= ZEBRA_EVPNES_VTEP_DEL_IN_PROG;
1721 if (es_vtep->flags & ZEBRA_EVPNES_VTEP_RXED_ESR) {
1722 es_vtep->flags &= ~ZEBRA_EVPNES_VTEP_RXED_ESR;
1723 dplane_updated =
1724 zebra_evpn_es_run_df_election(es, __func__);
1725 }
1726 /* remove the vtep from the SPH list */
1727 if (!dplane_updated && (es->flags & ZEBRA_EVPNES_LOCAL))
1728 zebra_evpn_es_br_port_dplane_update(es, __func__);
1729 zebra_evpn_es_vtep_free(es_vtep);
1730 }
1731 }
1732
1733 /* compare ES-IDs for the global ES RB tree */
1734 static int zebra_es_rb_cmp(const struct zebra_evpn_es *es1,
1735 const struct zebra_evpn_es *es2)
1736 {
1737 return memcmp(&es1->esi, &es2->esi, ESI_BYTES);
1738 }
1739 RB_GENERATE(zebra_es_rb_head, zebra_evpn_es, rb_node, zebra_es_rb_cmp);
1740
1741 /* Lookup ES */
1742 struct zebra_evpn_es *zebra_evpn_es_find(const esi_t *esi)
1743 {
1744 struct zebra_evpn_es tmp;
1745
1746 memcpy(&tmp.esi, esi, sizeof(esi_t));
1747 return RB_FIND(zebra_es_rb_head, &zmh_info->es_rb_tree, &tmp);
1748 }
1749
1750 /* A new local es is created when a local-es-id and sysmac is configured
1751 * against an interface.
1752 */
1753 static struct zebra_evpn_es *zebra_evpn_es_new(const esi_t *esi)
1754 {
1755 struct zebra_evpn_es *es;
1756
1757 if (!memcmp(esi, zero_esi, sizeof(esi_t)))
1758 return NULL;
1759
1760 es = XCALLOC(MTYPE_ZES, sizeof(struct zebra_evpn_es));
1761
1762 /* fill in ESI */
1763 memcpy(&es->esi, esi, sizeof(esi_t));
1764 esi_to_str(&es->esi, es->esi_str, sizeof(es->esi_str));
1765
1766 /* Add to rb_tree */
1767 RB_INSERT(zebra_es_rb_head, &zmh_info->es_rb_tree, es);
1768
1769 /* Initialise the ES-EVI list */
1770 es->es_evi_list = list_new();
1771 listset_app_node_mem(es->es_evi_list);
1772
1773 /* Initialise the VTEP list */
1774 es->es_vtep_list = list_new();
1775 listset_app_node_mem(es->es_vtep_list);
1776 es->es_vtep_list->cmp = zebra_evpn_es_vtep_cmp;
1777
1778 /* mac entries associated with the ES */
1779 es->mac_list = list_new();
1780 listset_app_node_mem(es->mac_list);
1781
1782 /* reserve a NHG */
1783 es->nhg_id = zebra_evpn_nhid_alloc(es);
1784
1785 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
1786 zlog_debug("es %s nhg %u new", es->esi_str, es->nhg_id);
1787
1788 return es;
1789 }
1790
1791 /* Free a given ES -
1792 * This just frees appropriate memory, caller should have taken other
1793 * needed actions.
1794 */
1795 static void zebra_evpn_es_free(struct zebra_evpn_es **esp)
1796 {
1797 struct zebra_evpn_es *es = *esp;
1798
1799 /* If the ES has a local or remote reference it cannot be freed.
1800 * Free is also prevented if there are MAC entries referencing
1801 * it.
1802 */
1803 if ((es->flags & (ZEBRA_EVPNES_LOCAL | ZEBRA_EVPNES_REMOTE)) ||
1804 listcount(es->mac_list))
1805 return;
1806
1807 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
1808 zlog_debug("es %s free", es->esi_str);
1809
1810 /* If the NHG is still installed uninstall it and free the id */
1811 if (es->flags & ZEBRA_EVPNES_NHG_ACTIVE) {
1812 es->flags &= ~ZEBRA_EVPNES_NHG_ACTIVE;
1813 kernel_del_mac_nhg(es->nhg_id);
1814 }
1815 zebra_evpn_nhid_free(es->nhg_id, es);
1816
1817 /* cleanup resources maintained against the ES */
1818 list_delete(&es->es_evi_list);
1819 list_delete(&es->es_vtep_list);
1820 list_delete(&es->mac_list);
1821
1822 /* remove from the VNI-ESI rb tree */
1823 RB_REMOVE(zebra_es_rb_head, &zmh_info->es_rb_tree, es);
1824
1825 XFREE(MTYPE_ZES, es);
1826
1827 *esp = NULL;
1828 }
1829
1830 /* Inform BGP about local ES addition */
1831 static int zebra_evpn_es_send_add_to_client(struct zebra_evpn_es *es)
1832 {
1833 struct zserv *client;
1834 struct stream *s;
1835 uint8_t oper_up;
1836 bool bypass;
1837
1838 client = zserv_find_client(ZEBRA_ROUTE_BGP, 0);
1839 /* BGP may not be running. */
1840 if (!client)
1841 return 0;
1842
1843 s = stream_new(ZEBRA_MAX_PACKET_SIZ);
1844
1845 zclient_create_header(s, ZEBRA_LOCAL_ES_ADD, zebra_vrf_get_evpn_id());
1846 stream_put(s, &es->esi, sizeof(esi_t));
1847 stream_put_ipv4(s, zmh_info->es_originator_ip.s_addr);
1848 oper_up = !!(es->flags & ZEBRA_EVPNES_OPER_UP);
1849 stream_putc(s, oper_up);
1850 stream_putw(s, es->df_pref);
1851 bypass = !!(es->flags & ZEBRA_EVPNES_BYPASS);
1852 stream_putc(s, bypass);
1853
1854 /* Write packet size. */
1855 stream_putw_at(s, 0, stream_get_endp(s));
1856
1857 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
1858 zlog_debug(
1859 "send add local es %s %pI4 active %u df_pref %u%s to %s",
1860 es->esi_str, &zmh_info->es_originator_ip, oper_up,
1861 es->df_pref, bypass ? " bypass" : "",
1862 zebra_route_string(client->proto));
1863
1864 client->local_es_add_cnt++;
1865 return zserv_send_message(client, s);
1866 }
1867
1868 /* Inform BGP about local ES deletion */
1869 static int zebra_evpn_es_send_del_to_client(struct zebra_evpn_es *es)
1870 {
1871 struct zserv *client;
1872 struct stream *s;
1873
1874 client = zserv_find_client(ZEBRA_ROUTE_BGP, 0);
1875 /* BGP may not be running. */
1876 if (!client)
1877 return 0;
1878
1879 s = stream_new(ZEBRA_MAX_PACKET_SIZ);
1880 stream_reset(s);
1881
1882 zclient_create_header(s, ZEBRA_LOCAL_ES_DEL, zebra_vrf_get_evpn_id());
1883 stream_put(s, &es->esi, sizeof(esi_t));
1884
1885 /* Write packet size. */
1886 stream_putw_at(s, 0, stream_get_endp(s));
1887
1888 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
1889 zlog_debug("send del local es %s to %s", es->esi_str,
1890 zebra_route_string(client->proto));
1891
1892 client->local_es_del_cnt++;
1893 return zserv_send_message(client, s);
1894 }
1895
1896 static void zebra_evpn_es_re_eval_send_to_client(struct zebra_evpn_es *es,
1897 bool es_evi_re_reval)
1898 {
1899 bool old_ready;
1900 bool new_ready;
1901 struct listnode *node;
1902 struct zebra_evpn_es_evi *es_evi;
1903
1904 old_ready = !!(es->flags & ZEBRA_EVPNES_READY_FOR_BGP);
1905
1906 if ((es->flags & ZEBRA_EVPNES_LOCAL) &&
1907 zmh_info->es_originator_ip.s_addr)
1908 es->flags |= ZEBRA_EVPNES_READY_FOR_BGP;
1909 else
1910 es->flags &= ~ZEBRA_EVPNES_READY_FOR_BGP;
1911
1912 new_ready = !!(es->flags & ZEBRA_EVPNES_READY_FOR_BGP);
1913 if (old_ready == new_ready)
1914 return;
1915
1916 if (new_ready)
1917 zebra_evpn_es_send_add_to_client(es);
1918 else
1919 zebra_evpn_es_send_del_to_client(es);
1920
1921 /* re-eval associated EVIs */
1922 if (es_evi_re_reval) {
1923 for (ALL_LIST_ELEMENTS_RO(es->es_evi_list, node, es_evi)) {
1924 if (!(es_evi->flags & ZEBRA_EVPNES_EVI_LOCAL))
1925 continue;
1926 zebra_evpn_es_evi_re_eval_send_to_client(es_evi);
1927 }
1928 }
1929 }
1930
1931 void zebra_evpn_es_send_all_to_client(bool add)
1932 {
1933 struct listnode *es_node;
1934 struct listnode *evi_node;
1935 struct zebra_evpn_es *es;
1936 struct zebra_evpn_es_evi *es_evi;
1937
1938 if (!zmh_info)
1939 return;
1940
1941 for (ALL_LIST_ELEMENTS_RO(zmh_info->local_es_list, es_node, es)) {
1942 if (es->flags & ZEBRA_EVPNES_READY_FOR_BGP) {
1943 if (add)
1944 zebra_evpn_es_send_add_to_client(es);
1945 for (ALL_LIST_ELEMENTS_RO(es->es_evi_list,
1946 evi_node, es_evi)) {
1947 if (!(es_evi->flags &
1948 ZEBRA_EVPNES_EVI_READY_FOR_BGP))
1949 continue;
1950
1951 if (add)
1952 zebra_evpn_es_evi_send_to_client(
1953 es, es_evi->zevpn,
1954 true /* add */);
1955 else
1956 zebra_evpn_es_evi_send_to_client(
1957 es, es_evi->zevpn,
1958 false /* add */);
1959 }
1960 if (!add)
1961 zebra_evpn_es_send_del_to_client(es);
1962 }
1963 }
1964 }
1965
1966 /* walk the vlan bitmap associated with the zif and create or delete
1967 * es_evis for all vlans associated with a VNI.
1968 * XXX: This API is really expensive. optimize later if possible.
