1998-05-15 07:54:32 +00:00
|
|
|
/*
|
2000-06-01 17:12:19 +00:00
|
|
|
* BIRD -- Routing Tables
|
1998-05-15 07:54:32 +00:00
|
|
|
*
|
2000-01-16 16:44:50 +00:00
|
|
|
* (c) 1998--2000 Martin Mares <mj@ucw.cz>
|
1998-05-15 07:54:32 +00:00
|
|
|
*
|
|
|
|
* Can be freely distributed and used under the terms of the GNU GPL.
|
|
|
|
*/
|
|
|
|
|
2000-06-01 17:12:19 +00:00
|
|
|
/**
|
|
|
|
* DOC: Routing tables
|
|
|
|
*
|
|
|
|
* Routing tables are probably the most important structures BIRD uses. They
|
|
|
|
* hold all the information about known networks, the associated routes and
|
|
|
|
* their attributes.
|
|
|
|
*
|
2000-06-08 12:37:21 +00:00
|
|
|
* There are multiple routing tables (a primary one together with any
|
2000-06-01 17:12:19 +00:00
|
|
|
* number of secondary ones if requested by the configuration). Each table
|
|
|
|
* is basically a FIB containing entries describing the individual
|
2000-06-07 13:25:53 +00:00
|
|
|
* destination networks. For each network (represented by structure &net),
|
2000-06-08 12:37:21 +00:00
|
|
|
* there is a one-way linked list of route entries (&rte), the first entry
|
|
|
|
* on the list being the best one (i.e., the one we currently use
|
2000-06-01 17:12:19 +00:00
|
|
|
* for routing), the order of the other ones is undetermined.
|
|
|
|
*
|
2023-01-01 19:10:23 +00:00
|
|
|
* The &rte contains information about the route. There are net and src, which
|
|
|
|
* together forms a key identifying the route in a routing table. There is a
|
|
|
|
* pointer to a &rta structure (see the route attribute module for a precise
|
|
|
|
* explanation) holding the route attributes, which are primary data about the
|
|
|
|
* route. There are several technical fields used by routing table code (route
|
|
|
|
* id, REF_* flags), There is also the pflags field, holding protocol-specific
|
|
|
|
* flags. They are not used by routing table code, but by protocol-specific
|
|
|
|
* hooks. In contrast to route attributes, they are not primary data and their
|
|
|
|
* validity is also limited to the routing table.
|
2021-12-20 19:25:35 +00:00
|
|
|
*
|
|
|
|
* There are several mechanisms that allow automatic update of routes in one
|
|
|
|
* routing table (dst) as a result of changes in another routing table (src).
|
|
|
|
* They handle issues of recursive next hop resolving, flowspec validation and
|
|
|
|
* RPKI validation.
|
|
|
|
*
|
|
|
|
* The first such mechanism is handling of recursive next hops. A route in the
|
|
|
|
* dst table has an indirect next hop address, which is resolved through a route
|
|
|
|
* in the src table (which may also be the same table) to get an immediate next
|
|
|
|
* hop. This is implemented using structure &hostcache attached to the src
|
|
|
|
* table, which contains &hostentry structures for each tracked next hop
|
|
|
|
* address. These structures are linked from recursive routes in dst tables,
|
|
|
|
* possibly multiple routes sharing one hostentry (as many routes may have the
|
|
|
|
* same indirect next hop). There is also a trie in the hostcache, which matches
|
|
|
|
* all prefixes that may influence resolving of tracked next hops.
|
|
|
|
*
|
|
|
|
* When a best route changes in the src table, the hostcache is notified using
|
2022-08-31 12:01:59 +00:00
|
|
|
* an auxiliary export request, which checks using the trie whether the
|
2021-12-20 19:25:35 +00:00
|
|
|
* change is relevant and if it is, then it schedules asynchronous hostcache
|
|
|
|
* recomputation. The recomputation is done by rt_update_hostcache() (called
|
2022-08-31 12:01:59 +00:00
|
|
|
* as an event of src table), it walks through all hostentries and resolves
|
2021-12-20 19:25:35 +00:00
|
|
|
* them (by rt_update_hostentry()). It also updates the trie. If a change in
|
|
|
|
* hostentry resolution was found, then it schedules asynchronous nexthop
|
|
|
|
* recomputation of associated dst table. That is done by rt_next_hop_update()
|
|
|
|
* (called from rt_event() of dst table), it iterates over all routes in the dst
|
|
|
|
* table and re-examines their hostentries for changes. Note that in contrast to
|
|
|
|
* hostcache update, next hop update can be interrupted by main loop. These two
|
|
|
|
* full-table walks (over hostcache and dst table) are necessary due to absence
|
|
|
|
* of direct lookups (route -> affected nexthop, nexthop -> its route).
|
|
|
|
*
|
|
|
|
* The second mechanism is for flowspec validation, where validity of flowspec
|
|
|
|
* routes depends of resolving their network prefixes in IP routing tables. This
|
|
|
|
* is similar to the recursive next hop mechanism, but simpler as there are no
|
|
|
|
* intermediate hostcache and hostentries (because flows are less likely to
|
2022-08-31 14:04:36 +00:00
|
|
|
* share common net prefix than routes sharing a common next hop). Every dst
|
|
|
|
* table has its own export request in every src table. Each dst table has its
|
|
|
|
* own trie of prefixes that may influence validation of flowspec routes in it
|
|
|
|
* (flowspec_trie).
|
2021-12-20 19:25:35 +00:00
|
|
|
*
|
2022-08-31 14:04:36 +00:00
|
|
|
* When a best route changes in the src table, the notification mechanism is
|
|
|
|
* invoked by the export request which checks its dst table's trie to see
|
|
|
|
* whether the change is relevant, and if so, an asynchronous re-validation of
|
2021-12-20 19:25:35 +00:00
|
|
|
* flowspec routes in the dst table is scheduled. That is also done by function
|
|
|
|
* rt_next_hop_update(), like nexthop recomputation above. It iterates over all
|
|
|
|
* flowspec routes and re-validates them. It also recalculates the trie.
|
|
|
|
*
|
|
|
|
* Note that in contrast to the hostcache update, here the trie is recalculated
|
|
|
|
* during the rt_next_hop_update(), which may be interleaved with IP route
|
|
|
|
* updates. The trie is flushed at the beginning of recalculation, which means
|
|
|
|
* that such updates may use partial trie to see if they are relevant. But it
|
|
|
|
* works anyway! Either affected flowspec was already re-validated and added to
|
|
|
|
* the trie, then IP route change would match the trie and trigger a next round
|
|
|
|
* of re-validation, or it was not yet re-validated and added to the trie, but
|
|
|
|
* will be re-validated later in this round anyway.
|
|
|
|
*
|
|
|
|
* The third mechanism is used for RPKI re-validation of IP routes and it is the
|
2022-09-01 08:39:56 +00:00
|
|
|
* simplest. It is also an auxiliary export request belonging to the
|
|
|
|
* appropriate channel, triggering its reload/refeed timer after a settle time.
|
2000-06-01 17:12:19 +00:00
|
|
|
*/
|
|
|
|
|
2000-03-12 21:01:38 +00:00
|
|
|
#undef LOCAL_DEBUG
|
1999-02-13 19:15:28 +00:00
|
|
|
|
1998-05-15 07:54:32 +00:00
|
|
|
#include "nest/bird.h"
|
2023-10-29 15:25:01 +00:00
|
|
|
#include "nest/route.h"
|
1998-05-20 11:54:33 +00:00
|
|
|
#include "nest/protocol.h"
|
1999-12-01 15:10:21 +00:00
|
|
|
#include "nest/iface.h"
|
2022-09-14 23:38:18 +00:00
|
|
|
#include "nest/mpls.h"
|
1998-05-20 11:54:33 +00:00
|
|
|
#include "lib/resource.h"
|
1999-02-13 21:29:01 +00:00
|
|
|
#include "lib/event.h"
|
2021-02-10 02:09:57 +00:00
|
|
|
#include "lib/timer.h"
|
1999-12-01 15:10:21 +00:00
|
|
|
#include "lib/string.h"
|
1999-05-17 20:14:52 +00:00
|
|
|
#include "conf/conf.h"
|
1999-03-17 14:31:26 +00:00
|
|
|
#include "filter/filter.h"
|
2019-02-08 12:38:12 +00:00
|
|
|
#include "filter/data.h"
|
2018-06-27 14:51:53 +00:00
|
|
|
#include "lib/hash.h"
|
2000-03-31 23:30:21 +00:00
|
|
|
#include "lib/string.h"
|
2004-05-31 17:16:47 +00:00
|
|
|
#include "lib/alloca.h"
|
2021-12-20 19:25:35 +00:00
|
|
|
#include "lib/flowspec.h"
|
2022-09-05 10:55:36 +00:00
|
|
|
#include "lib/idm.h"
|
2023-12-08 15:13:14 +00:00
|
|
|
#include "lib/netindex_private.h"
|
2002-11-13 08:47:06 +00:00
|
|
|
|
2019-09-28 12:17:20 +00:00
|
|
|
#ifdef CONFIG_BGP
|
|
|
|
#include "proto/bgp/bgp.h"
|
|
|
|
#endif
|
|
|
|
|
2021-09-27 11:04:16 +00:00
|
|
|
#include <stdatomic.h>
|
|
|
|
|
2010-06-02 20:20:40 +00:00
|
|
|
pool *rt_table_pool;
|
|
|
|
|
2018-11-20 16:38:19 +00:00
|
|
|
list routing_tables;
|
2021-06-21 15:07:31 +00:00
|
|
|
list deleted_routing_tables;
|
2021-09-30 11:50:54 +00:00
|
|
|
|
2023-12-08 15:13:14 +00:00
|
|
|
netindex_hash *rt_global_netindex_hash;
|
|
|
|
|
2022-07-28 11:50:59 +00:00
|
|
|
struct rt_cork rt_cork;
|
|
|
|
|
2021-09-27 11:04:16 +00:00
|
|
|
/* Data structures for export journal */
|
|
|
|
#define RT_PENDING_EXPORT_ITEMS (page_size - sizeof(struct rt_export_block)) / sizeof(struct rt_pending_export)
|
|
|
|
|
|
|
|
struct rt_export_block {
|
|
|
|
node n;
|
|
|
|
_Atomic u32 end;
|
|
|
|
_Atomic _Bool not_last;
|
|
|
|
struct rt_pending_export export[];
|
|
|
|
};
|
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
static void rt_free_hostcache(struct rtable_private *tab);
|
2022-08-31 12:01:59 +00:00
|
|
|
static void rt_update_hostcache(void *tab);
|
2022-09-12 08:25:14 +00:00
|
|
|
static void rt_next_hop_update(struct rtable_private *tab);
|
2022-09-09 11:52:37 +00:00
|
|
|
static void rt_nhu_uncork(void *_tab);
|
2022-05-31 10:51:34 +00:00
|
|
|
static inline void rt_next_hop_resolve_rte(rte *r);
|
2022-06-07 10:18:23 +00:00
|
|
|
static inline void rt_flowspec_resolve_rte(rte *r, struct channel *c);
|
2023-09-14 12:40:33 +00:00
|
|
|
static void rt_refresh_trace(struct rtable_private *tab, struct rt_import_hook *ih, const char *msg);
|
2022-09-07 11:54:20 +00:00
|
|
|
static inline void rt_prune_table(struct rtable_private *tab);
|
|
|
|
static void rt_kick_prune_timer(struct rtable_private *tab);
|
2022-06-22 10:45:42 +00:00
|
|
|
static void rt_feed_by_fib(void *);
|
|
|
|
static void rt_feed_by_trie(void *);
|
2022-06-27 17:53:06 +00:00
|
|
|
static void rt_feed_equal(void *);
|
|
|
|
static void rt_feed_for(void *);
|
2022-09-07 11:54:20 +00:00
|
|
|
static void rt_check_cork_low(struct rtable_private *tab);
|
|
|
|
static void rt_check_cork_high(struct rtable_private *tab);
|
2022-07-28 11:50:59 +00:00
|
|
|
static void rt_cork_release_hook(void *);
|
2022-09-09 11:52:37 +00:00
|
|
|
static void rt_shutdown(void *);
|
2022-09-07 11:54:20 +00:00
|
|
|
static void rt_delete(void *);
|
2021-06-21 15:07:31 +00:00
|
|
|
|
2024-02-09 16:02:44 +00:00
|
|
|
static void rt_export_used(struct rt_exporter *, const char *, const char *);
|
2022-09-07 11:54:20 +00:00
|
|
|
static void rt_export_cleanup(struct rtable_private *tab);
|
2021-09-27 11:04:16 +00:00
|
|
|
|
2023-10-31 08:58:42 +00:00
|
|
|
int rte_same(const rte *x, const rte *y);
|
2022-07-15 12:57:02 +00:00
|
|
|
|
2021-06-21 15:07:31 +00:00
|
|
|
const char *rt_import_state_name_array[TIS_MAX] = {
|
|
|
|
[TIS_DOWN] = "DOWN",
|
|
|
|
[TIS_UP] = "UP",
|
|
|
|
[TIS_STOP] = "STOP",
|
|
|
|
[TIS_FLUSHING] = "FLUSHING",
|
|
|
|
[TIS_WAITING] = "WAITING",
|
|
|
|
[TIS_CLEARED] = "CLEARED",
|
|
|
|
};
|
|
|
|
|
|
|
|
const char *rt_export_state_name_array[TES_MAX] = {
|
|
|
|
[TES_DOWN] = "DOWN",
|
2022-09-20 10:40:23 +00:00
|
|
|
[TES_HUNGRY] = "HUNGRY",
|
2021-06-21 15:07:31 +00:00
|
|
|
[TES_FEEDING] = "FEEDING",
|
|
|
|
[TES_READY] = "READY",
|
|
|
|
[TES_STOP] = "STOP"
|
|
|
|
};
|
|
|
|
|
|
|
|
const char *rt_import_state_name(u8 state)
|
|
|
|
{
|
|
|
|
if (state >= TIS_MAX)
|
|
|
|
return "!! INVALID !!";
|
|
|
|
else
|
|
|
|
return rt_import_state_name_array[state];
|
|
|
|
}
|
|
|
|
|
|
|
|
const char *rt_export_state_name(u8 state)
|
|
|
|
{
|
|
|
|
if (state >= TES_MAX)
|
|
|
|
return "!! INVALID !!";
|
|
|
|
else
|
|
|
|
return rt_export_state_name_array[state];
|
|
|
|
}
|
2014-03-20 13:07:12 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
static struct hostentry *rt_get_hostentry(struct rtable_private *tab, ip_addr a, ip_addr ll, rtable *dep);
|
2000-03-12 20:30:53 +00:00
|
|
|
|
2022-09-12 08:25:14 +00:00
|
|
|
static inline rtable *rt_priv_to_pub(struct rtable_private *tab) { return RT_PUB(tab); }
|
|
|
|
static inline rtable *rt_pub_to_pub(rtable *tab) { return tab; }
|
|
|
|
#define RT_ANY_TO_PUB(tab) _Generic((tab),rtable*:rt_pub_to_pub,struct rtable_private*:rt_priv_to_pub)((tab))
|
|
|
|
|
2022-08-30 17:40:58 +00:00
|
|
|
#define rt_trace(tab, level, fmt, args...) do {\
|
2022-09-12 08:25:14 +00:00
|
|
|
rtable *t = RT_ANY_TO_PUB((tab)); \
|
2022-08-30 17:40:58 +00:00
|
|
|
if (t->config->debug & (level)) \
|
|
|
|
log(L_TRACE "%s: " fmt, t->name, ##args); \
|
|
|
|
} while (0)
|
|
|
|
|
2023-09-24 10:15:26 +00:00
|
|
|
#define req_trace(r, level, fmt, args...) do { \
|
|
|
|
if (r->trace_routes & (level)) \
|
|
|
|
log(L_TRACE "%s: " fmt, r->name, ##args); \
|
|
|
|
} while (0)
|
|
|
|
|
|
|
|
#define channel_trace(c, level, fmt, args...) do {\
|
|
|
|
if ((c->debug & (level)) || (c->proto->debug & (level))) \
|
|
|
|
log(L_TRACE "%s.%s: " fmt, c->proto->name, c->name, ##args);\
|
|
|
|
} while (0)
|
|
|
|
|
2023-12-08 15:13:14 +00:00
|
|
|
static inline net *
|
|
|
|
net_find_valid(struct rtable_private *tab, struct netindex_hash_private *nh, const net_addr *addr)
|
|
|
|
{
|
|
|
|
struct netindex *i = net_find_index_fragile(nh, addr);
|
|
|
|
net *n = i ? net_find(tab, i) : NULL;
|
|
|
|
return (n && n->routes && rte_is_valid(&n->routes->rte)) ? n : NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline net *
|
|
|
|
net_get(struct rtable_private *tab, const struct netindex *i)
|
2021-11-29 18:23:42 +00:00
|
|
|
{
|
2023-12-08 15:13:14 +00:00
|
|
|
/* Expand the routes block if insufficient */
|
|
|
|
u32 nbs = tab->routes_block_size;
|
|
|
|
while (i->index >= nbs)
|
|
|
|
nbs *= 2;
|
|
|
|
|
|
|
|
if (nbs > tab->routes_block_size)
|
|
|
|
{
|
|
|
|
struct network *nb = mb_realloc(tab->routes, sizeof (struct network) * nbs);
|
|
|
|
memset(&nb[tab->routes_block_size], 0, (nbs - tab->routes_block_size) * sizeof (struct network));
|
|
|
|
tab->routes = nb;
|
|
|
|
tab->routes_block_size = nbs;
|
|
|
|
}
|
2021-11-29 18:23:42 +00:00
|
|
|
|
|
|
|
