2002-12-13 21:15:29 +01:00
|
|
|
|
/* BGP packet management routine.
|
|
|
|
|
Copyright (C) 1999 Kunihiro Ishiguro
|
|
|
|
|
|
|
|
|
|
This file is part of GNU Zebra.
|
|
|
|
|
|
|
|
|
|
GNU Zebra is free software; you can redistribute it and/or modify it
|
|
|
|
|
under the terms of the GNU General Public License as published by the
|
|
|
|
|
Free Software Foundation; either version 2, or (at your option) any
|
|
|
|
|
later version.
|
|
|
|
|
|
|
|
|
|
GNU Zebra is distributed in the hope that it will be useful, but
|
|
|
|
|
WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
|
General Public License for more details.
|
|
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
|
along with GNU Zebra; see the file COPYING. If not, write to the Free
|
|
|
|
|
Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA
|
|
|
|
|
02111-1307, USA. */
|
|
|
|
|
|
|
|
|
|
#include <zebra.h>
|
|
|
|
|
|
|
|
|
|
#include "thread.h"
|
|
|
|
|
#include "stream.h"
|
|
|
|
|
#include "network.h"
|
|
|
|
|
#include "prefix.h"
|
|
|
|
|
#include "command.h"
|
|
|
|
|
#include "log.h"
|
|
|
|
|
#include "memory.h"
|
|
|
|
|
#include "sockunion.h" /* for inet_ntop () */
|
|
|
|
|
#include "linklist.h"
|
|
|
|
|
#include "plist.h"
|
|
|
|
|
|
|
|
|
|
#include "bgpd/bgpd.h"
|
|
|
|
|
#include "bgpd/bgp_table.h"
|
|
|
|
|
#include "bgpd/bgp_dump.h"
|
|
|
|
|
#include "bgpd/bgp_attr.h"
|
|
|
|
|
#include "bgpd/bgp_debug.h"
|
|
|
|
|
#include "bgpd/bgp_fsm.h"
|
|
|
|
|
#include "bgpd/bgp_route.h"
|
|
|
|
|
#include "bgpd/bgp_packet.h"
|
|
|
|
|
#include "bgpd/bgp_open.h"
|
|
|
|
|
#include "bgpd/bgp_aspath.h"
|
|
|
|
|
#include "bgpd/bgp_community.h"
|
|
|
|
|
#include "bgpd/bgp_ecommunity.h"
|
|
|
|
|
#include "bgpd/bgp_network.h"
|
|
|
|
|
#include "bgpd/bgp_mplsvpn.h"
|
|
|
|
|
#include "bgpd/bgp_advertise.h"
|
2005-02-02 15:40:33 +01:00
|
|
|
|
#include "bgpd/bgp_vty.h"
|
2002-12-13 21:15:29 +01:00
|
|
|
|
|
|
|
|
|
int stream_put_prefix (struct stream *, struct prefix *);
|
|
|
|
|
|
|
|
|
|
/* Set up BGP packet marker and packet type. */
|
|
|
|
|
static int
|
|
|
|
|
bgp_packet_set_marker (struct stream *s, u_char type)
|
|
|
|
|
{
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
/* Fill in marker. */
|
|
|
|
|
for (i = 0; i < BGP_MARKER_SIZE; i++)
|
|
|
|
|
stream_putc (s, 0xff);
|
|
|
|
|
|
|
|
|
|
/* Dummy total length. This field is should be filled in later on. */
|
|
|
|
|
stream_putw (s, 0);
|
|
|
|
|
|
|
|
|
|
/* BGP packet type. */
|
|
|
|
|
stream_putc (s, type);
|
|
|
|
|
|
|
|
|
|
/* Return current stream size. */
|
2005-02-09 16:51:56 +01:00
|
|
|
|
return stream_get_endp (s);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Set BGP packet header size entry. If size is zero then use current
|
|
|
|
|
stream size. */
|
|
|
|
|
static int
|
|
|
|
|
bgp_packet_set_size (struct stream *s)
|
|
|
|
|
{
|
|
|
|
|
int cp;
|
|
|
|
|
|
|
|
|
|
/* Preserve current pointer. */
|
2005-02-09 16:51:56 +01:00
|
|
|
|
cp = stream_get_endp (s);
|
|
|
|
|
stream_putw_at (s, BGP_MARKER_SIZE, cp);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
|
|
|
|
|
return cp;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Add new packet to the peer. */
|
2005-06-28 14:44:16 +02:00
|
|
|
|
static void
|
2002-12-13 21:15:29 +01:00
|
|
|
|
bgp_packet_add (struct peer *peer, struct stream *s)
|
|
|
|
|
{
|
|
|
|
|
/* Add packet to the end of list. */
|
|
|
|
|
stream_fifo_push (peer->obuf, s);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Free first packet. */
|
2005-06-28 14:44:16 +02:00
|
|
|
|
static void
|
2002-12-13 21:15:29 +01:00
|
|
|
|
bgp_packet_delete (struct peer *peer)
|
|
|
|
|
{
|
|
|
|
|
stream_free (stream_fifo_pop (peer->obuf));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Check file descriptor whether connect is established. */
|
|
|
|
|
static void
|
|
|
|
|
bgp_connect_check (struct peer *peer)
|
|
|
|
|
{
|
|
|
|
|
int status;
|
2004-06-04 19:58:18 +02:00
|
|
|
|
socklen_t slen;
|
2002-12-13 21:15:29 +01:00
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
|
|
/* Anyway I have to reset read and write thread. */
|
|
|
|
|
BGP_READ_OFF (peer->t_read);
|
|
|
|
|
BGP_WRITE_OFF (peer->t_write);
|
|
|
|
|
|
|
|
|
|
/* Check file descriptor. */
|
|
|
|
|
slen = sizeof (status);
|
2004-05-01 10:44:08 +02:00
|
|
|
|
ret = getsockopt(peer->fd, SOL_SOCKET, SO_ERROR, (void *) &status, &slen);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
|
|
|
|
|
/* If getsockopt is fail, this is fatal error. */
|
|
|
|
|
if (ret < 0)
|
|
|
|
|
{
|
|
|
|
|
zlog (peer->log, LOG_INFO, "can't get sockopt for nonblocking connect");
|
|
|
|
|
BGP_EVENT_ADD (peer, TCP_fatal_error);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* When status is 0 then TCP connection is established. */
|
|
|
|
|
if (status == 0)
|
|
|
|
|
{
|
|
|
|
|
BGP_EVENT_ADD (peer, TCP_connection_open);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
if (BGP_DEBUG (events, EVENTS))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
plog_debug (peer->log, "%s [Event] Connect failed (%s)",
|
2004-11-20 03:06:59 +01:00
|
|
|
|
peer->host, safe_strerror (errno));
|
2002-12-13 21:15:29 +01:00
|
|
|
|
BGP_EVENT_ADD (peer, TCP_connection_open_failed);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Make BGP update packet. */
|
2005-06-28 14:44:16 +02:00
|
|
|
|
static struct stream *
|
2002-12-13 21:15:29 +01:00
|
|
|
|
bgp_update_packet (struct peer *peer, afi_t afi, safi_t safi)
|
|
|
|
|
{
|
|
|
|
|
struct stream *s;
|
|
|
|
|
struct bgp_adj_out *adj;
|
|
|
|
|
struct bgp_advertise *adv;
|
|
|
|
|
struct stream *packet;
|
|
|
|
|
struct bgp_node *rn = NULL;
|
|
|
|
|
struct bgp_info *binfo = NULL;
|
|
|
|
|
bgp_size_t total_attr_len = 0;
|
|
|
|
|
unsigned long pos;
|
|
|
|
|
char buf[BUFSIZ];
|
|
|
|
|
|
|
|
|
|
s = peer->work;
|
|
|
|
|
stream_reset (s);
|
|
|
|
|
|
|
|
|
|
adv = FIFO_HEAD (&peer->sync[afi][safi]->update);
|
|
|
|
|
|
|
|
|
|
while (adv)
|
|
|
|
|
{
|
2006-10-16 01:50:16 +02:00
|
|
|
|
assert (adv->rn);
|
|
|
|
|
rn = adv->rn;
|
2002-12-13 21:15:29 +01:00
|
|
|
|
adj = adv->adj;
|
|
|
|
|
if (adv->binfo)
|
|
|
|
|
binfo = adv->binfo;
|
|
|
|
|
|
|
|
|
|
/* When remaining space can't include NLRI and it's length. */
|
2006-10-16 01:50:16 +02:00
|
|
|
|
if (STREAM_REMAIN (s) <= BGP_NLRI_LENGTH + PSIZE (rn->p.prefixlen))
|
2002-12-13 21:15:29 +01:00
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
/* If packet is empty, set attribute. */
|
|
|
|
|
if (stream_empty (s))
|
|
|
|
|
{
|
2006-05-04 09:52:12 +02:00
|
|
|
|
struct prefix_rd *prd = NULL;
|
|
|
|
|
u_char *tag = NULL;
|
2006-10-16 01:50:16 +02:00
|
|
|
|
struct peer *from = NULL;
|
2006-05-04 09:52:12 +02:00
|
|
|
|
|
|
|
|
|
if (rn->prn)
|
|
|
|
|
prd = (struct prefix_rd *) &rn->prn->p;
|
2007-05-04 22:15:47 +02:00
|
|
|
|
if (binfo && binfo->extra)
|
2006-10-16 01:50:16 +02:00
|
|
|
|
{
|
2007-05-04 22:15:47 +02:00
|
|
|
|
tag = binfo->extra->tag;
|
2006-10-16 01:50:16 +02:00
|
|
|
|
from = binfo->peer;
|
|
|
|
|
}
|
2006-05-04 09:52:12 +02:00
|
|
|
|
|
2002-12-13 21:15:29 +01:00
|
|
|
|
bgp_packet_set_marker (s, BGP_MSG_UPDATE);
|
|
|
|
|
stream_putw (s, 0);
|
2005-02-09 16:51:56 +01:00
|
|
|
|
pos = stream_get_endp (s);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
stream_putw (s, 0);
|
2004-06-04 19:58:18 +02:00
|
|
|
|
total_attr_len = bgp_packet_attribute (NULL, peer, s,
|
|
|
|
|
adv->baa->attr,
|
|
|
|
|
&rn->p, afi, safi,
|
2006-10-16 01:50:16 +02:00
|
|
|
|
from, prd, tag);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
stream_putw_at (s, pos, total_attr_len);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (afi == AFI_IP && safi == SAFI_UNICAST)
|
|
|
|
|
stream_put_prefix (s, &rn->p);
|
|
|
|
|
|
|
|
|
|
if (BGP_DEBUG (update, UPDATE_OUT))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog (peer->log, LOG_DEBUG, "%s send UPDATE %s/%d",
|
2002-12-13 21:15:29 +01:00
|
|
|
|
peer->host,
|
|
|
|
|
inet_ntop (rn->p.family, &(rn->p.u.prefix), buf, BUFSIZ),
|
|
|
|
|
rn->p.prefixlen);
|
|
|
|
|
|
|
|
|
|
/* Synchnorize attribute. */
|
|
|
|
|
if (adj->attr)
|
|
|
|
|
bgp_attr_unintern (adj->attr);
|
|
|
|
|
else
|
|
|
|
|
peer->scount[afi][safi]++;
|
|
|
|
|
|
|
|
|
|
adj->attr = bgp_attr_intern (adv->baa->attr);
|
|
|
|
|
|
|
|
|
|
adv = bgp_advertise_clean (peer, adj, afi, safi);
|
|
|
|
|
|
|
|
|
|
if (! (afi == AFI_IP && safi == SAFI_UNICAST))
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (! stream_empty (s))
|
|
|
|
|
{
|
|
|
|
|
bgp_packet_set_size (s);
|
2005-05-19 04:12:25 +02:00
|
|
|
|
packet = stream_dup (s);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
bgp_packet_add (peer, packet);
|
2004-05-01 10:44:08 +02:00
|
|
|
|
BGP_WRITE_ON (peer->t_write, bgp_write, peer->fd);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
stream_reset (s);
|
|
|
|
|
return packet;
|
|
|
|
|
}
|
|
|
|
|
return NULL;
|
2005-02-02 15:40:33 +01:00
|
|
|
|
}
|
|
|
|
|
|
2005-06-28 14:44:16 +02:00
|
|
|
|
static struct stream *
|
2005-02-02 15:40:33 +01:00
|
|
|
|
bgp_update_packet_eor (struct peer *peer, afi_t afi, safi_t safi)
|
|
|
|
|
{
|
|
|
|
|
struct stream *s;
|
|
|
|
|
struct stream *packet;
|
|
|
|
|
|
|
|
|
|
#ifdef DISABLE_BGP_ANNOUNCE
|
|
|
|
|
return;
|
|
|
|
|
#endif /* DISABLE_BGP_ANNOUNCE */
|
|
|
|
|
|
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
|
|
|
|
zlog_debug ("send End-of-RIB for %s to %s", afi_safi_print (afi, safi), peer->host);
|
|
|
|
|
|
|
|
|
|
s = stream_new (BGP_MAX_PACKET_SIZE);
|
|
|
|
|
|
|
|
|
|
/* Make BGP update packet. */
|
|
|
|
|
bgp_packet_set_marker (s, BGP_MSG_UPDATE);
|
|
|
|
|
|
|
|
|
|
/* Unfeasible Routes Length */
|
|
|
|
|
stream_putw (s, 0);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
|
2005-02-02 15:40:33 +01:00
|
|
|
|
if (afi == AFI_IP && safi == SAFI_UNICAST)
|
|
|
|
|
{
|
|
|
|
|
/* Total Path Attribute Length */
|
|
|
|
|
stream_putw (s, 0);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
/* Total Path Attribute Length */
|
|
|
|
|
stream_putw (s, 6);
|
|
|
|
|
stream_putc (s, BGP_ATTR_FLAG_OPTIONAL);
|
|
|
|
|
stream_putc (s, BGP_ATTR_MP_UNREACH_NLRI);
|
|
|
|
|
stream_putc (s, 3);
|
|
|
|
|
stream_putw (s, afi);
|
|
|
|
|
stream_putc (s, safi);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bgp_packet_set_size (s);
|
2005-05-19 04:12:25 +02:00
|
|
|
|
packet = stream_dup (s);
|
2005-02-02 15:40:33 +01:00
|
|
|
|
bgp_packet_add (peer, packet);
|
|
|
|
|
stream_free (s);
|
|
|
|
|
return packet;
|
2002-12-13 21:15:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Make BGP withdraw packet. */
|
2005-06-28 14:44:16 +02:00
|
|
|
|
static struct stream *
|
2002-12-13 21:15:29 +01:00
|
|
|
|
bgp_withdraw_packet (struct peer *peer, afi_t afi, safi_t safi)
|
|
|
|
|
{
|
|
|
|
|
struct stream *s;
|
|
|
|
|
struct stream *packet;
|
|
|
|
|
struct bgp_adj_out *adj;
|
|
|
|
|
struct bgp_advertise *adv;
|
|
|
|
|
struct bgp_node *rn;
|
|
|
|
|
unsigned long pos;
|
|
|
|
|
bgp_size_t unfeasible_len;
|
|
|
|
|
bgp_size_t total_attr_len;
|
|
|
|
|
char buf[BUFSIZ];
|
|
|
|
|
|
|
|
|
|
s = peer->work;
|
|
|
|
|
stream_reset (s);
|
|
|
|
|
|
|
|
|
|
while ((adv = FIFO_HEAD (&peer->sync[afi][safi]->withdraw)) != NULL)
|
|
|
|
|
{
|
2006-10-16 01:50:16 +02:00
|
|
|
|
assert (adv->rn);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
adj = adv->adj;
|
|
|
|
|
rn = adv->rn;
|
|
|
|
|
|
|
|
|
|
if (STREAM_REMAIN (s)
|
2004-05-20 12:20:02 +02:00
|
|
|
|
< (BGP_NLRI_LENGTH + BGP_TOTAL_ATTR_LEN + PSIZE (rn->p.prefixlen)))
|
2002-12-13 21:15:29 +01:00
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
if (stream_empty (s))
|
|
|
|
|
{
|
|
|
|
|
bgp_packet_set_marker (s, BGP_MSG_UPDATE);
|
|
|
|
|
stream_putw (s, 0);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (afi == AFI_IP && safi == SAFI_UNICAST)
|
|
|
|
|
stream_put_prefix (s, &rn->p);
|
|
|
|
|
else
|
|
|
|
|
{
|
2006-05-04 09:52:12 +02:00
|
|
|
|
struct prefix_rd *prd = NULL;
|
|
|
|
|
|
|
|
|
|
if (rn->prn)
|
|
|
|
|
prd = (struct prefix_rd *) &rn->prn->p;
|
2005-02-09 16:51:56 +01:00
|
|
|
|
pos = stream_get_endp (s);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
stream_putw (s, 0);
|
|
|
|
|
total_attr_len
|
|
|
|
|
= bgp_packet_withdraw (peer, s, &rn->p, afi, safi, prd, NULL);
|
|
|
|
|
|
|
|
|
|
/* Set total path attribute length. */
|
|
|
|
|
stream_putw_at (s, pos, total_attr_len);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (BGP_DEBUG (update, UPDATE_OUT))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog (peer->log, LOG_DEBUG, "%s send UPDATE %s/%d -- unreachable",
|
2002-12-13 21:15:29 +01:00
|
|
|
|
peer->host,
|
|
|
|
|
inet_ntop (rn->p.family, &(rn->p.u.prefix), buf, BUFSIZ),
|
|
|
|
|
rn->p.prefixlen);
|
|
|
|
|
|
|
|
|
|
peer->scount[afi][safi]--;
|
|
|
|
|
|
|
|
|
|
bgp_adj_out_remove (rn, adj, peer, afi, safi);
|
|
|
|
|
bgp_unlock_node (rn);
|
|
|
|
|
|
|
|
|
|
if (! (afi == AFI_IP && safi == SAFI_UNICAST))
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (! stream_empty (s))
|
|
|
|
|
{
|
|
|
|
|
if (afi == AFI_IP && safi == SAFI_UNICAST)
|
|
|
|
|
{
|
|
|
|
|
unfeasible_len
|
2005-02-09 16:51:56 +01:00
|
|
|
|
= stream_get_endp (s) - BGP_HEADER_SIZE - BGP_UNFEASIBLE_LEN;
|
2002-12-13 21:15:29 +01:00
|
|
|
|
stream_putw_at (s, BGP_HEADER_SIZE, unfeasible_len);
|
|
|
|
|
stream_putw (s, 0);
|
|
|
|
|
}
|
|
|
|
|
bgp_packet_set_size (s);
|
2005-05-19 04:12:25 +02:00
|
|
|
|
packet = stream_dup (s);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
bgp_packet_add (peer, packet);
|
|
|
|
|
stream_reset (s);
|
|
|
|
|
return packet;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
|
bgp_default_update_send (struct peer *peer, struct attr *attr,
|
|
|
|
|
afi_t afi, safi_t safi, struct peer *from)
|
|
|
|
|
{
|
|
|
|
|
struct stream *s;
|
|
|
|
|
struct stream *packet;
|
|
|
|
|
struct prefix p;
|
|
|
|
|
unsigned long pos;
|
|
|
|
|
bgp_size_t total_attr_len;
|
|
|
|
|
char attrstr[BUFSIZ];
|
|
|
|
|
char buf[BUFSIZ];
|
|
|
|
|
|
|
|
|
|
#ifdef DISABLE_BGP_ANNOUNCE
|
|
|
|
|
return;
|
|
|
|
|
#endif /* DISABLE_BGP_ANNOUNCE */
|
|
|
|
|
|
|
|
|
|
if (afi == AFI_IP)
|
|
|
|
|
str2prefix ("0.0.0.0/0", &p);
|
|
|
|
|
#ifdef HAVE_IPV6
|
|
|
|
|
else
|
|
|
|
|
str2prefix ("::/0", &p);
|
|
|
|
|
#endif /* HAVE_IPV6 */
|
|
|
|
|
|
|
|
|
|
/* Logging the attribute. */
|
|
|
|
|
if (BGP_DEBUG (update, UPDATE_OUT))
|
|
|
|
|
{
|
|
|
|
|
bgp_dump_attr (peer, attr, attrstr, BUFSIZ);
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog (peer->log, LOG_DEBUG, "%s send UPDATE %s/%d %s",
|
2002-12-13 21:15:29 +01:00
|
|
|
|
peer->host, inet_ntop(p.family, &(p.u.prefix), buf, BUFSIZ),
|
|
|
|
|
p.prefixlen, attrstr);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
s = stream_new (BGP_MAX_PACKET_SIZE);
|
|
|
|
|
|
|
|
|
|
/* Make BGP update packet. */
|
|
|
|
|
bgp_packet_set_marker (s, BGP_MSG_UPDATE);
|
|
|
|
|
|
|
|
|
|
/* Unfeasible Routes Length. */
|
|
|
|
|
stream_putw (s, 0);
|
|
|
|
|
|
|
|
|
|
/* Make place for total attribute length. */
|
2005-02-09 16:51:56 +01:00
|
|
|
|
pos = stream_get_endp (s);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
stream_putw (s, 0);
|
|
|
|
|
total_attr_len = bgp_packet_attribute (NULL, peer, s, attr, &p, afi, safi, from, NULL, NULL);
|
|
|
|
|
|
|
|
|
|
/* Set Total Path Attribute Length. */
|
|
|
|
|
stream_putw_at (s, pos, total_attr_len);
|
|
|
|
|
|
|
|
|
|
/* NLRI set. */
|
|
|
|
|
if (p.family == AF_INET && safi == SAFI_UNICAST)
|
|
|
|
|
stream_put_prefix (s, &p);
|
|
|
|
|
|
|
|
|
|
/* Set size. */
|
|
|
|
|
bgp_packet_set_size (s);
|
|
|
|
|
|
2005-05-19 04:12:25 +02:00
|
|
|
|
packet = stream_dup (s);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
stream_free (s);
|
|
|
|
|
|
|
|
|
|
/* Dump packet if debug option is set. */
|
|
|
|
|
#ifdef DEBUG
|
2005-10-01 02:07:50 +02:00
|
|
|
|
/* bgp_packet_dump (packet); */
|
2002-12-13 21:15:29 +01:00
|
|
|
|
#endif /* DEBUG */
|
|
|
|
|
|
|
|
|
|
/* Add packet to the peer. */
|
|
|
|
|
bgp_packet_add (peer, packet);
|
|
|
|
|
|
2004-05-01 10:44:08 +02:00
|
|
|
|
BGP_WRITE_ON (peer->t_write, bgp_write, peer->fd);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
|
bgp_default_withdraw_send (struct peer *peer, afi_t afi, safi_t safi)
|
|
|
|
|
{
|
|
|
|
|
struct stream *s;
|
|
|
|
|
struct stream *packet;
|
|
|
|
|
struct prefix p;
|
|
|
|
|
unsigned long pos;
|
|
|
|
|
unsigned long cp;
|
|
|
|
|
bgp_size_t unfeasible_len;
|
|
|
|
|
bgp_size_t total_attr_len;
|
|
|
|
|
char buf[BUFSIZ];
|
|
|
|
|
|
|
|
|
|
#ifdef DISABLE_BGP_ANNOUNCE
|
|
|
|
|
return;
|
|
|
|
|
#endif /* DISABLE_BGP_ANNOUNCE */
|
|
|
|
|
|
|
|
|
|
if (afi == AFI_IP)
|
|
|
|
|
str2prefix ("0.0.0.0/0", &p);
|
|
|
|
|
#ifdef HAVE_IPV6
|
|
|
|
|
else
|
|
|
|
|
str2prefix ("::/0", &p);
|
|
|
|
|
#endif /* HAVE_IPV6 */
|
|
|
|
|
|
|
|
|
|
total_attr_len = 0;
|
|
|
|
|
pos = 0;
|
|
|
|
|
|
|
|
|
|
if (BGP_DEBUG (update, UPDATE_OUT))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog (peer->log, LOG_DEBUG, "%s send UPDATE %s/%d -- unreachable",
|
2002-12-13 21:15:29 +01:00
|
|
|
|
peer->host, inet_ntop(p.family, &(p.u.prefix), buf, BUFSIZ),
|
|
|
|
|
p.prefixlen);
|
|
|
|
|
|
|
|
|
|
s = stream_new (BGP_MAX_PACKET_SIZE);
|
|
|
|
|
|
|
|
|
|
/* Make BGP update packet. */
|
|
|
|
|
bgp_packet_set_marker (s, BGP_MSG_UPDATE);
|
|
|
|
|
|
|
|
|
|
/* Unfeasible Routes Length. */;
|
2005-02-09 16:51:56 +01:00
|
|
|
|
cp = stream_get_endp (s);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
stream_putw (s, 0);
|
|
|
|
|
|
|
|
|
|
/* Withdrawn Routes. */
|
|
|
|
|
if (p.family == AF_INET && safi == SAFI_UNICAST)
|
|
|
|
|
{
|
|
|
|
|
stream_put_prefix (s, &p);
|
|
|
|
|
|
2005-02-09 16:51:56 +01:00
|
|
|
|
unfeasible_len = stream_get_endp (s) - cp - 2;
|
2002-12-13 21:15:29 +01:00
|
|
|
|
|
|
|
|
|
/* Set unfeasible len. */
|
|
|
|
|
stream_putw_at (s, cp, unfeasible_len);
|
|
|
|
|
|
|
|
|
|
/* Set total path attribute length. */
|
|
|
|
|
stream_putw (s, 0);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
2005-02-09 16:51:56 +01:00
|
|
|
|
pos = stream_get_endp (s);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
stream_putw (s, 0);
|
|
|
|
|
total_attr_len = bgp_packet_withdraw (peer, s, &p, afi, safi, NULL, NULL);
|
|
|
|
|
|
|
|
|
|
/* Set total path attribute length. */
|
|
|
|
|
stream_putw_at (s, pos, total_attr_len);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bgp_packet_set_size (s);
|
|
|
|
|
|
2005-05-19 04:12:25 +02:00
|
|
|
|
packet = stream_dup (s);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
stream_free (s);
|
|
|
|
|
|
|
|
|
|
/* Add packet to the peer. */
|
|
|
|
|
bgp_packet_add (peer, packet);
|
|
|
|
|
|
2004-05-01 10:44:08 +02:00
|
|
|
|
BGP_WRITE_ON (peer->t_write, bgp_write, peer->fd);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Get next packet to be written. */
|
2005-06-28 14:44:16 +02:00
|
|
|
|
static struct stream *
|
2002-12-13 21:15:29 +01:00