1969 */
1970 static void zebra_evpn_es_setup_evis(struct zebra_evpn_es *es)
1971 {
1972 struct zebra_if *zif = es->zif;
1973 uint16_t vid;
1974 struct zebra_evpn_access_bd *acc_bd;
1975
1976 if (!bf_is_inited(zif->vlan_bitmap))
1977 return;
1978
1979 bf_for_each_set_bit(zif->vlan_bitmap, vid, IF_VLAN_BITMAP_MAX) {
1980 acc_bd = zebra_evpn_acc_vl_find(vid);
1981 if (acc_bd->zevpn)
1982 zebra_evpn_local_es_evi_add(es, acc_bd->zevpn);
1983 }
1984 }
1985
1986 static void zebra_evpn_flush_local_mac(struct zebra_mac *mac,
1987 struct interface *ifp)
1988 {
1989 struct zebra_if *zif;
1990 struct interface *br_ifp;
1991 vlanid_t vid;
1992
1993 zif = ifp->info;
1994 br_ifp = zif->brslave_info.br_if;
1995 if (!br_ifp)
1996 return;
1997
1998 if (mac->zevpn->vxlan_if) {
1999 zif = mac->zevpn->vxlan_if->info;
2000 vid = zif->l2info.vxl.access_vlan;
2001 } else {
2002 vid = 0;
2003 }
2004
2005 /* delete the local mac from the dataplane */
2006 dplane_local_mac_del(ifp, br_ifp, vid, &mac->macaddr);
2007 /* delete the local mac in zebra */
2008 zebra_evpn_del_local_mac(mac->zevpn, mac, true);
2009 }
2010
2011 static void zebra_evpn_es_flush_local_macs(struct zebra_evpn_es *es,
2012 struct interface *ifp, bool add)
2013 {
2014 struct zebra_mac *mac;
2015 struct listnode *node;
2016 struct listnode *nnode;
2017
2018 for (ALL_LIST_ELEMENTS(es->mac_list, node, nnode, mac)) {
2019 if (!CHECK_FLAG(mac->flags, ZEBRA_MAC_LOCAL))
2020 continue;
2021
2022 /* If ES is being attached/detached from the access port we
2023 * need to clear local activity and peer activity and start
2024 * over */
2025 if (IS_ZEBRA_DEBUG_EVPN_MH_MAC)
2026 zlog_debug("VNI %u mac %pEA update; local ES %s %s",
2027 mac->zevpn->vni,
2028 &mac->macaddr,
2029 es->esi_str, add ? "add" : "del");
2030 zebra_evpn_flush_local_mac(mac, ifp);
2031 }
2032 }
2033
2034 void zebra_evpn_es_local_br_port_update(struct zebra_if *zif)
2035 {
2036 struct zebra_evpn_es *es = zif->es_info.es;
2037 bool old_br_port = !!(es->flags & ZEBRA_EVPNES_BR_PORT);
2038 bool new_br_port;
2039
2040 if (zif->brslave_info.bridge_ifindex != IFINDEX_INTERNAL)
2041 es->flags |= ZEBRA_EVPNES_BR_PORT;
2042 else
2043 es->flags &= ~ZEBRA_EVPNES_BR_PORT;
2044
2045 new_br_port = !!(es->flags & ZEBRA_EVPNES_BR_PORT);
2046 if (old_br_port == new_br_port)
2047 return;
2048
2049 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
2050 zlog_debug("es %s br_port change old %u new %u", es->esi_str,
2051 old_br_port, new_br_port);
2052
2053 /* update the dataplane br_port attrs */
2054 if (new_br_port && zebra_evpn_es_br_port_dplane_update_needed(es))
2055 zebra_evpn_es_br_port_dplane_update(es, __func__);
2056 }
2057
2058 /* On config of first local-ES turn off DAD */
2059 static void zebra_evpn_mh_dup_addr_detect_off(void)
2060 {
2061 struct zebra_vrf *zvrf;
2062 bool old_detect;
2063 bool new_detect;
2064
2065 if (zmh_info->flags & ZEBRA_EVPN_MH_DUP_ADDR_DETECT_OFF)
2066 return;
2067
2068 zvrf = zebra_vrf_get_evpn();
2069 old_detect = zebra_evpn_do_dup_addr_detect(zvrf);
2070 zmh_info->flags |= ZEBRA_EVPN_MH_DUP_ADDR_DETECT_OFF;
2071 new_detect = zebra_evpn_do_dup_addr_detect(zvrf);
2072
2073 if (old_detect && !new_detect) {
2074 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
2075 zlog_debug(
2076 "evpn-mh config caused DAD addr detect chg from %s to %s",
2077 old_detect ? "on" : "off",
2078 new_detect ? "on" : "off");
2079 zebra_vxlan_clear_dup_detect_vni_all(zvrf);
2080 }
2081 }
2082
2083 /* On config of first local-ES turn off advertisement of STALE/DELAY/PROBE
2084 * neighbors
2085 */
2086 static void zebra_evpn_mh_advertise_reach_neigh_only(void)
2087 {
2088 if (zmh_info->flags & ZEBRA_EVPN_MH_ADV_REACHABLE_NEIGH_ONLY)
2089 return;
2090
2091 zmh_info->flags |= ZEBRA_EVPN_MH_ADV_REACHABLE_NEIGH_ONLY;
2092 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
2093 zlog_debug("evpn-mh: only REACHABLE neigh advertised");
2094
2095 /* XXX - if STALE/DELAY/PROBE neighs were previously advertised we
2096 * need to withdraw them
2097 */
2098 }
2099
2100 /* On config of first local-ES turn on advertisement of local SVI-MAC */
2101 static void zebra_evpn_mh_advertise_svi_mac(void)
2102 {
2103 if (zmh_info->flags & ZEBRA_EVPN_MH_ADV_SVI_MAC)
2104 return;
2105
2106 zmh_info->flags |= ZEBRA_EVPN_MH_ADV_SVI_MAC;
2107 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
2108 zlog_debug("evpn-mh: advertise SVI MAC");
2109
2110 /* walk through all SVIs and see if we need to advertise the MAC */
2111 zebra_evpn_acc_vl_adv_svi_mac_all();
2112 }
2113
2114 static void zebra_evpn_es_df_delay_exp_cb(struct thread *t)
2115 {
2116 struct zebra_evpn_es *es;
2117
2118 es = THREAD_ARG(t);
2119
2120 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
2121 zlog_debug("es %s df-delay expired", es->esi_str);
2122
2123 zebra_evpn_es_run_df_election(es, __func__);
2124 }
2125
2126 /* currently there is no global config to turn on MH instead we use
2127 * the addition of the first local Ethernet Segment as the trigger to
2128 * init MH specific processing
2129 */
2130 static void zebra_evpn_mh_on_first_local_es(void)
2131 {
2132 zebra_evpn_mh_dup_addr_detect_off();
2133 zebra_evpn_mh_advertise_reach_neigh_only();
2134 zebra_evpn_mh_advertise_svi_mac();
2135 }
2136
2137 static void zebra_evpn_es_local_info_set(struct zebra_evpn_es *es,
2138 struct zebra_if *zif)
2139 {
2140 if (es->flags & ZEBRA_EVPNES_LOCAL)
2141 return;
2142
2143 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
2144 zlog_debug("local es %s add; nhg %u if %s", es->esi_str,
2145 es->nhg_id, zif->ifp->name);
2146
2147 zebra_evpn_mh_on_first_local_es();
2148
2149 es->flags |= ZEBRA_EVPNES_LOCAL;
2150 listnode_init(&es->local_es_listnode, es);
2151 listnode_add(zmh_info->local_es_list, &es->local_es_listnode);
2152
2153 /* attach es to interface */
2154 zif->es_info.es = es;
2155 es->df_pref = zif->es_info.df_pref ? zif->es_info.df_pref
2156 : EVPN_MH_DF_PREF_DEFAULT;
2157
2158 /* attach interface to es */
2159 es->zif = zif;
2160 if (if_is_operative(zif->ifp))
2161 es->flags |= ZEBRA_EVPNES_OPER_UP;
2162
2163 if (zif->brslave_info.bridge_ifindex != IFINDEX_INTERNAL)
2164 es->flags |= ZEBRA_EVPNES_BR_PORT;
2165
2166 /* inherit the bypass flag from the interface */
2167 if (zif->flags & ZIF_FLAG_LACP_BYPASS)
2168 es->flags |= ZEBRA_EVPNES_BYPASS;
2169
2170 /* setup base-vni if one doesn't already exist; the ES will get sent
2171 * to BGP as a part of that process
2172 */
2173 if (!zmh_info->es_base_evpn)
2174 zebra_evpn_es_get_one_base_evpn();
2175 else
2176 /* send notification to bgp */
2177 zebra_evpn_es_re_eval_send_to_client(es,
2178 false /* es_evi_re_reval */);
2179
2180 /* Start the DF delay timer on the local ES */
2181 if (!es->df_delay_timer)
2182 thread_add_timer(zrouter.master, zebra_evpn_es_df_delay_exp_cb,
2183 es, ZEBRA_EVPN_MH_DF_DELAY_TIME,
2184 &es->df_delay_timer);
2185
2186 /* See if the local VTEP can function as DF on the ES */
2187 if (!zebra_evpn_es_run_df_election(es, __func__)) {
2188 /* check if the dplane entry needs to be re-programmed as a
2189 * result of some thing other than DF status change
2190 */
2191 if (zebra_evpn_es_br_port_dplane_update_needed(es))
2192 zebra_evpn_es_br_port_dplane_update(es, __func__);
2193 }
2194
2195
2196 /* Setup ES-EVIs for all VxLAN stretched VLANs associated with
2197 * the zif
2198 */
2199 zebra_evpn_es_setup_evis(es);
2200 /* if there any local macs referring to the ES as dest we
2201 * need to clear the contents and start over
2202 */
2203 zebra_evpn_es_flush_local_macs(es, zif->ifp, true);
2204
2205 /* inherit EVPN protodown flags on the access port */
2206 zebra_evpn_mh_update_protodown_es(es, true /*resync_dplane*/);
2207 }
2208
2209 static void zebra_evpn_es_local_info_clear(struct zebra_evpn_es **esp)
2210 {
2211 struct zebra_if *zif;
2212 struct zebra_evpn_es *es = *esp;
2213 bool dplane_updated = false;
2214
2215 if (!(es->flags & ZEBRA_EVPNES_LOCAL))
2216 return;
2217
2218 zif = es->zif;
2219
2220 /* if there any local macs referring to the ES as dest we
2221 * need to clear the contents and start over
2222 */
2223 zebra_evpn_es_flush_local_macs(es, zif->ifp, false);
2224
2225 es->flags &= ~(ZEBRA_EVPNES_LOCAL | ZEBRA_EVPNES_READY_FOR_BGP);
2226
2227 THREAD_OFF(es->df_delay_timer);
2228
2229 /* clear EVPN protodown flags on the access port */
2230 zebra_evpn_mh_clear_protodown_es(es);
2231
2232 /* remove the DF filter */
2233 dplane_updated = zebra_evpn_es_run_df_election(es, __func__);
2234
2235 /* flush the BUM filters and backup NHG */
2236 if (!dplane_updated)
2237 zebra_evpn_es_br_port_dplane_clear(es);
2238
2239 /* clear the es from the parent interface */
2240 zif->es_info.es = NULL;
2241 es->zif = NULL;
2242
2243 /* clear all local flags associated with the ES */
2244 es->flags &= ~(ZEBRA_EVPNES_OPER_UP | ZEBRA_EVPNES_BR_PORT
2245 | ZEBRA_EVPNES_BYPASS);
2246
2247 /* remove from the ES list */
2248 list_delete_node(zmh_info->local_es_list, &es->local_es_listnode);
2249
2250 /* free up the ES if there is no remote reference */
2251 zebra_evpn_es_free(esp);
2252 }
2253
2254 /* Delete an ethernet segment and inform BGP */
2255 static void zebra_evpn_local_es_del(struct zebra_evpn_es **esp)
2256 {
2257 struct zebra_evpn_es_evi *es_evi;
2258 struct listnode *node = NULL;
2259 struct listnode *nnode = NULL;
2260 struct zebra_if *zif;
2261 struct zebra_evpn_es *es = *esp;
2262
2263 if (!CHECK_FLAG(es->flags, ZEBRA_EVPNES_LOCAL))
2264 return;
2265
2266 if (IS_ZEBRA_DEBUG_EVPN_MH_ES) {
2267 zif = es->zif;
2268 zlog_debug("local es %s del; nhg %u if %s", es->esi_str,
2269 es->nhg_id, zif ? zif->ifp->name : "-");
2270 }
2271
2272 /* remove all ES-EVIs associated with the ES */
2273 for (ALL_LIST_ELEMENTS(es->es_evi_list, node, nnode, es_evi))
2274 zebra_evpn_local_es_evi_do_del(es_evi);
2275
2276 /* send a del if the ES had been sent to BGP earlier */
2277 if (es->flags & ZEBRA_EVPNES_READY_FOR_BGP)
2278 zebra_evpn_es_send_del_to_client(es);
2279
2280 zebra_evpn_es_local_info_clear(esp);
2281 }
2282
2283 /* eval remote info associated with the ES */
2284 static void zebra_evpn_es_remote_info_re_eval(struct zebra_evpn_es **esp)
2285 {
2286 struct zebra_evpn_es *es = *esp;
2287
2288 /* if there are remote VTEPs the ES-EVI is classified as "remote" */
2289 if (listcount(es->es_vtep_list)) {
2290 if (!(es->flags & ZEBRA_EVPNES_REMOTE)) {
2291 es->flags |= ZEBRA_EVPNES_REMOTE;
2292 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
2293 zlog_debug("remote es %s add; nhg %u",
2294 es->esi_str, es->nhg_id);
2295 }
2296 } else {
2297 if (es->flags & ZEBRA_EVPNES_REMOTE) {
2298 es->flags &= ~ZEBRA_EVPNES_REMOTE;
2299 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
2300 zlog_debug("remote es %s del; nhg %u",
2301 es->esi_str, es->nhg_id);
2302 zebra_evpn_es_free(esp);
2303 }
2304 }
2305 }
2306
2307 /* A new local es is created when a local-es-id and sysmac is configured
2308 * against an interface.