if (tab->trie)
|
2023-12-08 15:13:14 +00:00
|
|
|
trie_add_prefix(tab->trie, i->addr, i->addr->pxlen, i->addr->pxlen);
|
2022-02-03 05:08:51 +00:00
|
|
|
|
|
|
|
if (tab->trie_new)
|
2023-12-08 15:13:14 +00:00
|
|
|
trie_add_prefix(tab->trie_new, i->addr, i->addr->pxlen, i->addr->pxlen);
|
|
|
|
|
|
|
|
return &tab->routes[i->index];
|
2021-11-29 18:23:42 +00:00
|
|
|
}
|
|
|
|
|
2015-12-24 14:52:03 +00:00
|
|
|
static inline void *
|
2023-12-08 15:13:14 +00:00
|
|
|
net_route_ip6_sadr_trie(struct rtable_private *t, struct netindex_hash_private *nh, const net_addr_ip6_sadr *n0)
|
2021-11-29 18:23:42 +00:00
|
|
|
{
|
|
|
|
TRIE_WALK_TO_ROOT_IP6(t->trie, (const net_addr_ip6 *) n0, px)
|
|
|
|
{
|
|
|
|
net_addr_ip6_sadr n = NET_ADDR_IP6_SADR(px.prefix, px.pxlen, n0->src_prefix, n0->src_pxlen);
|
|
|
|
net *best = NULL;
|
|
|
|
int best_pxlen = 0;
|
|
|
|
|
|
|
|
/* We need to do dst first matching. Since sadr addresses are hashed on dst
|
|
|
|
prefix only, find the hash table chain and go through it to find the
|
|
|
|
match with the longest matching src prefix. */
|
2023-12-08 15:13:14 +00:00
|
|
|
for (struct netindex *i = net_find_index_fragile_chain(nh, (net_addr *) &n); i; i = i->next)
|
2021-11-29 18:23:42 +00:00
|
|
|
{
|
2023-12-08 15:13:14 +00:00
|
|
|
net_addr_ip6_sadr *a = (void *) i->addr;
|
2021-11-29 18:23:42 +00:00
|
|
|
|
2023-12-08 15:13:14 +00:00
|
|
|
if ((i->index < t->routes_block_size) &&
|
|
|
|
net_equal_dst_ip6_sadr(&n, a) &&
|
2021-11-29 18:23:42 +00:00
|
|
|
net_in_net_src_ip6_sadr(&n, a) &&
|
|
|
|
(a->src_pxlen >= best_pxlen))
|
|
|
|
{
|
2023-12-08 15:13:14 +00:00
|
|
|
net *cur = &t->routes[i->index];
|
|
|
|
if (cur->routes && rte_is_valid(&cur->routes->rte))
|
|
|
|
{
|
|
|
|
best = cur;
|
|
|
|
best_pxlen = a->src_pxlen;
|
|
|
|
}
|
2021-11-29 18:23:42 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (best)
|
|
|
|
return best;
|
|
|
|
}
|
|
|
|
TRIE_WALK_TO_ROOT_END;
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2015-12-24 14:52:03 +00:00
|
|
|
|
2018-02-13 15:27:57 +00:00
|
|
|
static inline void *
|
2023-12-08 15:13:14 +00:00
|
|
|
net_route_ip6_sadr_fib(struct rtable_private *t, struct netindex_hash_private *nh, const net_addr_ip6_sadr *n0)
|
2018-02-13 15:27:57 +00:00
|
|
|
{
|
2021-11-29 18:23:42 +00:00
|
|
|
net_addr_ip6_sadr n;
|
|
|
|
net_copy_ip6_sadr(&n, n0);
|
2018-02-13 15:27:57 +00:00
|
|
|
|
|
|
|
while (1)
|
|
|
|
{
|
|
|
|
net *best = NULL;
|
|
|
|
int best_pxlen = 0;
|
|
|
|
|
|
|
|
/* We need to do dst first matching. Since sadr addresses are hashed on dst
|
|
|
|
prefix only, find the hash table chain and go through it to find the
|
2021-11-29 18:23:42 +00:00
|
|
|
match with the longest matching src prefix. */
|
2023-12-08 15:13:14 +00:00
|
|
|
for (struct netindex *i = net_find_index_fragile_chain(nh, (net_addr *) &n); i; i = i->next)
|
2018-02-13 15:27:57 +00:00
|
|
|
{
|
2023-12-08 15:13:14 +00:00
|
|
|
net_addr_ip6_sadr *a = (void *) i->addr;
|
2018-02-13 15:27:57 +00:00
|
|
|
|
2023-12-08 15:13:14 +00:00
|
|
|
if ((i->index < t->routes_block_size) &&
|
|
|
|
net_equal_dst_ip6_sadr(&n, a) &&
|
2021-11-29 18:23:42 +00:00
|
|
|
net_in_net_src_ip6_sadr(&n, a) &&
|
2018-02-13 15:27:57 +00:00
|
|
|
(a->src_pxlen >= best_pxlen))
|
|
|
|
{
|
2023-12-08 15:13:14 +00:00
|
|
|
net *cur = &t->routes[i->index];
|
|
|
|
if (cur->routes && rte_is_valid(&cur->routes->rte))
|
|
|
|
{
|
|
|
|
best = cur;
|
|
|
|
best_pxlen = a->src_pxlen;
|
|
|
|
}
|
2018-02-13 15:27:57 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (best)
|
|
|
|
return best;
|
|
|
|
|
2021-11-29 18:23:42 +00:00
|
|
|
if (!n.dst_pxlen)
|
2018-02-13 15:27:57 +00:00
|
|
|
break;
|
|
|
|
|
2021-11-29 18:23:42 +00:00
|
|
|
n.dst_pxlen--;
|
|
|
|
ip6_clrbit(&n.dst_prefix, n.dst_pxlen);
|
2018-02-13 15:27:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2023-12-08 15:13:14 +00:00
|
|
|
static net *
|
2022-09-07 11:54:20 +00:00
|
|
|
net_route(struct rtable_private *tab, const net_addr *n)
|
2016-01-20 14:38:37 +00:00
|
|
|
{
|
2023-12-08 15:13:14 +00:00
|
|
|
NH_LOCK(tab->netindex, nh);
|
|
|
|
|
2016-05-12 14:04:47 +00:00
|
|
|
ASSERT(tab->addr_type == n->type);
|
2023-12-07 13:10:11 +00:00
|
|
|
net_addr_union *nu = SKIP_BACK(net_addr_union, n, n);
|
2016-01-20 14:38:37 +00:00
|
|
|
|
2023-12-07 13:10:11 +00:00
|
|
|
#define TW(ipv, what) \
|
|
|
|
TRIE_WALK_TO_ROOT_IP##ipv(tab->trie, &(nu->ip##ipv), var) \
|
|
|
|
{ what(ipv, var); } \
|
|
|
|
TRIE_WALK_TO_ROOT_END; return NULL;
|
2021-11-29 18:23:42 +00:00
|
|
|
|
2023-12-07 13:10:11 +00:00
|
|
|
#define FW(ipv, what) do { \
|
|
|
|
net_addr_union nuc; net_copy(&nuc.n, n); \
|
|
|
|
while (1) { \
|
|
|
|
what(ipv, nuc.ip##ipv); if (!nuc.n.pxlen) return NULL; \
|
|
|
|
nuc.n.pxlen--; ip##ipv##_clrbit(&nuc.ip##ipv.prefix, nuc.ip##ipv.pxlen); \
|
|
|
|
} \
|
|
|
|
} while(0); return NULL;
|
2016-05-12 14:04:47 +00:00
|
|
|
|
2023-12-07 13:10:11 +00:00
|
|
|
#define FVR_IP(ipv, var) \
|
2023-12-08 15:13:14 +00:00
|
|
|
net *r; if (r = net_find_valid(tab, nh, (net_addr *) &var)) return r;
|
2021-11-29 18:23:42 +00:00
|
|
|
|
2023-12-07 13:10:11 +00:00
|
|
|
#define FVR_VPN(ipv, var) \
|
|
|
|
net_addr_vpn##ipv _var0 = NET_ADDR_VPN##ipv(var.prefix, var.pxlen, nu->vpn##ipv.rd); FVR_IP(ipv, _var0);
|
2016-05-12 14:04:47 +00:00
|
|
|
|
2023-12-07 13:10:11 +00:00
|
|
|
if (tab->trie)
|
|
|
|
switch (n->type) {
|
|
|
|
case NET_IP4: TW(4, FVR_IP);
|
|
|
|
case NET_VPN4: TW(4, FVR_VPN);
|
|
|
|
case NET_IP6: TW(6, FVR_IP);
|
|
|
|
case NET_VPN6: TW(6, FVR_VPN);
|
|
|
|
|
|
|
|
case NET_IP6_SADR:
|
2023-12-08 15:13:14 +00:00
|
|
|
return net_route_ip6_sadr_trie(tab, nh, (net_addr_ip6_sadr *) n);
|
2023-12-07 13:10:11 +00:00
|
|
|
default:
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
switch (n->type) {
|
|
|
|
case NET_IP4: FW(4, FVR_IP);
|
|
|
|
case NET_VPN4: FW(4, FVR_VPN);
|
|
|
|
case NET_IP6: FW(6, FVR_IP);
|
|
|
|
case NET_VPN6: FW(6, FVR_VPN);
|
|
|
|
|
|
|
|
case NET_IP6_SADR:
|
2023-12-08 15:13:14 +00:00
|
|
|
return net_route_ip6_sadr_fib (tab, nh, (net_addr_ip6_sadr *) n);
|
2023-12-07 13:10:11 +00:00
|
|
|
default:
|
|
|
|
return NULL;
|
|
|
|
}
|
2021-11-29 18:23:42 +00:00
|
|
|
|
2023-12-08 11:07:46 +00:00
|
|
|
#undef TW
|
|
|
|
#undef FW
|
|
|
|
#undef FVR_IP
|
|
|
|
#undef FVR_VPN
|
2021-11-29 18:23:42 +00:00
|
|
|
}
|
|
|
|
|
2016-01-20 14:38:37 +00:00
|
|
|
|
2016-05-12 14:04:47 +00:00
|
|
|
/**
|
|
|
|
* roa_check - check validity of route origination in a ROA table
|
|
|
|
* @tab: ROA table
|
|
|
|
* @n: network prefix to check
|
|
|
|
* @asn: AS number of network prefix
|
|
|
|
*
|
|
|
|
* Implements RFC 6483 route validation for the given network prefix. The
|
|
|
|
* procedure is to find all candidate ROAs - ROAs whose prefixes cover the given
|
|
|
|
* network prefix. If there is no candidate ROA, return ROA_UNKNOWN. If there is
|
|
|
|
* a candidate ROA with matching ASN and maxlen field greater than or equal to
|
|
|
|
* the given prefix length, return ROA_VALID. Otherwise, return ROA_INVALID. If
|
|
|
|
* caller cannot determine origin AS, 0 could be used (in that case ROA_VALID
|
|
|
|
* cannot happen). Table @tab must have type NET_ROA4 or NET_ROA6, network @n
|
|
|
|
* must have type NET_IP4 or NET_IP6, respectively.
|
|
|
|
*/
|
|
|
|
int
|
2022-09-07 11:54:20 +00:00
|
|
|
net_roa_check(rtable *tp, const net_addr *n, u32 asn)
|
2016-01-20 14:38:37 +00:00
|
|
|
{
|
2023-12-08 11:07:46 +00:00
|
|
|
net_addr_union *nu = SKIP_BACK(net_addr_union, n, n);
|
|
|
|
int anything = 0;
|
|
|
|
|
|
|
|
#define TW(ipv) do { \
|
|
|
|
TRIE_WALK_TO_ROOT_IP##ipv(tab->trie, &(nu->ip##ipv), var) { \
|
|
|
|
net_addr_roa##ipv roa0 = NET_ADDR_ROA##ipv(var.prefix, var.pxlen, 0, 0); \
|
|
|
|
ROA_PARTIAL_CHECK(ipv); \
|
|
|
|
} TRIE_WALK_TO_ROOT_END; \
|
|
|
|
return anything ? ROA_INVALID : ROA_UNKNOWN; \
|
|
|
|
} while (0)
|
|
|
|
|
|
|
|
#define FW(ipv) do { \
|
|
|
|
net_addr_roa##ipv roa0 = NET_ADDR_ROA##ipv(nu->ip##ipv.prefix, nu->ip##ipv.pxlen, 0, 0);\
|
|
|
|
while (1) { \
|
|
|
|
ROA_PARTIAL_CHECK(ipv); \
|
|
|
|
if (roa0.pxlen == 0) break; \
|
|
|
|
roa0.pxlen--; ip##ipv##_clrbit(&roa0.prefix, roa0.pxlen); \
|
|
|
|
} \
|
|
|
|
} while (0)
|
|
|
|
|
|
|
|
#define ROA_PARTIAL_CHECK(ipv) do { \
|
2023-12-08 15:13:14 +00:00
|
|
|
for (struct netindex *i = net_find_index_fragile_chain(nh, (net_addr *) &roa0); i; i = i->next)\
|
2023-12-08 11:07:46 +00:00
|
|
|
{ \
|
2023-12-08 15:13:14 +00:00
|
|
|
if (tab->routes_block_size < i->index) continue; \
|
|
|
|
net_addr_roa##ipv *roa = (void *) i->addr; \
|
|
|
|
if (!net_equal_prefix_roa##ipv(roa, &roa0)) continue; \
|
|
|
|
net *r = &tab->routes[i->index]; \
|
|
|
|
if (r->routes && rte_is_valid(&r->routes->rte)) \
|
2023-12-08 11:07:46 +00:00
|
|
|
{ \
|
|
|
|
anything = 1; \
|
|
|
|
if (asn && (roa->asn == asn) && (roa->max_pxlen >= nu->ip##ipv.pxlen)) \
|
2023-12-08 15:13:14 +00:00
|
|
|
return ROA_VALID; \
|
2023-12-08 11:07:46 +00:00
|
|
|
} \
|
|
|
|
} \
|
|
|
|
} while (0)
|
2022-09-07 11:54:20 +00:00
|
|
|
|
|
|
|
RT_LOCKED(tp, tab)
|
2021-11-29 18:23:42 +00:00
|
|
|
{
|
2023-12-08 15:13:14 +00:00
|
|
|
NH_LOCK(tab->netindex, nh);
|
2022-09-07 11:54:20 +00:00
|
|
|
if ((tab->addr_type == NET_ROA4) && (n->type == NET_IP4))
|
|
|
|
{
|
2023-12-08 11:13:58 +00:00
|
|
|
if (tab->trie) TW(4);
|
|
|
|
else FW(4);
|
2022-09-07 11:54:20 +00:00
|
|
|
}
|
|
|
|
else if ((tab->addr_type == NET_ROA6) && (n->type == NET_IP6))
|
|
|
|
{
|
2023-12-08 11:13:58 +00:00
|
|
|
if (tab->trie) TW(6);
|
|
|
|
else FW(6);
|
2022-09-07 11:54:20 +00:00
|
|
|
}
|
2021-11-29 18:23:42 +00:00
|
|
|
}
|
2023-12-08 11:07:46 +00:00
|
|
|
|
|
|
|
return anything ? ROA_INVALID : ROA_UNKNOWN;
|
|
|
|
#undef ROA_PARTIAL_CHECK
|
|
|
|
#undef TW
|
|
|
|
#undef FW
|
2010-07-30 23:04:32 +00:00
|
|
|
}
|
1998-05-20 11:54:33 +00:00
|
|
|
|
2000-06-01 17:12:19 +00:00
|
|
|
/**
|
|
|
|
* rte_find - find a route
|
|
|
|
* @net: network node
|
2012-08-14 14:25:22 +00:00
|
|
|
* @src: route source
|
2000-06-01 17:12:19 +00:00
|
|
|
*
|
2020-01-28 10:42:46 +00:00
|
|
|
* The rte_find() function returns a pointer to a route for destination @net
|
|
|
|
* which is from route source @src. List end pointer is returned if no route is found.
|
2000-06-01 17:12:19 +00:00
|
|
|
*/
|
2020-01-28 10:42:46 +00:00
|
|
|
static struct rte_storage **
|
2012-08-14 14:25:22 +00:00
|
|
|
rte_find(net *net, struct rte_src *src)
|
1998-05-20 11:54:33 +00:00
|
|
|
{
|
2020-01-28 10:42:46 +00:00
|
|
|
struct rte_storage **e = &net->routes;
|
1998-05-20 11:54:33 +00:00
|
|
|
|
2020-01-28 10:42:46 +00:00
|
|
|
while ((*e) && (*e)->rte.src != src)
|
|
|
|
e = &(*e)->next;
|
1998-05-20 11:54:33 +00:00
|
|
|
|
|
|
|
return e;
|
|
|
|
}
|
|
|
|
|
2020-01-28 10:42:46 +00:00
|
|
|
|
|
|
|
struct rte_storage *
|
2023-12-08 15:13:14 +00:00
|
|
|
rte_store(const rte *r, struct netindex *i, struct rtable_private *tab)
|
1999-04-05 20:25:03 +00:00
|
|
|
{
|
2023-07-03 18:38:24 +00:00
|
|
|
struct rte_storage *s = sl_alloc(tab->rte_slab);
|
|
|
|
struct rte *e = RTES_WRITE(s);
|
1999-04-05 20:25:03 +00:00
|
|
|
|
2023-07-03 18:38:24 +00:00
|
|
|
*e = *r;
|
2023-12-08 15:13:14 +00:00
|
|
|
e->net = i->addr;
|
|
|
|
net_lock_index(tab->netindex, i);
|
2020-04-10 15:08:29 +00:00
|
|
|
|
2023-07-03 18:38:24 +00:00
|
|
|
rt_lock_source(e->src);
|
1999-04-05 20:25:03 +00:00
|
|
|
|
2023-07-03 18:38:24 +00:00
|
|
|
if (ea_is_cached(e->attrs))
|
|
|
|
e->attrs = rta_clone(e->attrs);
|
2020-01-28 10:42:46 +00:00
|
|
|
else
|
2023-07-03 18:38:24 +00:00
|
|
|
e->attrs = rta_lookup(e->attrs, 1);
|
2015-06-08 00:20:43 +00:00
|
|
|
|
2024-01-28 12:09:48 +00:00
|
|
|
#if 0
|
|
|
|
debug("(store) %N ", i->addr);
|
|
|
|
ea_dump(e->attrs);
|
|
|
|
debug("\n");
|
|
|
|
#endif
|
|
|
|
|
2023-07-03 18:38:24 +00:00
|
|
|
return s;
|
2015-06-08 00:20:43 +00:00
|
|
|
}
|
|
|
|
|
2021-03-20 20:16:12 +00:00
|
|
|
/**
|
|
|
|
* rte_free - delete a &rte
|
2020-01-28 10:42:46 +00:00
|
|
|
* @e: &struct rte_storage to be deleted
|
|
|
|
* @tab: the table which the rte belongs to
|
2021-03-20 20:16:12 +00:00
|
|
|
*
|
|
|
|
* rte_free() deletes the given &rte from the routing table it's linked to.
|
|
|
|
*/
|
|
|
|
|
2020-01-28 10:42:46 +00:00
|
|
|
void
|
2023-12-08 15:13:14 +00:00
|
|
|
rte_free(struct rte_storage *e, struct rtable_private *tab)
|
2021-03-20 20:16:12 +00:00
|
|
|
{
|
2023-12-08 15:13:14 +00:00
|
|
|
struct netindex *i = RTE_GET_NETINDEX(&e->rte);
|
|
|
|
net_unlock_index(tab->netindex, i);
|
|
|
|
|
2020-01-28 10:42:46 +00:00
|
|
|
rt_unlock_source(e->rte.src);
|
2023-12-08 15:13:14 +00:00
|
|
|
|
2020-01-28 10:42:46 +00:00
|
|
|
rta_free(e->rte.attrs);
|
2022-04-04 18:31:14 +00:00
|
|
|
sl_free(e);
|
2021-03-20 20:16:12 +00:00
|
|
|
}
|
2019-03-06 17:14:12 +00:00
|
|
|
|
1998-05-20 11:54:33 +00:00
|
|
|
static int /* Actually better or at least as good as */
|
2023-03-30 09:37:16 +00:00
|
|
|
rte_better(const rte *new, const rte *old)
|
1998-05-20 11:54:33 +00:00
|
|
|
{
|
2023-03-30 09:37:16 +00:00
|
|
|
int (*better)(const rte *, const rte *);
|
1998-06-03 08:40:10 +00:00
|
|
|
|
2012-11-10 13:26:13 +00:00
|
|
|
if (!rte_is_valid(old))
|
1998-05-20 11:54:33 +00:00
|
|
|
return 1;
|
2012-11-10 13:26:13 +00:00
|
|
|
if (!rte_is_valid(new))
|
|
|
|
return 0;
|
|
|
|
|
2022-04-20 10:24:26 +00:00
|
|
|
u32 np = rt_get_preference(new);
|
|
|
|
u32 op = rt_get_preference(old);
|
|
|
|
|
|
|
|
if (np > op)
|
1998-05-20 11:54:33 +00:00
|
|
|
return 1;
|
2022-04-20 10:24:26 +00:00
|
|
|
if (np < op)
|
1998-05-20 11:54:33 +00:00
|
|
|
return 0;
|
2021-09-27 14:40:28 +00:00
|
|
|
if (new->src->owner->class != old->src->owner->class)
|
2000-03-01 11:48:11 +00:00
|
|
|
{
|
|
|
|
/*
|
|
|
|
* If the user has configured protocol preferences, so that two different protocols
|
|
|
|
* have the same preference, try to break the tie by comparing addresses. Not too
|
|
|
|
* useful, but keeps the ordering of routes unambiguous.
