2000-03-20 21:50:17 +00:00
|
|
|
/*
|
|
|
|
* BIRD -- BGP Attributes
|
|
|
|
*
|
|
|
|
* (c) 2000 Martin Mares <mj@ucw.cz>
|
|
|
|
*
|
|
|
|
* Can be freely distributed and used under the terms of the GNU GPL.
|
|
|
|
*/
|
|
|
|
|
2000-05-02 16:07:41 +00:00
|
|
|
#undef LOCAL_DEBUG
|
2000-03-31 23:21:37 +00:00
|
|
|
|
2000-04-17 11:25:15 +00:00
|
|
|
#include <stdlib.h>
|
|
|
|
|
2000-03-20 21:50:17 +00:00
|
|
|
#include "nest/bird.h"
|
|
|
|
#include "nest/iface.h"
|
|
|
|
#include "nest/protocol.h"
|
|
|
|
#include "nest/route.h"
|
2000-04-17 07:53:29 +00:00
|
|
|
#include "nest/attrs.h"
|
2000-03-20 21:50:17 +00:00
|
|
|
#include "conf/conf.h"
|
2000-03-31 23:21:37 +00:00
|
|
|
#include "lib/resource.h"
|
|
|
|
#include "lib/string.h"
|
|
|
|
#include "lib/unaligned.h"
|
2000-03-20 21:50:17 +00:00
|
|
|
|
|
|
|
#include "bgp.h"
|
2000-03-31 23:21:37 +00:00
|
|
|
|
2000-05-04 09:03:31 +00:00
|
|
|
static byte bgp_mandatory_attrs[] = { BA_ORIGIN, BA_AS_PATH
|
|
|
|
#ifndef IPV6
|
|
|
|
,BA_NEXT_HOP
|
|
|
|
#endif
|
|
|
|
};
|
2000-04-10 12:39:51 +00:00
|
|
|
|
|
|
|
struct attr_desc {
|
2000-04-25 21:31:15 +00:00
|
|
|
char *name;
|
2000-04-10 12:39:51 +00:00
|
|
|
int expected_length;
|
|
|
|
int expected_flags;
|
|
|
|
int type;
|
2000-04-17 12:46:07 +00:00
|
|
|
int allow_in_ebgp;
|
2000-04-10 12:39:51 +00:00
|
|
|
int (*validate)(struct bgp_proto *p, byte *attr, int len);
|
|
|
|
void (*format)(eattr *ea, byte *buf);
|
|
|
|
};
|
|
|
|
|
2000-04-17 09:37:31 +00:00
|
|
|
static int
|
|
|
|
bgp_check_origin(struct bgp_proto *p, byte *a, int len)
|
|
|
|
{
|
|
|
|
if (len > 2)
|
|
|
|
return 6;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
bgp_format_origin(eattr *a, byte *buf)
|
|
|
|
{
|
|
|
|
static char *bgp_origin_names[] = { "IGP", "EGP", "Incomplete" };
|
|
|
|
|
|
|
|
bsprintf(buf, bgp_origin_names[a->u.data]);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
bgp_check_path(struct bgp_proto *p, byte *a, int len)
|
|
|
|
{
|
|
|
|
while (len)
|
|
|
|
{
|
|
|
|
DBG("Path segment %02x %02x\n", a[0], a[1]);
|
|
|
|
if (len < 2 ||
|
2000-04-17 10:19:15 +00:00
|
|
|
a[0] != AS_PATH_SET && a[0] != AS_PATH_SEQUENCE ||
|
2000-04-17 09:37:31 +00:00
|
|
|
2*a[1] + 2 > len)
|
|
|
|
return 11;
|
|
|
|
len -= 2*a[1] + 2;
|
|
|
|
a += 2*a[1] + 2;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
bgp_check_next_hop(struct bgp_proto *p, byte *a, int len)
|
|
|
|
{
|
2000-05-04 09:03:31 +00:00
|
|
|
#ifdef IPV6
|
|
|
|
return -1;
|
|
|
|
#else
|
2000-04-17 09:37:31 +00:00
|
|
|
ip_addr addr;
|
|
|
|
|
|
|
|
memcpy(&addr, a, len);
|
|
|
|
ipa_ntoh(addr);
|
|
|
|
if (ipa_classify(addr) & IADDR_HOST)
|
|
|
|
return 0;
|
|
|
|
else
|
|
|
|
return 8;
|
2000-05-04 09:03:31 +00:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
bgp_check_reach_nlri(struct bgp_proto *p, byte *a, int len)
|
|
|
|
{
|
|
|
|
#ifdef IPV6
|
|
|
|
p->mp_reach_start = a;
|
|
|
|
p->mp_reach_len = len;
|
|
|
|
#endif
|
2000-05-04 20:02:56 +00:00
|
|
|
return -1;
|
2000-05-04 09:03:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
bgp_check_unreach_nlri(struct bgp_proto *p, byte *a, int len)
|
|
|
|
{
|
|
|
|
#ifdef IPV6
|
|
|
|
p->mp_unreach_start = a;
|
|
|
|
p->mp_unreach_len = len;
|
|
|
|
#endif
|
2000-05-04 20:02:56 +00:00
|
|
|
return -1;
|
2000-04-17 09:37:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static struct attr_desc bgp_attr_table[] = {
|
2000-05-04 09:03:31 +00:00
|
|
|
{ NULL, -1, 0, 0, 0, /* Undefined */
|
2000-04-17 09:37:31 +00:00
|
|
|
NULL, NULL },
|
2000-05-04 09:03:31 +00:00
|
|
|
{ "origin", 1, BAF_TRANSITIVE, EAF_TYPE_INT, 1, /* BA_ORIGIN */
|
2000-04-17 09:37:31 +00:00
|
|
|
bgp_check_origin, bgp_format_origin },
|
2000-05-04 09:03:31 +00:00
|
|
|
{ "as_path", -1, BAF_TRANSITIVE, EAF_TYPE_AS_PATH, 1, /* BA_AS_PATH */
|
2000-04-17 09:37:31 +00:00
|
|
|
bgp_check_path, NULL },
|
2000-05-04 09:03:31 +00:00
|
|
|
{ "next_hop", 4, BAF_TRANSITIVE, EAF_TYPE_IP_ADDRESS, 1, /* BA_NEXT_HOP */
|
2000-04-17 09:37:31 +00:00
|
|
|
bgp_check_next_hop, NULL },
|
2000-05-04 09:03:31 +00:00
|
|
|
{ "med", 4, BAF_OPTIONAL, EAF_TYPE_INT, 0, /* BA_MULTI_EXIT_DISC */
|
2000-04-17 09:37:31 +00:00
|
|
|
NULL, NULL },
|
2000-05-04 09:03:31 +00:00
|
|
|
{ "local_pref", 4, BAF_OPTIONAL, EAF_TYPE_INT, 0, /* BA_LOCAL_PREF */
|
2000-04-17 09:37:31 +00:00
