// SPDX-License-Identifier: GPL-2.0-or-later /* * BFD daemon northbound implementation. * * Copyright (C) 2019 Network Device Education Foundation, Inc. ("NetDEF") * Rafael Zalamena */ #include #include "lib/log.h" #include "lib/northbound.h" #include "bfd.h" #include "bfdd_nb.h" #include /* * Helpers. */ static void get_ip_by_interface(const char *ifname, const char *vrfname, int family, char *ifip) { char intfip[INET6_ADDRSTRLEN]; const struct interface *interface; const struct connected *connected; struct vrf *vrf; vrf = vrf_lookup_by_name(vrfname ? vrfname : VRF_DEFAULT_NAME); if (!vrf) return; interface = if_lookup_by_name_vrf(ifname, vrf); if (interface == NULL) return; frr_each (if_connected_const, interface->connected, connected) { if (!connected->address) continue; if (family != connected->address->family) continue; if (family == AF_INET6 && IN6_IS_ADDR_LINKLOCAL(&connected->address->u.prefix6)) continue; inet_ntop(family, family == AF_INET ? (void *)(&connected->address->u.prefix4) : (void *)(&connected->address->u.prefix6), intfip, INET6_ADDRSTRLEN); strlcpy(ifip, intfip, INET6_ADDRSTRLEN - 1); break; } } static void bfd_session_get_key(bool mhop, const struct lyd_node *dnode, struct bfd_key *bk) { const char *ifname = NULL, *vrfname = NULL; char ifip[INET6_ADDRSTRLEN] = { 0 }; struct sockaddr_any psa, lsa; /* Required destination parameter. */ strtosa(yang_dnode_get_string(dnode, "dest-addr"), &psa); /* Get optional source address. */ memset(&lsa, 0, sizeof(lsa)); if (yang_dnode_exists(dnode, "source-addr")) strtosa(yang_dnode_get_string(dnode, "source-addr"), &lsa); vrfname = yang_dnode_get_string(dnode, "vrf"); if (!mhop) { ifname = yang_dnode_get_string(dnode, "interface"); if (strcmp(ifname, "*") == 0) ifname = NULL; if (ifname != NULL && !yang_dnode_exists(dnode, "source-addr") && psa.sa_sin.sin_family != 0) { get_ip_by_interface(ifname, vrfname, psa.sa_sin.sin_family, ifip); strtosa(ifip, &lsa); } } /* Generate the corresponding key. */ gen_bfd_key(bk, &psa, &lsa, mhop, ifname, vrfname, NULL); } static void sbfd_session_get_key(bool mhop, const struct lyd_node *dnode, struct bfd_key *bk) { const char *ifname = NULL, *vrfname = NULL, *bfdname = NULL; struct sockaddr_any psa, lsa; /* Required source parameter. */ strtosa(yang_dnode_get_string(dnode, "source-addr"), &lsa); strtosa(yang_dnode_get_string(dnode, "dest-addr"), &psa); if (yang_dnode_exists(dnode, "bfd-name")) bfdname = yang_dnode_get_string(dnode, "bfd-name"); if (yang_dnode_exists(dnode, "vrf")) vrfname = yang_dnode_get_string(dnode, "vrf"); /* Generate the corresponding key. */ gen_bfd_key(bk, &psa, &lsa, mhop, ifname, vrfname, bfdname); } struct session_iter { int count; bool wildcard; }; static int session_iter_cb(const struct lyd_node *dnode, void *arg) { struct session_iter *iter = arg; const char *ifname; ifname = yang_dnode_get_string(dnode, "interface"); if (strmatch(ifname, "*")) iter->wildcard = true; iter->count++; return YANG_ITER_CONTINUE; } static int segment_list_iter_cb(const struct lyd_node *dnode, void *arg) { struct bfd_session *bs = arg; uint8_t segnum = bs->segnum; const char *addr; struct sockaddr_any sa; addr = yang_dnode_get_string(dnode, NULL); if (strtosa(addr, &sa) < 0 || sa.sa_sin6.sin6_family != AF_INET6) return YANG_ITER_STOP; memcpy(&bs->seg_list[segnum], &sa.sa_sin6.sin6_addr, sizeof(struct in6_addr)); bs->segnum = segnum + 1; return YANG_ITER_CONTINUE; } static int bfd_session_create(struct nb_cb_create_args *args, bool mhop, uint32_t bfd_mode) { const struct lyd_node *sess_dnode; struct session_iter iter; struct bfd_session *bs; const char *dest; const char *ifname; const char *vrfname; struct bfd_key bk; struct prefix p; const char *bfd_name = NULL; struct sockaddr_any out_sip6; switch (args->event) { case NB_EV_VALIDATE: if ((bfd_mode == BFD_MODE_TYPE_SBFD_ECHO) || (bfd_mode == BFD_MODE_TYPE_SBFD_INIT)) { if (bfd_session_get_by_name(yang_dnode_get_string(args->dnode, "bfd-name"))) { snprintf(args->errmsg, args->errmsg_len, "bfd name already exist."); return NB_ERR_VALIDATION; } return NB_OK; } yang_dnode_get_prefix(&p, args->dnode, "./dest-addr"); if (mhop) { /* * Do not allow IPv6 link-local address for multihop. */ if (p.family == AF_INET6 && IN6_IS_ADDR_LINKLOCAL(&p.u.prefix6)) { snprintf( args->errmsg, args->errmsg_len, "Cannot use link-local address for multihop sessions"); return NB_ERR_VALIDATION; } return NB_OK; } /* * When `dest-addr` is IPv6 and link-local we must * require interface name, otherwise we can't figure * which interface to use to send the packets. */ ifname = yang_dnode_get_string(args->dnode, "interface"); if (p.family == AF_INET6 && IN6_IS_ADDR_LINKLOCAL(&p.u.prefix6) && strcmp(ifname, "*") == 0) { snprintf( args->errmsg, args->errmsg_len, "When using link-local you must specify an interface"); return NB_ERR_VALIDATION; } iter.count = 0; iter.wildcard = false; sess_dnode = yang_dnode_get_parent(args->dnode, "sessions"); dest = yang_dnode_get_string(args->dnode, "dest-addr"); vrfname = yang_dnode_get_string(args->dnode, "vrf"); yang_dnode_iterate(session_iter_cb, &iter, sess_dnode, "./single-hop[dest-addr='%s'][vrf='%s']", dest, vrfname); if (iter.wildcard && iter.count > 1) { snprintf( args->errmsg, args->errmsg_len, "It is not allowed to configure the same peer with and without ifname"); return NB_ERR_VALIDATION; } break; case NB_EV_PREPARE: if (bfd_mode == BFD_MODE_TYPE_BFD) { bfd_session_get_key(mhop, args->dnode, &bk); bs = bfd_key_lookup(&bk); /* This session was already configured by another daemon. */ if (bs != NULL) { /* Now it is configured also by CLI. */ SET_FLAG(bs->flags, BFD_SESS_FLAG_CONFIG); bs->refcount++; args->resource->ptr = bs; break; } bs = bfd_session_new(BFD_MODE_TYPE_BFD); /* Fill the session key. */ bfd_session_get_key(mhop, args->dnode, &bs->key); /* Set configuration flags. */ bs->refcount = 1; SET_FLAG(bs->flags, BFD_SESS_FLAG_CONFIG); if (mhop) SET_FLAG(bs->flags, BFD_SESS_FLAG_MH); if (bs->key.family == AF_INET6) SET_FLAG(bs->flags, BFD_SESS_FLAG_IPV6); args->resource->ptr = bs; break; } else if (bfd_mode == BFD_MODE_TYPE_SBFD_ECHO || bfd_mode == BFD_MODE_TYPE_SBFD_INIT) { sbfd_session_get_key(mhop, args->dnode, &bk); bs = bfd_key_lookup(&bk); /* This session was already configured by another daemon. */ if (bs != NULL) { /* Now it is configured also by CLI. */ SET_FLAG(bs->flags, BFD_SESS_FLAG_CONFIG); bs->refcount++; args->resource->ptr = bs; break; } if (bfd_mode == BFD_MODE_TYPE_SBFD_ECHO && !yang_dnode_exists(args->dnode, "srv6-encap-data")) { //srv6-encap-data should not be null for sbfd echo snprintf(args->errmsg, args->errmsg_len, "srv6-encap-data should not be null"); return NB_ERR_RESOURCE; } if (bfd_mode == BFD_MODE_TYPE_SBFD_ECHO && !yang_dnode_exists(args->dnode, "srv6-source-ipv6")) { snprintf(args->errmsg, args->errmsg_len, "source_ipv6 should not be null"); return NB_ERR_RESOURCE; } if (bfd_mode == BFD_MODE_TYPE_SBFD_INIT) { if (!yang_dnode_exists(args->dnode, "remote-discr")) { snprintf(args->errmsg, args->errmsg_len, "remote-discr should not be null"); return NB_ERR_RESOURCE; } } bfd_name = yang_dnode_get_string(args->dnode, "bfd-name"); bs = bfd_session_new(bfd_mode); if (bs == NULL) { snprintf(args->errmsg, args->errmsg_len, "session-new: allocation failed"); return NB_ERR_RESOURCE; } /* Fill the session key. */ sbfd_session_get_key(mhop, args->dnode, &bs->key); strlcpy(bs->bfd_name, bfd_name, BFD_NAME_SIZE); if (yang_dnode_exists(args->dnode, "srv6-encap-data")) { yang_dnode_iterate(segment_list_iter_cb, bs, args->dnode, "./srv6-encap-data"); strtosa(yang_dnode_get_string(args->dnode, "./srv6-source-ipv6"), &out_sip6); memcpy(&bs->out_sip6, &out_sip6.sa_sin6.sin6_addr, sizeof(struct in6_addr)); } if (bfd_mode == BFD_MODE_TYPE_SBFD_INIT) { bs->discrs.remote_discr = yang_dnode_get_uint32(args->dnode, "./remote-discr"); } /* Set configuration flags. */ bs->refcount = 1; SET_FLAG(bs->flags, BFD_SESS_FLAG_CONFIG); if (mhop) SET_FLAG(bs->flags, BFD_SESS_FLAG_MH); if (bs->key.family == AF_INET6) SET_FLAG(bs->flags, BFD_SESS_FLAG_IPV6); if (bfd_mode == BFD_MODE_TYPE_SBFD_ECHO) { memcpy(&bs->key.peer, &bs->key.local, sizeof(struct in6_addr)); } else { bs->xmt_TO = bs->timers.desired_min_tx; bs->detect_TO = bs->detect_mult * bs->xmt_TO; } args->resource->ptr = bs; break; } else { snprintf(args->errmsg, args->errmsg_len, "bfd mode must be bfd or sbfd."); return NB_ERR_VALIDATION; } case NB_EV_APPLY: bs = args->resource->ptr; /* Only attempt to registrate if freshly allocated. */ if (bs->discrs.my_discr == 0 && bs_registrate(bs) == NULL) return NB_ERR_RESOURCE; nb_running_set_entry(args->dnode, bs); break; case NB_EV_ABORT: bs = args->resource->ptr; if (bs->refcount <= 1) bfd_session_free(bs); break; } return NB_OK; } static int bfd_session_destroy(enum nb_event event, const struct lyd_node *dnode, bool mhop, uint32_t bfd_mode) { struct bfd_session *bs; struct bfd_key bk; switch (event) { case NB_EV_VALIDATE: if (bfd_mode == BFD_MODE_TYPE_BFD) bfd_session_get_key(mhop, dnode, &bk); else sbfd_session_get_key(mhop, dnode, &bk); if (bfd_key_lookup(&bk) == NULL) return NB_ERR_INCONSISTENCY; break; case NB_EV_PREPARE: /* NOTHING */ break; case NB_EV_APPLY: bs = nb_running_unset_entry(dnode); /* CLI is not using this session anymore. */ if (CHECK_FLAG(bs->flags, BFD_SESS_FLAG_CONFIG) == 0) break; UNSET_FLAG(bs->flags, BFD_SESS_FLAG_CONFIG); bs->refcount--; /* There are still daemons using it. */ if (bs->refcount > 0) break; if (bglobal.debug_peer_event) zlog_info("session destroy: %s", bs_to_string(bs)); if (bfd_mode == BFD_MODE_TYPE_SBFD_ECHO || bfd_mode == BFD_MODE_TYPE_SBFD_INIT) ptm_bfd_notify(bs, PTM_BFD_DOWN); bfd_session_free(bs); break; case NB_EV_ABORT: /* NOTHING */ break; } return NB_OK; } /* * XPath: /frr-bfdd:bfdd/bfd */ int bfdd_bfd_create(struct nb_cb_create_args *args) { if (args->event != NB_EV_APPLY) return NB_OK; /* * Set any non-NULL value to be able to call * nb_running_unset_entry in bfdd_bfd_destroy. */ nb_running_set_entry(args->dnode, (void *)0x1); return NB_OK; } int bfdd_bfd_destroy(struct nb_cb_destroy_args *args) { switch (args->event) { case NB_EV_VALIDATE: /* NOTHING */ return NB_OK; case NB_EV_PREPARE: /* NOTHING */ return NB_OK; case NB_EV_APPLY: /* * We need to call this to unset pointers from * the child nodes - sessions and profiles. */ nb_running_unset_entry(args->dnode); bfd_sessions_remove_manual(); bfd_profiles_remove(); break; case NB_EV_ABORT: /* NOTHING */ return NB_OK; } return NB_OK; } /* * XPath: /frr-bfdd:bfdd/bfd/profile */ int bfdd_bfd_profile_create(struct nb_cb_create_args *args) { struct bfd_profile *bp; const char *name; if (args->event != NB_EV_APPLY) return NB_OK; name = yang_dnode_get_string(args->dnode, "name"); bp = bfd_profile_new(name); nb_running_set_entry(args->dnode, bp); return NB_OK; } int bfdd_bfd_profile_destroy(struct nb_cb_destroy_args *args) { struct bfd_profile *bp; if (args->event != NB_EV_APPLY) return NB_OK; bp = nb_running_unset_entry(args->dnode); bfd_profile_free(bp); return NB_OK; } /* * XPath: /frr-bfdd:bfdd/bfd/profile/detection-multiplier */ int bfdd_bfd_profile_detection_multiplier_modify(struct nb_cb_modify_args *args) { struct bfd_profile *bp; if (args->event != NB_EV_APPLY) return NB_OK; bp = nb_running_get_entry(args->dnode, NULL, true); bp->detection_multiplier = yang_dnode_get_uint8(args->dnode, NULL); bfd_profile_update(bp); return NB_OK; } /* * XPath: /frr-bfdd:bfdd/bfd/profile/desired-transmission-interval */ int bfdd_bfd_profile_desired_transmission_interval_modify( struct nb_cb_modify_args *args) { struct bfd_profile *bp; switch (args->event) { case NB_EV_VALIDATE: break; case NB_EV_PREPARE: /* NOTHING */ break; case NB_EV_APPLY: bp = nb_running_get_entry(args->dnode, NULL, true); bp->min_tx = yang_dnode_get_uint32(args->dnode, NULL); bfd_profile_update(bp); break; case NB_EV_ABORT: /* NOTHING */ break; } return NB_OK; } /* * XPath: /frr-bfdd:bfdd/bfd/profile/required-receive-interval */ int bfdd_bfd_profile_required_receive_interval_modify( struct nb_cb_modify_args *args) { struct bfd_profile *bp; switch (args->event) { case NB_EV_VALIDATE: break; case NB_EV_PREPARE: /* NOTHING */ break; case NB_EV_APPLY: bp = nb_running_get_entry(args->dnode, NULL, true); bp->min_rx = yang_dnode_get_uint32(args->dnode, NULL); bfd_profile_update(bp); break; case NB_EV_ABORT: /* NOTHING */ break; } return NB_OK; } /* * XPath: /frr-bfdd:bfdd/bfd/profile/administrative-down */ int bfdd_bfd_profile_administrative_down_modify(struct nb_cb_modify_args *args) { struct bfd_profile *bp; if (args->event != NB_EV_APPLY) return NB_OK; bp = nb_running_get_entry(args->dnode, NULL, true); bp->admin_shutdown = yang_dnode_get_bool(args->dnode, NULL); bfd_profile_update(bp); return