1998-05-15 07:54:32 +00:00
|
|
|
/*
|
2000-06-01 17:12:19 +00:00
|
|
|
* BIRD -- Routing Tables
|
1998-05-15 07:54:32 +00:00
|
|
|
*
|
2000-01-16 16:44:50 +00:00
|
|
|
* (c) 1998--2000 Martin Mares <mj@ucw.cz>
|
1998-05-15 07:54:32 +00:00
|
|
|
*
|
|
|
|
* Can be freely distributed and used under the terms of the GNU GPL.
|
|
|
|
*/
|
|
|
|
|
2000-06-01 17:12:19 +00:00
|
|
|
/**
|
|
|
|
* DOC: Routing tables
|
|
|
|
*
|
|
|
|
* Routing tables are probably the most important structures BIRD uses. They
|
|
|
|
* hold all the information about known networks, the associated routes and
|
|
|
|
* their attributes.
|
|
|
|
*
|
2000-06-08 12:37:21 +00:00
|
|
|
* There are multiple routing tables (a primary one together with any
|
2000-06-01 17:12:19 +00:00
|
|
|
* number of secondary ones if requested by the configuration). Each table
|
|
|
|
* is basically a FIB containing entries describing the individual
|
2000-06-07 13:25:53 +00:00
|
|
|
* destination networks. For each network (represented by structure &net),
|
2000-06-08 12:37:21 +00:00
|
|
|
* there is a one-way linked list of route entries (&rte), the first entry
|
|
|
|
* on the list being the best one (i.e., the one we currently use
|
2000-06-01 17:12:19 +00:00
|
|
|
* for routing), the order of the other ones is undetermined.
|
|
|
|
*
|
|
|
|
* The &rte contains information specific to the route (preference, protocol
|
|
|
|
* metrics, time of last modification etc.) and a pointer to a &rta structure
|
|
|
|
* (see the route attribute module for a precise explanation) holding the
|
|
|
|
* remaining route attributes which are expected to be shared by multiple
|
|
|
|
* routes in order to conserve memory.
|
2021-12-20 19:25:35 +00:00
|
|
|
*
|
|
|
|
* There are several mechanisms that allow automatic update of routes in one
|
|
|
|
* routing table (dst) as a result of changes in another routing table (src).
|
|
|
|
* They handle issues of recursive next hop resolving, flowspec validation and
|
|
|
|
* RPKI validation.
|
|
|
|
*
|
|
|
|
* The first such mechanism is handling of recursive next hops. A route in the
|
|
|
|
* dst table has an indirect next hop address, which is resolved through a route
|
|
|
|
* in the src table (which may also be the same table) to get an immediate next
|
|
|
|
* hop. This is implemented using structure &hostcache attached to the src
|
|
|
|
* table, which contains &hostentry structures for each tracked next hop
|
|
|
|
* address. These structures are linked from recursive routes in dst tables,
|
|
|
|
* possibly multiple routes sharing one hostentry (as many routes may have the
|
|
|
|
* same indirect next hop). There is also a trie in the hostcache, which matches
|
|
|
|
* all prefixes that may influence resolving of tracked next hops.
|
|
|
|
*
|
|
|
|
* When a best route changes in the src table, the hostcache is notified using
|
|
|
|
* rt_notify_hostcache(), which immediately checks using the trie whether the
|
|
|
|
* change is relevant and if it is, then it schedules asynchronous hostcache
|
|
|
|
* recomputation. The recomputation is done by rt_update_hostcache() (called
|
|
|
|
* from rt_event() of src table), it walks through all hostentries and resolves
|
|
|
|
* them (by rt_update_hostentry()). It also updates the trie. If a change in
|
|
|
|
* hostentry resolution was found, then it schedules asynchronous nexthop
|
|
|
|
* recomputation of associated dst table. That is done by rt_next_hop_update()
|
|
|
|
* (called from rt_event() of dst table), it iterates over all routes in the dst
|
|
|
|
* table and re-examines their hostentries for changes. Note that in contrast to
|
|
|
|
* hostcache update, next hop update can be interrupted by main loop. These two
|
|
|
|
* full-table walks (over hostcache and dst table) are necessary due to absence
|
|
|
|
* of direct lookups (route -> affected nexthop, nexthop -> its route).
|
|
|
|
*
|
|
|
|
* The second mechanism is for flowspec validation, where validity of flowspec
|
|
|
|
* routes depends of resolving their network prefixes in IP routing tables. This
|
|
|
|
* is similar to the recursive next hop mechanism, but simpler as there are no
|
|
|
|
* intermediate hostcache and hostentries (because flows are less likely to
|
|
|
|
* share common net prefix than routes sharing a common next hop). In src table,
|
|
|
|
* there is a list of dst tables (list flowspec_links), this list is updated by
|
|
|
|
* flowpsec channels (by rt_flowspec_link() and rt_flowspec_unlink() during
|
|
|
|
* channel start/stop). Each dst table has its own trie of prefixes that may
|
|
|
|
* influence validation of flowspec routes in it (flowspec_trie).
|
|
|
|
*
|
|
|
|
* When a best route changes in the src table, rt_flowspec_notify() immediately
|
|
|
|
* checks all dst tables from the list using their tries to see whether the
|
|
|
|
* change is relevant for them. If it is, then an asynchronous re-validation of
|
|
|
|
* flowspec routes in the dst table is scheduled. That is also done by function
|
|
|
|
* rt_next_hop_update(), like nexthop recomputation above. It iterates over all
|
|
|
|
* flowspec routes and re-validates them. It also recalculates the trie.
|
|
|
|
*
|
|
|
|
* Note that in contrast to the hostcache update, here the trie is recalculated
|
|
|
|
* during the rt_next_hop_update(), which may be interleaved with IP route
|
|
|
|
* updates. The trie is flushed at the beginning of recalculation, which means
|
|
|
|
* that such updates may use partial trie to see if they are relevant. But it
|
|
|
|
* works anyway! Either affected flowspec was already re-validated and added to
|
|
|
|
* the trie, then IP route change would match the trie and trigger a next round
|
|
|
|
* of re-validation, or it was not yet re-validated and added to the trie, but
|
|
|
|
* will be re-validated later in this round anyway.
|
|
|
|
*
|
|
|
|
* The third mechanism is used for RPKI re-validation of IP routes and it is the
|
|
|
|
* simplest. It is just a list of subscribers in src table, who are notified
|
|
|
|
* when any change happened, but only after a settle time. Also, in RPKI case
|
|
|
|
* the dst is not a table, but a channel, who refeeds routes through a filter.
|
2000-06-01 17:12:19 +00:00
|
|
|
*/
|
|
|
|
|
2000-03-12 21:01:38 +00:00
|
|
|
#undef LOCAL_DEBUG
|
1999-02-13 19:15:28 +00:00
|
|
|
|
1998-05-15 07:54:32 +00:00
|
|
|
#include "nest/bird.h"
|
2022-03-31 17:09:38 +00:00
|
|
|
#include "nest/rt.h"
|
1998-05-20 11:54:33 +00:00
|
|
|
#include "nest/protocol.h"
|
1999-12-01 15:10:21 +00:00
|
|
|
#include "nest/iface.h"
|
1998-05-20 11:54:33 +00:00
|
|
|
#include "lib/resource.h"
|
1999-02-13 21:29:01 +00:00
|
|
|
#include "lib/event.h"
|
2021-02-10 02:09:57 +00:00
|
|
|
#include "lib/timer.h"
|
1999-12-01 15:10:21 +00:00
|
|
|
#include "lib/string.h"
|
1999-05-17 20:14:52 +00:00
|
|
|
#include "conf/conf.h"
|
1999-03-17 14:31:26 +00:00
|
|
|
#include "filter/filter.h"
|
2019-02-08 12:38:12 +00:00
|
|
|
#include "filter/data.h"
|
2018-06-27 14:51:53 +00:00
|
|
|
#include "lib/hash.h"
|
2000-03-31 23:30:21 +00:00
|
|
|
#include "lib/string.h"
|
2004-05-31 17:16:47 +00:00
|
|
|
#include "lib/alloca.h"
|
2021-12-20 19:25:35 +00:00
|
|
|
#include "lib/flowspec.h"
|
2002-11-13 08:47:06 +00:00
|
|
|
|
2019-09-28 12:17:20 +00:00
|
|
|
#ifdef CONFIG_BGP
|
|
|
|
#include "proto/bgp/bgp.h"
|
|
|
|
#endif
|
|
|
|
|
2010-06-02 20:20:40 +00:00
|
|
|
pool *rt_table_pool;
|
|
|
|
|
1998-05-20 11:54:33 +00:00
|
|
|
static slab *rte_slab;
|
1999-04-05 20:25:03 +00:00
|
|
|
static linpool *rte_update_pool;
|
1998-05-20 11:54:33 +00:00
|
|
|
|
2018-11-20 16:38:19 +00:00
|
|
|
list routing_tables;
|
1999-02-13 21:29:01 +00:00
|
|
|
|
2010-07-05 15:50:19 +00:00
|
|
|
static void rt_free_hostcache(rtable *tab);
|
|
|
|
static void rt_notify_hostcache(rtable *tab, net *net);
|
|
|
|
static void rt_update_hostcache(rtable *tab);
|
|
|
|
static void rt_next_hop_update(rtable *tab);
|
2016-01-26 10:48:58 +00:00
|
|
|
static inline void rt_prune_table(rtable *tab);
|
2021-02-10 02:09:57 +00:00
|
|
|
static inline void rt_schedule_notify(rtable *tab);
|
2021-12-20 19:25:35 +00:00
|
|
|
static void rt_flowspec_notify(rtable *tab, net *net);
|
2014-03-20 13:07:12 +00:00
|
|
|
|
2000-03-12 20:30:53 +00:00
|
|
|
|
2021-11-29 18:23:42 +00:00
|
|
|
static void
|
|
|
|
net_init_with_trie(struct fib *f, void *N)
|
|
|
|
{
|
|
|
|
rtable *tab = SKIP_BACK(rtable, fib, f);
|
|
|
|
net *n = N;
|
|
|
|
|
|
|
|
if (tab->trie)
|
|
|
|
trie_add_prefix(tab->trie, n->n.addr, n->n.addr->pxlen, n->n.addr->pxlen);
|
2022-02-03 05:08:51 +00:00
|
|
|
|
|
|
|
if (tab->trie_new)
|
|
|
|
trie_add_prefix(tab->trie_new, n->n.addr, n->n.addr->pxlen, n->n.addr->pxlen);
|
2021-11-29 18:23:42 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline net *
|
|
|
|
net_route_ip4_trie(rtable *t, const net_addr_ip4 *n0)
|
|
|
|
{
|
|
|
|
TRIE_WALK_TO_ROOT_IP4(t->trie, n0, n)
|
|
|
|
{
|
|
|
|
net *r;
|
|
|
|
if (r = net_find_valid(t, (net_addr *) &n))
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
TRIE_WALK_TO_ROOT_END;
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline net *
|
|
|
|
net_route_vpn4_trie(rtable *t, const net_addr_vpn4 *n0)
|
|
|
|
{
|
|
|
|
TRIE_WALK_TO_ROOT_IP4(t->trie, (const net_addr_ip4 *) n0, px)
|
|
|
|
{
|
|
|
|
net_addr_vpn4 n = NET_ADDR_VPN4(px.prefix, px.pxlen, n0->rd);
|
|
|
|
|
|
|
|
net *r;
|
|
|
|
if (r = net_find_valid(t, (net_addr *) &n))
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
TRIE_WALK_TO_ROOT_END;
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline net *
|
|
|
|
net_route_ip6_trie(rtable *t, const net_addr_ip6 *n0)
|
|
|
|
{
|
|
|
|
TRIE_WALK_TO_ROOT_IP6(t->trie, n0, n)
|
|
|
|
{
|
|
|
|
net *r;
|
|
|
|
if (r = net_find_valid(t, (net_addr *) &n))
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
TRIE_WALK_TO_ROOT_END;
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline net *
|
|
|
|
net_route_vpn6_trie(rtable *t, const net_addr_vpn6 *n0)
|
|
|
|
{
|
|
|
|
TRIE_WALK_TO_ROOT_IP6(t->trie, (const net_addr_ip6 *) n0, px)
|
|
|
|
{
|
|
|
|
net_addr_vpn6 n = NET_ADDR_VPN6(px.prefix, px.pxlen, n0->rd);
|
|
|
|
|
|
|
|
net *r;
|
|
|
|
if (r = net_find_valid(t, (net_addr *) &n))
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
TRIE_WALK_TO_ROOT_END;
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2015-12-24 14:52:03 +00:00
|
|
|
static inline void *
|
2021-11-29 18:23:42 +00:00
|
|
|
net_route_ip6_sadr_trie(rtable *t, const net_addr_ip6_sadr *n0)
|
|
|
|
{
|
|
|
|
TRIE_WALK_TO_ROOT_IP6(t->trie, (const net_addr_ip6 *) n0, px)
|
|
|
|
{
|
|
|
|
net_addr_ip6_sadr n = NET_ADDR_IP6_SADR(px.prefix, px.pxlen, n0->src_prefix, n0->src_pxlen);
|
|
|
|
net *best = NULL;
|
|
|
|
int best_pxlen = 0;
|
|
|
|
|
|
|
|
/* We need to do dst first matching. Since sadr addresses are hashed on dst
|
|
|
|
prefix only, find the hash table chain and go through it to find the
|
|
|
|
match with the longest matching src prefix. */
|
|
|
|
for (struct fib_node *fn = fib_get_chain(&t->fib, (net_addr *) &n); fn; fn = fn->next)
|
|
|
|
{
|
|
|
|
net_addr_ip6_sadr *a = (void *) fn->addr;
|
|
|
|
|
|
|
|
if (net_equal_dst_ip6_sadr(&n, a) &&
|
|
|
|
net_in_net_src_ip6_sadr(&n, a) &&
|
|
|
|
(a->src_pxlen >= best_pxlen))
|
|
|
|
{
|
|
|
|
best = fib_node_to_user(&t->fib, fn);
|
|
|
|
best_pxlen = a->src_pxlen;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (best)
|
|
|
|
return best;
|
|
|
|
}
|
|
|
|
TRIE_WALK_TO_ROOT_END;
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline net *
|
|
|
|
net_route_ip4_fib(rtable *t, const net_addr_ip4 *n0)
|
2010-07-30 23:04:32 +00:00
|
|
|
{
|
2021-11-29 18:23:42 +00:00
|
|
|
net_addr_ip4 n;
|
|
|
|
net_copy_ip4(&n, n0);
|
|
|
|
|
2015-12-24 14:52:03 +00:00
|
|
|
net *r;
|
2021-11-29 18:23:42 +00:00
|
|
|
while (r = net_find_valid(t, (net_addr *) &n), (!r) && (n.pxlen > 0))
|
|
|
|
{
|
|
|
|
n.pxlen--;
|
|
|
|
ip4_clrbit(&n.prefix, n.pxlen);
|
|
|
|
}
|
|
|
|
|
|
|
|
return r;
|
|
|
|
}
|
2010-07-30 23:04:32 +00:00
|
|
|
|
2021-11-29 18:23:42 +00:00
|
|
|
static inline net *
|
|
|
|
net_route_vpn4_fib(rtable *t, const net_addr_vpn4 *n0)
|
|
|
|
{
|
|
|
|
net_addr_vpn4 n;
|
|
|
|
net_copy_vpn4(&n, n0);
|
|
|
|
|
|
|
|
net *r;
|
|
|
|
while (r = net_find_valid(t, (net_addr *) &n), (!r) && (n.pxlen > 0))
|
2015-12-24 14:52:03 +00:00
|
|
|
{
|
2021-11-29 18:23:42 +00:00
|
|
|
n.pxlen--;
|
|
|
|
ip4_clrbit(&n.prefix, n.pxlen);
|
2015-12-24 14:52:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2021-11-29 18:23:42 +00:00
|
|
|
static inline net *
|
|
|
|
net_route_ip6_fib(rtable *t, const net_addr_ip6 *n0)
|
2015-12-24 14:52:03 +00:00
|
|
|
{
|
2021-11-29 18:23:42 +00:00
|
|
|
net_addr_ip6 n;
|
|
|
|
net_copy_ip6(&n, n0);
|
|
|
|
|
2015-12-24 14:52:03 +00:00
|
|
|
net *r;
|
2021-11-29 18:23:42 +00:00
|
|
|
while (r = net_find_valid(t, (net_addr *) &n), (!r) && (n.pxlen > 0))
|
|
|
|
{
|
|
|
|
n.pxlen--;
|
|
|
|
ip6_clrbit(&n.prefix, n.pxlen);
|
|
|
|
}
|
|
|
|
|
|
|
|
return r;
|
|
|
|
}
|
2015-12-24 14:52:03 +00:00
|
|
|
|
2021-11-29 18:23:42 +00:00
|
|
|
static inline net *
|
|
|
|
net_route_vpn6_fib(rtable *t, const net_addr_vpn6 *n0)
|
|
|
|
{
|
|
|
|
net_addr_vpn6 n;
|
|
|
|
net_copy_vpn6(&n, n0);
|
|
|
|
|
|
|
|
net *r;
|
|
|
|
while (r = net_find_valid(t, (net_addr *) &n), (!r) && (n.pxlen > 0))
|
2015-12-24 14:52:03 +00:00
|
|
|
{
|
2021-11-29 18:23:42 +00:00
|
|
|
n.pxlen--;
|
|
|
|
ip6_clrbit(&n.prefix, n.pxlen);
|
2015-12-24 14:52:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2018-02-13 15:27:57 +00:00
|
|
|
static inline void *
|
2021-11-29 18:23:42 +00:00
|
|
|
net_route_ip6_sadr_fib(rtable *t, const net_addr_ip6_sadr *n0)
|
2018-02-13 15:27:57 +00:00
|
|
|
{
|
2021-11-29 18:23:42 +00:00
|
|
|
net_addr_ip6_sadr n;
|
|
|
|
net_copy_ip6_sadr(&n, n0);
|
2018-02-13 15:27:57 +00:00
|
|
|
|
|
|
|
while (1)
|
|
|
|
{
|
|
|
|
net *best = NULL;
|
|
|
|
int best_pxlen = 0;
|
|
|
|
|
|
|
|
/* We need to do dst first matching. Since sadr addresses are hashed on dst
|
|
|
|
prefix only, find the hash table chain and go through it to find the
|
2021-11-29 18:23:42 +00:00
|
|
|
match with the longest matching src prefix. */
|
|
|
|
for (struct fib_node *fn = fib_get_chain(&t->fib, (net_addr *) &n); fn; fn = fn->next)
|
2018-02-13 15:27:57 +00:00
|
|
|
{
|
|
|
|
net_addr_ip6_sadr *a = (void *) fn->addr;
|
|
|
|
|
2021-11-29 18:23:42 +00:00
|
|
|
if (net_equal_dst_ip6_sadr(&n, a) &&
|
|
|
|
net_in_net_src_ip6_sadr(&n, a) &&
|
2018-02-13 15:27:57 +00:00
|
|
|
(a->src_pxlen >= best_pxlen))
|
|
|
|
{
|
|
|
|
best = fib_node_to_user(&t->fib, fn);
|
|
|
|
best_pxlen = a->src_pxlen;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (best)
|
|
|
|
return best;
|
|
|
|
|
2021-11-29 18:23:42 +00:00
|
|
|
if (!n.dst_pxlen)
|
2018-02-13 15:27:57 +00:00
|
|
|
break;
|
|
|
|
|
2021-11-29 18:23:42 +00:00
|
|
|
n.dst_pxlen--;
|
|
|
|
ip6_clrbit(&n.dst_prefix, n.dst_pxlen);
|
2018-02-13 15:27:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2021-11-29 18:23:42 +00:00
|
|
|
net *
|
2016-05-12 14:04:47 +00:00
|
|
|
net_route(rtable *tab, const net_addr *n)
|
2016-01-20 14:38:37 +00:00
|
|
|
{
|
2016-05-12 14:04:47 +00:00
|
|
|
ASSERT(tab->addr_type == n->type);
|
2016-01-20 14:38:37 +00:00
|
|
|
|
2016-05-12 14:04:47 +00:00
|
|
|
switch (n->type)
|
|
|
|
{
|
|
|
|
case NET_IP4:
|
2021-11-29 18:23:42 +00:00
|
|
|
if (tab->trie)
|
|
|
|
return net_route_ip4_trie(tab, (net_addr_ip4 *) n);
|
|
|
|
else
|
|
|
|
return net_route_ip4_fib (tab, (net_addr_ip4 *) n);
|
|
|
|
|
2016-05-12 14:04:47 +00:00
|
|
|
case NET_VPN4:
|
2021-11-29 18:23:42 +00:00
|
|
|
if (tab->trie)
|
|
|
|
return net_route_vpn4_trie(tab, (net_addr_vpn4 *) n);
|
|
|
|
else
|
|
|
|
return net_route_vpn4_fib (tab, (net_addr_vpn4 *) n);
|
2016-05-12 14:04:47 +00:00
|
|
|
|
|
|
|
case NET_IP6:
|
2021-11-29 18:23:42 +00:00
|
|
|
if (tab->trie)
|
|
|
|
return net_route_ip6_trie(tab, (net_addr_ip6 *) n);
|
|
|
|
else
|
|
|
|
return net_route_ip6_fib (tab, (net_addr_ip6 *) n);
|
|
|
|
|
2016-05-12 14:04:47 +00:00
|
|
|
case NET_VPN6:
|
2021-11-29 18:23:42 +00:00
|
|
|
if (tab->trie)
|
|
|
|
return net_route_vpn6_trie(tab, (net_addr_vpn6 *) n);
|
|
|
|
else
|
|
|
|
return net_route_vpn6_fib (tab, (net_addr_vpn6 *) n);
|
2016-05-12 14:04:47 +00:00
|
|
|
|
2018-02-13 15:27:57 +00:00
|
|
|
case NET_IP6_SADR:
|
2021-11-29 18:23:42 +00:00
|
|
|
if (tab->trie)
|
|
|
|
return net_route_ip6_sadr_trie(tab, (net_addr_ip6_sadr *) n);
|
|
|
|
else
|
|
|
|
return net_route_ip6_sadr_fib (tab, (net_addr_ip6_sadr *) n);
|
2018-02-13 15:27:57 +00:00
|
|
|
|
2016-05-12 14:04:47 +00:00
|
|
|
default:
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int
|
2021-11-29 18:23:42 +00:00
|
|
|
net_roa_check_ip4_trie(rtable *tab, const net_addr_ip4 *px, u32 asn)
|
|
|
|
{
|
|
|
|
int anything = 0;
|
|
|
|
|
|
|
|
TRIE_WALK_TO_ROOT_IP4(tab->trie, px, px0)
|
|
|
|
{
|
|
|
|
net_addr_roa4 roa0 = NET_ADDR_ROA4(px0.prefix, px0.pxlen, 0, 0);
|
|
|
|
|
|
|
|
struct fib_node *fn;
|
|
|
|
for (fn = fib_get_chain(&tab->fib, (net_addr *) &roa0); fn; fn = fn->next)
|
|
|
|
{
|
|
|
|
net_addr_roa4 *roa = (void *) fn->addr;
|
|
|
|
net *r = fib_node_to_user(&tab->fib, fn);
|
|
|
|
|
|
|
|
if (net_equal_prefix_roa4(roa, &roa0) && rte_is_valid(r->routes))
|
|
|
|
{
|
|
|
|
anything = 1;
|
|
|
|
if (asn && (roa->asn == asn) && (roa->max_pxlen >= px->pxlen))
|
|
|
|
return ROA_VALID;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
TRIE_WALK_TO_ROOT_END;
|
|
|
|
|
|
|
|
return anything ? ROA_INVALID : ROA_UNKNOWN;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
net_roa_check_ip4_fib(rtable *tab, const net_addr_ip4 *px, u32 asn)
|
2016-05-12 14:04:47 +00:00
|
|
|
{
|
|
|
|
struct net_addr_roa4 n = NET_ADDR_ROA4(px->prefix, px->pxlen, 0, 0);
|
2016-01-20 14:38:37 +00:00
|
|
|
struct fib_node *fn;
|
2016-05-12 14:04:47 +00:00
|
|
|
int anything = 0;
|
|
|
|
|
2016-01-20 14:38:37 +00:00
|
|
|
while (1)
|
|
|
|
{
|
|
|
|
for (fn = fib_get_chain(&tab->fib, (net_addr *) &n); fn; fn = fn->next)
|
|
|
|
{
|
2016-05-12 14:04:47 +00:00
|
|
|
net_addr_roa4 *roa = (void *) fn->addr;
|
2016-01-20 14:38:37 +00:00
|
|
|
net *r = fib_node_to_user(&tab->fib, fn);
|
2016-05-12 14:04:47 +00:00
|
|
|
|
|
|
|
if (net_equal_prefix_roa4(roa, &n) && rte_is_valid(r->routes))
|
2016-01-20 14:38:37 +00:00
|
|
|
{
|
|
|
|
anything = 1;
|
|
|
|
if (asn && (roa->asn == asn) && (roa->max_pxlen >= px->pxlen))
|
|
|
|
return ROA_VALID;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (n.pxlen == 0)
|
|
|
|
break;
|
|
|
|
|
|
|
|
n.pxlen--;
|
|
|
|
ip4_clrbit(&n.prefix, n.pxlen);
|
|
|
|
}
|
|
|
|
|
|
|
|
return anything ? ROA_INVALID : ROA_UNKNOWN;
|
|
|
|
}
|
|
|
|
|
2016-05-12 14:04:47 +00:00
|
|
|
static int
|
2021-11-29 18:23:42 +00:00
|
|
|
net_roa_check_ip6_trie(rtable *tab, const net_addr_ip6 *px, u32 asn)
|
|
|
|
{
|
|
|
|
int anything = 0;
|
|
|
|
|
|
|
|
TRIE_WALK_TO_ROOT_IP6(tab->trie, px, px0)
|
|
|
|
{
|
|
|
|
net_addr_roa6 roa0 = NET_ADDR_ROA6(px0.prefix, px0.pxlen, 0, 0);
|
|
|
|
|
|
|
|
struct fib_node *fn;
|
|
|
|
for (fn = fib_get_chain(&tab->fib, (net_addr *) &roa0); fn; fn = fn->next)
|
|
|
|
{
|
|
|
|
net_addr_roa6 *roa = (void *) fn->addr;
|
|
|
|
net *r = fib_node_to_user(&tab->fib, fn);
|
|
|
|
|
|
|
|
if (net_equal_prefix_roa6(roa, &roa0) && rte_is_valid(r->routes))
|
|
|
|
{
|
|
|
|
anything = 1;
|
|
|
|
if (asn && (roa->asn == asn) && (roa->max_pxlen >= px->pxlen))
|
|
|
|
return ROA_VALID;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
TRIE_WALK_TO_ROOT_END;
|
|
|
|
|
|
|
|
return anything ? ROA_INVALID : ROA_UNKNOWN;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
net_roa_check_ip6_fib(rtable *tab, const net_addr_ip6 *px, u32 asn)
|
2016-01-20 14:38:37 +00:00
|
|
|
{
|
|
|
|
struct net_addr_roa6 n = NET_ADDR_ROA6(px->prefix, px->pxlen, 0, 0);
|
|
|
|
struct fib_node *fn;
|
2016-05-12 14:04:47 +00:00
|
|
|
int anything = 0;
|
|
|
|
|
2016-01-20 14:38:37 +00:00
|
|
|
while (1)
|
|
|
|
{
|
|
|
|
for (fn = fib_get_chain(&tab->fib, (net_addr *) &n); fn; fn = fn->next)
|
|
|
|
{
|
2016-05-12 14:04:47 +00:00
|
|
|
net_addr_roa6 *roa = (void *) fn->addr;
|
2016-01-20 14:38:37 +00:00
|
|
|
net *r = fib_node_to_user(&tab->fib, fn);
|
2016-05-12 14:04:47 +00:00
|
|
|
|
|
|
|
if (net_equal_prefix_roa6(roa, &n) && rte_is_valid(r->routes))
|
2016-01-20 14:38:37 +00:00
|
|
|
{
|
|
|
|
anything = 1;
|
|
|
|
if (asn && (roa->asn == asn) && (roa->max_pxlen >= px->pxlen))
|
|
|
|
return ROA_VALID;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (n.pxlen == 0)
|
|
|
|
break;
|
|
|
|
|
|
|
|
n.pxlen--;
|
|
|
|
ip6_clrbit(&n.prefix, n.pxlen);
|
|
|
|
}
|
|
|
|
|
|
|
|
return anything ? ROA_INVALID : ROA_UNKNOWN;
|
|
|
|
}
|
|
|
|
|
2016-05-12 14:04:47 +00:00
|
|
|
/**
|
|
|
|
* roa_check - check validity of route origination in a ROA table
|
|
|
|
* @tab: ROA table
|
|
|
|
* @n: network prefix to check
|
|
|
|
* @asn: AS number of network prefix
|
|
|
|
*
|
|
|
|
* Implements RFC 6483 route validation for the given network prefix. The
|
|
|
|
* procedure is to find all candidate ROAs - ROAs whose prefixes cover the given
|
|
|
|
* network prefix. If there is no candidate ROA, return ROA_UNKNOWN. If there is
|
|
|
|
* a candidate ROA with matching ASN and maxlen field greater than or equal to
|
|
|
|
* the given prefix length, return ROA_VALID. Otherwise, return ROA_INVALID. If
|
|
|
|
* caller cannot determine origin AS, 0 could be used (in that case ROA_VALID
|
|
|
|
* cannot happen). Table @tab must have type NET_ROA4 or NET_ROA6, network @n
|
|
|
|
* must have type NET_IP4 or NET_IP6, respectively.