|
|
|
NULL, NULL },
|
2000-05-04 09:03:31 +00:00
|
|
|
{ "atomic_aggr", 0, BAF_TRANSITIVE, EAF_TYPE_OPAQUE, 1, /* BA_ATOMIC_AGGR */
|
2000-04-17 09:37:31 +00:00
|
|
|
NULL, NULL },
|
2000-04-19 13:54:17 +00:00
|
|
|
{ "aggregator", 6, BAF_OPTIONAL | BAF_TRANSITIVE, EAF_TYPE_OPAQUE, 1, /* BA_AGGREGATOR */
|
2000-04-17 12:46:07 +00:00
|
|
|
NULL, NULL },
|
2000-05-04 09:03:31 +00:00
|
|
|
{ "community", -1, BAF_OPTIONAL | BAF_TRANSITIVE, EAF_TYPE_INT_SET, 1, /* BA_COMMUNITY */
|
2000-04-17 10:19:15 +00:00
|
|
|
NULL, NULL },
|
2000-05-04 09:03:31 +00:00
|
|
|
{ NULL, }, /* BA_ORIGINATOR_ID */
|
|
|
|
{ NULL, }, /* BA_CLUSTER_LIST */
|
|
|
|
{ NULL, }, /* BA_DPA */
|
|
|
|
{ NULL, }, /* BA_ADVERTISER */
|
|
|
|
{ NULL, }, /* BA_RCID_PATH */
|
|
|
|
{ "mp_reach_nlri", -1, BAF_OPTIONAL, EAF_TYPE_OPAQUE, 1, /* BA_MP_REACH_NLRI */
|
|
|
|
bgp_check_reach_nlri, NULL },
|
|
|
|
{ "mp_unreach_nlri", -1, BAF_OPTIONAL, EAF_TYPE_OPAQUE, 1, /* BA_MP_UNREACH_NLRI */
|
|
|
|
bgp_check_unreach_nlri, NULL },
|
2000-04-17 09:37:31 +00:00
|
|
|
};
|
|
|
|
|
2000-05-02 12:51:39 +00:00
|
|
|
#define ATTR_KNOWN(code) ((code) < ARRAY_SIZE(bgp_attr_table) && bgp_attr_table[code].name)
|
|
|
|
|
2000-05-04 20:02:56 +00:00
|
|
|
static byte *
|
|
|
|
bgp_set_attr(eattr *e, struct linpool *pool, unsigned attr, unsigned val)
|
|
|
|
{
|
|
|
|
ASSERT(ATTR_KNOWN(attr));
|
|
|
|
e->id = EA_CODE(EAP_BGP, attr);
|
|
|
|
e->type = bgp_attr_table[attr].type;
|
|
|
|
e->flags = bgp_attr_table[attr].expected_flags;
|
|
|
|
if (e->type & EAF_EMBEDDED)
|
|
|
|
{
|
|
|
|
e->u.data = val;
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
e->u.ptr = lp_alloc(pool, sizeof(struct adata) + val);
|
|
|
|
e->u.ptr->length = val;
|
|
|
|
return e->u.ptr->data;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2000-04-17 09:37:31 +00:00
|
|
|
byte *
|
2000-05-04 20:02:56 +00:00
|
|
|
bgp_attach_attr(ea_list **to, struct linpool *pool, unsigned attr, unsigned val)
|
|
|
|
{
|
|
|
|
ea_list *a = lp_alloc(pool, sizeof(ea_list) + sizeof(eattr));
|
|
|
|
a->next = *to;
|
|
|
|
*to = a;
|
|
|
|
a->flags = EALF_SORTED;
|
|
|
|
a->count = 1;
|
|
|
|
return bgp_set_attr(a->attrs, pool, attr, val);
|
|
|
|
}
|
|
|
|
|
|
|
|
unsigned int
|
|
|
|
bgp_encode_attrs(byte *w, ea_list *attrs, int remains)
|
2000-04-17 09:37:31 +00:00
|
|
|
{
|
|
|
|
unsigned int i, code, flags;
|
|
|
|
byte *start = w;
|
|
|
|
int len;
|
|
|
|
|
2000-05-04 20:02:56 +00:00
|
|
|
for(i=0; i<attrs->count; i++)
|
2000-04-17 09:37:31 +00:00
|
|
|
{
|
2000-05-04 20:02:56 +00:00
|
|
|
eattr *a = &attrs->attrs[i];
|
2000-04-17 09:37:31 +00:00
|
|
|
ASSERT(EA_PROTO(a->id) == EAP_BGP);
|
|
|
|
code = EA_ID(a->id);
|
2000-05-04 20:02:56 +00:00
|
|
|
#ifdef IPV6
|
|
|
|
/* When talking multiprotocol BGP, the NEXT_HOP attributes are used only temporarily. */
|
|
|
|
if (code == BA_NEXT_HOP)
|
|
|
|
continue;
|
|
|
|
#endif
|
2000-04-17 11:25:15 +00:00
|
|
|
flags = a->flags & (BAF_OPTIONAL | BAF_TRANSITIVE | BAF_PARTIAL);
|
2000-05-02 12:51:39 +00:00
|
|
|
if (ATTR_KNOWN(code))
|
2000-04-17 09:37:31 +00:00
|
|
|
{
|
|
|
|
struct attr_desc *desc = &bgp_attr_table[code];
|
|
|
|
len = desc->expected_length;
|
|
|
|
if (len < 0)
|
|
|
|
{
|
|
|
|
ASSERT(!(a->type & EAF_EMBEDDED));
|
|
|
|
len = a->u.ptr->length;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
ASSERT((a->type & EAF_TYPE_MASK) == EAF_TYPE_OPAQUE);
|
|
|
|
len = a->u.ptr->length;
|
|
|
|
}
|
2000-04-17 11:25:15 +00:00
|
|
|
DBG("\tAttribute %02x (type %02x, %d bytes, flags %02x)\n", code, a->type, len, flags);
|
2000-04-17 09:37:31 +00:00
|
|
|
if (remains < len + 4)
|
|
|
|
{
|
|
|
|
log(L_ERR "BGP: attribute list too long, ignoring the remaining attributes");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (len < 256)
|
|
|
|
{
|
|
|
|
*w++ = flags;
|
|
|
|
*w++ = code;
|
|
|
|
*w++ = len;
|
|
|
|
remains -= 3;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
*w++ = flags | BAF_EXT_LEN;
|
|
|
|
*w++ = code;
|
|
|
|
put_u16(w, len);
|
|
|
|
w += 2;
|
|
|
|
remains -= 4;
|
|
|
|
}
|
|
|
|
switch (a->type & EAF_TYPE_MASK)
|
|
|
|
{
|
|
|
|
case EAF_TYPE_INT:
|
|
|
|
case EAF_TYPE_ROUTER_ID:
|
|
|
|
if (len == 4)
|
|
|
|
put_u32(w, a->u.data);
|
|
|
|
else
|
|
|
|
*w = a->u.data;
|
|
|
|
break;
|
|
|
|
case EAF_TYPE_IP_ADDRESS:
|
|
|
|
{
|
|
|
|