|
|
|
|
bgp_write_packet (struct peer *peer)
|
|
|
|
|
{
|
|
|
|
|
afi_t afi;
|
|
|
|
|
safi_t safi;
|
|
|
|
|
struct stream *s = NULL;
|
|
|
|
|
struct bgp_advertise *adv;
|
|
|
|
|
|
|
|
|
|
s = stream_fifo_head (peer->obuf);
|
|
|
|
|
if (s)
|
|
|
|
|
return s;
|
|
|
|
|
|
|
|
|
|
for (afi = AFI_IP; afi < AFI_MAX; afi++)
|
|
|
|
|
for (safi = SAFI_UNICAST; safi < SAFI_MAX; safi++)
|
|
|
|
|
{
|
|
|
|
|
adv = FIFO_HEAD (&peer->sync[afi][safi]->withdraw);
|
|
|
|
|
if (adv)
|
|
|
|
|
{
|
|
|
|
|
s = bgp_withdraw_packet (peer, afi, safi);
|
|
|
|
|
if (s)
|
|
|
|
|
return s;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for (afi = AFI_IP; afi < AFI_MAX; afi++)
|
|
|
|
|
for (safi = SAFI_UNICAST; safi < SAFI_MAX; safi++)
|
|
|
|
|
{
|
|
|
|
|
adv = FIFO_HEAD (&peer->sync[afi][safi]->update);
|
|
|
|
|
if (adv)
|
|
|
|
|
{
|
|
|
|
|
if (adv->binfo && adv->binfo->uptime < peer->synctime)
|
2005-02-02 15:40:33 +01:00
|
|
|
|
{
|
|
|
|
|
if (CHECK_FLAG (adv->binfo->peer->cap, PEER_CAP_RESTART_RCV)
|
|
|
|
|
&& CHECK_FLAG (adv->binfo->peer->cap, PEER_CAP_RESTART_ADV)
|
|
|
|
|
&& ! CHECK_FLAG (adv->binfo->flags, BGP_INFO_STALE)
|
|
|
|
|
&& safi != SAFI_MPLS_VPN)
|
|
|
|
|
{
|
|
|
|
|
if (CHECK_FLAG (adv->binfo->peer->af_sflags[afi][safi],
|
|
|
|
|
PEER_STATUS_EOR_RECEIVED))
|
|
|
|
|
s = bgp_update_packet (peer, afi, safi);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
s = bgp_update_packet (peer, afi, safi);
|
|
|
|
|
}
|
2002-12-13 21:15:29 +01:00
|
|
|
|
|
|
|
|
|
if (s)
|
|
|
|
|
return s;
|
|
|
|
|
}
|
2005-02-02 15:40:33 +01:00
|
|
|
|
|
|
|
|
|
if (CHECK_FLAG (peer->cap, PEER_CAP_RESTART_RCV))
|
|
|
|
|
{
|
|
|
|
|
if (peer->afc_nego[afi][safi] && peer->synctime
|
|
|
|
|
&& ! CHECK_FLAG (peer->af_sflags[afi][safi], PEER_STATUS_EOR_SEND)
|
|
|
|
|
&& safi != SAFI_MPLS_VPN)
|
|
|
|
|
{
|
|
|
|
|
SET_FLAG (peer->af_sflags[afi][safi], PEER_STATUS_EOR_SEND);
|
|
|
|
|
return bgp_update_packet_eor (peer, afi, safi);
|
|
|
|
|
}
|
|
|
|
|
}
|
2002-12-13 21:15:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Is there partially written packet or updates we can send right
|
|
|
|
|
now. */
|
2005-06-28 14:44:16 +02:00
|
|
|
|
static int
|
2002-12-13 21:15:29 +01:00
|
|
|
|
bgp_write_proceed (struct peer *peer)
|
|
|
|
|
{
|
|
|
|
|
afi_t afi;
|
|
|
|
|
safi_t safi;
|
|
|
|
|
struct bgp_advertise *adv;
|
|
|
|
|
|
|
|
|
|
if (stream_fifo_head (peer->obuf))
|
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
|
|
for (afi = AFI_IP; afi < AFI_MAX; afi++)
|
|
|
|
|
for (safi = SAFI_UNICAST; safi < SAFI_MAX; safi++)
|
|
|
|
|
if (FIFO_HEAD (&peer->sync[afi][safi]->withdraw))
|
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
|
|
for (afi = AFI_IP; afi < AFI_MAX; afi++)
|
|
|
|
|
for (safi = SAFI_UNICAST; safi < SAFI_MAX; safi++)
|
|
|
|
|
if ((adv = FIFO_HEAD (&peer->sync[afi][safi]->update)) != NULL)
|
|
|
|
|
if (adv->binfo->uptime < peer->synctime)
|
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Write packet to the peer. */
|
|
|
|
|
int
|
|
|
|
|
bgp_write (struct thread *thread)
|
|
|
|
|
{
|
|
|
|
|
struct peer *peer;
|
|
|
|
|
u_char type;
|
|
|
|
|
struct stream *s;
|
|
|
|
|
int num;
|
2004-10-13 07:06:08 +02:00
|
|
|
|
unsigned int count = 0;
|
2002-12-13 21:15:29 +01:00
|
|
|
|
int write_errno;
|
|
|
|
|
|
|
|
|
|
/* Yes first of all get peer pointer. */
|
|
|
|
|
peer = THREAD_ARG (thread);
|
|
|
|
|
peer->t_write = NULL;
|
|
|
|
|
|
|
|
|
|
/* For non-blocking IO check. */
|
|
|
|
|
if (peer->status == Connect)
|
|
|
|
|
{
|
|
|
|
|
bgp_connect_check (peer);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Nonblocking write until TCP output buffer is full. */
|
|
|
|
|
while (1)
|
|
|
|
|
{
|
|
|
|
|
int writenum;
|
2005-01-05 09:14:13 +01:00
|
|
|
|
int val;
|
2002-12-13 21:15:29 +01:00
|
|
|
|
|
|
|
|
|
s = bgp_write_packet (peer);
|
|
|
|
|
if (! s)
|
|
|
|
|
return 0;
|
2005-01-05 09:14:13 +01:00
|
|
|
|
|
|
|
|
|
/* XXX: FIXME, the socket should be NONBLOCK from the start
|
|
|
|
|
* status shouldnt need to be toggled on each write
|
|
|
|
|
*/
|
|
|
|
|
val = fcntl (peer->fd, F_GETFL, 0);
|
|
|
|
|
fcntl (peer->fd, F_SETFL, val|O_NONBLOCK);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
|
|
|
|
|
/* Number of bytes to be sent. */
|
|
|
|
|
writenum = stream_get_endp (s) - stream_get_getp (s);
|
|
|
|
|
|
|
|
|
|
/* Call write() system call. */
|
2004-05-01 10:44:08 +02:00
|
|
|
|
num = write (peer->fd, STREAM_PNT (s), writenum);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
write_errno = errno;
|
2005-01-05 09:14:13 +01:00
|
|
|
|
fcntl (peer->fd, F_SETFL, val);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
if (num <= 0)
|
|
|
|
|
{
|
|
|
|
|
/* Partial write. */
|
|
|
|
|
if (write_errno == EWOULDBLOCK || write_errno == EAGAIN)
|
|
|
|
|
break;
|
|
|
|
|
|
2006-10-16 01:39:59 +02:00
|
|
|
|
BGP_EVENT_ADD (peer, TCP_fatal_error);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
if (num != writenum)
|
|
|
|
|
{
|
2005-02-09 16:51:56 +01:00
|
|
|
|
stream_forward_getp (s, num);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
|
|
|
|
|
if (write_errno == EAGAIN)
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Retrieve BGP packet type. */
|
|
|
|
|
stream_set_getp (s, BGP_MARKER_SIZE + 2);
|
|
|
|
|
type = stream_getc (s);
|
|
|
|
|
|
|
|
|
|
switch (type)
|
|
|
|
|
{
|
|
|
|
|
case BGP_MSG_OPEN:
|
|
|
|
|
peer->open_out++;
|
|
|
|
|
break;
|
|
|
|
|
case BGP_MSG_UPDATE:
|
|
|
|
|
peer->update_out++;
|
|
|
|
|
break;
|
|
|
|
|
case BGP_MSG_NOTIFY:
|
|
|
|
|
peer->notify_out++;
|
|
|
|
|
/* Double start timer. */
|
|
|
|
|
peer->v_start *= 2;
|
|
|
|
|
|
|
|
|
|
/* Overflow check. */
|
|
|
|
|
if (peer->v_start >= (60 * 2))
|
|
|
|
|
peer->v_start = (60 * 2);
|
|
|
|
|
|
[bgpd] Fix 0.99 shutdown regression, introduce Clearing and Deleted states
2006-09-14 Paul Jakma <paul.jakma@sun.com>
* (general) Fix some niggly issues around 'shutdown' and clearing
by adding a Clearing FSM wait-state and a hidden 'Deleted'
FSM state, to allow deleted peers to 'cool off' and hit 0
references. This introduces a slow memory leak of struct peer,
however that's more a testament to the fragility of the
reference counting than a bug in this patch, cleanup of
reference counting to fix this is to follow.
* bgpd.h: Add Clearing, Deleted states and Clearing_Completed
and event.
* bgp_debug.c: (bgp_status_msg[]) Add strings for Clearing and
Deleted.
* bgp_fsm.h: Don't allow timer/event threads to set anything
for Deleted peers.
* bgp_fsm.c: (bgp_timer_set) Add Clearing and Deleted. Deleted
needs to stop everything.
(bgp_stop) Remove explicit fsm_change_status call, the
general framework handles the transition.
(bgp_start) Log a warning if a start is attempted on a peer
that should stay down, trying to start a peer.
(struct .. FSM) Add Clearing_Completed
events, has little influence except when in state
Clearing to signal wait-state can end.
Add Clearing and Deleted states, former is a wait-state,
latter is a placeholder state to allow peers to disappear
quietly once refcounts settle.
(bgp_event) Try reduce verbosity of FSM state-change debug,
changes to same state are not interesting (Established->Established)
Allow NULL action functions in FSM.
* bgp_packet.c: (bgp_write) Use FSM events, rather than trying
to twiddle directly with FSM state behind the back of FSM.
(bgp_write_notify) ditto.
(bgp_read) Remove the vague ACCEPT_PEER peer_unlock, or else
this patch crashes, now it leaks instead.
* bgp_route.c: (bgp_clear_node_complete) Clearing_Completed
event, to end clearing.
(bgp_clear_route) See extensive comments.
* bgpd.c: (peer_free) should only be called while in Deleted,
peer refcounting controls when peer_free is called.
bgp_sync_delete should be here, not in peer_delete.
(peer_delete) Initiate delete.
Transition to Deleted state manually.
When removing peer from indices that provide visibility of it,
take great care to be idempotent wrt the reference counting
of struct peer through those indices.
Use bgp_timer_set, rather than replicating.
Call to bgp_sync_delete isn't appropriate here, sync can be
referenced while shutting down and finishing deletion.
(peer_group_bind) Take care to be idempotent wrt list references
indexing peers.
2006-09-14 04:58:49 +02:00
|
|
|
|
/* Flush any existing events */
|
2006-10-16 01:39:59 +02:00
|
|
|
|
BGP_EVENT_ADD (peer, BGP_Stop);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
return 0;
|
|
|
|
|
case BGP_MSG_KEEPALIVE:
|
|
|
|
|
peer->keepalive_out++;
|
|
|
|
|
break;
|
|
|
|
|
case BGP_MSG_ROUTE_REFRESH_NEW:
|
|
|
|
|
case BGP_MSG_ROUTE_REFRESH_OLD:
|
|
|
|
|
peer->refresh_out++;
|
|
|
|
|
break;
|
|
|
|
|
case BGP_MSG_CAPABILITY:
|
|
|
|
|
peer->dynamic_cap_out++;
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* OK we send packet so delete it. */
|
|
|
|
|
bgp_packet_delete (peer);
|
|
|
|
|
|
|
|
|
|
if (++count >= BGP_WRITE_PACKET_MAX)
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (bgp_write_proceed (peer))
|
2004-05-01 10:44:08 +02:00
|
|
|
|
BGP_WRITE_ON (peer->t_write, bgp_write, peer->fd);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* This is only for sending NOTIFICATION message to neighbor. */
|
2005-06-28 14:44:16 +02:00
|
|
|
|
static int
|
2002-12-13 21:15:29 +01:00
|
|
|
|
bgp_write_notify (struct peer *peer)
|
|
|
|
|
{
|
|
|
|
|
int ret;
|
|
|
|
|
u_char type;
|
|
|
|
|
struct stream *s;
|
|
|
|
|
|
|
|
|
|
/* There should be at least one packet. */
|
|
|
|
|
s = stream_fifo_head (peer->obuf);
|
|
|
|
|
if (!s)
|
|
|
|
|
return 0;
|
|
|
|
|
assert (stream_get_endp (s) >= BGP_HEADER_SIZE);
|
|
|
|
|
|
|
|
|
|
/* I'm not sure fd is writable. */
|
2004-05-01 10:44:08 +02:00
|
|
|
|
ret = writen (peer->fd, STREAM_DATA (s), stream_get_endp (s));
|
2002-12-13 21:15:29 +01:00
|
|
|
|
if (ret <= 0)
|
|
|
|
|
{
|
2006-10-16 01:39:59 +02:00
|
|
|
|
BGP_EVENT_ADD (peer, TCP_fatal_error);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Retrieve BGP packet type. */
|
|
|
|
|
stream_set_getp (s, BGP_MARKER_SIZE + 2);
|
|
|
|
|
type = stream_getc (s);
|
|
|
|
|
|
|
|
|
|
assert (type == BGP_MSG_NOTIFY);
|
|
|
|
|
|
|
|
|
|
/* Type should be notify. */
|
|
|
|
|
peer->notify_out++;
|
|
|
|
|
|
|
|
|
|
/* Double start timer. */
|
|
|
|
|
peer->v_start *= 2;
|
|
|
|
|
|
|
|
|
|
/* Overflow check. */
|
|
|
|
|
if (peer->v_start >= (60 * 2))
|
|
|
|
|
peer->v_start = (60 * 2);
|
|
|
|
|
|
2006-10-16 01:39:59 +02:00
|
|
|
|
BGP_EVENT_ADD (peer, BGP_Stop);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Make keepalive packet and send it to the peer. */
|
|
|
|
|
void
|
|
|
|
|
bgp_keepalive_send (struct peer *peer)
|
|
|
|
|
{
|
|
|
|
|
struct stream *s;
|
|
|
|
|
int length;
|
|
|
|
|
|
|
|
|
|
s = stream_new (BGP_MAX_PACKET_SIZE);
|
|
|
|
|
|
|
|
|
|
/* Make keepalive packet. */
|
|
|
|
|
bgp_packet_set_marker (s, BGP_MSG_KEEPALIVE);
|
|
|
|
|
|
|
|
|
|
/* Set packet size. */
|
|
|
|
|
length = bgp_packet_set_size (s);
|
|
|
|
|
|
|
|
|
|
/* Dump packet if debug option is set. */
|
|
|
|
|
/* bgp_packet_dump (s); */
|
|
|
|
|
|
|
|
|
|
if (BGP_DEBUG (keepalive, KEEPALIVE))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog_debug ("%s sending KEEPALIVE", peer->host);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog_debug ("%s send message type %d, length (incl. header) %d",
|
2002-12-13 21:15:29 +01:00
|
|
|
|
peer->host, BGP_MSG_KEEPALIVE, length);
|
|
|
|
|
|
|
|
|
|
/* Add packet to the peer. */
|
|
|
|
|
bgp_packet_add (peer, s);
|
|
|
|
|
|
2004-05-01 10:44:08 +02:00
|
|
|
|
BGP_WRITE_ON (peer->t_write, bgp_write, peer->fd);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Make open packet and send it to the peer. */
|
|
|
|
|
void
|
|
|
|
|
bgp_open_send (struct peer *peer)
|
|
|
|
|
{
|
|
|
|
|
struct stream *s;
|
|
|
|
|
int length;
|
|
|
|
|
u_int16_t send_holdtime;
|
|
|
|
|
as_t local_as;
|
|
|
|
|
|
|
|
|
|
if (CHECK_FLAG (peer->config, PEER_CONFIG_TIMER))
|
|
|
|
|
send_holdtime = peer->holdtime;
|
|
|
|
|
else
|
|
|
|
|
send_holdtime = peer->bgp->default_holdtime;
|
|
|
|
|
|
|
|
|
|
/* local-as Change */
|
|
|
|
|
if (peer->change_local_as)
|
|
|
|
|
local_as = peer->change_local_as;
|
|
|
|
|
else
|
|
|
|
|
local_as = peer->local_as;
|
|
|
|
|
|
|
|
|
|
s = stream_new (BGP_MAX_PACKET_SIZE);
|
|
|
|
|
|
|
|
|
|
/* Make open packet. */
|
|
|
|
|
bgp_packet_set_marker (s, BGP_MSG_OPEN);
|
|
|
|
|
|
|
|
|
|
/* Set open packet values. */
|
|
|
|
|
stream_putc (s, BGP_VERSION_4); /* BGP version */
|
[bgpd] Merge AS4 support
2007-10-14 Paul Jakma <paul.jakma@sun.com>
* NEWS: Note that MRT dumps are now version 2
* (general) Merge in Juergen Kammer's AS4 patch.
2007-09-27 Paul Jakma <paul.jakma@sun.com>
* bgp_aspath.c: (assegment_normalise) remove duplicates from
from sets.
(aspath_reconcile_as4) disregard a broken part of the RFC around
error handling in path reconciliation.
* aspath_test.c: Test dupe-weeding from sets.
Test that reconciliation merges AS_PATH and AS4_PATH where
former is shorter than latter.
2007-09-26 Paul Jakma <paul.jakma@sun.com>
* aspath_test.c: Test AS4_PATH reconcilation where length
of AS_PATH and AS4_PATH is same.
2007-09-25 Paul Jakma <paul.jakma@sun.com>
* bgp_open.c: (peek_for_as4_capability) Fix to work.
* bgp_packet.c: (bgp_open_receive) Fix sanity check of as4.
* tests/bgp_capability_test.c: (general) Extend tests to validate
peek_for_as4_capability.
Add test of full OPEN Option block, with multiple capabilities,
both as a series of Option, and a single option.
Add some crap to beginning of stream, to prevent code depending
on getp == 0.
2007-09-18 Paul Jakma <paul.jakma@sun.com>
* bgp_open.c: (bgp_capability_as4) debug printf inline with others.
(peek_for_as4_capability) There's no need to signal failure, as
failure is better dealt with through full capability parser -
just return the AS4, simpler.
* bgp_packet.c: (bgp_open_receive) Update to match
peek_for_as4_capability change.
Allow use of BGP_AS_TRANS by 2b speakers.
Use NOTIFY_OPEN_ERR rather than CEASE for OPEN parsing errors.
(bgp_capability_msg_parse) missing argument to debug print
(bgp_capability_receive) missing return values.
* tests/bgp_capability_test.c: (parse_test) update for changes to
peek_for_as4_capability
2007-07-25 Paul Jakma <paul.jakma@sun.com>
* Remove 2-byte size macros, just make existing macros take
argument to indicate which size to use.
Adjust all users - typically they want '1'.
* bgp_aspath.c: (aspath_has_as4) New, return 1 if there are any
as4's in a path.
(aspath_put) Return the number of bytes actually written, to
fix the bug Juergen noted: Splitting of segments will change
the number of bytes written from that already written to the
AS_PATH header.
(aspath_snmp_pathseg) Pass 2-byte flag to aspath_put. SNMP
is still defined as 2b.
(aspath_aggregate) fix latent bug.
(aspath_reconcile_as4) AS_PATH+NEW_AS_PATH reconciliation
function.
(aspath_key_make) Hash the AS_PATH string, rather than
just taking the addition of assegment ASes as the hash value,
hopefully sligthly more collision resistant.
(bgp_attr_munge_as4_attrs) Collide the NEW_ attributes
together with the OLD 2-byte forms, code Juergen
had in bgp_attr_parse but re-organised a bit.
(bgp_attr_parse) Bunch of code from Juergen moves
to previous function.
(bgp_packet_attribute) Compact significantly by
just /always/ using extended-length attr header.
Fix bug Juergen noted, by using aspath_put's
(new) returned size value for the attr header rather
than the (guesstimate) of aspath_size() - the two could
differ when aspath_put had to split large segments, unlikely
this bug was ever hit in the 'wild'.
(bgp_dump_routes_attr) Always use extended-len and
use aspath_put return for header length. Output 4b ASN
for AS_PATH and AGGREGATOR.
* bgp_ecommunity.c: (ecommunity_{hash_make,cmp}) fix
hash callback declarations to match prototypes.
(ecommunity_gettoken) Updated for ECOMMUNITY_ENCODE_AS4,
complete rewrite of Juergen's changes (no asdot support)
* bgp_open.c: (bgp_capability_as4) New, does what it says
on the tin.
(peek_for_as4_capability) Rewritten to use streams and
bgp_capability_as4.
* bgp_packet.c: (bgp_open_send) minor edit
checked (in the abstract at least) with Juergen.
Changes are to be more accepting, e.g, allow AS_TRANS on
a 2-byte session.
* (general) Update all commands to use CMD_AS_RANGE.
* bgp_vty.c: (bgp_clear) Fix return vals to use CMD_..
Remove stuff replicated by VTY_GET_LONG
(bgp_clear_vty) Return bgp_clear directly to vty.
* tests/aspath_test.c: Exercise 32bit parsing. Test reconcile
function.
* tests/ecommunity_test.c: New, test AS4 ecommunity changes,
positive test only at this time, error cases not tested yet.
2007-07-25 Juergen Kammer <j.kammer@eurodata.de>
* (general) AS4 support.
* bgpd.h: as_t changes to 4-bytes.
* bgp_aspath.h: Add BGP_AS4_MAX and BGP_AS_TRANS defines.
* bgp_aspath.c: AS_VALUE_SIZE becomes 4-byte, AS16_VALUE_SIZE
added for 2-byte.
Add AS16 versions of length calc macros.
(aspath_count_numas) New, count number of ASes.
(aspath_has_as4) New, return 1 if there are any as4's in a
path.
(assegments_parse) Interpret assegment as 4 or 2 byte,
according to how the caller instructs us, with a new
argument.
(aspath_parse) Add use32bit argument to pass to
assegments_parse. Adjust all its callers to pass 1, unless
otherwise noted.
(assegment_data_put) Adjust to be able to write 2 or 4 byte
AS, according to new use32bit argument.
(aspath_put) Adjust to write 2 or 4.
(aspath_gettoken) Use a long for passed in asno.
* bgp_attr.c: (attr_str) Add BGP_ATTR_AS4_PATH and
BGP_ATTR_AS4_AGGREGATOR.
(bgp_attr_aspath) Call aspath_parse with right 2/4 arg, as
determined by received-capability flag.
(bgp_attr_aspath_check) New, code previously in attr_aspath
but moved to new func so it can be run after NEW_AS_PATH
reconciliation.
(bgp_attr_as4_path) New, handle NEW_AS_PATH.
(bgp_attr_aggregator) Adjust to cope with 2/4 byte ASes.
(bgp_attr_as4_aggregator) New, read NEW_AGGREGATOR.
(bgp_attr_parse) Add handoffs to previous parsers for the two
new AS4 NEW_ attributes.
Various checks added for NEW/OLD reconciliation.
(bgp_packet_attribute) Support 2/4 for AS_PATH and
AGGREGATOR, detect when NEW_ attrs need to be sent.
* bgp_debug.{c,h}: Add 'debug bgp as4'.
* bgp_dump.c: MRTv2 support, unconditionally enabled, which
supports AS4. Based on patches from Erik (RIPE?).
* bgp_ecommunity.c: (ecommunity_ecom2str) ECOMMUNITY_ENCODE_AS4
support.
* bgp_open.c: (peek_for_as4_capability) New, peek for AS4
capability prior to full capability parsing, so we know which
ASN to use for struct peer lookup.
(bgp_open_capability) Always send AS4 capability.
* bgp_packet.c: (bgp_open_send) AS4 handling for AS field
(bgp_open_receive) Peek for AS4 capability first, and figure
out which AS to believe.
* bgp_vty.c: (bgp_show_peer) Print AS4 cap
* tests/aspath_test.c: Support asn32 changes, call aspath_parse
with 16 bit.