|
|
|
|
*/
|
2021-09-27 14:40:28 +00:00
|
|
|
return new->src->owner->class > old->src->owner->class;
|
2000-03-01 11:48:11 +00:00
|
|
|
}
|
2021-09-27 14:40:28 +00:00
|
|
|
if (better = new->src->owner->class->rte_better)
|
1998-06-03 08:40:10 +00:00
|
|
|
return better(new, old);
|
|
|
|
return 0;
|
1998-05-20 11:54:33 +00:00
|
|
|
}
|
|
|
|
|
2015-06-08 00:20:43 +00:00
|
|
|
static int
|
2023-03-30 09:37:16 +00:00
|
|
|
rte_mergable(const rte *pri, const rte *sec)
|
2015-06-08 00:20:43 +00:00
|
|
|
{
|
2023-03-30 09:37:16 +00:00
|
|
|
int (*mergable)(const rte *, const rte *);
|
2015-06-08 00:20:43 +00:00
|
|
|
|
|
|
|
if (!rte_is_valid(pri) || !rte_is_valid(sec))
|
|
|
|
return 0;
|
|
|
|
|
2022-04-20 10:24:26 +00:00
|
|
|
if (rt_get_preference(pri) != rt_get_preference(sec))
|
2015-06-08 00:20:43 +00:00
|
|
|
return 0;
|
|
|
|
|
2021-09-27 14:40:28 +00:00
|
|
|
if (pri->src->owner->class != sec->src->owner->class)
|
2015-06-08 00:20:43 +00:00
|
|
|
return 0;
|
|
|
|
|
2021-09-27 14:40:28 +00:00
|
|
|
if (mergable = pri->src->owner->class->rte_mergable)
|
2015-06-08 00:20:43 +00:00
|
|
|
return mergable(pri, sec);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-03-12 20:30:53 +00:00
|
|
|
static void
|
2021-06-21 15:07:31 +00:00
|
|
|
rte_trace(const char *name, const rte *e, int dir, const char *msg)
|
2000-03-12 20:30:53 +00:00
|
|
|
{
|
2023-12-08 15:13:14 +00:00
|
|
|
log(L_TRACE "%s %c %s %N (%u) src %luL %uG %uS id %u %s",
|
|
|
|
name, dir, msg, e->net, NET_TO_INDEX(e->net)->index,
|
2021-09-27 11:04:16 +00:00
|
|
|
e->src->private_id, e->src->global_id, e->stale_cycle, e->id,
|
2022-05-15 16:09:30 +00:00
|
|
|
rta_dest_name(rte_dest(e)));
|
2000-03-12 20:30:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline void
|
2021-06-21 15:07:31 +00:00
|
|
|
channel_rte_trace_in(uint flag, struct channel *c, const rte *e, const char *msg)
|
2000-03-12 20:30:53 +00:00
|
|
|
{
|
2020-12-07 21:19:40 +00:00
|
|
|
if ((c->debug & flag) || (c->proto->debug & flag))
|
2024-01-23 19:25:48 +00:00
|
|
|
log(L_TRACE "%s > %s %N (-) src %luL %uG %uS id %u %s",
|
|
|
|
c->in_req.name, msg, e->net,
|
|
|
|
e->src->private_id, e->src->global_id, e->stale_cycle, e->id,
|
|
|
|
rta_dest_name(rte_dest(e)));
|
2000-03-12 20:30:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline void
|
2021-06-21 15:07:31 +00:00
|
|
|
channel_rte_trace_out(uint flag, struct channel *c, const rte *e, const char *msg)
|
2000-03-12 20:30:53 +00:00
|
|
|
{
|
2020-12-07 21:19:40 +00:00
|
|
|
if ((c->debug & flag) || (c->proto->debug & flag))
|
2021-06-21 15:07:31 +00:00
|
|
|
rte_trace(c->out_req.name, e, '<', msg);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void
|
|
|
|
rt_rte_trace_in(uint flag, struct rt_import_request *req, const rte *e, const char *msg)
|
|
|
|
{
|
|
|
|
if (req->trace_routes & flag)
|
|
|
|
rte_trace(req->name, e, '>', msg);
|
2000-03-12 20:30:53 +00:00
|
|
|
}
|
|
|
|
|
2021-06-21 15:07:31 +00:00
|
|
|
#if 0
|
|
|
|
// seems to be unused at all
|
|
|
|
static inline void
|
|
|
|
rt_rte_trace_out(uint flag, struct rt_export_request *req, const rte *e, const char *msg)
|
|
|
|
{
|
|
|
|
if (req->trace_routes & flag)
|
|
|
|
rte_trace(req->name, e, '<', msg);
|
2000-03-12 20:30:53 +00:00
|
|
|
}
|
2021-06-21 15:07:31 +00:00
|
|
|
#endif
|
2000-03-12 20:30:53 +00:00
|
|
|
|
2021-09-30 11:50:54 +00:00
|
|
|
static uint
|
|
|
|
rte_feed_count(net *n)
|
|
|
|
{
|
|
|
|
uint count = 0;
|
|
|
|
for (struct rte_storage *e = n->routes; e; e = e->next)
|
2022-07-14 09:09:23 +00:00
|
|
|
count++;
|
|
|
|
|
2021-09-30 11:50:54 +00:00
|
|
|
return count;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2023-03-30 09:37:16 +00:00
|
|
|
rte_feed_obtain(net *n, const rte **feed, uint count)
|
2021-09-30 11:50:54 +00:00
|
|
|
{
|
|
|
|
uint i = 0;
|
|
|
|
for (struct rte_storage *e = n->routes; e; e = e->next)
|
|
|
|
{
|
|
|
|
ASSERT_DIE(i < count);
|
|
|
|
feed[i++] = &e->rte;
|
|
|
|
}
|
2022-07-14 09:09:23 +00:00
|
|
|
|
2021-09-30 11:50:54 +00:00
|
|
|
ASSERT_DIE(i == count);
|
|
|
|
}
|
|
|
|
|
2012-04-15 13:07:58 +00:00
|
|
|
static rte *
|
2022-05-30 14:41:15 +00:00
|
|
|
export_filter(struct channel *c, rte *rt, int silent)
|
1999-03-17 14:31:26 +00:00
|
|
|
{
|
2016-01-26 10:48:58 +00:00
|
|
|
struct proto *p = c->proto;
|
2019-02-15 12:53:17 +00:00
|
|
|
const struct filter *filter = c->out_filter;
|
2021-06-21 15:07:31 +00:00
|
|
|
struct channel_export_stats *stats = &c->export_stats;
|
2012-03-15 10:58:08 +00:00
|
|
|
|
2020-03-09 14:31:10 +00:00
|
|
|
/* Do nothing if we have already rejected the route */
|
|
|
|
if (silent && bmap_test(&c->export_reject_map, rt->id))
|
|
|
|
goto reject_noset;
|
|
|
|
|
|
|
|
int v = p->preexport ? p->preexport(c, rt) : 0;
|
2012-04-15 13:07:58 +00:00
|
|
|
if (v < 0)
|
|
|
|
{
|
|
|
|
if (silent)
|
2020-03-09 14:31:10 +00:00
|
|
|
goto reject_noset;
|
2009-12-02 21:19:47 +00:00
|
|
|
|
2021-06-21 17:11:42 +00:00
|
|
|
stats->updates_rejected++;
|
2013-02-08 22:58:27 +00:00
|
|
|
if (v == RIC_REJECT)
|
2021-06-21 15:07:31 +00:00
|
|
|
channel_rte_trace_out(D_FILTERS, c, rt, "rejected by protocol");
|
2021-11-23 11:12:32 +00:00
|
|
|
goto reject;
|
2020-03-09 14:31:10 +00:00
|
|
|
|
2012-04-15 13:07:58 +00:00
|
|
|
}
|
|
|
|
if (v > 0)
|
1999-04-05 20:25:03 +00:00
|
|
|
{
|
2012-04-15 13:07:58 +00:00
|
|
|
if (!silent)
|
2021-06-21 15:07:31 +00:00
|
|
|
channel_rte_trace_out(D_FILTERS, c, rt, "forced accept by protocol");
|
2012-04-15 13:07:58 +00:00
|
|
|
goto accept;
|
1999-04-05 20:25:03 +00:00
|
|
|
}
|
2009-06-03 23:22:56 +00:00
|
|
|
|
2012-04-15 13:07:58 +00:00
|
|
|
v = filter && ((filter == FILTER_REJECT) ||
|
2022-05-30 14:41:15 +00:00
|
|
|
(f_run(filter, rt,
|
2018-05-29 10:08:12 +00:00
|
|
|
(silent ? FF_SILENT : 0)) > F_ACCEPT));
|
2012-04-15 13:07:58 +00:00
|
|
|
if (v)
|
|
|
|
{
|
|
|
|
if (silent)
|
|
|
|
goto reject;
|
|
|
|
|
2021-06-21 17:11:42 +00:00
|
|
|
stats->updates_filtered++;
|
2021-06-21 15:07:31 +00:00
|
|
|
channel_rte_trace_out(D_FILTERS, c, rt, "filtered out");
|
2012-04-15 13:07:58 +00:00
|
|
|
goto reject;
|
1999-04-05 20:25:03 +00:00
|
|
|
}
|
2009-06-03 23:22:56 +00:00
|
|
|
|
2012-04-15 13:07:58 +00:00
|
|
|
accept:
|
2020-03-09 14:31:10 +00:00
|
|
|
/* We have accepted the route */
|
|
|
|
bmap_clear(&c->export_reject_map, rt->id);
|
2012-04-15 13:07:58 +00:00
|
|
|
return rt;
|
|
|
|
|
|
|
|
reject:
|
2020-03-09 14:31:10 +00:00
|
|
|
/* We have rejected the route by filter */
|
|
|
|
bmap_set(&c->export_reject_map, rt->id);
|
|
|
|
|
|
|
|
reject_noset:
|
2012-04-15 13:07:58 +00:00
|
|
|
/* Discard temporary rte */
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2021-06-21 15:07:31 +00:00
|
|
|
do_rt_notify(struct channel *c, const net_addr *net, rte *new, const rte *old)
|
2012-04-15 13:07:58 +00:00
|
|
|
{
|
2016-01-26 10:48:58 +00:00
|
|
|
struct proto *p = c->proto;
|
2021-06-21 15:07:31 +00:00
|
|
|
struct channel_export_stats *stats = &c->export_stats;
|
2009-06-03 23:22:56 +00:00
|
|
|
|
2021-11-06 19:34:16 +00:00
|
|
|
if (!old && new)
|
|
|
|
if (CHANNEL_LIMIT_PUSH(c, OUT))
|
2019-09-09 00:55:32 +00:00
|
|
|
{
|
2021-06-21 17:11:42 +00:00
|
|
|
stats->updates_rejected++;
|
2021-06-21 15:07:31 +00:00
|
|
|
channel_rte_trace_out(D_FILTERS, c, new, "rejected [limit]");
|
2019-09-09 00:55:32 +00:00
|
|
|
return;
|
2012-04-24 21:39:57 +00:00
|
|
|
}
|
2021-11-06 19:34:16 +00:00
|
|
|
|
|
|
|
if (!new && old)
|
|
|
|
CHANNEL_LIMIT_POP(c, OUT);
|
2012-04-24 21:39:57 +00:00
|
|
|
|
2009-06-03 23:22:56 +00:00
|
|
|
if (new)
|
2021-06-21 17:11:42 +00:00
|
|
|
stats->updates_accepted++;
|
2009-06-03 23:22:56 +00:00
|
|
|
else
|
2021-06-21 17:11:42 +00:00
|
|
|
stats->withdraws_accepted++;
|
2009-06-03 23:22:56 +00:00
|
|
|
|
2019-09-09 00:55:32 +00:00
|
|
|
if (old)
|
|
|
|
bmap_clear(&c->export_map, old->id);
|
|
|
|
|
2009-06-03 23:22:56 +00:00
|
|
|
if (new)
|
2019-09-09 00:55:32 +00:00
|
|
|
bmap_set(&c->export_map, new->id);
|
2009-06-03 23:22:56 +00:00
|
|
|
|
2000-03-12 20:30:53 +00:00
|
|
|
if (p->debug & D_ROUTES)
|
2019-09-09 00:55:32 +00:00
|
|
|
{
|
|
|
|
if (new && old)
|
2021-06-21 15:07:31 +00:00
|
|
|
channel_rte_trace_out(D_ROUTES, c, new, "replaced");
|
2019-09-09 00:55:32 +00:00
|
|
|
else if (new)
|
2021-06-21 15:07:31 +00:00
|
|
|
channel_rte_trace_out(D_ROUTES, c, new, "added");
|
2019-09-09 00:55:32 +00:00
|
|
|
else if (old)
|
2021-06-21 15:07:31 +00:00
|
|
|
channel_rte_trace_out(D_ROUTES, c, old, "removed");
|
2019-09-09 00:55:32 +00:00
|
|
|
}
|
|
|
|
|
2022-06-20 17:10:49 +00:00
|
|
|
p->rt_notify(p, c, net, new, old);
|
2012-04-15 13:07:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2023-09-29 14:24:50 +00:00
|
|
|
rt_notify_basic(struct channel *c, const net_addr *net, rte *new, const rte *old, int force)
|
2012-04-15 13:07:58 +00:00
|
|
|
{
|
2023-09-29 14:24:50 +00:00
|
|
|
if (new && old && rte_same(new, old) && !force)
|
2022-07-15 12:57:02 +00:00
|
|
|
{
|
2023-09-24 10:15:26 +00:00
|
|
|
channel_rte_trace_out(D_ROUTES, c, new, "already exported");
|
|
|
|
|
2022-07-15 12:57:02 +00:00
|
|
|
if ((new->id != old->id) && bmap_test(&c->export_map, old->id))
|
|
|
|
{
|
|
|
|
bmap_set(&c->export_map, new->id);
|
|
|
|
bmap_clear(&c->export_map, old->id);
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2023-09-29 14:24:50 +00:00
|
|
|
/* Refeeding and old is new */
|
|
|
|
if (force && !old && bmap_test(&c->export_map, new->id))
|
|
|
|
old = new;
|
|
|
|
|
2012-04-15 13:07:58 +00:00
|
|
|
if (new)
|
2020-01-28 10:42:46 +00:00
|
|
|
new = export_filter(c, new, 0);
|
2012-04-15 13:07:58 +00:00
|
|
|
|
2019-09-09 00:55:32 +00:00
|
|
|
if (old && !bmap_test(&c->export_map, old->id))
|
|
|
|
old = NULL;
|
2012-04-15 13:07:58 +00:00
|
|
|
|
|
|
|
if (!new && !old)
|
|
|
|
return;
|
|
|
|
|
2021-06-21 15:07:31 +00:00
|
|
|
do_rt_notify(c, net, new, old);
|
2012-04-15 13:07:58 +00:00
|
|
|
}
|
|
|
|
|
2023-09-24 09:47:24 +00:00
|
|
|
void
|
2023-09-29 14:24:50 +00:00
|
|
|
channel_rpe_mark_seen(struct channel *c, struct rt_pending_export *rpe)
|
2021-09-27 11:04:16 +00:00
|
|
|
{
|
2023-09-24 10:15:26 +00:00
|
|
|
channel_trace(c, D_ROUTES, "Marking seen %p (%lu)", rpe, rpe->seq);
|
|
|
|
|
2023-09-29 14:24:50 +00:00
|
|
|
ASSERT_DIE(c->out_req.hook);
|
|
|
|
rpe_mark_seen(c->out_req.hook, rpe);
|
|
|
|
|
|
|
|
if (c->refeed_req.hook && (c->refeed_req.hook->export_state == TES_FEEDING))
|
|
|
|
rpe_mark_seen(c->refeed_req.hook, rpe);
|
|
|
|
|
2021-09-27 11:04:16 +00:00
|
|
|
if (rpe->old)
|
2024-02-07 16:30:43 +00:00
|
|
|
bmap_clear(&c->export_reject_map, rpe->old->id);
|
2021-09-27 11:04:16 +00:00
|
|
|
}
|
|
|
|
|
2021-06-21 15:07:31 +00:00
|
|
|
void
|
2023-03-31 08:46:17 +00:00
|
|
|
rt_notify_accepted(struct rt_export_request *req, const net_addr *n,
|
|
|
|
struct rt_pending_export *first, struct rt_pending_export *last,
|
2023-03-30 09:37:16 +00:00
|
|
|
const rte **feed, uint count)
|
2012-04-15 13:07:58 +00:00
|
|
|
{
|
2023-09-29 14:24:50 +00:00
|
|
|
struct channel *c = channel_from_export_request(req);
|
|
|
|
int refeeding = channel_net_is_refeeding(c, n);
|
2021-06-21 15:07:31 +00:00
|
|
|
|
|
|
|
rte nb0, *new_best = NULL;
|
|
|
|
const rte *old_best = NULL;
|
2012-04-15 13:07:58 +00:00
|
|
|
|
2021-09-30 11:50:54 +00:00
|
|
|
for (uint i = 0; i < count; i++)
|
2019-09-09 00:55:32 +00:00
|
|
|
{
|
2021-09-30 11:50:54 +00:00
|
|
|
if (!rte_is_valid(feed[i]))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
/* Has been already rejected, won't bother with it */
|
2023-09-29 14:24:50 +00:00
|
|
|
if (!refeeding && bmap_test(&c->export_reject_map, feed[i]->id))
|
2021-09-30 11:50:54 +00:00
|
|
|
continue;
|
|
|
|
|
|
|
|
/* Previously exported */
|
|
|
|
if (!old_best && bmap_test(&c->export_map, feed[i]->id))
|
2012-04-15 13:07:58 +00:00
|
|
|
{
|
2023-09-29 14:24:50 +00:00
|
|
|
if (new_best)
|
|
|
|
{
|
|
|
|
/* is superseded */
|
|
|
|
old_best = feed[i];
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
else if (refeeding)
|
|
|
|
/* is superseeded but maybe by a new version of itself */
|
|
|
|
old_best = feed[i];
|
|
|
|
else
|
2019-09-09 00:55:32 +00:00
|
|
|
{
|
2023-09-29 14:24:50 +00:00
|
|
|
/* is still best */
|
2021-09-30 11:50:54 +00:00
|
|
|
DBG("rt_notify_accepted: idempotent\n");
|
2021-06-21 15:07:31 +00:00
|
|
|
goto done;
|
2019-09-09 00:55:32 +00:00
|
|
|
}
|
2021-09-30 11:50:54 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Have no new best route yet */
|
|
|
|
if (!new_best)
|
|
|
|
{
|
|
|
|
/* Try this route not seen before */
|
|
|
|
nb0 = *feed[i];
|
|
|
|
new_best = export_filter(c, &nb0, 0);
|
|
|
|
DBG("rt_notify_accepted: checking route id %u: %s\n", feed[i]->id, new_best ? "ok" : "no");
|
2018-07-06 00:04:45 +00:00
|
|
|
}
|
2019-09-09 00:55:32 +00:00
|
|
|
}
|
2018-07-06 00:04:45 +00:00
|
|
|
|
2021-09-27 11:04:16 +00:00
|
|
|
done:
|
2021-09-30 11:50:54 +00:00
|
|
|
/* Check obsolete routes for previously exported */
|
2022-08-31 09:58:27 +00:00
|
|
|
RPE_WALK(first, rpe, NULL)
|
2021-09-27 11:04:16 +00:00
|
|
|
{
|
2023-09-29 14:24:50 +00:00
|
|
|
channel_rpe_mark_seen(c, rpe);
|
2021-09-27 11:04:16 +00:00
|
|
|
if (rpe->old)
|
2020-03-09 14:31:10 +00:00
|
|
|
{
|
2024-02-07 16:30:43 +00:00
|
|
|
if (bmap_test(&c->export_map, rpe->old->id))
|
2021-09-30 11:50:54 +00:00
|
|
|
{
|
2021-09-27 11:04:16 +00:00
|
|
|
ASSERT_DIE(old_best == NULL);
|
2024-02-07 16:30:43 +00:00
|
|
|
old_best = rpe->old;
|
2021-09-30 11:50:54 +00:00
|
|
|
}
|
2020-03-09 14:31:10 +00:00
|
|
|
}
|
2023-03-31 08:46:17 +00:00
|
|
|
if (rpe == last)
|
|
|
|
break;
|
2021-09-27 11:04:16 +00:00
|
|
|
}
|
2012-04-15 13:07:58 +00:00
|
|
|
|
2021-09-30 11:50:54 +00:00
|
|
|
/* Nothing to export */
|
2021-09-29 15:59:50 +00:00
|
|
|
if (new_best || old_best)
|
|
|
|
do_rt_notify(c, n, new_best, old_best);
|
|
|
|
else
|
2021-09-30 11:50:54 +00:00
|
|
|
DBG("rt_notify_accepted: nothing to export\n");
|
2023-09-29 14:24:50 +00:00
|
|
|
|
|
|
|
if (refeeding)
|
|
|
|
channel_net_mark_refed(c, n);
|
1999-03-17 14:31:26 +00:00
|
|
|
}
|
|
|
|
|
2021-06-21 15:07:31 +00:00
|
|
|
rte *
|
2023-09-29 14:24:50 +00:00
|
|
|
rt_export_merged(struct channel *c, const net_addr *n, const rte **feed, uint count, linpool *pool, int silent)
|
2015-06-08 00:20:43 +00:00
|
|
|
{
|
2021-09-30 11:50:54 +00:00
|
|
|
_Thread_local static rte rloc;
|
|
|
|
|
2023-09-29 14:24:50 +00:00
|
|
|
int refeeding = !silent && channel_net_is_refeeding(c, n);
|
|
|
|
|
|
|
|
if (refeeding)
|
|
|
|
channel_net_mark_refed(c, n);
|
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
// struct proto *p = c->proto;
|
2022-05-05 16:08:37 +00:00
|
|
|
struct nexthop_adata *nhs = NULL;
|
2023-03-30 09:37:16 +00:00
|
|
|
const rte *best0 = feed[0];
|
2021-06-21 15:07:31 +00:00
|
|
|
rte *best = NULL;
|
2015-06-08 00:20:43 +00:00
|
|
|
|
|
|
|
if (!rte_is_valid(best0))
|
|
|
|
return NULL;
|
|
|
|
|
2021-09-30 11:50:54 +00:00
|
|
|
/* Already rejected, no need to re-run the filter */
|
2023-09-29 14:24:50 +00:00
|
|
|
if (!refeeding && bmap_test(&c->export_reject_map, best0->id))