ip_addr ip = *(ip_addr *)a->u.ptr->data;
|
|
|
|
ipa_hton(ip);
|
|
|
|
memcpy(w, &ip, len);
|
|
|
|
break;
|
|
|
|
}
|
2000-04-17 10:19:15 +00:00
|
|
|
case EAF_TYPE_INT_SET:
|
|
|
|
{
|
|
|
|
u32 *z = (u32 *)a->u.ptr->data;
|
|
|
|
int i;
|
|
|
|
for(i=0; i<len; i+=4)
|
|
|
|
put_u32(w+i, *z++);
|
|
|
|
break;
|
|
|
|
}
|
2000-04-17 09:37:31 +00:00
|
|
|
case EAF_TYPE_OPAQUE:
|
|
|
|
case EAF_TYPE_AS_PATH:
|
|
|
|
memcpy(w, a->u.ptr->data, len);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
bug("bgp_encode_attrs: unknown attribute type %02x", a->type);
|
|
|
|
}
|
|
|
|
remains -= len;
|
|
|
|
w += len;
|
|
|
|
}
|
2000-05-04 20:02:56 +00:00
|
|
|
return w - start;
|
2000-04-17 09:37:31 +00:00
|
|
|
}
|
2000-04-10 12:39:51 +00:00
|
|
|
|
2000-04-12 14:09:26 +00:00
|
|
|
static void
|
|
|
|
bgp_init_prefix(struct fib_node *N)
|
|
|
|
{
|
|
|
|
struct bgp_prefix *p = (struct bgp_prefix *) N;
|
2000-04-17 09:37:31 +00:00
|
|
|
p->bucket_node.next = NULL;
|
2000-04-12 14:09:26 +00:00
|
|
|
}
|
|
|
|
|
2000-04-17 11:25:15 +00:00
|
|
|
static int
|
|
|
|
bgp_compare_u32(const u32 *x, const u32 *y)
|
|
|
|
{
|
|
|
|
return (*x < *y) ? -1 : (*x > *y) ? 1 : 0;
|
|
|
|
}
|
|
|
|
|
2000-04-10 12:39:51 +00:00
|
|
|
static void
|
|
|
|
bgp_normalize_set(u32 *dest, u32 *src, unsigned cnt)
|
|
|
|
{
|
|
|
|
memcpy(dest, src, sizeof(u32) * cnt);
|
2000-04-17 11:25:15 +00:00
|
|
|
qsort(dest, cnt, sizeof(u32), (int(*)(const void *, const void *)) bgp_compare_u32);
|
2000-04-10 12:39:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
bgp_rehash_buckets(struct bgp_proto *p)
|
|
|
|
{
|
2000-04-12 14:09:26 +00:00
|
|
|
struct bgp_bucket **old = p->bucket_hash;
|
2000-04-10 12:39:51 +00:00
|
|
|
struct bgp_bucket **new;
|
|
|
|
unsigned oldn = p->hash_size;
|
|
|
|
unsigned i, e, mask;
|
|
|
|
struct bgp_bucket *b;
|
|
|
|
|
|
|
|
p->hash_size = p->hash_limit;
|
|
|
|
DBG("BGP: Rehashing bucket table from %d to %d\n", oldn, p->hash_size);
|
|
|
|
p->hash_limit *= 4;
|
|
|
|
if (p->hash_limit >= 65536)
|
|
|
|
p->hash_limit = ~0;
|
2000-04-12 14:09:26 +00:00
|
|
|
new = p->bucket_hash = mb_allocz(p->p.pool, p->hash_size * sizeof(struct bgp_bucket *));
|
2000-04-10 12:39:51 +00:00
|
|
|
mask = p->hash_size - 1;
|
|
|
|
for (i=0; i<oldn; i++)
|
|
|
|
while (b = old[i])
|
|
|
|
{
|
2000-04-12 14:09:26 +00:00
|
|
|
old[i] = b->hash_next;
|
2000-04-10 12:39:51 +00:00
|
|
|
e = b->hash & mask;
|
2000-04-12 14:09:26 +00:00
|
|
|
b->hash_next = new[e];
|
|
|
|
if (b->hash_next)
|
|
|
|
b->hash_next->hash_prev = b;
|
|
|
|
b->hash_prev = NULL;
|
2000-04-10 12:39:51 +00:00
|
|
|
new[e] = b;
|
|
|
|
}
|
|
|
|
mb_free(old);
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct bgp_bucket *
|
|
|
|
bgp_new_bucket(struct bgp_proto *p, ea_list *new, unsigned hash)
|
|
|
|
{
|
|
|
|
struct bgp_bucket *b;
|
|
|
|
unsigned ea_size = sizeof(ea_list) + new->count * sizeof(eattr);
|
|
|
|
unsigned ea_size_aligned = ALIGN(ea_size, CPU_STRUCT_ALIGN);
|
|
|
|
unsigned size = sizeof(struct bgp_bucket) + ea_size;
|
|
|
|
unsigned i;
|
|
|
|
byte *dest;
|
|
|
|
unsigned index = hash & (p->hash_size - 1);
|
|
|
|
|
|
|
|
/* Gather total size of non-inline attributes */
|
|
|
|
for (i=0; i<new->count; i++)
|
|
|
|
{
|
|
|
|
eattr *a = &new->attrs[i];
|
|
|
|
if (!(a->type & EAF_EMBEDDED))
|
|
|
|
size += ALIGN(sizeof(struct adata) + a->u.ptr->length, CPU_STRUCT_ALIGN);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Create the bucket and hash it */
|
|
|
|
b = mb_alloc(p->p.pool, size);
|
2000-04-12 14:09:26 +00:00
|
|
|
b->hash_next = p->bucket_hash[index];
|
|
|
|
if (b->hash_next)
|
|
|
|
b->hash_next->hash_prev = b;
|
|
|
|
p->bucket_hash[index] = b;
|
|
|
|
b->hash_prev = NULL;
|
2000-04-10 12:39:51 +00:00
|
|
|
b->hash = hash;
|
2000-04-17 09:37:31 +00:00
|
|
|
add_tail(&p->bucket_queue, &b->send_node);
|
|
|
|
init_list(&b->prefixes);
|
2000-04-10 12:39:51 +00:00
|
|
|
memcpy(b->eattrs, new, ea_size);
|
|
|
|
dest = ((byte *)b->eattrs) + ea_size_aligned;
|
|
|
|
|
|
|
|
/* Copy values of non-inline attributes */
|
|
|
|
for (i=0; i<new->count; i++)
|
|
|
|
{
|
2000-05-02 16:07:41 +00:00
|
|
|
eattr *a = &b->eattrs->attrs[i];
|
2000-04-10 12:39:51 +00:00
|
|
|
if (!(a->type & EAF_EMBEDDED))
|
|
|
|
{
|
|
|
|
struct adata *oa = a->u.ptr;
|
|
|
|