* vtysh/extract.pl: AS4 compatibility for router bgp ASNUMBER
* vtysh/extract.pl.in: AS4 compatibility for router bgp ASNUMBER
* vtysh/vtysh.c: AS4 compatibility for router bgp ASNUMBER
2007-10-15 00:32:21 +02:00
|
|
|
|
stream_putw (s, (local_as <= BGP_AS_MAX) ? (u_int16_t) local_as
|
|
|
|
|
: BGP_AS_TRANS);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
stream_putw (s, send_holdtime); /* Hold Time */
|
|
|
|
|
stream_put_in_addr (s, &peer->local_id); /* BGP Identifier */
|
|
|
|
|
|
|
|
|
|
/* Set capability code. */
|
|
|
|
|
bgp_open_capability (s, peer);
|
|
|
|
|
|
|
|
|
|
/* Set BGP packet length. */
|
|
|
|
|
length = bgp_packet_set_size (s);
|
|
|
|
|
|
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog_debug ("%s sending OPEN, version %d, my as %d, holdtime %d, id %s",
|
2002-12-13 21:15:29 +01:00
|
|
|
|
peer->host, BGP_VERSION_4, local_as,
|
|
|
|
|
send_holdtime, inet_ntoa (peer->local_id));
|
|
|
|
|
|
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog_debug ("%s send message type %d, length (incl. header) %d",
|
2002-12-13 21:15:29 +01:00
|
|
|
|
peer->host, BGP_MSG_OPEN, length);
|
|
|
|
|
|
|
|
|
|
/* Dump packet if debug option is set. */
|
|
|
|
|
/* bgp_packet_dump (s); */
|
|
|
|
|
|
|
|
|
|
/* Add packet to the peer. */
|
|
|
|
|
bgp_packet_add (peer, s);
|
|
|
|
|
|
2004-05-01 10:44:08 +02:00
|
|
|
|
BGP_WRITE_ON (peer->t_write, bgp_write, peer->fd);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Send BGP notify packet with data potion. */
|
|
|
|
|
void
|
|
|
|
|
bgp_notify_send_with_data (struct peer *peer, u_char code, u_char sub_code,
|
|
|
|
|
u_char *data, size_t datalen)
|
|
|
|
|
{
|
|
|
|
|
struct stream *s;
|
|
|
|
|
int length;
|
|
|
|
|
|
|
|
|
|
/* Allocate new stream. */
|
|
|
|
|
s = stream_new (BGP_MAX_PACKET_SIZE);
|
|
|
|
|
|
|
|
|
|
/* Make nitify packet. */
|
|
|
|
|
bgp_packet_set_marker (s, BGP_MSG_NOTIFY);
|
|
|
|
|
|
|
|
|
|
/* Set notify packet values. */
|
|
|
|
|
stream_putc (s, code); /* BGP notify code */
|
|
|
|
|
stream_putc (s, sub_code); /* BGP notify sub_code */
|
|
|
|
|
|
|
|
|
|
/* If notify data is present. */
|
|
|
|
|
if (data)
|
|
|
|
|
stream_write (s, data, datalen);
|
|
|
|
|
|
|
|
|
|
/* Set BGP packet length. */
|
|
|
|
|
length = bgp_packet_set_size (s);
|
|
|
|
|
|
|
|
|
|
/* Add packet to the peer. */
|
|
|
|
|
stream_fifo_clean (peer->obuf);
|
|
|
|
|
bgp_packet_add (peer, s);
|
|
|
|
|
|
|
|
|
|
/* For debug */
|
|
|
|
|
{
|
|
|
|
|
struct bgp_notify bgp_notify;
|
|
|
|
|
int first = 0;
|
|
|
|
|
int i;
|
|
|
|
|
char c[4];
|
|
|
|
|
|
|
|
|
|
bgp_notify.code = code;
|
|
|
|
|
bgp_notify.subcode = sub_code;
|
|
|
|
|
bgp_notify.data = NULL;
|
|
|
|
|
bgp_notify.length = length - BGP_MSG_NOTIFY_MIN_SIZE;
|
|
|
|
|
|
|
|
|
|
if (bgp_notify.length)
|
|
|
|
|
{
|
|
|
|
|
bgp_notify.data = XMALLOC (MTYPE_TMP, bgp_notify.length * 3);
|
|
|
|
|
for (i = 0; i < bgp_notify.length; i++)
|
|
|
|
|
if (first)
|
|
|
|
|
{
|
|
|
|
|
sprintf (c, " %02x", data[i]);
|
|
|
|
|
strcat (bgp_notify.data, c);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
first = 1;
|
|
|
|
|
sprintf (c, "%02x", data[i]);
|
|
|
|
|
strcpy (bgp_notify.data, c);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
bgp_notify_print (peer, &bgp_notify, "sending");
|
|
|
|
|
if (bgp_notify.data)
|
|
|
|
|
XFREE (MTYPE_TMP, bgp_notify.data);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog_debug ("%s send message type %d, length (incl. header) %d",
|
2002-12-13 21:15:29 +01:00
|
|
|
|
peer->host, BGP_MSG_NOTIFY, length);
|
|
|
|
|
|
2004-05-20 11:19:34 +02:00
|
|
|
|
/* peer reset cause */
|
|
|
|
|
if (sub_code != BGP_NOTIFY_CEASE_CONFIG_CHANGE)
|
|
|
|
|
{
|
|
|
|
|
if (sub_code == BGP_NOTIFY_CEASE_ADMIN_RESET)
|
|
|
|
|
peer->last_reset = PEER_DOWN_USER_RESET;
|
|
|
|
|
else if (sub_code == BGP_NOTIFY_CEASE_ADMIN_SHUTDOWN)
|
|
|
|
|
peer->last_reset = PEER_DOWN_USER_SHUTDOWN;
|
|
|
|
|
else
|
|
|
|
|
peer->last_reset = PEER_DOWN_NOTIFY_SEND;
|
|
|
|
|
}
|
|
|
|
|
|
2002-12-13 21:15:29 +01:00
|
|
|
|
/* Call imidiately. */
|
|
|
|
|
BGP_WRITE_OFF (peer->t_write);
|
|
|
|
|
|
|
|
|
|
bgp_write_notify (peer);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Send BGP notify packet. */
|
|
|
|
|
void
|
|
|
|
|
bgp_notify_send (struct peer *peer, u_char code, u_char sub_code)
|
|
|
|
|
{
|
|
|
|
|
bgp_notify_send_with_data (peer, code, sub_code, NULL, 0);
|
|
|
|
|
}
|
|
|
|
|
|
2005-06-28 14:44:16 +02:00
|
|
|
|
static const char *
|
2002-12-13 21:15:29 +01:00
|
|
|
|
afi2str (afi_t afi)
|
|
|
|
|
{
|
|
|
|
|
if (afi == AFI_IP)
|
|
|
|
|
return "AFI_IP";
|
|
|
|
|
else if (afi == AFI_IP6)
|
|
|
|
|
return "AFI_IP6";
|
|
|
|
|
else
|
|
|
|
|
return "Unknown AFI";
|
|
|
|
|
}
|
|
|
|
|
|
2005-06-28 14:44:16 +02:00
|
|
|
|
static const char *
|
2002-12-13 21:15:29 +01:00
|
|
|
|
safi2str (safi_t safi)
|
|
|
|
|
{
|
|
|
|
|
if (safi == SAFI_UNICAST)
|
|
|
|
|
return "SAFI_UNICAST";
|
|
|
|
|
else if (safi == SAFI_MULTICAST)
|
|
|
|
|
return "SAFI_MULTICAST";
|
|
|
|
|
else if (safi == SAFI_MPLS_VPN || safi == BGP_SAFI_VPNV4)
|
|
|
|
|
return "SAFI_MPLS_VPN";
|
|
|
|
|
else
|
|
|
|
|
return "Unknown SAFI";
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Send route refresh message to the peer. */
|
|
|
|
|
void
|
|
|
|
|
bgp_route_refresh_send (struct peer *peer, afi_t afi, safi_t safi,
|
|
|
|
|
u_char orf_type, u_char when_to_refresh, int remove)
|
|
|
|
|
{
|
|
|
|
|
struct stream *s;
|
|
|
|
|
struct stream *packet;
|
|
|
|
|
int length;
|
|
|
|
|
struct bgp_filter *filter;
|
|
|
|
|
int orf_refresh = 0;
|
|
|
|
|
|
|
|
|
|
#ifdef DISABLE_BGP_ANNOUNCE
|
|
|
|
|
return;
|
|
|
|
|
#endif /* DISABLE_BGP_ANNOUNCE */
|
|
|
|
|
|
|
|
|
|
filter = &peer->filter[afi][safi];
|
|
|
|
|
|
|
|
|
|
/* Adjust safi code. */
|
|
|
|
|
if (safi == SAFI_MPLS_VPN)
|
|
|
|
|
safi = BGP_SAFI_VPNV4;
|
|
|
|
|
|
|
|
|
|
s = stream_new (BGP_MAX_PACKET_SIZE);
|
|
|
|
|
|
|
|
|
|
/* Make BGP update packet. */
|
|
|
|
|
if (CHECK_FLAG (peer->cap, PEER_CAP_REFRESH_NEW_RCV))
|
|
|
|
|
bgp_packet_set_marker (s, BGP_MSG_ROUTE_REFRESH_NEW);
|
|
|
|
|
else
|
|
|
|
|
bgp_packet_set_marker (s, BGP_MSG_ROUTE_REFRESH_OLD);
|
|
|
|
|
|
|
|
|
|
/* Encode Route Refresh message. */
|
|
|
|
|
stream_putw (s, afi);
|
|
|
|
|
stream_putc (s, 0);
|
|
|
|
|
stream_putc (s, safi);
|
|
|
|
|
|
|
|
|
|
if (orf_type == ORF_TYPE_PREFIX
|
|
|
|
|
|| orf_type == ORF_TYPE_PREFIX_OLD)
|
|
|
|
|
if (remove || filter->plist[FILTER_IN].plist)
|
|
|
|
|
{
|
|
|
|
|
u_int16_t orf_len;
|
|
|
|
|
unsigned long orfp;
|
|
|
|
|
|
|
|
|
|
orf_refresh = 1;
|
|
|
|
|
stream_putc (s, when_to_refresh);
|
|
|
|
|
stream_putc (s, orf_type);
|
2005-02-09 16:51:56 +01:00
|
|
|
|
orfp = stream_get_endp (s);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
stream_putw (s, 0);
|
|
|
|
|
|
|
|
|
|
if (remove)
|
|
|
|
|
{
|
|
|
|
|
UNSET_FLAG (peer->af_sflags[afi][safi], PEER_STATUS_ORF_PREFIX_SEND);
|
|
|
|
|
stream_putc (s, ORF_COMMON_PART_REMOVE_ALL);
|
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog_debug ("%s sending REFRESH_REQ to remove ORF(%d) (%s) for afi/safi: %d/%d",
|
2002-12-13 21:15:29 +01:00
|
|
|
|
peer->host, orf_type,
|
|
|
|
|
(when_to_refresh == REFRESH_DEFER ? "defer" : "immediate"),
|
|
|
|
|
afi, safi);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
SET_FLAG (peer->af_sflags[afi][safi], PEER_STATUS_ORF_PREFIX_SEND);
|
|
|
|
|
prefix_bgp_orf_entry (s, filter->plist[FILTER_IN].plist,
|
|
|
|
|
ORF_COMMON_PART_ADD, ORF_COMMON_PART_PERMIT,
|
|
|
|
|
ORF_COMMON_PART_DENY);
|
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog_debug ("%s sending REFRESH_REQ with pfxlist ORF(%d) (%s) for afi/safi: %d/%d",
|
2002-12-13 21:15:29 +01:00
|
|
|
|
peer->host, orf_type,
|
|
|
|
|
(when_to_refresh == REFRESH_DEFER ? "defer" : "immediate"),
|
|
|
|
|
afi, safi);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Total ORF Entry Len. */
|
2005-02-09 16:51:56 +01:00
|
|
|
|
orf_len = stream_get_endp (s) - orfp - 2;
|
2002-12-13 21:15:29 +01:00
|
|
|
|
stream_putw_at (s, orfp, orf_len);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Set packet size. */
|
|
|
|
|
length = bgp_packet_set_size (s);
|
|
|
|
|
|
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
|
|
|
|
{
|
|
|
|
|
if (! orf_refresh)
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog_debug ("%s sending REFRESH_REQ for afi/safi: %d/%d",
|
2002-12-13 21:15:29 +01:00
|
|
|
|
peer->host, afi, safi);
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog_debug ("%s send message type %d, length (incl. header) %d",
|
2002-12-13 21:15:29 +01:00
|
|
|
|
peer->host, CHECK_FLAG (peer->cap, PEER_CAP_REFRESH_NEW_RCV) ?
|
|
|
|
|
BGP_MSG_ROUTE_REFRESH_NEW : BGP_MSG_ROUTE_REFRESH_OLD, length);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Make real packet. */
|
2005-05-19 04:12:25 +02:00
|
|
|
|
packet = stream_dup (s);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
stream_free (s);
|
|
|
|
|
|
|
|
|
|
/* Add packet to the peer. */
|
|
|
|
|
bgp_packet_add (peer, packet);
|
|
|
|
|
|
2004-05-01 10:44:08 +02:00
|
|
|
|
BGP_WRITE_ON (peer->t_write, bgp_write, peer->fd);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Send capability message to the peer. */
|
|
|
|
|
void
|
|
|
|
|
bgp_capability_send (struct peer *peer, afi_t afi, safi_t safi,
|
|
|
|
|
int capability_code, int action)
|
|
|
|
|
{
|
|
|
|
|
struct stream *s;
|
|
|
|
|
struct stream *packet;
|
|
|
|
|
int length;
|
|
|
|
|
|
|
|
|
|
/* Adjust safi code. */
|
|
|
|
|
if (safi == SAFI_MPLS_VPN)
|
|
|
|
|
safi = BGP_SAFI_VPNV4;
|
|
|
|
|
|
|
|
|
|
s = stream_new (BGP_MAX_PACKET_SIZE);
|
|
|
|
|
|
|
|
|
|
/* Make BGP update packet. */
|
|
|
|
|
bgp_packet_set_marker (s, BGP_MSG_CAPABILITY);
|
|
|
|
|
|
|
|
|
|
/* Encode MP_EXT capability. */
|
|
|
|
|
if (capability_code == CAPABILITY_CODE_MP)
|
|
|
|
|
{
|
|
|
|
|
stream_putc (s, action);
|
|
|
|
|
stream_putc (s, CAPABILITY_CODE_MP);
|
|
|
|
|
stream_putc (s, CAPABILITY_CODE_MP_LEN);
|
|
|
|
|
stream_putw (s, afi);
|
|
|
|
|
stream_putc (s, 0);
|
|
|
|
|
stream_putc (s, safi);
|
|
|
|
|
|
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog_debug ("%s sending CAPABILITY has %s MP_EXT CAP for afi/safi: %d/%d",
|
2002-12-13 21:15:29 +01:00
|
|
|
|
peer->host, action == CAPABILITY_ACTION_SET ?
|
|
|
|
|
"Advertising" : "Removing", afi, safi);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Set packet size. */
|
|
|
|
|
length = bgp_packet_set_size (s);
|
|
|
|
|
|
|
|
|
|
/* Make real packet. */
|
2005-05-19 04:12:25 +02:00
|
|
|
|
packet = stream_dup (s);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
stream_free (s);
|
|
|
|
|
|
|
|
|
|
/* Add packet to the peer. */
|
|
|
|
|
bgp_packet_add (peer, packet);
|
|
|
|
|
|
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog_debug ("%s send message type %d, length (incl. header) %d",
|
2002-12-13 21:15:29 +01:00
|
|
|
|
peer->host, BGP_MSG_CAPABILITY, length);
|
|
|
|
|
|
2004-05-01 10:44:08 +02:00
|
|
|
|
BGP_WRITE_ON (peer->t_write, bgp_write, peer->fd);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* RFC1771 6.8 Connection collision detection. */
|
2005-06-28 14:44:16 +02:00
|
|
|
|
static int
|
2004-05-01 10:44:08 +02:00
|
|
|
|
bgp_collision_detect (struct peer *new, struct in_addr remote_id)
|
2002-12-13 21:15:29 +01:00
|
|
|
|
{
|
2004-05-01 10:44:08 +02:00
|
|
|
|
struct peer *peer;
|
2005-04-07 Paul Jakma <paul.jakma@sun.com>
* (global): Fix up list loops to match changes in lib/linklist,
and some basic auditing of usage.
* configure.ac: define QUAGGA_NO_DEPRECATED_INTERFACES
* HACKING: Add notes about deprecating interfaces and commands.
* lib/linklist.h: Add usage comments.
Rename getdata macro to listgetdata.
Rename nextnode to listnextnode and fix its odd behaviour to be
less dangerous.
Make listgetdata macro assert node is not null, NULL list entries
should be bug condition.
ALL_LIST_ELEMENTS, new macro, forward-referencing macro for use
with for loop, Suggested by Jim Carlson of Sun.
Add ALL_LIST_ELEMENTS_RO for cases which obviously do not need the
"safety" of previous macro.
LISTNODE_ADD and DELETE macros renamed to ATTACH, DETACH, to
distinguish from the similarly named functions, and reflect their
effect better.
Add a QUAGGA_NO_DEPRECATED_INTERFACES define guarded section
with the old defines which were modified above,
for backwards compatibility - guarded to prevent Quagga using it..
* lib/linklist.c: fix up for linklist.h changes.
* ospf6d/ospf6_abr.c: (ospf6_abr_examin_brouter) change to a single
scan of the area list, rather than scanning all areas first for
INTER_ROUTER and then again for INTER_NETWORK. According to
16.2, the scan should be area specific anyway, and further
ospf6d does not seem to implement 16.3 anyway.
2005-04-07 09:30:20 +02:00
|
|
|
|
struct listnode *node, *nnode;
|
2002-12-13 21:15:29 +01:00
|
|
|
|
struct bgp *bgp;
|
|
|
|
|
|
|
|
|
|
bgp = bgp_get_default ();
|
|
|
|
|
if (! bgp)
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
|
|
/* Upon receipt of an OPEN message, the local system must examine
|
|
|
|
|
all of its connections that are in the OpenConfirm state. A BGP
|
|
|
|
|
speaker may also examine connections in an OpenSent state if it
|
|
|
|
|
knows the BGP Identifier of the peer by means outside of the
|
|
|
|
|
protocol. If among these connections there is a connection to a
|
|
|
|
|
remote BGP speaker whose BGP Identifier equals the one in the
|
|
|
|
|
OPEN message, then the local system performs the following
|
|
|
|
|
collision resolution procedure: */
|
|
|
|
|
|
2005-04-07 Paul Jakma <paul.jakma@sun.com>
* (global): Fix up list loops to match changes in lib/linklist,
and some basic auditing of usage.
* configure.ac: define QUAGGA_NO_DEPRECATED_INTERFACES
* HACKING: Add notes about deprecating interfaces and commands.
* lib/linklist.h: Add usage comments.
Rename getdata macro to listgetdata.
Rename nextnode to listnextnode and fix its odd behaviour to be
less dangerous.
Make listgetdata macro assert node is not null, NULL list entries
should be bug condition.
ALL_LIST_ELEMENTS, new macro, forward-referencing macro for use
with for loop, Suggested by Jim Carlson of Sun.
Add ALL_LIST_ELEMENTS_RO for cases which obviously do not need the
"safety" of previous macro.
LISTNODE_ADD and DELETE macros renamed to ATTACH, DETACH, to
distinguish from the similarly named functions, and reflect their
effect better.
Add a QUAGGA_NO_DEPRECATED_INTERFACES define guarded section
with the old defines which were modified above,
for backwards compatibility - guarded to prevent Quagga using it..
* lib/linklist.c: fix up for linklist.h changes.
* ospf6d/ospf6_abr.c: (ospf6_abr_examin_brouter) change to a single
scan of the area list, rather than scanning all areas first for
INTER_ROUTER and then again for INTER_NETWORK. According to
16.2, the scan should be area specific anyway, and further
ospf6d does not seem to implement 16.3 anyway.
2005-04-07 09:30:20 +02:00
|
|
|
|
for (ALL_LIST_ELEMENTS (bgp->peer, node, nnode, peer))
|
2002-12-13 21:15:29 +01:00
|
|
|
|
{
|
|
|
|
|
/* Under OpenConfirm status, local peer structure already hold
|
|
|
|
|
remote router ID. */
|
2004-05-01 10:44:08 +02:00
|
|
|
|
|
|
|
|
|
if (peer != new
|
|
|
|
|
&& (peer->status == OpenConfirm || peer->status == OpenSent)
|
|
|
|
|
&& sockunion_same (&peer->su, &new->su))
|
|
|
|
|
{
|
2002-12-13 21:15:29 +01:00
|
|
|
|
/* 1. The BGP Identifier of the local system is compared to
|
|
|
|
|
the BGP Identifier of the remote system (as specified in
|
|
|
|
|
the OPEN message). */
|
|
|
|
|
|
|
|
|
|
if (ntohl (peer->local_id.s_addr) < ntohl (remote_id.s_addr))
|
|
|
|
|
{
|
|
|
|
|
/* 2. If the value of the local BGP Identifier is less
|
|
|
|
|
than the remote one, the local system closes BGP
|
|
|
|
|
connection that already exists (the one that is
|
|
|
|
|
already in the OpenConfirm state), and accepts BGP
|
|
|
|
|
connection initiated by the remote system. */
|
|
|
|
|
|
2004-05-01 10:44:08 +02:00
|
|
|
|
if (peer->fd >= 0)
|
2004-05-20 11:19:34 +02:00
|
|
|
|
bgp_notify_send (peer, BGP_NOTIFY_CEASE, BGP_NOTIFY_CEASE_COLLISION_RESOLUTION);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
/* 3. Otherwise, the local system closes newly created
|
|
|
|
|
BGP connection (the one associated with the newly
|
|
|
|
|
received OPEN message), and continues to use the
|
|
|
|
|
existing one (the one that is already in the
|
|
|
|
|
OpenConfirm state). */
|
|
|
|
|
|
2004-05-01 10:44:08 +02:00
|
|
|
|
if (new->fd >= 0)
|
2004-07-09 14:11:31 +02:00
|
|
|
|
bgp_notify_send (new, BGP_NOTIFY_CEASE,
|
|
|
|
|
BGP_NOTIFY_CEASE_COLLISION_RESOLUTION);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
return -1;
|
|
|
|
|
}
|
2004-05-01 10:44:08 +02:00
|
|
|
|
}
|
|
|
|
|
}
|
2002-12-13 21:15:29 +01:00
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2005-06-28 14:44:16 +02:00
|
|
|
|
static int
|
2002-12-13 21:15:29 +01:00
|
|
|
|
bgp_open_receive (struct peer *peer, bgp_size_t size)
|
|
|
|
|
{
|
|
|
|
|
int ret;
|
|
|
|
|
u_char version;
|
|
|
|
|
u_char optlen;
|
|
|
|
|
u_int16_t holdtime;
|
|
|
|
|
u_int16_t send_holdtime;
|
|
|
|
|
as_t remote_as;
|
[bgpd] Merge AS4 support
2007-10-14 Paul Jakma <paul.jakma@sun.com>
* NEWS: Note that MRT dumps are now version 2
* (general) Merge in Juergen Kammer's AS4 patch.
2007-09-27 Paul Jakma <paul.jakma@sun.com>
* bgp_aspath.c: (assegment_normalise) remove duplicates from
from sets.
(aspath_reconcile_as4) disregard a broken part of the RFC around
error handling in path reconciliation.
* aspath_test.c: Test dupe-weeding from sets.
Test that reconciliation merges AS_PATH and AS4_PATH where
former is shorter than latter.
2007-09-26 Paul Jakma <paul.jakma@sun.com>
* aspath_test.c: Test AS4_PATH reconcilation where length
of AS_PATH and AS4_PATH is same.
2007-09-25 Paul Jakma <paul.jakma@sun.com>
* bgp_open.c: (peek_for_as4_capability) Fix to work.
* bgp_packet.c: (bgp_open_receive) Fix sanity check of as4.
* tests/bgp_capability_test.c: (general) Extend tests to validate
peek_for_as4_capability.
Add test of full OPEN Option block, with multiple capabilities,
both as a series of Option, and a single option.
Add some crap to beginning of stream, to prevent code depending
on getp == 0.
2007-09-18 Paul Jakma <paul.jakma@sun.com>
* bgp_open.c: (bgp_capability_as4) debug printf inline with others.
(peek_for_as4_capability) There's no need to signal failure, as
failure is better dealt with through full capability parser -
just return the AS4, simpler.
* bgp_packet.c: (bgp_open_receive) Update to match
peek_for_as4_capability change.
Allow use of BGP_AS_TRANS by 2b speakers.
Use NOTIFY_OPEN_ERR rather than CEASE for OPEN parsing errors.
(bgp_capability_msg_parse) missing argument to debug print
(bgp_capability_receive) missing return values.
* tests/bgp_capability_test.c: (parse_test) update for changes to
peek_for_as4_capability
2007-07-25 Paul Jakma <paul.jakma@sun.com>
* Remove 2-byte size macros, just make existing macros take
argument to indicate which size to use.
Adjust all users - typically they want '1'.
* bgp_aspath.c: (aspath_has_as4) New, return 1 if there are any
as4's in a path.
(aspath_put) Return the number of bytes actually written, to
fix the bug Juergen noted: Splitting of segments will change
the number of bytes written from that already written to the
AS_PATH header.
(aspath_snmp_pathseg) Pass 2-byte flag to aspath_put. SNMP
is still defined as 2b.
(aspath_aggregate) fix latent bug.
(aspath_reconcile_as4) AS_PATH+NEW_AS_PATH reconciliation
function.
(aspath_key_make) Hash the AS_PATH string, rather than
just taking the addition of assegment ASes as the hash value,
hopefully sligthly more collision resistant.
(bgp_attr_munge_as4_attrs) Collide the NEW_ attributes
together with the OLD 2-byte forms, code Juergen
had in bgp_attr_parse but re-organised a bit.
(bgp_attr_parse) Bunch of code from Juergen moves
to previous function.
(bgp_packet_attribute) Compact significantly by
just /always/ using extended-length attr header.
Fix bug Juergen noted, by using aspath_put's
(new) returned size value for the attr header rather
than the (guesstimate) of aspath_size() - the two could
differ when aspath_put had to split large segments, unlikely
this bug was ever hit in the 'wild'.
(bgp_dump_routes_attr) Always use extended-len and
use aspath_put return for header length. Output 4b ASN
for AS_PATH and AGGREGATOR.
* bgp_ecommunity.c: (ecommunity_{hash_make,cmp}) fix
hash callback declarations to match prototypes.
(ecommunity_gettoken) Updated for ECOMMUNITY_ENCODE_AS4,
complete rewrite of Juergen's changes (no asdot support)
* bgp_open.c: (bgp_capability_as4) New, does what it says
on the tin.
(peek_for_as4_capability) Rewritten to use streams and
bgp_capability_as4.
* bgp_packet.c: (bgp_open_send) minor edit
checked (in the abstract at least) with Juergen.
Changes are to be more accepting, e.g, allow AS_TRANS on
a 2-byte session.
* (general) Update all commands to use CMD_AS_RANGE.
* bgp_vty.c: (bgp_clear) Fix return vals to use CMD_..
Remove stuff replicated by VTY_GET_LONG
(bgp_clear_vty) Return bgp_clear directly to vty.
* tests/aspath_test.c: Exercise 32bit parsing. Test reconcile
function.
* tests/ecommunity_test.c: New, test AS4 ecommunity changes,
positive test only at this time, error cases not tested yet.
2007-07-25 Juergen Kammer <j.kammer@eurodata.de>
* (general) AS4 support.
* bgpd.h: as_t changes to 4-bytes.
* bgp_aspath.h: Add BGP_AS4_MAX and BGP_AS_TRANS defines.
* bgp_aspath.c: AS_VALUE_SIZE becomes 4-byte, AS16_VALUE_SIZE
added for 2-byte.
Add AS16 versions of length calc macros.
(aspath_count_numas) New, count number of ASes.
(aspath_has_as4) New, return 1 if there are any as4's in a
path.
(assegments_parse) Interpret assegment as 4 or 2 byte,
according to how the caller instructs us, with a new
argument.
(aspath_parse) Add use32bit argument to pass to
assegments_parse. Adjust all its callers to pass 1, unless
otherwise noted.
(assegment_data_put) Adjust to be able to write 2 or 4 byte
AS, according to new use32bit argument.
(aspath_put) Adjust to write 2 or 4.
(aspath_gettoken) Use a long for passed in asno.
* bgp_attr.c: (attr_str) Add BGP_ATTR_AS4_PATH and
BGP_ATTR_AS4_AGGREGATOR.
(bgp_attr_aspath) Call aspath_parse with right 2/4 arg, as
determined by received-capability flag.
(bgp_attr_aspath_check) New, code previously in attr_aspath
but moved to new func so it can be run after NEW_AS_PATH
reconciliation.
(bgp_attr_as4_path) New, handle NEW_AS_PATH.
(bgp_attr_aggregator) Adjust to cope with 2/4 byte ASes.
(bgp_attr_as4_aggregator) New, read NEW_AGGREGATOR.
(bgp_attr_parse) Add handoffs to previous parsers for the two
new AS4 NEW_ attributes.
Various checks added for NEW/OLD reconciliation.
(bgp_packet_attribute) Support 2/4 for AS_PATH and
AGGREGATOR, detect when NEW_ attrs need to be sent.
* bgp_debug.{c,h}: Add 'debug bgp as4'.
* bgp_dump.c: MRTv2 support, unconditionally enabled, which
supports AS4. Based on patches from Erik (RIPE?).
* bgp_ecommunity.c: (ecommunity_ecom2str) ECOMMUNITY_ENCODE_AS4
support.
* bgp_open.c: (peek_for_as4_capability) New, peek for AS4
capability prior to full capability parsing, so we know which
ASN to use for struct peer lookup.
(bgp_open_capability) Always send AS4 capability.
* bgp_packet.c: (bgp_open_send) AS4 handling for AS field
(bgp_open_receive) Peek for AS4 capability first, and figure
out which AS to believe.
* bgp_vty.c: (bgp_show_peer) Print AS4 cap
* tests/aspath_test.c: Support asn32 changes, call aspath_parse
with 16 bit.