2309 */
2310 static int zebra_evpn_local_es_update(struct zebra_if *zif, esi_t *esi)
2311 {
2312 struct zebra_evpn_es *old_es = zif->es_info.es;
2313 struct zebra_evpn_es *es;
2314
2315 if (old_es && !memcmp(&old_es->esi, esi, sizeof(*esi)))
2316 /* dup - nothing to be done */
2317 return 0;
2318
2319 /* release the old_es against the zif */
2320 if (old_es)
2321 zebra_evpn_local_es_del(&old_es);
2322
2323 es = zebra_evpn_es_find(esi);
2324 if (es) {
2325 /* if it exists against another interface flag an error */
2326 if (es->zif && es->zif != zif)
2327 return -1;
2328 } else {
2329 /* create new es */
2330 es = zebra_evpn_es_new(esi);
2331 }
2332
2333 memcpy(&zif->es_info.esi, esi, sizeof(*esi));
2334 if (es)
2335 zebra_evpn_es_local_info_set(es, zif);
2336
2337 return 0;
2338 }
2339
2340 static int zebra_evpn_type3_esi_update(struct zebra_if *zif, uint32_t lid,
2341 struct ethaddr *sysmac)
2342 {
2343 struct zebra_evpn_es *old_es = zif->es_info.es;
2344 esi_t esi;
2345 int offset = 0;
2346 int field_bytes = 0;
2347
2348 /* Complete config of the ES-ID bootstraps the ES */
2349 if (!lid || is_zero_mac(sysmac)) {
2350 /* clear old esi */
2351 memset(&zif->es_info.esi, 0, sizeof(zif->es_info.esi));
2352 /* if in ES is attached to zif delete it */
2353 if (old_es)
2354 zebra_evpn_local_es_del(&old_es);
2355 return 0;
2356 }
2357
2358 /* build 10-byte type-3-ESI -
2359 * Type(1-byte), MAC(6-bytes), ES-LID (3-bytes)
2360 */
2361 field_bytes = 1;
2362 esi.val[offset] = ESI_TYPE_MAC;
2363 offset += field_bytes;
2364
2365 field_bytes = ETH_ALEN;
2366 memcpy(&esi.val[offset], (uint8_t *)sysmac, field_bytes);
2367 offset += field_bytes;
2368
2369 esi.val[offset++] = (uint8_t)(lid >> 16);
2370 esi.val[offset++] = (uint8_t)(lid >> 8);
2371 esi.val[offset++] = (uint8_t)lid;
2372
2373 return zebra_evpn_local_es_update(zif, &esi);
2374 }
2375
2376 int zebra_evpn_remote_es_del(const esi_t *esi, struct in_addr vtep_ip)
2377 {
2378 char buf[ESI_STR_LEN];
2379 struct zebra_evpn_es *es;
2380
2381 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
2382 zlog_debug("remote es %s vtep %pI4 del",
2383 esi_to_str(esi, buf, sizeof(buf)), &vtep_ip);
2384
2385 es = zebra_evpn_es_find(esi);
2386 if (!es) {
2387 zlog_warn("remote es %s vtep %pI4 del failed, es missing",
2388 esi_to_str(esi, buf, sizeof(buf)), &vtep_ip);
2389 return -1;
2390 }
2391
2392 zebra_evpn_es_vtep_del(es, vtep_ip);
2393 zebra_evpn_es_remote_info_re_eval(&es);
2394
2395 return 0;
2396 }
2397
2398 /* force delete a remote ES on the way down */
2399 static void zebra_evpn_remote_es_flush(struct zebra_evpn_es **esp)
2400 {
2401 struct zebra_evpn_es_vtep *es_vtep;
2402 struct listnode *node;
2403 struct listnode *nnode;
2404 struct zebra_evpn_es *es = *esp;
2405
2406 for (ALL_LIST_ELEMENTS(es->es_vtep_list, node, nnode, es_vtep)) {
2407 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
2408 zlog_debug("es %s vtep %pI4 flush",
2409 es->esi_str,
2410 &es_vtep->vtep_ip);
2411 zebra_evpn_es_vtep_free(es_vtep);
2412 }
2413 zebra_evpn_es_remote_info_re_eval(esp);
2414 }
2415
2416 int zebra_evpn_remote_es_add(const esi_t *esi, struct in_addr vtep_ip,
2417 bool esr_rxed, uint8_t df_alg, uint16_t df_pref)
2418 {
2419 char buf[ESI_STR_LEN];
2420 struct zebra_evpn_es *es;
2421
2422 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
2423 zlog_debug("remote es %s vtep %pI4 add %s df_alg %d df_pref %d",
2424 esi_to_str(esi, buf, sizeof(buf)),
2425 &vtep_ip, esr_rxed ? "esr" : "", df_alg,
2426 df_pref);
2427
2428 es = zebra_evpn_es_find(esi);
2429 if (!es) {
2430 es = zebra_evpn_es_new(esi);
2431 if (!es) {
2432 zlog_warn(
2433 "remote es %s vtep %pI4 add failed, es missing",
2434 esi_to_str(esi, buf, sizeof(buf)), &vtep_ip);
2435 return -1;
2436 }
2437 }
2438
2439 if (df_alg != EVPN_MH_DF_ALG_PREF)
2440 zlog_warn(
2441 "remote es %s vtep %pI4 add %s with unsupported df_alg %d",
2442 esi_to_str(esi, buf, sizeof(buf)), &vtep_ip,
2443 esr_rxed ? "esr" : "", df_alg);
2444
2445 zebra_evpn_es_vtep_add(es, vtep_ip, esr_rxed, df_alg, df_pref);
2446 zebra_evpn_es_remote_info_re_eval(&es);
2447
2448 return 0;
2449 }
2450
2451 void zebra_evpn_proc_remote_es(ZAPI_HANDLER_ARGS)
2452 {
2453 struct stream *s;
2454 struct in_addr vtep_ip;
2455 esi_t esi;
2456
2457 if (!is_evpn_enabled()) {
2458 zlog_debug(
2459 "%s: EVPN not enabled yet we received a es_add zapi call",
2460 __func__);
2461 return;
2462 }
2463
2464 memset(&esi, 0, sizeof(esi_t));
2465 s = msg;
2466
2467 STREAM_GET(&esi, s, sizeof(esi_t));
2468 STREAM_GET(&vtep_ip.s_addr, s, sizeof(vtep_ip.s_addr));
2469
2470 if (hdr->command == ZEBRA_REMOTE_ES_VTEP_ADD) {
2471 uint32_t zapi_flags;
2472 uint8_t df_alg;
2473 uint16_t df_pref;
2474 bool esr_rxed;
2475
2476 STREAM_GETL(s, zapi_flags);
2477 esr_rxed = (zapi_flags & ZAPI_ES_VTEP_FLAG_ESR_RXED) ? true
2478 : false;
2479 STREAM_GETC(s, df_alg);
2480 STREAM_GETW(s, df_pref);
2481 zebra_rib_queue_evpn_rem_es_add(&esi, &vtep_ip, esr_rxed,
2482 df_alg, df_pref);
2483 } else {
2484 zebra_rib_queue_evpn_rem_es_del(&esi, &vtep_ip);
2485 }
2486
2487 stream_failure:
2488 return;
2489 }
2490
2491 void zebra_evpn_es_mac_deref_entry(struct zebra_mac *mac)
2492 {
2493 struct zebra_evpn_es *es = mac->es;
2494
2495 mac->es = NULL;
2496 if (!es)
2497 return;
2498
2499 list_delete_node(es->mac_list, &mac->es_listnode);
2500 if (!listcount(es->mac_list))
2501 zebra_evpn_es_free(&es);
2502 }
2503
2504 /* Associate a MAC entry with a local or remote ES. Returns false if there
2505 * was no ES change.
2506 */
2507 bool zebra_evpn_es_mac_ref_entry(struct zebra_mac *mac,
2508 struct zebra_evpn_es *es)
2509 {
2510 if (mac->es == es)
2511 return false;
2512
2513 if (mac->es)
2514 zebra_evpn_es_mac_deref_entry(mac);
2515
2516 if (!es)
2517 return true;
2518
2519 mac->es = es;
2520 listnode_init(&mac->es_listnode, mac);
2521 listnode_add(es->mac_list, &mac->es_listnode);
2522
2523 return true;
2524 }
2525
2526 bool zebra_evpn_es_mac_ref(struct zebra_mac *mac, const esi_t *esi)
2527 {
2528 struct zebra_evpn_es *es;
2529
2530 es = zebra_evpn_es_find(esi);
2531 if (!es) {
2532 /* If non-zero esi implicitly create a new ES */
2533 if (memcmp(esi, zero_esi, sizeof(esi_t))) {
2534 es = zebra_evpn_es_new(esi);
2535 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
2536 zlog_debug("auto es %s add on mac ref",
2537 es->esi_str);
2538 }
2539 }
2540
2541 return zebra_evpn_es_mac_ref_entry(mac, es);
2542 }
2543
2544 /* Inform BGP about local ES-EVI add or del */
2545 static int zebra_evpn_es_evi_send_to_client(struct zebra_evpn_es *es,
2546 struct zebra_evpn *zevpn, bool add)
2547 {
2548 struct zserv *client;
2549 struct stream *s;
2550
2551 client = zserv_find_client(ZEBRA_ROUTE_BGP, 0);
2552 /* BGP may not be running. */
2553 if (!client)
2554 return 0;
2555
2556 s = stream_new(ZEBRA_MAX_PACKET_SIZ);
2557
2558 zclient_create_header(s,
2559 add ? ZEBRA_LOCAL_ES_EVI_ADD : ZEBRA_LOCAL_ES_EVI_DEL,
2560 zebra_vrf_get_evpn_id());
2561 stream_put(s, &es->esi, sizeof(esi_t));
2562 stream_putl(s, zevpn->vni);
2563
2564 /* Write packet size. */
2565 stream_putw_at(s, 0, stream_get_endp(s));
2566
2567 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
2568 zlog_debug("send %s local es %s evi %u to %s",
2569 add ? "add" : "del",
2570 es->esi_str, zevpn->vni,
2571 zebra_route_string(client->proto));
2572
2573 client->local_es_add_cnt++;
2574 return zserv_send_message(client, s);
2575 }
2576
2577 /* sysmac part of a local ESI has changed */
2578 static int zebra_evpn_es_sys_mac_update(struct zebra_if *zif,
2579 struct ethaddr *sysmac)
2580 {
2581 int rv;
2582
2583 rv = zebra_evpn_type3_esi_update(zif, zif->es_info.lid, sysmac);
2584 if (!rv)
2585 memcpy(&zif->es_info.sysmac, sysmac, sizeof(struct ethaddr));
2586
2587 return rv;
2588 }
2589
2590 /* local-ID part of ESI has changed */
2591 static int zebra_evpn_es_lid_update(struct zebra_if *zif, uint32_t lid)
2592 {
2593 int rv;
2594
2595 rv = zebra_evpn_type3_esi_update(zif, lid, &zif->es_info.sysmac);
2596 if (!rv)
2597 zif->es_info.lid = lid;
2598
2599 return rv;
2600 }
2601
2602 /* type-0 esi has changed */
2603 static int zebra_evpn_es_type0_esi_update(struct zebra_if *zif, esi_t *esi)