|
2021-09-30 11:50:54 +00:00
|
|
|
return NULL;
|
|
|
|
|
|
|
|
rloc = *best0;
|
2022-05-30 14:41:15 +00:00
|
|
|
best = export_filter(c, &rloc, silent);
|
2021-09-30 11:50:54 +00:00
|
|
|
|
|
|
|
if (!best)
|
|
|
|
/* Best route doesn't pass the filter */
|
|
|
|
return NULL;
|
2015-06-08 00:20:43 +00:00
|
|
|
|
2021-09-30 11:50:54 +00:00
|
|
|
if (!rte_is_reachable(best))
|
|
|
|
/* Unreachable routes can't be merged */
|
2015-06-08 00:20:43 +00:00
|
|
|
return best;
|
|
|
|
|
2021-09-30 11:50:54 +00:00
|
|
|
for (uint i = 1; i < count; i++)
|
2015-06-08 00:20:43 +00:00
|
|
|
{
|
2021-09-30 11:50:54 +00:00
|
|
|
if (!rte_mergable(best0, feed[i]))
|
2015-06-08 00:20:43 +00:00
|
|
|
continue;
|
|
|
|
|
2021-09-30 11:50:54 +00:00
|
|
|
rte tmp0 = *feed[i];
|
2023-09-29 14:24:50 +00:00
|
|
|
rte *tmp = export_filter(c, &tmp0, !refeeding);
|
2015-06-08 00:20:43 +00:00
|
|
|
|
2021-09-30 11:50:54 +00:00
|
|
|
if (!tmp || !rte_is_reachable(tmp))
|
2015-06-08 00:20:43 +00:00
|
|
|
continue;
|
|
|
|
|
2022-06-08 13:31:28 +00:00
|
|
|
eattr *nhea = ea_find(tmp->attrs, &ea_gen_nexthop);
|
2022-05-30 15:36:36 +00:00
|
|
|
ASSERT_DIE(nhea);
|
2015-06-08 00:20:43 +00:00
|
|
|
|
2022-05-30 15:36:36 +00:00
|
|
|
if (nhs)
|
|
|
|
nhs = nexthop_merge(nhs, (struct nexthop_adata *) nhea->u.ptr, c->merge_limit, pool);
|
|
|
|
else
|
|
|
|
nhs = (struct nexthop_adata *) nhea->u.ptr;
|
2015-06-08 00:20:43 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (nhs)
|
|
|
|
{
|
2022-05-30 10:03:03 +00:00
|
|
|
eattr *nhea = ea_find(best->attrs, &ea_gen_nexthop);
|
2022-05-05 16:08:37 +00:00
|
|
|
ASSERT_DIE(nhea);
|
2015-06-08 00:20:43 +00:00
|
|
|
|
2022-05-05 16:08:37 +00:00
|
|
|
nhs = nexthop_merge(nhs, (struct nexthop_adata *) nhea->u.ptr, c->merge_limit, pool);
|
|
|
|
|
2022-05-30 10:03:03 +00:00
|
|
|
ea_set_attr(&best->attrs,
|
2022-05-05 16:08:37 +00:00
|
|
|
EA_LITERAL_DIRECT_ADATA(&ea_gen_nexthop, 0, &nhs->ad));
|
2015-06-08 00:20:43 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return best;
|
|
|
|
}
|
|
|
|
|
2021-06-21 15:07:31 +00:00
|
|
|
void
|
2023-03-31 08:46:17 +00:00
|
|
|
rt_notify_merged(struct rt_export_request *req, const net_addr *n,
|
|
|
|
struct rt_pending_export *first, struct rt_pending_export *last,
|
2023-03-30 09:37:16 +00:00
|
|
|
const rte **feed, uint count)
|
2021-09-30 11:50:54 +00:00
|
|
|
{
|
2023-09-29 14:24:50 +00:00
|
|
|
struct channel *c = channel_from_export_request(req);
|
2021-09-30 11:50:54 +00:00
|
|
|
// struct proto *p = c->proto;
|
2015-06-08 00:20:43 +00:00
|
|
|
|
2021-09-30 11:50:54 +00:00
|
|
|
#if 0 /* TODO: Find whether this check is possible when processing multiple changes at once. */
|
2015-06-08 00:20:43 +00:00
|
|
|
/* Check whether the change is relevant to the merged route */
|
2019-09-09 00:55:32 +00:00
|
|
|
if ((new_best == old_best) &&
|
|
|
|
(new_changed != old_changed) &&
|
|
|
|
!rte_mergable(new_best, new_changed) &&
|
|
|
|
!rte_mergable(old_best, old_changed))
|
|
|
|
return;
|
2021-09-30 11:50:54 +00:00
|
|
|
#endif
|
2015-06-08 00:20:43 +00:00
|
|
|
|
2023-03-30 09:37:16 +00:00
|
|
|
const rte *old_best = NULL;
|
2021-09-30 11:50:54 +00:00
|
|
|
/* Find old best route */
|
|
|
|
for (uint i = 0; i < count; i++)
|
|
|
|
if (bmap_test(&c->export_map, feed[i]->id))
|
|
|
|
{
|
|
|
|
old_best = feed[i];
|
|
|
|
break;
|
|
|
|
}
|
2015-06-08 00:20:43 +00:00
|
|
|
|
2021-09-30 11:50:54 +00:00
|
|
|
/* Check obsolete routes for previously exported */
|
2022-08-31 09:58:27 +00:00
|
|
|
RPE_WALK(first, rpe, NULL)
|
2021-09-27 11:04:16 +00:00
|
|
|
{
|
2023-09-29 14:24:50 +00:00
|
|
|
channel_rpe_mark_seen(c, rpe);
|
2021-09-27 11:04:16 +00:00
|
|
|
if (rpe->old)
|
2021-09-30 11:50:54 +00:00
|
|
|
{
|
2024-02-07 16:30:43 +00:00
|
|
|
if (bmap_test(&c->export_map, rpe->old->id))
|
2021-09-30 11:50:54 +00:00
|
|
|
{
|
2021-09-27 11:04:16 +00:00
|
|
|
ASSERT_DIE(old_best == NULL);
|
2024-02-07 16:30:43 +00:00
|
|
|
old_best = rpe->old;
|
2021-09-30 11:50:54 +00:00
|
|
|
}
|
|
|
|
}
|
2023-03-31 08:46:17 +00:00
|
|
|
if (rpe == last)
|
|
|
|
break;
|
2021-09-27 11:04:16 +00:00
|
|
|
}
|
2021-09-30 11:50:54 +00:00
|
|
|
|
|
|
|
/* Prepare new merged route */
|
2023-09-29 14:24:50 +00:00
|
|
|
rte *new_merged = count ? rt_export_merged(c, n, feed, count, tmp_linpool, 0) : NULL;
|
2021-09-30 11:50:54 +00:00
|
|
|
|
2021-06-21 15:07:31 +00:00
|
|
|
if (new_merged || old_best)
|
|
|
|
do_rt_notify(c, n, new_merged, old_best);
|
2021-09-30 11:50:54 +00:00
|
|
|
}
|
|
|
|
|
2021-06-21 15:07:31 +00:00
|
|
|
void
|
2022-08-31 09:58:27 +00:00
|
|
|
rt_notify_optimal(struct rt_export_request *req, const net_addr *net, struct rt_pending_export *first)
|
2021-09-30 11:50:54 +00:00
|
|
|
{
|
2023-09-29 14:24:50 +00:00
|
|
|
struct channel *c = channel_from_export_request(req);
|
2023-07-03 18:38:24 +00:00
|
|
|
const rte *o = RTE_VALID_OR_NULL(first->old_best);
|
2024-02-07 16:30:43 +00:00
|
|
|
const rte *new_best = first->new_best;
|
2022-07-14 09:09:23 +00:00
|
|
|
|
2023-09-29 14:24:50 +00:00
|
|
|
int refeeding = channel_net_is_refeeding(c, net);
|
|
|
|
|
2022-08-31 09:58:27 +00:00
|
|
|
RPE_WALK(first, rpe, NULL)
|
2021-09-27 11:04:16 +00:00
|
|
|
{
|
2023-09-29 14:24:50 +00:00
|
|
|
channel_rpe_mark_seen(c, rpe);
|
2021-09-27 11:04:16 +00:00
|
|
|
new_best = rpe->new_best;
|
2022-07-14 09:09:23 +00:00
|
|
|
}
|
2021-06-21 15:07:31 +00:00
|
|
|
|
2022-07-15 12:57:02 +00:00
|
|
|
rte n0 = RTE_COPY_VALID(new_best);
|
|
|
|
if (n0.src || o)
|
2023-09-29 14:24:50 +00:00
|
|
|
rt_notify_basic(c, net, n0.src ? &n0 : NULL, o, refeeding);
|
|
|
|
|
|
|
|
if (refeeding)
|
|
|
|
channel_net_mark_refed(c, net);
|
2021-06-21 15:07:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2022-08-31 09:58:27 +00:00
|
|
|
rt_notify_any(struct rt_export_request *req, const net_addr *net, struct rt_pending_export *first)
|
2021-09-30 11:50:54 +00:00
|
|
|
{
|
2023-09-29 14:24:50 +00:00
|
|
|
struct channel *c = channel_from_export_request(req);
|
2021-06-21 15:07:31 +00:00
|
|
|
|
2023-07-03 18:38:24 +00:00
|
|
|
const rte *n = RTE_VALID_OR_NULL(first->new);
|
|
|
|
const rte *o = RTE_VALID_OR_NULL(first->old);
|
2021-06-21 15:07:31 +00:00
|
|
|
|
2023-09-24 10:15:26 +00:00
|
|
|
channel_trace(c, D_ROUTES,
|
|
|
|
"Notifying any, net %N, first %p (%lu), new %p, old %p",
|
|
|
|
net, first, first->seq, n, o);
|
|
|
|
|
2023-09-29 14:24:50 +00:00
|
|
|
if (!n && !o || channel_net_is_refeeding(c, net))
|
2022-07-14 09:09:23 +00:00
|
|
|
{
|
2023-09-29 14:24:50 +00:00
|
|
|
/* We want to skip this notification because:
|
|
|
|
* - there is nothing to notify, or
|
|
|
|
* - this net is going to get a full refeed soon
|
|
|
|
*/
|
|
|
|
channel_rpe_mark_seen(c, first);
|
2022-07-15 12:57:02 +00:00
|
|
|
return;
|
2022-07-14 09:09:23 +00:00
|
|
|
}
|
2021-06-21 15:07:31 +00:00
|
|
|
|
2022-07-15 12:57:02 +00:00
|
|
|
struct rte_src *src = n ? n->src : o->src;
|
2024-02-07 16:30:43 +00:00
|
|
|
const rte *new_latest = first->new;
|
2022-07-15 12:57:02 +00:00
|
|
|
|
2022-08-31 09:58:27 +00:00
|
|
|
RPE_WALK(first, rpe, src)
|
2021-09-27 11:04:16 +00:00
|
|
|
{
|
2023-09-29 14:24:50 +00:00
|
|
|
channel_rpe_mark_seen(c, rpe);
|
2022-07-15 12:57:02 +00:00
|
|
|
new_latest = rpe->new;
|
2021-09-27 11:04:16 +00:00
|
|
|
}
|
2022-07-15 12:57:02 +00:00
|
|
|
|
|
|
|
rte n0 = RTE_COPY_VALID(new_latest);
|
|
|
|
if (n0.src || o)
|
2023-09-29 14:24:50 +00:00
|
|
|
rt_notify_basic(c, net, n0.src ? &n0 : NULL, o, 0);
|
2023-09-24 10:15:26 +00:00
|
|
|
|
|
|
|
channel_trace(c, D_ROUTES, "Notified net %N", net);
|
2021-06-21 15:07:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2023-03-31 08:46:17 +00:00
|
|
|
rt_feed_any(struct rt_export_request *req, const net_addr *net,
|
|
|
|
struct rt_pending_export *first, struct rt_pending_export *last,
|
|
|
|
const rte **feed, uint count)
|
2021-06-21 15:07:31 +00:00
|
|
|
{
|
2023-09-29 14:24:50 +00:00
|
|
|
struct channel *c = channel_from_export_request(req);
|
|
|
|
int refeeding = channel_net_is_refeeding(c, net);
|
2021-06-21 15:07:31 +00:00
|
|
|
|
2023-09-24 10:15:26 +00:00
|
|
|
channel_trace(c, D_ROUTES, "Feeding any, net %N, first %p (%lu), %p (%lu), count %u",
|
|
|
|
net, first, first ? first->seq : 0, last ? last->seq : 0, count);
|
|
|
|
|
2021-06-21 15:07:31 +00:00
|
|
|
for (uint i=0; i<count; i++)
|
2022-07-14 09:09:23 +00:00
|
|
|
if (rte_is_valid(feed[i]))
|
|
|
|
{
|
|
|
|
rte n0 = *feed[i];
|
2023-09-29 14:24:50 +00:00
|
|
|
rt_notify_basic(c, net, &n0, NULL, refeeding);
|
2022-07-14 09:09:23 +00:00
|
|
|
}
|
2023-03-31 08:46:17 +00:00
|
|
|
|
|
|
|
RPE_WALK(first, rpe, NULL)
|
|
|
|
{
|
2023-09-29 14:24:50 +00:00
|
|
|
channel_rpe_mark_seen(c, rpe);
|
2023-03-31 08:46:17 +00:00
|
|
|
if (rpe == last)
|
|
|
|
break;
|
|
|
|
}
|
2023-09-24 10:15:26 +00:00
|
|
|
|
|
|
|
channel_trace(c, D_ROUTES, "Fed %N", net);
|
2023-09-29 14:24:50 +00:00
|
|
|
if (refeeding)
|
|
|
|
channel_net_mark_refed(c, net);
|
2015-06-08 00:20:43 +00:00
|
|
|
}
|
|
|
|
|
2021-09-27 11:04:16 +00:00
|
|
|
void
|
|
|
|
rpe_mark_seen(struct rt_export_hook *hook, struct rt_pending_export *rpe)
|
|
|
|
{
|
|
|
|
bmap_set(&hook->seq_map, rpe->seq);
|
|
|
|
}
|
|
|
|
|
|
|
|
struct rt_pending_export *
|
|
|
|
rpe_next(struct rt_pending_export *rpe, struct rte_src *src)
|
|
|
|
{
|
|
|
|
struct rt_pending_export *next = atomic_load_explicit(&rpe->next, memory_order_acquire);
|
|
|
|
|
|
|
|
if (!next)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
if (!src)
|
|
|
|
return next;
|
|
|
|
|
|
|
|
while (rpe = next)
|
2024-02-07 16:30:43 +00:00
|
|
|
if (src == (rpe->new ? rpe->new->src : rpe->old->src))
|
2021-09-27 11:04:16 +00:00
|
|
|
return rpe;
|
|
|
|
else
|
|
|
|
next = atomic_load_explicit(&rpe->next, memory_order_acquire);
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct rt_pending_export * rt_next_export_fast(struct rt_pending_export *last);
|
2022-09-05 04:58:42 +00:00
|
|
|
static int
|
2024-02-09 16:02:44 +00:00
|
|
|
rte_export(struct rt_export_hook *hook, struct rt_pending_export *rpe)
|
2021-09-27 11:04:16 +00:00
|
|
|
{
|
2024-02-09 16:02:44 +00:00
|
|
|
rtable *tab = RT_PUB(SKIP_BACK(struct rtable_private, exporter, hook->table));
|
2021-09-27 11:04:16 +00:00
|
|
|
if (bmap_test(&hook->seq_map, rpe->seq))
|
2022-07-15 12:57:02 +00:00
|
|
|
goto ignore; /* Seen already */
|
2021-09-27 11:04:16 +00:00
|
|
|
|
2024-02-07 16:30:43 +00:00
|
|
|
const net_addr *n = rpe->new_best ? rpe->new_best->net : rpe->old_best->net;
|
2021-09-27 11:04:16 +00:00
|
|
|
|
2023-10-03 09:08:28 +00:00
|
|
|
/* Check export eligibility of this net */
|
|
|
|
if (!rt_prefilter_net(&hook->req->prefilter, n))
|
|
|
|
goto ignore;
|
2022-07-15 12:57:02 +00:00
|
|
|
|
2023-10-03 09:08:28 +00:00
|
|
|
if (hook->req->prefilter.mode == TE_ADDR_FOR)
|
|
|
|
bug("Continuos export of best prefix match not implemented yet.");
|
2022-07-15 12:57:02 +00:00
|
|
|
|
2021-09-27 11:04:16 +00:00
|
|
|
if (rpe->new)
|
|
|
|
hook->stats.updates_received++;
|
|
|
|
else
|
|
|
|
hook->stats.withdraws_received++;
|
|
|
|
|
|
|
|
if (hook->req->export_one)
|
|
|
|
hook->req->export_one(hook->req, n, rpe);
|
|
|
|
else if (hook->req->export_bulk)
|
|
|
|
{
|
2023-11-14 11:53:40 +00:00
|
|
|
struct rt_pending_export *last = NULL;
|
|
|
|
uint count = 0;
|
2023-03-30 09:37:16 +00:00
|
|
|
const rte **feed = NULL;
|
2023-11-14 11:53:40 +00:00
|
|
|
|
2023-12-08 15:13:14 +00:00
|
|
|
const struct netindex *i = SKIP_BACK(struct netindex, addr, (net_addr (*)[0]) n);
|
2023-11-14 11:53:40 +00:00
|
|
|
|
|
|
|
RT_LOCKED(tab, tp)
|
2021-09-27 11:04:16 +00:00
|
|
|
{
|
2023-12-08 15:13:14 +00:00
|
|
|
ASSERT_DIE(i->index < tp->routes_block_size);
|
|
|
|
struct network *net = &tp->routes[i->index];
|
2023-11-14 11:53:40 +00:00
|
|
|
last = net->last;
|
|
|
|
if (count = rte_feed_count(net))
|
|
|
|
{
|
|
|
|
feed = alloca(count * sizeof(rte *));
|
|
|
|
rte_feed_obtain(net, feed, count);
|
|
|
|
}
|
2021-09-27 11:04:16 +00:00
|
|
|
}
|
2023-11-14 11:53:40 +00:00
|
|
|
|
2023-03-31 08:46:17 +00:00
|
|
|
hook->req->export_bulk(hook->req, n, rpe, last, feed, count);
|
2021-09-27 11:04:16 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
bug("Export request must always provide an export method");
|
|
|
|
|
2022-07-15 12:57:02 +00:00
|
|
|
ignore:
|
2021-09-27 11:04:16 +00:00
|
|
|
/* Get the next export if exists */
|
2024-02-09 16:02:44 +00:00
|
|
|
hook->rpe_next = rt_next_export_fast(rpe);
|
2021-09-27 11:04:16 +00:00
|
|
|
|
|
|
|
/* The last block may be available to free */
|
2024-02-09 16:02:44 +00:00
|
|
|
int used = (PAGE_HEAD(hook->rpe_next) != PAGE_HEAD(rpe));
|
2021-09-27 11:04:16 +00:00
|
|
|
|
|
|
|
/* Releasing this export for cleanup routine */
|
|
|
|
DBG("store hook=%p last_export=%p seq=%lu\n", hook, rpe, rpe->seq);
|
2024-02-09 16:02:44 +00:00
|
|
|
atomic_store_explicit(&hook->last_export, rpe, memory_order_release);
|
2022-09-05 04:58:42 +00:00
|
|
|
|
|
|
|
return used;
|
2021-09-27 11:04:16 +00:00
|
|
|
}
|
|
|
|
|
2000-06-02 12:41:25 +00:00
|
|
|
/**
|
|
|
|
* rte_announce - announce a routing table change
|
|
|
|
* @tab: table the route has been added to
|
|
|
|
* @net: network in question
|
2019-09-09 00:55:32 +00:00
|
|
|
* @new: the new or changed route
|
|
|
|
* @old: the previous route replaced by the new one
|
2016-05-12 13:49:44 +00:00
|
|
|
* @new_best: the new best route for the same network
|
|
|
|
* @old_best: the previous best route for the same network
|
2000-06-02 12:41:25 +00:00
|
|
|
*
|
2019-09-09 00:55:32 +00:00
|
|
|
* This function gets a routing table update and announces it to all protocols
|
|
|
|
* that are connected to the same table by their channels.
|
2000-06-02 12:41:25 +00:00
|
|
|
*
|
2019-09-09 00:55:32 +00:00
|
|
|
* There are two ways of how routing table changes are announced. First, there
|
|
|
|
* is a change of just one route in @net (which may caused a change of the best
|
|
|
|
* route of the network). In this case @new and @old describes the changed route
|
|
|
|
* and @new_best and @old_best describes best routes. Other routes are not
|
|
|
|
* affected, but in sorted table the order of other routes might change.
|
2009-05-31 13:24:27 +00:00
|
|
|
*
|
2019-09-09 00:55:32 +00:00
|
|
|
* The function announces the change to all associated channels. For each
|
|
|
|
* channel, an appropriate preprocessing is done according to channel &ra_mode.
|
|
|
|
* For example, %RA_OPTIMAL channels receive just changes of best routes.
|
|
|
|
*
|
|
|
|
* In general, we first call preexport() hook of a protocol, which performs
|
|
|
|
* basic checks on the route (each protocol has a right to veto or force accept
|
|
|
|
* of the route before any filter is asked). Then we consult an export filter
|
|
|
|
* of the channel and verify the old route in an export map of the channel.
|
|
|
|
* Finally, the rt_notify() hook of the protocol gets called.
|
|
|
|
*
|
|
|
|
* Note that there are also calls of rt_notify() hooks due to feed, but that is
|
|
|
|
* done outside of scope of rte_announce().