* vtysh/extract.pl: AS4 compatibility for router bgp ASNUMBER
* vtysh/extract.pl.in: AS4 compatibility for router bgp ASNUMBER
* vtysh/vtysh.c: AS4 compatibility for router bgp ASNUMBER
2007-10-15 00:32:21 +02:00
|
|
|
|
as_t as4 = 0;
|
2002-12-13 21:15:29 +01:00
|
|
|
|
struct peer *realpeer;
|
|
|
|
|
struct in_addr remote_id;
|
|
|
|
|
int capability;
|
2004-06-04 19:58:18 +02:00
|
|
|
|
u_int8_t notify_data_remote_as[2];
|
|
|
|
|
u_int8_t notify_data_remote_id[4];
|
2002-12-13 21:15:29 +01:00
|
|
|
|
|
|
|
|
|
realpeer = NULL;
|
|
|
|
|
|
|
|
|
|
/* Parse open packet. */
|
|
|
|
|
version = stream_getc (peer->ibuf);
|
|
|
|
|
memcpy (notify_data_remote_as, stream_pnt (peer->ibuf), 2);
|
|
|
|
|
remote_as = stream_getw (peer->ibuf);
|
|
|
|
|
holdtime = stream_getw (peer->ibuf);
|
|
|
|
|
memcpy (notify_data_remote_id, stream_pnt (peer->ibuf), 4);
|
|
|
|
|
remote_id.s_addr = stream_get_ipv4 (peer->ibuf);
|
|
|
|
|
|
|
|
|
|
/* Receive OPEN message log */
|
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
[bgpd] Merge AS4 support
2007-10-14 Paul Jakma <paul.jakma@sun.com>
* NEWS: Note that MRT dumps are now version 2
* (general) Merge in Juergen Kammer's AS4 patch.
2007-09-27 Paul Jakma <paul.jakma@sun.com>
* bgp_aspath.c: (assegment_normalise) remove duplicates from
from sets.
(aspath_reconcile_as4) disregard a broken part of the RFC around
error handling in path reconciliation.
* aspath_test.c: Test dupe-weeding from sets.
Test that reconciliation merges AS_PATH and AS4_PATH where
former is shorter than latter.
2007-09-26 Paul Jakma <paul.jakma@sun.com>
* aspath_test.c: Test AS4_PATH reconcilation where length
of AS_PATH and AS4_PATH is same.
2007-09-25 Paul Jakma <paul.jakma@sun.com>
* bgp_open.c: (peek_for_as4_capability) Fix to work.
* bgp_packet.c: (bgp_open_receive) Fix sanity check of as4.
* tests/bgp_capability_test.c: (general) Extend tests to validate
peek_for_as4_capability.
Add test of full OPEN Option block, with multiple capabilities,
both as a series of Option, and a single option.
Add some crap to beginning of stream, to prevent code depending
on getp == 0.
2007-09-18 Paul Jakma <paul.jakma@sun.com>
* bgp_open.c: (bgp_capability_as4) debug printf inline with others.
(peek_for_as4_capability) There's no need to signal failure, as
failure is better dealt with through full capability parser -
just return the AS4, simpler.
* bgp_packet.c: (bgp_open_receive) Update to match
peek_for_as4_capability change.
Allow use of BGP_AS_TRANS by 2b speakers.
Use NOTIFY_OPEN_ERR rather than CEASE for OPEN parsing errors.
(bgp_capability_msg_parse) missing argument to debug print
(bgp_capability_receive) missing return values.
* tests/bgp_capability_test.c: (parse_test) update for changes to
peek_for_as4_capability
2007-07-25 Paul Jakma <paul.jakma@sun.com>
* Remove 2-byte size macros, just make existing macros take
argument to indicate which size to use.
Adjust all users - typically they want '1'.
* bgp_aspath.c: (aspath_has_as4) New, return 1 if there are any
as4's in a path.
(aspath_put) Return the number of bytes actually written, to
fix the bug Juergen noted: Splitting of segments will change
the number of bytes written from that already written to the
AS_PATH header.
(aspath_snmp_pathseg) Pass 2-byte flag to aspath_put. SNMP
is still defined as 2b.
(aspath_aggregate) fix latent bug.
(aspath_reconcile_as4) AS_PATH+NEW_AS_PATH reconciliation
function.
(aspath_key_make) Hash the AS_PATH string, rather than
just taking the addition of assegment ASes as the hash value,
hopefully sligthly more collision resistant.
(bgp_attr_munge_as4_attrs) Collide the NEW_ attributes
together with the OLD 2-byte forms, code Juergen
had in bgp_attr_parse but re-organised a bit.
(bgp_attr_parse) Bunch of code from Juergen moves
to previous function.
(bgp_packet_attribute) Compact significantly by
just /always/ using extended-length attr header.
Fix bug Juergen noted, by using aspath_put's
(new) returned size value for the attr header rather
than the (guesstimate) of aspath_size() - the two could
differ when aspath_put had to split large segments, unlikely
this bug was ever hit in the 'wild'.
(bgp_dump_routes_attr) Always use extended-len and
use aspath_put return for header length. Output 4b ASN
for AS_PATH and AGGREGATOR.
* bgp_ecommunity.c: (ecommunity_{hash_make,cmp}) fix
hash callback declarations to match prototypes.
(ecommunity_gettoken) Updated for ECOMMUNITY_ENCODE_AS4,
complete rewrite of Juergen's changes (no asdot support)
* bgp_open.c: (bgp_capability_as4) New, does what it says
on the tin.
(peek_for_as4_capability) Rewritten to use streams and
bgp_capability_as4.
* bgp_packet.c: (bgp_open_send) minor edit
checked (in the abstract at least) with Juergen.
Changes are to be more accepting, e.g, allow AS_TRANS on
a 2-byte session.
* (general) Update all commands to use CMD_AS_RANGE.
* bgp_vty.c: (bgp_clear) Fix return vals to use CMD_..
Remove stuff replicated by VTY_GET_LONG
(bgp_clear_vty) Return bgp_clear directly to vty.
* tests/aspath_test.c: Exercise 32bit parsing. Test reconcile
function.
* tests/ecommunity_test.c: New, test AS4 ecommunity changes,
positive test only at this time, error cases not tested yet.
2007-07-25 Juergen Kammer <j.kammer@eurodata.de>
* (general) AS4 support.
* bgpd.h: as_t changes to 4-bytes.
* bgp_aspath.h: Add BGP_AS4_MAX and BGP_AS_TRANS defines.
* bgp_aspath.c: AS_VALUE_SIZE becomes 4-byte, AS16_VALUE_SIZE
added for 2-byte.
Add AS16 versions of length calc macros.
(aspath_count_numas) New, count number of ASes.
(aspath_has_as4) New, return 1 if there are any as4's in a
path.
(assegments_parse) Interpret assegment as 4 or 2 byte,
according to how the caller instructs us, with a new
argument.
(aspath_parse) Add use32bit argument to pass to
assegments_parse. Adjust all its callers to pass 1, unless
otherwise noted.
(assegment_data_put) Adjust to be able to write 2 or 4 byte
AS, according to new use32bit argument.
(aspath_put) Adjust to write 2 or 4.
(aspath_gettoken) Use a long for passed in asno.
* bgp_attr.c: (attr_str) Add BGP_ATTR_AS4_PATH and
BGP_ATTR_AS4_AGGREGATOR.
(bgp_attr_aspath) Call aspath_parse with right 2/4 arg, as
determined by received-capability flag.
(bgp_attr_aspath_check) New, code previously in attr_aspath
but moved to new func so it can be run after NEW_AS_PATH
reconciliation.
(bgp_attr_as4_path) New, handle NEW_AS_PATH.
(bgp_attr_aggregator) Adjust to cope with 2/4 byte ASes.
(bgp_attr_as4_aggregator) New, read NEW_AGGREGATOR.
(bgp_attr_parse) Add handoffs to previous parsers for the two
new AS4 NEW_ attributes.
Various checks added for NEW/OLD reconciliation.
(bgp_packet_attribute) Support 2/4 for AS_PATH and
AGGREGATOR, detect when NEW_ attrs need to be sent.
* bgp_debug.{c,h}: Add 'debug bgp as4'.
* bgp_dump.c: MRTv2 support, unconditionally enabled, which
supports AS4. Based on patches from Erik (RIPE?).
* bgp_ecommunity.c: (ecommunity_ecom2str) ECOMMUNITY_ENCODE_AS4
support.
* bgp_open.c: (peek_for_as4_capability) New, peek for AS4
capability prior to full capability parsing, so we know which
ASN to use for struct peer lookup.
(bgp_open_capability) Always send AS4 capability.
* bgp_packet.c: (bgp_open_send) AS4 handling for AS field
(bgp_open_receive) Peek for AS4 capability first, and figure
out which AS to believe.
* bgp_vty.c: (bgp_show_peer) Print AS4 cap
* tests/aspath_test.c: Support asn32 changes, call aspath_parse
with 16 bit.
* vtysh/extract.pl: AS4 compatibility for router bgp ASNUMBER
* vtysh/extract.pl.in: AS4 compatibility for router bgp ASNUMBER
* vtysh/vtysh.c: AS4 compatibility for router bgp ASNUMBER
2007-10-15 00:32:21 +02:00
|
|
|
|
zlog_debug ("%s rcv OPEN, version %d, remote-as (in open) %d,"
|
|
|
|
|
" holdtime %d, id %s",
|
|
|
|
|
peer->host, version, remote_as, holdtime,
|
|
|
|
|
inet_ntoa (remote_id));
|
|
|
|
|
|
|
|
|
|
/* BEGIN to read the capability here, but dont do it yet */
|
|
|
|
|
capability = 0;
|
|
|
|
|
optlen = stream_getc (peer->ibuf);
|
|
|
|
|
|
|
|
|
|
if (optlen != 0)
|
|
|
|
|
{
|
|
|
|
|
/* We need the as4 capability value *right now* because
|
|
|
|
|
* if it is there, we have not got the remote_as yet, and without
|
|
|
|
|
* that we do not know which peer is connecting to us now.
|
|
|
|
|
*/
|
|
|
|
|
as4 = peek_for_as4_capability (peer, optlen);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Just in case we have a silly peer who sends AS4 capability set to 0 */
|
|
|
|
|
if (CHECK_FLAG (peer->cap, PEER_CAP_AS4_RCV) && !as4)
|
|
|
|
|
{
|
|
|
|
|
zlog_err ("%s bad OPEN, got AS4 capability, but AS4 set to 0",
|
|
|
|
|
peer->host);
|
|
|
|
|
bgp_notify_send (peer, BGP_NOTIFY_OPEN_ERR,
|
|
|
|
|
BGP_NOTIFY_OPEN_BAD_PEER_AS);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (remote_as == BGP_AS_TRANS)
|
|
|
|
|
{
|
|
|
|
|
/* Take the AS4 from the capability. We must have received the
|
|
|
|
|
* capability now! Otherwise we have a asn16 peer who uses
|
|
|
|
|
* BGP_AS_TRANS, for some unknown reason.
|
|
|
|
|
*/
|
|
|
|
|
if (as4 == BGP_AS_TRANS)
|
|
|
|
|
{
|
|
|
|
|
zlog_err ("%s [AS4] NEW speaker using AS_TRANS for AS4, not allowed",
|
|
|
|
|
peer->host);
|
|
|
|
|
bgp_notify_send (peer, BGP_NOTIFY_OPEN_ERR,
|
|
|
|
|
BGP_NOTIFY_OPEN_BAD_PEER_AS);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!as4 && BGP_DEBUG (as4, AS4))
|
|
|
|
|
zlog_debug ("%s [AS4] OPEN remote_as is AS_TRANS, but no AS4."
|
|
|
|
|
" Odd, but proceeding.", peer->host);
|
|
|
|
|
else if (as4 < BGP_AS_MAX && BGP_DEBUG (as4, AS4))
|
|
|
|
|
zlog_debug ("%s [AS4] OPEN remote_as is AS_TRANS, but AS4 fits "
|
|
|
|
|
"in 2-bytes, very odd peer.", peer->host, as4);
|
|
|
|
|
if (as4)
|
|
|
|
|
remote_as = as4;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
/* We may have a partner with AS4 who has an asno < BGP_AS_MAX */
|
|
|
|
|
/* If we have got the capability, peer->as4cap must match remote_as */
|
|
|
|
|
if (CHECK_FLAG (peer->cap, PEER_CAP_AS4_RCV)
|
|
|
|
|
&& as4 != remote_as)
|
|
|
|
|
{
|
|
|
|
|
/* raise error, log this, close session */
|
|
|
|
|
zlog_err ("%s bad OPEN, got AS4 capability, but remote_as %u"
|
|
|
|
|
" mismatch with 16bit 'myasn' %u in open",
|
|
|
|
|
peer->host, as4, remote_as);
|
|
|
|
|
bgp_notify_send (peer, BGP_NOTIFY_OPEN_ERR,
|
|
|
|
|
BGP_NOTIFY_OPEN_BAD_PEER_AS);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2002-12-13 21:15:29 +01:00
|
|
|
|
/* Lookup peer from Open packet. */
|
|
|
|
|
if (CHECK_FLAG (peer->sflags, PEER_STATUS_ACCEPT_PEER))
|
|
|
|
|
{
|
|
|
|
|
int as = 0;
|
|
|
|
|
|
|
|
|
|
realpeer = peer_lookup_with_open (&peer->su, remote_as, &remote_id, &as);
|
|
|
|
|
|
|
|
|
|
if (! realpeer)
|
|
|
|
|
{
|
|
|
|
|
/* Peer's source IP address is check in bgp_accept(), so this
|
|
|
|
|
must be AS number mismatch or remote-id configuration
|
|
|
|
|
mismatch. */
|
|
|
|
|
if (as)
|
|
|
|
|
{
|
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog_debug ("%s bad OPEN, wrong router identifier %s",
|
|
|
|
|
peer->host, inet_ntoa (remote_id));
|
|
|
|
|
bgp_notify_send_with_data (peer, BGP_NOTIFY_OPEN_ERR,
|
|
|
|
|
BGP_NOTIFY_OPEN_BAD_BGP_IDENT,
|
|
|
|
|
notify_data_remote_id, 4);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog_debug ("%s bad OPEN, remote AS is %d, expected %d",
|
|
|
|
|
peer->host, remote_as, peer->as);
|
|
|
|
|
bgp_notify_send_with_data (peer, BGP_NOTIFY_OPEN_ERR,
|
|
|
|
|
BGP_NOTIFY_OPEN_BAD_PEER_AS,
|
|
|
|
|
notify_data_remote_as, 2);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
}
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* When collision is detected and this peer is closed. Retrun
|
|
|
|
|
immidiately. */
|
|
|
|
|
ret = bgp_collision_detect (peer, remote_id);
|
|
|
|
|
if (ret < 0)
|
|
|
|
|
return ret;
|
|
|
|
|
|
2004-05-01 10:44:08 +02:00
|
|
|
|
/* Hack part. */
|
|
|
|
|
if (CHECK_FLAG (peer->sflags, PEER_STATUS_ACCEPT_PEER))
|
|
|
|
|
{
|
2005-02-02 15:40:33 +01:00
|
|
|
|
if (realpeer->status == Established
|
|
|
|
|
&& CHECK_FLAG (realpeer->sflags, PEER_STATUS_NSF_MODE))
|
|
|
|
|
{
|
|
|
|
|
realpeer->last_reset = PEER_DOWN_NSF_CLOSE_SESSION;
|
|
|
|
|
SET_FLAG (realpeer->sflags, PEER_STATUS_NSF_WAIT);
|
|
|
|
|
}
|
|
|
|
|
else if (ret == 0 && realpeer->status != Active
|
|
|
|
|
&& realpeer->status != OpenSent
|
|
|
|
|
&& realpeer->status != OpenConfirm)
|
|
|
|
|
|
2004-05-01 10:44:08 +02:00
|
|
|
|
{
|
|
|
|
|
if (BGP_DEBUG (events, EVENTS))
|
2005-02-02 15:40:33 +01:00
|
|
|
|
zlog_debug ("%s peer status is %s close connection",
|
|
|
|
|
realpeer->host, LOOKUP (bgp_status_msg,
|
|
|
|
|
realpeer->status));
|
|
|
|
|
bgp_notify_send (peer, BGP_NOTIFY_CEASE,
|
|
|
|
|
BGP_NOTIFY_CEASE_CONNECT_REJECT);
|
|
|
|
|
|
2004-05-01 10:44:08 +02:00
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (BGP_DEBUG (events, EVENTS))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog_debug ("%s [Event] Transfer temporary BGP peer to existing one",
|
2004-05-01 10:44:08 +02:00
|
|
|
|
peer->host);
|
|
|
|
|
|
|
|
|
|
bgp_stop (realpeer);
|
|
|
|
|
|
|
|
|
|
/* Transfer file descriptor. */
|
|
|
|
|
realpeer->fd = peer->fd;
|
|
|
|
|
peer->fd = -1;
|
|
|
|
|
|
|
|
|
|
/* Transfer input buffer. */
|
|
|
|
|
stream_free (realpeer->ibuf);
|
|
|
|
|
realpeer->ibuf = peer->ibuf;
|
|
|
|
|
realpeer->packet_size = peer->packet_size;
|
|
|
|
|
peer->ibuf = NULL;
|
|
|
|
|
|
|
|
|
|
/* Transfer status. */
|
|
|
|
|
realpeer->status = peer->status;
|
|
|
|
|
bgp_stop (peer);
|
2005-06-01 Paul Jakma <paul.jakma@sun.com>
* bgpd/(general) refcount struct peer and bgp_info, hence allowing us
add work_queues for bgp_process.
* bgpd/bgp_route.h: (struct bgp_info) Add 'lock' field for refcount.
Add bgp_info_{lock,unlock} helper functions.
Add bgp_info_{add,delete} helpers, to remove need for
users managing locking/freeing of bgp_info and bgp_node's.
* bgpd/bgp_table.h: (struct bgp_node) Add a flags field, and
BGP_NODE_PROCESS_SCHEDULED to merge redundant processing of
nodes.
* bgpd/bgp_fsm.h: Make the ON/OFF/ADD/REMOVE macros lock and unlock
peer reference as appropriate.
* bgpd/bgp_damp.c: Remove its internal prototypes for
bgp_info_delete/free. Just use bgp_info_delete.
* bgpd/bgpd.h: (struct bgp_master) Add work_queue pointers.
(struct peer) Add reference count 'lock'
(peer_lock,peer_unlock) New helpers to take/release reference
on struct peer.
* bgpd/bgp_advertise.c: (general) Add peer and bgp_info refcounting
and balance how references are taken and released.
(bgp_advertise_free) release bgp_info reference, if appropriate
(bgp_adj_out_free) unlock peer
(bgp_advertise_clean) leave the adv references alone, or else
call bgp_advertise_free cant unlock them.
(bgp_adj_out_set) lock the peer on new adj's, leave the reference
alone otherwise. lock the new bgp_info reference.
(bgp_adj_in_set) lock the peer reference
(bgp_adj_in_remove) and unlock it here
(bgp_sync_delete) make hash_free on peer conditional, just in
case.
* bgpd/bgp_fsm.c: (general) document that the timers depend on
bgp_event to release a peer reference.
(bgp_fsm_change_status) moved up the file, unchanged.
(bgp_stop) Decrement peer lock as many times as cancel_event
canceled - shouldnt be needed but just in case.
stream_fifo_clean of obuf made conditional, just in case.
(bgp_event) always unlock the peer, regardless of return value
of bgp_fsm_change_status.
* bgpd/bgp_packet.c: (general) change several bgp_stop's to BGP_EVENT's.
(bgp_read) Add a mysterious extra peer_unlock for ACCEPT_PEERs
along with a comment on it.
* bgpd/bgp_route.c: (general) Add refcounting of bgp_info, cleanup
some of the resource management around bgp_info. Refcount peer.
Add workqueues for bgp_process and clear_table.
(bgp_info_new) make static
(bgp_info_free) Ditto, and unlock the peer reference.
(bgp_info_lock,bgp_info_unlock) new exported functions
(bgp_info_add) Add a bgp_info to a bgp_node in correct fashion,
taking care of reference counts.
(bgp_info_delete) do the opposite of bgp_info_add.
(bgp_process_rsclient) Converted into a work_queue work function.
(bgp_process_main) ditto.
(bgp_processq_del) process work queue item deconstructor
(bgp_process_queue_init) process work queue init
(bgp_process) call init function if required, set up queue item
and add to queue, rather than calling process functions directly.
(bgp_rib_remove) let bgp_info_delete manage bgp_info refcounts
(bgp_rib_withdraw) ditto
(bgp_update_rsclient) let bgp_info_add manage refcounts
(bgp_update_main) ditto
(bgp_clear_route_node) clear_node_queue work function, does
per-node aspects of what bgp_clear_route_table did previously
(bgp_clear_node_queue_del) clear_node_queue item delete function
(bgp_clear_node_complete) clear_node_queue completion function,
it unplugs the process queues, which have to be blocked while
clear_node_queue is being processed to prevent a race.
(bgp_clear_node_queue_init) init function for clear_node_queue
work queues
(bgp_clear_route_table) Sets up items onto a workqueue now, rather
than clearing each node directly. Plugs both process queues to
avoid potential race.
(bgp_static_withdraw_rsclient) let bgp_info_{add,delete} manage
bgp_info refcounts.
(bgp_static_update_rsclient) ditto
(bgp_static_update_main) ditto
(bgp_static_update_vpnv4) ditto, remove unneeded cast.
(bgp_static_withdraw) see bgp_static_withdraw_rsclient
(bgp_static_withdraw_vpnv4) ditto
(bgp_aggregate_{route,add,delete}) ditto
(bgp_redistribute_{add,delete,withdraw}) ditto
* bgpd/bgp_vty.c: (peer_rsclient_set_vty) lock rsclient list peer
reference
(peer_rsclient_unset_vty) ditto, but unlock same reference
* bgpd/bgpd.c: (peer_free) handle frees of info to be kept for lifetime
of struct peer.
(peer_lock,peer_unlock) peer refcount helpers
(peer_new) add initial refcounts
(peer_create,peer_create_accept) lock peer as appropriate
(peer_delete) unlock as appropriate, move out some free's to
peer_free.
(peer_group_bind,peer_group_unbind) peer refcounting as
appropriate.
(bgp_create) check CALLOC return value.
(bgp_terminate) free workqueues too.
* lib/memtypes.c: Add MTYPE_BGP_PROCESS_QUEUE and
MTYPE_BGP_CLEAR_NODE_QUEUE
2005-06-01 13:17:05 +02:00
|
|
|
|
|
2004-05-01 10:44:08 +02:00
|
|
|
|
/* peer pointer change. Open packet send to neighbor. */
|
|
|
|
|
peer = realpeer;
|
|
|
|
|
bgp_open_send (peer);
|
|
|
|
|
if (peer->fd < 0)
|
|
|
|
|
{
|
|
|
|
|
zlog_err ("bgp_open_receive peer's fd is negative value %d",
|
|
|
|
|
peer->fd);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
BGP_READ_ON (peer->t_read, bgp_read, peer->fd);
|
|
|
|
|
}
|
|
|
|
|
|
2002-12-13 21:15:29 +01:00
|
|
|
|
/* remote router-id check. */
|
|
|
|
|
if (remote_id.s_addr == 0
|
|
|
|
|
|| ntohl (remote_id.s_addr) >= 0xe0000000
|
|
|
|
|
|| ntohl (peer->local_id.s_addr) == ntohl (remote_id.s_addr))
|
|
|
|
|
{
|
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog_debug ("%s bad OPEN, wrong router identifier %s",
|
2002-12-13 21:15:29 +01:00
|
|
|
|
peer->host, inet_ntoa (remote_id));
|
|
|
|
|
bgp_notify_send_with_data (peer,
|
|
|
|
|
BGP_NOTIFY_OPEN_ERR,
|
|
|
|
|
BGP_NOTIFY_OPEN_BAD_BGP_IDENT,
|
|
|
|
|
notify_data_remote_id, 4);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Set remote router-id */
|
|
|
|
|
peer->remote_id = remote_id;
|
|
|
|
|
|
|
|
|
|
/* Peer BGP version check. */
|
|
|
|
|
if (version != BGP_VERSION_4)
|
|
|
|
|
{
|
2004-06-04 19:58:18 +02:00
|
|
|
|
u_int8_t maxver = BGP_VERSION_4;
|
2002-12-13 21:15:29 +01:00
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog_debug ("%s bad protocol version, remote requested %d, local request %d",
|
2002-12-13 21:15:29 +01:00
|
|
|
|
peer->host, version, BGP_VERSION_4);
|
|
|
|
|
bgp_notify_send_with_data (peer,
|
|
|
|
|
BGP_NOTIFY_OPEN_ERR,
|
|
|
|
|
BGP_NOTIFY_OPEN_UNSUP_VERSION,
|
2004-06-04 19:58:18 +02:00
|
|
|
|
&maxver, 1);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Check neighbor as number. */
|
|
|
|
|
if (remote_as != peer->as)
|
|
|
|
|
{
|
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog_debug ("%s bad OPEN, remote AS is %d, expected %d",
|
2002-12-13 21:15:29 +01:00
|
|
|
|
peer->host, remote_as, peer->as);
|
|
|
|
|
bgp_notify_send_with_data (peer,
|
|
|
|
|
BGP_NOTIFY_OPEN_ERR,
|
|
|
|
|
BGP_NOTIFY_OPEN_BAD_PEER_AS,
|
|
|
|
|
notify_data_remote_as, 2);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* From the rfc: Upon receipt of an OPEN message, a BGP speaker MUST
|
|
|
|
|
calculate the value of the Hold Timer by using the smaller of its
|
|
|
|
|
configured Hold Time and the Hold Time received in the OPEN message.