struct adata *na = (struct adata *) dest;
|
|
|
|
memcpy(na, oa, sizeof(struct adata) + oa->length);
|
|
|
|
a->u.ptr = na;
|
2000-05-02 16:07:41 +00:00
|
|
|
dest += ALIGN(sizeof(struct adata) + na->length, CPU_STRUCT_ALIGN);
|
2000-04-10 12:39:51 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* If needed, rehash */
|
|
|
|
p->hash_count++;
|
|
|
|
if (p->hash_count > p->hash_limit)
|
|
|
|
bgp_rehash_buckets(p);
|
|
|
|
|
|
|
|
return b;
|
|
|
|
}
|
|
|
|
|
2000-04-17 13:13:08 +00:00
|
|
|
static int
|
|
|
|
bgp_export_check(struct bgp_proto *p, ea_list *new)
|
|
|
|
{
|
|
|
|
eattr *a;
|
|
|
|
struct adata *d;
|
|
|
|
|
|
|
|
/* Check if next hop is valid */
|
|
|
|
a = ea_find(new, EA_CODE(EAP_BGP, BA_NEXT_HOP));
|
|
|
|
if (!a || ipa_equal(p->next_hop, *(ip_addr *)a->u.ptr))
|
|
|
|
{
|
|
|
|
DBG("\tInvalid NEXT_HOP\n");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check if we aren't forbidden to export the route by communities */
|
|
|
|
a = ea_find(new, EA_CODE(EAP_BGP, BA_COMMUNITY));
|
|
|
|
if (a)
|
|
|
|
{
|
|
|
|
d = a->u.ptr;
|
|
|
|
if (int_set_contains(d, BGP_COMM_NO_ADVERTISE))
|
|
|
|
{
|
|
|
|
DBG("\tNO_ADVERTISE\n");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (!p->is_internal &&
|
|
|
|
(int_set_contains(d, BGP_COMM_NO_EXPORT) ||
|
|
|
|
int_set_contains(d, BGP_COMM_NO_EXPORT_SUBCONFED)))
|
|
|
|
{
|
|
|
|
DBG("\tNO_EXPORT\n");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2000-04-10 12:39:51 +00:00
|
|
|
static struct bgp_bucket *
|
2000-04-17 11:25:15 +00:00
|
|
|
bgp_get_bucket(struct bgp_proto *p, ea_list *old, ea_list *tmp, int originate)
|
2000-04-10 12:39:51 +00:00
|
|
|
{
|
|
|
|
ea_list *t, *new;
|
2000-04-17 12:46:07 +00:00
|
|
|
unsigned i, cnt, hash, code;
|
2000-04-10 12:39:51 +00:00
|
|
|
eattr *a, *d;
|
|
|
|
u32 seen = 0;
|
|
|
|
struct bgp_bucket *b;
|
|
|
|
|
|
|
|
/* Merge the attribute lists */
|
2000-04-26 13:26:31 +00:00
|
|
|
if (tmp)
|
|
|
|
{
|
|
|
|
for(t=tmp; t->next; t=t->next)
|
|
|
|
;
|
|
|
|
t->next = old;
|
|
|
|
new = alloca(ea_scan(tmp));
|
|
|
|
ea_merge(tmp, new);
|
|
|
|
t->next = NULL;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
new = alloca(ea_scan(old));
|
|
|
|
ea_merge(old, new);
|
|
|
|
}
|
2000-04-21 13:01:28 +00:00
|
|
|
ea_sort(new);
|
2000-04-10 12:39:51 +00:00
|
|
|
|
|
|
|
/* Normalize attributes */
|
|
|
|
d = new->attrs;
|
|
|
|
cnt = new->count;
|
|
|
|
new->count = 0;
|
|
|
|
for(i=0; i<cnt; i++)
|
|
|
|
{
|
|
|
|
a = &new->attrs[i];
|
|
|
|
#ifdef LOCAL_DEBUG
|
|
|
|
{
|
2000-04-17 10:19:15 +00:00
|
|
|
byte buf[EA_FORMAT_BUF_SIZE];
|
2000-04-10 12:39:51 +00:00
|
|
|
ea_format(a, buf);
|
|
|
|
DBG("\t%s\n", buf);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
if (EA_PROTO(a->id) != EAP_BGP)
|
|
|
|
continue;
|
2000-04-17 12:46:07 +00:00
|
|
|
code = EA_ID(a->id);
|
2000-05-02 12:51:39 +00:00
|
|
|
if (ATTR_KNOWN(code))
|
2000-04-17 12:46:07 +00:00
|
|
|
{
|
|
|
|
if (!bgp_attr_table[code].allow_in_ebgp && !p->is_internal)
|
|
|
|
continue;
|
2000-04-25 21:21:52 +00:00
|
|
|
/* The flags might have been zero if the attr was added by filters */
|
|
|
|
a->flags = (a->flags & BAF_PARTIAL) | bgp_attr_table[code].expected_flags;
|
2000-05-02 12:51:39 +00:00
|
|
|
if (code < 32)
|
|
|
|
seen |= 1 << code;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Don't re-export unknown non-transitive attributes */
|
|
|
|
if (!(a->flags & BAF_TRANSITIVE))
|
|
|
|
continue;
|
2000-04-17 12:46:07 +00:00
|
|
|
}
|
2000-04-10 12:39:51 +00:00
|
|
|
*d = *a;
|
2000-04-17 11:25:15 +00:00
|
|
|
if ((d->type & EAF_ORIGINATED) && !originate && (d->flags & BAF_TRANSITIVE) && (d->flags & BAF_OPTIONAL))
|
|
|
|
d->flags |= BAF_PARTIAL;
|
2000-04-10 12:39:51 +00:00
|
|
|
switch (d->type & EAF_TYPE_MASK)
|
|
|
|
{
|
2000-04-17 11:25:15 +00:00
|
|
|
case EAF_TYPE_INT_SET:
|
2000-04-10 12:39:51 +00:00
|
|
|
{
|
|
|
|
struct adata *z = alloca(sizeof(struct adata) + d->u.ptr->length);
|
|
|
|
z->length = d->u.ptr->length;
|
|
|
|
bgp_normalize_set((u32 *) z->data, (u32 *) d->u.ptr->data, z->length / 4);
|
|
|
|
d->u.ptr = z;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
}
|
|
|
|
d++;
|
|
|
|
new->count++;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Hash */
|
|
|
|
hash = ea_hash(new);
|
2000-04-12 14:09:26 +00:00
|
|
|