|
|
|
|
*/
|
|
|
|
int
|
2016-01-20 14:38:37 +00:00
|
|
|
net_roa_check(rtable *tab, const net_addr *n, u32 asn)
|
|
|
|
{
|
2016-05-12 14:04:47 +00:00
|
|
|
if ((tab->addr_type == NET_ROA4) && (n->type == NET_IP4))
|
2021-11-29 18:23:42 +00:00
|
|
|
{
|
|
|
|
if (tab->trie)
|
|
|
|
return net_roa_check_ip4_trie(tab, (const net_addr_ip4 *) n, asn);
|
|
|
|
else
|
|
|
|
return net_roa_check_ip4_fib (tab, (const net_addr_ip4 *) n, asn);
|
|
|
|
}
|
2016-05-12 14:04:47 +00:00
|
|
|
else if ((tab->addr_type == NET_ROA6) && (n->type == NET_IP6))
|
2021-11-29 18:23:42 +00:00
|
|
|
{
|
|
|
|
if (tab->trie)
|
|
|
|
return net_roa_check_ip6_trie(tab, (const net_addr_ip6 *) n, asn);
|
|
|
|
else
|
|
|
|
return net_roa_check_ip6_fib (tab, (const net_addr_ip6 *) n, asn);
|
|
|
|
}
|
2016-01-20 14:38:37 +00:00
|
|
|
else
|
2016-05-12 14:04:47 +00:00
|
|
|
return ROA_UNKNOWN; /* Should not happen */
|
2010-07-30 23:04:32 +00:00
|
|
|
}
|
1998-05-20 11:54:33 +00:00
|
|
|
|
2000-06-01 17:12:19 +00:00
|
|
|
/**
|
|
|
|
* rte_find - find a route
|
|
|
|
* @net: network node
|
2012-08-14 14:25:22 +00:00
|
|
|
* @src: route source
|
2000-06-01 17:12:19 +00:00
|
|
|
*
|
|
|
|
* The rte_find() function returns a route for destination @net
|
2012-08-14 14:25:22 +00:00
|
|
|
* which is from route source @src.
|
2000-06-01 17:12:19 +00:00
|
|
|
*/
|
1998-05-20 11:54:33 +00:00
|
|
|
rte *
|
2012-08-14 14:25:22 +00:00
|
|
|
rte_find(net *net, struct rte_src *src)
|
1998-05-20 11:54:33 +00:00
|
|
|
{
|
|
|
|
rte *e = net->routes;
|
|
|
|
|
2020-04-10 15:08:29 +00:00
|
|
|
while (e && e->src != src)
|
1998-05-20 11:54:33 +00:00
|
|
|
e = e->next;
|
|
|
|
return e;
|
|
|
|
}
|
|
|
|
|
2000-06-01 17:12:19 +00:00
|
|
|
/**
|
|
|
|
* rte_get_temp - get a temporary &rte
|
2000-06-02 12:29:55 +00:00
|
|
|
* @a: attributes to assign to the new route (a &rta; in case it's
|
2000-06-07 12:29:08 +00:00
|
|
|
* un-cached, rte_update() will create a cached copy automatically)
|
2000-06-01 17:12:19 +00:00
|
|
|
*
|
|
|
|
* Create a temporary &rte and bind it with the attributes @a.
|
|
|
|
* Also set route preference to the default preference set for
|
|
|
|
* the protocol.
|
|
|
|
*/
|
1998-05-20 11:54:33 +00:00
|
|
|
rte *
|
2020-04-10 15:08:29 +00:00
|
|
|
rte_get_temp(rta *a, struct rte_src *src)
|
1998-05-20 11:54:33 +00:00
|
|
|
{
|
|
|
|
rte *e = sl_alloc(rte_slab);
|
|
|
|
|
|
|
|
e->attrs = a;
|
2019-09-09 00:55:32 +00:00
|
|
|
e->id = 0;
|
1998-06-04 20:28:19 +00:00
|
|
|
e->flags = 0;
|
2020-04-10 15:08:29 +00:00
|
|
|
rt_lock_source(e->src = src);
|
1998-05-20 11:54:33 +00:00
|
|
|
return e;
|
|
|
|
}
|
|
|
|
|
1999-04-05 20:25:03 +00:00
|
|
|
rte *
|
|
|
|
rte_do_cow(rte *r)
|
|
|
|
{
|
|
|
|
rte *e = sl_alloc(rte_slab);
|
|
|
|
|
|
|
|
memcpy(e, r, sizeof(rte));
|
2020-04-10 15:08:29 +00:00
|
|
|
|
|
|
|
rt_lock_source(e->src);
|
1999-04-05 20:25:03 +00:00
|
|
|
e->attrs = rta_clone(r->attrs);
|
|
|
|
e->flags = 0;
|
|
|
|
return e;
|
|
|
|
}
|
|
|
|
|
2015-06-08 00:20:43 +00:00
|
|
|
/**
|
|
|
|
* rte_cow_rta - get a private writable copy of &rte with writable &rta
|
|
|
|
* @r: a route entry to be copied
|
|
|
|
* @lp: a linpool from which to allocate &rta
|
|
|
|
*
|
|
|
|
* rte_cow_rta() takes a &rte and prepares it and associated &rta for
|
|
|
|
* modification. There are three possibilities: First, both &rte and &rta are
|
|
|
|
* private copies, in that case they are returned unchanged. Second, &rte is
|
|
|
|
* private copy, but &rta is cached, in that case &rta is duplicated using
|
|
|
|
* rta_do_cow(). Third, both &rte is shared and &rta is cached, in that case
|
|
|
|
* both structures are duplicated by rte_do_cow() and rta_do_cow().
|
|
|
|
*
|
|
|
|
* Note that in the second case, cached &rta loses one reference, while private
|
|
|
|
* copy created by rta_do_cow() is a shallow copy sharing indirect data (eattrs,
|
|
|
|
* nexthops, ...) with it. To work properly, original shared &rta should have
|
|
|
|
* another reference during the life of created private copy.
|
|
|
|
*
|
|
|
|
* Result: a pointer to the new writable &rte with writable &rta.
|
|
|
|
*/
|
|
|
|
rte *
|
|
|
|
rte_cow_rta(rte *r, linpool *lp)
|
|
|
|
{
|
|
|
|
if (!rta_is_cached(r->attrs))
|
|
|
|
return r;
|
|
|
|
|
2018-05-29 10:08:12 +00:00
|
|
|
r = rte_cow(r);
|
2015-06-08 00:20:43 +00:00
|
|
|
rta *a = rta_do_cow(r->attrs, lp);
|
2018-05-29 10:08:12 +00:00
|
|
|
rta_free(r->attrs);
|
|
|
|
r->attrs = a;
|
|
|
|
return r;
|
2015-06-08 00:20:43 +00:00
|
|
|
}
|
|
|
|
|
2021-03-20 20:16:12 +00:00
|
|
|
/**
|
|
|
|
* rte_free - delete a &rte
|
|
|
|
* @e: &rte to be deleted
|
|
|
|
*
|
|
|
|
* rte_free() deletes the given &rte from the routing table it's linked to.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
rte_free(rte *e)
|
|
|
|
{
|
2020-04-10 15:08:29 +00:00
|
|
|
rt_unlock_source(e->src);
|
2021-03-20 20:16:12 +00:00
|
|
|
if (rta_is_cached(e->attrs))
|
|
|
|
rta_free(e->attrs);
|
2022-04-04 18:31:14 +00:00
|
|
|
sl_free(e);
|
2021-03-20 20:16:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline void
|
|
|
|
rte_free_quick(rte *e)
|
|
|
|
{
|
2020-04-10 15:08:29 +00:00
|
|
|
rt_unlock_source(e->src);
|
2021-03-20 20:16:12 +00:00
|
|
|
rta_free(e->attrs);
|
2022-04-04 18:31:14 +00:00
|
|
|
sl_free(e);
|
2021-03-20 20:16:12 +00:00
|
|
|
}
|
2019-03-06 17:14:12 +00:00
|
|
|
|
1998-05-20 11:54:33 +00:00
|
|
|
static int /* Actually better or at least as good as */
|
|
|
|
rte_better(rte *new, rte *old)
|
|
|
|
{
|
1998-06-03 08:40:10 +00:00
|
|
|
int (*better)(rte *, rte *);
|
|
|
|
|
2012-11-10 13:26:13 +00:00
|
|
|
if (!rte_is_valid(old))
|
1998-05-20 11:54:33 +00:00
|
|
|
return 1;
|
2012-11-10 13:26:13 +00:00
|
|
|
if (!rte_is_valid(new))
|
|
|
|
return 0;
|
|
|
|
|
2020-02-10 07:41:05 +00:00
|
|
|
if (new->attrs->pref > old->attrs->pref)
|
1998-05-20 11:54:33 +00:00
|
|
|
return 1;
|
2020-02-10 07:41:05 +00:00
|
|
|
if (new->attrs->pref < old->attrs->pref)
|
1998-05-20 11:54:33 +00:00
|
|
|
return 0;
|
2020-04-10 15:08:29 +00:00
|
|
|
if (new->src->proto->proto != old->src->proto->proto)
|
2000-03-01 11:48:11 +00:00
|
|
|
{
|
|
|
|
/*
|
|
|
|
* If the user has configured protocol preferences, so that two different protocols
|
|
|
|
* have the same preference, try to break the tie by comparing addresses. Not too
|
|
|
|
* useful, but keeps the ordering of routes unambiguous.
|
|
|
|
*/
|
2020-04-10 15:08:29 +00:00
|
|
|
return new->src->proto->proto > old->src->proto->proto;
|
2000-03-01 11:48:11 +00:00
|
|
|
}
|
2020-04-10 15:08:29 +00:00
|
|
|
if (better = new->src->proto->rte_better)
|
1998-06-03 08:40:10 +00:00
|
|
|
return better(new, old);
|
|
|
|
return 0;
|
1998-05-20 11:54:33 +00:00
|
|
|
}
|
|
|
|
|
2015-06-08 00:20:43 +00:00
|
|
|
static int
|
|
|
|
rte_mergable(rte *pri, rte *sec)
|
|
|
|
{
|
|
|
|
int (*mergable)(rte *, rte *);
|
|
|
|
|
|
|
|
if (!rte_is_valid(pri) || !rte_is_valid(sec))
|
|
|
|
return 0;
|
|
|
|
|
2020-02-10 07:41:05 +00:00
|
|
|
if (pri->attrs->pref != sec->attrs->pref)
|
2015-06-08 00:20:43 +00:00
|
|
|
return 0;
|
|
|
|
|
2020-04-10 15:08:29 +00:00
|
|
|
if (pri->src->proto->proto != sec->src->proto->proto)
|
2015-06-08 00:20:43 +00:00
|
|
|
return 0;
|
|
|
|
|
2020-04-10 15:08:29 +00:00
|
|
|
if (mergable = pri->src->proto->rte_mergable)
|
2015-06-08 00:20:43 +00:00
|
|
|
return mergable(pri, sec);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-03-12 20:30:53 +00:00
|
|
|
static void
|
2020-12-07 21:19:40 +00:00
|
|
|
rte_trace(struct channel *c, rte *e, int dir, char *msg)
|
2000-03-12 20:30:53 +00:00
|
|
|
{
|
2021-11-09 16:42:36 +00:00
|
|
|
log(L_TRACE "%s.%s %c %s %N %uL %uG %s",
|
|
|
|
c->proto->name, c->name ?: "?", dir, msg, e->net->n.addr, e->src->private_id, e->src->global_id,
|
2020-12-07 21:19:40 +00:00
|
|
|
rta_dest_name(e->attrs->dest));
|
2000-03-12 20:30:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline void
|
2020-12-07 21:19:40 +00:00
|
|
|
rte_trace_in(uint flag, struct channel *c, rte *e, char *msg)
|
2000-03-12 20:30:53 +00:00
|
|
|
{
|
2020-12-07 21:19:40 +00:00
|
|
|
if ((c->debug & flag) || (c->proto->debug & flag))
|
|
|
|
rte_trace(c, e, '>', msg);
|
2000-03-12 20:30:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline void
|
2020-12-07 21:19:40 +00:00
|
|
|
rte_trace_out(uint flag, struct channel *c, rte *e, char *msg)
|
2000-03-12 20:30:53 +00:00
|
|
|
{
|
2020-12-07 21:19:40 +00:00
|
|
|
if ((c->debug & flag) || (c->proto->debug & flag))
|
|
|
|
rte_trace(c, e, '<', msg);
|
2000-03-12 20:30:53 +00:00
|
|
|
}
|
|
|
|
|
2012-04-15 13:07:58 +00:00
|
|
|
static rte *
|
2022-04-10 16:55:15 +00:00
|
|
|
export_filter(struct channel *c, rte *rt0, rte **rt_free, int silent)
|
1999-03-17 14:31:26 +00:00
|
|
|
{
|
2016-01-26 10:48:58 +00:00
|
|
|
struct proto *p = c->proto;
|
2019-02-15 12:53:17 +00:00
|
|
|
const struct filter *filter = c->out_filter;
|
2016-01-26 10:48:58 +00:00
|
|
|
struct proto_stats *stats = &c->stats;
|
2012-04-15 13:07:58 +00:00
|
|
|
rte *rt;
|
|
|
|
int v;
|
2012-03-15 10:58:08 +00:00
|
|
|
|
2012-04-15 13:07:58 +00:00
|
|
|
rt = rt0;
|
|
|
|
*rt_free = NULL;
|
1999-08-03 19:33:22 +00:00
|
|
|
|
2020-04-12 19:54:20 +00:00
|
|
|
v = p->preexport ? p->preexport(p, rt) : 0;
|
2012-04-15 13:07:58 +00:00
|
|
|
if (v < 0)
|
|
|
|
{
|
|
|
|
if (silent)
|
|
|
|
goto reject;
|
2009-12-02 21:19:47 +00:00
|
|
|
|
2012-04-15 13:07:58 +00:00
|
|
|
stats->exp_updates_rejected++;
|
2013-02-08 22:58:27 +00:00
|
|
|
if (v == RIC_REJECT)
|
2020-12-07 21:19:40 +00:00
|
|
|
rte_trace_out(D_FILTERS, c, rt, "rejected by protocol");
|
2012-04-15 13:07:58 +00:00
|
|
|
goto reject;
|
|
|
|
}
|
|
|
|
if (v > 0)
|
1999-04-05 20:25:03 +00:00
|
|
|
{
|
2012-04-15 13:07:58 +00:00
|
|
|
if (!silent)
|
2020-12-07 21:19:40 +00:00
|
|
|
rte_trace_out(D_FILTERS, c, rt, "forced accept by protocol");
|
2012-04-15 13:07:58 +00:00
|
|
|
goto accept;
|
1999-04-05 20:25:03 +00:00
|
|
|
}
|
2009-06-03 23:22:56 +00:00
|
|
|
|
2012-04-15 13:07:58 +00:00
|
|
|
v = filter && ((filter == FILTER_REJECT) ||
|
2022-04-10 16:55:15 +00:00
|
|
|
(f_run(filter, &rt,
|
2018-05-29 10:08:12 +00:00
|
|
|
(silent ? FF_SILENT : 0)) > F_ACCEPT));
|
2012-04-15 13:07:58 +00:00
|
|
|
if (v)
|
|
|
|
{
|
|
|
|
if (silent)
|
|
|
|
goto reject;
|
|
|
|
|
|
|
|
stats->exp_updates_filtered++;
|
2020-12-07 21:19:40 +00:00
|
|
|
rte_trace_out(D_FILTERS, c, rt, "filtered out");
|
2012-04-15 13:07:58 +00:00
|
|
|
goto reject;
|
1999-04-05 20:25:03 +00:00
|
|
|
}
|
2009-06-03 23:22:56 +00:00
|
|
|
|
2012-04-15 13:07:58 +00:00
|
|
|
accept:
|
|
|
|
if (rt != rt0)
|
|
|
|
*rt_free = rt;
|
|
|
|
return rt;
|
|
|
|
|
|
|
|
reject:
|
|
|
|
/* Discard temporary rte */
|
|
|
|
if (rt != rt0)
|
|
|
|
rte_free(rt);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2018-05-29 10:08:12 +00:00
|
|
|
do_rt_notify(struct channel *c, net *net, rte *new, rte *old, int refeed)
|
2012-04-15 13:07:58 +00:00
|
|
|
{
|
2016-01-26 10:48:58 +00:00
|
|
|
struct proto *p = c->proto;
|
|
|
|
struct proto_stats *stats = &c->stats;
|
2009-06-03 23:22:56 +00:00
|
|
|
|
2019-09-09 00:55:32 +00:00
|
|
|
if (refeed && new)
|
|
|
|
c->refeed_count++;
|
2009-06-03 23:22:56 +00:00
|
|
|
|
2019-09-09 00:55:32 +00:00
|
|
|
/* Apply export limit */
|
2016-01-26 10:48:58 +00:00
|
|
|
struct channel_limit *l = &c->out_limit;
|
2019-09-09 00:55:32 +00:00
|
|
|
if (l->action && !old && new)
|
|
|
|
{
|
|
|
|
if (stats->exp_routes >= l->limit)
|
|
|
|
channel_notify_limit(c, l, PLD_OUT, stats->exp_routes);
|
2012-07-16 12:44:45 +00:00
|
|
|
|
2019-09-09 00:55:32 +00:00
|
|
|
if (l->state == PLS_BLOCKED)
|
|
|
|
{
|
|
|
|
stats->exp_updates_rejected++;
|
2020-12-07 21:19:40 +00:00
|
|
|
rte_trace_out(D_FILTERS, c, new, "rejected [limit]");
|
2019-09-09 00:55:32 +00:00
|
|
|
return;
|
2012-04-24 21:39:57 +00:00
|
|
|
}
|
2019-09-09 00:55:32 +00:00
|
|
|
}
|
2012-04-24 21:39:57 +00:00
|
|
|
|
2019-09-09 00:55:32 +00:00
|
|
|
/* Apply export table */
|
2021-03-20 20:16:12 +00:00
|
|
|
struct rte *old_exported = NULL;
|
|
|
|
if (c->out_table)
|
|
|
|
{
|
|
|
|
if (!rte_update_out(c, net->n.addr, new, old, &old_exported, refeed))
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
else if (c->out_filter == FILTER_ACCEPT)
|
|
|
|
old_exported = old;
|
2012-04-28 10:59:40 +00:00
|
|
|
|
2009-06-03 23:22:56 +00:00
|
|
|
if (new)
|
2010-02-13 09:44:46 +00:00
|
|
|
stats->exp_updates_accepted++;
|
2009-06-03 23:22:56 +00:00
|
|
|
else
|
2010-02-13 09:44:46 +00:00
|
|
|
stats->exp_withdraws_accepted++;
|
2009-06-03 23:22:56 +00:00
|
|
|
|
2019-09-09 00:55:32 +00:00
|
|
|
if (old)
|
|
|
|
{
|
|
|
|
bmap_clear(&c->export_map, old->id);
|
|
|
|
stats->exp_routes--;
|
|
|
|
}
|
|
|
|
|
2009-06-03 23:22:56 +00:00
|
|
|
if (new)
|
2019-09-09 00:55:32 +00:00
|
|
|
{
|
|
|
|
bmap_set(&c->export_map, new->id);
|
2010-02-13 09:44:46 +00:00
|
|
|
stats->exp_routes++;
|
2019-09-09 00:55:32 +00:00
|
|
|
}
|
2009-06-03 23:22:56 +00:00
|
|
|
|
2000-03-12 20:30:53 +00:00
|
|
|
if (p->debug & D_ROUTES)
|
2019-09-09 00:55:32 +00:00
|
|
|
{
|
|
|
|
if (new && old)
|
2020-12-07 21:19:40 +00:00
|
|
|
rte_trace_out(D_ROUTES, c, new, "replaced");
|
2019-09-09 00:55:32 +00:00
|
|
|
else if (new)
|
2020-12-07 21:19:40 +00:00
|
|
|
rte_trace_out(D_ROUTES, c, new, "added");
|
2019-09-09 00:55:32 +00:00
|
|
|
else if (old)
|
2020-12-07 21:19:40 +00:00
|
|
|
rte_trace_out(D_ROUTES, c, old, "removed");
|
2019-09-09 00:55:32 +00:00
|
|
|
}
|
|
|
|
|
2018-05-29 10:08:12 +00:00
|
|
|
p->rt_notify(p, c, net, new, old);
|
2021-03-20 20:16:12 +00:00
|
|
|
|
|
|
|
if (c->out_table && old_exported)
|
|
|
|
rte_free_quick(old_exported);
|
2012-04-15 13:07:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2019-09-09 00:55:32 +00:00
|
|
|
rt_notify_basic(struct channel *c, net *net, rte *new, rte *old, int refeed)
|
2012-04-15 13:07:58 +00:00
|
|
|
{
|
2019-09-09 00:55:32 +00:00
|
|
|
// struct proto *p = c->proto;
|
2012-04-15 13:07:58 +00:00
|
|
|
rte *new_free = NULL;
|
|
|
|
|
|
|
|
if (new)
|
2016-01-26 10:48:58 +00:00
|
|
|
c->stats.exp_updates_received++;
|
2012-04-15 13:07:58 +00:00
|
|
|
else
|
2016-01-26 10:48:58 +00:00
|
|
|
c->stats.exp_withdraws_received++;
|
2012-04-15 13:07:58 +00:00
|
|
|
|
|
|
|
if (new)
|
2018-05-29 10:08:12 +00:00
|
|
|
new = export_filter(c, new, &new_free, 0);
|
2012-04-15 13:07:58 +00:00
|
|
|
|
2019-09-09 00:55:32 +00:00
|
|
|
if (old && !bmap_test(&c->export_map, old->id))
|
|
|
|
old = NULL;
|
2012-04-15 13:07:58 +00:00
|
|
|
|
|
|
|
if (!new && !old)
|
|
|
|
return;
|
|
|
|
|
2018-05-29 10:08:12 +00:00
|
|
|
do_rt_notify(c, net, new, old, refeed);
|
2012-04-15 13:07:58 +00:00
|
|
|
|
2019-09-09 00:55:32 +00:00
|
|
|
/* Discard temporary rte */
|
2012-04-15 13:07:58 +00:00
|
|
|
if (new_free)
|
|
|
|
rte_free(new_free);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2019-09-09 00:55:32 +00:00
|
|
|
rt_notify_accepted(struct channel *c, net *net, rte *new_changed, rte *old_changed, int refeed)
|
2012-04-15 13:07:58 +00:00
|
|
|
{
|
2019-09-09 00:55:32 +00:00
|
|
|
// struct proto *p = c->proto;
|
2012-04-15 13:07:58 +00:00
|
|
|
rte *new_best = NULL;
|
|
|
|
rte *old_best = NULL;
|
|
|
|
rte *new_free = NULL;
|
2019-09-09 00:55:32 +00:00
|
|
|
int new_first = 0;
|
2012-04-15 13:07:58 +00:00
|
|
|
|
2019-09-09 00:55:32 +00:00
|
|
|
/*
|
|
|
|
* We assume that there are no changes in net route order except (added)
|
|
|
|
* new_changed and (removed) old_changed. Therefore, the function is not
|
|
|
|
* compatible with deterministic_med (where nontrivial reordering can happen
|
|
|
|
* as a result of a route change) and with recomputation of recursive routes
|
|
|
|
* due to next hop update (where many routes can be changed in one step).