|
|
|
|
|
The Hold Time MUST be either zero or at least three seconds. An
|
|
|
|
|
implementation may reject connections on the basis of the Hold Time. */
|
|
|
|
|
|
|
|
|
|
if (holdtime < 3 && holdtime != 0)
|
|
|
|
|
{
|
|
|
|
|
bgp_notify_send (peer,
|
|
|
|
|
BGP_NOTIFY_OPEN_ERR,
|
|
|
|
|
BGP_NOTIFY_OPEN_UNACEP_HOLDTIME);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* From the rfc: A reasonable maximum time between KEEPALIVE messages
|
|
|
|
|
would be one third of the Hold Time interval. KEEPALIVE messages
|
|
|
|
|
MUST NOT be sent more frequently than one per second. An
|
|
|
|
|
implementation MAY adjust the rate at which it sends KEEPALIVE
|
|
|
|
|
messages as a function of the Hold Time interval. */
|
|
|
|
|
|
|
|
|
|
if (CHECK_FLAG (peer->config, PEER_CONFIG_TIMER))
|
|
|
|
|
send_holdtime = peer->holdtime;
|
|
|
|
|
else
|
|
|
|
|
send_holdtime = peer->bgp->default_holdtime;
|
|
|
|
|
|
|
|
|
|
if (holdtime < send_holdtime)
|
|
|
|
|
peer->v_holdtime = holdtime;
|
|
|
|
|
else
|
|
|
|
|
peer->v_holdtime = send_holdtime;
|
|
|
|
|
|
|
|
|
|
peer->v_keepalive = peer->v_holdtime / 3;
|
|
|
|
|
|
|
|
|
|
/* Open option part parse. */
|
|
|
|
|
if (optlen != 0)
|
|
|
|
|
{
|
|
|
|
|
ret = bgp_open_option_parse (peer, optlen, &capability);
|
|
|
|
|
if (ret < 0)
|
|
|
|
|
return ret;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog_debug ("%s rcvd OPEN w/ OPTION parameter len: 0",
|
2002-12-13 21:15:29 +01:00
|
|
|
|
peer->host);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Override capability. */
|
|
|
|
|
if (! capability || CHECK_FLAG (peer->flags, PEER_FLAG_OVERRIDE_CAPABILITY))
|
|
|
|
|
{
|
|
|
|
|
peer->afc_nego[AFI_IP][SAFI_UNICAST] = peer->afc[AFI_IP][SAFI_UNICAST];
|
|
|
|
|
peer->afc_nego[AFI_IP][SAFI_MULTICAST] = peer->afc[AFI_IP][SAFI_MULTICAST];
|
|
|
|
|
peer->afc_nego[AFI_IP6][SAFI_UNICAST] = peer->afc[AFI_IP6][SAFI_UNICAST];
|
|
|
|
|
peer->afc_nego[AFI_IP6][SAFI_MULTICAST] = peer->afc[AFI_IP6][SAFI_MULTICAST];
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Get sockname. */
|
|
|
|
|
bgp_getsockname (peer);
|
|
|
|
|
|
|
|
|
|
BGP_EVENT_ADD (peer, Receive_OPEN_message);
|
|
|
|
|
|
|
|
|
|
peer->packet_size = 0;
|
|
|
|
|
if (peer->ibuf)
|
|
|
|
|
stream_reset (peer->ibuf);
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Parse BGP Update packet and make attribute object. */
|
2005-06-28 14:44:16 +02:00
|
|
|
|
static int
|
2002-12-13 21:15:29 +01:00
|
|
|
|
bgp_update_receive (struct peer *peer, bgp_size_t size)
|
|
|
|
|
{
|
|
|
|
|
int ret;
|
|
|
|
|
u_char *end;
|
|
|
|
|
struct stream *s;
|
|
|
|
|
struct attr attr;
|
|
|
|
|
bgp_size_t attribute_len;
|
|
|
|
|
bgp_size_t update_len;
|
|
|
|
|
bgp_size_t withdraw_len;
|
|
|
|
|
struct bgp_nlri update;
|
|
|
|
|
struct bgp_nlri withdraw;
|
|
|
|
|
struct bgp_nlri mp_update;
|
|
|
|
|
struct bgp_nlri mp_withdraw;
|
2004-07-09 19:48:53 +02:00
|
|
|
|
char attrstr[BUFSIZ] = "";
|
2002-12-13 21:15:29 +01:00
|
|
|
|
|
|
|
|
|
/* Status must be Established. */
|
|
|
|
|
if (peer->status != Established)
|
|
|
|
|
{
|
|
|
|
|
zlog_err ("%s [FSM] Update packet received under status %s",
|
|
|
|
|
peer->host, LOOKUP (bgp_status_msg, peer->status));
|
|
|
|
|
bgp_notify_send (peer, BGP_NOTIFY_FSM_ERR, 0);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Set initial values. */
|
|
|
|
|
memset (&attr, 0, sizeof (struct attr));
|
|
|
|
|
memset (&update, 0, sizeof (struct bgp_nlri));
|
|
|
|
|
memset (&withdraw, 0, sizeof (struct bgp_nlri));
|
|
|
|
|
memset (&mp_update, 0, sizeof (struct bgp_nlri));
|
|
|
|
|
memset (&mp_withdraw, 0, sizeof (struct bgp_nlri));
|
|
|
|
|
|
|
|
|
|
s = peer->ibuf;
|
|
|
|
|
end = stream_pnt (s) + size;
|
|
|
|
|
|
|
|
|
|
/* RFC1771 6.3 If the Unfeasible Routes Length or Total Attribute
|
|
|
|
|
Length is too large (i.e., if Unfeasible Routes Length + Total
|
|
|
|
|
Attribute Length + 23 exceeds the message Length), then the Error
|
|
|
|
|
Subcode is set to Malformed Attribute List. */
|
|
|
|
|
if (stream_pnt (s) + 2 > end)
|
|
|
|
|
{
|
|
|
|
|
zlog_err ("%s [Error] Update packet error"
|
|
|
|
|
" (packet length is short for unfeasible length)",
|
|
|
|
|
peer->host);
|
|
|
|
|
bgp_notify_send (peer, BGP_NOTIFY_UPDATE_ERR,
|
|
|
|
|
BGP_NOTIFY_UPDATE_MAL_ATTR);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Unfeasible Route Length. */
|
|
|
|
|
withdraw_len = stream_getw (s);
|
|
|
|
|
|
|
|
|
|
/* Unfeasible Route Length check. */
|
|
|
|
|
if (stream_pnt (s) + withdraw_len > end)
|
|
|
|
|
{
|
|
|
|
|
zlog_err ("%s [Error] Update packet error"
|
|
|
|
|
" (packet unfeasible length overflow %d)",
|
|
|
|
|
peer->host, withdraw_len);
|
|
|
|
|
bgp_notify_send (peer, BGP_NOTIFY_UPDATE_ERR,
|
|
|
|
|
BGP_NOTIFY_UPDATE_MAL_ATTR);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Unfeasible Route packet format check. */
|
|
|
|
|
if (withdraw_len > 0)
|
|
|
|
|
{
|
|
|
|
|
ret = bgp_nlri_sanity_check (peer, AFI_IP, stream_pnt (s), withdraw_len);
|
|
|
|
|
if (ret < 0)
|
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
|
|
if (BGP_DEBUG (packet, PACKET_RECV))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog_debug ("%s [Update:RECV] Unfeasible NLRI received", peer->host);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
|
|
|
|
|
withdraw.afi = AFI_IP;
|
|
|
|
|
withdraw.safi = SAFI_UNICAST;
|
|
|
|
|
withdraw.nlri = stream_pnt (s);
|
|
|
|
|
withdraw.length = withdraw_len;
|
2005-02-09 16:51:56 +01:00
|
|
|
|
stream_forward_getp (s, withdraw_len);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Attribute total length check. */
|
|
|
|
|
if (stream_pnt (s) + 2 > end)
|
|
|
|
|
{
|
|
|
|
|
zlog_warn ("%s [Error] Packet Error"
|
|
|
|
|
" (update packet is short for attribute length)",
|
|
|
|
|
peer->host);
|
|
|
|
|
bgp_notify_send (peer, BGP_NOTIFY_UPDATE_ERR,
|
|
|
|
|
BGP_NOTIFY_UPDATE_MAL_ATTR);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Fetch attribute total length. */
|
|
|
|
|
attribute_len = stream_getw (s);
|
|
|
|
|
|
|
|
|
|
/* Attribute length check. */
|
|
|
|
|
if (stream_pnt (s) + attribute_len > end)
|
|
|
|
|
{
|
|
|
|
|
zlog_warn ("%s [Error] Packet Error"
|
|
|
|
|
" (update packet attribute length overflow %d)",
|
|
|
|
|
peer->host, attribute_len);
|
|
|
|
|
bgp_notify_send (peer, BGP_NOTIFY_UPDATE_ERR,
|
|
|
|
|
BGP_NOTIFY_UPDATE_MAL_ATTR);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Parse attribute when it exists. */
|
|
|
|
|
if (attribute_len)
|
|
|
|
|
{
|
|
|
|
|
ret = bgp_attr_parse (peer, &attr, attribute_len,
|
|
|
|
|
&mp_update, &mp_withdraw);
|
|
|
|
|
if (ret < 0)
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Logging the attribute. */
|
|
|
|
|
if (BGP_DEBUG (update, UPDATE_IN))
|
|
|
|
|
{
|
2004-07-09 19:48:53 +02:00
|
|
|
|
ret= bgp_dump_attr (peer, &attr, attrstr, BUFSIZ);
|
|
|
|
|
|
|
|
|
|
if (ret)
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog (peer->log, LOG_DEBUG, "%s rcvd UPDATE w/ attr: %s",
|
2004-07-09 19:48:53 +02:00
|
|
|
|
peer->host, attrstr);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Network Layer Reachability Information. */
|
|
|
|
|
update_len = end - stream_pnt (s);
|
|
|
|
|
|
|
|
|
|
if (update_len)
|
|
|
|
|
{
|
|
|
|
|
/* Check NLRI packet format and prefix length. */
|
|
|
|
|
ret = bgp_nlri_sanity_check (peer, AFI_IP, stream_pnt (s), update_len);
|
|
|
|
|
if (ret < 0)
|
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
|
|
/* Set NLRI portion to structure. */
|
|
|
|
|
update.afi = AFI_IP;
|
|
|
|
|
update.safi = SAFI_UNICAST;
|
|
|
|
|
update.nlri = stream_pnt (s);
|
|
|
|
|
update.length = update_len;
|
2005-02-09 16:51:56 +01:00
|
|
|
|
stream_forward_getp (s, update_len);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* NLRI is processed only when the peer is configured specific
|
|
|
|
|
Address Family and Subsequent Address Family. */
|
|
|
|
|
if (peer->afc[AFI_IP][SAFI_UNICAST])
|
|
|
|
|
{
|
|
|
|
|
if (withdraw.length)
|
|
|
|
|
bgp_nlri_parse (peer, NULL, &withdraw);
|
|
|
|
|
|
|
|
|
|
if (update.length)
|
|
|
|
|
{
|
|
|
|
|
/* We check well-known attribute only for IPv4 unicast
|
|
|
|
|
update. */
|
|
|
|
|
ret = bgp_attr_check (peer, &attr);
|
|
|
|
|
if (ret < 0)
|
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
|
|
bgp_nlri_parse (peer, &attr, &update);
|
|
|
|
|
}
|
2004-07-09 19:48:53 +02:00
|
|
|
|
|
2005-02-01 21:13:16 +01:00
|
|
|
|
if (mp_update.length
|
|
|
|
|
&& mp_update.afi == AFI_IP
|
|
|
|
|
&& mp_update.safi == SAFI_UNICAST)
|
|
|
|
|
bgp_nlri_parse (peer, &attr, &mp_update);
|
|
|
|
|
|
|
|
|
|
if (mp_withdraw.length
|
|
|
|
|
&& mp_withdraw.afi == AFI_IP
|
|
|
|
|
&& mp_withdraw.safi == SAFI_UNICAST)
|
|
|
|
|
bgp_nlri_parse (peer, NULL, &mp_withdraw);
|
|
|
|
|
|
2004-07-09 19:48:53 +02:00
|
|
|
|
if (! attribute_len && ! withdraw_len)
|
|
|
|
|
{
|
|
|
|
|
/* End-of-RIB received */
|
2005-02-02 15:40:33 +01:00
|
|
|
|
SET_FLAG (peer->af_sflags[AFI_IP][SAFI_UNICAST],
|
|
|
|
|
PEER_STATUS_EOR_RECEIVED);
|
2004-07-09 19:48:53 +02:00
|
|
|
|
|
2005-02-02 15:40:33 +01:00
|
|
|
|
/* NSF delete stale route */
|
|
|
|
|
if (peer->nsf[AFI_IP][SAFI_UNICAST])
|
|
|
|
|
bgp_clear_stale_route (peer, AFI_IP, SAFI_UNICAST);
|
|
|
|
|
|
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog (peer->log, LOG_DEBUG, "rcvd End-of-RIB for IPv4 Unicast from %s",
|
2004-07-09 19:48:53 +02:00
|
|
|
|
peer->host);
|
|
|
|
|
}
|
2002-12-13 21:15:29 +01:00
|
|
|
|
}
|
|
|
|
|
if (peer->afc[AFI_IP][SAFI_MULTICAST])
|
|
|
|
|
{
|
|
|
|
|
if (mp_update.length
|
|
|
|
|
&& mp_update.afi == AFI_IP
|
|
|
|
|
&& mp_update.safi == SAFI_MULTICAST)
|
|
|
|
|
bgp_nlri_parse (peer, &attr, &mp_update);
|
|
|
|
|
|
|
|
|
|
if (mp_withdraw.length
|
|
|
|
|
&& mp_withdraw.afi == AFI_IP
|
|
|
|
|
&& mp_withdraw.safi == SAFI_MULTICAST)
|
|
|
|
|
bgp_nlri_parse (peer, NULL, &mp_withdraw);
|
2004-07-09 19:48:53 +02:00
|
|
|
|
|
2005-02-02 15:40:33 +01:00
|
|
|
|
if (! withdraw_len
|
2004-07-09 19:48:53 +02:00
|
|
|
|
&& mp_withdraw.afi == AFI_IP
|
|
|
|
|
&& mp_withdraw.safi == SAFI_MULTICAST
|
|
|
|
|
&& mp_withdraw.length == 0)
|
|
|
|
|
{
|
|
|
|
|
/* End-of-RIB received */
|
2005-02-02 15:40:33 +01:00
|
|
|
|
SET_FLAG (peer->af_sflags[AFI_IP][SAFI_MULTICAST],
|
|
|
|
|
PEER_STATUS_EOR_RECEIVED);
|
2004-07-09 19:48:53 +02:00
|
|
|
|
|
2005-02-02 15:40:33 +01:00
|
|
|
|
/* NSF delete stale route */
|
|
|
|
|
if (peer->nsf[AFI_IP][SAFI_MULTICAST])
|
|
|
|
|
bgp_clear_stale_route (peer, AFI_IP, SAFI_MULTICAST);
|
|
|
|
|
|
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog (peer->log, LOG_DEBUG, "rcvd End-of-RIB for IPv4 Multicast from %s",
|
2004-07-09 19:48:53 +02:00
|
|
|
|
peer->host);
|
|
|
|
|
}
|
2002-12-13 21:15:29 +01:00
|
|
|
|
}
|
|
|
|
|
if (peer->afc[AFI_IP6][SAFI_UNICAST])
|
|
|
|
|
{
|
|
|
|
|
if (mp_update.length
|
|
|
|
|
&& mp_update.afi == AFI_IP6
|
|
|
|
|
&& mp_update.safi == SAFI_UNICAST)
|
|
|
|
|
bgp_nlri_parse (peer, &attr, &mp_update);
|
|
|
|
|
|
|
|
|
|
if (mp_withdraw.length
|
|
|
|
|
&& mp_withdraw.afi == AFI_IP6
|
|
|
|
|
&& mp_withdraw.safi == SAFI_UNICAST)
|
|
|
|
|
bgp_nlri_parse (peer, NULL, &mp_withdraw);
|
2004-07-09 19:48:53 +02:00
|
|
|
|
|
2005-02-02 15:40:33 +01:00
|
|
|
|
if (! withdraw_len
|
2004-07-09 19:48:53 +02:00
|
|
|
|
&& mp_withdraw.afi == AFI_IP6
|
|
|
|
|
&& mp_withdraw.safi == SAFI_UNICAST
|
|
|
|
|
&& mp_withdraw.length == 0)
|
|
|
|
|
{
|
|
|
|
|
/* End-of-RIB received */
|
2005-02-02 15:40:33 +01:00
|
|
|
|
SET_FLAG (peer->af_sflags[AFI_IP6][SAFI_UNICAST], PEER_STATUS_EOR_RECEIVED);
|
2004-07-09 19:48:53 +02:00
|
|
|
|
|
2005-02-02 15:40:33 +01:00
|
|
|
|
/* NSF delete stale route */
|
|
|
|
|
if (peer->nsf[AFI_IP6][SAFI_UNICAST])
|
|
|
|
|
bgp_clear_stale_route (peer, AFI_IP6, SAFI_UNICAST);
|
|
|
|
|
|
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog (peer->log, LOG_DEBUG, "rcvd End-of-RIB for IPv6 Unicast from %s",
|
2004-07-09 19:48:53 +02:00
|
|
|
|
peer->host);
|
|
|
|
|
}
|
2002-12-13 21:15:29 +01:00
|
|
|
|
}
|
|
|
|
|
if (peer->afc[AFI_IP6][SAFI_MULTICAST])
|
|
|
|
|
{
|
|
|
|
|
if (mp_update.length
|
|
|
|
|
&& mp_update.afi == AFI_IP6
|
|
|
|
|
&& mp_update.safi == SAFI_MULTICAST)
|
|
|
|
|
bgp_nlri_parse (peer, &attr, &mp_update);
|
|
|
|
|
|
|
|
|
|
if (mp_withdraw.length
|
|
|
|
|
&& mp_withdraw.afi == AFI_IP6
|
|
|
|
|
&& mp_withdraw.safi == SAFI_MULTICAST)
|
|
|
|
|
bgp_nlri_parse (peer, NULL, &mp_withdraw);
|
2004-07-09 19:48:53 +02:00
|
|
|
|
|
2005-02-02 15:40:33 +01:00
|
|
|
|
if (! withdraw_len
|
2004-07-09 19:48:53 +02:00
|
|
|
|
&& mp_withdraw.afi == AFI_IP6
|
|
|
|
|
&& mp_withdraw.safi == SAFI_MULTICAST
|
|
|
|
|
&& mp_withdraw.length == 0)
|
|
|
|
|
{
|
|
|
|
|
/* End-of-RIB received */
|
|
|
|
|
|
2005-02-02 15:40:33 +01:00
|
|
|
|
/* NSF delete stale route */
|
|
|
|
|
if (peer->nsf[AFI_IP6][SAFI_MULTICAST])
|
|
|
|
|
bgp_clear_stale_route (peer, AFI_IP6, SAFI_MULTICAST);
|
|
|
|
|
|
2004-07-09 19:48:53 +02:00
|
|
|
|
if (BGP_DEBUG (update, UPDATE_IN))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog (peer->log, LOG_DEBUG, "rcvd End-of-RIB for IPv6 Multicast from %s",
|
2004-07-09 19:48:53 +02:00
|
|
|
|
peer->host);
|
|
|
|
|
}
|
2002-12-13 21:15:29 +01:00
|
|
|
|
}
|
|
|
|
|
if (peer->afc[AFI_IP][SAFI_MPLS_VPN])
|
|
|
|
|
{
|
|
|
|
|
if (mp_update.length
|
|
|
|
|
&& mp_update.afi == AFI_IP
|
|
|
|
|
&& mp_update.safi == BGP_SAFI_VPNV4)
|
|
|
|
|
bgp_nlri_parse_vpnv4 (peer, &attr, &mp_update);
|
|
|
|
|
|
|
|
|
|
if (mp_withdraw.length
|
|
|
|
|
&& mp_withdraw.afi == AFI_IP
|
|
|
|
|
&& mp_withdraw.safi == BGP_SAFI_VPNV4)
|
|
|
|
|
bgp_nlri_parse_vpnv4 (peer, NULL, &mp_withdraw);
|
2004-07-09 19:48:53 +02:00
|
|
|
|
|
2005-02-02 15:40:33 +01:00
|
|
|
|
if (! withdraw_len
|
2004-07-09 19:48:53 +02:00
|
|
|
|
&& mp_withdraw.afi == AFI_IP
|
|
|
|
|
&& mp_withdraw.safi == BGP_SAFI_VPNV4
|
|
|
|
|
&& mp_withdraw.length == 0)
|
|
|
|
|
{
|
|
|
|
|
/* End-of-RIB received */
|
|
|
|
|
|
|
|
|
|
if (BGP_DEBUG (update, UPDATE_IN))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog (peer->log, LOG_DEBUG, "rcvd End-of-RIB for VPNv4 Unicast from %s",
|
2004-07-09 19:48:53 +02:00
|
|
|
|
peer->host);
|
|
|
|
|
}
|
2002-12-13 21:15:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Everything is done. We unintern temporary structures which
|
|
|
|
|
interned in bgp_attr_parse(). */
|
|
|
|
|
if (attr.aspath)
|
|
|
|
|
aspath_unintern (attr.aspath);
|
|
|
|
|
if (attr.community)
|
|
|
|
|
community_unintern (attr.community);
|
2007-05-04 22:15:47 +02:00
|
|
|
|
if (attr.extra)
|
|
|
|
|
{
|
|
|
|
|
if (attr.extra->ecommunity)
|
|
|
|
|
ecommunity_unintern (attr.extra->ecommunity);
|
|
|
|
|
if (attr.extra->cluster)
|
|
|
|
|
cluster_unintern (attr.extra->cluster);
|
|
|
|
|
if (attr.extra->transit)
|
|
|
|
|
transit_unintern (attr.extra->transit);
|
|
|
|
|
bgp_attr_extra_free (&attr);
|
|
|
|
|
}
|
2002-12-13 21:15:29 +01:00
|
|
|
|
|
|
|
|
|
/* If peering is stopped due to some reason, do not generate BGP
|
|
|
|
|
event. */
|
|
|
|
|
if (peer->status != Established)
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
|
|
/* Increment packet counter. */
|
|
|
|
|
peer->update_in++;
|
|
|
|
|
peer->update_time = time (NULL);
|
|
|
|
|
|
|
|
|
|
/* Generate BGP event. */
|
|
|
|
|
BGP_EVENT_ADD (peer, Receive_UPDATE_message);
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Notify message treatment function. */
|
2005-06-28 14:44:16 +02:00
|
|
|
|
static void
|
2002-12-13 21:15:29 +01:00
|
|
|
|
bgp_notify_receive (struct peer *peer, bgp_size_t size)
|
|
|
|
|
{
|
|
|
|
|
struct bgp_notify bgp_notify;
|
|
|
|
|
|
|
|
|
|
if (peer->notify.data)
|
|
|
|
|
{
|
|
|
|
|
XFREE (MTYPE_TMP, peer->notify.data);
|
|
|
|
|
peer->notify.data = NULL;
|
|
|
|
|
peer->notify.length = 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bgp_notify.code = stream_getc (peer->ibuf);
|
|
|
|
|
bgp_notify.subcode = stream_getc (peer->ibuf);
|
|
|
|
|
bgp_notify.length = size - 2;
|
|
|
|
|
bgp_notify.data = NULL;
|
|
|
|
|
|
|
|
|
|
/* Preserv notify code and sub code. */
|
|
|
|
|
peer->notify.code = bgp_notify.code;
|
|
|
|
|
peer->notify.subcode = bgp_notify.subcode;
|
|
|
|
|
/* For further diagnostic record returned Data. */
|
|
|
|
|
if (bgp_notify.length)
|
|
|
|
|
{
|
|
|
|
|
peer->notify.length = size - 2;
|
|
|
|
|
peer->notify.data = XMALLOC (MTYPE_TMP, size - 2);
|
|
|
|
|
memcpy (peer->notify.data, stream_pnt (peer->ibuf), size - 2);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* For debug */
|
|
|
|
|
{
|
|
|
|
|
int i;
|
|
|
|
|
int first = 0;
|
|
|
|
|
char c[4];
|
|
|
|
|
|
|
|
|
|
if (bgp_notify.length)
|
|
|
|
|
{
|
|
|
|
|
bgp_notify.data = XMALLOC (MTYPE_TMP, bgp_notify.length * 3);
|
|
|
|
|
for (i = 0; i < bgp_notify.length; i++)
|
|
|
|
|
if (first)
|
|
|
|
|
{
|
|
|
|
|
sprintf (c, " %02x", stream_getc (peer->ibuf));
|
|
|
|
|
strcat (bgp_notify.data, c);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
first = 1;
|
|
|
|
|
sprintf (c, "%02x", stream_getc (peer->ibuf));
|
|
|
|
|
strcpy (bgp_notify.data, c);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bgp_notify_print(peer, &bgp_notify, "received");
|
|
|
|
|
if (bgp_notify.data)
|
|
|
|
|
XFREE (MTYPE_TMP, bgp_notify.data);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* peer count update */
|
|
|
|
|
peer->notify_in++;
|
|
|
|
|
|
2004-05-20 11:19:34 +02:00
|
|
|
|
if (peer->status == Established)
|
|
|
|
|
peer->last_reset = PEER_DOWN_NOTIFY_RECEIVED;
|
|
|
|
|
|
2002-12-13 21:15:29 +01:00
|
|
|
|
/* We have to check for Notify with Unsupported Optional Parameter.
|
|
|
|
|
in that case we fallback to open without the capability option.