NB_OK; } /* * XPath: /frr-bfdd:bfdd/bfd/profile/passive-mode */ int bfdd_bfd_profile_passive_mode_modify(struct nb_cb_modify_args *args) { struct bfd_profile *bp; if (args->event != NB_EV_APPLY) return NB_OK; bp = nb_running_get_entry(args->dnode, NULL, true); bp->passive = yang_dnode_get_bool(args->dnode, NULL); bfd_profile_update(bp); return NB_OK; } /* * XPath: /frr-bfdd:bfdd/bfd/profile/log-session-changes */ int bfdd_bfd_profile_log_session_changes_modify(struct nb_cb_modify_args *args) { struct bfd_profile *bp; if (args->event != NB_EV_APPLY) return NB_OK; bp = nb_running_get_entry(args->dnode, NULL, true); bp->log_session_changes = yang_dnode_get_bool(args->dnode, NULL); bfd_profile_update(bp); return NB_OK; } /* * XPath: /frr-bfdd:bfdd/bfd/profile/minimum-ttl */ int bfdd_bfd_profile_minimum_ttl_modify(struct nb_cb_modify_args *args) { struct bfd_profile *bp; if (args->event != NB_EV_APPLY) return NB_OK; bp = nb_running_get_entry(args->dnode, NULL, true); bp->minimum_ttl = yang_dnode_get_uint8(args->dnode, NULL); bfd_profile_update(bp); return NB_OK; } /* * XPath: /frr-bfdd:bfdd/bfd/profile/echo-mode */ int bfdd_bfd_profile_echo_mode_modify(struct nb_cb_modify_args *args) { struct bfd_profile *bp; bool echo; if (args->event != NB_EV_APPLY) return NB_OK; echo = yang_dnode_get_bool(args->dnode, NULL); bp = nb_running_get_entry(args->dnode, NULL, true); if (bp->echo_mode == echo) return NB_OK; bp->echo_mode = echo; bfd_profile_update(bp); return NB_OK; } /* * XPath: /frr-bfdd:bfdd/bfd/profile/desired-echo-transmission-interval */ int bfdd_bfd_profile_desired_echo_transmission_interval_modify( struct nb_cb_modify_args *args) { struct bfd_profile *bp; switch (args->event) { case NB_EV_VALIDATE: break; case NB_EV_PREPARE: /* NOTHING */ break; case NB_EV_APPLY: bp = nb_running_get_entry(args->dnode, NULL, true); bp->min_echo_tx = yang_dnode_get_uint32(args->dnode, NULL); bfd_profile_update(bp); break; case NB_EV_ABORT: /* NOTHING */ break; } return NB_OK; } /* * XPath: /frr-bfdd:bfdd/bfd/profile/required-echo-receive-interval */ int bfdd_bfd_profile_required_echo_receive_interval_modify( struct nb_cb_modify_args *args) { struct bfd_profile *bp; switch (args->event) { case NB_EV_VALIDATE: break; case NB_EV_PREPARE: /* NOTHING */ break; case NB_EV_APPLY: bp = nb_running_get_entry(args->dnode, NULL, true); bp->min_echo_rx = yang_dnode_get_uint32(args->dnode, NULL); bfd_profile_update(bp); break; case NB_EV_ABORT: /* NOTHING */ break; } return NB_OK; } /* * XPath: /frr-bfdd:bfdd/bfd/sessions/single-hop */ int bfdd_bfd_sessions_single_hop_create(struct nb_cb_create_args *args) { return bfd_session_create(args, false, BFD_MODE_TYPE_BFD); } int bfdd_bfd_sessions_single_hop_destroy(struct nb_cb_destroy_args *args) { return bfd_session_destroy(args->event, args->dnode, false, BFD_MODE_TYPE_BFD); } /* * XPath: /frr-bfdd:bfdd/bfd/sessions/single-hop/source-addr */ int bfdd_bfd_sessions_single_hop_source_addr_modify( struct nb_cb_modify_args *args) { return NB_OK; } int bfdd_bfd_sessions_single_hop_source_addr_destroy( struct nb_cb_destroy_args *args) { return NB_OK; } /* * XPath: /frr-bfdd:bfdd/bfd/sessions/single-hop/profile */ int