2604 {
2605 int rv;
2606
2607 rv = zebra_evpn_local_es_update(zif, esi);
2608
2609 /* clear the old es_lid, es_sysmac - type-0 is being set so old
2610 * type-3 params need to be flushed
2611 */
2612 memset(&zif->es_info.sysmac, 0, sizeof(struct ethaddr));
2613 zif->es_info.lid = 0;
2614
2615 return rv;
2616 }
2617
2618 void zebra_evpn_es_cleanup(void)
2619 {
2620 struct zebra_evpn_es *es;
2621 struct zebra_evpn_es *es_next;
2622
2623 RB_FOREACH_SAFE(es, zebra_es_rb_head,
2624 &zmh_info->es_rb_tree, es_next) {
2625 zebra_evpn_local_es_del(&es);
2626 if (es)
2627 zebra_evpn_remote_es_flush(&es);
2628 }
2629 }
2630
2631 static void zebra_evpn_es_df_pref_update(struct zebra_if *zif, uint16_t df_pref)
2632 {
2633 struct zebra_evpn_es *es;
2634 uint16_t tmp_pref;
2635
2636 if (zif->es_info.df_pref == df_pref)
2637 return;
2638
2639 zif->es_info.df_pref = df_pref;
2640 es = zif->es_info.es;
2641
2642 if (!es)
2643 return;
2644
2645 tmp_pref = zif->es_info.df_pref ? zif->es_info.df_pref
2646 : EVPN_MH_DF_PREF_DEFAULT;
2647
2648 if (es->df_pref == tmp_pref)
2649 return;
2650
2651 es->df_pref = tmp_pref;
2652 /* run df election */
2653 zebra_evpn_es_run_df_election(es, __func__);
2654 /* notify bgp */
2655 if (es->flags & ZEBRA_EVPNES_READY_FOR_BGP)
2656 zebra_evpn_es_send_add_to_client(es);
2657 }
2658
2659 /* If bypass mode on an es changed we set all local macs to
2660 * inactive and drop the sync info
2661 */
2662 static void zebra_evpn_es_bypass_update_macs(struct zebra_evpn_es *es,
2663 struct interface *ifp, bool bypass)
2664 {
2665 struct zebra_mac *mac;
2666 struct listnode *node;
2667 struct listnode *nnode;
2668 struct zebra_if *zif;
2669
2670 /* Flush all MACs linked to the ES */
2671 for (ALL_LIST_ELEMENTS(es->mac_list, node, nnode, mac)) {
2672 if (!CHECK_FLAG(mac->flags, ZEBRA_MAC_LOCAL))
2673 continue;
2674
2675 if (IS_ZEBRA_DEBUG_EVPN_MH_MAC)
2676 zlog_debug("VNI %u mac %pEA %s update es %s",
2677 mac->zevpn->vni,
2678 &mac->macaddr,
2679 bypass ? "bypass" : "non-bypass",
2680 es->esi_str);
2681 zebra_evpn_flush_local_mac(mac, ifp);
2682 }
2683
2684 /* While in bypass-mode locally learnt MACs are linked
2685 * to the access port instead of the ES
2686 */
2687 zif = ifp->info;
2688 if (!zif->mac_list)
2689 return;
2690
2691 for (ALL_LIST_ELEMENTS(zif->mac_list, node, nnode, mac)) {
2692 if (!CHECK_FLAG(mac->flags, ZEBRA_MAC_LOCAL))
2693 continue;
2694
2695 if (IS_ZEBRA_DEBUG_EVPN_MH_MAC)
2696 zlog_debug("VNI %u mac %pEA %s update ifp %s",
2697 mac->zevpn->vni,
2698 &mac->macaddr,
2699 bypass ? "bypass" : "non-bypass", ifp->name);
2700 zebra_evpn_flush_local_mac(mac, ifp);
2701 }
2702 }
2703
2704 void zebra_evpn_es_bypass_update(struct zebra_evpn_es *es,
2705 struct interface *ifp, bool bypass)
2706 {
2707 bool old_bypass;
2708 bool dplane_updated;
2709
2710 old_bypass = !!(es->flags & ZEBRA_EVPNES_BYPASS);
2711 if (old_bypass == bypass)
2712 return;
2713
2714 if (bypass)
2715 es->flags |= ZEBRA_EVPNES_BYPASS;
2716 else
2717 es->flags &= ~ZEBRA_EVPNES_BYPASS;
2718
2719 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
2720 zlog_debug("bond %s es %s lacp bypass changed to %s", ifp->name,
2721 es->esi_str, bypass ? "on" : "off");
2722
2723 /* send bypass update to BGP */
2724 if (es->flags & ZEBRA_EVPNES_READY_FOR_BGP)
2725 zebra_evpn_es_send_add_to_client(es);
2726
2727 zebra_evpn_es_bypass_update_macs(es, ifp, bypass);
2728
2729 /* re-run DF election */
2730 dplane_updated = zebra_evpn_es_run_df_election(es, __func__);
2731
2732 /* disable SPH filter */
2733 if (!dplane_updated && (es->flags & ZEBRA_EVPNES_LOCAL)
2734 && (listcount(es->es_vtep_list) > ES_VTEP_MAX_CNT))
2735 zebra_evpn_es_br_port_dplane_update(es, __func__);
2736 }
2737
2738 static void zebra_evpn_es_bypass_cfg_update(struct zebra_if *zif, bool bypass)
2739 {
2740 bool old_bypass = !!(zif->es_info.flags & ZIF_CFG_ES_FLAG_BYPASS);
2741
2742 if (old_bypass == bypass)
2743 return;
2744
2745 if (bypass)
2746 zif->es_info.flags |= ZIF_CFG_ES_FLAG_BYPASS;
2747 else
2748 zif->es_info.flags &= ~ZIF_CFG_ES_FLAG_BYPASS;
2749
2750
2751 if (zif->es_info.es)
2752 zebra_evpn_es_bypass_update(zif->es_info.es, zif->ifp, bypass);
2753 }
2754
2755
2756 /* Only certain types of access ports can be setup as an Ethernet Segment */
2757 bool zebra_evpn_is_if_es_capable(struct zebra_if *zif)
2758 {
2759 if (zif->zif_type == ZEBRA_IF_BOND)
2760 return true;
2761
2762 /* XXX: allow swpX i.e. a regular ethernet port to be an ES link too */
2763 return false;
2764 }
2765
2766 void zebra_evpn_if_es_print(struct vty *vty, json_object *json,
2767 struct zebra_if *zif)
2768 {
2769 char buf[ETHER_ADDR_STRLEN];
2770 char esi_buf[ESI_STR_LEN];
2771
2772 if (json) {
2773 json_object *json_evpn;
2774
2775 json_evpn = json_object_new_object();
2776 json_object_object_add(json, "evpnMh", json_evpn);
2777
2778 if (zif->es_info.lid || !is_zero_mac(&zif->es_info.sysmac)) {
2779 json_object_int_add(json_evpn, "esId",
2780 zif->es_info.lid);
2781 json_object_string_add(
2782 json_evpn, "esSysmac",
2783 prefix_mac2str(&zif->es_info.sysmac, buf,
2784 sizeof(buf)));
2785 } else if (memcmp(&zif->es_info.esi, zero_esi,
2786 sizeof(*zero_esi))) {
2787 json_object_string_add(json_evpn, "esId",
2788 esi_to_str(&zif->es_info.esi,
2789 esi_buf,
2790 sizeof(esi_buf)));
2791 }
2792
2793 if (zif->flags & ZIF_FLAG_EVPN_MH_UPLINK)
2794 json_object_string_add(
2795 json_evpn, "uplink",
2796 CHECK_FLAG(zif->flags,
2797 ZIF_FLAG_EVPN_MH_UPLINK_OPER_UP)
2798 ? "up"
2799 : "down");
2800 } else {
2801 char mh_buf[80];
2802 bool vty_print = false;
2803
2804 mh_buf[0] = '\0';
2805 strlcat(mh_buf, " EVPN-MH:", sizeof(mh_buf));
2806 if (zif->es_info.lid || !is_zero_mac(&zif->es_info.sysmac)) {
2807 vty_print = true;
2808 snprintf(mh_buf + strlen(mh_buf),
2809 sizeof(mh_buf) - strlen(mh_buf),
2810 " ES id %u ES sysmac %s", zif->es_info.lid,
2811 prefix_mac2str(&zif->es_info.sysmac, buf,
2812 sizeof(buf)));
2813 } else if (memcmp(&zif->es_info.esi, zero_esi,
2814 sizeof(*zero_esi))) {
2815 vty_print = true;
2816 snprintf(mh_buf + strnlen(mh_buf, sizeof(mh_buf)),
2817 sizeof(mh_buf)
2818 - strnlen(mh_buf, sizeof(mh_buf)),
2819 " ES id %s",
2820 esi_to_str(&zif->es_info.esi, esi_buf,
2821 sizeof(esi_buf)));
2822 }
2823
2824 if (zif->flags & ZIF_FLAG_EVPN_MH_UPLINK) {
2825 vty_print = true;
2826 if (zif->flags & ZIF_FLAG_EVPN_MH_UPLINK_OPER_UP)
2827 strlcat(mh_buf, " uplink (up)", sizeof(mh_buf));
2828 else
2829 strlcat(mh_buf, " uplink (down)",
2830 sizeof(mh_buf));
2831 }
2832
2833 if (vty_print)
2834 vty_out(vty, "%s\n", mh_buf);
2835 }
2836 }
2837
2838 static void zebra_evpn_local_mac_oper_state_change(struct zebra_evpn_es *es)
2839 {
2840 struct zebra_mac *mac;
2841 struct listnode *node;
2842
2843 /* If fast-failover is supported by the dataplane via the use
2844 * of an ES backup NHG there is nothing to be done in the
2845 * control plane
2846 */
2847 if (!(zmh_info->flags & ZEBRA_EVPN_MH_REDIRECT_OFF))
2848 return;
2849
2850 if (IS_ZEBRA_DEBUG_EVPN_MH_ES || IS_ZEBRA_DEBUG_EVPN_MH_MAC)
2851 zlog_debug("mac slow-fail on es %s %s ", es->esi_str,
2852 (es->flags & ZEBRA_EVPNES_OPER_UP) ? "up" : "down");
2853
2854 for (ALL_LIST_ELEMENTS_RO(es->mac_list, node, mac)) {
2855 if (!(mac->flags & ZEBRA_MAC_LOCAL)
2856 || !zebra_evpn_mac_is_static(mac))
2857 continue;
2858
2859 if (es->flags & ZEBRA_EVPNES_OPER_UP) {
2860 if (IS_ZEBRA_DEBUG_EVPN_MH_MAC)
2861 zlog_debug(
2862 "VNI %u mac %pEA move to acc %s es %s %s ",
2863 mac->zevpn->vni,
2864 &mac->macaddr,
2865 es->zif->ifp->name, es->esi_str,
2866 (es->flags & ZEBRA_EVPNES_OPER_UP)
2867 ? "up"
2868 : "down");
2869 /* switch the local macs to access port */
2870 if (zebra_evpn_sync_mac_dp_install(
2871 mac, false /*set_inactive*/,
2872 false /*force_clear_static*/, __func__)
2873 < 0)
2874 /* if the local mac install fails get rid of the
2875 * old rem entry
2876 */
2877 zebra_evpn_rem_mac_uninstall(mac->zevpn, mac,
2878 true /*force*/);
2879 } else {
2880 /* switch the local macs to network port. if there
2881 * is no active NHG we don't bother deleting the MAC;
2882 * that is left up to the dataplane to handle.