|
|
|
|
|
But this done in bgp_stop. We just mark it here to avoid changing
|
|
|
|
|
the fsm tables. */
|
|
|
|
|
if (bgp_notify.code == BGP_NOTIFY_OPEN_ERR &&
|
|
|
|
|
bgp_notify.subcode == BGP_NOTIFY_OPEN_UNSUP_PARAM )
|
|
|
|
|
UNSET_FLAG (peer->sflags, PEER_STATUS_CAPABILITY_OPEN);
|
|
|
|
|
|
|
|
|
|
/* Also apply to Unsupported Capability until remote router support
|
|
|
|
|
capability. */
|
|
|
|
|
if (bgp_notify.code == BGP_NOTIFY_OPEN_ERR &&
|
|
|
|
|
bgp_notify.subcode == BGP_NOTIFY_OPEN_UNSUP_CAPBL)
|
|
|
|
|
UNSET_FLAG (peer->sflags, PEER_STATUS_CAPABILITY_OPEN);
|
|
|
|
|
|
|
|
|
|
BGP_EVENT_ADD (peer, Receive_NOTIFICATION_message);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Keepalive treatment function -- get keepalive send keepalive */
|
2005-06-28 14:44:16 +02:00
|
|
|
|
static void
|
2002-12-13 21:15:29 +01:00
|
|
|
|
bgp_keepalive_receive (struct peer *peer, bgp_size_t size)
|
|
|
|
|
{
|
|
|
|
|
if (BGP_DEBUG (keepalive, KEEPALIVE))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog_debug ("%s KEEPALIVE rcvd", peer->host);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
|
|
|
|
|
BGP_EVENT_ADD (peer, Receive_KEEPALIVE_message);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Route refresh message is received. */
|
2005-06-28 14:44:16 +02:00
|
|
|
|
static void
|
2002-12-13 21:15:29 +01:00
|
|
|
|
bgp_route_refresh_receive (struct peer *peer, bgp_size_t size)
|
|
|
|
|
{
|
|
|
|
|
afi_t afi;
|
|
|
|
|
safi_t safi;
|
|
|
|
|
u_char reserved;
|
|
|
|
|
struct stream *s;
|
|
|
|
|
|
|
|
|
|
/* If peer does not have the capability, send notification. */
|
|
|
|
|
if (! CHECK_FLAG (peer->cap, PEER_CAP_REFRESH_ADV))
|
|
|
|
|
{
|
|
|
|
|
plog_err (peer->log, "%s [Error] BGP route refresh is not enabled",
|
|
|
|
|
peer->host);
|
|
|
|
|
bgp_notify_send (peer,
|
|
|
|
|
BGP_NOTIFY_HEADER_ERR,
|
|
|
|
|
BGP_NOTIFY_HEADER_BAD_MESTYPE);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Status must be Established. */
|
|
|
|
|
if (peer->status != Established)
|
|
|
|
|
{
|
|
|
|
|
plog_err (peer->log,
|
|
|
|
|
"%s [Error] Route refresh packet received under status %s",
|
|
|
|
|
peer->host, LOOKUP (bgp_status_msg, peer->status));
|
|
|
|
|
bgp_notify_send (peer, BGP_NOTIFY_FSM_ERR, 0);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
s = peer->ibuf;
|
|
|
|
|
|
|
|
|
|
/* Parse packet. */
|
|
|
|
|
afi = stream_getw (s);
|
|
|
|
|
reserved = stream_getc (s);
|
|
|
|
|
safi = stream_getc (s);
|
|
|
|
|
|
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog_debug ("%s rcvd REFRESH_REQ for afi/safi: %d/%d",
|
2002-12-13 21:15:29 +01:00
|
|
|
|
peer->host, afi, safi);
|
|
|
|
|
|
|
|
|
|
/* Check AFI and SAFI. */
|
|
|
|
|
if ((afi != AFI_IP && afi != AFI_IP6)
|
|
|
|
|
|| (safi != SAFI_UNICAST && safi != SAFI_MULTICAST
|
|
|
|
|
&& safi != BGP_SAFI_VPNV4))
|
|
|
|
|
{
|
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
|
|
|
|
{
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog_debug ("%s REFRESH_REQ for unrecognized afi/safi: %d/%d - ignored",
|
2002-12-13 21:15:29 +01:00
|
|
|
|
peer->host, afi, safi);
|
|
|
|
|
}
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Adjust safi code. */
|
|
|
|
|
if (safi == BGP_SAFI_VPNV4)
|
|
|
|
|
safi = SAFI_MPLS_VPN;
|
|
|
|
|
|
|
|
|
|
if (size != BGP_MSG_ROUTE_REFRESH_MIN_SIZE - BGP_HEADER_SIZE)
|
|
|
|
|
{
|
|
|
|
|
u_char *end;
|
|
|
|
|
u_char when_to_refresh;
|
|
|
|
|
u_char orf_type;
|
|
|
|
|
u_int16_t orf_len;
|
|
|
|
|
|
|
|
|
|
if (size - (BGP_MSG_ROUTE_REFRESH_MIN_SIZE - BGP_HEADER_SIZE) < 5)
|
|
|
|
|
{
|
|
|
|
|
zlog_info ("%s ORF route refresh length error", peer->host);
|
|
|
|
|
bgp_notify_send (peer, BGP_NOTIFY_CEASE, 0);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
when_to_refresh = stream_getc (s);
|
|
|
|
|
end = stream_pnt (s) + (size - 5);
|
|
|
|
|
|
|
|
|
|
while (stream_pnt (s) < end)
|
|
|
|
|
{
|
|
|
|
|
orf_type = stream_getc (s);
|
|
|
|
|
orf_len = stream_getw (s);
|
|
|
|
|
|
|
|
|
|
if (orf_type == ORF_TYPE_PREFIX
|
|
|
|
|
|| orf_type == ORF_TYPE_PREFIX_OLD)
|
|
|
|
|
{
|
|
|
|
|
u_char *p_pnt = stream_pnt (s);
|
|
|
|
|
u_char *p_end = stream_pnt (s) + orf_len;
|
|
|
|
|
struct orf_prefix orfp;
|
|
|
|
|
u_char common = 0;
|
|
|
|
|
u_int32_t seq;
|
|
|
|
|
int psize;
|
|
|
|
|
char name[BUFSIZ];
|
|
|
|
|
char buf[BUFSIZ];
|
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
|
|
|
|
{
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog_debug ("%s rcvd Prefixlist ORF(%d) length %d",
|
2002-12-13 21:15:29 +01:00
|
|
|
|
peer->host, orf_type, orf_len);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* ORF prefix-list name */
|
|
|
|
|
sprintf (name, "%s.%d.%d", peer->host, afi, safi);
|
|
|
|
|
|
|
|
|
|
while (p_pnt < p_end)
|
|
|
|
|
{
|
|
|
|
|
memset (&orfp, 0, sizeof (struct orf_prefix));
|
|
|
|
|
common = *p_pnt++;
|
|
|
|
|
if (common & ORF_COMMON_PART_REMOVE_ALL)
|
|
|
|
|
{
|
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog_debug ("%s rcvd Remove-All pfxlist ORF request", peer->host);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
prefix_bgp_orf_remove_all (name);
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
memcpy (&seq, p_pnt, sizeof (u_int32_t));
|
|
|
|
|
p_pnt += sizeof (u_int32_t);
|
|
|
|
|
orfp.seq = ntohl (seq);
|
|
|
|
|
orfp.ge = *p_pnt++;
|
|
|
|
|
orfp.le = *p_pnt++;
|
|
|
|
|
orfp.p.prefixlen = *p_pnt++;
|
|
|
|
|
orfp.p.family = afi2family (afi);
|
|
|
|
|
psize = PSIZE (orfp.p.prefixlen);
|
|
|
|
|
memcpy (&orfp.p.u.prefix, p_pnt, psize);
|
|
|
|
|
p_pnt += psize;
|
|
|
|
|
|
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog_debug ("%s rcvd %s %s seq %u %s/%d ge %d le %d",
|
2002-12-13 21:15:29 +01:00
|
|
|
|
peer->host,
|
|
|
|
|
(common & ORF_COMMON_PART_REMOVE ? "Remove" : "Add"),
|
|
|
|
|
(common & ORF_COMMON_PART_DENY ? "deny" : "permit"),
|
|
|
|
|
orfp.seq,
|
|
|
|
|
inet_ntop (orfp.p.family, &orfp.p.u.prefix, buf, BUFSIZ),
|
|
|
|
|
orfp.p.prefixlen, orfp.ge, orfp.le);
|
|
|
|
|
|
|
|
|
|
ret = prefix_bgp_orf_set (name, afi, &orfp,
|
|
|
|
|
(common & ORF_COMMON_PART_DENY ? 0 : 1 ),
|
|
|
|
|
(common & ORF_COMMON_PART_REMOVE ? 0 : 1));
|
|
|
|
|
|
|
|
|
|
if (ret != CMD_SUCCESS)
|
|
|
|
|
{
|
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog_debug ("%s Received misformatted prefixlist ORF. Remove All pfxlist", peer->host);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
prefix_bgp_orf_remove_all (name);
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
peer->orf_plist[afi][safi] =
|
|
|
|
|
prefix_list_lookup (AFI_ORF_PREFIX, name);
|
|
|
|
|
}
|
2005-02-09 16:51:56 +01:00
|
|
|
|
stream_forward_getp (s, orf_len);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
}
|
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog_debug ("%s rcvd Refresh %s ORF request", peer->host,
|
2002-12-13 21:15:29 +01:00
|
|
|
|
when_to_refresh == REFRESH_DEFER ? "Defer" : "Immediate");
|
|
|
|
|
if (when_to_refresh == REFRESH_DEFER)
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* First update is deferred until ORF or ROUTE-REFRESH is received */
|
|
|
|
|
if (CHECK_FLAG (peer->af_sflags[afi][safi], PEER_STATUS_ORF_WAIT_REFRESH))
|
|
|
|
|
UNSET_FLAG (peer->af_sflags[afi][safi], PEER_STATUS_ORF_WAIT_REFRESH);
|
|
|
|
|
|
|
|
|
|
/* Perform route refreshment to the peer */
|
|
|
|
|
bgp_announce_route (peer, afi, safi);
|
|
|
|
|
}
|
|
|
|
|
|
2005-06-28 14:44:16 +02:00
|
|
|
|
static int
|
2002-12-13 21:15:29 +01:00
|
|
|
|
bgp_capability_msg_parse (struct peer *peer, u_char *pnt, bgp_size_t length)
|
|
|
|
|
{
|
|
|
|
|
u_char *end;
|
[bgpd] cleanup, compact and consolidate capability parsing code
2007-07-26 Paul Jakma <paul.jakma@sun.com>
* (general) Clean up and compact capability parsing slightly.
Consolidate validation of length and logging of generic TLV, and
memcpy of capability data, thus removing such from cap specifc
code (not always present or correct).
* bgp_open.h: Add structures for the generic capability TLV header
and for the data formats of the various specific capabilities we
support. Hence remove the badly named, or else misdefined, struct
capability.
* bgp_open.c: (bgp_capability_vty_out) Use struct capability_mp_data.
Do the length checks *before* memcpy()'ing based on that length
(stored capability - should have been validated anyway on input,
but..).
(bgp_afi_safi_valid_indices) new function to validate (afi,safi)
which is about to be used as index into arrays, consolidates
several instances of same, at least one of which appeared to be
incomplete..
(bgp_capability_mp) Much condensed.
(bgp_capability_orf_entry) New, process one ORF entry
(bgp_capability_orf) Condensed. Fixed to process all ORF entries.
(bgp_capability_restart) Condensed, and fixed to use a
cap-specific type, rather than abusing capability_mp.
(struct message capcode_str) added to aid generic logging.
(size_t cap_minsizes[]) added to aid generic validation of
capability length field.
(bgp_capability_parse) Generic logging and validation of TLV
consolidated here. Code compacted as much as possible.
* bgp_packet.c: (bgp_open_receive) Capability parsers now use
streams, so no more need here to manually fudge the input stream
getp.
(bgp_capability_msg_parse) use struct capability_mp_data. Validate
lengths /before/ memcpy. Use bgp_afi_safi_valid_indices.
(bgp_capability_receive) Exported for use by test harness.
* bgp_vty.c: (bgp_show_summary) fix conversion warning
(bgp_show_peer) ditto
* bgp_debug.h: Fix storage 'extern' after type 'const'.
* lib/log.c: (mes_lookup) warning about code not being in
same-number array slot should be debug, not warning. E.g. BGP
has several discontigious number spaces, allocating from
different parts of a space is not uncommon (e.g. IANA
assigned versus vendor-assigned code points in some number
space).
2007-08-06 17:21:45 +02:00
|
|
|
|
struct capability_mp_data mpc;
|
|
|
|
|
struct capability_header *hdr;
|
2002-12-13 21:15:29 +01:00
|
|
|
|
u_char action;
|
|
|
|
|
struct bgp *bgp;
|
|
|
|
|
afi_t afi;
|
|
|
|
|
safi_t safi;
|
|
|
|
|
|
|
|
|
|
bgp = peer->bgp;
|
|
|
|
|
end = pnt + length;
|
|
|
|
|
|
|
|
|
|
while (pnt < end)
|
[bgpd] cleanup, compact and consolidate capability parsing code
2007-07-26 Paul Jakma <paul.jakma@sun.com>
* (general) Clean up and compact capability parsing slightly.
Consolidate validation of length and logging of generic TLV, and
memcpy of capability data, thus removing such from cap specifc
code (not always present or correct).
* bgp_open.h: Add structures for the generic capability TLV header
and for the data formats of the various specific capabilities we
support. Hence remove the badly named, or else misdefined, struct
capability.
* bgp_open.c: (bgp_capability_vty_out) Use struct capability_mp_data.
Do the length checks *before* memcpy()'ing based on that length
(stored capability - should have been validated anyway on input,
but..).
(bgp_afi_safi_valid_indices) new function to validate (afi,safi)
which is about to be used as index into arrays, consolidates
several instances of same, at least one of which appeared to be
incomplete..
(bgp_capability_mp) Much condensed.
(bgp_capability_orf_entry) New, process one ORF entry
(bgp_capability_orf) Condensed. Fixed to process all ORF entries.
(bgp_capability_restart) Condensed, and fixed to use a
cap-specific type, rather than abusing capability_mp.
(struct message capcode_str) added to aid generic logging.
(size_t cap_minsizes[]) added to aid generic validation of
capability length field.
(bgp_capability_parse) Generic logging and validation of TLV
consolidated here. Code compacted as much as possible.
* bgp_packet.c: (bgp_open_receive) Capability parsers now use
streams, so no more need here to manually fudge the input stream
getp.
(bgp_capability_msg_parse) use struct capability_mp_data. Validate
lengths /before/ memcpy. Use bgp_afi_safi_valid_indices.
(bgp_capability_receive) Exported for use by test harness.
* bgp_vty.c: (bgp_show_summary) fix conversion warning
(bgp_show_peer) ditto
* bgp_debug.h: Fix storage 'extern' after type 'const'.
* lib/log.c: (mes_lookup) warning about code not being in
same-number array slot should be debug, not warning. E.g. BGP
has several discontigious number spaces, allocating from
different parts of a space is not uncommon (e.g. IANA
assigned versus vendor-assigned code points in some number
space).
2007-08-06 17:21:45 +02:00
|
|
|
|
{
|
2002-12-13 21:15:29 +01:00
|
|
|
|
/* We need at least action, capability code and capability length. */
|
|
|
|
|
if (pnt + 3 > end)
|
|
|
|
|
{
|
|
|
|
|
zlog_info ("%s Capability length error", peer->host);
|
|
|
|
|
bgp_notify_send (peer, BGP_NOTIFY_CEASE, 0);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
action = *pnt;
|
[bgpd] cleanup, compact and consolidate capability parsing code
2007-07-26 Paul Jakma <paul.jakma@sun.com>
* (general) Clean up and compact capability parsing slightly.
Consolidate validation of length and logging of generic TLV, and
memcpy of capability data, thus removing such from cap specifc
code (not always present or correct).
* bgp_open.h: Add structures for the generic capability TLV header
and for the data formats of the various specific capabilities we
support. Hence remove the badly named, or else misdefined, struct
capability.
* bgp_open.c: (bgp_capability_vty_out) Use struct capability_mp_data.
Do the length checks *before* memcpy()'ing based on that length
(stored capability - should have been validated anyway on input,
but..).
(bgp_afi_safi_valid_indices) new function to validate (afi,safi)
which is about to be used as index into arrays, consolidates
several instances of same, at least one of which appeared to be
incomplete..
(bgp_capability_mp) Much condensed.
(bgp_capability_orf_entry) New, process one ORF entry
(bgp_capability_orf) Condensed. Fixed to process all ORF entries.
(bgp_capability_restart) Condensed, and fixed to use a
cap-specific type, rather than abusing capability_mp.
(struct message capcode_str) added to aid generic logging.
(size_t cap_minsizes[]) added to aid generic validation of
capability length field.
(bgp_capability_parse) Generic logging and validation of TLV
consolidated here. Code compacted as much as possible.
* bgp_packet.c: (bgp_open_receive) Capability parsers now use
streams, so no more need here to manually fudge the input stream
getp.
(bgp_capability_msg_parse) use struct capability_mp_data. Validate
lengths /before/ memcpy. Use bgp_afi_safi_valid_indices.
(bgp_capability_receive) Exported for use by test harness.
* bgp_vty.c: (bgp_show_summary) fix conversion warning
(bgp_show_peer) ditto
* bgp_debug.h: Fix storage 'extern' after type 'const'.
* lib/log.c: (mes_lookup) warning about code not being in
same-number array slot should be debug, not warning. E.g. BGP
has several discontigious number spaces, allocating from
different parts of a space is not uncommon (e.g. IANA
assigned versus vendor-assigned code points in some number
space).
2007-08-06 17:21:45 +02:00
|
|
|
|
hdr = (struct capability_header *)(pnt + 1);
|
|
|
|
|
|
2002-12-13 21:15:29 +01:00
|
|
|
|
/* Action value check. */
|
|
|
|
|
if (action != CAPABILITY_ACTION_SET
|
|
|
|
|
&& action != CAPABILITY_ACTION_UNSET)
|
|
|
|
|
{
|
|
|
|
|
zlog_info ("%s Capability Action Value error %d",
|
|
|
|
|
peer->host, action);
|
|
|
|
|
bgp_notify_send (peer, BGP_NOTIFY_CEASE, 0);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog_debug ("%s CAPABILITY has action: %d, code: %u, length %u",
|
[bgpd] cleanup, compact and consolidate capability parsing code
2007-07-26 Paul Jakma <paul.jakma@sun.com>
* (general) Clean up and compact capability parsing slightly.
Consolidate validation of length and logging of generic TLV, and
memcpy of capability data, thus removing such from cap specifc
code (not always present or correct).
* bgp_open.h: Add structures for the generic capability TLV header
and for the data formats of the various specific capabilities we
support. Hence remove the badly named, or else misdefined, struct
capability.
* bgp_open.c: (bgp_capability_vty_out) Use struct capability_mp_data.
Do the length checks *before* memcpy()'ing based on that length
(stored capability - should have been validated anyway on input,
but..).
(bgp_afi_safi_valid_indices) new function to validate (afi,safi)
which is about to be used as index into arrays, consolidates
several instances of same, at least one of which appeared to be
incomplete..
(bgp_capability_mp) Much condensed.
(bgp_capability_orf_entry) New, process one ORF entry
(bgp_capability_orf) Condensed. Fixed to process all ORF entries.
(bgp_capability_restart) Condensed, and fixed to use a
cap-specific type, rather than abusing capability_mp.
(struct message capcode_str) added to aid generic logging.
(size_t cap_minsizes[]) added to aid generic validation of
capability length field.
(bgp_capability_parse) Generic logging and validation of TLV
consolidated here. Code compacted as much as possible.
* bgp_packet.c: (bgp_open_receive) Capability parsers now use
streams, so no more need here to manually fudge the input stream
getp.
(bgp_capability_msg_parse) use struct capability_mp_data. Validate
lengths /before/ memcpy. Use bgp_afi_safi_valid_indices.
(bgp_capability_receive) Exported for use by test harness.
* bgp_vty.c: (bgp_show_summary) fix conversion warning
(bgp_show_peer) ditto
* bgp_debug.h: Fix storage 'extern' after type 'const'.
* lib/log.c: (mes_lookup) warning about code not being in
same-number array slot should be debug, not warning. E.g. BGP
has several discontigious number spaces, allocating from
different parts of a space is not uncommon (e.g. IANA
assigned versus vendor-assigned code points in some number
space).
2007-08-06 17:21:45 +02:00
|
|
|
|
peer->host, action, hdr->code, hdr->length);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
|
|
|
|
|
/* Capability length check. */
|
[bgpd] cleanup, compact and consolidate capability parsing code
2007-07-26 Paul Jakma <paul.jakma@sun.com>
* (general) Clean up and compact capability parsing slightly.
Consolidate validation of length and logging of generic TLV, and
memcpy of capability data, thus removing such from cap specifc
code (not always present or correct).
* bgp_open.h: Add structures for the generic capability TLV header
and for the data formats of the various specific capabilities we
support. Hence remove the badly named, or else misdefined, struct
capability.
* bgp_open.c: (bgp_capability_vty_out) Use struct capability_mp_data.
Do the length checks *before* memcpy()'ing based on that length
(stored capability - should have been validated anyway on input,
but..).
(bgp_afi_safi_valid_indices) new function to validate (afi,safi)
which is about to be used as index into arrays, consolidates
several instances of same, at least one of which appeared to be
incomplete..
(bgp_capability_mp) Much condensed.
(bgp_capability_orf_entry) New, process one ORF entry
(bgp_capability_orf) Condensed. Fixed to process all ORF entries.
(bgp_capability_restart) Condensed, and fixed to use a
cap-specific type, rather than abusing capability_mp.
(struct message capcode_str) added to aid generic logging.
(size_t cap_minsizes[]) added to aid generic validation of
capability length field.
(bgp_capability_parse) Generic logging and validation of TLV
consolidated here. Code compacted as much as possible.
* bgp_packet.c: (bgp_open_receive) Capability parsers now use
streams, so no more need here to manually fudge the input stream
getp.
(bgp_capability_msg_parse) use struct capability_mp_data. Validate
lengths /before/ memcpy. Use bgp_afi_safi_valid_indices.
(bgp_capability_receive) Exported for use by test harness.
* bgp_vty.c: (bgp_show_summary) fix conversion warning
(bgp_show_peer) ditto
* bgp_debug.h: Fix storage 'extern' after type 'const'.
* lib/log.c: (mes_lookup) warning about code not being in
same-number array slot should be debug, not warning. E.g. BGP
has several discontigious number spaces, allocating from
different parts of a space is not uncommon (e.g. IANA
assigned versus vendor-assigned code points in some number
space).
2007-08-06 17:21:45 +02:00
|
|
|
|
if ((pnt + hdr->length + 3) > end)
|
2002-12-13 21:15:29 +01:00
|
|
|
|
{
|
|
|
|
|
zlog_info ("%s Capability length error", peer->host);
|
|
|
|
|
bgp_notify_send (peer, BGP_NOTIFY_CEASE, 0);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
[bgpd] cleanup, compact and consolidate capability parsing code
2007-07-26 Paul Jakma <paul.jakma@sun.com>
* (general) Clean up and compact capability parsing slightly.
Consolidate validation of length and logging of generic TLV, and
memcpy of capability data, thus removing such from cap specifc
code (not always present or correct).
* bgp_open.h: Add structures for the generic capability TLV header
and for the data formats of the various specific capabilities we
support. Hence remove the badly named, or else misdefined, struct
capability.
* bgp_open.c: (bgp_capability_vty_out) Use struct capability_mp_data.
Do the length checks *before* memcpy()'ing based on that length
(stored capability - should have been validated anyway on input,
but..).
(bgp_afi_safi_valid_indices) new function to validate (afi,safi)
which is about to be used as index into arrays, consolidates
several instances of same, at least one of which appeared to be
incomplete..
(bgp_capability_mp) Much condensed.
(bgp_capability_orf_entry) New, process one ORF entry
(bgp_capability_orf) Condensed. Fixed to process all ORF entries.
(bgp_capability_restart) Condensed, and fixed to use a
cap-specific type, rather than abusing capability_mp.
(struct message capcode_str) added to aid generic logging.
(size_t cap_minsizes[]) added to aid generic validation of
capability length field.
(bgp_capability_parse) Generic logging and validation of TLV
consolidated here. Code compacted as much as possible.
* bgp_packet.c: (bgp_open_receive) Capability parsers now use
streams, so no more need here to manually fudge the input stream
getp.
(bgp_capability_msg_parse) use struct capability_mp_data. Validate
lengths /before/ memcpy. Use bgp_afi_safi_valid_indices.
(bgp_capability_receive) Exported for use by test harness.
* bgp_vty.c: (bgp_show_summary) fix conversion warning
(bgp_show_peer) ditto
* bgp_debug.h: Fix storage 'extern' after type 'const'.
* lib/log.c: (mes_lookup) warning about code not being in
same-number array slot should be debug, not warning. E.g. BGP
has several discontigious number spaces, allocating from
different parts of a space is not uncommon (e.g. IANA
assigned versus vendor-assigned code points in some number
space).
2007-08-06 17:21:45 +02:00
|
|
|
|
/* Fetch structure to the byte stream. */
|
|
|
|
|
memcpy (&mpc, pnt + 3, sizeof (struct capability_mp_data));
|
|
|
|
|
|
2002-12-13 21:15:29 +01:00
|
|
|
|
/* We know MP Capability Code. */
|
[bgpd] cleanup, compact and consolidate capability parsing code
2007-07-26 Paul Jakma <paul.jakma@sun.com>
* (general) Clean up and compact capability parsing slightly.
Consolidate validation of length and logging of generic TLV, and
memcpy of capability data, thus removing such from cap specifc
code (not always present or correct).
* bgp_open.h: Add structures for the generic capability TLV header
and for the data formats of the various specific capabilities we
support. Hence remove the badly named, or else misdefined, struct
capability.
* bgp_open.c: (bgp_capability_vty_out) Use struct capability_mp_data.
Do the length checks *before* memcpy()'ing based on that length
(stored capability - should have been validated anyway on input,
but..).
(bgp_afi_safi_valid_indices) new function to validate (afi,safi)
which is about to be used as index into arrays, consolidates
several instances of same, at least one of which appeared to be
incomplete..
(bgp_capability_mp) Much condensed.
(bgp_capability_orf_entry) New, process one ORF entry
(bgp_capability_orf) Condensed. Fixed to process all ORF entries.
(bgp_capability_restart) Condensed, and fixed to use a
cap-specific type, rather than abusing capability_mp.
(struct message capcode_str) added to aid generic logging.
(size_t cap_minsizes[]) added to aid generic validation of
capability length field.
(bgp_capability_parse) Generic logging and validation of TLV
consolidated here. Code compacted as much as possible.
* bgp_packet.c: (bgp_open_receive) Capability parsers now use
streams, so no more need here to manually fudge the input stream
getp.
(bgp_capability_msg_parse) use struct capability_mp_data. Validate
lengths /before/ memcpy. Use bgp_afi_safi_valid_indices.
(bgp_capability_receive) Exported for use by test harness.
* bgp_vty.c: (bgp_show_summary) fix conversion warning
(bgp_show_peer) ditto
* bgp_debug.h: Fix storage 'extern' after type 'const'.
* lib/log.c: (mes_lookup) warning about code not being in
same-number array slot should be debug, not warning. E.g. BGP
has several discontigious number spaces, allocating from
different parts of a space is not uncommon (e.g. IANA
assigned versus vendor-assigned code points in some number
space).
2007-08-06 17:21:45 +02:00
|
|
|
|
if (hdr->code == CAPABILITY_CODE_MP)
|
2002-12-13 21:15:29 +01:00
|
|
|
|
{
|
[bgpd] cleanup, compact and consolidate capability parsing code
2007-07-26 Paul Jakma <paul.jakma@sun.com>
* (general) Clean up and compact capability parsing slightly.
Consolidate validation of length and logging of generic TLV, and
memcpy of capability data, thus removing such from cap specifc
code (not always present or correct).
* bgp_open.h: Add structures for the generic capability TLV header
and for the data formats of the various specific capabilities we
support. Hence remove the badly named, or else misdefined, struct
capability.
* bgp_open.c: (bgp_capability_vty_out) Use struct capability_mp_data.
Do the length checks *before* memcpy()'ing based on that length
(stored capability - should have been validated anyway on input,
but..).
(bgp_afi_safi_valid_indices) new function to validate (afi,safi)
which is about to be used as index into arrays, consolidates
several instances of same, at least one of which appeared to be
incomplete..
(bgp_capability_mp) Much condensed.
(bgp_capability_orf_entry) New, process one ORF entry
(bgp_capability_orf) Condensed. Fixed to process all ORF entries.
(bgp_capability_restart) Condensed, and fixed to use a
cap-specific type, rather than abusing capability_mp.
(struct message capcode_str) added to aid generic logging.
(size_t cap_minsizes[]) added to aid generic validation of
capability length field.
(bgp_capability_parse) Generic logging and validation of TLV
consolidated here. Code compacted as much as possible.
* bgp_packet.c: (bgp_open_receive) Capability parsers now use
streams, so no more need here to manually fudge the input stream
getp.
(bgp_capability_msg_parse) use struct capability_mp_data. Validate
lengths /before/ memcpy. Use bgp_afi_safi_valid_indices.
(bgp_capability_receive) Exported for use by test harness.
* bgp_vty.c: (bgp_show_summary) fix conversion warning
(bgp_show_peer) ditto
* bgp_debug.h: Fix storage 'extern' after type 'const'.
* lib/log.c: (mes_lookup) warning about code not being in
same-number array slot should be debug, not warning. E.g. BGP
has several discontigious number spaces, allocating from
different parts of a space is not uncommon (e.g. IANA
assigned versus vendor-assigned code points in some number
space).
2007-08-06 17:21:45 +02:00
|
|
|
|
afi = ntohs (mpc.afi);
|
|
|
|
|
safi = mpc.safi;
|
2002-12-13 21:15:29 +01:00
|
|
|
|
|
|
|
|
|
/* Ignore capability when override-capability is set. */
|
|
|
|
|
if (CHECK_FLAG (peer->flags, PEER_FLAG_OVERRIDE_CAPABILITY))
|
|
|
|
|
continue;
|
[bgpd] cleanup, compact and consolidate capability parsing code
2007-07-26 Paul Jakma <paul.jakma@sun.com>
* (general) Clean up and compact capability parsing slightly.
Consolidate validation of length and logging of generic TLV, and
memcpy of capability data, thus removing such from cap specifc
code (not always present or correct).