|
|
|
|
*
|
|
|
|
* Note that we need this assumption just for optimizations, we could just
|
|
|
|
* run full new_best recomputation otherwise.
|
|
|
|
*
|
|
|
|
* There are three cases:
|
|
|
|
* feed or old_best is old_changed -> we need to recompute new_best
|
|
|
|
* old_best is before new_changed -> new_best is old_best, ignore
|
|
|
|
* old_best is after new_changed -> try new_changed, otherwise old_best
|
|
|
|
*/
|
2012-04-15 13:07:58 +00:00
|
|
|
|
2019-09-09 00:55:32 +00:00
|
|
|
if (net->routes)
|
2016-01-26 10:48:58 +00:00
|
|
|
c->stats.exp_updates_received++;
|
2012-04-15 13:07:58 +00:00
|
|
|
else
|
2016-01-26 10:48:58 +00:00
|
|
|
c->stats.exp_withdraws_received++;
|
2012-04-15 13:07:58 +00:00
|
|
|
|
2019-09-09 00:55:32 +00:00
|
|
|
/* Find old_best - either old_changed, or route for net->routes */
|
|
|
|
if (old_changed && bmap_test(&c->export_map, old_changed->id))
|
|
|
|
old_best = old_changed;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
for (rte *r = net->routes; rte_is_valid(r); r = r->next)
|
2012-04-15 13:07:58 +00:00
|
|
|
{
|
2019-09-09 00:55:32 +00:00
|
|
|
if (bmap_test(&c->export_map, r->id))
|
|
|
|
{
|
|
|
|
old_best = r;
|
2012-04-15 13:07:58 +00:00
|
|
|
break;
|
2019-09-09 00:55:32 +00:00
|
|
|
}
|
2012-04-15 13:07:58 +00:00
|
|
|
|
2019-09-09 00:55:32 +00:00
|
|
|
/* Note if new_changed found before old_best */
|
|
|
|
if (r == new_changed)
|
|
|
|
new_first = 1;
|
2018-07-06 00:04:45 +00:00
|
|
|
}
|
2019-09-09 00:55:32 +00:00
|
|
|
}
|
2018-07-06 00:04:45 +00:00
|
|
|
|
2019-09-09 00:55:32 +00:00
|
|
|
/* Find new_best */
|
|
|
|
if ((new_changed == old_changed) || (old_best == old_changed))
|
|
|
|
{
|
|
|
|
/* Feed or old_best changed -> find first accepted by filters */
|
|
|
|
for (rte *r = net->routes; rte_is_valid(r); r = r->next)
|
|
|
|
if (new_best = export_filter(c, r, &new_free, 0))
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Other cases -> either new_changed, or old_best (and nothing changed) */
|
|
|
|
if (new_first && (new_changed = export_filter(c, new_changed, &new_free, 0)))
|
|
|
|
new_best = new_changed;
|
|
|
|
else
|
2012-04-15 13:07:58 +00:00
|
|
|
return;
|
2019-09-09 00:55:32 +00:00
|
|
|
}
|
2012-04-15 13:07:58 +00:00
|
|
|
|
2019-09-09 00:55:32 +00:00
|
|
|
if (!new_best && !old_best)
|
|
|
|
return;
|
2012-04-15 13:07:58 +00:00
|
|
|
|
2019-09-09 00:55:32 +00:00
|
|
|
do_rt_notify(c, net, new_best, old_best, refeed);
|
2012-04-15 13:07:58 +00:00
|
|
|
|
2019-09-09 00:55:32 +00:00
|
|
|
/* Discard temporary rte */
|
2012-04-15 13:07:58 +00:00
|
|
|
if (new_free)
|
|
|
|
rte_free(new_free);
|
1999-03-17 14:31:26 +00:00
|
|
|
}
|
|
|
|
|
2015-06-08 00:20:43 +00:00
|
|
|
|
2016-05-06 13:48:35 +00:00
|
|
|
static struct nexthop *
|
|
|
|
nexthop_merge_rta(struct nexthop *nhs, rta *a, linpool *pool, int max)
|
2015-06-08 00:20:43 +00:00
|
|
|
{
|
2016-05-06 13:48:35 +00:00
|
|
|
return nexthop_merge(nhs, &(a->nh), 1, 0, max, pool);
|
2015-06-08 00:20:43 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
rte *
|
2018-05-29 10:08:12 +00:00
|
|
|
rt_export_merged(struct channel *c, net *net, rte **rt_free, linpool *pool, int silent)
|
2015-06-08 00:20:43 +00:00
|
|
|
{
|
2016-01-26 10:48:58 +00:00
|
|
|
// struct proto *p = c->proto;
|
2016-05-06 13:48:35 +00:00
|
|
|
struct nexthop *nhs = NULL;
|
2015-06-08 00:20:43 +00:00
|
|
|
rte *best0, *best, *rt0, *rt, *tmp;
|
|
|
|
|
|
|
|
best0 = net->routes;
|
|
|
|
*rt_free = NULL;
|
|
|
|
|
|
|
|
if (!rte_is_valid(best0))
|
|
|
|
return NULL;
|
|
|
|
|
2022-04-10 16:55:15 +00:00
|
|
|
best = export_filter(c, best0, rt_free, silent);
|
2015-06-08 00:20:43 +00:00
|
|
|
|
|
|
|
if (!best || !rte_is_reachable(best))
|
|
|
|
return best;
|
|
|
|
|
|
|
|
for (rt0 = best0->next; rt0; rt0 = rt0->next)
|
|
|
|
{
|
|
|
|
if (!rte_mergable(best0, rt0))
|
|
|
|
continue;
|
|
|
|
|
2022-04-10 16:55:15 +00:00
|
|
|
rt = export_filter(c, rt0, &tmp, 1);
|
2015-06-08 00:20:43 +00:00
|
|
|
|
|
|
|
if (!rt)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (rte_is_reachable(rt))
|
2016-05-06 13:48:35 +00:00
|
|
|
nhs = nexthop_merge_rta(nhs, rt->attrs, pool, c->merge_limit);
|
2015-06-08 00:20:43 +00:00
|
|
|
|
|
|
|
if (tmp)
|
|
|
|
rte_free(tmp);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (nhs)
|
|
|
|
{
|
2016-05-06 13:48:35 +00:00
|
|
|
nhs = nexthop_merge_rta(nhs, best->attrs, pool, c->merge_limit);
|
2015-06-08 00:20:43 +00:00
|
|
|
|
|
|
|
if (nhs->next)
|
|
|
|
{
|
2016-09-06 15:08:45 +00:00
|
|
|
best = rte_cow_rta(best, pool);
|
2016-05-06 13:48:35 +00:00
|
|
|
nexthop_link(best->attrs, nhs);
|
2015-06-08 00:20:43 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (best != best0)
|
|
|
|
*rt_free = best;
|
|
|
|
|
|
|
|
return best;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void
|
2016-01-26 10:48:58 +00:00
|
|
|
rt_notify_merged(struct channel *c, net *net, rte *new_changed, rte *old_changed,
|
2019-09-09 00:55:32 +00:00
|
|
|
rte *new_best, rte *old_best, int refeed)
|
2015-06-08 00:20:43 +00:00
|
|
|
{
|
2016-01-26 10:48:58 +00:00
|
|
|
// struct proto *p = c->proto;
|
2019-09-09 00:55:32 +00:00
|
|
|
rte *new_free = NULL;
|
2015-06-08 00:20:43 +00:00
|
|
|
|
|
|
|
/* We assume that all rte arguments are either NULL or rte_is_valid() */
|
|
|
|
|
|
|
|
/* This check should be done by the caller */
|
|
|
|
if (!new_best && !old_best)
|
|
|
|
return;
|
|
|
|
|
|
|
|
/* Check whether the change is relevant to the merged route */
|
2019-09-09 00:55:32 +00:00
|
|
|
if ((new_best == old_best) &&
|
|
|
|
(new_changed != old_changed) &&
|
|
|
|
!rte_mergable(new_best, new_changed) &&
|
|
|
|
!rte_mergable(old_best, old_changed))
|
|
|
|
return;
|
2015-06-08 00:20:43 +00:00
|
|
|
|
|
|
|
if (new_best)
|
2016-01-26 10:48:58 +00:00
|
|
|
c->stats.exp_updates_received++;
|
2015-06-08 00:20:43 +00:00
|
|
|
else
|
2016-01-26 10:48:58 +00:00
|
|
|
c->stats.exp_withdraws_received++;
|
2015-06-08 00:20:43 +00:00
|
|
|
|
|
|
|
/* Prepare new merged route */
|
|
|
|
if (new_best)
|
2019-09-09 00:55:32 +00:00
|
|
|
new_best = rt_export_merged(c, net, &new_free, rte_update_pool, 0);
|
|
|
|
|
|
|
|
/* Check old merged route */
|
|
|
|
if (old_best && !bmap_test(&c->export_map, old_best->id))
|
|
|
|
old_best = NULL;
|
2015-06-08 00:20:43 +00:00
|
|
|
|
2019-09-09 00:55:32 +00:00
|
|
|
if (!new_best && !old_best)
|
|
|
|
return;
|
2015-06-08 00:20:43 +00:00
|
|
|
|
2019-09-09 00:55:32 +00:00
|
|
|
do_rt_notify(c, net, new_best, old_best, refeed);
|
2015-06-08 00:20:43 +00:00
|
|
|
|
2019-09-09 00:55:32 +00:00
|
|
|
/* Discard temporary rte */
|
|
|
|
if (new_free)
|
|
|
|
rte_free(new_free);
|
2015-06-08 00:20:43 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2000-06-02 12:41:25 +00:00
|
|
|
/**
|
|
|
|
* rte_announce - announce a routing table change
|
|
|
|
* @tab: table the route has been added to
|
2019-09-09 00:55:32 +00:00
|
|
|
* @type: type of route announcement (RA_UNDEF or RA_ANY)
|
2000-06-02 12:41:25 +00:00
|
|
|
* @net: network in question
|
2019-09-09 00:55:32 +00:00
|
|
|
* @new: the new or changed route
|
|
|
|
* @old: the previous route replaced by the new one
|
2016-05-12 13:49:44 +00:00
|
|
|
* @new_best: the new best route for the same network
|
|
|
|
* @old_best: the previous best route for the same network
|
2000-06-02 12:41:25 +00:00
|
|
|
*
|
2019-09-09 00:55:32 +00:00
|
|
|
* This function gets a routing table update and announces it to all protocols
|
|
|
|
* that are connected to the same table by their channels.
|
2000-06-02 12:41:25 +00:00
|
|
|
*
|
2019-09-09 00:55:32 +00:00
|
|
|
* There are two ways of how routing table changes are announced. First, there
|
|
|
|
* is a change of just one route in @net (which may caused a change of the best
|
|
|
|
* route of the network). In this case @new and @old describes the changed route
|
|
|
|
* and @new_best and @old_best describes best routes. Other routes are not
|
|
|
|
* affected, but in sorted table the order of other routes might change.
|
2009-05-31 13:24:27 +00:00
|
|
|
*
|
2019-09-09 00:55:32 +00:00
|
|
|
* Second, There is a bulk change of multiple routes in @net, with shared best
|
|
|
|
* route selection. In such case separate route changes are described using
|
|
|
|
* @type of %RA_ANY, with @new and @old specifying the changed route, while
|
|
|
|
* @new_best and @old_best are NULL. After that, another notification is done
|
|
|
|
* where @new_best and @old_best are filled (may be the same), but @new and @old
|
|
|
|
* are NULL.
|
2009-06-01 12:07:13 +00:00
|
|
|
*
|
2019-09-09 00:55:32 +00:00
|
|
|
* The function announces the change to all associated channels. For each
|
|
|
|
* channel, an appropriate preprocessing is done according to channel &ra_mode.
|
|
|
|
* For example, %RA_OPTIMAL channels receive just changes of best routes.
|
|
|
|
*
|
|
|
|
* In general, we first call preexport() hook of a protocol, which performs
|
|
|
|
* basic checks on the route (each protocol has a right to veto or force accept
|
|
|
|
* of the route before any filter is asked). Then we consult an export filter
|
|
|
|
* of the channel and verify the old route in an export map of the channel.
|
|
|
|
* Finally, the rt_notify() hook of the protocol gets called.
|
|
|
|
*
|
|
|
|
* Note that there are also calls of rt_notify() hooks due to feed, but that is
|
|
|
|
* done outside of scope of rte_announce().
|
2000-06-02 12:41:25 +00:00
|
|
|
*/
|
1999-04-05 20:25:03 +00:00
|
|
|
static void
|
2019-09-09 00:55:32 +00:00
|
|
|
rte_announce(rtable *tab, uint type, net *net, rte *new, rte *old,
|
|
|
|
rte *new_best, rte *old_best)
|
1998-05-20 11:54:33 +00:00
|
|
|
{
|
2015-06-08 00:20:43 +00:00
|
|
|
if (!rte_is_valid(new))
|
|
|
|
new = NULL;
|
|
|
|
|
2012-11-10 13:26:13 +00:00
|
|
|
if (!rte_is_valid(old))
|
2019-09-09 00:55:32 +00:00
|
|
|
old = NULL;
|
2012-11-10 13:26:13 +00:00
|
|
|
|
2015-06-08 00:20:43 +00:00
|
|
|
if (!rte_is_valid(new_best))
|
|
|
|
new_best = NULL;
|
|
|
|
|
|
|
|
if (!rte_is_valid(old_best))
|
|
|
|
old_best = NULL;
|
2012-11-10 13:26:13 +00:00
|
|
|
|
2019-09-09 00:55:32 +00:00
|
|
|
if (!new && !old && !new_best && !old_best)
|
2012-11-10 13:26:13 +00:00
|
|
|
return;
|
1998-05-20 11:54:33 +00:00
|
|
|
|
2019-09-09 00:55:32 +00:00
|
|
|
if (new_best != old_best)
|
2019-02-02 12:28:16 +00:00
|
|
|
{
|
2019-09-09 00:55:32 +00:00
|
|
|
if (new_best)
|
|
|
|
new_best->sender->stats.pref_routes++;
|
|
|
|
if (old_best)
|
|
|
|
old_best->sender->stats.pref_routes--;
|
2019-02-02 12:28:16 +00:00
|
|
|
|
|
|
|
if (tab->hostcache)
|
|
|
|
rt_notify_hostcache(tab, net);
|
2021-12-20 19:25:35 +00:00
|
|
|
|
|
|
|
if (!EMPTY_LIST(tab->flowspec_links))
|
|
|
|
rt_flowspec_notify(tab, net);
|
2019-02-02 12:28:16 +00:00
|
|
|
}
|
2010-07-05 15:50:19 +00:00
|
|
|
|
2021-02-10 02:09:57 +00:00
|
|
|
rt_schedule_notify(tab);
|
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
struct channel *c; node *n;
|
|
|
|
WALK_LIST2(c, n, tab->channels, table_node)
|
2019-09-09 00:55:32 +00:00
|
|
|
{
|
|
|
|
if (c->export_state == ES_DOWN)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (type && (type != c->ra_mode))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
switch (c->ra_mode)
|
1999-02-13 20:19:24 +00:00
|
|
|
{
|
2019-09-09 00:55:32 +00:00
|
|
|
case RA_OPTIMAL:
|
|
|
|
if (new_best != old_best)
|
|
|
|
rt_notify_basic(c, net, new_best, old_best, 0);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case RA_ANY:
|
|
|
|
if (new != old)
|
|
|
|
rt_notify_basic(c, net, new, old, 0);
|
|
|
|
break;
|
2016-01-26 10:48:58 +00:00
|
|
|
|
2019-09-09 00:55:32 +00:00
|
|
|
case RA_ACCEPTED:
|
|
|
|
rt_notify_accepted(c, net, new, old, 0);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case RA_MERGED:
|
|
|
|
rt_notify_merged(c, net, new, old, new_best, old_best, 0);
|
|
|
|
break;
|
1999-02-13 20:19:24 +00:00
|
|
|
}
|
2019-09-09 00:55:32 +00:00
|
|
|
}
|
1998-05-20 11:54:33 +00:00
|
|
|
}
|
|
|
|
|
1999-03-17 15:01:07 +00:00
|
|
|
static inline int
|
|
|
|
rte_validate(rte *e)
|
|
|
|
{
|
|
|
|
int c;
|
|
|
|
net *n = e->net;
|
|
|
|
|
2015-11-05 11:48:52 +00:00
|
|
|
if (!net_validate(n->n.addr))
|
|
|
|
{
|
|
|
|
log(L_WARN "Ignoring bogus prefix %N received via %s",
|
|
|
|
n->n.addr, e->sender->proto->name);
|
|
|
|
return 0;
|
|
|
|
}
|
2010-02-26 09:55:58 +00:00
|
|
|
|
2017-12-09 23:55:34 +00:00
|
|
|
/* FIXME: better handling different nettypes */
|
|
|
|
c = !net_is_flow(n->n.addr) ?
|
|
|
|
net_classify(n->n.addr): (IADDR_HOST | SCOPE_UNIVERSE);
|
2010-02-26 09:55:58 +00:00
|
|
|
if ((c < 0) || !(c & IADDR_HOST) || ((c & IADDR_SCOPE_MASK) <= SCOPE_LINK))
|
2015-11-05 11:48:52 +00:00
|
|
|
{
|
|
|
|
log(L_WARN "Ignoring bogus route %N received via %s",
|
|
|
|
n->n.addr, e->sender->proto->name);
|
|
|
|
return 0;
|
|
|
|
}
|
2010-02-26 09:55:58 +00:00
|
|
|
|
2017-04-05 14:16:04 +00:00
|
|
|
if (net_type_match(n->n.addr, NB_DEST) == !e->attrs->dest)
|
|
|
|
{
|
2021-12-20 19:25:35 +00:00
|
|
|
/* Exception for flowspec that failed validation */
|
|
|
|
if (net_is_flow(n->n.addr) && (e->attrs->dest == RTD_UNREACHABLE))
|
|
|
|
return 1;
|
|
|
|
|
2017-04-05 14:16:04 +00:00
|
|
|
log(L_WARN "Ignoring route %N with invalid dest %d received via %s",
|
|
|
|
n->n.addr, e->attrs->dest, e->sender->proto->name);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-05-06 13:48:35 +00:00
|
|
|
if ((e->attrs->dest == RTD_UNICAST) && !nexthop_is_sorted(&(e->attrs->nh)))
|
2017-04-05 14:16:04 +00:00
|
|
|
{
|
|
|
|
log(L_WARN "Ignoring unsorted multipath route %N received via %s",
|
|
|
|
n->n.addr, e->sender->proto->name);
|
|
|
|
return 0;
|
|
|
|
}
|
2016-08-30 15:17:27 +00:00
|
|
|
|
1999-03-17 15:01:07 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2000-05-06 21:21:19 +00:00
|
|
|
static int
|
|
|
|
rte_same(rte *x, rte *y)
|
|
|
|
{
|
2019-02-22 01:16:39 +00:00
|
|
|
/* rte.flags are not checked, as they are mostly internal to rtable */
|
2000-05-06 21:21:19 +00:00
|
|
|
return
|
|
|
|
x->attrs == y->attrs &&
|
|
|
|
x->pflags == y->pflags &&
|
2020-04-10 15:08:29 +00:00
|
|
|
x->src == y->src &&
|
2019-02-22 01:16:39 +00:00
|
|
|
rte_is_filtered(x) == rte_is_filtered(y);
|
2000-05-06 21:21:19 +00:00
|
|
|
}
|
|
|
|
|
2012-11-16 12:29:16 +00:00
|
|
|
static inline int rte_is_ok(rte *e) { return e && !rte_is_filtered(e); }
|
|
|
|
|
1999-04-05 20:25:03 +00:00
|
|
|
static void
|
2016-01-26 10:48:58 +00:00
|
|
|
rte_recalculate(struct channel *c, net *net, rte *new, struct rte_src *src)
|
1998-05-20 11:54:33 +00:00
|
|
|
{
|
2016-01-26 10:48:58 +00:00
|
|
|
struct proto *p = c->proto;
|
|
|
|
struct rtable *table = c->table;
|
|
|
|
struct proto_stats *stats = &c->stats;
|
2014-10-02 09:41:34 +00:00
|
|
|
static struct tbf rl_pipe = TBF_DEFAULT_LOG_LIMITS;
|
2012-04-15 13:07:58 +00:00
|
|
|
rte *before_old = NULL;
|
1998-05-20 11:54:33 +00:00
|
|
|
rte *old_best = net->routes;
|
|
|
|
rte *old = NULL;
|
2012-04-15 13:07:58 +00:00
|
|
|
rte **k;
|
1998-05-20 11:54:33 +00:00
|
|
|
|
|
|
|
k = &net->routes; /* Find and remove original route from the same protocol */
|
|
|
|
while (old = *k)
|
|
|
|
{
|
2020-04-10 15:08:29 +00:00
|
|
|
if (old->src == src)
|
1998-05-20 11:54:33 +00:00
|
|
|
{
|
2009-12-02 16:26:16 +00:00
|
|
|
/* If there is the same route in the routing table but from
|
|
|
|
* a different sender, then there are two paths from the
|
|
|
|
* source protocol to this routing table through transparent
|
|
|
|
* pipes, which is not allowed.