2883 */
2884 if (!(es->flags & ZEBRA_EVPNES_NHG_ACTIVE))
2885 continue;
2886 if (IS_ZEBRA_DEBUG_EVPN_MH_MAC)
2887 zlog_debug(
2888 "VNI %u mac %pEA move to nhg %u es %s %s ",
2889 mac->zevpn->vni,
2890 &mac->macaddr,
2891 es->nhg_id, es->esi_str,
2892 (es->flags & ZEBRA_EVPNES_OPER_UP)
2893 ? "up"
2894 : "down");
2895 zebra_evpn_rem_mac_install(mac->zevpn, mac,
2896 true /*was_static*/);
2897 }
2898 }
2899 }
2900
2901 void zebra_evpn_es_if_oper_state_change(struct zebra_if *zif, bool up)
2902 {
2903 struct zebra_evpn_es *es = zif->es_info.es;
2904 bool old_up = !!(es->flags & ZEBRA_EVPNES_OPER_UP);
2905
2906 if (old_up == up)
2907 return;
2908
2909 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
2910 zlog_debug("es %s state changed to %s ",
2911 es->esi_str,
2912 up ? "up" : "down");
2913 if (up)
2914 es->flags |= ZEBRA_EVPNES_OPER_UP;
2915 else
2916 es->flags &= ~ZEBRA_EVPNES_OPER_UP;
2917
2918 zebra_evpn_es_run_df_election(es, __func__);
2919 zebra_evpn_local_mac_oper_state_change(es);
2920
2921 /* inform BGP of the ES oper state change */
2922 if (es->flags & ZEBRA_EVPNES_READY_FOR_BGP)
2923 zebra_evpn_es_send_add_to_client(es);
2924 }
2925
2926 static char *zebra_evpn_es_vtep_str(char *vtep_str, struct zebra_evpn_es *es,
2927 uint8_t vtep_str_size)
2928 {
2929 struct zebra_evpn_es_vtep *zvtep;
2930 struct listnode *node;
2931 bool first = true;
2932 char ip_buf[INET6_ADDRSTRLEN];
2933
2934 vtep_str[0] = '\0';
2935 for (ALL_LIST_ELEMENTS_RO(es->es_vtep_list, node, zvtep)) {
2936 if (first) {
2937 first = false;
2938 strlcat(vtep_str,
2939 inet_ntop(AF_INET, &zvtep->vtep_ip, ip_buf,
2940 sizeof(ip_buf)),
2941 vtep_str_size);
2942 } else {
2943 strlcat(vtep_str, ",", vtep_str_size);
2944 strlcat(vtep_str,
2945 inet_ntop(AF_INET, &zvtep->vtep_ip, ip_buf,
2946 sizeof(ip_buf)),
2947 vtep_str_size);
2948 }
2949 }
2950 return vtep_str;
2951 }
2952
2953 static void zebra_evpn_es_json_vtep_fill(struct zebra_evpn_es *es,
2954 json_object *json_vteps)
2955 {
2956 struct zebra_evpn_es_vtep *es_vtep;
2957 struct listnode *node;
2958 json_object *json_vtep_entry;
2959 char alg_buf[EVPN_DF_ALG_STR_LEN];
2960
2961 for (ALL_LIST_ELEMENTS_RO(es->es_vtep_list, node, es_vtep)) {
2962 json_vtep_entry = json_object_new_object();
2963 json_object_string_addf(json_vtep_entry, "vtep", "%pI4",
2964 &es_vtep->vtep_ip);
2965 if (es_vtep->flags & ZEBRA_EVPNES_VTEP_RXED_ESR) {
2966 json_object_string_add(
2967 json_vtep_entry, "dfAlgorithm",
2968 evpn_es_df_alg2str(es_vtep->df_alg, alg_buf,
2969 sizeof(alg_buf)));
2970 json_object_int_add(json_vtep_entry, "dfPreference",
2971 es_vtep->df_pref);
2972 }
2973 if (es_vtep->nh)
2974 json_object_int_add(json_vtep_entry, "nexthopId",
2975 es_vtep->nh->nh_id);
2976 json_object_array_add(json_vteps, json_vtep_entry);
2977 }
2978 }
2979
2980 static void zebra_evpn_es_show_entry(struct vty *vty, struct zebra_evpn_es *es,
2981 json_object *json_array)
2982 {
2983 char type_str[5];
2984 char vtep_str[ES_VTEP_LIST_STR_SZ];
2985
2986 if (json_array) {
2987 json_object *json = NULL;
2988 json_object *json_vteps;
2989 json_object *json_flags;
2990
2991 json = json_object_new_object();
2992 json_object_string_add(json, "esi", es->esi_str);
2993
2994 if (es->flags
2995 & (ZEBRA_EVPNES_LOCAL | ZEBRA_EVPNES_REMOTE
2996 | ZEBRA_EVPNES_NON_DF)) {
2997 json_flags = json_object_new_array();
2998 if (es->flags & ZEBRA_EVPNES_LOCAL)
2999 json_array_string_add(json_flags, "local");
3000 if (es->flags & ZEBRA_EVPNES_REMOTE)
3001 json_array_string_add(json_flags, "remote");
3002 if (es->flags & ZEBRA_EVPNES_NON_DF)
3003 json_array_string_add(json_flags, "nonDF");
3004 if (es->flags & ZEBRA_EVPNES_BYPASS)
3005 json_array_string_add(json_flags, "bypass");
3006 json_object_object_add(json, "flags", json_flags);
3007 }
3008
3009 if (es->zif)
3010 json_object_string_add(json, "accessPort",
3011 es->zif->ifp->name);
3012
3013 if (listcount(es->es_vtep_list)) {
3014 json_vteps = json_object_new_array();
3015 zebra_evpn_es_json_vtep_fill(es, json_vteps);
3016 json_object_object_add(json, "vteps", json_vteps);
3017 }
3018 json_object_array_add(json_array, json);
3019 } else {
3020 type_str[0] = '\0';
3021 if (es->flags & ZEBRA_EVPNES_LOCAL)
3022 strlcat(type_str, "L", sizeof(type_str));
3023 if (es->flags & ZEBRA_EVPNES_REMOTE)
3024 strlcat(type_str, "R", sizeof(type_str));
3025 if (es->flags & ZEBRA_EVPNES_NON_DF)
3026 strlcat(type_str, "N", sizeof(type_str));
3027 if (es->flags & ZEBRA_EVPNES_BYPASS)
3028 strlcat(type_str, "B", sizeof(type_str));
3029
3030 zebra_evpn_es_vtep_str(vtep_str, es, sizeof(vtep_str));
3031
3032 vty_out(vty, "%-30s %-4s %-21s %s\n",
3033 es->esi_str, type_str,
3034 es->zif ? es->zif->ifp->name : "-",
3035 vtep_str);
3036 }
3037 }
3038
3039 static void zebra_evpn_es_show_entry_detail(struct vty *vty,
3040 struct zebra_evpn_es *es, json_object *json)
3041 {
3042 char type_str[80];
3043 char alg_buf[EVPN_DF_ALG_STR_LEN];
3044 struct zebra_evpn_es_vtep *es_vtep;
3045 struct listnode *node;
3046 char thread_buf[THREAD_TIMER_STRLEN];
3047
3048 if (json) {
3049 json_object *json_vteps;
3050 json_object *json_flags;
3051
3052 json_object_string_add(json, "esi", es->esi_str);
3053 if (es->zif)
3054 json_object_string_add(json, "accessPort",
3055 es->zif->ifp->name);
3056
3057
3058 if (es->flags) {
3059 json_flags = json_object_new_array();
3060 if (es->flags & ZEBRA_EVPNES_LOCAL)
3061 json_array_string_add(json_flags, "local");
3062 if (es->flags & ZEBRA_EVPNES_REMOTE)
3063 json_array_string_add(json_flags, "remote");
3064 if (es->flags & ZEBRA_EVPNES_NON_DF)
3065 json_array_string_add(json_flags, "nonDF");
3066 if (es->flags & ZEBRA_EVPNES_BYPASS)
3067 json_array_string_add(json_flags, "bypass");
3068 if (es->flags & ZEBRA_EVPNES_READY_FOR_BGP)
3069 json_array_string_add(json_flags,
3070 "readyForBgp");
3071 if (es->flags & ZEBRA_EVPNES_BR_PORT)
3072 json_array_string_add(json_flags, "bridgePort");
3073 if (es->flags & ZEBRA_EVPNES_OPER_UP)
3074 json_array_string_add(json_flags, "operUp");
3075 if (es->flags & ZEBRA_EVPNES_NHG_ACTIVE)
3076 json_array_string_add(json_flags,
3077 "nexthopGroupActive");
3078 json_object_object_add(json, "flags", json_flags);
3079 }
3080
3081 json_object_int_add(json, "vniCount",
3082 listcount(es->es_evi_list));
3083 json_object_int_add(json, "macCount", listcount(es->mac_list));
3084 json_object_int_add(json, "dfPreference", es->df_pref);
3085 if (es->df_delay_timer)
3086 json_object_string_add(
3087 json, "dfDelayTimer",
3088 thread_timer_to_hhmmss(thread_buf,
3089 sizeof(thread_buf),
3090 es->df_delay_timer));
3091 json_object_int_add(json, "nexthopGroup", es->nhg_id);
3092 if (listcount(es->es_vtep_list)) {
3093 json_vteps = json_object_new_array();
3094 zebra_evpn_es_json_vtep_fill(es, json_vteps);
3095 json_object_object_add(json, "vteps", json_vteps);
3096 }
3097 } else {
3098 type_str[0] = '\0';
3099 if (es->flags & ZEBRA_EVPNES_LOCAL)
3100 strlcat(type_str, "Local", sizeof(type_str));
3101 if (es->flags & ZEBRA_EVPNES_REMOTE) {
3102 if (strnlen(type_str, sizeof(type_str)))
3103 strlcat(type_str, ",", sizeof(type_str));
3104 strlcat(type_str, "Remote", sizeof(type_str));
3105 }
3106
3107 vty_out(vty, "ESI: %s\n", es->esi_str);
3108 vty_out(vty, " Type: %s\n", type_str);
3109 vty_out(vty, " Interface: %s\n",
3110 (es->zif) ?
3111 es->zif->ifp->name : "-");
3112 if (es->flags & ZEBRA_EVPNES_LOCAL) {
3113 vty_out(vty, " State: %s\n",
3114 (es->flags & ZEBRA_EVPNES_OPER_UP) ? "up"
3115 : "down");
3116 vty_out(vty, " Bridge port: %s\n",
3117 (es->flags & ZEBRA_EVPNES_BR_PORT) ? "yes"
3118 : "no");
3119 }
3120 vty_out(vty, " Ready for BGP: %s\n",
3121 (es->flags & ZEBRA_EVPNES_READY_FOR_BGP) ?