bfdd_bfd_sessions_single_hop_profile_modify(struct nb_cb_modify_args *args) { struct bfd_session *bs; if (args->event != NB_EV_APPLY) return NB_OK; bs = nb_running_get_entry(args->dnode, NULL, true); bfd_profile_apply(yang_dnode_get_string(args->dnode, NULL), bs); return NB_OK; } int bfdd_bfd_sessions_single_hop_profile_destroy( struct nb_cb_destroy_args *args) { struct bfd_session *bs; if (args->event != NB_EV_APPLY) return NB_OK; bs = nb_running_get_entry(args->dnode, NULL, true); bfd_profile_remove(bs); return NB_OK; } /* * XPath: /frr-bfdd:bfdd/bfd/sessions/single-hop/detection-multiplier */ int bfdd_bfd_sessions_single_hop_detection_multiplier_modify( struct nb_cb_modify_args *args) { uint8_t detection_multiplier = yang_dnode_get_uint8(args->dnode, NULL); struct bfd_session *bs; switch (args->event) { case NB_EV_VALIDATE: break; case NB_EV_PREPARE: /* NOTHING */ break; case NB_EV_APPLY: bs = nb_running_get_entry(args->dnode, NULL, true); bs->peer_profile.detection_multiplier = detection_multiplier; bfd_session_apply(bs); break; case NB_EV_ABORT: /* NOTHING */ break; } return NB_OK; } /* * XPath: /frr-bfdd:bfdd/bfd/sessions/single-hop/desired-transmission-interval */ int bfdd_bfd_sessions_single_hop_desired_transmission_interval_modify( struct nb_cb_modify_args *args) { struct bfd_session *bs; switch (args->event) { case NB_EV_VALIDATE: break; case NB_EV_PREPARE: /* NOTHING */ break; case NB_EV_APPLY: bs = nb_running_get_entry(args->dnode, NULL, true); bs->peer_profile.min_tx = yang_dnode_get_uint32(args->dnode, NULL); bfd_session_apply(bs); break; case NB_EV_ABORT: /* NOTHING */ break; } return NB_OK; } /* * XPath: /frr-bfdd:bfdd/bfd/sessions/single-hop/required-receive-interval */ int bfdd_bfd_sessions_single_hop_required_receive_interval_modify( struct nb_cb_modify_args *args) { struct bfd_session *bs; switch (args->event) { case NB_EV_VALIDATE: break; case NB_EV_PREPARE: /* NOTHING */ break; case NB_EV_APPLY: bs = nb_running_get_entry(args->dnode, NULL, true); bs->peer_profile.min_rx = yang_dnode_get_uint32(args->dnode, NULL); bfd_session_apply(bs); break; case NB_EV_ABORT: /* NOTHING */ break; } return NB_OK; } /* * XPath: /frr-bfdd:bfdd/bfd/sessions/single-hop/administrative-down */ int bfdd_bfd_sessions_single_hop_administrative_down_modify( struct nb_cb_modify_args *args) { bool shutdown = yang_dnode_get_bool(args->dnode, NULL); struct bfd_session *bs; switch (args->event) { case NB_EV_VALIDATE: case NB_EV_PREPARE: return NB_OK; case NB_EV_APPLY: break; case NB_EV_ABORT: return NB_OK; } bs = nb_running_get_entry(args->dnode, NULL, true); bs->peer_profile.admin_shutdown = shutdown; bfd_session_apply(bs); return NB_OK; } /* * XPath: /frr-bfdd:bfdd/bfd/sessions/single-hop/passive-mode */ int bfdd_bfd_sessions_single_hop_passive_mode_modify( struct nb_cb_modify_args *args) { struct bfd_session *bs; bool passive; switch (args->event) { case NB_EV_VALIDATE: case NB_EV_PREPARE: return NB_OK; case NB_EV_APPLY: break; case NB_EV_ABORT: return NB_OK; } passive = yang_dnode_get_bool(args->dnode, NULL); bs = nb_running_get_entry(args->dnode, NULL, true); bs->peer_profile.passive = passive; bfd_session_apply(bs); return NB_OK; } /* * XPath: /frr-bfdd:bfdd/bfd/sessions/single-hop/log-session-changes * /frr-bfdd:bfdd/bfd/sessions/multi-hop/log-session-changes * /frr-bfdd:bfdd/bfd/sessions/sbfd_echo/log-session-changes * /frr-bfdd:bfdd/bfd/sessions/sbfd_init/log-session-changes */ int bfdd_bfd_sessions_single_hop_log_session_changes_modify(struct nb_cb_modify_args *args) { struct bfd_session *bs; bool log_session_changes; switch (args->event) { case NB_EV_VALIDATE: case NB_EV_PREPARE: return NB_OK; case NB_EV_APPLY: break; case NB_EV_ABORT: return NB_OK; } log_session_changes = yang_dnode_get_bool(args->dnode, NULL); bs = nb_running_get_entry(args->dnode, NULL, true); bs->peer_profile.log_session_changes = log_session_changes; bfd_session_apply(bs); return NB_OK; } /* * XPath: /frr-bfdd:bfdd/bfd/sessions/sbfd-init/bfd-mode * /frr-bfdd:bfdd/bfd/sessions/sbfd-echo/bfd-mode */ int bfdd_bfd_sessions_bfd_mode_modify(struct nb_cb_modify_args *args) { uint32_t bfd_mode = yang_dnode_get_uint32(args->dnode, NULL); struct bfd_session *bs; switch (args->event) { case NB_EV_VALIDATE: if ((bfd_mode != BFD_MODE_TYPE_BFD) && (bfd_mode != BFD_MODE_TYPE_SBFD_ECHO) && (bfd_mode != BFD_MODE_TYPE_SBFD_INIT)) { snprintf(args->errmsg, args->errmsg_len, "bfd mode is invalid."); return NB_ERR_VALIDATION; } return NB_OK; case NB_EV_PREPARE: return NB_OK; case NB_EV_APPLY: break; case NB_EV_ABORT: return NB_OK; } bs = nb_running_get_entry(args->dnode, NULL, true); bs->bfd_mode = bfd_mode; bfd_session_apply(bs); return NB_OK; } int bfdd_bfd_sessions_bfd_mode_destroy(struct nb_cb_destroy_args *args) { return NB_OK; } /* * XPath: /frr-bfdd:bfdd/bfd/sessions/single-hop/echo-mode */ int bfdd_bfd_sessions_single_hop_echo_mode_modify( struct nb_cb_modify_args *args) { bool echo = yang_dnode_get_bool(args->dnode, NULL); struct bfd_session *bs; switch (args->event) { case NB_EV_VALIDATE: case NB_EV_PREPARE: return NB_OK; case NB_EV_APPLY: break; case NB_EV_ABORT: return NB_OK; } bs = nb_running_get_entry(args->dnode, NULL, true); bs->peer_profile.echo_mode = echo; bfd_session_apply(bs); return NB_OK; } /* * XPath: * /frr-bfdd:bfdd/bfd/sessions/single-hop/desired-echo-transmission-interval */ int bfdd_bfd_sessions_single_hop_desired_echo_transmission_interval_modify( struct nb_cb_modify_args *args) { struct bfd_session *bs; switch (args->event) { case NB_EV_VALIDATE: break; case NB_EV_PREPARE: /* NOTHING */ break; case NB_EV_APPLY: bs = nb_running_get_entry(args->dnode, NULL, true); bs->peer_profile.min_echo_tx = yang_dnode_get_uint32(args->dnode, NULL); bfd_session_apply(bs); break; case NB_EV_ABORT: /* NOTHING */ break; } return NB_OK; } /* * XPath: * /frr-bfdd:bfdd/bfd/sessions/single-hop/required-echo-receive-interval */ int bfdd_bfd_sessions_single_hop_required_echo_receive_interval_modify( struct nb_cb_modify_args *args) { struct bfd_session *bs; switch (args->event) { case NB_EV_VALIDATE: break; case NB_EV_PREPARE: /* NOTHING */ break; case NB_EV_APPLY: bs = nb_running_get_entry(args->dnode, NULL, true); bs->peer_profile.min_echo_rx = yang_dnode_get_uint32(args->dnode, NULL); bfd_session_apply(bs); break; case NB_EV_ABORT: /* NOTHING */ break; } return NB_OK; } /* * XPath: /frr-bfdd:bfdd/bfd/sessions/multi-hop */ int bfdd_bfd_sessions_multi_hop_create(struct nb_cb_create_args *args) { return bfd_session_create(args, true, BFD_MODE_TYPE_BFD); } int bfdd_bfd_sessions_multi_hop_destroy(struct nb_cb_destroy_args *args) { return bfd_session_destroy(args->event, args->dnode, true, BFD_MODE_TYPE_BFD); } /* * XPath: /frr-bfdd:bfdd/bfd/sessions/multi-hop/minimum-ttl */ int bfdd_bfd_sessions_multi_hop_minimum_ttl_modify( struct nb_cb_modify_args *args) { struct bfd_session *bs; switch (args->event) { case NB_EV_VALIDATE: case NB_EV_PREPARE: return NB_OK; case NB_EV_APPLY: break; case NB_EV_ABORT: return NB_OK; } bs = nb_running_get_entry(args->dnode, NULL, true); bs->peer_profile.minimum_ttl = yang_dnode_get_uint8(args->dnode, NULL); bfd_session_apply(bs); return NB_OK; } /* * XPath: /frr-bfdd:bfdd/bfd/sessions/sbfd-echo */ int bfdd_bfd_sessions_sbfd_echo_create(struct nb_cb_create_args *args) { return bfd_session_create(args, yang_dnode_exists(args->dnode, "multi-hop"), BFD_MODE_TYPE_SBFD_ECHO); } int bfdd_bfd_sessions_sbfd_echo_destroy(struct nb_cb_destroy_args *args) { return bfd_session_destroy(args->event, args->dnode, yang_dnode_exists(args->dnode, "multi-hop"), BFD_MODE_TYPE_SBFD_ECHO); } /* * XPath: /frr-bfdd:bfdd/bfd/sessions/sbfd-echo/srv6-encap-data * XPath: /frr-bfdd:bfdd/bfd/sessions/sbfd-init/srv6-encap-data */ int bfdd_bfd_sessions_segment_list_create(struct nb_cb_create_args *args) { return NB_OK; } int bfdd_bfd_sessions_segment_list_destroy(struct nb_cb_destroy_args *args) { return NB_OK; } /* * XPath: /frr-bfdd:bfdd/bfd/sessions/sbfd-echo/dest-addr */ int bfdd_bfd_sessions_sbfd_echo_dest_addr_modify(struct nb_cb_modify_args *args) { return NB_OK; } int bfdd_bfd_sessions_sbfd_echo_dest_addr_destroy(struct nb_cb_destroy_args *args) { return NB_OK; } /* * XPath: /frr-bfdd:bfdd/bfd/sessions/sbfd-echo/echo-mode */ int bfdd_bfd_sessions_sbfd_echo_mode_modify(struct nb_cb_modify_args *args) { return NB_OK; } /* * XPath: /frr-bfdd:bfdd/bfd/sessions/sbfd-echo/srv6-source-ipv6 * XPath: /frr-bfdd:bfdd/bfd/sessions/sbfd-init/srv6-source-ipv6 */ int bfdd_bfd_sessions_sbfd_srv6_source_ipv6_modify(struct nb_cb_modify_args *args) { return NB_OK; } int bfdd_bfd_sessions_sbfd_srv6_source_ipv6_destroy(struct nb_cb_destroy_args *args) { return NB_OK; } /* * XPath: /frr-bfdd:bfdd/bfd/sessions/sbfd-init */ int bfdd_bfd_sessions_sbfd_init_create(struct nb_cb_create_args *args) { return bfd_session_create(args, yang_dnode_exists(args->dnode, "multi-hop"), BFD_MODE_TYPE_SBFD_INIT); } int bfdd_bfd_sessions_sbfd_init_destroy(struct nb_cb_destroy_args *args) { return bfd_session_destroy(args->event, args->dnode, yang_dnode_exists(args->dnode, "multi-hop"), BFD_MODE_TYPE_SBFD_INIT); } /* * XPath: /frr-bfdd:bfdd/bfd/sessions/sbfd-init/remote-discr */ int bfdd_bfd_sessions_sbfd_init_remote_discr_modify(struct nb_cb_modify_args *args) { return NB_OK; } /* * XPath: /frr-bfdd:bfdd/bfd/sessions/sbfd-echo/multi-hop * XPath: /frr-bfdd:bfdd/bfd/sessions/sbfd-init/multi-hop */ int bfdd_bfd_sessions_sbfd_multi_hop_modify(struct nb_cb_modify_args *args) { return NB_OK; } int bfdd_bfd_sessions_sbfd_multi_hop_destroy(struct nb_cb_destroy_args *args) { return NB_OK; }