|
|
|
|
*
|
|
|
|
* We log that and ignore the route. If it is withdraw, we
|
|
|
|
* ignore it completely (there might be 'spurious withdraws',
|
|
|
|
* see FIXME in do_rte_announce())
|
|
|
|
*/
|
2012-03-15 10:58:08 +00:00
|
|
|
if (old->sender->proto != p)
|
2009-12-02 16:26:16 +00:00
|
|
|
{
|
|
|
|
if (new)
|
|
|
|
{
|
2015-11-05 11:48:52 +00:00
|
|
|
log_rl(&rl_pipe, L_ERR "Pipe collision detected when sending %N to table %s",
|
|
|
|
net->n.addr, table->name);
|
2009-12-02 16:26:16 +00:00
|
|
|
rte_free_quick(new);
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2000-05-06 21:31:41 +00:00
|
|
|
if (new && rte_same(old, new))
|
2000-05-06 21:21:19 +00:00
|
|
|
{
|
2019-02-22 01:16:39 +00:00
|
|
|
/* No changes, ignore the new route and refresh the old one */
|
|
|
|
|
|
|
|
old->flags &= ~(REF_STALE | REF_DISCARD | REF_MODIFY);
|
2012-11-10 13:26:13 +00:00
|
|
|
|
2012-11-15 00:29:01 +00:00
|
|
|
if (!rte_is_filtered(new))
|
2012-11-10 13:26:13 +00:00
|
|
|
{
|
|
|
|
stats->imp_updates_ignored++;
|
2020-12-07 21:19:40 +00:00
|
|
|
rte_trace_in(D_ROUTES, c, new, "ignored");
|
2012-11-10 13:26:13 +00:00
|
|
|
}
|
|
|
|
|
2000-05-06 21:21:19 +00:00
|
|
|
rte_free_quick(new);
|
|
|
|
return;
|
|
|
|
}
|
1998-05-20 11:54:33 +00:00
|
|
|
*k = old->next;
|
2018-12-11 12:52:30 +00:00
|
|
|
table->rt_count--;
|
1998-05-20 11:54:33 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
k = &old->next;
|
2012-04-15 13:07:58 +00:00
|
|
|
before_old = old;
|
1998-05-20 11:54:33 +00:00
|
|
|
}
|
|
|
|
|
2020-07-16 13:02:10 +00:00
|
|
|
/* Save the last accessed position */
|
|
|
|
rte **pos = k;
|
|
|
|
|
2012-04-15 13:07:58 +00:00
|
|
|
if (!old)
|
|
|
|
before_old = NULL;
|
|
|
|
|
2009-06-03 23:22:56 +00:00
|
|
|
if (!old && !new)
|
|
|
|
{
|
2010-02-13 09:44:46 +00:00
|
|
|
stats->imp_withdraws_ignored++;
|
2009-06-03 23:22:56 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2013-01-10 12:07:33 +00:00
|
|
|
int new_ok = rte_is_ok(new);
|
|
|
|
int old_ok = rte_is_ok(old);
|
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
struct channel_limit *l = &c->rx_limit;
|
2018-12-11 12:52:30 +00:00
|
|
|
if (l->action && !old && new && !c->in_table)
|
2012-04-15 13:28:29 +00:00
|
|
|
{
|
2012-11-15 00:29:01 +00:00
|
|
|
u32 all_routes = stats->imp_routes + stats->filt_routes;
|
2012-11-10 13:26:13 +00:00
|
|
|
|
|
|
|
if (all_routes >= l->limit)
|
2016-01-26 10:48:58 +00:00
|
|
|
channel_notify_limit(c, l, PLD_RX, all_routes);
|
2012-04-21 19:05:36 +00:00
|
|
|
|
|
|
|
if (l->state == PLS_BLOCKED)
|
|
|
|
{
|
2013-01-10 12:07:33 +00:00
|
|
|
/* In receive limit the situation is simple, old is NULL so
|
|
|
|
we just free new and exit like nothing happened */
|
|
|
|
|
2012-04-21 19:05:36 +00:00
|
|
|
stats->imp_updates_ignored++;
|
2020-12-07 21:19:40 +00:00
|
|
|
rte_trace_in(D_FILTERS, c, new, "ignored [limit]");
|
2012-04-21 19:05:36 +00:00
|
|
|
rte_free_quick(new);
|
|
|
|
return;
|
|
|
|
}
|
2012-04-15 13:28:29 +00:00
|
|
|
}
|
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
l = &c->in_limit;
|
|
|
|
if (l->action && !old_ok && new_ok)
|
2013-01-10 12:07:33 +00:00
|
|
|
{
|
|
|
|
if (stats->imp_routes >= l->limit)
|
2016-01-26 10:48:58 +00:00
|
|
|
channel_notify_limit(c, l, PLD_IN, stats->imp_routes);
|
2013-01-10 12:07:33 +00:00
|
|
|
|
|
|
|
if (l->state == PLS_BLOCKED)
|
|
|
|
{
|
|
|
|
/* In import limit the situation is more complicated. We
|
|
|
|
shouldn't just drop the route, we should handle it like
|
|
|
|
it was filtered. We also have to continue the route
|
|
|
|
processing if old or new is non-NULL, but we should exit
|
|
|
|
if both are NULL as this case is probably assumed to be
|
|
|
|
already handled. */
|
|
|
|
|
|
|
|
stats->imp_updates_ignored++;
|
2020-12-07 21:19:40 +00:00
|
|
|
rte_trace_in(D_FILTERS, c, new, "ignored [limit]");
|
2013-01-10 12:07:33 +00:00
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
if (c->in_keep_filtered)
|
2013-01-10 12:07:33 +00:00
|
|
|
new->flags |= REF_FILTERED;
|
|
|
|
else
|
|
|
|
{ rte_free_quick(new); new = NULL; }
|
|
|
|
|
|
|
|
/* Note that old && !new could be possible when
|
2016-01-26 10:48:58 +00:00
|
|
|
c->in_keep_filtered changed in the recent past. */
|
2013-01-10 12:07:33 +00:00
|
|
|
|
|
|
|
if (!old && !new)
|
|
|
|
return;
|
|
|
|
|
|
|
|
new_ok = 0;
|
|
|
|
goto skip_stats1;
|
|
|
|
}
|
|
|
|
}
|
2012-11-16 12:29:16 +00:00
|
|
|
|
|
|
|
if (new_ok)
|
2010-02-13 09:44:46 +00:00
|
|
|
stats->imp_updates_accepted++;
|
2012-11-16 12:29:16 +00:00
|
|
|
else if (old_ok)
|
2010-02-13 09:44:46 +00:00
|
|
|
stats->imp_withdraws_accepted++;
|
2012-11-16 12:29:16 +00:00
|
|
|
else
|
|
|
|
stats->imp_withdraws_ignored++;
|
2009-06-03 23:22:56 +00:00
|
|
|
|
2021-02-10 02:09:57 +00:00
|
|
|
if (old_ok || new_ok)
|
|
|
|
table->last_rt_change = current_time();
|
|
|
|
|
2013-01-10 12:07:33 +00:00
|
|
|
skip_stats1:
|
2009-06-03 23:22:56 +00:00
|
|
|
|
|
|
|
if (new)
|
2012-11-15 00:29:01 +00:00
|
|
|
rte_is_filtered(new) ? stats->filt_routes++ : stats->imp_routes++;
|
2009-06-03 23:22:56 +00:00
|
|
|
if (old)
|
2012-11-15 00:29:01 +00:00
|
|
|
rte_is_filtered(old) ? stats->filt_routes-- : stats->imp_routes--;
|
2009-06-03 23:22:56 +00:00
|
|
|
|
2012-07-04 19:31:03 +00:00
|
|
|
if (table->config->sorted)
|
1998-05-20 11:54:33 +00:00
|
|
|
{
|
2012-07-04 19:31:03 +00:00
|
|
|
/* If routes are sorted, just insert new route to appropriate position */
|
|
|
|
if (new)
|
|
|
|
{
|
|
|
|
if (before_old && !rte_better(new, before_old))
|
|
|
|
k = &before_old->next;
|
|
|
|
else
|
|
|
|
k = &net->routes;
|
2009-08-11 13:49:56 +00:00
|
|
|
|
2012-07-04 19:31:03 +00:00
|
|
|
for (; *k; k=&(*k)->next)
|
|
|
|
if (rte_better(new, *k))
|
|
|
|
break;
|
2009-08-11 13:49:56 +00:00
|
|
|
|
2012-07-04 19:31:03 +00:00
|
|
|
new->next = *k;
|
|
|
|
*k = new;
|
2020-07-16 13:02:10 +00:00
|
|
|
|
2018-12-11 12:52:30 +00:00
|
|
|
table->rt_count++;
|
2012-07-04 19:31:03 +00:00
|
|
|
}
|
1998-05-20 11:54:33 +00:00
|
|
|
}
|
2012-07-04 19:31:03 +00:00
|
|
|
else
|
1998-05-20 11:54:33 +00:00
|
|
|
{
|
2012-07-04 19:31:03 +00:00
|
|
|
/* If routes are not sorted, find the best route and move it on
|
|
|
|
the first position. There are several optimized cases. */
|
|
|
|
|
2012-08-14 14:25:22 +00:00
|
|
|
if (src->proto->rte_recalculate && src->proto->rte_recalculate(table, net, new, old, old_best))
|
2012-07-04 19:31:03 +00:00
|
|
|
goto do_recalculate;
|
|
|
|
|
|
|
|
if (new && rte_better(new, old_best))
|
1998-05-20 11:54:33 +00:00
|
|
|
{
|
2012-07-04 19:31:03 +00:00
|
|
|
/* The first case - the new route is cleary optimal,
|
|
|
|
we link it at the first position */
|
|
|
|
|
2009-08-11 13:49:56 +00:00
|
|
|
new->next = net->routes;
|
|
|
|
net->routes = new;
|
2020-07-16 13:02:10 +00:00
|
|
|
|
2018-12-11 12:52:30 +00:00
|
|
|
table->rt_count++;
|
2009-08-11 13:49:56 +00:00
|
|
|
}
|
2012-07-04 19:31:03 +00:00
|
|
|
else if (old == old_best)
|
2009-08-11 13:49:56 +00:00
|
|
|
{
|
2012-07-04 19:31:03 +00:00
|
|
|
/* The second case - the old best route disappeared, we add the
|
|
|
|
new route (if we have any) to the list (we don't care about
|
|
|
|
position) and then we elect the new optimal route and relink
|
|
|
|
that route at the first position and announce it. New optimal
|
|
|
|
route might be NULL if there is no more routes */
|
|
|
|
|
|
|
|
do_recalculate:
|
|
|
|
/* Add the new route to the list */
|
|
|
|
if (new)
|
1998-05-20 11:54:33 +00:00
|
|
|
{
|
2020-07-16 13:02:10 +00:00
|
|
|
new->next = *pos;
|
|
|
|
*pos = new;
|
|
|
|
|
2018-12-11 12:52:30 +00:00
|
|
|
table->rt_count++;
|
2012-07-04 19:31:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Find a new optimal route (if there is any) */
|
|
|
|
if (net->routes)
|
|
|
|
{
|
|
|
|
rte **bp = &net->routes;
|
|
|
|
for (k=&(*bp)->next; *k; k=&(*k)->next)
|
|
|
|
if (rte_better(*k, *bp))
|
|
|
|
bp = k;
|
|
|
|
|
|
|
|
/* And relink it */
|
|
|
|
rte *best = *bp;
|
|
|
|
*bp = best->next;
|
|
|
|
best->next = net->routes;
|
|
|
|
net->routes = best;
|
1998-05-20 11:54:33 +00:00
|
|
|
}
|
|
|
|
}
|
2012-07-04 19:31:03 +00:00
|
|
|
else if (new)
|
|
|
|
{
|
|
|
|
/* The third case - the new route is not better than the old
|
|
|
|
best route (therefore old_best != NULL) and the old best
|
|
|
|
route was not removed (therefore old_best == net->routes).
|
2020-07-16 13:02:10 +00:00
|
|
|
We just link the new route to the old/last position. */
|
|
|
|
|
|
|
|
new->next = *pos;
|
|
|
|
*pos = new;
|
2012-07-04 19:31:03 +00:00
|
|
|
|
2018-12-11 12:52:30 +00:00
|
|
|
table->rt_count++;
|
2012-07-04 19:31:03 +00:00
|
|
|
}
|
|
|
|
/* The fourth (empty) case - suboptimal route was removed, nothing to do */
|
1998-05-20 11:54:33 +00:00
|
|
|
}
|
2009-08-11 13:49:56 +00:00
|
|
|
|
2012-07-04 19:31:03 +00:00
|
|
|
if (new)
|
2019-09-09 00:55:32 +00:00
|
|
|
{
|
|
|
|
new->lastmod = current_time();
|
|
|
|
|
|
|
|
if (!old)
|
|
|
|
{
|
|
|
|
new->id = hmap_first_zero(&table->id_map);
|
|
|
|
hmap_set(&table->id_map, new->id);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
new->id = old->id;
|
|
|
|
}
|
2012-07-04 19:31:03 +00:00
|
|
|
|
|
|
|
/* Log the route change */
|
2020-12-07 21:19:40 +00:00
|
|
|
if ((c->debug & D_ROUTES) || (p->debug & D_ROUTES))
|
2009-12-02 13:33:34 +00:00
|
|
|
{
|
2012-11-16 12:29:16 +00:00
|
|
|
if (new_ok)
|
2020-12-07 21:19:40 +00:00
|
|
|
rte_trace(c, new, '>', new == net->routes ? "added [best]" : "added");
|
2012-11-16 12:29:16 +00:00
|
|
|
else if (old_ok)
|
|
|
|
{
|
|
|
|
if (old != old_best)
|
2020-12-07 21:19:40 +00:00
|
|
|
rte_trace(c, old, '>', "removed");
|
2012-11-16 12:29:16 +00:00
|
|
|
else if (rte_is_ok(net->routes))
|
2020-12-07 21:19:40 +00:00
|
|
|
rte_trace(c, old, '>', "removed [replaced]");
|
2012-11-16 12:29:16 +00:00
|
|
|
else
|
2020-12-07 21:19:40 +00:00
|
|
|
rte_trace(c, old, '>', "removed [sole]");
|
2012-11-16 12:29:16 +00:00
|
|
|
}
|
2009-08-11 13:49:56 +00:00
|
|
|
}
|
|
|
|
|
2012-07-04 19:31:03 +00:00
|
|
|
/* Propagate the route change */
|
2019-09-09 00:55:32 +00:00
|
|
|
rte_announce(table, RA_UNDEF, net, new, old, net->routes, old_best);
|
2012-04-15 13:07:58 +00:00
|
|
|
|
|
|
|
if (!net->routes &&
|
|
|
|
(table->gc_counter++ >= table->config->gc_max_ops) &&
|
2017-06-06 14:47:30 +00:00
|
|
|
(table->gc_time + table->config->gc_min_time <= current_time()))
|
2016-01-26 10:48:58 +00:00
|
|
|
rt_schedule_prune(table);
|
2012-04-15 13:07:58 +00:00
|
|
|
|
2012-11-16 12:29:16 +00:00
|
|
|
if (old_ok && p->rte_remove)
|
|
|
|
p->rte_remove(net, old);
|
|
|
|
if (new_ok && p->rte_insert)
|
|
|
|
p->rte_insert(net, new);
|
|
|
|
|
1998-05-20 11:54:33 +00:00
|
|
|
if (old)
|
2019-09-09 00:55:32 +00:00
|
|
|
{
|
|
|
|
if (!new)
|
|
|
|
hmap_clear(&table->id_map, old->id);
|
|
|
|
|
|
|
|
rte_free_quick(old);
|
|
|
|
}
|
1998-10-18 11:13:16 +00:00
|
|
|
}
|
|
|
|
|
1999-04-05 20:25:03 +00:00
|
|
|
static int rte_update_nest_cnt; /* Nesting counter to allow recursive updates */
|
|
|
|
|
|
|
|
static inline void
|
|
|
|
rte_update_lock(void)
|
|
|
|
{
|
|
|
|
rte_update_nest_cnt++;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void
|
|
|
|
rte_update_unlock(void)
|
|
|
|
{
|
|
|
|
if (!--rte_update_nest_cnt)
|
|
|
|
lp_flush(rte_update_pool);
|
|
|
|
}
|
|
|
|
|
2000-06-01 17:12:19 +00:00
|
|
|
/**
|
|
|
|
* rte_update - enter a new update to a routing table
|
|
|
|
* @table: table to be updated
|
2016-01-26 10:48:58 +00:00
|
|
|
* @c: channel doing the update
|
2000-06-01 17:12:19 +00:00
|
|
|
* @net: network node
|
|
|
|
* @p: protocol submitting the update
|
2009-06-01 12:07:13 +00:00
|
|
|
* @src: protocol originating the update
|
2000-06-01 17:12:19 +00:00
|
|
|
* @new: a &rte representing the new route or %NULL for route removal.
|
|
|
|
*
|
|
|
|
* This function is called by the routing protocols whenever they discover
|
|
|
|
* a new route or wish to update/remove an existing route. The right announcement
|
2000-06-07 12:29:08 +00:00
|
|
|
* sequence is to build route attributes first (either un-cached with @aflags set
|
2000-06-01 17:12:19 +00:00
|
|
|
* to zero or a cached one using rta_lookup(); in this case please note that
|
|
|
|
* you need to increase the use count of the attributes yourself by calling
|
|
|
|
* rta_clone()), call rte_get_temp() to obtain a temporary &rte, fill in all
|
|
|
|
* the appropriate data and finally submit the new &rte by calling rte_update().
|
|
|
|
*
|
2009-06-01 12:07:13 +00:00
|
|
|
* @src specifies the protocol that originally created the route and the meaning
|
|
|
|
* of protocol-dependent data of @new. If @new is not %NULL, @src have to be the
|
|
|
|
* same value as @new->attrs->proto. @p specifies the protocol that called
|
|
|
|
* rte_update(). In most cases it is the same protocol as @src. rte_update()
|
|
|
|
* stores @p in @new->sender;
|
|
|
|
*
|
2000-06-02 12:41:25 +00:00
|
|
|
* When rte_update() gets any route, it automatically validates it (checks,
|
|
|
|
* whether the network and next hop address are valid IP addresses and also
|
|
|
|
* whether a normal routing protocol doesn't try to smuggle a host or link
|
|
|
|
* scope route to the table), converts all protocol dependent attributes stored
|
|
|
|
* in the &rte to temporary extended attributes, consults import filters of the
|
|
|
|
* protocol to see if the route should be accepted and/or its attributes modified,
|
|
|
|
* stores the temporary attributes back to the &rte.
|
|
|
|
*
|
|
|
|
* Now, having a "public" version of the route, we
|
2009-06-01 12:07:13 +00:00
|
|
|
* automatically find any old route defined by the protocol @src
|
2000-06-01 17:12:19 +00:00
|
|
|
* for network @n, replace it by the new one (or removing it if @new is %NULL),
|
|
|
|
* recalculate the optimal route for this destination and finally broadcast
|
2000-06-02 12:41:25 +00:00
|
|
|
* the change (if any) to all routing protocols by calling rte_announce().
|
2000-06-02 12:29:55 +00:00
|
|
|
*
|
|
|
|
* All memory used for attribute lists and other temporary allocations is taken
|
|
|
|
* from a special linear pool @rte_update_pool and freed when rte_update()
|
|
|
|
* finishes.
|
2000-06-01 17:12:19 +00:00
|
|
|
*/
|
2009-05-31 13:24:27 +00:00
|
|
|
|
|
|
|
void
|
2015-09-17 15:15:30 +00:00
|
|
|
rte_update2(struct channel *c, const net_addr *n, rte *new, struct rte_src *src)
|
1999-04-05 20:25:03 +00:00
|
|
|
{
|
2020-12-07 21:19:40 +00:00
|
|
|
// struct proto *p = c->proto;
|
2016-01-26 10:48:58 +00:00
|
|
|
struct proto_stats *stats = &c->stats;
|
2019-02-15 12:53:17 +00:00
|
|
|
const struct filter *filter = c->in_filter;
|
2016-04-08 11:08:03 +00:00
|
|
|
net *nn;
|
1999-04-05 20:25:03 +00:00
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
ASSERT(c->channel_state == CS_UP);
|
|
|
|
|
1999-04-05 20:25:03 +00:00
|
|
|
rte_update_lock();
|
|
|
|
if (new)
|
|
|
|
{
|
2019-01-31 14:02:15 +00:00
|
|
|
/* Create a temporary table node */
|
|
|
|
nn = alloca(sizeof(net) + n->length);
|
|
|
|
memset(nn, 0, sizeof(net) + n->length);
|
|
|
|
net_copy(nn->n.addr, n);
|
2016-04-08 11:08:03 +00:00
|
|
|
|
|
|
|
new->net = nn;
|
2016-01-26 10:48:58 +00:00
|
|
|
new->sender = c;
|
|
|
|
|
2010-02-13 09:44:46 +00:00
|
|
|
stats->imp_updates_received++;
|
2000-03-12 20:30:53 +00:00
|
|
|
if (!rte_validate(new))
|
|
|
|
{
|
2020-12-07 21:19:40 +00:00
|
|
|
rte_trace_in(D_FILTERS, c, new, "invalid");
|
2010-02-13 09:44:46 +00:00
|
|
|
stats->imp_updates_invalid++;
|
2000-03-12 20:30:53 +00:00
|
|
|
goto drop;
|
|
|
|
}
|
2012-11-10 13:26:13 +00:00
|
|
|
|
2009-03-25 18:05:52 +00:00
|
|
|
if (filter == FILTER_REJECT)
|
2000-03-12 20:30:53 +00:00
|
|
|
{
|
2010-02-13 09:44:46 +00:00
|
|
|
stats->imp_updates_filtered++;
|
2020-12-07 21:19:40 +00:00
|
|
|
rte_trace_in(D_FILTERS, c, new, "filtered out");
|
2012-08-14 14:25:22 +00:00
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
if (! c->in_keep_filtered)
|
2012-11-10 13:26:13 +00:00
|
|
|
goto drop;
|
|
|
|
|
|
|
|
/* new is a private copy, i could modify it */
|
2012-11-15 00:29:01 +00:00
|
|
|
new->flags |= REF_FILTERED;
|
2000-03-12 20:30:53 +00:00
|
|
|
}
|
2019-03-14 16:22:22 +00:00
|
|
|
else if (filter)
|
1999-04-05 20:25:03 +00:00
|
|
|
{
|
2022-04-10 16:55:15 +00:00
|
|
|
int fr = f_run(filter, &new, 0);
|
2019-03-14 16:22:22 +00:00
|
|
|
if (fr > F_ACCEPT)
|
|
|
|
{
|
|
|
|
stats->imp_updates_filtered++;
|
2020-12-07 21:19:40 +00:00
|
|
|
rte_trace_in(D_FILTERS, c, new, "filtered out");
|
2012-11-10 13:26:13 +00:00
|
|
|
|
2019-03-14 16:22:22 +00:00
|
|
|
if (! c->in_keep_filtered)
|
|
|
|
goto drop;
|
|
|
|
|
|
|
|
new->flags |= REF_FILTERED;
|
|
|
|
}
|
1999-04-05 20:25:03 +00:00
|
|
|
}
|
2012-08-14 14:25:22 +00:00
|
|
|
if (!rta_is_cached(new->attrs)) /* Need to copy attributes */
|
1999-04-05 20:25:03 +00:00
|
|
|
new->attrs = rta_lookup(new->attrs);
|
|
|
|
new->flags |= REF_COW;
|
2019-01-31 14:02:15 +00:00
|
|
|
|
|
|
|
/* Use the actual struct network, not the dummy one */
|
|
|
|
nn = net_get(c->table, n);
|
|
|
|
new->net = nn;
|
1999-04-05 20:25:03 +00:00
|
|
|
}
|
2009-06-03 23:22:56 +00:00
|
|
|
else
|
2012-08-14 14:25:22 +00:00
|
|
|
{
|
|
|
|
stats->imp_withdraws_received++;
|
|
|
|
|
2016-04-08 11:08:03 +00:00
|
|
|
if (!(nn = net_find(c->table, n)) || !src)
|
2012-08-14 14:25:22 +00:00
|
|
|
{
|
|
|
|
stats->imp_withdraws_ignored++;
|
|
|
|
rte_update_unlock();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
2009-06-03 23:22:56 +00:00
|
|
|
|
2013-06-13 09:27:14 +00:00
|
|
|
recalc:
|
2019-01-31 14:02:15 +00:00
|
|
|
/* And recalculate the best route */
|
2016-04-08 11:08:03 +00:00
|
|
|
rte_recalculate(c, nn, new, src);
|
2019-01-31 14:02:15 +00:00
|
|
|
|
1999-04-05 20:25:03 +00:00
|
|
|
rte_update_unlock();
|
|
|
|
return;
|
|
|
|
|
2013-06-13 09:27:14 +00:00
|
|
|
drop:
|
1999-04-05 20:25:03 +00:00
|
|
|
rte_free(new);
|
2013-06-13 09:27:14 +00:00
|
|
|
new = NULL;
|
2019-01-31 14:02:15 +00:00
|
|
|
if (nn = net_find(c->table, n))
|
|
|
|
goto recalc;
|
|
|
|
|
|
|
|
rte_update_unlock();
|
1999-04-05 20:25:03 +00:00
|
|
|
}
|
|
|
|
|
2010-07-05 15:50:19 +00:00
|
|
|
/* Independent call to rte_announce(), used from next hop
|
|
|
|
recalculation, outside of rte_update(). new must be non-NULL */
|
2018-02-06 16:43:55 +00:00
|
|
|
static inline void
|
2019-09-09 00:55:32 +00:00
|
|
|
rte_announce_i(rtable *tab, uint type, net *net, rte *new, rte *old,
|
2015-06-08 00:20:43 +00:00
|
|
|
rte *new_best, rte *old_best)
|
2010-07-05 15:50:19 +00:00
|
|
|
{
|
|
|
|
rte_update_lock();
|
2019-09-09 00:55:32 +00:00
|
|
|
rte_announce(tab, type, net, new, old, new_best, old_best);
|
2010-07-05 15:50:19 +00:00
|
|
|
rte_update_unlock();
|
|
|
|
}
|
|
|
|
|
2016-10-14 13:37:04 +00:00
|
|
|
static inline void
|
|
|
|
rte_discard(rte *old) /* Non-filtered route deletion, used during garbage collection */
|
1998-10-18 11:13:16 +00:00
|
|
|
{
|
1999-04-05 20:25:03 +00:00
|
|
|
rte_update_lock();
|
2020-04-10 15:08:29 +00:00
|
|
|
rte_recalculate(old->sender, old->net, NULL, old->src);
|
1999-04-05 20:25:03 +00:00
|
|
|
rte_update_unlock();
|
1998-05-20 11:54:33 +00:00
|
|
|
}
|
|
|
|
|
2018-07-31 16:40:38 +00:00
|
|
|
/* Modify existing route by protocol hook, used for long-lived graceful restart */
|
|
|
|
static inline void
|
|
|
|
rte_modify(rte *old)
|
|
|
|
{
|
|
|
|
rte_update_lock();
|
|
|
|
|
|
|
|
rte *new = old->sender->proto->rte_modify(old, rte_update_pool);
|
|
|
|
if (new != old)
|
|
|
|
{
|
|
|
|
if (new)
|
|
|
|
{
|
|
|
|
if (!rta_is_cached(new->attrs))
|
|
|
|
new->attrs = rta_lookup(new->attrs);
|
|
|
|
new->flags = (old->flags & ~REF_MODIFY) | REF_COW;
|
|
|
|
}
|
|
|
|
|
2020-04-10 15:08:29 +00:00
|
|
|
rte_recalculate(old->sender, old->net, new, old->src);
|
2018-07-31 16:40:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
rte_update_unlock();
|
|
|
|
}
|
|
|
|
|
2013-02-08 22:58:27 +00:00
|
|
|
/* Check rtable for best route to given net whether it would be exported do p */
|
|
|
|
int
|
2019-02-15 12:53:17 +00:00
|
|
|
rt_examine(rtable *t, net_addr *a, struct proto *p, const struct filter *filter)
|
2013-02-08 22:58:27 +00:00
|
|
|
{
|
2015-11-05 11:48:52 +00:00
|
|
|
net *n = net_find(t, a);
|
2013-02-08 22:58:27 +00:00
|
|
|
rte *rt = n ? n->routes : NULL;
|
|
|
|
|
|
|
|
if (!rte_is_valid(rt))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
rte_update_lock();
|
|
|
|
|
|
|
|
/* Rest is stripped down export_filter() */
|
2020-04-12 19:54:20 +00:00
|
|
|
int v = p->preexport ? p->preexport(p, rt) : 0;
|
2013-02-08 22:58:27 +00:00
|
|
|
if (v == RIC_PROCESS)
|
2022-04-10 16:55:15 +00:00
|
|
|
v = (f_run(filter, &rt, FF_SILENT) <= F_ACCEPT);
|
2013-02-08 22:58:27 +00:00
|
|
|
|
2018-12-14 15:10:19 +00:00
|
|
|
/* Discard temporary rte */
|
2013-02-08 22:58:27 +00:00
|
|
|
if (rt != n->routes)
|
|
|
|
rte_free(rt);
|
|
|
|
|
|
|
|
rte_update_unlock();
|
|
|
|
|
|
|
|
return v > 0;
|
|
|
|
}
|
|
|
|
|
2014-03-23 00:35:33 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* rt_refresh_begin - start a refresh cycle
|
|
|
|
* @t: related routing table
|
2016-01-26 10:48:58 +00:00
|
|
|
* @c related channel
|
2014-03-23 00:35:33 +00:00
|
|
|
*
|
|
|
|
* This function starts a refresh cycle for given routing table and announce
|
|
|
|
* hook. The refresh cycle is a sequence where the protocol sends all its valid
|
|
|
|
* routes to the routing table (by rte_update()). After that, all protocol
|
2016-01-26 10:48:58 +00:00
|
|
|
* routes (more precisely routes with @c as @sender) not sent during the
|
2014-03-23 00:35:33 +00:00
|
|
|
* refresh cycle but still in the table from the past are pruned. This is
|
|
|
|
* implemented by marking all related routes as stale by REF_STALE flag in
|
|
|
|
* rt_refresh_begin(), then marking all related stale routes with REF_DISCARD
|
|
|
|
* flag in rt_refresh_end() and then removing such routes in the prune loop.