|
2000-06-02 12:41:25 +00:00
|
|
|
*/
|
1999-04-05 20:25:03 +00:00
|
|
|
static void
|
2024-02-07 16:30:43 +00:00
|
|
|
rte_announce(struct rtable_private *tab, const struct netindex *i, net *net, const rte *new, const rte *old,
|
|
|
|
const rte *new_best, const rte *old_best)
|
1998-05-20 11:54:33 +00:00
|
|
|
{
|
2023-12-08 15:13:14 +00:00
|
|
|
/* Update network count */
|
|
|
|
tab->net_count += (!!new_best - !!old_best);
|
|
|
|
|
2024-02-07 16:30:43 +00:00
|
|
|
int new_best_valid = rte_is_valid(new_best);
|
|
|
|
int old_best_valid = rte_is_valid(old_best);
|
2012-11-10 13:26:13 +00:00
|
|
|
|
2021-09-27 11:04:16 +00:00
|
|
|
if ((new == old) && (new_best == old_best))
|
2012-11-10 13:26:13 +00:00
|
|
|
return;
|
1998-05-20 11:54:33 +00:00
|
|
|
|
2022-09-01 08:39:56 +00:00
|
|
|
if (new_best_valid)
|
2024-02-07 16:30:43 +00:00
|
|
|
new_best->sender->stats.pref++;
|
2022-09-01 08:39:56 +00:00
|
|
|
if (old_best_valid)
|
2024-02-07 16:30:43 +00:00
|
|
|
old_best->sender->stats.pref--;
|
2021-02-10 02:09:57 +00:00
|
|
|
|
2024-02-09 16:02:44 +00:00
|
|
|
if (EMPTY_LIST(tab->exporter.hooks) && EMPTY_LIST(tab->exporter.pending))
|
2021-09-27 11:04:16 +00:00
|
|
|
{
|
|
|
|
/* No export hook and no pending exports to cleanup. We may free the route immediately. */
|
|
|
|
if (!old)
|
|
|
|
return;
|
|
|
|
|
2024-02-07 16:30:43 +00:00
|
|
|
hmap_clear(&tab->id_map, old->id);
|
|
|
|
rte_free(SKIP_BACK(struct rte_storage, rte, old), tab);
|
2021-09-27 11:04:16 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Get the pending export structure */
|
|
|
|
struct rt_export_block *rpeb = NULL, *rpebsnl = NULL;
|
|
|
|
u32 end = 0;
|
|
|
|
|
2022-07-15 12:57:02 +00:00
|
|
|
if (!EMPTY_LIST(tab->exporter.pending))
|
2019-09-09 00:55:32 +00:00
|
|
|
{
|
2022-07-15 12:57:02 +00:00
|
|
|
rpeb = TAIL(tab->exporter.pending);
|
2021-09-27 11:04:16 +00:00
|
|
|
end = atomic_load_explicit(&rpeb->end, memory_order_relaxed);
|
|
|
|
if (end >= RT_PENDING_EXPORT_ITEMS)
|
|
|
|
{
|
|
|
|
ASSERT_DIE(end == RT_PENDING_EXPORT_ITEMS);
|
|
|
|
rpebsnl = rpeb;
|
|
|
|
|
|
|
|
rpeb = NULL;
|
|
|
|
end = 0;
|
|
|
|
}
|
2021-06-21 15:07:31 +00:00
|
|
|
}
|
2019-09-09 00:55:32 +00:00
|
|
|
|
2021-09-27 11:04:16 +00:00
|
|
|
if (!rpeb)
|
|
|
|
{
|
2022-07-15 12:57:02 +00:00
|
|
|
rpeb = alloc_page();
|
2021-09-27 11:04:16 +00:00
|
|
|
*rpeb = (struct rt_export_block) {};
|
2022-07-15 12:57:02 +00:00
|
|
|
add_tail(&tab->exporter.pending, &rpeb->n);
|
2021-09-27 11:04:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Fill the pending export */
|
|
|
|
struct rt_pending_export *rpe = &rpeb->export[rpeb->end];
|
|
|
|
*rpe = (struct rt_pending_export) {
|
|
|
|
.new = new,
|
|
|
|
.new_best = new_best,
|
|
|
|
.old = old,
|
|
|
|
.old_best = old_best,
|
2022-07-15 12:57:02 +00:00
|
|
|
.seq = tab->exporter.next_seq++,
|
2021-09-27 11:04:16 +00:00
|
|
|
};
|
|
|
|
|
2023-09-24 10:15:26 +00:00
|
|
|
rt_trace(tab, D_ROUTES, "Announcing %N, "
|
|
|
|
"new=%p id %u from %s, "
|
|
|
|
"old=%p id %u from %s, "
|
|
|
|
"new_best=%p id %u, "
|
|
|
|
"old_best=%p id %u seq=%lu",
|
2023-12-08 15:13:14 +00:00
|
|
|
i->addr,
|
2024-02-07 16:30:43 +00:00
|
|
|
new, new ? new->id : 0, new ? new->sender->req->name : NULL,
|
|
|
|
old, old ? old->id : 0, old ? old->sender->req->name : NULL,
|
|
|
|
new_best, new_best ? new_best->id : 0,
|
|
|
|
old_best, old_best ? old_best->id : 0,
|
2023-09-24 10:15:26 +00:00
|
|
|
rpe->seq);
|
2021-09-27 11:04:16 +00:00
|
|
|
|
|
|
|
ASSERT_DIE(atomic_fetch_add_explicit(&rpeb->end, 1, memory_order_release) == end);
|
|
|
|
|
|
|
|
if (rpebsnl)
|
2021-06-21 15:07:31 +00:00
|
|
|
{
|
2021-09-27 11:04:16 +00:00
|
|
|
_Bool f = 0;
|
|
|
|
ASSERT_DIE(atomic_compare_exchange_strong_explicit(&rpebsnl->not_last, &f, 1,
|
|
|
|
memory_order_release, memory_order_relaxed));
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Append to the same-network squasher list */
|
|
|
|
if (net->last)
|
|
|
|
{
|
|
|
|
struct rt_pending_export *rpenull = NULL;
|
|
|
|
ASSERT_DIE(atomic_compare_exchange_strong_explicit(
|
|
|
|
&net->last->next, &rpenull, rpe,
|
|
|
|
memory_order_relaxed,
|
|
|
|
memory_order_relaxed));
|
2022-08-31 09:58:27 +00:00
|
|
|
|
2021-09-27 11:04:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
net->last = rpe;
|
|
|
|
|
|
|
|
if (!net->first)
|
|
|
|
net->first = rpe;
|
|
|
|
|
2022-07-15 12:57:02 +00:00
|
|
|
if (tab->exporter.first == NULL)
|
|
|
|
tab->exporter.first = rpe;
|
2021-09-27 11:04:16 +00:00
|
|
|
|
2022-07-28 11:50:59 +00:00
|
|
|
rt_check_cork_high(tab);
|
2021-09-27 11:04:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static struct rt_pending_export *
|
|
|
|
rt_next_export_fast(struct rt_pending_export *last)
|
|
|
|
{
|
|
|
|
/* Get the whole export block and find our position in there. */
|
|
|
|
struct rt_export_block *rpeb = PAGE_HEAD(last);
|
|
|
|
u32 pos = (last - &rpeb->export[0]);
|
|
|
|
u32 end = atomic_load_explicit(&rpeb->end, memory_order_acquire);
|
|
|
|
ASSERT_DIE(pos < end);
|
|
|
|
|
|
|
|
/* Next is in the same block. */
|
|
|
|
if (++pos < end)
|
|
|
|
return &rpeb->export[pos];
|
|
|
|
|
|
|
|
/* There is another block. */
|
|
|
|
if (atomic_load_explicit(&rpeb->not_last, memory_order_acquire))
|
|
|
|
{
|
|
|
|
/* This is OK to do non-atomically because of the not_last flag. */
|
|
|
|
rpeb = NODE_NEXT(rpeb);
|
|
|
|
return &rpeb->export[0];
|
|
|
|
}
|
|
|
|
|
|
|
|
/* There is nothing more. */
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct rt_pending_export *
|
2024-02-09 16:02:44 +00:00
|
|
|
rt_next_export(struct rt_export_hook *hook, struct rt_exporter *tab)
|
2021-09-27 11:04:16 +00:00
|
|
|
{
|
2022-09-07 11:54:20 +00:00
|
|
|
ASSERT_DIE(RT_IS_LOCKED(SKIP_BACK(struct rtable_private, exporter, tab)));
|
|
|
|
|
2021-09-27 11:04:16 +00:00
|
|
|
/* As the table is locked, it is safe to reload the last export pointer */
|
|
|
|
struct rt_pending_export *last = atomic_load_explicit(&hook->last_export, memory_order_acquire);
|
|
|
|
|
|
|
|
/* It is still valid, let's reuse it */
|
|
|
|
if (last)
|
|
|
|
return rt_next_export_fast(last);
|
|
|
|
|
|
|
|
/* No, therefore we must process the table's first pending export */
|
|
|
|
else
|
2022-07-15 12:57:02 +00:00
|
|
|
return tab->first;
|
2021-09-27 11:04:16 +00:00
|
|
|
}
|
|
|
|
|
2021-06-19 18:50:18 +00:00
|
|
|
static inline void
|
|
|
|
rt_send_export_event(struct rt_export_hook *hook)
|
|
|
|
{
|
2022-09-05 04:58:42 +00:00
|
|
|
ev_send(hook->req->list, &hook->event);
|
2021-06-19 18:50:18 +00:00
|
|
|
}
|
|
|
|
|
2021-09-27 11:04:16 +00:00
|
|
|
static void
|
2022-09-21 16:43:44 +00:00
|
|
|
rt_announce_exports(struct settle *s)
|
2021-09-27 11:04:16 +00:00
|
|
|
{
|
2022-09-21 16:43:44 +00:00
|
|
|
RT_LOCKED(RT_PUB(SKIP_BACK(struct rtable_private, export_settle, s)), tab)
|
2022-09-07 11:54:20 +00:00
|
|
|
if (!EMPTY_LIST(tab->exporter.pending))
|
|
|
|
{
|
|
|
|
struct rt_export_hook *c; node *n;
|
2024-02-09 16:02:44 +00:00
|
|
|
WALK_LIST2(c, n, tab->exporter.hooks, n)
|
2022-09-07 11:54:20 +00:00
|
|
|
{
|
|
|
|
if (atomic_load_explicit(&c->export_state, memory_order_acquire) != TES_READY)
|
|
|
|
continue;
|
2016-01-26 10:48:58 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_send_export_event(c);
|
|
|
|
}
|
|
|
|
}
|
2021-09-27 11:04:16 +00:00
|
|
|
}
|
2022-06-27 17:53:06 +00:00
|
|
|
|
2022-09-26 10:09:14 +00:00
|
|
|
static void
|
|
|
|
rt_kick_export_settle(struct rtable_private *tab)
|
|
|
|
{
|
|
|
|
tab->export_settle.cf = tab->rr_counter ? tab->config->export_rr_settle : tab->config->export_settle;
|
|
|
|
settle_kick(&tab->export_settle, tab->loop);
|
|
|
|
}
|
|
|
|
|
2022-09-01 09:17:35 +00:00
|
|
|
static void
|
|
|
|
rt_import_announce_exports(void *_hook)
|
|
|
|
{
|
|
|
|
struct rt_import_hook *hook = _hook;
|
2022-09-12 08:25:14 +00:00
|
|
|
if (hook->import_state == TIS_CLEARED)
|
2022-09-07 11:54:20 +00:00
|
|
|
{
|
2022-09-12 08:25:14 +00:00
|
|
|
void (*stopped)(struct rt_import_request *) = hook->stopped;
|
|
|
|
struct rt_import_request *req = hook->req;
|
|
|
|
|
|
|
|
RT_LOCKED(hook->table, tab)
|
2022-09-07 11:54:20 +00:00
|
|
|
{
|
|
|
|
req->hook = NULL;
|
2022-09-01 09:17:35 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_trace(tab, D_EVENTS, "Hook %s stopped", req->name);
|
|
|
|
rem_node(&hook->n);
|
|
|
|
mb_free(hook);
|
|
|
|
rt_unlock_table(tab);
|
|
|
|
}
|
2022-09-01 09:17:35 +00:00
|
|
|
|
2022-09-12 08:25:14 +00:00
|
|
|
stopped(req);
|
|
|
|
return;
|
2022-09-07 11:54:20 +00:00
|
|
|
}
|
2022-09-12 08:25:14 +00:00
|
|
|
|
|
|
|
rt_trace(hook->table, D_EVENTS, "Announcing exports after imports from %s", hook->req->name);
|
|
|
|
birdloop_flag(hook->table->loop, RTF_EXPORT);
|
2022-09-01 09:17:35 +00:00
|
|
|
}
|
|
|
|
|
2021-09-27 11:04:16 +00:00
|
|
|
static struct rt_pending_export *
|
2024-02-09 16:02:44 +00:00
|
|
|
rt_last_export(struct rt_exporter *tab)
|
2021-09-27 11:04:16 +00:00
|
|
|
{
|
|
|
|
struct rt_pending_export *rpe = NULL;
|
2022-06-27 17:53:06 +00:00
|
|
|
|
2022-07-15 12:57:02 +00:00
|
|
|
if (!EMPTY_LIST(tab->pending))
|
2021-09-27 11:04:16 +00:00
|
|
|
{
|
|
|
|
/* We'll continue processing exports from this export on */
|
2022-07-15 12:57:02 +00:00
|
|
|
struct rt_export_block *reb = TAIL(tab->pending);
|
2021-09-27 11:04:16 +00:00
|
|
|
ASSERT_DIE(reb->end);
|
|
|
|
rpe = &reb->export[reb->end - 1];
|
|
|
|
}
|
2022-06-27 17:53:06 +00:00
|
|
|
|
2021-09-27 11:04:16 +00:00
|
|
|
return rpe;
|
|
|
|
}
|
2022-06-27 17:53:06 +00:00
|
|
|
|
2021-09-27 11:04:16 +00:00
|
|
|
#define RT_EXPORT_BULK 1024
|
|
|
|
|
|
|
|
static void
|
|
|
|
rt_export_hook(void *_data)
|
|
|
|
{
|
2024-02-09 16:02:44 +00:00
|
|
|
struct rt_export_hook *c = _data;
|
2022-09-07 11:54:20 +00:00
|
|
|
rtable *tab = SKIP_BACK(rtable, priv.exporter, c->table);
|
2021-09-27 11:04:16 +00:00
|
|
|
|
2024-02-09 16:02:44 +00:00
|
|
|
ASSERT_DIE(atomic_load_explicit(&c->export_state, memory_order_relaxed) == TES_READY);
|
2021-09-27 11:04:16 +00:00
|
|
|
|
|
|
|
if (!c->rpe_next)
|
2023-11-14 11:53:40 +00:00
|
|
|
RT_LOCKED(tab, tp)
|
2022-09-07 11:54:20 +00:00
|
|
|
{
|
2023-11-14 11:53:40 +00:00
|
|
|
c->rpe_next = rt_next_export(c, c->table);
|
2022-09-07 11:54:20 +00:00
|
|
|
|
2023-11-14 11:53:40 +00:00
|
|
|
if (!c->rpe_next)
|
|
|
|
{
|
2024-02-09 16:02:44 +00:00
|
|
|
rt_export_used(c->table, c->req->name, "done exporting");
|
2023-11-14 11:53:40 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
2022-06-22 10:45:42 +00:00
|
|
|
|
2022-09-05 04:58:42 +00:00
|
|
|
int used = 0;
|
2023-01-19 09:56:16 +00:00
|
|
|
int no_next = 0;
|
2022-09-05 04:58:42 +00:00
|
|
|
|
2021-09-27 11:04:16 +00:00
|
|
|
/* Process the export */
|
|
|
|
for (uint i=0; i<RT_EXPORT_BULK; i++)
|
|
|
|
{
|
2022-09-05 04:58:42 +00:00
|
|
|
used += rte_export(c, c->rpe_next);
|
2021-09-27 11:04:16 +00:00
|
|
|
|
|
|
|
if (!c->rpe_next)
|
2023-01-19 09:56:16 +00:00
|
|
|
{
|
|
|
|
no_next = 1;
|
2021-09-27 11:04:16 +00:00
|
|
|
break;
|
2023-01-19 09:56:16 +00:00
|
|
|
}
|
2019-09-09 00:55:32 +00:00
|
|
|
}
|
2021-09-27 11:04:16 +00:00
|
|
|
|
2022-09-05 04:58:42 +00:00
|
|
|
if (used)
|
2023-01-19 09:56:16 +00:00
|
|
|
RT_LOCKED(tab, t)
|
|
|
|
if (no_next || t->cork_active)
|
2024-02-09 16:02:44 +00:00
|
|
|
rt_export_used(c->table, c->req->name, no_next ? "finished export bulk" : "cork active");
|
2022-09-05 04:58:42 +00:00
|
|
|
|
2024-02-09 16:02:44 +00:00
|
|
|
rt_send_export_event(c);
|
1998-05-20 11:54:33 +00:00
|
|
|
}
|
|
|
|
|
2021-09-27 11:04:16 +00:00
|
|
|
|
1999-03-17 15:01:07 +00:00
|
|
|
static inline int
|
2021-06-21 15:07:31 +00:00
|
|
|
rte_validate(struct channel *ch, rte *e)
|
1999-03-17 15:01:07 +00:00
|
|
|
{
|
|
|
|
int c;
|
2020-01-28 10:42:46 +00:00
|
|
|
const net_addr *n = e->net;
|
1999-03-17 15:01:07 +00:00
|
|
|
|
2023-11-23 22:33:44 +00:00
|
|
|
#define IGNORING(pre, post) do { \
|
|
|
|
log(L_WARN "%s.%s: Ignoring " pre " %N " post, ch->proto->name, ch->name, n); \
|
|
|
|
return 0; \
|
|
|
|
} while (0)
|
|
|
|
|
2020-01-28 10:42:46 +00:00
|
|
|
if (!net_validate(n))
|
2023-11-23 22:33:44 +00:00
|
|
|
IGNORING("bogus prefix", "");
|
2010-02-26 09:55:58 +00:00
|
|
|
|
2017-12-09 23:55:34 +00:00
|
|
|
/* FIXME: better handling different nettypes */
|
2020-01-28 10:42:46 +00:00
|
|
|
c = !net_is_flow(n) ?
|
|
|
|
net_classify(n): (IADDR_HOST | SCOPE_UNIVERSE);
|
2010-02-26 09:55:58 +00:00
|
|
|
if ((c < 0) || !(c & IADDR_HOST) || ((c & IADDR_SCOPE_MASK) <= SCOPE_LINK))
|
2023-11-23 22:33:44 +00:00
|
|
|
IGNORING("bogus route", "");
|
2010-02-26 09:55:58 +00:00
|
|
|
|
2022-06-08 09:47:49 +00:00
|
|
|
if (net_type_match(n, NB_DEST))
|
2017-04-05 14:16:04 +00:00
|
|
|
{
|
2022-06-08 13:31:28 +00:00
|
|
|
eattr *nhea = ea_find(e->attrs, &ea_gen_nexthop);
|
2022-06-08 09:47:49 +00:00
|
|
|
int dest = nhea_dest(nhea);
|
2021-12-20 19:25:35 +00:00
|
|
|
|
2022-06-08 09:47:49 +00:00
|
|
|
if (dest == RTD_NONE)
|
2023-11-23 22:33:44 +00:00
|
|
|
IGNORING("route", "with no destination");
|
2017-04-05 14:16:04 +00:00
|
|
|
|
2022-06-08 09:47:49 +00:00
|
|
|
if ((dest == RTD_UNICAST) &&
|
|
|
|
!nexthop_is_sorted((struct nexthop_adata *) nhea->u.ptr))
|
2023-11-23 22:33:44 +00:00
|
|
|
IGNORING("unsorted multipath route", "");
|
2022-05-05 16:08:37 +00:00
|
|
|
}
|
2022-06-08 13:31:28 +00:00
|
|
|
else if (ea_find(e->attrs, &ea_gen_nexthop))
|
2023-11-23 22:33:44 +00:00
|
|
|
IGNORING("route", "having a superfluous nexthop attribute");
|
2016-08-30 15:17:27 +00:00
|
|
|
|
1999-03-17 15:01:07 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2023-10-31 08:58:42 +00:00
|
|
|
int
|
2023-07-03 18:38:24 +00:00
|
|
|
rte_same(const rte *x, const rte *y)
|
2000-05-06 21:21:19 +00:00
|
|
|
{
|
2023-01-01 19:10:23 +00:00
|
|
|
/* rte.flags / rte.pflags are not checked, as they are internal to rtable */
|
2000-05-06 21:21:19 +00:00
|
|
|
return
|
2023-11-01 09:58:44 +00:00
|
|
|
(x == y) || (
|
2023-10-31 08:58:42 +00:00
|
|
|
(x->attrs == y->attrs) ||
|
|
|
|
((!(x->attrs->flags & EALF_CACHED) || !(y->attrs->flags & EALF_CACHED)) && ea_same(x->attrs, y->attrs))
|
|
|
|
) &&
|
2020-04-10 15:08:29 +00:00
|
|
|
x->src == y->src &&
|
2019-02-22 01:16:39 +00:00
|
|
|
rte_is_filtered(x) == rte_is_filtered(y);
|
2000-05-06 21:21:19 +00:00
|
|
|
}
|
|
|
|
|
2023-07-03 18:38:24 +00:00
|
|
|
static inline int rte_is_ok(const rte *e) { return e && !rte_is_filtered(e); }
|
2012-11-16 12:29:16 +00:00
|
|
|
|
2022-09-01 09:17:35 +00:00
|
|
|
static int
|
2023-12-08 15:13:14 +00:00
|
|
|
rte_recalculate(struct rtable_private *table, struct rt_import_hook *c, struct netindex *i, net *net, rte *new, struct rte_src *src)
|
1998-05-20 11:54:33 +00:00
|
|
|
{
|
2021-06-21 15:07:31 +00:00
|
|
|
struct rt_import_request *req = c->req;
|
|
|
|
struct rt_import_stats *stats = &c->stats;
|
2020-01-28 10:42:46 +00:00
|
|
|
struct rte_storage *old_best_stored = net->routes, *old_stored = NULL;
|
2023-07-03 18:38:24 +00:00
|
|
|
const rte *old_best = old_best_stored ? &old_best_stored->rte : NULL;
|
|
|
|
const rte *old = NULL;
|
1998-05-20 11:54:33 +00:00
|
|
|
|
2022-06-27 10:32:15 +00:00
|
|
|
/* If the new route is identical to the old one, we find the attributes in
|
|
|
|
* cache and clone these with no performance drop. OTOH, if we were to lookup
|
|
|
|
* the attributes, such a route definitely hasn't been anywhere yet,
|
|
|
|
* therefore it's definitely worth the time. */
|
|
|
|
struct rte_storage *new_stored = NULL;
|
|
|
|
if (new)
|
2023-07-03 18:38:24 +00:00
|
|
|
{
|
2023-12-08 15:13:14 +00:00
|
|
|
new_stored = rte_store(new, i, table);
|
2023-07-03 18:38:24 +00:00
|
|
|
new = RTES_WRITE(new_stored);
|
|
|
|
}
|
2022-06-27 10:32:15 +00:00
|
|
|
|
2020-01-28 10:42:46 +00:00
|
|
|
/* Find and remove original route from the same protocol */
|
|
|
|
struct rte_storage **before_old = rte_find(net, src);
|
|
|
|
|
|
|
|
if (*before_old)
|
1998-05-20 11:54:33 +00:00
|
|
|
{
|
2020-01-28 10:42:46 +00:00
|
|
|
old = &(old_stored = (*before_old))->rte;
|
|
|
|
|
2020-05-01 20:26:24 +00:00
|
|
|
/* If there is the same route in the routing table but from
|
|
|
|
* a different sender, then there are two paths from the
|
|
|
|
* source protocol to this routing table through transparent
|
|
|
|
* pipes, which is not allowed.