* bgp_open.h: Add structures for the generic capability TLV header
and for the data formats of the various specific capabilities we
support. Hence remove the badly named, or else misdefined, struct
capability.
* bgp_open.c: (bgp_capability_vty_out) Use struct capability_mp_data.
Do the length checks *before* memcpy()'ing based on that length
(stored capability - should have been validated anyway on input,
but..).
(bgp_afi_safi_valid_indices) new function to validate (afi,safi)
which is about to be used as index into arrays, consolidates
several instances of same, at least one of which appeared to be
incomplete..
(bgp_capability_mp) Much condensed.
(bgp_capability_orf_entry) New, process one ORF entry
(bgp_capability_orf) Condensed. Fixed to process all ORF entries.
(bgp_capability_restart) Condensed, and fixed to use a
cap-specific type, rather than abusing capability_mp.
(struct message capcode_str) added to aid generic logging.
(size_t cap_minsizes[]) added to aid generic validation of
capability length field.
(bgp_capability_parse) Generic logging and validation of TLV
consolidated here. Code compacted as much as possible.
* bgp_packet.c: (bgp_open_receive) Capability parsers now use
streams, so no more need here to manually fudge the input stream
getp.
(bgp_capability_msg_parse) use struct capability_mp_data. Validate
lengths /before/ memcpy. Use bgp_afi_safi_valid_indices.
(bgp_capability_receive) Exported for use by test harness.
* bgp_vty.c: (bgp_show_summary) fix conversion warning
(bgp_show_peer) ditto
* bgp_debug.h: Fix storage 'extern' after type 'const'.
* lib/log.c: (mes_lookup) warning about code not being in
same-number array slot should be debug, not warning. E.g. BGP
has several discontigious number spaces, allocating from
different parts of a space is not uncommon (e.g. IANA
assigned versus vendor-assigned code points in some number
space).
2007-08-06 17:21:45 +02:00
|
|
|
|
|
|
|
|
|
if (!bgp_afi_safi_valid_indices (afi, &safi))
|
|
|
|
|
{
|
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
[bgpd] Merge AS4 support
2007-10-14 Paul Jakma <paul.jakma@sun.com>
* NEWS: Note that MRT dumps are now version 2
* (general) Merge in Juergen Kammer's AS4 patch.
2007-09-27 Paul Jakma <paul.jakma@sun.com>
* bgp_aspath.c: (assegment_normalise) remove duplicates from
from sets.
(aspath_reconcile_as4) disregard a broken part of the RFC around
error handling in path reconciliation.
* aspath_test.c: Test dupe-weeding from sets.
Test that reconciliation merges AS_PATH and AS4_PATH where
former is shorter than latter.
2007-09-26 Paul Jakma <paul.jakma@sun.com>
* aspath_test.c: Test AS4_PATH reconcilation where length
of AS_PATH and AS4_PATH is same.
2007-09-25 Paul Jakma <paul.jakma@sun.com>
* bgp_open.c: (peek_for_as4_capability) Fix to work.
* bgp_packet.c: (bgp_open_receive) Fix sanity check of as4.
* tests/bgp_capability_test.c: (general) Extend tests to validate
peek_for_as4_capability.
Add test of full OPEN Option block, with multiple capabilities,
both as a series of Option, and a single option.
Add some crap to beginning of stream, to prevent code depending
on getp == 0.
2007-09-18 Paul Jakma <paul.jakma@sun.com>
* bgp_open.c: (bgp_capability_as4) debug printf inline with others.
(peek_for_as4_capability) There's no need to signal failure, as
failure is better dealt with through full capability parser -
just return the AS4, simpler.
* bgp_packet.c: (bgp_open_receive) Update to match
peek_for_as4_capability change.
Allow use of BGP_AS_TRANS by 2b speakers.
Use NOTIFY_OPEN_ERR rather than CEASE for OPEN parsing errors.
(bgp_capability_msg_parse) missing argument to debug print
(bgp_capability_receive) missing return values.
* tests/bgp_capability_test.c: (parse_test) update for changes to
peek_for_as4_capability
2007-07-25 Paul Jakma <paul.jakma@sun.com>
* Remove 2-byte size macros, just make existing macros take
argument to indicate which size to use.
Adjust all users - typically they want '1'.
* bgp_aspath.c: (aspath_has_as4) New, return 1 if there are any
as4's in a path.
(aspath_put) Return the number of bytes actually written, to
fix the bug Juergen noted: Splitting of segments will change
the number of bytes written from that already written to the
AS_PATH header.
(aspath_snmp_pathseg) Pass 2-byte flag to aspath_put. SNMP
is still defined as 2b.
(aspath_aggregate) fix latent bug.
(aspath_reconcile_as4) AS_PATH+NEW_AS_PATH reconciliation
function.
(aspath_key_make) Hash the AS_PATH string, rather than
just taking the addition of assegment ASes as the hash value,
hopefully sligthly more collision resistant.
(bgp_attr_munge_as4_attrs) Collide the NEW_ attributes
together with the OLD 2-byte forms, code Juergen
had in bgp_attr_parse but re-organised a bit.
(bgp_attr_parse) Bunch of code from Juergen moves
to previous function.
(bgp_packet_attribute) Compact significantly by
just /always/ using extended-length attr header.
Fix bug Juergen noted, by using aspath_put's
(new) returned size value for the attr header rather
than the (guesstimate) of aspath_size() - the two could
differ when aspath_put had to split large segments, unlikely
this bug was ever hit in the 'wild'.
(bgp_dump_routes_attr) Always use extended-len and
use aspath_put return for header length. Output 4b ASN
for AS_PATH and AGGREGATOR.
* bgp_ecommunity.c: (ecommunity_{hash_make,cmp}) fix
hash callback declarations to match prototypes.
(ecommunity_gettoken) Updated for ECOMMUNITY_ENCODE_AS4,
complete rewrite of Juergen's changes (no asdot support)
* bgp_open.c: (bgp_capability_as4) New, does what it says
on the tin.
(peek_for_as4_capability) Rewritten to use streams and
bgp_capability_as4.
* bgp_packet.c: (bgp_open_send) minor edit
checked (in the abstract at least) with Juergen.
Changes are to be more accepting, e.g, allow AS_TRANS on
a 2-byte session.
* (general) Update all commands to use CMD_AS_RANGE.
* bgp_vty.c: (bgp_clear) Fix return vals to use CMD_..
Remove stuff replicated by VTY_GET_LONG
(bgp_clear_vty) Return bgp_clear directly to vty.
* tests/aspath_test.c: Exercise 32bit parsing. Test reconcile
function.
* tests/ecommunity_test.c: New, test AS4 ecommunity changes,
positive test only at this time, error cases not tested yet.
2007-07-25 Juergen Kammer <j.kammer@eurodata.de>
* (general) AS4 support.
* bgpd.h: as_t changes to 4-bytes.
* bgp_aspath.h: Add BGP_AS4_MAX and BGP_AS_TRANS defines.
* bgp_aspath.c: AS_VALUE_SIZE becomes 4-byte, AS16_VALUE_SIZE
added for 2-byte.
Add AS16 versions of length calc macros.
(aspath_count_numas) New, count number of ASes.
(aspath_has_as4) New, return 1 if there are any as4's in a
path.
(assegments_parse) Interpret assegment as 4 or 2 byte,
according to how the caller instructs us, with a new
argument.
(aspath_parse) Add use32bit argument to pass to
assegments_parse. Adjust all its callers to pass 1, unless
otherwise noted.
(assegment_data_put) Adjust to be able to write 2 or 4 byte
AS, according to new use32bit argument.
(aspath_put) Adjust to write 2 or 4.
(aspath_gettoken) Use a long for passed in asno.
* bgp_attr.c: (attr_str) Add BGP_ATTR_AS4_PATH and
BGP_ATTR_AS4_AGGREGATOR.
(bgp_attr_aspath) Call aspath_parse with right 2/4 arg, as
determined by received-capability flag.
(bgp_attr_aspath_check) New, code previously in attr_aspath
but moved to new func so it can be run after NEW_AS_PATH
reconciliation.
(bgp_attr_as4_path) New, handle NEW_AS_PATH.
(bgp_attr_aggregator) Adjust to cope with 2/4 byte ASes.
(bgp_attr_as4_aggregator) New, read NEW_AGGREGATOR.
(bgp_attr_parse) Add handoffs to previous parsers for the two
new AS4 NEW_ attributes.
Various checks added for NEW/OLD reconciliation.
(bgp_packet_attribute) Support 2/4 for AS_PATH and
AGGREGATOR, detect when NEW_ attrs need to be sent.
* bgp_debug.{c,h}: Add 'debug bgp as4'.
* bgp_dump.c: MRTv2 support, unconditionally enabled, which
supports AS4. Based on patches from Erik (RIPE?).
* bgp_ecommunity.c: (ecommunity_ecom2str) ECOMMUNITY_ENCODE_AS4
support.
* bgp_open.c: (peek_for_as4_capability) New, peek for AS4
capability prior to full capability parsing, so we know which
ASN to use for struct peer lookup.
(bgp_open_capability) Always send AS4 capability.
* bgp_packet.c: (bgp_open_send) AS4 handling for AS field
(bgp_open_receive) Peek for AS4 capability first, and figure
out which AS to believe.
* bgp_vty.c: (bgp_show_peer) Print AS4 cap
* tests/aspath_test.c: Support asn32 changes, call aspath_parse
with 16 bit.
* vtysh/extract.pl: AS4 compatibility for router bgp ASNUMBER
* vtysh/extract.pl.in: AS4 compatibility for router bgp ASNUMBER
* vtysh/vtysh.c: AS4 compatibility for router bgp ASNUMBER
2007-10-15 00:32:21 +02:00
|
|
|
|
zlog_debug ("%s Dynamic Capability MP_EXT afi/safi invalid "
|
|
|
|
|
"(%u/%u)", peer->host, afi, safi);
|
[bgpd] cleanup, compact and consolidate capability parsing code
2007-07-26 Paul Jakma <paul.jakma@sun.com>
* (general) Clean up and compact capability parsing slightly.
Consolidate validation of length and logging of generic TLV, and
memcpy of capability data, thus removing such from cap specifc
code (not always present or correct).
* bgp_open.h: Add structures for the generic capability TLV header
and for the data formats of the various specific capabilities we
support. Hence remove the badly named, or else misdefined, struct
capability.
* bgp_open.c: (bgp_capability_vty_out) Use struct capability_mp_data.
Do the length checks *before* memcpy()'ing based on that length
(stored capability - should have been validated anyway on input,
but..).
(bgp_afi_safi_valid_indices) new function to validate (afi,safi)
which is about to be used as index into arrays, consolidates
several instances of same, at least one of which appeared to be
incomplete..
(bgp_capability_mp) Much condensed.
(bgp_capability_orf_entry) New, process one ORF entry
(bgp_capability_orf) Condensed. Fixed to process all ORF entries.
(bgp_capability_restart) Condensed, and fixed to use a
cap-specific type, rather than abusing capability_mp.
(struct message capcode_str) added to aid generic logging.
(size_t cap_minsizes[]) added to aid generic validation of
capability length field.
(bgp_capability_parse) Generic logging and validation of TLV
consolidated here. Code compacted as much as possible.
* bgp_packet.c: (bgp_open_receive) Capability parsers now use
streams, so no more need here to manually fudge the input stream
getp.
(bgp_capability_msg_parse) use struct capability_mp_data. Validate
lengths /before/ memcpy. Use bgp_afi_safi_valid_indices.
(bgp_capability_receive) Exported for use by test harness.
* bgp_vty.c: (bgp_show_summary) fix conversion warning
(bgp_show_peer) ditto
* bgp_debug.h: Fix storage 'extern' after type 'const'.
* lib/log.c: (mes_lookup) warning about code not being in
same-number array slot should be debug, not warning. E.g. BGP
has several discontigious number spaces, allocating from
different parts of a space is not uncommon (e.g. IANA
assigned versus vendor-assigned code points in some number
space).
2007-08-06 17:21:45 +02:00
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
2002-12-13 21:15:29 +01:00
|
|
|
|
/* Address family check. */
|
[bgpd] cleanup, compact and consolidate capability parsing code
2007-07-26 Paul Jakma <paul.jakma@sun.com>
* (general) Clean up and compact capability parsing slightly.
Consolidate validation of length and logging of generic TLV, and
memcpy of capability data, thus removing such from cap specifc
code (not always present or correct).
* bgp_open.h: Add structures for the generic capability TLV header
and for the data formats of the various specific capabilities we
support. Hence remove the badly named, or else misdefined, struct
capability.
* bgp_open.c: (bgp_capability_vty_out) Use struct capability_mp_data.
Do the length checks *before* memcpy()'ing based on that length
(stored capability - should have been validated anyway on input,
but..).
(bgp_afi_safi_valid_indices) new function to validate (afi,safi)
which is about to be used as index into arrays, consolidates
several instances of same, at least one of which appeared to be
incomplete..
(bgp_capability_mp) Much condensed.
(bgp_capability_orf_entry) New, process one ORF entry
(bgp_capability_orf) Condensed. Fixed to process all ORF entries.
(bgp_capability_restart) Condensed, and fixed to use a
cap-specific type, rather than abusing capability_mp.
(struct message capcode_str) added to aid generic logging.
(size_t cap_minsizes[]) added to aid generic validation of
capability length field.
(bgp_capability_parse) Generic logging and validation of TLV
consolidated here. Code compacted as much as possible.
* bgp_packet.c: (bgp_open_receive) Capability parsers now use
streams, so no more need here to manually fudge the input stream
getp.
(bgp_capability_msg_parse) use struct capability_mp_data. Validate
lengths /before/ memcpy. Use bgp_afi_safi_valid_indices.
(bgp_capability_receive) Exported for use by test harness.
* bgp_vty.c: (bgp_show_summary) fix conversion warning
(bgp_show_peer) ditto
* bgp_debug.h: Fix storage 'extern' after type 'const'.
* lib/log.c: (mes_lookup) warning about code not being in
same-number array slot should be debug, not warning. E.g. BGP
has several discontigious number spaces, allocating from
different parts of a space is not uncommon (e.g. IANA
assigned versus vendor-assigned code points in some number
space).
2007-08-06 17:21:45 +02:00
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
|
|
|
|
zlog_debug ("%s CAPABILITY has %s MP_EXT CAP for afi/safi: %u/%u",
|
|
|
|
|
peer->host,
|
|
|
|
|
action == CAPABILITY_ACTION_SET
|
|
|
|
|
? "Advertising" : "Removing",
|
|
|
|
|
ntohs(mpc.afi) , mpc.safi);
|
|
|
|
|
|
|
|
|
|
if (action == CAPABILITY_ACTION_SET)
|
|
|
|
|
{
|
|
|
|
|
peer->afc_recv[afi][safi] = 1;
|
|
|
|
|
if (peer->afc[afi][safi])
|
|
|
|
|
{
|
|
|
|
|
peer->afc_nego[afi][safi] = 1;
|
|
|
|
|
bgp_announce_route (peer, afi, safi);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
peer->afc_recv[afi][safi] = 0;
|
|
|
|
|
peer->afc_nego[afi][safi] = 0;
|
|
|
|
|
|
|
|
|
|
if (peer_active_nego (peer))
|
|
|
|
|
bgp_clear_route (peer, afi, safi);
|
|
|
|
|
else
|
|
|
|
|
BGP_EVENT_ADD (peer, BGP_Stop);
|
|
|
|
|
}
|
2002-12-13 21:15:29 +01:00
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
zlog_warn ("%s unrecognized capability code: %d - ignored",
|
[bgpd] cleanup, compact and consolidate capability parsing code
2007-07-26 Paul Jakma <paul.jakma@sun.com>
* (general) Clean up and compact capability parsing slightly.
Consolidate validation of length and logging of generic TLV, and
memcpy of capability data, thus removing such from cap specifc
code (not always present or correct).
* bgp_open.h: Add structures for the generic capability TLV header
and for the data formats of the various specific capabilities we
support. Hence remove the badly named, or else misdefined, struct
capability.
* bgp_open.c: (bgp_capability_vty_out) Use struct capability_mp_data.
Do the length checks *before* memcpy()'ing based on that length
(stored capability - should have been validated anyway on input,
but..).
(bgp_afi_safi_valid_indices) new function to validate (afi,safi)
which is about to be used as index into arrays, consolidates
several instances of same, at least one of which appeared to be
incomplete..
(bgp_capability_mp) Much condensed.
(bgp_capability_orf_entry) New, process one ORF entry
(bgp_capability_orf) Condensed. Fixed to process all ORF entries.
(bgp_capability_restart) Condensed, and fixed to use a
cap-specific type, rather than abusing capability_mp.
(struct message capcode_str) added to aid generic logging.
(size_t cap_minsizes[]) added to aid generic validation of
capability length field.
(bgp_capability_parse) Generic logging and validation of TLV
consolidated here. Code compacted as much as possible.
* bgp_packet.c: (bgp_open_receive) Capability parsers now use
streams, so no more need here to manually fudge the input stream
getp.
(bgp_capability_msg_parse) use struct capability_mp_data. Validate
lengths /before/ memcpy. Use bgp_afi_safi_valid_indices.
(bgp_capability_receive) Exported for use by test harness.
* bgp_vty.c: (bgp_show_summary) fix conversion warning
(bgp_show_peer) ditto
* bgp_debug.h: Fix storage 'extern' after type 'const'.
* lib/log.c: (mes_lookup) warning about code not being in
same-number array slot should be debug, not warning. E.g. BGP
has several discontigious number spaces, allocating from
different parts of a space is not uncommon (e.g. IANA
assigned versus vendor-assigned code points in some number
space).
2007-08-06 17:21:45 +02:00
|
|
|
|
peer->host, hdr->code);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
}
|
[bgpd] cleanup, compact and consolidate capability parsing code
2007-07-26 Paul Jakma <paul.jakma@sun.com>
* (general) Clean up and compact capability parsing slightly.
Consolidate validation of length and logging of generic TLV, and
memcpy of capability data, thus removing such from cap specifc
code (not always present or correct).
* bgp_open.h: Add structures for the generic capability TLV header
and for the data formats of the various specific capabilities we
support. Hence remove the badly named, or else misdefined, struct
capability.
* bgp_open.c: (bgp_capability_vty_out) Use struct capability_mp_data.
Do the length checks *before* memcpy()'ing based on that length
(stored capability - should have been validated anyway on input,
but..).
(bgp_afi_safi_valid_indices) new function to validate (afi,safi)
which is about to be used as index into arrays, consolidates
several instances of same, at least one of which appeared to be
incomplete..
(bgp_capability_mp) Much condensed.
(bgp_capability_orf_entry) New, process one ORF entry
(bgp_capability_orf) Condensed. Fixed to process all ORF entries.
(bgp_capability_restart) Condensed, and fixed to use a
cap-specific type, rather than abusing capability_mp.
(struct message capcode_str) added to aid generic logging.
(size_t cap_minsizes[]) added to aid generic validation of
capability length field.
(bgp_capability_parse) Generic logging and validation of TLV
consolidated here. Code compacted as much as possible.
* bgp_packet.c: (bgp_open_receive) Capability parsers now use
streams, so no more need here to manually fudge the input stream
getp.
(bgp_capability_msg_parse) use struct capability_mp_data. Validate
lengths /before/ memcpy. Use bgp_afi_safi_valid_indices.
(bgp_capability_receive) Exported for use by test harness.
* bgp_vty.c: (bgp_show_summary) fix conversion warning
(bgp_show_peer) ditto
* bgp_debug.h: Fix storage 'extern' after type 'const'.
* lib/log.c: (mes_lookup) warning about code not being in
same-number array slot should be debug, not warning. E.g. BGP
has several discontigious number spaces, allocating from
different parts of a space is not uncommon (e.g. IANA
assigned versus vendor-assigned code points in some number
space).
2007-08-06 17:21:45 +02:00
|
|
|
|
pnt += hdr->length + 3;
|
2002-12-13 21:15:29 +01:00
|
|
|
|
}
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Dynamic Capability is received. */
|
[bgpd] cleanup, compact and consolidate capability parsing code
2007-07-26 Paul Jakma <paul.jakma@sun.com>
* (general) Clean up and compact capability parsing slightly.
Consolidate validation of length and logging of generic TLV, and
memcpy of capability data, thus removing such from cap specifc
code (not always present or correct).
* bgp_open.h: Add structures for the generic capability TLV header
and for the data formats of the various specific capabilities we
support. Hence remove the badly named, or else misdefined, struct
capability.
* bgp_open.c: (bgp_capability_vty_out) Use struct capability_mp_data.
Do the length checks *before* memcpy()'ing based on that length
(stored capability - should have been validated anyway on input,
but..).
(bgp_afi_safi_valid_indices) new function to validate (afi,safi)
which is about to be used as index into arrays, consolidates
several instances of same, at least one of which appeared to be
incomplete..
(bgp_capability_mp) Much condensed.
(bgp_capability_orf_entry) New, process one ORF entry
(bgp_capability_orf) Condensed. Fixed to process all ORF entries.
(bgp_capability_restart) Condensed, and fixed to use a
cap-specific type, rather than abusing capability_mp.
(struct message capcode_str) added to aid generic logging.
(size_t cap_minsizes[]) added to aid generic validation of
capability length field.
(bgp_capability_parse) Generic logging and validation of TLV
consolidated here. Code compacted as much as possible.
* bgp_packet.c: (bgp_open_receive) Capability parsers now use
streams, so no more need here to manually fudge the input stream
getp.
(bgp_capability_msg_parse) use struct capability_mp_data. Validate
lengths /before/ memcpy. Use bgp_afi_safi_valid_indices.
(bgp_capability_receive) Exported for use by test harness.
* bgp_vty.c: (bgp_show_summary) fix conversion warning
(bgp_show_peer) ditto
* bgp_debug.h: Fix storage 'extern' after type 'const'.
* lib/log.c: (mes_lookup) warning about code not being in
same-number array slot should be debug, not warning. E.g. BGP
has several discontigious number spaces, allocating from
different parts of a space is not uncommon (e.g. IANA
assigned versus vendor-assigned code points in some number
space).
2007-08-06 17:21:45 +02:00
|
|
|
|
int
|
2002-12-13 21:15:29 +01:00
|
|
|
|
bgp_capability_receive (struct peer *peer, bgp_size_t size)
|
|
|
|
|
{
|
|
|
|
|
u_char *pnt;
|
|
|
|
|
|
|
|
|
|
/* Fetch pointer. */
|
|
|
|
|
pnt = stream_pnt (peer->ibuf);
|
|
|
|
|
|
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog_debug ("%s rcv CAPABILITY", peer->host);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
|
|
|
|
|
/* If peer does not have the capability, send notification. */
|
|
|
|
|
if (! CHECK_FLAG (peer->cap, PEER_CAP_DYNAMIC_ADV))
|
|
|
|
|
{
|
|
|
|
|
plog_err (peer->log, "%s [Error] BGP dynamic capability is not enabled",
|
|
|
|
|
peer->host);
|
|
|
|
|
bgp_notify_send (peer,
|
|
|
|
|
BGP_NOTIFY_HEADER_ERR,
|
|
|
|
|
BGP_NOTIFY_HEADER_BAD_MESTYPE);
|
[bgpd] Merge AS4 support
2007-10-14 Paul Jakma <paul.jakma@sun.com>
* NEWS: Note that MRT dumps are now version 2
* (general) Merge in Juergen Kammer's AS4 patch.
2007-09-27 Paul Jakma <paul.jakma@sun.com>
* bgp_aspath.c: (assegment_normalise) remove duplicates from
from sets.
(aspath_reconcile_as4) disregard a broken part of the RFC around
error handling in path reconciliation.
* aspath_test.c: Test dupe-weeding from sets.
Test that reconciliation merges AS_PATH and AS4_PATH where
former is shorter than latter.
2007-09-26 Paul Jakma <paul.jakma@sun.com>
* aspath_test.c: Test AS4_PATH reconcilation where length
of AS_PATH and AS4_PATH is same.
2007-09-25 Paul Jakma <paul.jakma@sun.com>
* bgp_open.c: (peek_for_as4_capability) Fix to work.
* bgp_packet.c: (bgp_open_receive) Fix sanity check of as4.
* tests/bgp_capability_test.c: (general) Extend tests to validate
peek_for_as4_capability.
Add test of full OPEN Option block, with multiple capabilities,
both as a series of Option, and a single option.
Add some crap to beginning of stream, to prevent code depending
on getp == 0.
2007-09-18 Paul Jakma <paul.jakma@sun.com>
* bgp_open.c: (bgp_capability_as4) debug printf inline with others.
(peek_for_as4_capability) There's no need to signal failure, as
failure is better dealt with through full capability parser -
just return the AS4, simpler.
* bgp_packet.c: (bgp_open_receive) Update to match
peek_for_as4_capability change.
Allow use of BGP_AS_TRANS by 2b speakers.
Use NOTIFY_OPEN_ERR rather than CEASE for OPEN parsing errors.
(bgp_capability_msg_parse) missing argument to debug print
(bgp_capability_receive) missing return values.
* tests/bgp_capability_test.c: (parse_test) update for changes to
peek_for_as4_capability
2007-07-25 Paul Jakma <paul.jakma@sun.com>
* Remove 2-byte size macros, just make existing macros take
argument to indicate which size to use.
Adjust all users - typically they want '1'.
* bgp_aspath.c: (aspath_has_as4) New, return 1 if there are any
as4's in a path.
(aspath_put) Return the number of bytes actually written, to
fix the bug Juergen noted: Splitting of segments will change
the number of bytes written from that already written to the
AS_PATH header.
(aspath_snmp_pathseg) Pass 2-byte flag to aspath_put. SNMP
is still defined as 2b.
(aspath_aggregate) fix latent bug.
(aspath_reconcile_as4) AS_PATH+NEW_AS_PATH reconciliation
function.
(aspath_key_make) Hash the AS_PATH string, rather than
just taking the addition of assegment ASes as the hash value,
hopefully sligthly more collision resistant.
(bgp_attr_munge_as4_attrs) Collide the NEW_ attributes
together with the OLD 2-byte forms, code Juergen
had in bgp_attr_parse but re-organised a bit.
(bgp_attr_parse) Bunch of code from Juergen moves
to previous function.
(bgp_packet_attribute) Compact significantly by
just /always/ using extended-length attr header.
Fix bug Juergen noted, by using aspath_put's
(new) returned size value for the attr header rather
than the (guesstimate) of aspath_size() - the two could
differ when aspath_put had to split large segments, unlikely
this bug was ever hit in the 'wild'.
(bgp_dump_routes_attr) Always use extended-len and
use aspath_put return for header length. Output 4b ASN
for AS_PATH and AGGREGATOR.
* bgp_ecommunity.c: (ecommunity_{hash_make,cmp}) fix
hash callback declarations to match prototypes.
(ecommunity_gettoken) Updated for ECOMMUNITY_ENCODE_AS4,
complete rewrite of Juergen's changes (no asdot support)
* bgp_open.c: (bgp_capability_as4) New, does what it says
on the tin.
(peek_for_as4_capability) Rewritten to use streams and
bgp_capability_as4.
* bgp_packet.c: (bgp_open_send) minor edit
checked (in the abstract at least) with Juergen.