|
|
|
|
*/
|
2014-03-20 13:07:12 +00:00
|
|
|
void
|
2016-01-26 10:48:58 +00:00
|
|
|
rt_refresh_begin(rtable *t, struct channel *c)
|
2014-03-20 13:07:12 +00:00
|
|
|
{
|
2015-12-21 19:16:05 +00:00
|
|
|
FIB_WALK(&t->fib, net, n)
|
2014-03-20 13:07:12 +00:00
|
|
|
{
|
2015-12-21 19:16:05 +00:00
|
|
|
rte *e;
|
2014-03-20 13:07:12 +00:00
|
|
|
for (e = n->routes; e; e = e->next)
|
2016-01-26 10:48:58 +00:00
|
|
|
if (e->sender == c)
|
2014-03-20 13:07:12 +00:00
|
|
|
e->flags |= REF_STALE;
|
|
|
|
}
|
|
|
|
FIB_WALK_END;
|
|
|
|
}
|
|
|
|
|
2014-03-23 00:35:33 +00:00
|
|
|
/**
|
|
|
|
* rt_refresh_end - end a refresh cycle
|
|
|
|
* @t: related routing table
|
2016-01-26 10:48:58 +00:00
|
|
|
* @c: related channel
|
2014-03-23 00:35:33 +00:00
|
|
|
*
|
2016-01-26 10:48:58 +00:00
|
|
|
* This function ends a refresh cycle for given routing table and announce
|
2014-03-23 00:35:33 +00:00
|
|
|
* hook. See rt_refresh_begin() for description of refresh cycles.
|
|
|
|
*/
|
2014-03-20 13:07:12 +00:00
|
|
|
void
|
2016-01-26 10:48:58 +00:00
|
|
|
rt_refresh_end(rtable *t, struct channel *c)
|
2014-03-20 13:07:12 +00:00
|
|
|
{
|
|
|
|
int prune = 0;
|
|
|
|
|
2015-12-21 19:16:05 +00:00
|
|
|
FIB_WALK(&t->fib, net, n)
|
2014-03-20 13:07:12 +00:00
|
|
|
{
|
2015-12-21 19:16:05 +00:00
|
|
|
rte *e;
|
2014-03-20 13:07:12 +00:00
|
|
|
for (e = n->routes; e; e = e->next)
|
2016-01-26 10:48:58 +00:00
|
|
|
if ((e->sender == c) && (e->flags & REF_STALE))
|
2014-03-20 13:07:12 +00:00
|
|
|
{
|
|
|
|
e->flags |= REF_DISCARD;
|
|
|
|
prune = 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
FIB_WALK_END;
|
|
|
|
|
|
|
|
if (prune)
|
|
|
|
rt_schedule_prune(t);
|
|
|
|
}
|
|
|
|
|
2018-07-31 16:40:38 +00:00
|
|
|
void
|
|
|
|
rt_modify_stale(rtable *t, struct channel *c)
|
|
|
|
{
|
|
|
|
int prune = 0;
|
|
|
|
|
|
|
|
FIB_WALK(&t->fib, net, n)
|
|
|
|
{
|
|
|
|
rte *e;
|
|
|
|
for (e = n->routes; e; e = e->next)
|
|
|
|
if ((e->sender == c) && (e->flags & REF_STALE) && !(e->flags & REF_FILTERED))
|
|
|
|
{
|
|
|
|
e->flags |= REF_MODIFY;
|
|
|
|
prune = 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
FIB_WALK_END;
|
|
|
|
|
|
|
|
if (prune)
|
|
|
|
rt_schedule_prune(t);
|
|
|
|
}
|
2014-03-20 13:07:12 +00:00
|
|
|
|
2000-06-01 17:12:19 +00:00
|
|
|
/**
|
|
|
|
* rte_dump - dump a route
|
|
|
|
* @e: &rte to be dumped
|
|
|
|
*
|
|
|
|
* This functions dumps contents of a &rte to debug output.
|
|
|
|
*/
|
1998-05-20 11:54:33 +00:00
|
|
|
void
|
1998-10-20 15:13:18 +00:00
|
|
|
rte_dump(rte *e)
|
1998-05-20 11:54:33 +00:00
|
|
|
{
|
1998-10-20 15:13:18 +00:00
|
|
|
net *n = e->net;
|
2015-11-05 11:48:52 +00:00
|
|
|
debug("%-1N ", n->n.addr);
|
2020-02-10 07:41:05 +00:00
|
|
|
debug("PF=%02x ", e->pflags);
|
1998-06-04 20:28:19 +00:00
|
|
|
rta_dump(e->attrs);
|
|
|
|
debug("\n");
|
1998-05-20 11:54:33 +00:00
|
|
|
}
|
1998-05-15 07:54:32 +00:00
|
|
|
|
2000-06-01 17:12:19 +00:00
|
|
|
/**
|
|
|
|
* rt_dump - dump a routing table
|
|
|
|
* @t: routing table to be dumped
|
|
|
|
*
|
|
|
|
* This function dumps contents of a given routing table to debug output.
|
|
|
|
*/
|
1998-05-20 11:54:33 +00:00
|
|
|
void
|
|
|
|
rt_dump(rtable *t)
|
|
|
|
{
|
1998-06-04 20:28:19 +00:00
|
|
|
debug("Dump of routing table <%s>\n", t->name);
|
1998-12-20 14:01:37 +00:00
|
|
|
#ifdef DEBUGGING
|
1999-04-12 18:01:07 +00:00
|
|
|
fib_check(&t->fib);
|
1998-12-20 14:01:37 +00:00
|
|
|
#endif
|
2015-12-21 19:16:05 +00:00
|
|
|
FIB_WALK(&t->fib, net, n)
|
1999-04-12 18:01:07 +00:00
|
|
|
{
|
2015-12-21 19:16:05 +00:00
|
|
|
rte *e;
|
1999-04-12 18:01:07 +00:00
|
|
|
for(e=n->routes; e; e=e->next)
|
|
|
|
rte_dump(e);
|
1998-06-04 20:28:19 +00:00
|
|
|
}
|
1999-04-12 18:01:07 +00:00
|
|
|
FIB_WALK_END;
|
1998-06-04 20:28:19 +00:00
|
|
|
debug("\n");
|
1998-05-20 11:54:33 +00:00
|
|
|
}
|
1998-05-15 07:54:32 +00:00
|
|
|
|
2000-06-01 17:12:19 +00:00
|
|
|
/**
|
|
|
|
* rt_dump_all - dump all routing tables
|
|
|
|
*
|
|
|
|
* This function dumps contents of all routing tables to debug output.
|
|
|
|
*/
|
1998-05-24 14:49:14 +00:00
|
|
|
void
|
|
|
|
rt_dump_all(void)
|
|
|
|
{
|
1999-05-17 20:14:52 +00:00
|
|
|
rtable *t;
|
2021-03-30 13:09:53 +00:00
|
|
|
node *n;
|
1999-05-17 20:14:52 +00:00
|
|
|
|
2021-03-30 13:09:53 +00:00
|
|
|
WALK_LIST2(t, n, routing_tables, n)
|
1999-05-17 20:14:52 +00:00
|
|
|
rt_dump(t);
|
1998-05-24 14:49:14 +00:00
|
|
|
}
|
|
|
|
|
2010-07-05 15:50:19 +00:00
|
|
|
static inline void
|
|
|
|
rt_schedule_hcu(rtable *tab)
|
|
|
|
{
|
|
|
|
if (tab->hcu_scheduled)
|
|
|
|
return;
|
|
|
|
|
|
|
|
tab->hcu_scheduled = 1;
|
|
|
|
ev_schedule(tab->rt_event);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void
|
|
|
|
rt_schedule_nhu(rtable *tab)
|
|
|
|
{
|
2017-02-22 13:02:03 +00:00
|
|
|
if (tab->nhu_state == NHU_CLEAN)
|
2010-07-05 15:50:19 +00:00
|
|
|
ev_schedule(tab->rt_event);
|
|
|
|
|
2017-02-22 13:02:03 +00:00
|
|
|
/* state change:
|
|
|
|
* NHU_CLEAN -> NHU_SCHEDULED
|
|
|
|
* NHU_RUNNING -> NHU_DIRTY
|
|
|
|
*/
|
|
|
|
tab->nhu_state |= NHU_SCHEDULED;
|
2010-07-05 15:50:19 +00:00
|
|
|
}
|
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
void
|
|
|
|
rt_schedule_prune(rtable *tab)
|
2012-03-28 16:40:04 +00:00
|
|
|
{
|
2016-01-26 10:48:58 +00:00
|
|
|
if (tab->prune_state == 0)
|
|
|
|
ev_schedule(tab->rt_event);
|
2012-03-28 16:40:04 +00:00
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
/* state change 0->1, 2->3 */
|
|
|
|
tab->prune_state |= 1;
|
2012-03-28 16:40:04 +00:00
|
|
|
}
|
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
|
2000-04-27 22:28:49 +00:00
|
|
|
static void
|
2010-07-05 15:50:19 +00:00
|
|
|
rt_event(void *ptr)
|
1999-02-13 21:29:01 +00:00
|
|
|
{
|
2010-07-05 15:50:19 +00:00
|
|
|
rtable *tab = ptr;
|
|
|
|
|
2016-05-12 14:04:47 +00:00
|
|
|
rt_lock_table(tab);
|
|
|
|
|
2010-07-05 15:50:19 +00:00
|
|
|
if (tab->hcu_scheduled)
|
|
|
|
rt_update_hostcache(tab);
|
1999-05-17 20:14:52 +00:00
|
|
|
|
2010-07-05 15:50:19 +00:00
|
|
|
if (tab->nhu_state)
|
|
|
|
rt_next_hop_update(tab);
|
|
|
|
|
2014-03-20 13:07:12 +00:00
|
|
|
if (tab->prune_state)
|
2016-01-26 10:48:58 +00:00
|
|
|
rt_prune_table(tab);
|
2016-05-12 14:04:47 +00:00
|
|
|
|
|
|
|
rt_unlock_table(tab);
|
1999-02-13 21:29:01 +00:00
|
|
|
}
|
|
|
|
|
2021-02-10 02:09:57 +00:00
|
|
|
|
|
|
|
static inline btime
|
|
|
|
rt_settled_time(rtable *tab)
|
|
|
|
{
|
|
|
|
ASSUME(tab->base_settle_time != 0);
|
|
|
|
|
|
|
|
return MIN(tab->last_rt_change + tab->config->min_settle_time,
|
|
|
|
tab->base_settle_time + tab->config->max_settle_time);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
rt_settle_timer(timer *t)
|
|
|
|
{
|
|
|
|
rtable *tab = t->data;
|
|
|
|
|
|
|
|
if (!tab->base_settle_time)
|
|
|
|
return;
|
|
|
|
|
|
|
|
btime settled_time = rt_settled_time(tab);
|
|
|
|
if (current_time() < settled_time)
|
|
|
|
{
|
|
|
|
tm_set(tab->settle_timer, settled_time);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Settled */
|
|
|
|
tab->base_settle_time = 0;
|
|
|
|
|
|
|
|
struct rt_subscription *s;
|
|
|
|
WALK_LIST(s, tab->subscribers)
|
|
|
|
s->hook(s);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
rt_kick_settle_timer(rtable *tab)
|
|
|
|
{
|
|
|
|
tab->base_settle_time = current_time();
|
|
|
|
|
|
|
|
if (!tab->settle_timer)
|
2021-03-30 16:51:31 +00:00
|
|
|
tab->settle_timer = tm_new_init(tab->rp, rt_settle_timer, tab, 0, 0);
|
2021-02-10 02:09:57 +00:00
|
|
|
|
|
|
|
if (!tm_active(tab->settle_timer))
|
|
|
|
tm_set(tab->settle_timer, rt_settled_time(tab));
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void
|
|
|
|
rt_schedule_notify(rtable *tab)
|
|
|
|
{
|
|
|
|
if (EMPTY_LIST(tab->subscribers))
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (tab->base_settle_time)
|
|
|
|
return;
|
|
|
|
|
|
|
|
rt_kick_settle_timer(tab);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
rt_subscribe(rtable *tab, struct rt_subscription *s)
|
|
|
|
{
|
|
|
|
s->tab = tab;
|
|
|
|
rt_lock_table(tab);
|
|
|
|
add_tail(&tab->subscribers, &s->n);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
rt_unsubscribe(struct rt_subscription *s)
|
|
|
|
{
|
|
|
|
rem_node(&s->n);
|
|
|
|
rt_unlock_table(s->tab);
|
|
|
|
}
|
|
|
|
|
2021-12-20 19:25:35 +00:00
|
|
|
static struct rt_flowspec_link *
|
|
|
|
rt_flowspec_find_link(rtable *src, rtable *dst)
|
|
|
|
{
|
|
|
|
struct rt_flowspec_link *ln;
|
|
|
|
WALK_LIST(ln, src->flowspec_links)
|
|
|
|
if ((ln->src == src) && (ln->dst == dst))
|
|
|
|
return ln;
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
rt_flowspec_link(rtable *src, rtable *dst)
|
|
|
|
{
|
|
|
|
ASSERT(rt_is_ip(src));
|
|
|
|
ASSERT(rt_is_flow(dst));
|
|
|
|
|
|
|
|
struct rt_flowspec_link *ln = rt_flowspec_find_link(src, dst);
|
|
|
|
|
|
|
|
if (!ln)
|
|
|
|
{
|
|
|
|
rt_lock_table(src);
|
|
|
|
rt_lock_table(dst);
|
|
|
|
|
|
|
|
ln = mb_allocz(src->rp, sizeof(struct rt_flowspec_link));
|
|
|
|
ln->src = src;
|
|
|
|
ln->dst = dst;
|
|
|
|
add_tail(&src->flowspec_links, &ln->n);
|
|
|
|
}
|
|
|
|
|
|
|
|
ln->uc++;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
rt_flowspec_unlink(rtable *src, rtable *dst)
|
|
|
|
{
|
|
|
|
struct rt_flowspec_link *ln = rt_flowspec_find_link(src, dst);
|
|
|
|
|
|
|
|
ASSERT(ln && (ln->uc > 0));
|
|
|
|
|
|
|
|
ln->uc--;
|
|
|
|
|
|
|
|
if (!ln->uc)
|
|
|
|
{
|
|
|
|
rem_node(&ln->n);
|
|
|
|
mb_free(ln);
|
|
|
|
|
|
|
|
rt_unlock_table(src);
|
|
|
|
rt_unlock_table(dst);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
rt_flowspec_notify(rtable *src, net *net)
|
|
|
|
{
|
|
|
|
/* Only IP tables are src links */
|
|
|
|
ASSERT(rt_is_ip(src));
|
|
|
|
|
|
|
|
struct rt_flowspec_link *ln;
|
|
|
|
WALK_LIST(ln, src->flowspec_links)
|
|
|
|
{
|
|
|
|
rtable *dst = ln->dst;
|
|
|
|
ASSERT(rt_is_flow(dst));
|
|
|
|
|
|
|
|
/* No need to inspect it further if recalculation is already active */
|
|
|
|
if ((dst->nhu_state == NHU_SCHEDULED) || (dst->nhu_state == NHU_DIRTY))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (trie_match_net(dst->flowspec_trie, net->n.addr))
|
|
|
|
rt_schedule_nhu(dst);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
rt_flowspec_reset_trie(rtable *tab)
|
|
|
|
{
|
|
|
|
linpool *lp = tab->flowspec_trie->lp;
|
|
|
|
int ipv4 = tab->flowspec_trie->ipv4;
|
|
|
|
|
|
|
|
lp_flush(lp);
|
|
|
|
tab->flowspec_trie = f_new_trie(lp, 0);
|
|
|
|
tab->flowspec_trie->ipv4 = ipv4;
|
|
|
|
}
|
|
|
|
|
2021-03-30 16:51:31 +00:00
|
|
|
static void
|
|
|
|
rt_free(resource *_r)
|
|
|
|
{
|
|
|
|
rtable *r = (rtable *) _r;
|
|
|
|
|
|
|
|
DBG("Deleting routing table %s\n", r->name);
|
|
|
|
ASSERT_DIE(r->use_count == 0);
|
|
|
|
|
2021-04-19 13:13:20 +00:00
|
|
|
if (r->internal)
|
|
|
|
return;
|
|
|
|
|
2021-03-30 16:51:31 +00:00
|
|
|
r->config->table = NULL;
|
|
|
|
rem_node(&r->n);
|
|
|
|
|
|
|
|
if (r->hostcache)
|
|
|
|
rt_free_hostcache(r);
|
|
|
|
|
|
|
|
/* Freed automagically by the resource pool
|
|
|
|
fib_free(&r->fib);
|
|
|
|
hmap_free(&r->id_map);
|
|
|
|
rfree(r->rt_event);
|
|
|
|
rfree(r->settle_timer);
|
|
|
|
mb_free(r);
|
|
|
|
*/
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
rt_res_dump(resource *_r)
|
|
|
|
{
|
|
|
|
rtable *r = (rtable *) _r;
|
|
|
|
debug("name \"%s\", addr_type=%s, rt_count=%u, use_count=%d\n",
|
|
|
|
r->name, net_label[r->addr_type], r->rt_count, r->use_count);
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct resclass rt_class = {
|
|
|
|
.name = "Routing table",
|
|
|
|
.size = sizeof(struct rtable),
|
|
|
|
.free = rt_free,
|
|
|
|
.dump = rt_res_dump,
|
|
|
|
.lookup = NULL,
|
|
|
|
.memsize = NULL,
|
|
|
|
};
|
|
|
|
|
|
|
|
rtable *
|
|
|
|
rt_setup(pool *pp, struct rtable_config *cf)
|
2000-03-04 22:21:06 +00:00
|
|
|
{
|
2022-03-15 10:21:46 +00:00
|
|
|
pool *p = rp_newf(pp, "Routing table %s", cf->name);
|
2021-03-30 16:51:31 +00:00
|
|
|
|
|
|
|
rtable *t = ralloc(p, &rt_class);
|
|
|
|
t->rp = p;
|
|
|
|
|
2018-02-06 15:08:45 +00:00
|
|
|
t->name = cf->name;
|
2000-03-04 22:21:06 +00:00
|
|
|
t->config = cf;
|
2018-02-06 15:08:45 +00:00
|
|
|
t->addr_type = cf->addr_type;
|
2021-03-30 16:51:31 +00:00
|
|
|
|
2015-11-05 11:48:52 +00:00
|
|
|
fib_init(&t->fib, p, t->addr_type, sizeof(net), OFFSETOF(net, n), 0, NULL);
|
2016-01-26 10:48:58 +00:00
|
|
|
|
2021-11-29 18:23:42 +00:00
|
|
|
if (cf->trie_used)
|
|
|
|
{
|
|
|
|
t->trie = f_new_trie(lp_new_default(p), 0);
|
|
|
|
t->trie->ipv4 = net_val_match(t->addr_type, NB_IP4 | NB_VPN4 | NB_ROA4);
|
|
|
|
|
|
|
|
t->fib.init = net_init_with_trie;
|
|
|
|
}
|
|
|
|
|
2021-12-20 19:25:35 +00:00
|
|
|
init_list(&t->channels);
|
|
|
|
init_list(&t->flowspec_links);
|
|
|
|
init_list(&t->subscribers);
|
|
|
|
|
2021-04-19 13:13:20 +00:00
|
|
|
if (!(t->internal = cf->internal))
|
2021-03-30 16:51:31 +00:00
|
|
|
{
|
|
|
|
hmap_init(&t->id_map, p, 1024);
|
|
|
|
hmap_set(&t->id_map, 0);
|
|
|
|
|
|
|
|
t->rt_event = ev_new_init(p, rt_event, t);
|
|
|
|
t->last_rt_change = t->gc_time = current_time();
|
2021-12-20 19:25:35 +00:00
|
|
|
|
|
|
|
if (rt_is_flow(t))
|
|
|
|
{
|
|
|
|
t->flowspec_trie = f_new_trie(lp_new_default(p), 0);
|
|
|
|
t->flowspec_trie->ipv4 = (t->addr_type == NET_FLOW4);
|
|
|
|
}
|
2021-03-30 16:51:31 +00:00
|
|
|
}
|
2021-02-10 02:09:57 +00:00
|
|
|
|
2021-03-30 16:51:31 +00:00
|
|
|
return t;
|
2000-03-04 22:21:06 +00:00
|
|
|
}
|
|
|
|
|
2000-06-01 17:12:19 +00:00
|
|
|
/**
|
|
|
|
* rt_init - initialize routing tables
|
|
|
|
*
|
|
|
|
* This function is called during BIRD startup. It initializes the
|
|
|
|
* routing table module.
|
|
|
|
*/
|
1998-05-20 11:54:33 +00:00
|
|
|
void
|
|
|
|
rt_init(void)
|
|
|
|
{
|
|
|
|
rta_init();
|
1999-02-13 21:29:01 +00:00
|
|
|
rt_table_pool = rp_new(&root_pool, "Routing tables");
|
2017-05-16 12:31:16 +00:00
|
|
|
rte_update_pool = lp_new_default(rt_table_pool);
|
1999-02-13 21:29:01 +00:00
|
|
|
rte_slab = sl_new(rt_table_pool, sizeof(rte));
|
1999-05-17 20:14:52 +00:00
|
|
|
init_list(&routing_tables);
|
1998-05-20 11:54:33 +00:00
|
|
|
}
|
1999-02-13 19:15:28 +00:00
|
|
|
|
2012-03-28 16:40:04 +00:00
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
/**
|
|
|
|
* rt_prune_table - prune a routing table
|
|
|
|
*
|
|
|
|
* The prune loop scans routing tables and removes routes belonging to flushing
|
|
|
|
* protocols, discarded routes and also stale network entries. It is called from
|
|
|
|
* rt_event(). The event is rescheduled if the current iteration do not finish
|
|
|
|
* the table. The pruning is directed by the prune state (@prune_state),
|
|
|
|
* specifying whether the prune cycle is scheduled or running, and there
|
|
|
|
* is also a persistent pruning iterator (@prune_fit).