|
|
|
|
* We log that and ignore the route. */
|
2021-06-21 15:07:31 +00:00
|
|
|
if (old->sender != c)
|
2020-05-01 20:26:24 +00:00
|
|
|
{
|
|
|
|
if (!old->generation && !new->generation)
|
|
|
|
bug("Two protocols claim to author a route with the same rte_src in table %s: %N %s/%u:%u",
|
2023-12-08 15:13:14 +00:00
|
|
|
c->table->name, i->addr, old->src->owner->name, old->src->private_id, old->src->global_id);
|
2020-05-01 20:26:24 +00:00
|
|
|
|
|
|
|
log_rl(&table->rl_pipe, L_ERR "Route source collision in table %s: %N %s/%u:%u",
|
2023-12-08 15:13:14 +00:00
|
|
|
c->table->name, i->addr, old->src->owner->name, old->src->private_id, old->src->global_id);
|
2020-05-01 20:26:24 +00:00
|
|
|
}
|
2009-12-02 16:26:16 +00:00
|
|
|
|
2022-06-27 10:32:15 +00:00
|
|
|
if (new && rte_same(old, &new_stored->rte))
|
2000-05-06 21:21:19 +00:00
|
|
|
{
|
2019-02-22 01:16:39 +00:00
|
|
|
/* No changes, ignore the new route and refresh the old one */
|
2023-07-03 18:38:24 +00:00
|
|
|
old_stored->stale_cycle = new->stale_cycle;
|
2012-11-10 13:26:13 +00:00
|
|
|
|
2012-11-15 00:29:01 +00:00
|
|
|
if (!rte_is_filtered(new))
|
2012-11-10 13:26:13 +00:00
|
|
|
{
|
2021-06-21 17:11:42 +00:00
|
|
|
stats->updates_ignored++;
|
2021-06-21 15:07:31 +00:00
|
|
|
rt_rte_trace_in(D_ROUTES, req, new, "ignored");
|
2012-11-10 13:26:13 +00:00
|
|
|
}
|
2022-06-27 10:32:15 +00:00
|
|
|
|
|
|
|
/* We need to free the already stored route here before returning */
|
2023-12-08 15:13:14 +00:00
|
|
|
rte_free(new_stored, table);
|
2022-09-01 09:17:35 +00:00
|
|
|
return 0;
|
2020-05-01 20:26:24 +00:00
|
|
|
}
|
2020-01-28 10:42:46 +00:00
|
|
|
|
2020-05-01 20:26:24 +00:00
|
|
|
*before_old = (*before_old)->next;
|
|
|
|
table->rt_count--;
|
1998-05-20 11:54:33 +00:00
|
|
|
}
|
|
|
|
|
2009-06-03 23:22:56 +00:00
|
|
|
if (!old && !new)
|
|
|
|
{
|
2021-06-21 17:11:42 +00:00
|
|
|
stats->withdraws_ignored++;
|
2022-09-01 09:17:35 +00:00
|
|
|
return 0;
|
2009-06-03 23:22:56 +00:00
|
|
|
}
|
|
|
|
|
2022-06-27 10:32:15 +00:00
|
|
|
/* If rejected by import limit, we need to pretend there is no route */
|
|
|
|
if (req->preimport && (req->preimport(req, new, old) == 0))
|
|
|
|
{
|
2023-12-08 15:13:14 +00:00
|
|
|
rte_free(new_stored, table);
|
2022-06-27 10:32:15 +00:00
|
|
|
new_stored = NULL;
|
|
|
|
new = NULL;
|
|
|
|
}
|
2021-06-21 15:07:31 +00:00
|
|
|
|
2013-01-10 12:07:33 +00:00
|
|
|
int new_ok = rte_is_ok(new);
|
|
|
|
int old_ok = rte_is_ok(old);
|
|
|
|
|
2012-11-16 12:29:16 +00:00
|
|
|
if (new_ok)
|
2021-06-21 17:11:42 +00:00
|
|
|
stats->updates_accepted++;
|
2012-11-16 12:29:16 +00:00
|
|
|
else if (old_ok)
|
2021-06-21 17:11:42 +00:00
|
|
|
stats->withdraws_accepted++;
|
2012-11-16 12:29:16 +00:00
|
|
|
else
|
2021-06-21 17:11:42 +00:00
|
|
|
stats->withdraws_ignored++;
|
2009-06-03 23:22:56 +00:00
|
|
|
|
2021-02-10 02:09:57 +00:00
|
|
|
if (old_ok || new_ok)
|
|
|
|
table->last_rt_change = current_time();
|
|
|
|
|
2012-07-04 19:31:03 +00:00
|
|
|
if (table->config->sorted)
|
1998-05-20 11:54:33 +00:00
|
|
|
{
|
2012-07-04 19:31:03 +00:00
|
|
|
/* If routes are sorted, just insert new route to appropriate position */
|
2020-01-28 10:42:46 +00:00
|
|
|
if (new_stored)
|
2012-07-04 19:31:03 +00:00
|
|
|
{
|
2020-01-28 10:42:46 +00:00
|
|
|
struct rte_storage **k;
|
|
|
|
if ((before_old != &net->routes) && !rte_better(new, &SKIP_BACK(struct rte_storage, next, before_old)->rte))
|
|
|
|
k = before_old;
|
2012-07-04 19:31:03 +00:00
|
|
|
else
|
|
|
|
k = &net->routes;
|
2009-08-11 13:49:56 +00:00
|
|
|
|
2012-07-04 19:31:03 +00:00
|
|
|
for (; *k; k=&(*k)->next)
|
2020-01-28 10:42:46 +00:00
|
|
|
if (rte_better(new, &(*k)->rte))
|
2012-07-04 19:31:03 +00:00
|
|
|
break;
|
2009-08-11 13:49:56 +00:00
|
|
|
|
2020-01-28 10:42:46 +00:00
|
|
|
new_stored->next = *k;
|
|
|
|
*k = new_stored;
|
2020-07-16 13:02:10 +00:00
|
|
|
|
2018-12-11 12:52:30 +00:00
|
|
|
table->rt_count++;
|
2012-07-04 19:31:03 +00:00
|
|
|
}
|
1998-05-20 11:54:33 +00:00
|
|
|
}
|
2012-07-04 19:31:03 +00:00
|
|
|
else
|
1998-05-20 11:54:33 +00:00
|
|
|
{
|
2012-07-04 19:31:03 +00:00
|
|
|
/* If routes are not sorted, find the best route and move it on
|
|
|
|
the first position. There are several optimized cases. */
|
|
|
|
|
2021-09-27 14:40:28 +00:00
|
|
|
if (src->owner->rte_recalculate &&
|
2023-07-03 18:38:24 +00:00
|
|
|
src->owner->rte_recalculate(table, net, new_stored, old_stored, old_best_stored))
|
2012-07-04 19:31:03 +00:00
|
|
|
goto do_recalculate;
|
|
|
|
|
2020-01-28 10:42:46 +00:00
|
|
|
if (new_stored && rte_better(&new_stored->rte, old_best))
|
1998-05-20 11:54:33 +00:00
|
|
|
{
|
2012-07-04 19:31:03 +00:00
|
|
|
/* The first case - the new route is cleary optimal,
|
|
|
|
we link it at the first position */
|
|
|
|
|
2020-01-28 10:42:46 +00:00
|
|
|
new_stored->next = net->routes;
|
|
|
|
net->routes = new_stored;
|
2020-07-16 13:02:10 +00:00
|
|
|
|
2018-12-11 12:52:30 +00:00
|
|
|
table->rt_count++;
|
2009-08-11 13:49:56 +00:00
|
|
|
}
|
2012-07-04 19:31:03 +00:00
|
|
|
else if (old == old_best)
|
2009-08-11 13:49:56 +00:00
|
|
|
{
|
2012-07-04 19:31:03 +00:00
|
|
|
/* The second case - the old best route disappeared, we add the
|
|
|
|
new route (if we have any) to the list (we don't care about
|
|
|
|
position) and then we elect the new optimal route and relink
|
|
|
|
that route at the first position and announce it. New optimal
|
|
|
|
route might be NULL if there is no more routes */
|
|
|
|
|
|
|
|
do_recalculate:
|
|
|
|
/* Add the new route to the list */
|
2020-01-28 10:42:46 +00:00
|
|
|
if (new_stored)
|
1998-05-20 11:54:33 +00:00
|
|
|
{
|
2020-01-28 10:42:46 +00:00
|
|
|
new_stored->next = *before_old;
|
|
|
|
*before_old = new_stored;
|
2020-07-16 13:02:10 +00:00
|
|
|
|
2018-12-11 12:52:30 +00:00
|
|
|
table->rt_count++;
|
2012-07-04 19:31:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Find a new optimal route (if there is any) */
|
|
|
|
if (net->routes)
|
|
|
|
{
|
2020-01-28 10:42:46 +00:00
|
|
|
struct rte_storage **bp = &net->routes;
|
|
|
|
for (struct rte_storage **k=&(*bp)->next; *k; k=&(*k)->next)
|
|
|
|
if (rte_better(&(*k)->rte, &(*bp)->rte))
|
2012-07-04 19:31:03 +00:00
|
|
|
bp = k;
|
|
|
|
|
|
|
|
/* And relink it */
|
2020-01-28 10:42:46 +00:00
|
|
|
struct rte_storage *best = *bp;
|
2012-07-04 19:31:03 +00:00
|
|
|
*bp = best->next;
|
|
|
|
best->next = net->routes;
|
|
|
|
net->routes = best;
|
1998-05-20 11:54:33 +00:00
|
|
|
}
|
|
|
|
}
|
2020-01-28 10:42:46 +00:00
|
|
|
else if (new_stored)
|
2012-07-04 19:31:03 +00:00
|
|
|
{
|
|
|
|
/* The third case - the new route is not better than the old
|
|
|
|
best route (therefore old_best != NULL) and the old best
|
|
|
|
route was not removed (therefore old_best == net->routes).
|
2020-07-16 13:02:10 +00:00
|
|
|
We just link the new route to the old/last position. */
|
|
|
|
|
2020-01-28 10:42:46 +00:00
|
|
|
new_stored->next = *before_old;
|
|
|
|
*before_old = new_stored;
|
2012-07-04 19:31:03 +00:00
|
|
|
|
2018-12-11 12:52:30 +00:00
|
|
|
table->rt_count++;
|
2012-07-04 19:31:03 +00:00
|
|
|
}
|
|
|
|
/* The fourth (empty) case - suboptimal route was removed, nothing to do */
|
1998-05-20 11:54:33 +00:00
|
|
|
}
|
2009-08-11 13:49:56 +00:00
|
|
|
|
2020-01-28 10:42:46 +00:00
|
|
|
if (new_stored)
|
2019-09-09 00:55:32 +00:00
|
|
|
{
|
2023-07-03 18:38:24 +00:00
|
|
|
new->lastmod = current_time();
|
|
|
|
new->id = hmap_first_zero(&table->id_map);
|
|
|
|
hmap_set(&table->id_map, new->id);
|
2019-09-09 00:55:32 +00:00
|
|
|
}
|
2012-07-04 19:31:03 +00:00
|
|
|
|
|
|
|
/* Log the route change */
|
2021-06-21 15:07:31 +00:00
|
|
|
if (new_ok)
|
|
|
|
rt_rte_trace_in(D_ROUTES, req, &new_stored->rte, new_stored == net->routes ? "added [best]" : "added");
|
|
|
|
else if (old_ok)
|
2009-12-02 13:33:34 +00:00
|
|
|
{
|
2021-06-21 15:07:31 +00:00
|
|
|
if (old != old_best)
|
|
|
|
rt_rte_trace_in(D_ROUTES, req, old, "removed");
|
|
|
|
else if (net->routes && rte_is_ok(&net->routes->rte))
|
|
|
|
rt_rte_trace_in(D_ROUTES, req, old, "removed [replaced]");
|
|
|
|
else
|
|
|
|
rt_rte_trace_in(D_ROUTES, req, old, "removed [sole]");
|
2009-08-11 13:49:56 +00:00
|
|
|
}
|
2022-10-11 09:08:15 +00:00
|
|
|
else
|
|
|
|
if (req->trace_routes & D_ROUTES)
|
2023-12-08 15:13:14 +00:00
|
|
|
log(L_TRACE "%s > ignored %N %s->%s", req->name, i->addr, old ? "filtered" : "none", new ? "filtered" : "none");
|
2009-08-11 13:49:56 +00:00
|
|
|
|
2012-07-04 19:31:03 +00:00
|
|
|
/* Propagate the route change */
|
2024-02-07 16:30:43 +00:00
|
|
|
rte_announce(table, i, net,
|
|
|
|
RTE_OR_NULL(new_stored), RTE_OR_NULL(old_stored),
|
|
|
|
RTE_OR_NULL(net->routes), RTE_OR_NULL(old_best_stored));
|
2012-04-15 13:07:58 +00:00
|
|
|
|
2022-09-01 09:17:35 +00:00
|
|
|
return 1;
|
1998-10-18 11:13:16 +00:00
|
|
|
}
|
|
|
|
|
2022-06-27 10:32:15 +00:00
|
|
|
int
|
2023-07-03 18:38:24 +00:00
|
|
|
channel_preimport(struct rt_import_request *req, rte *new, const rte *old)
|
2021-06-21 15:07:31 +00:00
|
|
|
{
|
|
|
|
struct channel *c = SKIP_BACK(struct channel, in_req, req);
|
|
|
|
|
|
|
|
if (new && !old)
|
|
|
|
if (CHANNEL_LIMIT_PUSH(c, RX))
|
2022-06-27 10:32:15 +00:00
|
|
|
return 0;
|
2021-06-21 15:07:31 +00:00
|
|
|
|
|
|
|
if (!new && old)
|
|
|
|
CHANNEL_LIMIT_POP(c, RX);
|
|
|
|
|
|
|
|
int new_in = new && !rte_is_filtered(new);
|
|
|
|
int old_in = old && !rte_is_filtered(old);
|
2023-11-08 20:51:46 +00:00
|
|
|
|
|
|
|
int verdict = 1;
|
2021-06-21 15:07:31 +00:00
|
|
|
|
|
|
|
if (new_in && !old_in)
|
|
|
|
if (CHANNEL_LIMIT_PUSH(c, IN))
|
2022-06-16 21:24:56 +00:00
|
|
|
if (c->in_keep & RIK_REJECTED)
|
2021-06-21 15:07:31 +00:00
|
|
|
new->flags |= REF_FILTERED;
|
|
|
|
else
|
2023-11-08 20:51:46 +00:00
|
|
|
verdict = 0;
|
2021-06-21 15:07:31 +00:00
|
|
|
|
|
|
|
if (!new_in && old_in)
|
|
|
|
CHANNEL_LIMIT_POP(c, IN);
|
|
|
|
|
2023-11-08 20:51:46 +00:00
|
|
|
mpls_rte_preimport(new_in ? new : NULL, old_in ? old : NULL);
|
|
|
|
|
|
|
|
return verdict;
|
2021-06-21 15:07:31 +00:00
|
|
|
}
|
|
|
|
|
2009-05-31 13:24:27 +00:00
|
|
|
void
|
2020-01-28 10:42:46 +00:00
|
|
|
rte_update(struct channel *c, const net_addr *n, rte *new, struct rte_src *src)
|
1999-04-05 20:25:03 +00:00
|
|
|
{
|
2021-06-21 15:07:31 +00:00
|
|
|
if (!c->in_req.hook)
|
2022-10-11 09:08:15 +00:00
|
|
|
{
|
|
|
|
log(L_WARN "%s.%s: Called rte_update without import hook", c->proto->name, c->name);
|
2021-06-21 15:07:31 +00:00
|
|
|
return;
|
2022-10-11 09:08:15 +00:00
|
|
|
}
|
2021-06-21 15:07:31 +00:00
|
|
|
|
|
|
|
ASSERT(c->channel_state == CS_UP);
|
|
|
|
|
2024-01-26 13:42:11 +00:00
|
|
|
ea_list *ea_tmp[2] = {};
|
|
|
|
|
2022-06-16 21:24:56 +00:00
|
|
|
/* The import reloader requires prefilter routes to be the first layer */
|
|
|
|
if (new && (c->in_keep & RIK_PREFILTER))
|
2024-01-26 13:42:11 +00:00
|
|
|
ea_tmp[0] = new->attrs =
|
|
|
|
(ea_is_cached(new->attrs) && !new->attrs->next) ?