Changes are to be more accepting, e.g, allow AS_TRANS on
a 2-byte session.
* (general) Update all commands to use CMD_AS_RANGE.
* bgp_vty.c: (bgp_clear) Fix return vals to use CMD_..
Remove stuff replicated by VTY_GET_LONG
(bgp_clear_vty) Return bgp_clear directly to vty.
* tests/aspath_test.c: Exercise 32bit parsing. Test reconcile
function.
* tests/ecommunity_test.c: New, test AS4 ecommunity changes,
positive test only at this time, error cases not tested yet.
2007-07-25 Juergen Kammer <j.kammer@eurodata.de>
* (general) AS4 support.
* bgpd.h: as_t changes to 4-bytes.
* bgp_aspath.h: Add BGP_AS4_MAX and BGP_AS_TRANS defines.
* bgp_aspath.c: AS_VALUE_SIZE becomes 4-byte, AS16_VALUE_SIZE
added for 2-byte.
Add AS16 versions of length calc macros.
(aspath_count_numas) New, count number of ASes.
(aspath_has_as4) New, return 1 if there are any as4's in a
path.
(assegments_parse) Interpret assegment as 4 or 2 byte,
according to how the caller instructs us, with a new
argument.
(aspath_parse) Add use32bit argument to pass to
assegments_parse. Adjust all its callers to pass 1, unless
otherwise noted.
(assegment_data_put) Adjust to be able to write 2 or 4 byte
AS, according to new use32bit argument.
(aspath_put) Adjust to write 2 or 4.
(aspath_gettoken) Use a long for passed in asno.
* bgp_attr.c: (attr_str) Add BGP_ATTR_AS4_PATH and
BGP_ATTR_AS4_AGGREGATOR.
(bgp_attr_aspath) Call aspath_parse with right 2/4 arg, as
determined by received-capability flag.
(bgp_attr_aspath_check) New, code previously in attr_aspath
but moved to new func so it can be run after NEW_AS_PATH
reconciliation.
(bgp_attr_as4_path) New, handle NEW_AS_PATH.
(bgp_attr_aggregator) Adjust to cope with 2/4 byte ASes.
(bgp_attr_as4_aggregator) New, read NEW_AGGREGATOR.
(bgp_attr_parse) Add handoffs to previous parsers for the two
new AS4 NEW_ attributes.
Various checks added for NEW/OLD reconciliation.
(bgp_packet_attribute) Support 2/4 for AS_PATH and
AGGREGATOR, detect when NEW_ attrs need to be sent.
* bgp_debug.{c,h}: Add 'debug bgp as4'.
* bgp_dump.c: MRTv2 support, unconditionally enabled, which
supports AS4. Based on patches from Erik (RIPE?).
* bgp_ecommunity.c: (ecommunity_ecom2str) ECOMMUNITY_ENCODE_AS4
support.
* bgp_open.c: (peek_for_as4_capability) New, peek for AS4
capability prior to full capability parsing, so we know which
ASN to use for struct peer lookup.
(bgp_open_capability) Always send AS4 capability.
* bgp_packet.c: (bgp_open_send) AS4 handling for AS field
(bgp_open_receive) Peek for AS4 capability first, and figure
out which AS to believe.
* bgp_vty.c: (bgp_show_peer) Print AS4 cap
* tests/aspath_test.c: Support asn32 changes, call aspath_parse
with 16 bit.
* vtysh/extract.pl: AS4 compatibility for router bgp ASNUMBER
* vtysh/extract.pl.in: AS4 compatibility for router bgp ASNUMBER
* vtysh/vtysh.c: AS4 compatibility for router bgp ASNUMBER
2007-10-15 00:32:21 +02:00
|
|
|
|
return -1;
|
2002-12-13 21:15:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Status must be Established. */
|
|
|
|
|
if (peer->status != Established)
|
|
|
|
|
{
|
|
|
|
|
plog_err (peer->log,
|
|
|
|
|
"%s [Error] Dynamic capability packet received under status %s", peer->host, LOOKUP (bgp_status_msg, peer->status));
|
|
|
|
|
bgp_notify_send (peer, BGP_NOTIFY_FSM_ERR, 0);
|
[bgpd] Merge AS4 support
2007-10-14 Paul Jakma <paul.jakma@sun.com>
* NEWS: Note that MRT dumps are now version 2
* (general) Merge in Juergen Kammer's AS4 patch.
2007-09-27 Paul Jakma <paul.jakma@sun.com>
* bgp_aspath.c: (assegment_normalise) remove duplicates from
from sets.
(aspath_reconcile_as4) disregard a broken part of the RFC around
error handling in path reconciliation.
* aspath_test.c: Test dupe-weeding from sets.
Test that reconciliation merges AS_PATH and AS4_PATH where
former is shorter than latter.
2007-09-26 Paul Jakma <paul.jakma@sun.com>
* aspath_test.c: Test AS4_PATH reconcilation where length
of AS_PATH and AS4_PATH is same.
2007-09-25 Paul Jakma <paul.jakma@sun.com>
* bgp_open.c: (peek_for_as4_capability) Fix to work.
* bgp_packet.c: (bgp_open_receive) Fix sanity check of as4.
* tests/bgp_capability_test.c: (general) Extend tests to validate
peek_for_as4_capability.
Add test of full OPEN Option block, with multiple capabilities,
both as a series of Option, and a single option.
Add some crap to beginning of stream, to prevent code depending
on getp == 0.
2007-09-18 Paul Jakma <paul.jakma@sun.com>
* bgp_open.c: (bgp_capability_as4) debug printf inline with others.
(peek_for_as4_capability) There's no need to signal failure, as
failure is better dealt with through full capability parser -
just return the AS4, simpler.
* bgp_packet.c: (bgp_open_receive) Update to match
peek_for_as4_capability change.
Allow use of BGP_AS_TRANS by 2b speakers.
Use NOTIFY_OPEN_ERR rather than CEASE for OPEN parsing errors.
(bgp_capability_msg_parse) missing argument to debug print
(bgp_capability_receive) missing return values.
* tests/bgp_capability_test.c: (parse_test) update for changes to
peek_for_as4_capability
2007-07-25 Paul Jakma <paul.jakma@sun.com>
* Remove 2-byte size macros, just make existing macros take
argument to indicate which size to use.
Adjust all users - typically they want '1'.
* bgp_aspath.c: (aspath_has_as4) New, return 1 if there are any
as4's in a path.
(aspath_put) Return the number of bytes actually written, to
fix the bug Juergen noted: Splitting of segments will change
the number of bytes written from that already written to the
AS_PATH header.
(aspath_snmp_pathseg) Pass 2-byte flag to aspath_put. SNMP
is still defined as 2b.
(aspath_aggregate) fix latent bug.
(aspath_reconcile_as4) AS_PATH+NEW_AS_PATH reconciliation
function.
(aspath_key_make) Hash the AS_PATH string, rather than
just taking the addition of assegment ASes as the hash value,
hopefully sligthly more collision resistant.
(bgp_attr_munge_as4_attrs) Collide the NEW_ attributes
together with the OLD 2-byte forms, code Juergen
had in bgp_attr_parse but re-organised a bit.
(bgp_attr_parse) Bunch of code from Juergen moves
to previous function.
(bgp_packet_attribute) Compact significantly by
just /always/ using extended-length attr header.
Fix bug Juergen noted, by using aspath_put's
(new) returned size value for the attr header rather
than the (guesstimate) of aspath_size() - the two could
differ when aspath_put had to split large segments, unlikely
this bug was ever hit in the 'wild'.
(bgp_dump_routes_attr) Always use extended-len and
use aspath_put return for header length. Output 4b ASN
for AS_PATH and AGGREGATOR.
* bgp_ecommunity.c: (ecommunity_{hash_make,cmp}) fix
hash callback declarations to match prototypes.
(ecommunity_gettoken) Updated for ECOMMUNITY_ENCODE_AS4,
complete rewrite of Juergen's changes (no asdot support)
* bgp_open.c: (bgp_capability_as4) New, does what it says
on the tin.
(peek_for_as4_capability) Rewritten to use streams and
bgp_capability_as4.
* bgp_packet.c: (bgp_open_send) minor edit
checked (in the abstract at least) with Juergen.
Changes are to be more accepting, e.g, allow AS_TRANS on
a 2-byte session.
* (general) Update all commands to use CMD_AS_RANGE.
* bgp_vty.c: (bgp_clear) Fix return vals to use CMD_..
Remove stuff replicated by VTY_GET_LONG
(bgp_clear_vty) Return bgp_clear directly to vty.
* tests/aspath_test.c: Exercise 32bit parsing. Test reconcile
function.
* tests/ecommunity_test.c: New, test AS4 ecommunity changes,
positive test only at this time, error cases not tested yet.
2007-07-25 Juergen Kammer <j.kammer@eurodata.de>
* (general) AS4 support.
* bgpd.h: as_t changes to 4-bytes.
* bgp_aspath.h: Add BGP_AS4_MAX and BGP_AS_TRANS defines.
* bgp_aspath.c: AS_VALUE_SIZE becomes 4-byte, AS16_VALUE_SIZE
added for 2-byte.
Add AS16 versions of length calc macros.
(aspath_count_numas) New, count number of ASes.
(aspath_has_as4) New, return 1 if there are any as4's in a
path.
(assegments_parse) Interpret assegment as 4 or 2 byte,
according to how the caller instructs us, with a new
argument.
(aspath_parse) Add use32bit argument to pass to
assegments_parse. Adjust all its callers to pass 1, unless
otherwise noted.
(assegment_data_put) Adjust to be able to write 2 or 4 byte
AS, according to new use32bit argument.
(aspath_put) Adjust to write 2 or 4.
(aspath_gettoken) Use a long for passed in asno.
* bgp_attr.c: (attr_str) Add BGP_ATTR_AS4_PATH and
BGP_ATTR_AS4_AGGREGATOR.
(bgp_attr_aspath) Call aspath_parse with right 2/4 arg, as
determined by received-capability flag.
(bgp_attr_aspath_check) New, code previously in attr_aspath
but moved to new func so it can be run after NEW_AS_PATH
reconciliation.
(bgp_attr_as4_path) New, handle NEW_AS_PATH.
(bgp_attr_aggregator) Adjust to cope with 2/4 byte ASes.
(bgp_attr_as4_aggregator) New, read NEW_AGGREGATOR.
(bgp_attr_parse) Add handoffs to previous parsers for the two
new AS4 NEW_ attributes.
Various checks added for NEW/OLD reconciliation.
(bgp_packet_attribute) Support 2/4 for AS_PATH and
AGGREGATOR, detect when NEW_ attrs need to be sent.
* bgp_debug.{c,h}: Add 'debug bgp as4'.
* bgp_dump.c: MRTv2 support, unconditionally enabled, which
supports AS4. Based on patches from Erik (RIPE?).
* bgp_ecommunity.c: (ecommunity_ecom2str) ECOMMUNITY_ENCODE_AS4
support.
* bgp_open.c: (peek_for_as4_capability) New, peek for AS4
capability prior to full capability parsing, so we know which
ASN to use for struct peer lookup.
(bgp_open_capability) Always send AS4 capability.
* bgp_packet.c: (bgp_open_send) AS4 handling for AS field
(bgp_open_receive) Peek for AS4 capability first, and figure
out which AS to believe.
* bgp_vty.c: (bgp_show_peer) Print AS4 cap
* tests/aspath_test.c: Support asn32 changes, call aspath_parse
with 16 bit.
* vtysh/extract.pl: AS4 compatibility for router bgp ASNUMBER
* vtysh/extract.pl.in: AS4 compatibility for router bgp ASNUMBER
* vtysh/vtysh.c: AS4 compatibility for router bgp ASNUMBER
2007-10-15 00:32:21 +02:00
|
|
|
|
return -1;
|
2002-12-13 21:15:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Parse packet. */
|
[bgpd] cleanup, compact and consolidate capability parsing code
2007-07-26 Paul Jakma <paul.jakma@sun.com>
* (general) Clean up and compact capability parsing slightly.
Consolidate validation of length and logging of generic TLV, and
memcpy of capability data, thus removing such from cap specifc
code (not always present or correct).
* bgp_open.h: Add structures for the generic capability TLV header
and for the data formats of the various specific capabilities we
support. Hence remove the badly named, or else misdefined, struct
capability.
* bgp_open.c: (bgp_capability_vty_out) Use struct capability_mp_data.
Do the length checks *before* memcpy()'ing based on that length
(stored capability - should have been validated anyway on input,
but..).
(bgp_afi_safi_valid_indices) new function to validate (afi,safi)
which is about to be used as index into arrays, consolidates
several instances of same, at least one of which appeared to be
incomplete..
(bgp_capability_mp) Much condensed.
(bgp_capability_orf_entry) New, process one ORF entry
(bgp_capability_orf) Condensed. Fixed to process all ORF entries.
(bgp_capability_restart) Condensed, and fixed to use a
cap-specific type, rather than abusing capability_mp.
(struct message capcode_str) added to aid generic logging.
(size_t cap_minsizes[]) added to aid generic validation of
capability length field.
(bgp_capability_parse) Generic logging and validation of TLV
consolidated here. Code compacted as much as possible.
* bgp_packet.c: (bgp_open_receive) Capability parsers now use
streams, so no more need here to manually fudge the input stream
getp.
(bgp_capability_msg_parse) use struct capability_mp_data. Validate
lengths /before/ memcpy. Use bgp_afi_safi_valid_indices.
(bgp_capability_receive) Exported for use by test harness.
* bgp_vty.c: (bgp_show_summary) fix conversion warning
(bgp_show_peer) ditto
* bgp_debug.h: Fix storage 'extern' after type 'const'.
* lib/log.c: (mes_lookup) warning about code not being in
same-number array slot should be debug, not warning. E.g. BGP
has several discontigious number spaces, allocating from
different parts of a space is not uncommon (e.g. IANA
assigned versus vendor-assigned code points in some number
space).
2007-08-06 17:21:45 +02:00
|
|
|
|
return bgp_capability_msg_parse (peer, pnt, size);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* BGP read utility function. */
|
2005-06-28 14:44:16 +02:00
|
|
|
|
static int
|
2002-12-13 21:15:29 +01:00
|
|
|
|
bgp_read_packet (struct peer *peer)
|
|
|
|
|
{
|
|
|
|
|
int nbytes;
|
|
|
|
|
int readsize;
|
|
|
|
|
|
2005-02-09 16:51:56 +01:00
|
|
|
|
readsize = peer->packet_size - stream_get_endp (peer->ibuf);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
|
|
|
|
|
/* If size is zero then return. */
|
|
|
|
|
if (! readsize)
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
|
|
/* Read packet from fd. */
|
2004-05-01 10:44:08 +02:00
|
|
|
|
nbytes = stream_read_unblock (peer->ibuf, peer->fd, readsize);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
|
|
|
|
|
/* If read byte is smaller than zero then error occured. */
|
|
|
|
|
if (nbytes < 0)
|
|
|
|
|
{
|
|
|
|
|
if (errno == EAGAIN)
|
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
|
|
plog_err (peer->log, "%s [Error] bgp_read_packet error: %s",
|
2004-11-20 03:06:59 +01:00
|
|
|
|
peer->host, safe_strerror (errno));
|
2005-02-02 15:40:33 +01:00
|
|
|
|
|
|
|
|
|
if (peer->status == Established)
|
|
|
|
|
{
|
|
|
|
|
if (CHECK_FLAG (peer->sflags, PEER_STATUS_NSF_MODE))
|
|
|
|
|
{
|
|
|
|
|
peer->last_reset = PEER_DOWN_NSF_CLOSE_SESSION;
|
|
|
|
|
SET_FLAG (peer->sflags, PEER_STATUS_NSF_WAIT);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
peer->last_reset = PEER_DOWN_CLOSE_SESSION;
|
|
|
|
|
}
|
|
|
|
|
|
2002-12-13 21:15:29 +01:00
|
|
|
|
BGP_EVENT_ADD (peer, TCP_fatal_error);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* When read byte is zero : clear bgp peer and return */
|
|
|
|
|
if (nbytes == 0)
|
|
|
|
|
{
|
|
|
|
|
if (BGP_DEBUG (events, EVENTS))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
plog_debug (peer->log, "%s [Event] BGP connection closed fd %d",
|
2004-05-01 10:44:08 +02:00
|
|
|
|
peer->host, peer->fd);
|
2004-05-20 11:19:34 +02:00
|
|
|
|
|
|
|
|
|
if (peer->status == Established)
|
2005-02-02 15:40:33 +01:00
|
|
|
|
{
|
|
|
|
|
if (CHECK_FLAG (peer->sflags, PEER_STATUS_NSF_MODE))
|
|
|
|
|
{
|
|
|
|
|
peer->last_reset = PEER_DOWN_NSF_CLOSE_SESSION;
|
|
|
|
|
SET_FLAG (peer->sflags, PEER_STATUS_NSF_WAIT);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
peer->last_reset = PEER_DOWN_CLOSE_SESSION;
|
|
|
|
|
}
|
2004-05-20 11:19:34 +02:00
|
|
|
|
|
2002-12-13 21:15:29 +01:00
|
|
|
|
BGP_EVENT_ADD (peer, TCP_connection_closed);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* We read partial packet. */
|
2005-02-09 16:51:56 +01:00
|
|
|
|
if (stream_get_endp (peer->ibuf) != peer->packet_size)
|
2002-12-13 21:15:29 +01:00
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Marker check. */
|
2005-06-28 14:44:16 +02:00
|
|
|
|
static int
|
2002-12-13 21:15:29 +01:00
|
|
|
|
bgp_marker_all_one (struct stream *s, int length)
|
|
|
|
|
{
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < length; i++)
|
|
|
|
|
if (s->data[i] != 0xff)
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Starting point of packet process function. */
|
|
|
|
|
int
|
|
|
|
|
bgp_read (struct thread *thread)
|
|
|
|
|
{
|
|
|
|
|
int ret;
|
|
|
|
|
u_char type = 0;
|
|
|
|
|
struct peer *peer;
|
|
|
|
|
bgp_size_t size;
|
|
|
|
|
char notify_data_length[2];
|
|
|
|
|
|
|
|
|
|
/* Yes first of all get peer pointer. */
|
|
|
|
|
peer = THREAD_ARG (thread);
|
|
|
|
|
peer->t_read = NULL;
|
|
|
|
|
|
|
|
|
|
/* For non-blocking IO check. */
|
|
|
|
|
if (peer->status == Connect)
|
|
|
|
|
{
|
|
|
|
|
bgp_connect_check (peer);
|
|
|
|
|
goto done;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
2004-05-01 10:44:08 +02:00
|
|
|
|
if (peer->fd < 0)
|
2002-12-13 21:15:29 +01:00
|
|
|
|
{
|
2004-05-01 10:44:08 +02:00
|
|
|
|
zlog_err ("bgp_read peer's fd is negative value %d", peer->fd);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
return -1;
|
|
|
|
|
}
|
2004-05-01 10:44:08 +02:00
|
|
|
|
BGP_READ_ON (peer->t_read, bgp_read, peer->fd);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Read packet header to determine type of the packet */
|
|
|
|
|
if (peer->packet_size == 0)
|
|
|
|
|
peer->packet_size = BGP_HEADER_SIZE;
|
|
|
|
|
|
2005-02-09 16:51:56 +01:00
|
|
|
|
if (stream_get_endp (peer->ibuf) < BGP_HEADER_SIZE)
|
2002-12-13 21:15:29 +01:00
|
|
|
|
{
|
|
|
|
|
ret = bgp_read_packet (peer);
|
|
|
|
|
|
|
|
|
|
/* Header read error or partial read packet. */
|
|
|
|
|
if (ret < 0)
|
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
|
|
/* Get size and type. */
|
2005-02-09 16:51:56 +01:00
|
|
|
|
stream_forward_getp (peer->ibuf, BGP_MARKER_SIZE);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
memcpy (notify_data_length, stream_pnt (peer->ibuf), 2);
|
|
|
|
|
size = stream_getw (peer->ibuf);
|
|
|
|
|
type = stream_getc (peer->ibuf);
|
|
|
|
|
|
|
|
|
|
if (BGP_DEBUG (normal, NORMAL) && type != 2 && type != 0)
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog_debug ("%s rcv message type %d, length (excl. header) %d",
|
2002-12-13 21:15:29 +01:00
|
|
|
|
peer->host, type, size - BGP_HEADER_SIZE);
|
|
|
|
|
|
|
|
|
|
/* Marker check */
|
2004-07-09 14:11:31 +02:00
|
|
|
|
if (((type == BGP_MSG_OPEN) || (type == BGP_MSG_KEEPALIVE))
|
2002-12-13 21:15:29 +01:00
|
|
|
|
&& ! bgp_marker_all_one (peer->ibuf, BGP_MARKER_SIZE))
|
|
|
|
|
{
|
|
|
|
|
bgp_notify_send (peer,
|
|
|
|
|
BGP_NOTIFY_HEADER_ERR,
|
|
|
|
|
BGP_NOTIFY_HEADER_NOT_SYNC);
|
|
|
|
|
goto done;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* BGP type check. */
|
|
|
|
|
if (type != BGP_MSG_OPEN && type != BGP_MSG_UPDATE
|
|
|
|
|
&& type != BGP_MSG_NOTIFY && type != BGP_MSG_KEEPALIVE
|
|
|
|
|
&& type != BGP_MSG_ROUTE_REFRESH_NEW
|
|
|
|
|
&& type != BGP_MSG_ROUTE_REFRESH_OLD
|
|
|
|
|
&& type != BGP_MSG_CAPABILITY)
|
|
|
|
|
{
|
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
plog_debug (peer->log,
|
2002-12-13 21:15:29 +01:00
|
|
|
|
"%s unknown message type 0x%02x",
|
|
|
|
|
peer->host, type);
|
|
|
|
|
bgp_notify_send_with_data (peer,
|
|
|
|
|
BGP_NOTIFY_HEADER_ERR,
|
|
|
|
|
BGP_NOTIFY_HEADER_BAD_MESTYPE,
|
|
|
|
|
&type, 1);
|
|
|
|
|
goto done;
|
|
|
|
|
}
|
|
|
|
|
/* Mimimum packet length check. */
|
|
|
|
|
if ((size < BGP_HEADER_SIZE)
|
|
|
|
|
|| (size > BGP_MAX_PACKET_SIZE)
|
|
|
|
|
|| (type == BGP_MSG_OPEN && size < BGP_MSG_OPEN_MIN_SIZE)
|
|
|
|
|
|| (type == BGP_MSG_UPDATE && size < BGP_MSG_UPDATE_MIN_SIZE)
|
|
|
|
|
|| (type == BGP_MSG_NOTIFY && size < BGP_MSG_NOTIFY_MIN_SIZE)
|
|
|
|
|
|| (type == BGP_MSG_KEEPALIVE && size != BGP_MSG_KEEPALIVE_MIN_SIZE)
|
|
|
|
|
|| (type == BGP_MSG_ROUTE_REFRESH_NEW && size < BGP_MSG_ROUTE_REFRESH_MIN_SIZE)
|
|
|
|
|
|| (type == BGP_MSG_ROUTE_REFRESH_OLD && size < BGP_MSG_ROUTE_REFRESH_MIN_SIZE)
|
|
|
|
|
|| (type == BGP_MSG_CAPABILITY && size < BGP_MSG_CAPABILITY_MIN_SIZE))
|
|
|
|
|
{
|
|
|
|
|
if (BGP_DEBUG (normal, NORMAL))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
plog_debug (peer->log,
|
2002-12-13 21:15:29 +01:00
|
|
|
|
"%s bad message length - %d for %s",
|
|
|
|
|
peer->host, size,
|
|
|
|
|
type == 128 ? "ROUTE-REFRESH" :
|
|
|
|
|
bgp_type_str[(int) type]);
|
|
|
|
|
bgp_notify_send_with_data (peer,
|
|
|
|
|
BGP_NOTIFY_HEADER_ERR,
|
|
|
|
|
BGP_NOTIFY_HEADER_BAD_MESLEN,
|
2004-09-26 18:09:34 +02:00
|
|
|
|
(u_char *) notify_data_length, 2);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
goto done;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Adjust size to message length. */
|
|
|
|
|
peer->packet_size = size;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
ret = bgp_read_packet (peer);
|
|
|
|
|
if (ret < 0)
|
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
|
|
/* Get size and type again. */
|
|
|
|
|
size = stream_getw_from (peer->ibuf, BGP_MARKER_SIZE);
|
|
|
|
|
type = stream_getc_from (peer->ibuf, BGP_MARKER_SIZE + 2);
|
|
|
|
|
|
|
|
|
|
/* BGP packet dump function. */
|
|
|
|
|
bgp_dump_packet (peer, type, peer->ibuf);
|
|
|
|
|
|
|
|
|
|
size = (peer->packet_size - BGP_HEADER_SIZE);
|
|
|
|
|
|
|
|
|
|
/* Read rest of the packet and call each sort of packet routine */
|
|
|
|
|
switch (type)
|
|
|
|
|
{
|
|
|
|
|
case BGP_MSG_OPEN:
|
|
|
|
|
peer->open_in++;
|
2004-07-09 14:11:31 +02:00
|
|
|
|
bgp_open_receive (peer, size); /* XXX return value ignored! */
|
2002-12-13 21:15:29 +01:00
|
|
|
|
break;
|
|
|
|
|
case BGP_MSG_UPDATE:
|
|
|
|
|
peer->readtime = time(NULL); /* Last read timer reset */
|
|
|
|
|
bgp_update_receive (peer, size);
|
|
|
|
|
break;
|
|
|
|
|
case BGP_MSG_NOTIFY:
|
|
|
|
|
bgp_notify_receive (peer, size);
|
|
|
|
|
break;
|
|
|
|
|
case BGP_MSG_KEEPALIVE:
|
|
|
|
|
peer->readtime = time(NULL); /* Last read timer reset */
|
|
|
|
|
bgp_keepalive_receive (peer, size);
|
|
|
|
|
break;
|
|
|
|
|
case BGP_MSG_ROUTE_REFRESH_NEW:
|
|
|
|
|
case BGP_MSG_ROUTE_REFRESH_OLD:
|
|
|
|
|
peer->refresh_in++;
|
|
|
|
|
bgp_route_refresh_receive (peer, size);
|
|
|
|
|
break;
|
|
|
|
|
case BGP_MSG_CAPABILITY:
|
|
|
|
|
peer->dynamic_cap_in++;
|
|
|
|
|
bgp_capability_receive (peer, size);
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Clear input buffer. */
|
|
|
|
|
peer->packet_size = 0;
|
|
|
|
|
if (peer->ibuf)
|
|
|
|
|
stream_reset (peer->ibuf);
|
|
|
|
|
|
|
|
|
|
done:
|
|
|
|
|
if (CHECK_FLAG (peer->sflags, PEER_STATUS_ACCEPT_PEER))
|
|
|
|
|
{
|
|
|
|
|
if (BGP_DEBUG (events, EVENTS))
|
2004-12-08 22:03:23 +01:00
|
|
|
|
zlog_debug ("%s [Event] Accepting BGP peer delete", peer->host);
|
2002-12-13 21:15:29 +01:00
|
|
|
|
peer_delete (peer);
|
|
|
|
|
}
|
|
|
|
|
return 0;
|
|
|
|
|
}
|