3122 "yes" : "no");
3123 if (es->flags & ZEBRA_EVPNES_BYPASS)
3124 vty_out(vty, " LACP bypass: on\n");
3125 vty_out(vty, " VNI Count: %d\n", listcount(es->es_evi_list));
3126 vty_out(vty, " MAC Count: %d\n", listcount(es->mac_list));
3127 if (es->flags & ZEBRA_EVPNES_LOCAL)
3128 vty_out(vty, " DF status: %s \n",
3129 (es->flags & ZEBRA_EVPNES_NON_DF) ? "non-df"
3130 : "df");
3131 if (es->df_delay_timer)
3132 vty_out(vty, " DF delay: %s\n",
3133 thread_timer_to_hhmmss(thread_buf,
3134 sizeof(thread_buf),
3135 es->df_delay_timer));
3136 vty_out(vty, " DF preference: %u\n", es->df_pref);
3137 vty_out(vty, " Nexthop group: %u\n", es->nhg_id);
3138 vty_out(vty, " VTEPs:\n");
3139 for (ALL_LIST_ELEMENTS_RO(es->es_vtep_list, node, es_vtep)) {
3140 vty_out(vty, " %pI4",
3141 &es_vtep->vtep_ip);
3142 if (es_vtep->flags & ZEBRA_EVPNES_VTEP_RXED_ESR)
3143 vty_out(vty, " df_alg: %s df_pref: %d",
3144 evpn_es_df_alg2str(es_vtep->df_alg,
3145 alg_buf,
3146 sizeof(alg_buf)),
3147 es_vtep->df_pref);
3148 vty_out(vty, " nh: %u\n",
3149 es_vtep->nh ? es_vtep->nh->nh_id : 0);
3150 }
3151
3152 vty_out(vty, "\n");
3153 }
3154 }
3155
3156 void zebra_evpn_es_show(struct vty *vty, bool uj)
3157 {
3158 struct zebra_evpn_es *es;
3159 json_object *json_array = NULL;
3160
3161 if (uj) {
3162 json_array = json_object_new_array();
3163 } else {
3164 vty_out(vty, "Type: B bypass, L local, R remote, N non-DF\n");
3165 vty_out(vty, "%-30s %-4s %-21s %s\n",
3166 "ESI", "Type", "ES-IF", "VTEPs");
3167 }
3168
3169 RB_FOREACH(es, zebra_es_rb_head, &zmh_info->es_rb_tree)
3170 zebra_evpn_es_show_entry(vty, es, json_array);
3171
3172 if (uj)
3173 vty_json(vty, json_array);
3174 }
3175
3176 void zebra_evpn_es_show_detail(struct vty *vty, bool uj)
3177 {
3178 struct zebra_evpn_es *es;
3179 json_object *json_array = NULL;
3180
3181 if (uj)
3182 json_array = json_object_new_array();
3183
3184 RB_FOREACH (es, zebra_es_rb_head, &zmh_info->es_rb_tree) {
3185 json_object *json = NULL;
3186
3187 if (uj)
3188 json = json_object_new_object();
3189 zebra_evpn_es_show_entry_detail(vty, es, json);
3190 if (uj)
3191 json_object_array_add(json_array, json);
3192 }
3193
3194 if (uj)
3195 vty_json(vty, json_array);
3196 }
3197
3198 void zebra_evpn_es_show_esi(struct vty *vty, bool uj, esi_t *esi)
3199 {
3200 struct zebra_evpn_es *es;
3201 char esi_str[ESI_STR_LEN];
3202 json_object *json = NULL;
3203
3204 if (uj)
3205 json = json_object_new_object();
3206
3207 es = zebra_evpn_es_find(esi);
3208
3209 if (es) {
3210 zebra_evpn_es_show_entry_detail(vty, es, json);
3211 } else {
3212 if (!uj) {
3213 esi_to_str(esi, esi_str, sizeof(esi_str));
3214 vty_out(vty, "ESI %s does not exist\n", esi_str);
3215 }
3216 }
3217
3218 if (uj)
3219 vty_json(vty, json);
3220 }
3221
3222 int zebra_evpn_mh_if_write(struct vty *vty, struct interface *ifp)
3223 {
3224 struct zebra_if *zif = ifp->info;
3225 char buf[ETHER_ADDR_STRLEN];
3226 bool type_3_esi = false;
3227 char esi_buf[ESI_STR_LEN];
3228
3229 if (zif->es_info.lid) {
3230 vty_out(vty, " evpn mh es-id %u\n", zif->es_info.lid);
3231 type_3_esi = true;
3232 }
3233
3234 if (!is_zero_mac(&zif->es_info.sysmac)) {
3235 vty_out(vty, " evpn mh es-sys-mac %s\n",
3236 prefix_mac2str(&zif->es_info.sysmac,
3237 buf, sizeof(buf)));
3238 type_3_esi = true;
3239 }
3240
3241 if (!type_3_esi
3242 && memcmp(&zif->es_info.esi, zero_esi, sizeof(*zero_esi)))
3243 vty_out(vty, " evpn mh es-id %s\n",
3244 esi_to_str(&zif->es_info.esi, esi_buf, sizeof(esi_buf)));
3245
3246 if (zif->es_info.df_pref)
3247 vty_out(vty, " evpn mh es-df-pref %u\n", zif->es_info.df_pref);
3248
3249 if (zif->flags & ZIF_FLAG_EVPN_MH_UPLINK)
3250 vty_out(vty, " evpn mh uplink\n");
3251
3252 return 0;
3253 }
3254
3255 #ifndef VTYSH_EXTRACT_PL
3256 #include "zebra/zebra_evpn_mh_clippy.c"
3257 #endif
3258 /* CLI for setting an ES in bypass mode */
3259 DEFPY_HIDDEN(zebra_evpn_es_bypass, zebra_evpn_es_bypass_cmd,
3260 "[no] evpn mh bypass",
3261 NO_STR "EVPN\n" EVPN_MH_VTY_STR "set bypass mode\n")
3262 {
3263 VTY_DECLVAR_CONTEXT(interface, ifp);
3264 struct zebra_if *zif;
3265
3266 zif = ifp->info;
3267
3268 if (no) {
3269 zebra_evpn_es_bypass_cfg_update(zif, false);
3270 } else {
3271 if (!zebra_evpn_is_if_es_capable(zif)) {
3272 vty_out(vty,
3273 "%% DF bypass cannot be associated with this interface type\n");
3274 return CMD_WARNING;
3275 }
3276 zebra_evpn_es_bypass_cfg_update(zif, true);
3277 }
3278 return CMD_SUCCESS;
3279 }
3280
3281 /* CLI for configuring DF preference part for an ES */
3282 DEFPY(zebra_evpn_es_pref, zebra_evpn_es_pref_cmd,
3283 "[no$no] evpn mh es-df-pref [(1-65535)$df_pref]",
3284 NO_STR "EVPN\n" EVPN_MH_VTY_STR
3285 "preference value used for DF election\n"
3286 "pref\n")
3287 {
3288 VTY_DECLVAR_CONTEXT(interface, ifp);
3289 struct zebra_if *zif;
3290
3291 zif = ifp->info;
3292
3293 if (no) {
3294 zebra_evpn_es_df_pref_update(zif, 0);
3295 } else {
3296 if (!zebra_evpn_is_if_es_capable(zif)) {
3297 vty_out(vty,
3298 "%% DF preference cannot be associated with this interface type\n");
3299 return CMD_WARNING;
3300 }
3301 zebra_evpn_es_df_pref_update(zif, df_pref);
3302 }
3303 return CMD_SUCCESS;
3304 }
3305
3306 /* CLI for setting up sysmac part of ESI on an access port */
3307 DEFPY(zebra_evpn_es_sys_mac,
3308 zebra_evpn_es_sys_mac_cmd,
3309 "[no$no] evpn mh es-sys-mac [X:X:X:X:X:X$mac]",
3310 NO_STR
3311 "EVPN\n"
3312 EVPN_MH_VTY_STR
3313 "Ethernet segment system MAC\n"
3314 MAC_STR
3315 )
3316 {
3317 VTY_DECLVAR_CONTEXT(interface, ifp);
3318 struct zebra_if *zif;
3319 int ret = 0;
3320
3321 zif = ifp->info;
3322
3323 if (no) {
3324 static struct ethaddr zero_mac;
3325
3326 ret = zebra_evpn_es_sys_mac_update(zif, &zero_mac);
3327 if (ret == -1) {
3328 vty_out(vty, "%% Failed to clear ES sysmac\n");
3329 return CMD_WARNING;
3330 }
3331 } else {
3332
3333 if (!zebra_evpn_is_if_es_capable(zif)) {
3334 vty_out(vty,
3335 "%% ESI cannot be associated with this interface type\n");
3336 return CMD_WARNING;
3337 }
3338
3339 if (!mac || is_zero_mac(&mac->eth_addr)) {
3340 vty_out(vty, "%% ES sysmac value is invalid\n");
3341 return CMD_WARNING;
3342 }
3343
3344 ret = zebra_evpn_es_sys_mac_update(zif, &mac->eth_addr);
3345 if (ret == -1) {
3346 vty_out(vty,
3347 "%% ESI already exists on a different interface\n");
3348 return CMD_WARNING;
3349 }
3350 }
3351 return CMD_SUCCESS;
3352 }
3353
3354 /* CLI for setting up local-ID part of ESI on an access port */
3355 DEFPY(zebra_evpn_es_id,
3356 zebra_evpn_es_id_cmd,
3357 "[no$no] evpn mh es-id [(1-16777215)$es_lid | NAME$esi_str]",
3358 NO_STR
3359 "EVPN\n"
3360 EVPN_MH_VTY_STR
3361 "Ethernet segment identifier\n"
3362 "local discriminator\n"
3363 "10-byte ID - 00:AA:BB:CC:DD:EE:FF:GG:HH:II\n"
3364 )
3365 {
3366 VTY_DECLVAR_CONTEXT(interface, ifp);
3367 struct zebra_if *zif;
3368 int ret = 0;
3369 esi_t esi;
3370
3371 zif = ifp->info;
3372
3373 if (no) {
3374 if (zif->es_info.lid)
3375 ret = zebra_evpn_es_lid_update(zif, 0);
3376 else if (memcmp(&zif->es_info.esi, zero_esi, sizeof(*zero_esi)))
3377 ret = zebra_evpn_es_type0_esi_update(zif, zero_esi);
3378
3379 if (ret == -1) {
3380 vty_out(vty,
3381 "%% Failed to clear ES local id or ESI name\n");
3382 return CMD_WARNING;
3383 }
3384 } else {
3385 if (!zebra_evpn_is_if_es_capable(zif)) {
3386 vty_out(vty,
3387 "%% ESI cannot be associated with this interface type\n");
3388 return CMD_WARNING;
3389 }
3390
3391 if (esi_str) {
3392 if (!str_to_esi(esi_str, &esi)) {
3393 vty_out(vty, "%% Malformed ESI name\n");
3394 return CMD_WARNING;
3395 }
3396 ret = zebra_evpn_es_type0_esi_update(zif, &esi);
3397 } else {
3398 if (!es_lid) {
3399 vty_out(vty,
3400 "%% Specify ES local id or ESI name\n");
3401 return CMD_WARNING;
3402 }
3403 ret = zebra_evpn_es_lid_update(zif, es_lid);
3404 }
3405
3406 if (ret == -1) {
3407 vty_out(vty,
3408 "%% ESI already exists on a different interface\n");
3409 return CMD_WARNING;
3410 }
3411 }
3412 return CMD_SUCCESS;
3413 }
3414
3415 /* CLI for tagging an interface as an uplink */
3416 DEFPY(zebra_evpn_mh_uplink, zebra_evpn_mh_uplink_cmd, "[no] evpn mh uplink",
3417 NO_STR "EVPN\n" EVPN_MH_VTY_STR "uplink to the VxLAN core\n")
3418 {
3419 VTY_DECLVAR_CONTEXT(interface, ifp);
3420 struct zebra_if *zif;
3421
3422 zif = ifp->info;
3423 zebra_evpn_mh_uplink_cfg_update(zif, no ? false : true);
3424
3425 return CMD_SUCCESS;
3426 }
3427
3428 void zebra_evpn_mh_json(json_object *json)
3429 {
3430 json_object *json_array;
3431 char thread_buf[THREAD_TIMER_STRLEN];
3432
3433 json_object_int_add(json, "macHoldtime", zmh_info->mac_hold_time);
3434 json_object_int_add(json, "neighHoldtime", zmh_info->neigh_hold_time);
3435 json_object_int_add(json, "startupDelay", zmh_info->startup_delay_time);
3436 json_object_string_add(
3437 json, "startupDelayTimer",
3438 thread_timer_to_hhmmss(thread_buf, sizeof(thread_buf),
3439 zmh_info->startup_delay_timer));
3440 json_object_int_add(json, "uplinkConfigCount",
3441 zmh_info->uplink_cfg_cnt);
3442 json_object_int_add(json, "uplinkActiveCount",
3443 zmh_info->uplink_oper_up_cnt);
3444
3445 if (zmh_info->protodown_rc) {
3446 json_array = json_object_new_array();
3447 if (CHECK_FLAG(zmh_info->protodown_rc,
3448 ZEBRA_PROTODOWN_EVPN_STARTUP_DELAY))
3449 json_object_array_add(
3450 json_array,
3451 json_object_new_string("startupDelay"));
3452 if (CHECK_FLAG(zmh_info->protodown_rc,
3453 ZEBRA_PROTODOWN_EVPN_UPLINK_DOWN))
3454 json_object_array_add(
3455 json_array,
3456 json_object_new_string("uplinkDown"));
3457 json_object_object_add(json, "protodownReasons", json_array);
3458 }
3459 }
3460
3461 void zebra_evpn_mh_print(struct vty *vty)
3462 {
3463 char pd_buf[ZEBRA_PROTODOWN_RC_STR_LEN];
3464 char thread_buf[THREAD_TIMER_STRLEN];
3465
3466 vty_out(vty, "EVPN MH:\n");
3467 vty_out(vty, " mac-holdtime: %ds, neigh-holdtime: %ds\n",
3468 zmh_info->mac_hold_time, zmh_info->neigh_hold_time);
3469 vty_out(vty, " startup-delay: %ds, start-delay-timer: %s\n",
3470 zmh_info->startup_delay_time,
3471 thread_timer_to_hhmmss(thread_buf, sizeof(thread_buf),
3472 zmh_info->startup_delay_timer));
3473 vty_out(vty, " uplink-cfg-cnt: %u, uplink-active-cnt: %u\n",
3474 zmh_info->uplink_cfg_cnt, zmh_info->uplink_oper_up_cnt);
3475 if (zmh_info->protodown_rc)
3476 vty_out(vty, " protodown reasons: %s\n",
3477 zebra_protodown_rc_str(zmh_info->protodown_rc, pd_buf,
3478 sizeof(pd_buf)));
3479 }
3480
3481 /*****************************************************************************/
3482 /* A base L2-VNI is maintained to derive parameters such as ES originator-IP.