|
|
|
|
*
|
|
|
|
* The prune loop is used also for channel flushing. For this purpose, the
|
|
|
|
* channels to flush are marked before the iteration and notified after the
|
|
|
|
* iteration.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
rt_prune_table(rtable *tab)
|
2012-03-28 16:40:04 +00:00
|
|
|
{
|
|
|
|
struct fib_iterator *fit = &tab->prune_fit;
|
2016-01-26 10:48:58 +00:00
|
|
|
int limit = 512;
|
|
|
|
|
|
|
|
struct channel *c;
|
|
|
|
node *n, *x;
|
1999-02-13 19:15:28 +00:00
|
|
|
|
|
|
|
DBG("Pruning route table %s\n", tab->name);
|
2000-05-08 22:33:02 +00:00
|
|
|
#ifdef DEBUGGING
|
|
|
|
fib_check(&tab->fib);
|
|
|
|
#endif
|
2012-03-28 16:40:04 +00:00
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
if (tab->prune_state == 0)
|
|
|
|
return;
|
2012-03-28 16:40:04 +00:00
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
if (tab->prune_state == 1)
|
|
|
|
{
|
|
|
|
/* Mark channels to flush */
|
|
|
|
WALK_LIST2(c, n, tab->channels, table_node)
|
|
|
|
if (c->channel_state == CS_FLUSHING)
|
|
|
|
c->flush_active = 1;
|
|
|
|
|
|
|
|
FIB_ITERATE_INIT(fit, &tab->fib);
|
|
|
|
tab->prune_state = 2;
|
2022-02-03 05:08:51 +00:00
|
|
|
|
|
|
|
if (tab->prune_trie)
|
|
|
|
{
|
|
|
|
/* Init prefix trie pruning */
|
|
|
|
tab->trie_new = f_new_trie(lp_new_default(tab->rp), 0);
|
|
|
|
tab->trie_new->ipv4 = tab->trie->ipv4;
|
|
|
|
}
|
2016-01-26 10:48:58 +00:00
|
|
|
}
|
2012-03-28 16:40:04 +00:00
|
|
|
|
1999-04-12 18:01:07 +00:00
|
|
|
again:
|
2015-12-21 19:16:05 +00:00
|
|
|
FIB_ITERATE_START(&tab->fib, fit, net, n)
|
1999-02-13 19:15:28 +00:00
|
|
|
{
|
1999-04-12 18:01:07 +00:00
|
|
|
rte *e;
|
2012-03-28 16:40:04 +00:00
|
|
|
|
1999-04-12 18:01:07 +00:00
|
|
|
rescan:
|
2022-02-03 05:08:51 +00:00
|
|
|
if (limit <= 0)
|
|
|
|
{
|
|
|
|
FIB_ITERATE_PUT(fit);
|
|
|
|
ev_schedule(tab->rt_event);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-03-28 16:40:04 +00:00
|
|
|
for (e=n->routes; e; e=e->next)
|
2018-07-31 16:40:38 +00:00
|
|
|
{
|
2016-01-26 10:48:58 +00:00
|
|
|
if (e->sender->flush_active || (e->flags & REF_DISCARD))
|
1999-04-12 18:01:07 +00:00
|
|
|
{
|
2016-10-14 13:37:04 +00:00
|
|
|
rte_discard(e);
|
2016-01-26 10:48:58 +00:00
|
|
|
limit--;
|
2012-03-28 16:40:04 +00:00
|
|
|
|
1999-04-12 18:01:07 +00:00
|
|
|
goto rescan;
|
|
|
|
}
|
2016-01-26 10:48:58 +00:00
|
|
|
|
2018-07-31 16:40:38 +00:00
|
|
|
if (e->flags & REF_MODIFY)
|
|
|
|
{
|
|
|
|
rte_modify(e);
|
|
|
|
limit--;
|
|
|
|
|
|
|
|
goto rescan;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-03-28 16:40:04 +00:00
|
|
|
if (!n->routes) /* Orphaned FIB entry */
|
1999-02-13 19:15:28 +00:00
|
|
|
{
|
2015-12-21 19:16:05 +00:00
|
|
|
FIB_ITERATE_PUT(fit);
|
|
|
|
fib_delete(&tab->fib, n);
|
1999-04-12 18:01:07 +00:00
|
|
|
goto again;
|
1999-02-13 19:15:28 +00:00
|
|
|
}
|
2022-02-03 05:08:51 +00:00
|
|
|
|
|
|
|
if (tab->trie_new)
|
|
|
|
{
|
|
|
|
trie_add_prefix(tab->trie_new, n->n.addr, n->n.addr->pxlen, n->n.addr->pxlen);
|
|
|
|
limit--;
|
|
|
|
}
|
1999-02-13 19:15:28 +00:00
|
|
|
}
|
2015-12-21 19:16:05 +00:00
|
|
|
FIB_ITERATE_END;
|
2012-03-28 16:40:04 +00:00
|
|
|
|
2000-05-08 22:33:02 +00:00
|
|
|
#ifdef DEBUGGING
|
|
|
|
fib_check(&tab->fib);
|
|
|
|
#endif
|
2012-03-28 16:40:04 +00:00
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
tab->gc_counter = 0;
|
2017-06-06 14:47:30 +00:00
|
|
|
tab->gc_time = current_time();
|
1999-05-17 20:14:52 +00:00
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
/* state change 2->0, 3->1 */
|
|
|
|
tab->prune_state &= 1;
|
2014-03-20 13:07:12 +00:00
|
|
|
|
2022-02-03 05:08:51 +00:00
|
|
|
if (tab->trie_new)
|
|
|
|
{
|
|
|
|
/* Finish prefix trie pruning */
|
2022-02-04 04:34:02 +00:00
|
|
|
|
|
|
|
if (!tab->trie_lock_count)
|
|
|
|
{
|
|
|
|
rfree(tab->trie->lp);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
ASSERT(!tab->trie_old);
|
|
|
|
tab->trie_old = tab->trie;
|
|
|
|
tab->trie_old_lock_count = tab->trie_lock_count;
|
|
|
|
tab->trie_lock_count = 0;
|
|
|
|
}
|
|
|
|
|
2022-02-03 05:08:51 +00:00
|
|
|
tab->trie = tab->trie_new;
|
|
|
|
tab->trie_new = NULL;
|
|
|
|
tab->prune_trie = 0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Schedule prefix trie pruning */
|
2022-02-04 04:34:02 +00:00
|
|
|
if (tab->trie && !tab->trie_old && (tab->trie->prefix_count > (2 * tab->fib.entries)))
|
2022-02-03 05:08:51 +00:00
|
|
|
{
|
|
|
|
/* state change 0->1, 2->3 */
|
|
|
|
tab->prune_state |= 1;
|
|
|
|
tab->prune_trie = 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
if (tab->prune_state > 0)
|
|
|
|
ev_schedule(tab->rt_event);
|
1999-05-17 20:14:52 +00:00
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
/* FIXME: This should be handled in a better way */
|
|
|
|
rt_prune_sources();
|
2012-03-28 16:40:04 +00:00
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
/* Close flushed channels */
|
|
|
|
WALK_LIST2_DELSAFE(c, n, x, tab->channels, table_node)
|
|
|
|
if (c->flush_active)
|
|
|
|
{
|
|
|
|
c->flush_active = 0;
|
2016-05-12 14:04:47 +00:00
|
|
|
channel_set_state(c, CS_DOWN);
|
2016-01-26 10:48:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return;
|
1999-05-17 20:14:52 +00:00
|
|
|
}
|
|
|
|
|
2022-02-04 04:34:02 +00:00
|
|
|
/**
|
|
|
|
* rt_lock_trie - lock a prefix trie of a routing table
|
|
|
|
* @tab: routing table with prefix trie to be locked
|
|
|
|
*
|
|
|
|
* The prune loop may rebuild the prefix trie and invalidate f_trie_walk_state
|
|
|
|
* structures. Therefore, asynchronous walks should lock the prefix trie using
|
|
|
|
* this function. That allows the prune loop to rebuild the trie, but postpones
|
|
|
|
* its freeing until all walks are done (unlocked by rt_unlock_trie()).
|
|
|
|
*
|
|
|
|
* Return a current trie that will be locked, the value should be passed back to
|
|
|
|
* rt_unlock_trie() for unlocking.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
struct f_trie *
|
|
|
|
rt_lock_trie(rtable *tab)
|
|
|
|
{
|
|
|
|
ASSERT(tab->trie);
|
|
|
|
|
|
|
|
tab->trie_lock_count++;
|
|
|
|
return tab->trie;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* rt_unlock_trie - unlock a prefix trie of a routing table
|
|
|
|
* @tab: routing table with prefix trie to be locked
|
|
|
|
* @trie: value returned by matching rt_lock_trie()
|
|
|
|
*
|
|
|
|
* Done for trie locked by rt_lock_trie() after walk over the trie is done.
|
|
|
|
* It may free the trie and schedule next trie pruning.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
rt_unlock_trie(rtable *tab, struct f_trie *trie)
|
|
|
|
{
|
|
|
|
ASSERT(trie);
|
|
|
|
|
|
|
|
if (trie == tab->trie)
|
|
|
|
{
|
|
|
|
/* Unlock the current prefix trie */
|
|
|
|
ASSERT(tab->trie_lock_count);
|
|
|
|
tab->trie_lock_count--;
|
|
|
|
}
|
|
|
|
else if (trie == tab->trie_old)
|
|
|
|
{
|
|
|
|
/* Unlock the old prefix trie */
|
|
|
|
ASSERT(tab->trie_old_lock_count);
|
|
|
|
tab->trie_old_lock_count--;
|
|
|
|
|
|
|
|
/* Free old prefix trie that is no longer needed */
|
|
|
|
if (!tab->trie_old_lock_count)
|
|
|
|
{
|
|
|
|
rfree(tab->trie_old->lp);
|
|
|
|
tab->trie_old = NULL;
|
|
|
|
|
|
|
|
/* Kick prefix trie pruning that was postponed */
|
|
|
|
if (tab->trie && (tab->trie->prefix_count > (2 * tab->fib.entries)))
|
|
|
|
{
|
|
|
|
tab->prune_trie = 1;
|
|
|
|
rt_schedule_prune(tab);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
log(L_BUG "Invalid arg to rt_unlock_trie()");
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-07-05 15:50:19 +00:00
|
|
|
void
|
|
|
|
rt_preconfig(struct config *c)
|
|
|
|
{
|
|
|
|
init_list(&c->tables);
|
2016-01-26 10:48:58 +00:00
|
|
|
|
|
|
|
rt_new_table(cf_get_symbol("master4"), NET_IP4);
|
|
|
|
rt_new_table(cf_get_symbol("master6"), NET_IP6);
|
2010-07-05 15:50:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
/*
|
2010-07-05 15:50:19 +00:00
|
|
|
* Some functions for handing internal next hop updates
|
|
|
|
* triggered by rt_schedule_nhu().
|
|
|
|
*/
|
|
|
|
|
2017-03-22 14:00:07 +00:00
|
|
|
void
|
2017-03-17 14:48:09 +00:00
|
|
|
rta_apply_hostentry(rta *a, struct hostentry *he, mpls_label_stack *mls)
|
2010-07-05 15:50:19 +00:00
|
|
|
{
|
|
|
|
a->hostentry = he;
|
|
|
|
a->dest = he->dest;
|
2010-07-30 23:04:32 +00:00
|
|
|
a->igp_metric = he->igp_metric;
|
2016-08-09 12:47:51 +00:00
|
|
|
|
2017-03-17 14:48:09 +00:00
|
|
|
if (a->dest != RTD_UNICAST)
|
2016-08-09 12:47:51 +00:00
|
|
|
{
|
2017-03-17 14:48:09 +00:00
|
|
|
/* No nexthop */
|
|
|
|
no_nexthop:
|
|
|
|
a->nh = (struct nexthop) {};
|
|
|
|
if (mls)
|
|
|
|
{ /* Store the label stack for later changes */
|
|
|
|
a->nh.labels_orig = a->nh.labels = mls->len;
|
|
|
|
memcpy(a->nh.label, mls->stack, mls->len * sizeof(u32));
|
|
|
|
}
|
2016-08-09 12:47:51 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2017-03-17 14:48:09 +00:00
|
|
|
if (((!mls) || (!mls->len)) && he->nexthop_linkable)
|
|
|
|
{ /* Just link the nexthop chain, no label append happens. */
|
|
|
|
memcpy(&(a->nh), &(he->src->nh), nexthop_size(&(he->src->nh)));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct nexthop *nhp = NULL, *nhr = NULL;
|
|
|
|
int skip_nexthop = 0;
|
2017-03-22 14:00:07 +00:00
|
|
|
|
2017-03-17 14:48:09 +00:00
|
|
|
for (struct nexthop *nh = &(he->src->nh); nh; nh = nh->next)
|
2016-08-09 12:47:51 +00:00
|
|
|
{
|
2017-03-17 14:48:09 +00:00
|
|
|
if (skip_nexthop)
|
|
|
|
skip_nexthop--;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
nhr = nhp;
|
2019-10-10 12:01:16 +00:00
|
|
|
nhp = (nhp ? (nhp->next = lp_alloc(rte_update_pool, NEXTHOP_MAX_SIZE)) : &(a->nh));
|
2017-03-17 14:48:09 +00:00
|
|
|
}
|
2017-02-24 13:05:11 +00:00
|
|
|
|
2019-10-10 12:01:16 +00:00
|
|
|
memset(nhp, 0, NEXTHOP_MAX_SIZE);
|
2017-03-17 14:48:09 +00:00
|
|
|
nhp->iface = nh->iface;
|
|
|
|
nhp->weight = nh->weight;
|
2019-10-10 13:25:36 +00:00
|
|
|
|
2017-03-17 14:48:09 +00:00
|
|
|
if (mls)
|
2016-08-09 12:47:51 +00:00
|
|
|
{
|
2017-03-17 14:48:09 +00:00
|
|
|
nhp->labels = nh->labels + mls->len;
|
|
|
|
nhp->labels_orig = mls->len;
|
2017-02-24 13:05:11 +00:00
|
|
|
if (nhp->labels <= MPLS_MAX_LABEL_STACK)
|
|
|
|
{
|
|
|
|
memcpy(nhp->label, nh->label, nh->labels * sizeof(u32)); /* First the hostentry labels */
|
2017-03-17 14:48:09 +00:00
|
|
|
memcpy(&(nhp->label[nh->labels]), mls->stack, mls->len * sizeof(u32)); /* Then the bottom labels */
|
2017-02-24 13:05:11 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
log(L_WARN "Sum of label stack sizes %d + %d = %d exceedes allowed maximum (%d)",
|
2017-03-17 14:48:09 +00:00
|
|
|
nh->labels, mls->len, nhp->labels, MPLS_MAX_LABEL_STACK);
|
|
|
|
skip_nexthop++;
|
2017-02-24 13:05:11 +00:00
|
|
|
continue;
|
|
|
|
}
|
2016-08-09 12:47:51 +00:00
|
|
|
}
|
2019-10-10 13:25:36 +00:00
|
|
|
else if (nh->labels)
|
|
|
|
{
|
|
|
|
nhp->labels = nh->labels;
|
|
|
|
nhp->labels_orig = 0;
|
|
|
|
memcpy(nhp->label, nh->label, nh->labels * sizeof(u32));
|
|
|
|
}
|
|
|
|
|
2017-03-17 14:48:09 +00:00
|
|
|
if (ipa_nonzero(nh->gw))
|
2017-07-04 21:36:21 +00:00
|
|
|
{
|
|
|
|
nhp->gw = nh->gw; /* Router nexthop */
|
|
|
|
nhp->flags |= (nh->flags & RNF_ONLINK);
|
|
|
|
}
|
2019-10-10 13:06:32 +00:00
|
|
|
else if (!(nh->iface->flags & IF_MULTIACCESS) || (nh->iface->flags & IF_LOOPBACK))
|
|
|
|
nhp->gw = IPA_NONE; /* PtP link - no need for nexthop */
|
2017-03-17 14:48:09 +00:00
|
|
|
else if (ipa_nonzero(he->link))
|
|
|
|
nhp->gw = he->link; /* Device nexthop with link-local address known */
|
|
|
|
else
|
|
|
|
nhp->gw = he->addr; /* Device nexthop with link-local address unknown */
|
2016-08-09 12:47:51 +00:00
|
|
|
}
|
2017-02-24 13:05:11 +00:00
|
|
|
|
2017-03-17 14:48:09 +00:00
|
|
|
if (skip_nexthop)
|
|
|
|
if (nhr)
|
|
|
|
nhr->next = NULL;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
a->dest = RTD_UNREACHABLE;
|
|
|
|
log(L_WARN "No valid nexthop remaining, setting route unreachable");
|
|
|
|
goto no_nexthop;
|
|
|
|
}
|
2010-07-05 15:50:19 +00:00
|
|
|
}
|
|
|
|
|
2021-12-20 19:25:35 +00:00
|
|
|
static inline int
|
|
|
|
rta_next_hop_outdated(rta *a)
|
|
|
|
{
|
|
|
|
struct hostentry *he = a->hostentry;
|
|
|
|
|
|
|
|
if (!he)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (!he->src)
|
|
|
|
return a->dest != RTD_UNREACHABLE;
|
|
|
|
|
|
|
|
return (a->dest != he->dest) || (a->igp_metric != he->igp_metric) ||
|
|
|
|
(!he->nexthop_linkable) || !nexthop_same(&(a->nh), &(he->src->nh));
|
|
|
|
}
|
|
|
|
|
2010-07-05 15:50:19 +00:00
|
|
|
static inline rte *
|
2016-10-14 13:37:04 +00:00
|
|
|
rt_next_hop_update_rte(rtable *tab UNUSED, rte *old)
|
2010-07-05 15:50:19 +00:00
|
|
|
{
|
2021-12-20 19:25:35 +00:00
|
|
|
if (!rta_next_hop_outdated(old->attrs))
|
|
|
|
return NULL;
|
|
|
|
|
2017-02-20 01:26:45 +00:00
|
|
|
rta *a = alloca(RTA_MAX_SIZE);
|
|
|
|
memcpy(a, old->attrs, rta_size(old->attrs));
|
2017-03-17 14:48:09 +00:00
|
|
|
|
|
|
|
mpls_label_stack mls = { .len = a->nh.labels_orig };
|
|
|
|
memcpy(mls.stack, &a->nh.label[a->nh.labels - mls.len], mls.len * sizeof(u32));
|
|
|
|
|
|
|
|
rta_apply_hostentry(a, old->attrs->hostentry, &mls);
|
2020-02-10 07:41:05 +00:00
|
|
|
a->cached = 0;
|
2010-07-05 15:50:19 +00:00
|
|
|
|
|
|
|
rte *e = sl_alloc(rte_slab);
|
|
|
|
memcpy(e, old, sizeof(rte));
|
2017-02-20 01:26:45 +00:00
|
|
|
e->attrs = rta_lookup(a);
|
2020-04-10 15:08:29 +00:00
|
|
|
rt_lock_source(e->src);
|
2010-07-05 15:50:19 +00:00
|
|
|
|
|
|
|
return e;
|
|
|
|
}
|
|
|
|
|
2021-12-20 19:25:35 +00:00
|
|
|
|
|
|
|
#ifdef CONFIG_BGP
|
|
|
|
|
|
|
|
static inline int
|
|
|
|
net_flow_has_dst_prefix(const net_addr *n)
|
|
|
|
{
|
|
|
|
ASSUME(net_is_flow(n));
|
|
|
|
|
|
|
|
if (n->pxlen)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
if (n->type == NET_FLOW4)
|
|
|
|
{
|
|
|
|
const net_addr_flow4 *n4 = (void *) n;
|
|
|
|
return (n4->length > sizeof(net_addr_flow4)) && (n4->data[0] == FLOW_TYPE_DST_PREFIX);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
const net_addr_flow6 *n6 = (void *) n;
|
|
|
|
return (n6->length > sizeof(net_addr_flow6)) && (n6->data[0] == FLOW_TYPE_DST_PREFIX);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int
|
|
|
|
rta_as_path_is_empty(rta *a)
|
|
|
|
{
|
2022-03-19 15:23:42 +00:00
|
|
|
eattr *e = ea_find(a->eattrs, "bgp_path");
|
2021-12-20 19:25:35 +00:00
|
|
|
return !e || (as_path_getlen(e->u.ptr) == 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline u32
|
|
|
|
rta_get_first_asn(rta *a)
|
|
|
|
{
|
2022-03-19 15:23:42 +00:00
|
|
|
eattr *e = ea_find(a->eattrs, "bgp_path");
|
2021-12-20 19:25:35 +00:00
|
|
|
u32 asn;
|
|
|
|
|
|
|
|
return (e && as_path_get_first_regular(e->u.ptr, &asn)) ? asn : 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
rt_flowspec_check(rtable *tab_ip, rtable *tab_flow, const net_addr *n, rta *a, int interior)
|
|
|
|
{
|
|
|
|
ASSERT(rt_is_ip(tab_ip));
|
|
|
|
ASSERT(rt_is_flow(tab_flow));
|
|
|
|
ASSERT(tab_ip->trie);
|
|
|
|
|
|
|
|
/* RFC 8955 6. a) Flowspec has defined dst prefix */
|
|
|
|
if (!net_flow_has_dst_prefix(n))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* RFC 9117 4.1. Accept AS_PATH is empty (fr */
|
|
|
|
if (interior && rta_as_path_is_empty(a))
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
|
|
|
|
/* RFC 8955 6. b) Flowspec and its best-match route have the same originator */
|
|
|
|
|
|
|
|
/* Find flowspec dst prefix */
|
|
|
|
net_addr dst;
|
|
|
|
if (n->type == NET_FLOW4)
|
|
|
|
net_fill_ip4(&dst, net4_prefix(n), net4_pxlen(n));
|
|
|
|
else
|
|
|
|
net_fill_ip6(&dst, net6_prefix(n), net6_pxlen(n));
|
|
|
|
|
|
|
|
/* Find best-match BGP unicast route for flowspec dst prefix */
|
|
|
|
net *nb = net_route(tab_ip, &dst);
|
|
|
|
rte *rb = nb ? nb->routes : NULL;
|
|
|
|
|
|
|
|
/* Register prefix to trie for tracking further changes */
|
|
|
|
int max_pxlen = (n->type == NET_FLOW4) ? IP4_MAX_PREFIX_LENGTH : IP6_MAX_PREFIX_LENGTH;
|
|
|
|
trie_add_prefix(tab_flow->flowspec_trie, &dst, (nb ? nb->n.addr->pxlen : 0), max_pxlen);
|
|
|
|
|
|
|
|
/* No best-match BGP route -> no flowspec */
|
|
|
|
if (!rb || (rb->attrs->source != RTS_BGP))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* Find ORIGINATOR_ID values */
|
2022-03-19 15:23:42 +00:00
|
|
|
u32 orig_a = ea_get_int(a->eattrs, "bgp_originator_id", 0);
|
|
|
|
u32 orig_b = ea_get_int(rb->attrs->eattrs, "bgp_originator_id", 0);
|
2021-12-20 19:25:35 +00:00
|
|
|
|
|
|
|
/* Originator is either ORIGINATOR_ID (if present), or BGP neighbor address (if not) */
|
|
|
|
if ((orig_a != orig_b) || (!orig_a && !orig_b && !ipa_equal(a->from, rb->attrs->from)))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
|
|
|
|
/* Find ASN of the best-match route, for use in next checks */
|
|
|
|
u32 asn_b = rta_get_first_asn(rb->attrs);
|
|
|
|
if (!asn_b)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* RFC 9117 4.2. For EBGP, flowspec and its best-match route are from the same AS */
|
|
|
|
if (!interior && (rta_get_first_asn(a) != asn_b))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* RFC 8955 6. c) More-specific routes are from the same AS as the best-match route */
|
|
|
|
TRIE_WALK(tab_ip->trie, subnet, &dst)
|
|
|
|
{
|
|
|
|
net *nc = net_find_valid(tab_ip, &subnet);
|
|
|
|
if (!nc)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
rte *rc = nc->routes;
|
|
|
|
if (rc->attrs->source != RTS_BGP)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (rta_get_first_asn(rc->attrs) != asn_b)
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
TRIE_WALK_END;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* CONFIG_BGP */
|
|
|
|
|
|
|
|
static rte *
|
|
|
|
rt_flowspec_update_rte(rtable *tab, rte *r)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_BGP
|
2022-02-11 21:29:13 +00:00
|
|
|
if (r->attrs->source != RTS_BGP)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
struct bgp_channel *bc = (struct bgp_channel *) r->sender;
|
|
|
|
if (!bc->base_table)
|
2021-12-20 19:25:35 +00:00
|
|
|
return NULL;
|
|
|
|
|
|
|
|
const net_addr *n = r->net->n.addr;
|
2022-03-09 09:56:06 +00:00
|
|
|
struct bgp_proto *p = (void *) r->src->proto;
|
2022-02-11 21:29:13 +00:00
|
|
|
int valid = rt_flowspec_check(bc->base_table, tab, n, r->attrs, p->is_interior);
|
2021-12-20 19:25:35 +00:00
|
|
|
int dest = valid ? RTD_NONE : RTD_UNREACHABLE;
|
|
|
|
|
|
|
|
if (dest == r->attrs->dest)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
rta *a = alloca(RTA_MAX_SIZE);
|
|
|
|
memcpy(a, r->attrs, rta_size(r->attrs));
|
|
|
|
a->dest = dest;
|
2022-03-09 09:56:06 +00:00
|
|
|
a->cached = 0;
|
2021-12-20 19:25:35 +00:00
|
|
|
|
|
|
|
rte *new = sl_alloc(rte_slab);
|
|
|
|
memcpy(new, r, sizeof(rte));
|
|
|
|
new->attrs = rta_lookup(a);
|
|
|
|
|
|
|
|
return new;
|
|
|
|
#else
|
|
|
|
return NULL;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-07-05 15:50:19 +00:00
|
|
|
static inline int
|
|
|
|
rt_next_hop_update_net(rtable *tab, net *n)
|
|
|
|
{
|
|
|
|
rte **k, *e, *new, *old_best, **new_best;
|
|
|
|
int count = 0;
|
|
|
|
int free_old_best = 0;
|
|
|
|
|
|
|
|
old_best = n->routes;
|
|
|
|
if (!old_best)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
for (k = &n->routes; e = *k; k = &e->next)
|
2021-12-20 19:25:35 +00:00
|
|
|
{
|
|
|
|
if (!net_is_flow(n->n.addr))
|
|
|
|
new = rt_next_hop_update_rte(tab, e);
|
|
|
|
else
|
|
|
|
new = rt_flowspec_update_rte(tab, e);
|
|
|
|
|
|
|
|
if (new)
|
2011-12-22 12:20:29 +00:00
|
|
|
{
|
|
|
|
*k = new;
|
2010-07-05 15:50:19 +00:00
|
|
|
|
2020-12-07 21:19:40 +00:00
|
|
|
rte_trace_in(D_ROUTES, new->sender, new, "updated");
|
2019-09-09 00:55:32 +00:00
|
|
|
rte_announce_i(tab, RA_ANY, n, new, e, NULL, NULL);
|
2010-07-05 15:50:19 +00:00
|
|
|
|
2011-12-22 12:20:29 +00:00
|
|
|
/* Call a pre-comparison hook */
|
|
|
|
/* Not really an efficient way to compute this */
|
2020-04-10 15:08:29 +00:00
|
|
|
if (e->src->proto->rte_recalculate)
|
|
|
|
e->src->proto->rte_recalculate(tab, n, new, e, NULL);
|
2010-07-05 15:50:19 +00:00
|
|
|
|
2011-12-22 12:20:29 +00:00
|
|
|
if (e != old_best)
|
|
|
|
rte_free_quick(e);
|
|
|
|
else /* Freeing of the old best rte is postponed */
|
|
|
|
free_old_best = 1;
|
2010-07-05 15:50:19 +00:00
|
|
|
|
2011-12-22 12:20:29 +00:00
|
|
|
e = new;
|
|
|
|
count++;
|
|
|
|
}
|
2021-12-20 19:25:35 +00:00
|
|
|
}
|
2011-12-22 12:20:29 +00:00
|
|
|
|
|
|
|
if (!count)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* Find the new best route */
|
|
|
|
new_best = NULL;
|
|
|
|
for (k = &n->routes; e = *k; k = &e->next)
|
|
|
|
{
|
2010-07-05 15:50:19 +00:00
|
|
|
if (!new_best || rte_better(e, *new_best))
|
|
|
|
new_best = k;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Relink the new best route to the first position */
|
|
|
|
new = *new_best;
|
|
|
|
if (new != n->routes)
|
|
|
|
{
|
|
|
|
*new_best = new->next;
|
|
|
|
new->next = n->routes;
|
|
|
|
n->routes = new;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Announce the new best route */
|
|
|
|
if (new != old_best)
|
2020-12-07 21:19:40 +00:00
|
|
|
rte_trace_in(D_ROUTES, new->sender, new, "updated [best]");
|
2010-07-05 15:50:19 +00:00
|
|
|
|
2019-09-09 00:55:32 +00:00
|
|
|
/* Propagate changes */
|
|
|
|
rte_announce_i(tab, RA_UNDEF, n, NULL, NULL, n->routes, old_best);
|
2015-06-08 00:20:43 +00:00
|
|
|
|
2016-08-16 11:02:32 +00:00
|
|
|
if (free_old_best)
|
2010-07-05 15:50:19 +00:00
|
|
|
rte_free_quick(old_best);
|
|
|
|
|
|
|
|
return count;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
rt_next_hop_update(rtable *tab)
|
|
|
|
{
|
|
|
|
struct fib_iterator *fit = &tab->nhu_fit;
|
|
|
|
int max_feed = 32;
|
|
|
|
|
2017-02-22 13:02:03 +00:00
|
|
|
if (tab->nhu_state == NHU_CLEAN)
|
2010-07-05 15:50:19 +00:00
|
|
|
return;
|
|
|
|
|
2017-02-22 13:02:03 +00:00
|
|
|
if (tab->nhu_state == NHU_SCHEDULED)
|
2010-07-05 15:50:19 +00:00
|
|
|
{
|
|
|
|
FIB_ITERATE_INIT(fit, &tab->fib);
|
2017-02-22 13:02:03 +00:00
|
|
|
tab->nhu_state = NHU_RUNNING;
|
2021-12-20 19:25:35 +00:00
|
|
|
|
|
|
|
if (tab->flowspec_trie)
|
|
|
|
rt_flowspec_reset_trie(tab);
|
2010-07-05 15:50:19 +00:00
|
|
|
}
|
|
|
|
|
2015-12-21 19:16:05 +00:00
|
|
|
FIB_ITERATE_START(&tab->fib, fit, net, n)
|
2010-07-05 15:50:19 +00:00
|
|
|
{
|
|
|
|
if (max_feed <= 0)
|
|
|
|
{
|
2015-12-21 19:16:05 +00:00
|
|
|
FIB_ITERATE_PUT(fit);
|
2010-07-05 15:50:19 +00:00
|
|
|
ev_schedule(tab->rt_event);
|
|
|
|
return;
|
|
|
|
}
|
2015-12-21 19:16:05 +00:00
|
|
|
max_feed -= rt_next_hop_update_net(tab, n);
|
2010-07-05 15:50:19 +00:00
|
|
|
}
|
2015-12-21 19:16:05 +00:00
|
|
|
FIB_ITERATE_END;
|
2010-07-05 15:50:19 +00:00
|
|
|
|
2017-02-22 13:02:03 +00:00
|
|
|
/* State change:
|
|
|
|
* NHU_DIRTY -> NHU_SCHEDULED
|
|
|
|
* NHU_RUNNING -> NHU_CLEAN
|
|
|
|
*/
|
2010-07-05 15:50:19 +00:00
|
|
|
tab->nhu_state &= 1;
|
|
|
|
|
2017-02-22 13:02:03 +00:00
|
|
|
if (tab->nhu_state != NHU_CLEAN)
|
2010-07-05 15:50:19 +00:00
|
|
|
ev_schedule(tab->rt_event);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2000-03-04 22:21:06 +00:00
|
|
|
struct rtable_config *
|
2015-11-05 11:48:52 +00:00
|
|
|
rt_new_table(struct symbol *s, uint addr_type)
|
2000-03-04 22:21:06 +00:00
|
|
|
{
|
2012-07-20 17:56:57 +00:00
|
|
|
/* Hack that allows to 'redefine' the master table */
|
2016-01-26 10:48:58 +00:00
|
|
|
if ((s->class == SYM_TABLE) &&
|
2019-02-15 12:53:17 +00:00
|
|
|
(s->table == new_config->def_tables[addr_type]) &&
|
2016-01-26 10:48:58 +00:00
|
|
|
((addr_type == NET_IP4) || (addr_type == NET_IP6)))
|
2019-02-15 12:53:17 +00:00
|
|
|
return s->table;
|
2012-07-20 17:56:57 +00:00
|
|
|
|
2000-03-04 22:21:06 +00:00
|
|
|
struct rtable_config *c = cfg_allocz(sizeof(struct rtable_config));
|
|
|
|
|
2019-02-15 12:53:17 +00:00
|
|
|
cf_define_symbol(s, SYM_TABLE, table, c);
|
2000-03-04 22:21:06 +00:00
|
|
|
c->name = s->name;
|
2015-11-05 11:48:52 +00:00
|
|
|
c->addr_type = addr_type;
|
2000-05-19 19:49:33 +00:00
|
|
|
c->gc_max_ops = 1000;
|
2000-03-04 22:21:06 +00:00
|
|
|
c->gc_min_time = 5;
|
2021-02-10 02:09:57 +00:00
|
|
|
c->min_settle_time = 1 S;
|
|
|
|
c->max_settle_time = 20 S;
|
2016-01-26 10:48:58 +00:00
|
|
|
|
|
|
|
add_tail(&new_config->tables, &c->n);
|
|
|
|
|
|
|
|
/* First table of each type is kept as default */
|
|
|
|
if (! new_config->def_tables[addr_type])
|
|
|
|
new_config->def_tables[addr_type] = c;
|
|
|
|
|
2000-03-04 22:21:06 +00:00
|
|
|
return c;
|
|
|
|
}
|
|
|
|
|
2000-06-01 17:12:19 +00:00
|
|
|
/**
|
|
|
|
* rt_lock_table - lock a routing table
|
|
|
|
* @r: routing table to be locked
|
|
|
|
*
|
|
|
|
* Lock a routing table, because it's in use by a protocol,
|
|
|
|
* preventing it from being freed when it gets undefined in a new
|
|
|
|
* configuration.