for(b=p->bucket_hash[hash & (p->hash_size - 1)]; b; b=b->hash_next)
|
2000-04-10 12:39:51 +00:00
|
|
|
if (b->hash == hash && ea_same(b->eattrs, new))
|
|
|
|
{
|
|
|
|
DBG("Found bucket.\n");
|
|
|
|
return b;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Ensure that there are all mandatory attributes */
|
2000-04-12 13:21:23 +00:00
|
|
|
for(i=0; i<ARRAY_SIZE(bgp_mandatory_attrs); i++)
|
2000-04-10 12:39:51 +00:00
|
|
|
if (!(seen & (1 << bgp_mandatory_attrs[i])))
|
|
|
|
{
|
|
|
|
log(L_ERR "%s: Mandatory attribute %s missing", p->p.name, bgp_attr_table[bgp_mandatory_attrs[i]].name);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2000-04-17 13:13:08 +00:00
|
|
|
if (!bgp_export_check(p, new))
|
2000-04-17 09:37:31 +00:00
|
|
|
return NULL;
|
|
|
|
|
2000-04-10 12:39:51 +00:00
|
|
|
/* Create new bucket */
|
|
|
|
DBG("Creating bucket.\n");
|
|
|
|
return bgp_new_bucket(p, new, hash);
|
|
|
|
}
|
|
|
|
|
2000-04-17 09:37:31 +00:00
|
|
|
void
|
|
|
|
bgp_free_bucket(struct bgp_proto *p, struct bgp_bucket *buck)
|
|
|
|
{
|
|
|
|
if (buck->hash_next)
|
|
|
|
buck->hash_next->hash_prev = buck->hash_prev;
|
|
|
|
if (buck->hash_prev)
|
|
|
|
buck->hash_prev->hash_next = buck->hash_next;
|
|
|
|
else
|
|
|
|
p->bucket_hash[buck->hash & (p->hash_size-1)] = buck->hash_next;
|
|
|
|
mb_free(buck);
|
|
|
|
}
|
|
|
|
|
2000-04-09 22:05:02 +00:00
|
|
|
void
|
|
|
|
bgp_rt_notify(struct proto *P, net *n, rte *new, rte *old, ea_list *tmpa)
|
|
|
|
{
|
2000-04-10 12:39:51 +00:00
|
|
|
struct bgp_proto *p = (struct bgp_proto *) P;
|
2000-04-17 09:37:31 +00:00
|
|
|
struct bgp_bucket *buck;
|
|
|
|
struct bgp_prefix *px;
|
2000-04-10 12:39:51 +00:00
|
|
|
|
2000-04-17 09:37:31 +00:00
|
|
|
DBG("BGP: Got route %I/%d %s\n", n->n.prefix, n->n.pxlen, new ? "up" : "down");
|
2000-04-10 12:39:51 +00:00
|
|
|
|
|
|
|
if (new)
|
|
|
|
{
|
2000-04-17 11:25:15 +00:00
|
|
|
buck = bgp_get_bucket(p, new->attrs->eattrs, tmpa, new->attrs->source != RTS_BGP);
|
2000-04-10 12:39:51 +00:00
|
|
|
if (!buck) /* Inconsistent attribute list */
|
|
|
|
return;
|
|
|
|
}
|
2000-04-17 09:37:31 +00:00
|
|
|
else
|
|
|
|
{
|
|
|
|
if (!(buck = p->withdraw_bucket))
|
|
|
|
{
|
|
|
|
buck = p->withdraw_bucket = mb_alloc(P->pool, sizeof(struct bgp_bucket));
|
|
|
|
init_list(&buck->prefixes);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
px = fib_get(&p->prefix_fib, &n->n.prefix, n->n.pxlen);
|
|
|
|
if (px->bucket_node.next)
|
|
|
|
{
|
|
|
|
DBG("\tRemoving old entry.\n");
|
|
|
|
rem_node(&px->bucket_node);
|
|
|
|
}
|
|
|
|
add_tail(&buck->prefixes, &px->bucket_node);
|
|
|
|
bgp_schedule_packet(p->conn, PKT_UPDATE);
|
2000-04-09 22:05:02 +00:00
|
|
|
}
|
|
|
|
|
2000-04-10 11:21:40 +00:00
|
|
|
static int
|
|
|
|
bgp_create_attrs(struct bgp_proto *p, rte *e, ea_list **attrs, struct linpool *pool)
|
2000-04-09 22:05:02 +00:00
|
|
|
{
|
2000-04-21 13:01:28 +00:00
|
|
|
ea_list *ea = lp_alloc(pool, sizeof(ea_list) + 4*sizeof(eattr));
|
2000-04-09 22:05:02 +00:00
|
|
|
rta *rta = e->attrs;
|
2000-05-04 20:02:56 +00:00
|
|
|
byte *z;
|
2000-04-09 22:05:02 +00:00
|
|
|
|
2000-04-10 11:21:40 +00:00
|
|
|
ea->next = *attrs;
|
|
|
|
*attrs = ea;
|
2000-04-09 22:05:02 +00:00
|
|
|
ea->flags = EALF_SORTED;
|
2000-04-21 13:01:28 +00:00
|
|
|
ea->count = 4;
|
2000-04-09 22:05:02 +00:00
|
|
|
|
2000-05-04 20:02:56 +00:00
|
|
|
bgp_set_attr(ea->attrs, pool, BA_ORIGIN,
|
2000-05-04 21:23:10 +00:00
|
|
|
(rta->source == RTS_OSPF_EXT) ? ORIGIN_INCOMPLETE : ORIGIN_IGP);
|
2000-04-09 22:05:02 +00:00
|
|
|
|
|
|
|
if (p->is_internal)
|
2000-05-04 20:02:56 +00:00
|
|
|
bgp_set_attr(ea->attrs+1, pool, BA_AS_PATH, 0);
|
2000-04-09 22:05:02 +00:00
|
|
|
else
|
|
|
|
{
|
2000-05-04 20:02:56 +00:00
|
|
|
z = bgp_set_attr(ea->attrs+1, pool, BA_AS_PATH, 4);
|
2000-04-21 13:01:28 +00:00
|
|
|
z[0] = AS_PATH_SEQUENCE;
|
2000-04-09 22:05:02 +00:00
|
|
|
z[1] = 1; /* 1 AS */
|
|
|
|
put_u16(z+2, p->local_as);
|
|
|
|
}
|
|
|
|
|
2000-05-04 20:02:56 +00:00
|
|
|
z = bgp_set_attr(ea->attrs+2, pool, BA_NEXT_HOP, sizeof(ip_addr));
|
2000-04-10 11:21:40 +00:00
|
|
|
if (p->cf->next_hop_self ||
|
|
|
|
!p->is_internal ||
|
|
|
|
rta->dest != RTD_ROUTER)
|
2000-05-04 20:02:56 +00:00
|
|
|
*(ip_addr *)z = p->local_addr;
|
2000-04-09 22:05:02 +00:00
|
|
|
else
|
2000-05-04 20:02:56 +00:00
|
|
|
*(ip_addr *)z = e->attrs->gw;
|