3483 * XXX: once single vxlan device model becomes available this will not be
3484 * necessary
3485 */
3486 /* called when a new vni is added or becomes oper up or becomes a bridge port */
3487 void zebra_evpn_es_set_base_evpn(struct zebra_evpn *zevpn)
3488 {
3489 struct listnode *node;
3490 struct zebra_evpn_es *es;
3491
3492 if (zmh_info->es_base_evpn) {
3493 if (zmh_info->es_base_evpn != zevpn) {
3494 /* unrelated EVPN; ignore it */
3495 return;
3496 }
3497 /* check if the local vtep-ip has changed */
3498 } else {
3499 /* check if the EVPN can be used as base EVPN */
3500 if (!zebra_evpn_send_to_client_ok(zevpn))
3501 return;
3502
3503 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
3504 zlog_debug("es base vni set to %d",
3505 zevpn->vni);
3506 zmh_info->es_base_evpn = zevpn;
3507 }
3508
3509 /* update local VTEP-IP */
3510 if (zmh_info->es_originator_ip.s_addr ==
3511 zmh_info->es_base_evpn->local_vtep_ip.s_addr)
3512 return;
3513
3514 zmh_info->es_originator_ip.s_addr =
3515 zmh_info->es_base_evpn->local_vtep_ip.s_addr;
3516
3517 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
3518 zlog_debug("es originator ip set to %pI4",
3519 &zmh_info->es_base_evpn->local_vtep_ip);
3520
3521 /* if originator ip changes we need to update bgp */
3522 for (ALL_LIST_ELEMENTS_RO(zmh_info->local_es_list, node, es)) {
3523 zebra_evpn_es_run_df_election(es, __func__);
3524
3525 if (es->flags & ZEBRA_EVPNES_READY_FOR_BGP)
3526 zebra_evpn_es_send_add_to_client(es);
3527 else
3528 zebra_evpn_es_re_eval_send_to_client(es,
3529 true /* es_evi_re_reval */);
3530 }
3531 }
3532
3533 /* called when a vni is removed or becomes oper down or is removed from a
3534 * bridge
3535 */
3536 void zebra_evpn_es_clear_base_evpn(struct zebra_evpn *zevpn)
3537 {
3538 struct listnode *node;
3539 struct zebra_evpn_es *es;
3540
3541 if (zmh_info->es_base_evpn != zevpn)
3542 return;
3543
3544 zmh_info->es_base_evpn = NULL;
3545 /* lost current base EVPN; try to find a new one */
3546 zebra_evpn_es_get_one_base_evpn();
3547
3548 /* couldn't locate an eligible base evpn */
3549 if (!zmh_info->es_base_evpn && zmh_info->es_originator_ip.s_addr) {
3550 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
3551 zlog_debug("es originator ip cleared");
3552
3553 zmh_info->es_originator_ip.s_addr = 0;
3554 /* lost originator ip */
3555 for (ALL_LIST_ELEMENTS_RO(zmh_info->local_es_list, node, es)) {
3556 zebra_evpn_es_re_eval_send_to_client(es,
3557 true /* es_evi_re_reval */);
3558 }
3559 }
3560 }
3561
3562 /* Locate an "eligible" L2-VNI to follow */
3563 static int zebra_evpn_es_get_one_base_evpn_cb(struct hash_bucket *b, void *data)
3564 {
3565 struct zebra_evpn *zevpn = b->data;
3566
3567 zebra_evpn_es_set_base_evpn(zevpn);
3568
3569 if (zmh_info->es_base_evpn)
3570 return HASHWALK_ABORT;
3571
3572 return HASHWALK_CONTINUE;
3573 }
3574
3575 /* locate a base_evpn to follow for the purposes of common params like
3576 * originator IP
3577 */
3578 static void zebra_evpn_es_get_one_base_evpn(void)
3579 {
3580 struct zebra_vrf *zvrf;
3581
3582 zvrf = zebra_vrf_get_evpn();
3583 hash_walk(zvrf->evpn_table, zebra_evpn_es_get_one_base_evpn_cb, NULL);
3584 }
3585
3586 /*****************************************************************************
3587 * local ethernet segments can be error-disabled if the switch is not
3588 * ready to start transmitting traffic via the VxLAN overlay
3589 */
3590 bool zebra_evpn_is_es_bond(struct interface *ifp)
3591 {
3592 struct zebra_if *zif = ifp->info;
3593
3594 return !!(struct zebra_if *)zif->es_info.es;
3595 }
3596
3597 bool zebra_evpn_is_es_bond_member(struct interface *ifp)
3598 {
3599 struct zebra_if *zif = ifp->info;
3600
3601 return IS_ZEBRA_IF_BOND_SLAVE(zif->ifp) && zif->bondslave_info.bond_if
3602 && ((struct zebra_if *)zif->bondslave_info.bond_if->info)
3603 ->es_info.es;
3604 }
3605
3606 void zebra_evpn_mh_update_protodown_bond_mbr(struct zebra_if *zif, bool clear,
3607 const char *caller)
3608 {
3609 bool new_protodown;
3610 uint32_t old_protodown_rc = 0;
3611 uint32_t new_protodown_rc = 0;
3612 uint32_t protodown_rc = 0;
3613
3614 if (!clear) {
3615 struct zebra_if *bond_zif;
3616
3617 bond_zif = zif->bondslave_info.bond_if->info;
3618 protodown_rc = bond_zif->protodown_rc;
3619 }
3620
3621 old_protodown_rc = zif->protodown_rc;
3622 new_protodown_rc = (old_protodown_rc & ~ZEBRA_PROTODOWN_EVPN_ALL);
3623 new_protodown_rc |= (protodown_rc & ZEBRA_PROTODOWN_EVPN_ALL);
3624 new_protodown = !!new_protodown_rc;
3625
3626 if (IS_ZEBRA_DEBUG_EVPN_MH_ES && (new_protodown_rc != old_protodown_rc))
3627 zlog_debug(
3628 "%s bond mbr %s protodown_rc changed; old 0x%x new 0x%x",
3629 caller, zif->ifp->name, old_protodown_rc,
3630 new_protodown_rc);
3631
3632 if (zebra_if_update_protodown_rc(zif->ifp, new_protodown,
3633 new_protodown_rc) == 0) {
3634 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
3635 zlog_debug("%s protodown %s", zif->ifp->name,
3636 new_protodown ? "on" : "off");
3637 }
3638 }
3639
3640 /* The bond members inherit the protodown reason code from the bond */
3641 static void zebra_evpn_mh_update_protodown_bond(struct zebra_if *bond_zif)
3642 {
3643 struct zebra_if *zif;
3644 struct listnode *node;
3645
3646 if (!bond_zif->bond_info.mbr_zifs)
3647 return;
3648
3649 for (ALL_LIST_ELEMENTS_RO(bond_zif->bond_info.mbr_zifs, node, zif)) {
3650 zebra_evpn_mh_update_protodown_bond_mbr(zif, false /*clear*/,
3651 __func__);
3652 }
3653 }
3654
3655 /* The global EVPN MH protodown rc is applied to all local ESs */
3656 static void zebra_evpn_mh_update_protodown_es(struct zebra_evpn_es *es,
3657 bool resync_dplane)
3658 {
3659 struct zebra_if *zif;
3660 uint32_t old_protodown_rc;
3661
3662 zif = es->zif;
3663 /* if the reason code is the same bail unless it is a new
3664 * ES bond in that case we would need to ensure that the
3665 * dplane is really in sync with zebra
3666 */
3667 if (!resync_dplane
3668 && (zif->protodown_rc & ZEBRA_PROTODOWN_EVPN_ALL)
3669 == (zmh_info->protodown_rc & ZEBRA_PROTODOWN_EVPN_ALL))
3670 return;
3671
3672 old_protodown_rc = zif->protodown_rc;
3673 zif->protodown_rc &= ~ZEBRA_PROTODOWN_EVPN_ALL;
3674 zif->protodown_rc |=
3675 (zmh_info->protodown_rc & ZEBRA_PROTODOWN_EVPN_ALL);
3676
3677 if (IS_ZEBRA_DEBUG_EVPN_MH_ES
3678 && (old_protodown_rc != zif->protodown_rc))
3679 zlog_debug(
3680 "es %s ifp %s protodown_rc changed; old 0x%x new 0x%x",
3681 es->esi_str, zif->ifp->name, old_protodown_rc,
3682 zif->protodown_rc);
3683
3684 /* update dataplane with the new protodown setting */
3685 zebra_evpn_mh_update_protodown_bond(zif);
3686 }
3687
3688 static void zebra_evpn_mh_clear_protodown_es(struct zebra_evpn_es *es)
3689 {
3690 struct zebra_if *zif;
3691 uint32_t old_protodown_rc;
3692
3693 zif = es->zif;
3694 if (!(zif->protodown_rc & ZEBRA_PROTODOWN_EVPN_ALL))
3695 return;
3696
3697 old_protodown_rc = zif->protodown_rc;
3698 zif->protodown_rc &= ~ZEBRA_PROTODOWN_EVPN_ALL;
3699
3700 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
3701 zlog_debug(
3702 "clear: es %s ifp %s protodown_rc cleared; old 0x%x new 0x%x",
3703 es->esi_str, zif->ifp->name, old_protodown_rc,
3704 zif->protodown_rc);
3705
3706 /* update dataplane with the new protodown setting */
3707 zebra_evpn_mh_update_protodown_bond(zif);
3708 }
3709
3710 static void zebra_evpn_mh_update_protodown_es_all(void)
3711 {
3712 struct listnode *node;
3713 struct zebra_evpn_es *es;
3714
3715 for (ALL_LIST_ELEMENTS_RO(zmh_info->local_es_list, node, es))
3716 zebra_evpn_mh_update_protodown_es(es, false /*resync_dplane*/);
3717 }
3718
3719 static void zebra_evpn_mh_update_protodown(uint32_t protodown_rc, bool set)
3720 {
3721 uint32_t old_protodown_rc = zmh_info->protodown_rc;
3722
3723 if (set) {
3724 if ((protodown_rc & zmh_info->protodown_rc) == protodown_rc)
3725 return;
3726
3727 zmh_info->protodown_rc |= protodown_rc;
3728 } else {
3729 if (!(protodown_rc & zmh_info->protodown_rc))
3730 return;
3731 zmh_info->protodown_rc &= ~protodown_rc;
3732 }
3733
3734 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
3735 zlog_debug("mh protodown_rc changed; old 0x%x new 0x%x",
3736 old_protodown_rc, zmh_info->protodown_rc);
3737 zebra_evpn_mh_update_protodown_es_all();
3738 }
3739
3740 static inline bool zebra_evpn_mh_is_all_uplinks_down(void)
3741 {
3742 return zmh_info->uplink_cfg_cnt && !zmh_info->uplink_oper_up_cnt;
3743 }
3744
3745 static void zebra_evpn_mh_uplink_oper_flags_update(struct zebra_if *zif,
3746 bool set)
3747 {
3748 if (set && if_is_operative(zif->ifp)) {
3749 if (!(zif->flags & ZIF_FLAG_EVPN_MH_UPLINK_OPER_UP)) {
3750 zif->flags |= ZIF_FLAG_EVPN_MH_UPLINK_OPER_UP;
3751 ++zmh_info->uplink_oper_up_cnt;
3752 }
3753 } else {
3754 if (zif->flags & ZIF_FLAG_EVPN_MH_UPLINK_OPER_UP) {
3755 zif->flags &= ~ZIF_FLAG_EVPN_MH_UPLINK_OPER_UP;
3756 if (zmh_info->uplink_oper_up_cnt)
3757 --zmh_info->uplink_oper_up_cnt;
3758 }
3759 }
3760 }
3761
3762 static void zebra_evpn_mh_uplink_cfg_update(struct zebra_if *zif, bool set)
3763 {
3764 bool old_protodown = zebra_evpn_mh_is_all_uplinks_down();
3765 bool new_protodown;
3766