|
|
|
|
ea_clone(new->attrs) :
|
|
|
|
ea_lookup(new->attrs, 0);
|
1999-04-05 20:25:03 +00:00
|
|
|
|
2024-01-28 12:09:48 +00:00
|
|
|
#if 0
|
|
|
|
debug("%s.%s -(prefilter)-> %s: %N ", c->proto->name, c->name, c->table->name, n);
|
|
|
|
if (new) ea_dump(new->attrs);
|
|
|
|
else debug("withdraw");
|
|
|
|
debug("\n");
|
|
|
|
#endif
|
|
|
|
|
2021-06-21 15:07:31 +00:00
|
|
|
const struct filter *filter = c->in_filter;
|
|
|
|
struct channel_import_stats *stats = &c->import_stats;
|
2023-11-23 17:41:07 +00:00
|
|
|
struct mpls_fec *fec = NULL;
|
2016-01-26 10:48:58 +00:00
|
|
|
|
1999-04-05 20:25:03 +00:00
|
|
|
if (new)
|
|
|
|
{
|
2020-01-28 10:42:46 +00:00
|
|
|
new->net = n;
|
2024-01-23 19:25:48 +00:00
|
|
|
new->sender = c->in_req.hook;
|
2021-06-21 15:07:31 +00:00
|
|
|
|
|
|
|
int fr;
|
2016-01-26 10:48:58 +00:00
|
|
|
|
2021-06-21 17:11:42 +00:00
|
|
|
stats->updates_received++;
|
2022-05-31 10:51:34 +00:00
|
|
|
if ((filter == FILTER_REJECT) ||
|
2022-05-30 14:41:15 +00:00
|
|
|
((fr = f_run(filter, new, 0)) > F_ACCEPT))
|
2000-03-12 20:30:53 +00:00
|
|
|
{
|
2021-06-21 17:11:42 +00:00
|
|
|
stats->updates_filtered++;
|
2021-06-21 15:07:31 +00:00
|
|
|
channel_rte_trace_in(D_FILTERS, c, new, "filtered out");
|
2012-11-10 13:26:13 +00:00
|
|
|
|
2022-06-16 21:24:56 +00:00
|
|
|
if (c->in_keep & RIK_REJECTED)
|
2021-06-21 15:07:31 +00:00
|
|
|
new->flags |= REF_FILTERED;
|
|
|
|
else
|
|
|
|
new = NULL;
|
2000-03-12 20:30:53 +00:00
|
|
|
}
|
2022-05-15 13:53:35 +00:00
|
|
|
|
2023-11-23 23:05:51 +00:00
|
|
|
if (new && c->proto->mpls_channel)
|
2023-11-23 17:41:07 +00:00
|
|
|
if (mpls_handle_rte(c->proto->mpls_channel, n, new, &fec) < 0)
|
2023-11-09 15:34:04 +00:00
|
|
|
{
|
|
|
|
channel_rte_trace_in(D_FILTERS, c, new, "invalid");
|
|
|
|
stats->updates_invalid++;
|
|
|
|
new = NULL;
|
|
|
|
}
|
2023-11-08 20:51:46 +00:00
|
|
|
|
2022-05-31 10:51:34 +00:00
|
|
|
if (new)
|
2024-01-26 13:42:11 +00:00
|
|
|
{
|
|
|
|
ea_tmp[1] = new->attrs =
|
|
|
|
ea_is_cached(new->attrs) ? ea_clone(new->attrs) : ea_lookup(new->attrs, !!ea_tmp[0]);
|
|
|
|
|
2022-06-07 10:18:23 +00:00
|
|
|
if (net_is_flow(n))
|
|
|
|
rt_flowspec_resolve_rte(new, c);
|
|
|
|
else
|
|
|
|
rt_next_hop_resolve_rte(new);
|
2024-01-26 13:42:11 +00:00
|
|
|
}
|
2022-05-15 13:53:35 +00:00
|
|
|
|
2022-05-31 10:51:34 +00:00
|
|
|
if (new && !rte_validate(c, new))
|
2022-05-15 13:53:35 +00:00
|
|
|
{
|
2022-05-31 10:51:34 +00:00
|
|
|
channel_rte_trace_in(D_FILTERS, c, new, "invalid");
|
|
|
|
stats->updates_invalid++;
|
|
|
|
new = NULL;
|
2022-05-15 13:53:35 +00:00
|
|
|
}
|
2021-06-21 15:07:31 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
stats->withdraws_received++;
|
2012-11-10 13:26:13 +00:00
|
|
|
|
2021-06-21 15:07:31 +00:00
|
|
|
rte_import(&c->in_req, n, new, src);
|
2019-03-14 16:22:22 +00:00
|
|
|
|
2023-11-23 17:41:07 +00:00
|
|
|
if (fec)
|
|
|
|
{
|
|
|
|
mpls_unlock_fec(fec);
|
|
|
|
DBGL( "Unlock FEC %p (rte_update %N)", fec, n);
|
|
|
|
}
|
|
|
|
|
2022-06-16 21:24:56 +00:00
|
|
|
/* Now the route attributes are kept by the in-table cached version
|
2024-01-26 13:42:11 +00:00
|
|
|
* and we may drop the local handles */
|
|
|
|
for (uint k = 0; k < ARRAY_SIZE(ea_tmp); k++)
|
|
|
|
if (ea_tmp[k])
|
|
|
|
ea_free(ea_tmp[k]);
|
2021-06-21 15:07:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
rte_import(struct rt_import_request *req, const net_addr *n, rte *new, struct rte_src *src)
|
|
|
|
{
|
|
|
|
struct rt_import_hook *hook = req->hook;
|
|
|
|
if (!hook)
|
2022-10-11 09:08:15 +00:00
|
|
|
{
|
|
|
|
log(L_WARN "%s: Called rte_import without import hook", req->name);
|
2021-06-21 15:07:31 +00:00
|
|
|
return;
|
2022-10-11 09:08:15 +00:00
|
|
|
}
|
2019-01-31 14:02:15 +00:00
|
|
|
|
2023-12-08 15:13:14 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
RT_LOCKED(hook->table, tab)
|
|
|
|
{
|
2023-12-08 15:13:14 +00:00
|
|
|
struct netindex *i;
|
2022-09-07 11:54:20 +00:00
|
|
|
net *nn;
|
|
|
|
if (new)
|
2021-06-21 15:07:31 +00:00
|
|
|
{
|
2023-12-08 15:13:14 +00:00
|
|
|
/* Allocate the key structure */
|
|
|
|
i = net_get_index(tab->netindex, n);
|
|
|
|
nn = net_get(tab, i);
|
|
|
|
new->net = i->addr;
|
2021-06-21 15:07:31 +00:00
|
|
|
new->sender = hook;
|
Route refresh in tables uses a stale counter.
Until now, we were marking routes as REF_STALE and REF_DISCARD to
cleanup old routes after route refresh. This needed a synchronous route
table walk at both beginning and the end of route refresh routine,
marking the routes by the flags.
We avoid these walks by using a stale counter. Every route contains:
u8 stale_cycle;
Every import hook contains:
u8 stale_set;
u8 stale_valid;
u8 stale_pruned;
u8 stale_pruning;
In base_state, stale_set == stale_valid == stale_pruned == stale_pruning
and all routes' stale_cycle also have the same value.
The route refresh looks like follows:
+ ----------- + --------- + ----------- + ------------- + ------------ +
| | stale_set | stale_valid | stale_pruning | stale_pruned |
| Base | x | x | x | x |
| Begin | x+1 | x | x | x |
... now routes are being inserted with stale_cycle == (x+1)
| End | x+1 | x+1 | x | x |
... now table pruning routine is scheduled
| Prune begin | x+1 | x+1 | x+1 | x |
... now routes with stale_cycle not between stale_set and stale_valid
are deleted
| Prune end | x+1 | x+1 | x+1 | x+1 |
+ ----------- + --------- + ----------- + ------------- + ------------ +
The pruning routine is asynchronous and may have high latency in
high-load environments. Therefore, multiple route refresh requests may
happen before the pruning routine starts, leading to this situation:
| Prune begin | x+k | x+k | x -> x+k | x |
... or even
| Prune begin | x+k+1 | x+k | x -> x+k | x |
... if the prune event starts while another route refresh is running.
In such a case, the pruning routine still deletes routes not fitting
between stale_set and and stale_valid, effectively pruning the remnants
of all unpruned route refreshes from before:
| Prune end | x+k | x+k | x+k | x+k |
In extremely rare cases, there may happen too many route refreshes
before any route prune routine finishes. If the difference between
stale_valid and stale_pruned becomes more than 128 when requesting for
another route refresh, the routine walks the table synchronously and
resets all the stale values to a base state, while logging a warning.
2022-07-12 08:36:10 +00:00
|
|
|
|
|
|
|
/* Set the stale cycle */
|
|
|
|
new->stale_cycle = hook->stale_set;
|
1999-04-05 20:25:03 +00:00
|
|
|
}
|
2023-12-08 15:13:14 +00:00
|
|
|
else if (i = net_find_index(tab->netindex, n))
|
|
|
|
{
|
|
|
|
nn = net_find(tab, i);
|
|
|
|
}
|
|
|
|
else
|
2012-08-14 14:25:22 +00:00
|
|
|
{
|
2021-06-21 15:07:31 +00:00
|
|
|
req->hook->stats.withdraws_ignored++;
|
2022-10-11 09:08:15 +00:00
|
|
|
if (req->trace_routes & D_ROUTES)
|
|
|
|
log(L_TRACE "%s > ignored %N withdraw", req->name, n);
|
2023-11-14 11:53:40 +00:00
|
|
|
return;
|
2012-08-14 14:25:22 +00:00
|
|
|
}
|
2009-06-03 23:22:56 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
/* Recalculate the best route */
|
2023-12-08 15:13:14 +00:00
|
|
|
if (rte_recalculate(tab, hook, i, nn, new, src))
|
2022-09-07 11:54:20 +00:00
|
|
|
ev_send(req->list, &hook->announce_event);
|
|
|
|
}
|
1999-04-05 20:25:03 +00:00
|
|
|
}
|
|
|
|
|
2013-02-08 22:58:27 +00:00
|
|
|
/* Check rtable for best route to given net whether it would be exported do p */
|
|
|
|
int
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_examine(rtable *tp, net_addr *a, struct channel *c, const struct filter *filter)
|
2013-02-08 22:58:27 +00:00
|
|
|
{
|
2022-09-07 11:54:20 +00:00
|
|
|
rte rt = {};
|
2013-02-08 22:58:27 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
RT_LOCKED(tp, t)
|
|
|
|
{
|
2023-12-08 15:13:14 +00:00
|
|
|
const struct netindex *i = net_find_index(t->netindex, a);
|
|
|
|
net *n = i ? net_find(t, i) : NULL;
|
2022-09-07 11:54:20 +00:00
|
|
|
if (n)
|
2024-02-07 16:30:43 +00:00
|
|
|
rt = RTE_COPY_VALID(RTE_OR_NULL(n->routes));
|
2022-09-07 11:54:20 +00:00
|
|
|
}
|
2013-02-08 22:58:27 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
if (!rt.src)
|
|
|
|
return 0;
|
2020-01-28 10:42:46 +00:00
|
|
|
|
|
|
|
int v = c->proto->preexport ? c->proto->preexport(c, &rt) : 0;
|
2013-02-08 22:58:27 +00:00
|
|
|
if (v == RIC_PROCESS)
|
2022-04-10 16:55:15 +00:00
|
|
|
v = (f_run(filter, &rt, FF_SILENT) <= F_ACCEPT);
|
2013-02-08 22:58:27 +00:00
|
|
|
|
|
|
|
return v > 0;
|
|
|
|
}
|
|
|
|
|
2022-06-20 19:29:10 +00:00
|
|
|
static void
|
2022-09-05 04:58:42 +00:00
|
|
|
rt_table_export_done(void *hh)
|
2022-06-20 19:29:10 +00:00
|
|
|
{
|
2024-02-09 16:02:44 +00:00
|
|
|
struct rt_export_hook *hook = hh;
|
|
|
|
struct rt_export_request *req = hook->req;
|
|
|
|
void (*stopped)(struct rt_export_request *) = hook->stopped;
|
2022-09-07 11:54:20 +00:00
|
|
|
rtable *t = SKIP_BACK(rtable, priv.exporter, hook->table);
|
2022-06-20 19:29:10 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
RT_LOCKED(t, tab)
|
|
|
|
{
|
|
|
|
DBG("Export hook %p in table %s finished uc=%u\n", hook, tab->name, tab->use_count);
|
|
|
|
|
|
|
|
/* Drop pending exports */
|
2024-02-09 16:02:44 +00:00
|
|
|
rt_export_used(&tab->exporter, hook->req->name, "stopped");
|
2022-08-31 09:58:27 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
/* Do the common code; this frees the hook */
|
2024-02-09 16:02:44 +00:00
|
|
|
rt_export_stopped(hook);
|
2022-09-07 11:54:20 +00:00
|
|
|
}
|
2022-09-05 04:58:42 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
/* Report the channel as stopped. */
|
|
|
|
CALL(stopped, req);
|
2022-08-31 09:58:27 +00:00
|
|
|
|
|
|
|
/* Unlock the table; this may free it */
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_unlock_table(t);
|
2022-06-20 19:29:10 +00:00
|
|
|
}
|
|
|
|
|
2022-09-05 04:58:42 +00:00
|
|
|
void
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_export_stopped(struct rt_export_hook *hook)
|
2021-06-21 15:07:31 +00:00
|
|
|
{
|
2022-09-07 11:54:20 +00:00
|
|
|
/* Unlink from the request */
|
|
|
|
hook->req->hook = NULL;
|
2021-09-27 11:04:16 +00:00
|
|
|
|
2021-06-21 15:07:31 +00:00
|
|
|
/* Unlist */
|
|
|
|
rem_node(&hook->n);
|
|
|
|
|
2022-09-05 04:58:42 +00:00
|
|
|
/* Free the hook itself together with its pool */
|
2023-04-20 19:08:38 +00:00
|
|
|
rp_free(hook->pool);
|
2021-06-21 15:07:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline void
|
|
|
|
rt_set_import_state(struct rt_import_hook *hook, u8 state)
|
|
|
|
{
|
|
|
|
hook->last_state_change = current_time();
|
|
|
|
hook->import_state = state;
|
|
|
|
|
2022-08-31 09:58:27 +00:00
|
|
|
CALL(hook->req->log_state_change, hook->req, state);
|
2021-06-21 15:07:31 +00:00
|
|
|
}
|
|
|
|
|
2023-08-15 10:31:28 +00:00
|
|
|
u8
|
|
|
|
rt_set_export_state(struct rt_export_hook *hook, u32 expected_mask, u8 state)
|
2021-06-21 15:07:31 +00:00
|
|
|
{
|
|
|
|
hook->last_state_change = current_time();
|
2022-09-20 10:40:23 +00:00
|
|
|
u8 old = atomic_exchange_explicit(&hook->export_state, state, memory_order_release);
|
2023-08-15 10:31:28 +00:00
|
|
|
if (!((1 << old) & expected_mask))
|
|
|
|
bug("Unexpected export state change from %s to %s, expected mask %02x",
|
|
|
|
rt_export_state_name(old),
|
|
|
|
rt_export_state_name(state),
|
|
|
|
expected_mask
|
|
|
|
);
|
2021-06-21 15:07:31 +00:00
|
|
|
|
2022-09-20 10:40:23 +00:00
|
|
|
if (old != state)
|
|
|
|
CALL(hook->req->log_state_change, hook->req, state);
|
2023-08-15 10:31:28 +00:00
|
|
|
|
|
|
|
return old;
|
2021-06-21 15:07:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_request_import(rtable *t, struct rt_import_request *req)
|
2021-06-21 15:07:31 +00:00
|
|
|
{
|
2022-09-07 11:54:20 +00:00
|
|
|
RT_LOCKED(t, tab)
|
|
|
|
{
|
|
|
|
rt_lock_table(tab);
|
2021-06-21 15:07:31 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
struct rt_import_hook *hook = req->hook = mb_allocz(tab->rp, sizeof(struct rt_import_hook));
|
2021-06-21 15:07:31 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
hook->announce_event = (event) { .hook = rt_import_announce_exports, .data = hook };
|
2022-09-01 09:17:35 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
DBG("Lock table %s for import %p req=%p uc=%u\n", tab->name, hook, req, tab->use_count);
|
2021-06-21 15:07:31 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
hook->req = req;
|
|
|
|
hook->table = t;
|
2021-06-21 15:07:31 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_set_import_state(hook, TIS_UP);
|
|
|
|
add_tail(&tab->imports, &hook->n);
|
|
|
|
}
|
2021-06-21 15:07:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
rt_stop_import(struct rt_import_request *req, void (*stopped)(struct rt_import_request *))
|
|
|
|
{
|
|
|
|
ASSERT_DIE(req->hook);
|
|
|
|
struct rt_import_hook *hook = req->hook;
|
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
RT_LOCKED(hook->table, tab)
|
|
|
|
{
|
|
|
|
rt_schedule_prune(tab);
|
|
|
|
rt_set_import_state(hook, TIS_STOP);
|
|
|
|
hook->stopped = stopped;
|
2022-09-26 10:09:14 +00:00
|
|
|
|
2023-09-14 12:40:33 +00:00
|
|
|
rt_refresh_trace(tab, hook, "stop import");
|
|
|
|
|
2023-01-19 09:56:16 +00:00
|
|
|
/* Cancel table rr_counter */
|
2022-09-26 10:09:14 +00:00
|
|
|
if (hook->stale_set != hook->stale_pruned)
|
2023-01-19 09:56:16 +00:00
|
|
|
tab->rr_counter -= (hook->stale_set - hook->stale_pruned);
|
|
|
|
|
|
|
|
tab->rr_counter++;
|
2022-09-26 10:09:14 +00:00
|
|
|
|
|
|
|
hook->stale_set = hook->stale_pruned = hook->stale_pruning = hook->stale_valid = 0;
|
2022-09-07 11:54:20 +00:00
|
|
|
}
|
2021-06-21 15:07:31 +00:00
|
|
|
}
|
|
|
|
|
2024-02-09 16:02:44 +00:00
|
|
|
static void rt_table_export_start_feed(struct rtable_private *tab, struct rt_export_hook *hook);
|
2022-09-20 10:40:23 +00:00
|
|
|
static void
|
|
|
|
rt_table_export_uncork(void *_hook)
|
|
|
|
{
|
|
|
|
ASSERT_DIE(birdloop_inside(&main_birdloop));
|
|
|
|
|
2024-02-09 16:02:44 +00:00
|
|
|
struct rt_export_hook *hook = _hook;
|
|
|
|
struct birdloop *loop = hook->req->list->loop;
|
2022-09-20 10:40:23 +00:00
|
|
|
|
|
|
|
if (loop != &main_birdloop)
|
|
|
|
birdloop_enter(loop);
|
|
|
|
|
|
|
|
u8 state;
|
2024-02-09 16:02:44 +00:00
|
|
|
switch (state = atomic_load_explicit(&hook->export_state, memory_order_relaxed))
|
2022-09-20 10:40:23 +00:00
|
|
|
{
|
|
|
|
case TES_HUNGRY:
|
|
|
|
RT_LOCKED(RT_PUB(SKIP_BACK(struct rtable_private, exporter, hook->table)), tab)
|
2024-02-09 16:02:44 +00:00
|
|
|
if ((state = atomic_load_explicit(&hook->export_state, memory_order_relaxed)) == TES_HUNGRY)
|
2022-10-06 15:51:32 +00:00
|
|
|
rt_table_export_start_feed(tab, hook);
|
|
|
|
if (state != TES_STOP)
|
|
|
|
break;
|
|
|
|
/* fall through */
|
2022-09-20 10:40:23 +00:00
|
|
|
case TES_STOP:
|
2024-02-09 16:02:44 +00:00
|
|
|
rt_stop_export_common(hook);
|
2022-09-20 10:40:23 +00:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
bug("Uncorking a table export in a strange state: %u", state);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (loop != &main_birdloop)
|
|
|
|
birdloop_leave(loop);
|
|
|
|
}
|
|
|
|
|
2022-09-05 04:58:42 +00:00
|
|
|
static void
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_table_export_start_locked(struct rtable_private *tab, struct rt_export_request *req)
|
2021-06-21 15:07:31 +00:00
|
|
|
{
|
2024-02-09 16:02:44 +00:00
|
|
|
struct rt_exporter *re = &tab->exporter;
|
2021-06-21 15:07:31 +00:00
|
|
|
rt_lock_table(tab);
|
|
|
|
|
2024-02-09 16:02:44 +00:00
|
|
|
req->hook = rt_alloc_export(re, req->pool, sizeof(struct rt_export_hook));
|
2022-09-05 04:58:42 +00:00
|
|
|
req->hook->req = req;
|
|
|
|
|
2024-02-09 16:02:44 +00:00
|
|
|
struct rt_export_hook *hook = req->hook;
|
|
|
|
hook->event = (event) {
|
2022-09-20 10:40:23 +00:00
|
|
|
.hook = rt_table_export_uncork,
|
|
|
|
.data = hook,
|
|
|
|
};
|
|
|
|
|
2024-02-09 16:02:44 +00:00
|
|
|
if (rt_cork_check(&hook->event))
|
|
|
|
rt_set_export_state(hook, BIT32_ALL(TES_DOWN), TES_HUNGRY);
|
2022-09-20 10:40:23 +00:00
|
|
|
else
|
|
|
|
rt_table_export_start_feed(tab, hook);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2024-02-09 16:02:44 +00:00
|
|
|
rt_table_export_start_feed(struct rtable_private *tab, struct rt_export_hook *hook)
|
2022-09-20 10:40:23 +00:00
|
|
|
{
|
2024-02-09 16:02:44 +00:00
|
|
|
struct rt_exporter *re = &tab->exporter;
|
|
|
|
struct rt_export_request *req = hook->req;
|
2021-06-21 15:07:31 +00:00
|
|
|
|
|
|
|
/* stats zeroed by mb_allocz */
|
2023-10-03 09:08:28 +00:00
|
|
|
switch (req->prefilter.mode)
|
2022-06-22 10:45:42 +00:00
|
|
|
{
|
2022-06-27 17:53:06 +00:00
|
|
|
case TE_ADDR_IN:
|
|
|
|
if (tab->trie && net_val_match(tab->addr_type, NB_IP))
|
|
|
|
{
|
2024-02-09 16:02:44 +00:00
|
|
|
hook->walk_state = mb_allocz(hook->pool, sizeof (struct f_trie_walk_state));
|
2022-06-27 17:53:06 +00:00
|
|
|
hook->walk_lock = rt_lock_trie(tab);
|
2023-10-03 09:08:28 +00:00
|
|
|
trie_walk_init(hook->walk_state, tab->trie, req->prefilter.addr);
|
2024-02-09 16:02:44 +00:00
|
|
|
hook->event.hook = rt_feed_by_trie;
|
2022-09-07 18:26:20 +00:00
|
|
|
hook->walk_last.type = 0;
|
2022-06-27 17:53:06 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
/* fall through */
|
|
|
|
case TE_ADDR_NONE:
|
2023-10-03 09:08:28 +00:00
|
|
|
case TE_ADDR_TRIE:
|
2023-10-04 09:03:29 +00:00
|
|
|
case TE_ADDR_HOOK:
|
2023-12-08 15:13:14 +00:00
|
|
|
hook->feed_index = 0;
|
2024-02-09 16:02:44 +00:00
|
|
|
hook->event.hook = rt_feed_by_fib;
|
2022-06-27 17:53:06 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
case TE_ADDR_EQUAL:
|
2024-02-09 16:02:44 +00:00
|
|
|
hook->event.hook = rt_feed_equal;
|
2022-06-27 17:53:06 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
case TE_ADDR_FOR:
|
2024-02-09 16:02:44 +00:00
|
|
|
hook->event.hook = rt_feed_for;
|
2022-06-27 17:53:06 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
bug("Requested an unknown export address mode");
|
2022-06-22 10:45:42 +00:00
|
|
|
}
|
2021-06-21 15:07:31 +00:00
|
|
|
|
|
|
|
DBG("New export hook %p req %p in table %s uc=%u\n", hook, req, tab->name, tab->use_count);