2000-04-21 13:01:28 +00:00
|
|
|
|
2000-05-04 20:02:56 +00:00
|
|
|
bgp_set_attr(ea->attrs+3, pool, BA_LOCAL_PREF, 0);
|
2000-04-09 22:05:02 +00:00
|
|
|
|
2000-04-10 11:21:40 +00:00
|
|
|
return 0; /* Leave decision to the filters */
|
2000-04-09 22:05:02 +00:00
|
|
|
}
|
|
|
|
|
2000-04-12 14:12:37 +00:00
|
|
|
static ea_list *
|
|
|
|
bgp_path_prepend(struct linpool *pool, eattr *a, ea_list *old, int as)
|
|
|
|
{
|
|
|
|
struct ea_list *e = lp_alloc(pool, sizeof(ea_list) + sizeof(eattr));
|
|
|
|
struct adata *olda = a->u.ptr;
|
|
|
|
|
|
|
|
e->next = old;
|
|
|
|
e->flags = EALF_SORTED;
|
|
|
|
e->count = 1;
|
|
|
|
e->attrs[0].id = EA_CODE(EAP_BGP, BA_AS_PATH);
|
|
|
|
e->attrs[0].flags = BAF_TRANSITIVE;
|
|
|
|
e->attrs[0].type = EAF_TYPE_AS_PATH;
|
2000-04-12 14:14:47 +00:00
|
|
|
e->attrs[0].u.ptr = as_path_prepend(pool, olda, as);
|
2000-04-09 22:05:02 +00:00
|
|
|
return e;
|
|
|
|
}
|
|
|
|
|
2000-04-10 11:21:40 +00:00
|
|
|
static int
|
|
|
|
bgp_update_attrs(struct bgp_proto *p, rte *e, ea_list **attrs, struct linpool *pool)
|
2000-04-09 22:05:02 +00:00
|
|
|
{
|
2000-04-10 11:21:40 +00:00
|
|
|
eattr *a;
|
|
|
|
|
2000-05-04 20:02:56 +00:00
|
|
|
if (!p->is_internal && (a = ea_find(e->attrs->eattrs, EA_CODE(EAP_BGP, BA_AS_PATH))))
|
|
|
|
*attrs = bgp_path_prepend(pool, a, *attrs, p->local_as);
|
2000-04-09 22:05:02 +00:00
|
|
|
|
2000-04-10 11:21:40 +00:00
|
|
|
a = ea_find(e->attrs->eattrs, EA_CODE(EAP_BGP, BA_NEXT_HOP));
|
|
|
|
if (a && (p->is_internal || (!p->is_internal && e->attrs->iface == p->neigh->iface)))
|
|
|
|
{
|
|
|
|
/* Leave the original next hop attribute, will check later where does it point */
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Need to create new one */
|
2000-05-04 20:02:56 +00:00
|
|
|
*(ip_addr *) bgp_attach_attr(attrs, pool, BA_NEXT_HOP, sizeof(ip_addr)) = p->local_addr;
|
2000-04-10 11:21:40 +00:00
|
|
|
}
|
2000-04-09 22:05:02 +00:00
|
|
|
|
2000-04-10 11:21:40 +00:00
|
|
|
return 0; /* Leave decision to the filters */
|
2000-04-09 22:05:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
bgp_import_control(struct proto *P, rte **new, ea_list **attrs, struct linpool *pool)
|
|
|
|
{
|
|
|
|
rte *e = *new;
|
|
|
|
struct bgp_proto *p = (struct bgp_proto *) P;
|
|
|
|
struct bgp_proto *new_bgp = (e->attrs->proto->proto == &proto_bgp) ? (struct bgp_proto *) e->attrs->proto : NULL;
|
|
|
|
|
2000-04-10 11:21:40 +00:00
|
|
|
if (p == new_bgp) /* Poison reverse updates */
|
2000-04-09 22:05:02 +00:00
|
|
|
return -1;
|
|
|
|
if (new_bgp)
|
|
|
|
{
|
|
|
|
if (p->local_as == new_bgp->local_as && p->is_internal && new_bgp->is_internal)
|
|
|
|
return -1; /* Don't redistribute internal routes with IBGP */
|
2000-04-10 11:21:40 +00:00
|
|
|
return bgp_update_attrs(p, e, attrs, pool);
|
2000-04-09 22:05:02 +00:00
|
|
|
}
|
|
|
|
else
|
2000-04-10 11:21:40 +00:00
|
|
|
return bgp_create_attrs(p, e, attrs, pool);
|
2000-04-09 22:05:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
bgp_rte_better(rte *new, rte *old)
|
|
|
|
{
|
|
|
|
struct bgp_proto *new_bgp = (struct bgp_proto *) new->attrs->proto;
|
|
|
|
struct bgp_proto *old_bgp = (struct bgp_proto *) old->attrs->proto;
|
2000-04-17 12:46:07 +00:00
|
|
|
eattr *x, *y;
|
|
|
|
u32 n, o;
|
2000-04-09 22:05:02 +00:00
|
|
|
|
|
|
|
/* Start with local preferences */
|
2000-04-17 12:46:07 +00:00
|
|
|
x = ea_find(new->attrs->eattrs, EA_CODE(EAP_BGP, BA_LOCAL_PREF));
|
|
|
|
y = ea_find(old->attrs->eattrs, EA_CODE(EAP_BGP, BA_LOCAL_PREF));
|
|
|
|
n = x ? x->u.data : new_bgp->cf->default_local_pref;
|
|
|
|
o = y ? y->u.data : old_bgp->cf->default_local_pref;
|
|
|
|
if (n > o)
|
|
|
|
return 1;
|
|
|
|
if (n < o)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* Use AS path lengths */
|
|
|
|
if (new_bgp->cf->compare_path_lengths || old_bgp->cf->compare_path_lengths)
|
2000-04-09 22:05:02 +00:00
|
|
|
{
|
2000-04-17 12:46:07 +00:00
|
|
|
x = ea_find(new->attrs->eattrs, EA_CODE(EAP_BGP, BA_AS_PATH));
|
|
|
|
y = ea_find(old->attrs->eattrs, EA_CODE(EAP_BGP, BA_AS_PATH));
|
|
|
|
n = x ? as_path_getlen(x->u.ptr) : 100000;
|
|
|
|
o = y ? as_path_getlen(y->u.ptr) : 100000;
|
|
|
|
if (n < o)
|
2000-04-09 22:05:02 +00:00
|
|
|
return 1;
|
2000-04-17 12:46:07 +00:00
|
|
|
if (n > o)
|
2000-04-09 22:05:02 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-04-17 12:46:07 +00:00