3767 if (set) {
3768 if (zif->flags & ZIF_FLAG_EVPN_MH_UPLINK)
3769 return;
3770
3771 zif->flags |= ZIF_FLAG_EVPN_MH_UPLINK;
3772 ++zmh_info->uplink_cfg_cnt;
3773 } else {
3774 if (!(zif->flags & ZIF_FLAG_EVPN_MH_UPLINK))
3775 return;
3776
3777 zif->flags &= ~ZIF_FLAG_EVPN_MH_UPLINK;
3778 if (zmh_info->uplink_cfg_cnt)
3779 --zmh_info->uplink_cfg_cnt;
3780 }
3781
3782 zebra_evpn_mh_uplink_oper_flags_update(zif, set);
3783 new_protodown = zebra_evpn_mh_is_all_uplinks_down();
3784 if (old_protodown == new_protodown)
3785 return;
3786
3787 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
3788 zlog_debug(
3789 "mh-uplink-cfg-chg on if %s/%d %s uplinks cfg %u up %u",
3790 zif->ifp->name, zif->ifp->ifindex, set ? "set" : "down",
3791 zmh_info->uplink_cfg_cnt, zmh_info->uplink_oper_up_cnt);
3792
3793 zebra_evpn_mh_update_protodown(ZEBRA_PROTODOWN_EVPN_UPLINK_DOWN,
3794 new_protodown);
3795 }
3796
3797 void zebra_evpn_mh_uplink_oper_update(struct zebra_if *zif)
3798 {
3799 bool old_protodown = zebra_evpn_mh_is_all_uplinks_down();
3800 bool new_protodown;
3801
3802 zebra_evpn_mh_uplink_oper_flags_update(zif, true /*set*/);
3803
3804 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
3805 zlog_debug(
3806 "mh-uplink-oper-chg on if %s/%d %s; uplinks cfg %u up %u",
3807 zif->ifp->name, zif->ifp->ifindex,
3808 if_is_operative(zif->ifp) ? "up" : "down",
3809 zmh_info->uplink_cfg_cnt, zmh_info->uplink_oper_up_cnt);
3810
3811 new_protodown = zebra_evpn_mh_is_all_uplinks_down();
3812 if (old_protodown == new_protodown)
3813 return;
3814
3815 /* if protodown_rc XXX_UPLINK_DOWN is about to be cleared
3816 * fire up the start-up delay timer to allow the EVPN network
3817 * to converge (Type-2 routes need to be advertised and processed)
3818 */
3819 if (!new_protodown && (zmh_info->uplink_oper_up_cnt == 1))
3820 zebra_evpn_mh_startup_delay_timer_start("uplink-up");
3821
3822 zebra_evpn_mh_update_protodown(ZEBRA_PROTODOWN_EVPN_UPLINK_DOWN,
3823 new_protodown);
3824 }
3825
3826 static void zebra_evpn_mh_startup_delay_exp_cb(struct thread *t)
3827 {
3828 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
3829 zlog_debug("startup-delay expired");
3830
3831 zebra_evpn_mh_update_protodown(ZEBRA_PROTODOWN_EVPN_STARTUP_DELAY,
3832 false /* set */);
3833 }
3834
3835 static void zebra_evpn_mh_startup_delay_timer_start(const char *rc)
3836 {
3837 if (zmh_info->startup_delay_timer) {
3838 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
3839 zlog_debug("startup-delay timer cancelled");
3840 THREAD_OFF(zmh_info->startup_delay_timer);
3841 }
3842
3843 if (zmh_info->startup_delay_time) {
3844 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
3845 zlog_debug(
3846 "startup-delay timer started for %d sec on %s",
3847 zmh_info->startup_delay_time, rc);
3848 thread_add_timer(zrouter.master,
3849 zebra_evpn_mh_startup_delay_exp_cb, NULL,
3850 zmh_info->startup_delay_time,
3851 &zmh_info->startup_delay_timer);
3852 zebra_evpn_mh_update_protodown(
3853 ZEBRA_PROTODOWN_EVPN_STARTUP_DELAY, true /* set */);
3854 } else {
3855 zebra_evpn_mh_update_protodown(
3856 ZEBRA_PROTODOWN_EVPN_STARTUP_DELAY, false /* set */);
3857 }
3858 }
3859
3860 /*****************************************************************************
3861 * Nexthop management: nexthops associated with Type-2 routes that have
3862 * an ES as destination are consolidated by BGP into a per-VRF nh->rmac
3863 * mapping which is the installed as a remote neigh/fdb entry with a
3864 * dummy (type-1) prefix referencing it.
3865 * This handling is needed because Type-2 routes with ES as dest use NHG
3866 * that are setup using EAD routes (i.e. such NHGs do not include the
3867 * RMAC info).
3868 ****************************************************************************/
3869 void zebra_evpn_proc_remote_nh(ZAPI_HANDLER_ARGS)
3870 {
3871 struct stream *s;
3872 vrf_id_t vrf_id;
3873 struct ipaddr nh;
3874 struct ethaddr rmac;
3875 struct prefix_evpn dummy_prefix;
3876 size_t min_len = 4 + sizeof(nh);
3877
3878 s = msg;
3879
3880 /*
3881 * Ensure that the stream sent to us is long enough
3882 */
3883 if (hdr->command == ZEBRA_EVPN_REMOTE_NH_ADD)
3884 min_len += sizeof(rmac);
3885 if (hdr->length < min_len)
3886 return;
3887
3888 vrf_id = stream_getl(s);
3889 stream_get(&nh, s, sizeof(nh));
3890
3891 memset(&dummy_prefix, 0, sizeof(dummy_prefix));
3892 dummy_prefix.family = AF_EVPN;
3893 dummy_prefix.prefixlen = (sizeof(struct evpn_addr) * 8);
3894 dummy_prefix.prefix.route_type = 1; /* XXX - fixup to type-1 def */
3895 dummy_prefix.prefix.ead_addr.ip.ipa_type = nh.ipa_type;
3896
3897 if (hdr->command == ZEBRA_EVPN_REMOTE_NH_ADD) {
3898 stream_get(&rmac, s, sizeof(rmac));
3899 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
3900 zlog_debug(
3901 "evpn remote nh %d %pIA rmac %pEA add pfx %pFX",
3902 vrf_id, &nh, &rmac, &dummy_prefix);
3903 zebra_rib_queue_evpn_route_add(vrf_id, &rmac, &nh,
3904 (struct prefix *)&dummy_prefix);
3905 } else {
3906 if (IS_ZEBRA_DEBUG_EVPN_MH_ES)
3907 zlog_debug("evpn remote nh %d %pIA del pfx %pFX",
3908 vrf_id, &nh, &dummy_prefix);
3909 zebra_rib_queue_evpn_route_del(vrf_id, &nh,
3910 (struct prefix *)&dummy_prefix);
3911 }
3912 }
3913
3914 /*****************************************************************************/
3915 void zebra_evpn_mh_config_write(struct vty *vty)
3916 {
3917 if (zmh_info->mac_hold_time != ZEBRA_EVPN_MH_MAC_HOLD_TIME_DEF)
3918 vty_out(vty, "evpn mh mac-holdtime %d\n",
3919 zmh_info->mac_hold_time);
3920
3921 if (zmh_info->neigh_hold_time != ZEBRA_EVPN_MH_NEIGH_HOLD_TIME_DEF)
3922 vty_out(vty, "evpn mh neigh-holdtime %d\n",
3923 zmh_info->neigh_hold_time);
3924
3925 if (zmh_info->startup_delay_time != ZEBRA_EVPN_MH_STARTUP_DELAY_DEF)
3926 vty_out(vty, "evpn mh startup-delay %d\n",
3927 zmh_info->startup_delay_time);
3928
3929 if (zmh_info->flags & ZEBRA_EVPN_MH_REDIRECT_OFF)
3930 vty_out(vty, "evpn mh redirect-off\n");
3931 }
3932
3933 int zebra_evpn_mh_neigh_holdtime_update(struct vty *vty,
3934 uint32_t duration, bool set_default)
3935 {
3936 if (set_default)
3937 duration = ZEBRA_EVPN_MH_NEIGH_HOLD_TIME_DEF;
3938
3939 zmh_info->neigh_hold_time = duration;
3940
3941 return 0;
3942 }
3943
3944 int zebra_evpn_mh_mac_holdtime_update(struct vty *vty,
3945 uint32_t duration, bool set_default)
3946 {
3947 if (set_default)
3948 duration = ZEBRA_EVPN_MH_MAC_HOLD_TIME_DEF;
3949
3950 zmh_info->mac_hold_time = duration;
3951
3952 return 0;
3953 }
3954
3955 int zebra_evpn_mh_startup_delay_update(struct vty *vty, uint32_t duration,
3956 bool set_default)
3957 {
3958 if (set_default)
3959 duration = ZEBRA_EVPN_MH_STARTUP_DELAY_DEF;
3960
3961 zmh_info->startup_delay_time = duration;
3962
3963 /* if startup_delay_timer is running allow it to be adjusted
3964 * up or down
3965 */
3966 if (zmh_info->startup_delay_timer)
3967 zebra_evpn_mh_startup_delay_timer_start("config");
3968
3969 return 0;
3970 }
3971
3972 int zebra_evpn_mh_redirect_off(struct vty *vty, bool redirect_off)
3973 {
3974 /* This knob needs to be set before ESs are configured
3975 * i.e. cannot be changed on the fly
3976 */
3977 if (redirect_off)
3978 zmh_info->flags |= ZEBRA_EVPN_MH_REDIRECT_OFF;
3979 else
3980 zmh_info->flags &= ~ZEBRA_EVPN_MH_REDIRECT_OFF;
3981
3982 return 0;
3983 }
3984
3985 void zebra_evpn_interface_init(void)
3986 {
3987 install_element(INTERFACE_NODE, &zebra_evpn_es_id_cmd);
3988 install_element(INTERFACE_NODE, &zebra_evpn_es_sys_mac_cmd);
3989 install_element(INTERFACE_NODE, &zebra_evpn_es_pref_cmd);
3990 install_element(INTERFACE_NODE, &zebra_evpn_es_bypass_cmd);
3991 install_element(INTERFACE_NODE, &zebra_evpn_mh_uplink_cmd);
3992 }
3993
3994 void zebra_evpn_mh_init(void)
3995 {
3996 zrouter.mh_info = XCALLOC(MTYPE_ZMH_INFO, sizeof(*zrouter.mh_info));
3997
3998 zmh_info->mac_hold_time = ZEBRA_EVPN_MH_MAC_HOLD_TIME_DEF;
3999 zmh_info->neigh_hold_time = ZEBRA_EVPN_MH_NEIGH_HOLD_TIME_DEF;
4000 /* setup ES tables */
4001 RB_INIT(zebra_es_rb_head, &zmh_info->es_rb_tree);
4002 zmh_info->local_es_list = list_new();
4003 listset_app_node_mem(zmh_info->local_es_list);
4004
4005 bf_init(zmh_info->nh_id_bitmap, EVPN_NH_ID_MAX);
4006 bf_assign_zero_index(zmh_info->nh_id_bitmap);
4007 zmh_info->nhg_table = hash_create(zebra_evpn_nhg_hash_keymake,
4008 zebra_evpn_nhg_cmp, "l2 NHG table");
4009 zmh_info->nh_ip_table =
4010 hash_create(zebra_evpn_nh_ip_hash_keymake, zebra_evpn_nh_ip_cmp,
4011 "l2 NH IP table");
4012
4013 /* setup broadcast domain tables */
4014 zmh_info->evpn_vlan_table = hash_create(zebra_evpn_acc_vl_hash_keymake,
4015 zebra_evpn_acc_vl_cmp, "access VLAN hash table");
4016
4017 zmh_info->startup_delay_time = ZEBRA_EVPN_MH_STARTUP_DELAY_DEF;
4018 zebra_evpn_mh_startup_delay_timer_start("init");
4019 }
4020
4021 void zebra_evpn_mh_terminate(void)
4022 {
4023 list_delete(&zmh_info->local_es_list);
4024
4025 hash_iterate(zmh_info->evpn_vlan_table,
4026 zebra_evpn_acc_vl_cleanup_all, NULL);
4027 hash_free(zmh_info->evpn_vlan_table);
4028 hash_free(zmh_info->nhg_table);
4029 hash_free(zmh_info->nh_ip_table);
4030 bf_free(zmh_info->nh_id_bitmap);
4031 }