|
|
|
|
*/
|
1999-05-17 20:14:52 +00:00
|
|
|
void
|
2000-01-16 16:44:50 +00:00
|
|
|
rt_lock_table(rtable *r)
|
1999-05-17 20:14:52 +00:00
|
|
|
{
|
2000-01-16 16:44:50 +00:00
|
|
|
r->use_count++;
|
|
|
|
}
|
|
|
|
|
2000-06-01 17:12:19 +00:00
|
|
|
/**
|
|
|
|
* rt_unlock_table - unlock a routing table
|
|
|
|
* @r: routing table to be unlocked
|
|
|
|
*
|
|
|
|
* Unlock a routing table formerly locked by rt_lock_table(),
|
|
|
|
* that is decrease its use count and delete it if it's scheduled
|
|
|
|
* for deletion by configuration changes.
|
|
|
|
*/
|
2000-01-16 16:44:50 +00:00
|
|
|
void
|
|
|
|
rt_unlock_table(rtable *r)
|
|
|
|
{
|
|
|
|
if (!--r->use_count && r->deleted)
|
|
|
|
{
|
|
|
|
struct config *conf = r->deleted;
|
2021-03-30 16:51:31 +00:00
|
|
|
|
|
|
|
/* Delete the routing table by freeing its pool */
|
|
|
|
rt_shutdown(r);
|
2000-01-16 16:44:50 +00:00
|
|
|
config_del_obstacle(conf);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-12-22 03:32:26 +00:00
|
|
|
static int
|
|
|
|
rt_reconfigure(rtable *tab, struct rtable_config *new, struct rtable_config *old)
|
|
|
|
{
|
|
|
|
if ((new->addr_type != old->addr_type) ||
|
|
|
|
(new->sorted != old->sorted) ||
|
|
|
|
(new->trie_used != old->trie_used))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
DBG("\t%s: same\n", new->name);
|
|
|
|
new->table = tab;
|
|
|
|
tab->name = new->name;
|
|
|
|
tab->config = new;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2018-03-18 12:48:47 +00:00
|
|
|
static struct rtable_config *
|
|
|
|
rt_find_table_config(struct config *cf, char *name)
|
|
|
|
{
|
|
|
|
struct symbol *sym = cf_find_symbol(cf, name);
|
2019-02-15 12:53:17 +00:00
|
|
|
return (sym && (sym->class == SYM_TABLE)) ? sym->table : NULL;
|
2018-03-18 12:48:47 +00:00
|
|
|
}
|
|
|
|
|
2000-06-01 17:12:19 +00:00
|
|
|
/**
|
|
|
|
* rt_commit - commit new routing table configuration
|
|
|
|
* @new: new configuration
|
|
|
|
* @old: original configuration or %NULL if it's boot time config
|
|
|
|
*
|
|
|
|
* Scan differences between @old and @new configuration and modify
|
|
|
|
* the routing tables according to these changes. If @new defines a
|
|
|
|
* previously unknown table, create it, if it omits a table existing
|
|
|
|
* in @old, schedule it for deletion (it gets deleted when all protocols
|
|
|
|
* disconnect from it by calling rt_unlock_table()), if it exists
|
|
|
|
* in both configurations, leave it unchanged.
|
|
|
|
*/
|
2000-01-16 16:44:50 +00:00
|
|
|
void
|
|
|
|
rt_commit(struct config *new, struct config *old)
|
|
|
|
{
|
|
|
|
struct rtable_config *o, *r;
|
1999-05-17 20:14:52 +00:00
|
|
|
|
2000-01-16 16:44:50 +00:00
|
|
|
DBG("rt_commit:\n");
|
|
|
|
if (old)
|
1999-05-17 20:14:52 +00:00
|
|
|
{
|
2000-01-16 16:44:50 +00:00
|
|
|
WALK_LIST(o, old->tables)
|
|
|
|
{
|
2021-12-22 03:32:26 +00:00
|
|
|
rtable *tab = o->table;
|
|
|
|
if (tab->deleted)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
r = rt_find_table_config(new, o->name);
|
|
|
|
if (r && !new->shutdown && rt_reconfigure(tab, r, o))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
DBG("\t%s: deleted\n", o->name);
|
|
|
|
tab->deleted = old;
|
|
|
|
config_add_obstacle(old);
|
|
|
|
rt_lock_table(tab);
|
|
|
|
rt_unlock_table(tab);
|
2000-01-16 16:44:50 +00:00
|
|
|
}
|
1999-05-17 20:14:52 +00:00
|
|
|
}
|
2000-01-16 16:44:50 +00:00
|
|
|
|
|
|
|
WALK_LIST(r, new->tables)
|
|
|
|
if (!r->table)
|
|
|
|
{
|
2021-03-30 16:51:31 +00:00
|
|
|
r->table = rt_setup(rt_table_pool, r);
|
2000-01-16 16:44:50 +00:00
|
|
|
DBG("\t%s: created\n", r->name);
|
2021-03-30 16:51:31 +00:00
|
|
|
add_tail(&routing_tables, &r->table->n);
|
2000-01-16 16:44:50 +00:00
|
|
|
}
|
|
|
|
DBG("\tdone\n");
|
1999-05-17 20:14:52 +00:00
|
|
|
}
|
1999-12-01 15:10:21 +00:00
|
|
|
|
2009-05-31 13:24:27 +00:00
|
|
|
static inline void
|
2016-01-26 10:48:58 +00:00
|
|
|
do_feed_channel(struct channel *c, net *n, rte *e)
|
2009-05-31 13:24:27 +00:00
|
|
|
{
|
|
|
|
rte_update_lock();
|
2016-01-26 10:48:58 +00:00
|
|
|
if (c->ra_mode == RA_ACCEPTED)
|
2019-09-09 00:55:32 +00:00
|
|
|
rt_notify_accepted(c, n, NULL, NULL, c->refeeding);
|
2016-01-26 10:48:58 +00:00
|
|
|
else if (c->ra_mode == RA_MERGED)
|
2019-09-09 00:55:32 +00:00
|
|
|
rt_notify_merged(c, n, NULL, NULL, e, e, c->refeeding);
|
2016-01-26 10:48:58 +00:00
|
|
|
else /* RA_BASIC */
|
2019-09-09 00:55:32 +00:00
|
|
|
rt_notify_basic(c, n, e, e, c->refeeding);
|
2009-05-31 13:24:27 +00:00
|
|
|
rte_update_unlock();
|
|
|
|
}
|
|
|
|
|
2000-06-01 17:12:19 +00:00
|
|
|
/**
|
2016-01-26 10:48:58 +00:00
|
|
|
* rt_feed_channel - advertise all routes to a channel
|
|
|
|
* @c: channel to be fed
|
2000-06-01 17:12:19 +00:00
|
|
|
*
|
2016-01-26 10:48:58 +00:00
|
|
|
* This function performs one pass of advertisement of routes to a channel that
|
|
|
|
* is in the ES_FEEDING state. It is called by the protocol code as long as it
|
|
|
|
* has something to do. (We avoid transferring all the routes in single pass in
|
|
|
|
* order not to monopolize CPU time.)
|
2000-06-01 17:12:19 +00:00
|
|
|
*/
|
2000-05-19 10:46:26 +00:00
|
|
|
int
|
2016-01-26 10:48:58 +00:00
|
|
|
rt_feed_channel(struct channel *c)
|
2000-05-19 10:46:26 +00:00
|
|
|
{
|
2016-01-26 10:48:58 +00:00
|
|
|
struct fib_iterator *fit = &c->feed_fit;
|
2000-05-19 10:59:47 +00:00
|
|
|
int max_feed = 256;
|
2000-05-19 10:46:26 +00:00
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
ASSERT(c->export_state == ES_FEEDING);
|
|
|
|
|
|
|
|
if (!c->feed_active)
|
2000-05-19 10:46:26 +00:00
|
|
|
{
|
2016-01-26 10:48:58 +00:00
|
|
|
FIB_ITERATE_INIT(fit, &c->table->fib);
|
|
|
|
c->feed_active = 1;
|
2000-05-19 10:46:26 +00:00
|
|
|
}
|
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
FIB_ITERATE_START(&c->table->fib, fit, net, n)
|
2000-05-19 10:46:26 +00:00
|
|
|
{
|
2008-11-14 22:03:15 +00:00
|
|
|
rte *e = n->routes;
|
2000-05-19 10:59:47 +00:00
|
|
|
if (max_feed <= 0)
|
|
|
|
{
|
2015-12-21 19:16:05 +00:00
|
|
|
FIB_ITERATE_PUT(fit);
|
2000-05-19 10:59:47 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2009-05-31 13:24:27 +00:00
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
if ((c->ra_mode == RA_OPTIMAL) ||
|
|
|
|
(c->ra_mode == RA_ACCEPTED) ||
|
|
|
|
(c->ra_mode == RA_MERGED))
|
2012-11-10 13:26:13 +00:00
|
|
|
if (rte_is_valid(e))
|
2009-05-31 13:24:27 +00:00
|
|
|
{
|
2016-01-26 10:48:58 +00:00
|
|
|
/* In the meantime, the protocol may fell down */
|
|
|
|
if (c->export_state != ES_FEEDING)
|
|
|
|
goto done;
|
2015-05-31 09:29:53 +00:00
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
do_feed_channel(c, n, e);
|
2009-05-31 13:24:27 +00:00
|
|
|
max_feed--;
|
|
|
|
}
|
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
if (c->ra_mode == RA_ANY)
|
2015-05-31 09:29:53 +00:00
|
|
|
for(e = n->routes; e; e = e->next)
|
2009-05-31 13:24:27 +00:00
|
|
|
{
|
2016-01-26 10:48:58 +00:00
|
|
|
/* In the meantime, the protocol may fell down */
|
|
|
|
if (c->export_state != ES_FEEDING)
|
|
|
|
goto done;
|
2015-05-31 09:29:53 +00:00
|
|
|
|
|
|
|
if (!rte_is_valid(e))
|
|
|
|
continue;
|
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
do_feed_channel(c, n, e);
|
2009-05-31 13:24:27 +00:00
|
|
|
max_feed--;
|
|
|
|
}
|
2000-05-19 10:46:26 +00:00
|
|
|
}
|
2015-12-21 19:16:05 +00:00
|
|
|
FIB_ITERATE_END;
|
2000-05-19 10:46:26 +00:00
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
done:
|
|
|
|
c->feed_active = 0;
|
|
|
|
return 1;
|
2000-05-19 10:46:26 +00:00
|
|
|
}
|
|
|
|
|
2000-06-01 17:12:19 +00:00
|
|
|
/**
|
|
|
|
* rt_feed_baby_abort - abort protocol feeding
|
2016-01-26 10:48:58 +00:00
|
|
|
* @c: channel
|
2000-06-01 17:12:19 +00:00
|
|
|
*
|
2016-01-26 10:48:58 +00:00
|
|
|
* This function is called by the protocol code when the protocol stops or
|
|
|
|
* ceases to exist during the feeding.