|
|
|
/* Use origins */
|
|
|
|
x = ea_find(new->attrs->eattrs, EA_CODE(EAP_BGP, BA_ORIGIN));
|
|
|
|
y = ea_find(old->attrs->eattrs, EA_CODE(EAP_BGP, BA_ORIGIN));
|
2000-04-28 15:13:29 +00:00
|
|
|
n = x ? x->u.data : ORIGIN_INCOMPLETE;
|
|
|
|
o = y ? y->u.data : ORIGIN_INCOMPLETE;
|
2000-04-17 12:46:07 +00:00
|
|
|
if (n < o)
|
|
|
|
return 1;
|
|
|
|
if (n > o)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* Compare MED's */
|
|
|
|
x = ea_find(new->attrs->eattrs, EA_CODE(EAP_BGP, BA_MULTI_EXIT_DISC));
|
|
|
|
y = ea_find(old->attrs->eattrs, EA_CODE(EAP_BGP, BA_MULTI_EXIT_DISC));
|
|
|
|
n = x ? x->u.data : new_bgp->cf->default_med;
|
|
|
|
o = y ? y->u.data : old_bgp->cf->default_med;
|
|
|
|
if (n < o)
|
|
|
|
return 1;
|
|
|
|
if (n > o)
|
|
|
|
return 0;
|
|
|
|
|
2000-04-09 22:05:02 +00:00
|
|
|
/* A tie breaking procedure according to RFC 1771, section 9.1.2.1 */
|
|
|
|
/* We don't have interior distances */
|
|
|
|
/* We prefer external peers */
|
|
|
|
if (new_bgp->is_internal > old_bgp->is_internal)
|
|
|
|
return 0;
|
|
|
|
if (new_bgp->is_internal < old_bgp->is_internal)
|
|
|
|
return 1;
|
|
|
|
/* Finally we compare BGP identifiers */
|
|
|
|
return (new_bgp->remote_id < old_bgp->remote_id);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
bgp_path_loopy(struct bgp_proto *p, eattr *a)
|
|
|
|
{
|
|
|
|
byte *path = a->u.ptr->data;
|
|
|
|
int len = a->u.ptr->length;
|
|
|
|
int i, n;
|
|
|
|
|
|
|
|
while (len > 0)
|
|
|
|
{
|
|
|
|
n = path[1];
|
2000-04-26 13:26:31 +00:00
|
|
|
len -= 2 + 2*n;
|
2000-04-09 22:05:02 +00:00
|
|
|
path += 2;
|
|
|
|
for(i=0; i<n; i++)
|
|
|
|
{
|
|
|
|
if (get_u16(path) == p->local_as)
|
|
|
|
return 1;
|
|
|
|
path += 2;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-03-31 23:21:37 +00:00
|
|
|
struct rta *
|
2000-04-21 12:25:35 +00:00
|
|
|
bgp_decode_attrs(struct bgp_conn *conn, byte *attr, unsigned int len, struct linpool *pool, int mandatory)
|
2000-03-31 23:21:37 +00:00
|
|
|
{
|
|
|
|
struct bgp_proto *bgp = conn->bgp;
|
|
|
|
rta *a = lp_alloc(pool, sizeof(struct rta));
|
2000-04-09 22:05:02 +00:00
|
|
|
unsigned int flags, code, l, i, type;
|
|
|
|
int errcode;
|
2000-03-31 23:21:37 +00:00
|
|
|
byte *z, *attr_start;
|
|
|
|
byte seen[256/8];
|
|
|
|
eattr *e;
|
|
|
|
ea_list *ea;
|
|
|
|
struct adata *ad;
|
|
|
|
|
|
|
|
a->proto = &bgp->p;
|
|
|
|
a->source = RTS_BGP;
|
|
|
|
a->scope = SCOPE_UNIVERSE;
|
|
|
|
a->cast = RTC_UNICAST;
|
|
|
|
a->dest = RTD_ROUTER;
|
|
|
|
a->flags = 0;
|
|
|
|
a->aflags = 0;
|
|
|
|
a->from = bgp->cf->remote_ip;
|
|
|
|
a->eattrs = NULL;
|
|
|
|
|
|
|
|
/* Parse the attributes */
|
|
|
|
bzero(seen, sizeof(seen));
|
|
|
|
DBG("BGP: Parsing attributes\n");
|
|
|
|
while (len)
|
|
|
|
{
|
|
|
|
if (len < 2)
|
|
|
|
goto malformed;
|
|
|
|
attr_start = attr;
|
|
|
|
flags = *attr++;
|
|
|
|
code = *attr++;
|
|
|
|
len -= 2;
|
|
|
|
if (flags & BAF_EXT_LEN)
|
|
|
|
{
|
|
|
|
if (len < 2)
|
|
|
|
goto malformed;
|
|
|
|
l = get_u16(attr);
|
|
|
|
attr += 2;
|
|
|
|
len -= 2;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (len < 1)
|
|
|
|
goto malformed;
|
|
|
|
l = *attr++;
|
|
|
|
len--;
|
|
|
|
}
|
|
|
|
if (l > len)
|
|
|
|
goto malformed;
|
|
|
|
len -= l;
|
|
|
|
z = attr;
|
|
|
|
attr += l;
|
|
|
|
DBG("Attr %02x %02x %d\n", code, flags, l);
|
|
|
|
if (seen[code/8] & (1 << (code%8)))
|
|
|
|
goto malformed;
|
2000-05-02 12:51:39 +00:00
|
|
|
if (ATTR_KNOWN(code))
|
2000-03-31 23:21:37 +00:00
|
|
|
{
|
|
|
|
struct attr_desc *desc = &bgp_attr_table[code];
|
|
|
|
if (desc->expected_length >= 0 && desc->expected_length != (int) l)
|
|
|
|
{ errcode = 5; goto err; }
|
|
|
|
if ((desc->expected_flags ^ flags) & (BAF_OPTIONAL | BAF_TRANSITIVE))
|
|
|
|
{ errcode = 4; goto err; }
|
2000-04-17 12:46:07 +00:00
|
|
|
if (!desc->allow_in_ebgp && !bgp->is_internal)
|
|
|
|
continue;
|
2000-04-09 22:05:02 +00:00
|
|
|
if (desc->validate)
|
|
|
|
{
|
|
|
|
errcode = desc->validate(bgp, z, l);
|
|
|
|
if (errcode > 0)
|
|
|
|
goto err;
|
|
|
|
if (errcode < 0)
|
|
|
|
continue;
|
|
|
|
}
|
2000-03-31 23:21:37 +00:00
|
|
|
type = desc->type;
|
|
|
|
}
|
|
|
|
else /* Unknown attribute */
|
2000-04-17 11:25:15 +00:00
|
|
|
{
|
2000-03-31 23:21:37 +00:00
|
|
|
if (!(flags & BAF_OPTIONAL))