|
2000-06-01 17:12:19 +00:00
|
|
|
*/
|
2000-05-19 10:46:26 +00:00
|
|
|
void
|
2016-01-26 10:48:58 +00:00
|
|
|
rt_feed_channel_abort(struct channel *c)
|
2000-05-19 10:46:26 +00:00
|
|
|
{
|
2016-01-26 10:48:58 +00:00
|
|
|
if (c->feed_active)
|
2000-05-19 10:46:26 +00:00
|
|
|
{
|
2016-01-26 10:48:58 +00:00
|
|
|
/* Unlink the iterator */
|
|
|
|
fit_get(&c->table->fib, &c->feed_fit);
|
|
|
|
c->feed_active = 0;
|
2000-05-19 10:46:26 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-09-27 20:57:55 +00:00
|
|
|
|
2019-08-13 16:22:07 +00:00
|
|
|
/*
|
|
|
|
* Import table
|
|
|
|
*/
|
|
|
|
|
2018-09-27 20:57:55 +00:00
|
|
|
int
|
|
|
|
rte_update_in(struct channel *c, const net_addr *n, rte *new, struct rte_src *src)
|
|
|
|
{
|
2018-12-11 12:52:30 +00:00
|
|
|
struct rtable *tab = c->in_table;
|
2018-09-27 20:57:55 +00:00
|
|
|
rte *old, **pos;
|
|
|
|
net *net;
|
|
|
|
|
|
|
|
if (new)
|
|
|
|
{
|
2018-12-11 12:52:30 +00:00
|
|
|
net = net_get(tab, n);
|
2018-09-27 20:57:55 +00:00
|
|
|
|
|
|
|
if (!rta_is_cached(new->attrs))
|
|
|
|
new->attrs = rta_lookup(new->attrs);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2018-12-11 12:52:30 +00:00
|
|
|
net = net_find(tab, n);
|
2018-09-27 20:57:55 +00:00
|
|
|
|
|
|
|
if (!net)
|
2018-12-11 12:52:30 +00:00
|
|
|
goto drop_withdraw;
|
2018-09-27 20:57:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Find the old rte */
|
|
|
|
for (pos = &net->routes; old = *pos; pos = &old->next)
|
2020-04-10 15:08:29 +00:00
|
|
|
if (old->src == src)
|
2018-09-27 20:57:55 +00:00
|
|
|
{
|
|
|
|
if (new && rte_same(old, new))
|
2019-02-22 01:16:39 +00:00
|
|
|
{
|
|
|
|
/* Refresh the old rte, continue with update to main rtable */
|
|
|
|
if (old->flags & (REF_STALE | REF_DISCARD | REF_MODIFY))
|
|
|
|
{
|
|
|
|
old->flags &= ~(REF_STALE | REF_DISCARD | REF_MODIFY);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2018-12-11 12:52:30 +00:00
|
|
|
goto drop_update;
|
2019-02-22 01:16:39 +00:00
|
|
|
}
|
2018-09-27 20:57:55 +00:00
|
|
|
|
2019-08-26 19:53:56 +00:00
|
|
|
/* Move iterator if needed */
|
|
|
|
if (old == c->reload_next_rte)
|
|
|
|
c->reload_next_rte = old->next;
|
|
|
|
|
2018-09-27 20:57:55 +00:00
|
|
|
/* Remove the old rte */
|
|
|
|
*pos = old->next;
|
|
|
|
rte_free_quick(old);
|
2018-12-11 12:52:30 +00:00
|
|
|
tab->rt_count--;
|
2018-09-27 20:57:55 +00:00
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!new)
|
2018-12-11 12:52:30 +00:00
|
|
|
{
|
|
|
|
if (!old)
|
|
|
|
goto drop_withdraw;
|
|
|
|
|
2021-03-30 16:51:31 +00:00
|
|
|
if (!net->routes)
|
|
|
|
fib_delete(&tab->fib, net);
|
|
|
|
|
2018-12-11 12:52:30 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct channel_limit *l = &c->rx_limit;
|
|
|
|
if (l->action && !old)
|
|
|
|
{
|
|
|
|
if (tab->rt_count >= l->limit)
|
|
|
|
channel_notify_limit(c, l, PLD_RX, tab->rt_count);
|
|
|
|
|
|
|
|
if (l->state == PLS_BLOCKED)
|
|
|
|
{
|
2020-11-15 15:01:19 +00:00
|
|
|
/* Required by rte_trace_in() */
|
|
|
|
new->net = net;
|
|
|
|
|
2020-12-07 21:19:40 +00:00
|
|
|
rte_trace_in(D_FILTERS, c, new, "ignored [limit]");
|
2018-12-11 12:52:30 +00:00
|
|
|
goto drop_update;
|
|
|
|
}
|
|
|
|
}
|
2018-09-27 20:57:55 +00:00
|
|
|
|
|
|
|
/* Insert the new rte */
|
|
|
|
rte *e = rte_do_cow(new);
|
|
|
|
e->flags |= REF_COW;
|
|
|
|
e->net = net;
|
|
|
|
e->sender = c;
|
|
|
|
e->lastmod = current_time();
|
|
|
|
e->next = *pos;
|
|
|
|
*pos = e;
|
2018-12-11 12:52:30 +00:00
|
|
|
tab->rt_count++;
|
2018-09-27 20:57:55 +00:00
|
|
|
return 1;
|
2018-12-11 12:52:30 +00:00
|
|
|
|
|
|
|
drop_update:
|
|
|
|
c->stats.imp_updates_received++;
|
|
|
|
c->stats.imp_updates_ignored++;
|
|
|
|
rte_free(new);
|
2021-03-30 16:51:31 +00:00
|
|
|
|
|
|
|
if (!net->routes)
|
|
|
|
fib_delete(&tab->fib, net);
|
|
|
|
|
2018-12-11 12:52:30 +00:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
drop_withdraw:
|
|
|
|
c->stats.imp_withdraws_received++;
|
|
|
|
c->stats.imp_withdraws_ignored++;
|
|
|
|
return 0;
|
2018-09-27 20:57:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
rt_reload_channel(struct channel *c)
|
|
|
|
{
|
|
|
|
struct rtable *tab = c->in_table;
|
|
|
|
struct fib_iterator *fit = &c->reload_fit;
|
|
|
|
int max_feed = 64;
|
|
|
|
|
|
|
|
ASSERT(c->channel_state == CS_UP);
|
|
|
|
|
|
|
|
if (!c->reload_active)
|
|
|
|
{
|
|
|
|
FIB_ITERATE_INIT(fit, &tab->fib);
|
|
|
|
c->reload_active = 1;
|
|
|
|
}
|
|
|
|
|
2019-08-26 19:53:56 +00:00
|
|
|
do {
|
|
|
|
for (rte *e = c->reload_next_rte; e; e = e->next)
|
2018-09-27 20:57:55 +00:00
|
|
|
{
|
2019-08-26 19:53:56 +00:00
|
|
|
if (max_feed-- <= 0)
|
|
|
|
{
|
|
|
|
c->reload_next_rte = e;
|
|
|
|
debug("%s channel reload burst split (max_feed=%d)", c->proto->name, max_feed);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-04-10 15:08:29 +00:00
|
|
|
rte_update2(c, e->net->n.addr, rte_do_cow(e), e->src);
|
2018-09-27 20:57:55 +00:00
|
|
|
}
|
|
|
|
|
2019-08-26 19:53:56 +00:00
|
|
|
c->reload_next_rte = NULL;
|
|
|
|
|
|
|
|
FIB_ITERATE_START(&tab->fib, fit, net, n)
|
2018-09-27 20:57:55 +00:00
|
|
|
{
|
2019-08-26 19:53:56 +00:00
|
|
|
if (c->reload_next_rte = n->routes)
|
|
|
|
{
|
|
|
|
FIB_ITERATE_PUT_NEXT(fit, &tab->fib);
|
|
|
|
break;
|
|
|
|
}
|
2018-09-27 20:57:55 +00:00
|
|
|
}
|
2019-08-26 19:53:56 +00:00
|
|
|
FIB_ITERATE_END;
|
2018-09-27 20:57:55 +00:00
|
|
|
}
|
2019-08-26 19:53:56 +00:00
|
|
|
while (c->reload_next_rte);
|
2018-09-27 20:57:55 +00:00
|
|
|
|
|
|
|
c->reload_active = 0;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
rt_reload_channel_abort(struct channel *c)
|
|
|
|
{
|
|
|
|
if (c->reload_active)
|
|
|
|
{
|
|
|
|
/* Unlink the iterator */
|
|
|
|
fit_get(&c->in_table->fib, &c->reload_fit);
|
2019-08-26 19:53:56 +00:00
|
|
|
c->reload_next_rte = NULL;
|
2018-09-27 20:57:55 +00:00
|
|
|
c->reload_active = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
rt_prune_sync(rtable *t, int all)
|
|
|
|
{
|
2021-03-30 16:51:31 +00:00
|
|
|
struct fib_iterator fit;
|
|
|
|
|
|
|
|
FIB_ITERATE_INIT(&fit, &t->fib);
|
|
|
|
|
|
|
|
again:
|
|
|
|
FIB_ITERATE_START(&t->fib, &fit, net, n)
|
2018-09-27 20:57:55 +00:00
|
|
|
{
|
|
|
|
rte *e, **ee = &n->routes;
|
2021-03-30 16:51:31 +00:00
|
|
|
|
2018-09-27 20:57:55 +00:00
|
|
|
while (e = *ee)
|
|
|
|
{
|
|
|
|
if (all || (e->flags & (REF_STALE | REF_DISCARD)))
|
|
|
|
{
|
|
|
|
*ee = e->next;
|
|
|
|
rte_free_quick(e);
|
2018-12-11 12:52:30 +00:00
|
|
|
t->rt_count--;
|
2018-09-27 20:57:55 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
ee = &e->next;
|
|
|
|
}
|
2021-03-30 16:51:31 +00:00
|
|
|
|
|
|
|
if (all || !n->routes)
|
|
|
|
{
|
|
|
|
FIB_ITERATE_PUT(&fit);
|
|
|
|
fib_delete(&t->fib, n);
|
|
|
|
goto again;
|
|
|
|
}
|
2018-09-27 20:57:55 +00:00
|
|
|
}
|
2021-03-30 16:51:31 +00:00
|
|
|
FIB_ITERATE_END;
|
2018-09-27 20:57:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2019-08-13 16:22:07 +00:00
|
|
|
/*
|
|
|
|
* Export table
|
|
|
|
*/
|
|
|
|
|
|
|
|
int
|
2021-03-20 20:16:12 +00:00
|
|
|
rte_update_out(struct channel *c, const net_addr *n, rte *new, rte *old0, rte **old_exported, int refeed)
|
2019-08-13 16:22:07 +00:00
|
|
|
{
|
|
|
|
struct rtable *tab = c->out_table;
|
|
|
|
struct rte_src *src;
|
|
|
|
rte *old, **pos;
|
|
|
|
net *net;
|
|
|
|
|
|
|
|
if (new)
|
|
|
|
{
|
|
|
|
net = net_get(tab, n);
|
2020-04-10 15:08:29 +00:00
|
|
|
src = new->src;
|
2019-09-24 15:12:15 +00:00
|
|
|
|
|
|
|
if (!rta_is_cached(new->attrs))
|
|
|
|
new->attrs = rta_lookup(new->attrs);
|
2019-08-13 16:22:07 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
net = net_find(tab, n);
|
2020-04-10 15:08:29 +00:00
|
|
|
src = old0->src;
|
2019-08-13 16:22:07 +00:00
|
|
|
|
|
|
|
if (!net)
|
|
|
|
goto drop_withdraw;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Find the old rte */
|
|
|
|
for (pos = &net->routes; old = *pos; pos = &old->next)
|
2020-04-10 15:08:29 +00:00
|
|
|
if ((c->ra_mode != RA_ANY) || (old->src == src))
|
2019-08-13 16:22:07 +00:00
|
|
|
{
|
|
|
|
if (new && rte_same(old, new))
|
|
|
|
{
|
|
|
|
/* REF_STALE / REF_DISCARD not used in export table */
|
|
|
|
/*
|
|
|
|
if (old->flags & (REF_STALE | REF_DISCARD | REF_MODIFY))
|
|
|
|
{
|
|
|
|
old->flags &= ~(REF_STALE | REF_DISCARD | REF_MODIFY);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
*/
|
|
|
|
|
|
|
|
goto drop_update;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Remove the old rte */
|
|
|
|
*pos = old->next;
|
2021-03-20 20:16:12 +00:00
|
|
|
*old_exported = old;
|
2019-08-13 16:22:07 +00:00
|
|
|
tab->rt_count--;
|
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!new)
|
|
|
|
{
|
|
|
|
if (!old)
|
|
|
|
goto drop_withdraw;
|
|
|
|
|
2021-03-30 16:51:31 +00:00
|
|
|
if (!net->routes)
|
|
|
|
fib_delete(&tab->fib, net);
|
|
|
|
|
2019-08-13 16:22:07 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Insert the new rte */
|
|
|
|
rte *e = rte_do_cow(new);
|
|
|
|
e->flags |= REF_COW;
|
|
|
|
e->net = net;
|
|
|
|
e->sender = c;
|
|
|
|
e->lastmod = current_time();
|
|
|
|
e->next = *pos;
|
|
|
|
*pos = e;
|
|
|
|
tab->rt_count++;
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
drop_update:
|
|
|
|
return refeed;
|
|
|
|
|
|
|
|
drop_withdraw:
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Hostcache
|
|
|
|
*/
|
|
|
|
|
2015-12-24 14:52:03 +00:00
|
|
|
static inline u32
|
2010-07-26 14:39:27 +00:00
|
|
|
hc_hash(ip_addr a, rtable *dep)
|
|
|
|
{
|
2015-12-24 14:52:03 +00:00
|
|
|
return ipa_hash(a) ^ ptr_hash(dep);
|
2010-07-26 14:39:27 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline void
|
|
|
|
hc_insert(struct hostcache *hc, struct hostentry *he)
|
|
|
|
{
|
2015-05-19 06:53:34 +00:00
|
|
|
uint k = he->hash_key >> hc->hash_shift;
|
2010-07-26 14:39:27 +00:00
|
|
|
he->next = hc->hash_table[k];
|
|
|
|
hc->hash_table[k] = he;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void
|
|
|
|
hc_remove(struct hostcache *hc, struct hostentry *he)
|
|
|
|
{
|
|
|
|
struct hostentry **hep;
|
2015-05-19 06:53:34 +00:00
|
|
|
uint k = he->hash_key >> hc->hash_shift;
|
2010-07-26 14:39:27 +00:00
|
|
|
|
|
|
|
for (hep = &hc->hash_table[k]; *hep != he; hep = &(*hep)->next);
|
|
|
|
*hep = he->next;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define HC_DEF_ORDER 10
|
|
|
|
#define HC_HI_MARK *4
|
|
|
|
#define HC_HI_STEP 2
|
|
|
|
#define HC_HI_ORDER 16 /* Must be at most 16 */
|
|
|
|
#define HC_LO_MARK /5
|
|
|
|
#define HC_LO_STEP 2
|
|
|
|
#define HC_LO_ORDER 10
|
|
|
|
|
|
|
|
static void
|
2021-03-30 16:51:31 +00:00
|
|
|
hc_alloc_table(struct hostcache *hc, pool *p, unsigned order)
|
2010-07-26 14:39:27 +00:00
|
|
|
{
|
2016-10-14 13:37:04 +00:00
|
|
|
uint hsize = 1 << order;
|
2010-07-26 14:39:27 +00:00
|
|
|
hc->hash_order = order;
|
2015-12-24 14:52:03 +00:00
|
|
|
hc->hash_shift = 32 - order;
|
2016-10-14 13:37:04 +00:00
|
|
|
hc->hash_max = (order >= HC_HI_ORDER) ? ~0U : (hsize HC_HI_MARK);
|
|
|
|
hc->hash_min = (order <= HC_LO_ORDER) ? 0U : (hsize HC_LO_MARK);
|
2010-07-26 14:39:27 +00:00
|
|
|
|
2021-03-30 16:51:31 +00:00
|
|
|
hc->hash_table = mb_allocz(p, hsize * sizeof(struct hostentry *));
|
2010-07-26 14:39:27 +00:00
|
|
|
}
|
|
|
|
|
2010-07-05 15:50:19 +00:00
|
|
|
static void
|
2021-03-30 16:51:31 +00:00
|
|
|
hc_resize(struct hostcache *hc, pool *p, unsigned new_order)
|
2010-07-05 15:50:19 +00:00
|
|
|
{
|
2010-07-26 14:39:27 +00:00
|
|
|
struct hostentry **old_table = hc->hash_table;
|
|
|
|
struct hostentry *he, *hen;
|
2016-10-14 13:37:04 +00:00
|
|
|
uint old_size = 1 << hc->hash_order;
|
|
|
|
uint i;
|
2010-07-26 14:39:27 +00:00
|
|
|
|
2021-03-30 16:51:31 +00:00
|
|
|
hc_alloc_table(hc, p, new_order);
|
2010-07-26 14:39:27 +00:00
|
|
|
for (i = 0; i < old_size; i++)
|
|
|
|
for (he = old_table[i]; he != NULL; he=hen)
|
|
|
|
{
|
|
|
|
hen = he->next;
|
|
|
|
hc_insert(hc, he);
|
|
|
|
}
|
|
|
|
mb_free(old_table);
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct hostentry *
|
2021-03-30 16:51:31 +00:00
|
|
|
hc_new_hostentry(struct hostcache *hc, pool *p, ip_addr a, ip_addr ll, rtable *dep, unsigned k)
|
2010-07-26 14:39:27 +00:00
|
|
|
{
|
|
|
|
struct hostentry *he = sl_alloc(hc->slab);
|
|
|
|
|
2017-02-24 13:05:11 +00:00
|
|
|
*he = (struct hostentry) {
|
|
|
|
.addr = a,
|
|
|
|
.link = ll,
|
|
|
|
.tab = dep,
|
|
|
|
.hash_key = k,
|
|
|
|
};
|
2010-07-26 14:39:27 +00:00
|
|
|
|
|
|
|
add_tail(&hc->hostentries, &he->ln);
|
|
|
|
hc_insert(hc, he);
|
|
|
|
|
|
|
|
hc->hash_items++;
|
|
|
|
if (hc->hash_items > hc->hash_max)
|
2021-03-30 16:51:31 +00:00
|
|
|
hc_resize(hc, p, hc->hash_order + HC_HI_STEP);
|
2010-07-26 14:39:27 +00:00
|
|
|
|
|
|
|
return he;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2021-03-30 16:51:31 +00:00
|
|
|
hc_delete_hostentry(struct hostcache *hc, pool *p, struct hostentry *he)
|
2010-07-26 14:39:27 +00:00
|
|
|
{
|
2010-12-07 22:33:55 +00:00
|
|
|
rta_free(he->src);
|
|
|
|
|
2010-07-26 14:39:27 +00:00
|
|
|
rem_node(&he->ln);
|
|
|
|
hc_remove(hc, he);
|
2022-04-04 18:31:14 +00:00
|
|
|
sl_free(he);
|
2010-07-26 14:39:27 +00:00
|
|
|
|
|
|
|
hc->hash_items--;
|
|
|
|
if (hc->hash_items < hc->hash_min)
|
2021-03-30 16:51:31 +00:00
|
|
|
hc_resize(hc, p, hc->hash_order - HC_LO_STEP);
|
2010-07-05 15:50:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
rt_init_hostcache(rtable *tab)
|
|
|
|
{
|
2021-03-30 16:51:31 +00:00
|
|
|
struct hostcache *hc = mb_allocz(tab->rp, sizeof(struct hostcache));
|
2010-07-05 15:50:19 +00:00
|
|
|
init_list(&hc->hostentries);
|
2010-07-26 14:39:27 +00:00
|
|
|
|
|
|
|
hc->hash_items = 0;
|
2021-03-30 16:51:31 +00:00
|
|
|
hc_alloc_table(hc, tab->rp, HC_DEF_ORDER);
|
|
|
|
hc->slab = sl_new(tab->rp, sizeof(struct hostentry));
|
2010-07-26 14:39:27 +00:00
|
|
|
|
2022-04-04 20:34:14 +00:00
|
|
|
hc->lp = lp_new(tab->rp);
|
2020-03-26 02:57:48 +00:00
|
|
|
hc->trie = f_new_trie(hc->lp, 0);
|
2010-07-27 16:20:12 +00:00
|
|
|
|
2010-07-05 15:50:19 +00:00
|
|
|
tab->hostcache = hc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
rt_free_hostcache(rtable *tab)
|
|
|
|
{
|
|
|
|
struct hostcache *hc = tab->hostcache;
|
|
|
|
|
|
|
|
node *n;
|
|
|
|
WALK_LIST(n, hc->hostentries)
|
|
|
|
{
|
|
|
|
struct hostentry *he = SKIP_BACK(struct hostentry, ln, n);
|
2010-12-07 22:33:55 +00:00
|
|
|
rta_free(he->src);
|
|
|
|
|
2010-07-05 15:50:19 +00:00
|
|
|
if (he->uc)
|
|
|
|
log(L_ERR "Hostcache is not empty in table %s", tab->name);
|
|
|
|
}
|
|
|
|
|
2021-03-30 16:51:31 +00:00
|
|
|
/* Freed automagically by the resource pool
|
2010-07-26 14:39:27 +00:00
|
|
|
rfree(hc->slab);
|
2010-07-27 16:20:12 +00:00
|
|
|
rfree(hc->lp);
|
2010-07-26 14:39:27 +00:00
|
|
|
mb_free(hc->hash_table);
|
2010-07-05 15:50:19 +00:00
|
|
|
mb_free(hc);
|
2021-03-30 16:51:31 +00:00
|
|
|
*/
|
2010-07-05 15:50:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
rt_notify_hostcache(rtable *tab, net *net)
|
|
|
|
{
|
|
|
|
if (tab->hcu_scheduled)
|
|
|
|
return;
|
|
|
|
|
2015-12-24 14:52:03 +00:00
|
|
|
if (trie_match_net(tab->hostcache->trie, net->n.addr))
|
|
|
|
rt_schedule_hcu(tab);
|
2010-07-05 15:50:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
if_local_addr(ip_addr a, struct iface *i)
|
|
|
|
{
|
|
|
|
struct ifa *b;
|
|
|
|
|
|
|
|
WALK_LIST(b, i->addrs)
|
|
|
|
if (ipa_equal(a, b->ip))
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-09-28 12:17:20 +00:00
|
|
|
u32
|
2010-07-30 23:04:32 +00:00
|
|
|
rt_get_igp_metric(rte *rt)
|
|
|
|
{
|
2022-03-19 15:23:42 +00:00
|
|
|
eattr *ea = ea_find(rt->attrs->eattrs, "igp_metric");
|
2010-08-02 11:11:53 +00:00
|
|
|
|
|
|
|
if (ea)
|
|
|
|
return ea->u.data;
|
|
|
|
|
2021-03-20 22:18:34 +00:00
|
|
|
if (rt->attrs->source == RTS_DEVICE)
|
2010-07-30 23:04:32 +00:00
|
|
|
return 0;
|
|
|
|
|
2021-03-20 22:18:34 +00:00
|
|
|
if (rt->src->proto->rte_igp_metric)
|
|
|
|
return rt->src->proto->rte_igp_metric(rt);
|
|
|
|
|
2010-07-30 23:04:32 +00:00
|
|
|
return IGP_METRIC_UNKNOWN;
|
|
|
|
}
|
|
|
|
|
2010-07-05 15:50:19 +00:00
|
|
|
static int
|
|
|
|
rt_update_hostentry(rtable *tab, struct hostentry *he)
|
|
|
|
{
|
2010-12-07 22:33:55 +00:00
|
|
|
rta *old_src = he->src;
|
2018-01-29 11:49:37 +00:00
|
|
|
int direct = 0;
|
2010-07-27 16:20:12 +00:00
|
|
|
int pxlen = 0;
|
2010-07-05 15:50:19 +00:00
|
|
|
|
2015-12-24 14:52:03 +00:00
|
|
|
/* Reset the hostentry */
|
2010-12-07 22:33:55 +00:00
|
|
|
he->src = NULL;
|
|
|
|
he->dest = RTD_UNREACHABLE;
|
2018-01-29 11:49:37 +00:00
|
|
|
he->nexthop_linkable = 0;
|
2010-12-07 22:33:55 +00:00
|
|
|
he->igp_metric = 0;
|
|
|
|
|
2015-12-24 14:52:03 +00:00
|
|
|
net_addr he_addr;
|
|
|
|
net_fill_ip_host(&he_addr, he->addr);
|
|
|
|
net *n = net_route(tab, &he_addr);
|
2010-07-30 23:04:32 +00:00
|
|
|
if (n)
|
2010-07-05 15:50:19 +00:00
|
|
|
{
|
2012-11-10 13:26:13 +00:00
|
|
|
rte *e = n->routes;
|
|
|
|
rta *a = e->attrs;
|
2015-11-05 11:48:52 +00:00
|
|
|
pxlen = n->n.addr->pxlen;
|
2010-07-05 15:50:19 +00:00
|
|
|
|
2010-08-03 06:26:47 +00:00
|
|
|
if (a->hostentry)
|
|
|
|
{
|
|
|
|
/* Recursive route should not depend on another recursive route */
|
2015-11-05 11:48:52 +00:00
|
|
|
log(L_WARN "Next hop address %I resolvable through recursive route for %N",
|
|
|
|
he->addr, n->n.addr);
|
2010-12-07 22:33:55 +00:00
|
|
|
goto done;
|
2010-08-03 06:26:47 +00:00
|
|
|
}
|
2010-12-07 22:33:55 +00:00
|
|
|
|
2018-01-29 11:49:37 +00:00
|
|
|
if (a->dest == RTD_UNICAST)
|
2017-03-17 14:48:09 +00:00
|
|
|
{
|
|
|
|
for (struct nexthop *nh = &(a->nh); nh; nh = nh->next)
|
|
|
|
if (ipa_zero(nh->gw))
|
|
|
|
{
|
|
|
|
if (if_local_addr(he->addr, nh->iface))
|
|
|
|
{
|
|
|
|
/* The host address is a local address, this is not valid */
|
|
|
|
log(L_WARN "Next hop address %I is a local address of iface %s",
|
|
|
|
he->addr, nh->iface->name);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
2018-01-29 11:49:37 +00:00
|
|
|
direct++;
|
2017-03-17 14:48:09 +00:00
|
|
|
}
|
|
|
|
}
|
2017-03-08 15:27:18 +00:00
|
|
|
|
2010-12-07 22:33:55 +00:00
|
|
|
he->src = rta_clone(a);
|
2018-01-29 11:49:37 +00:00
|
|
|
he->dest = a->dest;
|
|
|
|
he->nexthop_linkable = !direct;
|
2012-11-10 13:26:13 +00:00
|
|
|
he->igp_metric = rt_get_igp_metric(e);
|
2010-07-05 15:50:19 +00:00
|
|
|
}
|
|
|
|
|
2017-03-08 15:27:18 +00:00
|
|
|
done:
|
2010-07-27 16:20:12 +00:00
|
|
|
/* Add a prefix range to the trie */
|
2015-12-24 14:52:03 +00:00
|
|
|
trie_add_prefix(tab->hostcache->trie, &he_addr, pxlen, he_addr.pxlen);
|
2010-07-27 16:20:12 +00:00
|
|
|
|
2010-12-07 22:33:55 +00:00
|
|
|
rta_free(old_src);
|
|
|
|
return old_src != he->src;
|
2010-07-05 15:50:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
rt_update_hostcache(rtable *tab)
|
|
|
|
{
|
|
|
|
struct hostcache *hc = tab->hostcache;
|
|
|
|
struct hostentry *he;
|
|
|
|
node *n, *x;
|
|
|
|
|
2010-07-27 16:20:12 +00:00
|
|
|
/* Reset the trie */
|
|
|
|
lp_flush(hc->lp);
|
2020-03-26 02:57:48 +00:00
|
|
|
hc->trie = f_new_trie(hc->lp, 0);
|
2010-07-27 16:20:12 +00:00
|
|
|
|
2010-07-05 15:50:19 +00:00
|
|
|
WALK_LIST_DELSAFE(n, x, hc->hostentries)
|
|
|
|
{
|
|
|
|
he = SKIP_BACK(struct hostentry, ln, n);
|
|
|
|
if (!he->uc)
|
|
|
|
{
|
2021-03-30 16:51:31 +00:00
|
|
|
hc_delete_hostentry(hc, tab->rp, he);
|
2010-07-05 15:50:19 +00:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (rt_update_hostentry(tab, he))
|
|
|
|
rt_schedule_nhu(he->tab);
|
|
|
|
}
|
|
|
|
|
|
|
|
tab->hcu_scheduled = 0;
|
|
|
|
}
|
|
|
|
|
2017-03-22 14:00:07 +00:00
|
|
|
struct hostentry *
|
2012-08-14 14:25:22 +00:00
|
|
|
rt_get_hostentry(rtable *tab, ip_addr a, ip_addr ll, rtable *dep)
|
2010-07-05 15:50:19 +00:00
|
|
|
{
|
|
|
|
struct hostentry *he;
|
|
|
|
|
|
|
|
if (!tab->hostcache)
|
|
|
|
rt_init_hostcache(tab);
|
|
|
|
|
2015-12-24 14:52:03 +00:00
|
|
|
u32 k = hc_hash(a, dep);
|
2010-07-26 14:39:27 +00:00
|
|
|
struct hostcache *hc = tab->hostcache;
|
|
|
|
for (he = hc->hash_table[k >> hc->hash_shift]; he != NULL; he = he->next)
|
|
|
|
if (ipa_equal(he->addr, a) && (he->tab == dep))
|
|
|
|
return he;
|
2010-07-05 15:50:19 +00:00
|
|
|
|
2021-03-30 16:51:31 +00:00
|
|
|
he = hc_new_hostentry(hc, tab->rp, a, ipa_zero(ll) ? a : ll, dep, k);
|
2010-07-26 14:39:27 +00:00
|
|
|
rt_update_hostentry(tab, he);
|
2010-07-05 15:50:19 +00:00
|
|
|
return he;
|
|
|
|
}
|
|
|
|
|
2012-08-14 14:25:22 +00:00
|
|
|
|
2000-06-02 12:29:55 +00:00
|
|
|
/*
|
|
|
|
* Documentation for functions declared inline in route.h
|
|
|
|
*/
|
|
|
|
#if 0
|
|
|
|
|
|
|
|
/**
|
|
|
|
* net_find - find a network entry
|
|
|
|
* @tab: a routing table
|
|
|
|
* @addr: address of the network
|
|
|
|
*
|
|
|
|
* net_find() looks up the given network in routing table @tab and
|
|
|
|
* returns a pointer to its &net entry or %NULL if no such network
|
|
|
|
* exists.
|
|
|
|
*/
|
2015-11-05 11:48:52 +00:00
|
|
|
static inline net *net_find(rtable *tab, net_addr *addr)
|
2000-06-02 12:29:55 +00:00
|
|
|
{ DUMMY; }
|
|
|
|
|
|
|
|
/**
|
|
|
|
* net_get - obtain a network entry
|
|
|
|
* @tab: a routing table
|
|
|
|
* @addr: address of the network
|
|
|
|
*
|
|
|
|
* net_get() looks up the given network in routing table @tab and
|
|
|
|
* returns a pointer to its &net entry. If no such entry exists, it's
|
|
|
|
* created.
|
|
|
|
*/
|
2015-11-05 11:48:52 +00:00
|
|
|
static inline net *net_get(rtable *tab, net_addr *addr)
|
2000-06-02 12:29:55 +00:00
|
|
|
{ DUMMY; }
|
|
|
|
|
|
|
|
/**
|
|
|
|
* rte_cow - copy a route for writing
|
|
|
|
* @r: a route entry to be copied
|
|
|
|
*
|
|
|
|
* rte_cow() takes a &rte and prepares it for modification. The exact action
|
|
|
|
* taken depends on the flags of the &rte -- if it's a temporary entry, it's
|
|
|
|
* just returned unchanged, else a new temporary entry with the same contents
|
|
|
|
* is created.
|
|
|
|
*
|
|
|
|
* The primary use of this function is inside the filter machinery -- when
|
|
|
|
* a filter wants to modify &rte contents (to change the preference or to
|
|
|
|
* attach another set of attributes), it must ensure that the &rte is not
|
|
|
|
* shared with anyone else (and especially that it isn't stored in any routing
|
|
|
|
* table).
|
|
|
|
*
|
2000-06-07 12:29:08 +00:00
|
|
|
* Result: a pointer to the new writable &rte.
|
2000-06-02 12:29:55 +00:00
|
|
|
*/
|
|
|
|
static inline rte * rte_cow(rte *r)
|
|
|
|
{ DUMMY; }
|
|
|
|
|
|
|
|
#endif
|