|
|
|
|
{ errcode = 2; goto err; }
|
|
|
|
type = EAF_TYPE_OPAQUE;
|
|
|
|
}
|
2000-04-09 22:05:02 +00:00
|
|
|
seen[code/8] |= (1 << (code%8));
|
|
|
|
ea = lp_alloc(pool, sizeof(ea_list) + sizeof(eattr));
|
2000-03-31 23:21:37 +00:00
|
|
|
ea->next = a->eattrs;
|
|
|
|
a->eattrs = ea;
|
|
|
|
ea->flags = 0;
|
|
|
|
ea->count = 1;
|
|
|
|
ea->attrs[0].id = EA_CODE(EAP_BGP, code);
|
|
|
|
ea->attrs[0].flags = flags;
|
|
|
|
ea->attrs[0].type = type;
|
|
|
|
if (type & EAF_EMBEDDED)
|
|
|
|
ad = NULL;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
ad = lp_alloc(pool, sizeof(struct adata) + l);
|
|
|
|
ea->attrs[0].u.ptr = ad;
|
|
|
|
ad->length = l;
|
|
|
|
memcpy(ad->data, z, l);
|
|
|
|
}
|
|
|
|
switch (type)
|
|
|
|
{
|
|
|
|
case EAF_TYPE_ROUTER_ID:
|
|
|
|
case EAF_TYPE_INT:
|
2000-04-01 10:21:11 +00:00
|
|
|
if (l == 1)
|
|
|
|
ea->attrs[0].u.data = *z;
|
|
|
|
else
|
|
|
|
ea->attrs[0].u.data = get_u32(z);
|
2000-03-31 23:21:37 +00:00
|
|
|
break;
|
|
|
|
case EAF_TYPE_IP_ADDRESS:
|
2000-04-17 09:37:31 +00:00
|
|
|
ipa_ntoh(*(ip_addr *)ad->data);
|
2000-03-31 23:21:37 +00:00
|
|
|
break;
|
2000-04-17 10:19:15 +00:00
|
|
|
case EAF_TYPE_INT_SET:
|
|
|
|
{
|
|
|
|
u32 *z = (u32 *) ad->data;
|
|
|
|
for(i=0; i<ad->length/4; i++)
|
|
|
|
z[i] = ntohl(z[i]);
|
|
|
|
break;
|
|
|
|
}
|
2000-03-31 23:21:37 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2000-05-04 09:03:31 +00:00
|
|
|
#ifdef IPV6
|
|
|
|
if (seen[BA_MP_REACH_NLRI / 8] & (1 << (BA_MP_REACH_NLRI % 8)))
|
|
|
|
mandatory = 1;
|
|
|
|
#endif
|
|
|
|
|
2000-03-31 23:21:37 +00:00
|
|
|
/* Check if all mandatory attributes are present */
|
2000-04-21 12:25:35 +00:00
|
|
|
if (mandatory)
|
2000-03-31 23:21:37 +00:00
|
|
|
{
|
2000-04-25 21:13:25 +00:00
|
|
|
for(i=0; i < ARRAY_SIZE(bgp_mandatory_attrs); i++)
|
2000-03-31 23:21:37 +00:00
|
|
|
{
|
2000-04-21 12:25:35 +00:00
|
|
|
code = bgp_mandatory_attrs[i];
|
|
|
|
if (!(seen[code/8] & (1 << (code%8))))
|
|
|
|
{
|
2000-04-25 21:13:25 +00:00
|
|
|
bgp_error(conn, 3, 3, &bgp_mandatory_attrs[i], 1);
|
2000-04-21 12:25:35 +00:00
|
|
|
return NULL;
|
|
|
|
}
|
2000-03-31 23:21:37 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2000-04-09 22:05:02 +00:00
|
|
|
/* If the AS path attribute contains our AS, reject the routes */
|
|
|
|
e = ea_find(a->eattrs, EA_CODE(EAP_BGP, BA_AS_PATH));
|
2000-04-27 22:31:11 +00:00
|
|
|
if (e && bgp_path_loopy(bgp, e))
|
2000-04-17 11:25:15 +00:00
|
|
|
{
|
|
|
|
DBG("BGP: Path loop!\n");
|
|
|
|
return NULL;
|
|
|
|
}
|
2000-04-09 22:05:02 +00:00
|
|
|
|
2000-04-21 13:01:28 +00:00
|
|
|
/* If there's no local preference, define one */
|
|
|
|
if (!(seen[0] && (1 << BA_LOCAL_PREF)))
|
2000-05-04 20:02:56 +00:00
|
|
|
bgp_attach_attr(&a->eattrs, pool, BA_LOCAL_PREF, 0);
|
2000-04-21 12:25:35 +00:00
|
|
|
return a;
|
2000-03-31 23:21:37 +00:00
|
|
|
|
|
|
|
malformed:
|
2000-04-25 21:13:25 +00:00
|
|
|
bgp_error(conn, 3, 1, NULL, 0);
|
2000-03-31 23:21:37 +00:00
|
|
|
return NULL;
|
|
|
|
|
|
|
|
err:
|
2000-04-25 21:13:25 +00:00
|
|
|
bgp_error(conn, 3, errcode, z-2, l+2);
|
2000-03-31 23:21:37 +00:00
|
|
|
return NULL;
|
|
|
|
}
|
2000-04-01 10:21:11 +00:00
|
|
|
|
|
|
|
int
|
|
|
|
bgp_get_attr(eattr *a, byte *buf)
|
|
|
|
{
|
|
|
|
unsigned int i = EA_ID(a->id);
|
|
|
|
struct attr_desc *d;
|
|
|
|
|
2000-05-02 12:51:39 +00:00
|
|
|
if (ATTR_KNOWN(i))
|
2000-04-01 10:21:11 +00:00
|
|
|
{
|
|
|
|
d = &bgp_attr_table[i];
|
|
|
|
buf += bsprintf(buf, "%s", d->name);
|
|
|
|
if (d->format)
|
|
|
|
{
|
|
|
|
*buf++ = ':';
|
|
|
|
*buf++ = ' ';
|
|
|
|
d->format(a, buf);
|
|
|
|
return GA_FULL;
|
|
|
|
}
|
|
|
|
return GA_NAME;
|
|
|
|
}
|
2000-05-02 12:51:39 +00:00
|
|
|
bsprintf(buf, "%02x%s", i, (a->flags & BAF_TRANSITIVE) ? " [t]" : "");
|
2000-04-01 10:21:11 +00:00
|
|
|
return GA_NAME;
|
|
|
|
}
|
2000-04-10 12:39:51 +00:00
|
|
|
|
|
|
|
void
|
|
|
|
bgp_attr_init(struct bgp_proto *p)
|
|
|
|
{
|
|
|
|
p->hash_size = 256;
|
|
|
|
p->hash_limit = p->hash_size * 4;
|
2000-04-12 14:09:26 +00:00
|
|
|
p->bucket_hash = mb_allocz(p->p.pool, p->hash_size * sizeof(struct bgp_bucket *));
|
|
|
|
init_list(&p->bucket_queue);
|
|
|
|
p->withdraw_bucket = NULL;
|
|
|
|
fib_init(&p->prefix_fib, p->p.pool, sizeof(struct bgp_prefix), 0, bgp_init_prefix);
|
2000-04-10 12:39:51 +00:00
|
|
|
}
|