|
|
|
|
|
2022-09-05 04:58:42 +00:00
|
|
|
struct rt_pending_export *rpe = rt_last_export(hook->table);
|
2023-09-24 10:15:26 +00:00
|
|
|
req_trace(req, D_STATES, "Export initialized, last export %p (%lu)", rpe, rpe ? rpe->seq : 0);
|
2022-09-05 04:58:42 +00:00
|
|
|
atomic_store_explicit(&hook->last_export, rpe, memory_order_relaxed);
|
|
|
|
|
|
|
|
rt_init_export(re, req->hook);
|
|
|
|
}
|
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
static void
|
|
|
|
rt_table_export_start(struct rt_exporter *re, struct rt_export_request *req)
|
|
|
|
{
|
2024-02-09 16:02:44 +00:00
|
|
|
RT_LOCKED(SKIP_BACK(rtable, priv.exporter, re), tab)
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_table_export_start_locked(tab, req);
|
|
|
|
}
|
|
|
|
|
|
|
|
void rt_request_export(rtable *t, struct rt_export_request *req)
|
2022-09-05 04:58:42 +00:00
|
|
|
{
|
2022-09-07 11:54:20 +00:00
|
|
|
RT_LOCKED(t, tab)
|
|
|
|
rt_table_export_start_locked(tab, req); /* Is locked inside */
|
2022-06-20 19:29:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2022-09-05 04:58:42 +00:00
|
|
|
rt_request_export_other(struct rt_exporter *re, struct rt_export_request *req)
|
2022-06-20 19:29:10 +00:00
|
|
|
{
|
2022-09-05 04:58:42 +00:00
|
|
|
return re->class->start(re, req);
|
|
|
|
}
|
2022-06-20 19:29:10 +00:00
|
|
|
|
2022-09-05 04:58:42 +00:00
|
|
|
struct rt_export_hook *
|
2023-04-21 13:26:06 +00:00
|
|
|
rt_alloc_export(struct rt_exporter *re, pool *pp, uint size)
|
2022-09-05 04:58:42 +00:00
|
|
|
{
|
2023-04-21 13:26:06 +00:00
|
|
|
pool *p = rp_new(pp, pp->domain, "Export hook");
|
2022-09-05 04:58:42 +00:00
|
|
|
struct rt_export_hook *hook = mb_allocz(p, size);
|
|
|
|
|
|
|
|
hook->pool = p;
|
2022-06-20 19:29:10 +00:00
|
|
|
hook->table = re;
|
2023-08-15 10:31:28 +00:00
|
|
|
atomic_store_explicit(&hook->export_state, TES_DOWN, memory_order_release);
|
2022-06-20 19:29:10 +00:00
|
|
|
|
2022-10-06 15:51:32 +00:00
|
|
|
hook->n = (node) {};
|
|
|
|
add_tail(&re->hooks, &hook->n);
|
|
|
|
|
2022-09-05 04:58:42 +00:00
|
|
|
return hook;
|
|
|
|
}
|
2021-06-21 15:07:31 +00:00
|
|
|
|
2022-09-05 04:58:42 +00:00
|
|
|
void
|
2022-10-06 15:51:32 +00:00
|
|
|
rt_init_export(struct rt_exporter *re UNUSED, struct rt_export_hook *hook)
|
2022-09-05 04:58:42 +00:00
|
|
|
{
|
|
|
|
hook->event.data = hook;
|
|
|
|
|
2023-02-27 21:03:41 +00:00
|
|
|
bmap_init(&hook->seq_map, hook->pool, 16);
|
2021-09-27 11:04:16 +00:00
|
|
|
|
2022-06-27 17:53:06 +00:00
|
|
|
/* Regular export */
|
2023-08-15 10:31:28 +00:00
|
|
|
rt_set_export_state(hook, BIT32_ALL(TES_DOWN, TES_HUNGRY), TES_FEEDING);
|
2022-07-18 10:33:00 +00:00
|
|
|
rt_send_export_event(hook);
|
2021-06-21 15:07:31 +00:00
|
|
|
}
|
|
|
|
|
2022-09-20 10:40:23 +00:00
|
|
|
static int
|
2024-02-09 16:02:44 +00:00
|
|
|
rt_table_export_stop_locked(struct rt_export_hook *hook)
|
2022-06-20 19:29:10 +00:00
|
|
|
{
|
2022-09-07 11:54:20 +00:00
|
|
|
struct rtable_private *tab = SKIP_BACK(struct rtable_private, exporter, hook->table);
|
2022-06-20 19:29:10 +00:00
|
|
|
|
2023-08-15 10:31:28 +00:00
|
|
|
/* Update export state, get old */
|
2024-02-09 16:02:44 +00:00
|
|
|
switch (rt_set_export_state(hook, BIT32_ALL(TES_HUNGRY, TES_FEEDING, TES_READY), TES_STOP))
|
2022-09-20 10:40:23 +00:00
|
|
|
{
|
|
|
|
case TES_HUNGRY:
|
2024-02-09 16:02:44 +00:00
|
|
|
rt_trace(tab, D_EVENTS, "Stopping export hook %s must wait for uncorking", hook->req->name);
|
2022-09-20 10:40:23 +00:00
|
|
|
return 0;
|
|
|
|
case TES_FEEDING:
|
2024-02-09 16:02:44 +00:00
|
|
|
switch (hook->req->prefilter.mode)
|
2022-09-20 10:40:23 +00:00
|
|
|
{
|
|
|
|
case TE_ADDR_IN:
|
|
|
|
if (hook->walk_lock)
|
|
|
|
{
|
|
|
|
rt_unlock_trie(tab, hook->walk_lock);
|
|
|
|
hook->walk_lock = NULL;
|
|
|
|
mb_free(hook->walk_state);
|
|
|
|
hook->walk_state = NULL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
/* fall through */
|
|
|
|
case TE_ADDR_NONE:
|
2023-10-04 09:03:29 +00:00
|
|
|
case TE_ADDR_HOOK:
|
2023-10-03 09:08:28 +00:00
|
|
|
case TE_ADDR_TRIE:
|
|
|
|
case TE_ADDR_EQUAL:
|
|
|
|
case TE_ADDR_FOR:
|
|
|
|
break;
|
2022-09-20 10:40:23 +00:00
|
|
|
}
|
2023-01-19 09:56:16 +00:00
|
|
|
break;
|
2022-09-20 10:40:23 +00:00
|
|
|
|
2023-01-19 09:56:16 +00:00
|
|
|
case TES_STOP:
|
2024-02-09 16:02:44 +00:00
|
|
|
bug("Tried to repeatedly stop the same export hook %s", hook->req->name);
|
2022-09-20 10:40:23 +00:00
|
|
|
}
|
2022-10-06 15:51:32 +00:00
|
|
|
|
2024-02-09 16:02:44 +00:00
|
|
|
rt_trace(tab, D_EVENTS, "Stopping export hook %s right now", hook->req->name);
|
2022-09-20 10:40:23 +00:00
|
|
|
return 1;
|
2022-09-07 11:54:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2024-02-09 16:02:44 +00:00
|
|
|
rt_table_export_stop(struct rt_export_hook *hook)
|
2022-09-07 11:54:20 +00:00
|
|
|
{
|
2022-09-20 10:40:23 +00:00
|
|
|
int ok = 0;
|
2023-08-15 10:31:28 +00:00
|
|
|
|
2023-11-14 11:53:40 +00:00
|
|
|
rtable *t = SKIP_BACK(rtable, priv.exporter, hook->table);
|
|
|
|
if (RT_IS_LOCKED(t))
|
2024-02-09 16:02:44 +00:00
|
|
|
ok = rt_table_export_stop_locked(hook);
|
2023-11-14 11:53:40 +00:00
|
|
|
else
|
|
|
|
RT_LOCKED(t, tab)
|
2024-02-09 16:02:44 +00:00
|
|
|
ok = rt_table_export_stop_locked(hook);
|
2022-09-20 10:40:23 +00:00
|
|
|
|
|
|
|
if (ok)
|
2024-02-09 16:02:44 +00:00
|
|
|
rt_stop_export_common(hook);
|
2022-06-20 19:29:10 +00:00
|
|
|
}
|
|
|
|
|
2021-06-21 15:07:31 +00:00
|
|
|
void
|
|
|
|
rt_stop_export(struct rt_export_request *req, void (*stopped)(struct rt_export_request *))
|
|
|
|
{
|
2022-09-05 04:58:42 +00:00
|
|
|
ASSERT_DIE(birdloop_inside(req->list->loop));
|
2021-06-21 15:07:31 +00:00
|
|
|
ASSERT_DIE(req->hook);
|
|
|
|
struct rt_export_hook *hook = req->hook;
|
|
|
|
|
2022-09-20 10:40:23 +00:00
|
|
|
/* Set the stopped callback */
|
|
|
|
hook->stopped = stopped;
|
|
|
|
|
2023-08-15 10:31:28 +00:00
|
|
|
/* Run the stop code. Must:
|
|
|
|
* _locked_ update export state to TES_STOP
|
|
|
|
* and _unlocked_ call rt_stop_export_common() */
|
|
|
|
hook->table->class->stop(hook);
|
2022-09-20 10:40:23 +00:00
|
|
|
}
|
2021-06-21 15:07:31 +00:00
|
|
|
|
2023-08-15 10:31:28 +00:00
|
|
|
/* Call this common code from the stop code in table export class */
|
2022-09-20 10:40:23 +00:00
|
|
|
void
|
|
|
|
rt_stop_export_common(struct rt_export_hook *hook)
|
|
|
|
{
|
2022-06-20 19:29:10 +00:00
|
|
|
/* Reset the event as the stopped event */
|
2022-09-05 04:58:42 +00:00
|
|
|
hook->event.hook = hook->table->class->done;
|
2021-06-21 15:07:31 +00:00
|
|
|
|
2022-06-20 19:29:10 +00:00
|
|
|
/* Run the stopped event */
|
2022-07-18 10:33:00 +00:00
|
|
|
rt_send_export_event(hook);
|
2021-06-21 15:07:31 +00:00
|
|
|
}
|
2014-03-23 00:35:33 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* rt_refresh_begin - start a refresh cycle
|
|
|
|
* @t: related routing table
|
2016-01-26 10:48:58 +00:00
|
|
|
* @c related channel
|
2014-03-23 00:35:33 +00:00
|
|
|
*
|
|
|
|
* This function starts a refresh cycle for given routing table and announce
|
|
|
|
* hook. The refresh cycle is a sequence where the protocol sends all its valid
|
|
|
|
* routes to the routing table (by rte_update()). After that, all protocol
|
2016-01-26 10:48:58 +00:00
|
|
|
* routes (more precisely routes with @c as @sender) not sent during the
|
2014-03-23 00:35:33 +00:00
|
|
|
* refresh cycle but still in the table from the past are pruned. This is
|
|
|
|
* implemented by marking all related routes as stale by REF_STALE flag in
|
|
|
|
* rt_refresh_begin(), then marking all related stale routes with REF_DISCARD
|
|
|
|
* flag in rt_refresh_end() and then removing such routes in the prune loop.
|
|
|
|
*/
|
2014-03-20 13:07:12 +00:00
|
|
|
void
|
Route refresh in tables uses a stale counter.
Until now, we were marking routes as REF_STALE and REF_DISCARD to
cleanup old routes after route refresh. This needed a synchronous route
table walk at both beginning and the end of route refresh routine,
marking the routes by the flags.
We avoid these walks by using a stale counter. Every route contains:
u8 stale_cycle;
Every import hook contains:
u8 stale_set;
u8 stale_valid;
u8 stale_pruned;
u8 stale_pruning;
In base_state, stale_set == stale_valid == stale_pruned == stale_pruning
and all routes' stale_cycle also have the same value.
The route refresh looks like follows:
+ ----------- + --------- + ----------- + ------------- + ------------ +
| | stale_set | stale_valid | stale_pruning | stale_pruned |
| Base | x | x | x | x |
| Begin | x+1 | x | x | x |
... now routes are being inserted with stale_cycle == (x+1)
| End | x+1 | x+1 | x | x |
... now table pruning routine is scheduled
| Prune begin | x+1 | x+1 | x+1 | x |
... now routes with stale_cycle not between stale_set and stale_valid
are deleted
| Prune end | x+1 | x+1 | x+1 | x+1 |
+ ----------- + --------- + ----------- + ------------- + ------------ +
The pruning routine is asynchronous and may have high latency in
high-load environments. Therefore, multiple route refresh requests may
happen before the pruning routine starts, leading to this situation:
| Prune begin | x+k | x+k | x -> x+k | x |
... or even
| Prune begin | x+k+1 | x+k | x -> x+k | x |
... if the prune event starts while another route refresh is running.
In such a case, the pruning routine still deletes routes not fitting
between stale_set and and stale_valid, effectively pruning the remnants
of all unpruned route refreshes from before:
| Prune end | x+k | x+k | x+k | x+k |
In extremely rare cases, there may happen too many route refreshes
before any route prune routine finishes. If the difference between
stale_valid and stale_pruned becomes more than 128 when requesting for
another route refresh, the routine walks the table synchronously and
resets all the stale values to a base state, while logging a warning.
2022-07-12 08:36:10 +00:00
|
|
|
rt_refresh_begin(struct rt_import_request *req)
|
2014-03-20 13:07:12 +00:00
|
|
|
{
|
Route refresh in tables uses a stale counter.
Until now, we were marking routes as REF_STALE and REF_DISCARD to
cleanup old routes after route refresh. This needed a synchronous route
table walk at both beginning and the end of route refresh routine,
marking the routes by the flags.
We avoid these walks by using a stale counter. Every route contains:
u8 stale_cycle;
Every import hook contains:
u8 stale_set;
u8 stale_valid;
u8 stale_pruned;
u8 stale_pruning;
In base_state, stale_set == stale_valid == stale_pruned == stale_pruning
and all routes' stale_cycle also have the same value.
The route refresh looks like follows:
+ ----------- + --------- + ----------- + ------------- + ------------ +
| | stale_set | stale_valid | stale_pruning | stale_pruned |
| Base | x | x | x | x |
| Begin | x+1 | x | x | x |
... now routes are being inserted with stale_cycle == (x+1)
| End | x+1 | x+1 | x | x |
... now table pruning routine is scheduled
| Prune begin | x+1 | x+1 | x+1 | x |
... now routes with stale_cycle not between stale_set and stale_valid
are deleted
| Prune end | x+1 | x+1 | x+1 | x+1 |
+ ----------- + --------- + ----------- + ------------- + ------------ +
The pruning routine is asynchronous and may have high latency in
high-load environments. Therefore, multiple route refresh requests may
happen before the pruning routine starts, leading to this situation:
| Prune begin | x+k | x+k | x -> x+k | x |
... or even
| Prune begin | x+k+1 | x+k | x -> x+k | x |
... if the prune event starts while another route refresh is running.
In such a case, the pruning routine still deletes routes not fitting
between stale_set and and stale_valid, effectively pruning the remnants
of all unpruned route refreshes from before:
| Prune end | x+k | x+k | x+k | x+k |
In extremely rare cases, there may happen too many route refreshes
before any route prune routine finishes. If the difference between
stale_valid and stale_pruned becomes more than 128 when requesting for
another route refresh, the routine walks the table synchronously and
resets all the stale values to a base state, while logging a warning.
2022-07-12 08:36:10 +00:00
|
|
|
struct rt_import_hook *hook = req->hook;
|
|
|
|
ASSERT_DIE(hook);
|
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
RT_LOCKED(hook->table, tab)
|
|
|
|
{
|
|
|
|
|
Route refresh in tables uses a stale counter.
Until now, we were marking routes as REF_STALE and REF_DISCARD to
cleanup old routes after route refresh. This needed a synchronous route
table walk at both beginning and the end of route refresh routine,
marking the routes by the flags.
We avoid these walks by using a stale counter. Every route contains:
u8 stale_cycle;
Every import hook contains:
u8 stale_set;
u8 stale_valid;
u8 stale_pruned;
u8 stale_pruning;
In base_state, stale_set == stale_valid == stale_pruned == stale_pruning
and all routes' stale_cycle also have the same value.
The route refresh looks like follows:
+ ----------- + --------- + ----------- + ------------- + ------------ +
| | stale_set | stale_valid | stale_pruning | stale_pruned |
| Base | x | x | x | x |
| Begin | x+1 | x | x | x |
... now routes are being inserted with stale_cycle == (x+1)
| End | x+1 | x+1 | x | x |
... now table pruning routine is scheduled
| Prune begin | x+1 | x+1 | x+1 | x |
... now routes with stale_cycle not between stale_set and stale_valid
are deleted
| Prune end | x+1 | x+1 | x+1 | x+1 |
+ ----------- + --------- + ----------- + ------------- + ------------ +
The pruning routine is asynchronous and may have high latency in
high-load environments. Therefore, multiple route refresh requests may
happen before the pruning routine starts, leading to this situation:
| Prune begin | x+k | x+k | x -> x+k | x |
... or even
| Prune begin | x+k+1 | x+k | x -> x+k | x |
... if the prune event starts while another route refresh is running.
In such a case, the pruning routine still deletes routes not fitting
between stale_set and and stale_valid, effectively pruning the remnants
of all unpruned route refreshes from before:
| Prune end | x+k | x+k | x+k | x+k |
In extremely rare cases, there may happen too many route refreshes
before any route prune routine finishes. If the difference between
stale_valid and stale_pruned becomes more than 128 when requesting for
another route refresh, the routine walks the table synchronously and
resets all the stale values to a base state, while logging a warning.
2022-07-12 08:36:10 +00:00
|
|
|
/* If the pruning routine is too slow */
|
2023-03-19 12:21:35 +00:00
|
|
|
if (((hook->stale_set - hook->stale_pruned) & 0xff) >= 240)
|
Route refresh in tables uses a stale counter.
Until now, we were marking routes as REF_STALE and REF_DISCARD to
cleanup old routes after route refresh. This needed a synchronous route
table walk at both beginning and the end of route refresh routine,
marking the routes by the flags.
We avoid these walks by using a stale counter. Every route contains:
u8 stale_cycle;
Every import hook contains:
u8 stale_set;
u8 stale_valid;
u8 stale_pruned;
u8 stale_pruning;
In base_state, stale_set == stale_valid == stale_pruned == stale_pruning
and all routes' stale_cycle also have the same value.
The route refresh looks like follows:
+ ----------- + --------- + ----------- + ------------- + ------------ +
| | stale_set | stale_valid | stale_pruning | stale_pruned |
| Base | x | x | x | x |
| Begin | x+1 | x | x | x |
... now routes are being inserted with stale_cycle == (x+1)
| End | x+1 | x+1 | x | x |
... now table pruning routine is scheduled
| Prune begin | x+1 | x+1 | x+1 | x |
... now routes with stale_cycle not between stale_set and stale_valid
are deleted
| Prune end | x+1 | x+1 | x+1 | x+1 |
+ ----------- + --------- + ----------- + ------------- + ------------ +
The pruning routine is asynchronous and may have high latency in
high-load environments. Therefore, multiple route refresh requests may
happen before the pruning routine starts, leading to this situation:
| Prune begin | x+k | x+k | x -> x+k | x |
... or even
| Prune begin | x+k+1 | x+k | x -> x+k | x |
... if the prune event starts while another route refresh is running.
In such a case, the pruning routine still deletes routes not fitting
between stale_set and and stale_valid, effectively pruning the remnants
of all unpruned route refreshes from before:
| Prune end | x+k | x+k | x+k | x+k |
In extremely rare cases, there may happen too many route refreshes
before any route prune routine finishes. If the difference between
stale_valid and stale_pruned becomes more than 128 when requesting for
another route refresh, the routine walks the table synchronously and
resets all the stale values to a base state, while logging a warning.
2022-07-12 08:36:10 +00:00
|
|
|
{
|
2023-03-19 12:21:35 +00:00
|
|
|
log(L_WARN "Route refresh flood in table %s (stale_set=%u, stale_pruned=%u)", hook->table->name, hook->stale_set, hook->stale_pruned);
|
|
|
|
|
|
|
|
/* Forcibly set all old routes' stale cycle to zero. */
|
2023-12-08 15:13:14 +00:00
|
|
|
for (u32 i=0; i<tab->routes_block_size; i++)
|
|
|
|
for (struct rte_storage *e = tab->routes[i].routes; e; e = e->next)
|
|
|
|
if (e->rte.sender == req->hook)
|
|
|
|
e->stale_cycle = 0;
|
2023-03-19 12:21:35 +00:00
|
|
|
|
|
|
|
/* Smash the route refresh counter and zero everything. */
|
2023-01-19 09:56:16 +00:00
|
|
|
tab->rr_counter -= hook->stale_set - hook->stale_pruned;
|
2023-03-19 12:21:35 +00:00
|
|
|
hook->stale_set = hook->stale_valid = hook->stale_pruning = hook->stale_pruned = 0;
|
Route refresh in tables uses a stale counter.
Until now, we were marking routes as REF_STALE and REF_DISCARD to
cleanup old routes after route refresh. This needed a synchronous route
table walk at both beginning and the end of route refresh routine,
marking the routes by the flags.
We avoid these walks by using a stale counter. Every route contains:
u8 stale_cycle;
Every import hook contains:
u8 stale_set;
u8 stale_valid;
u8 stale_pruned;
u8 stale_pruning;
In base_state, stale_set == stale_valid == stale_pruned == stale_pruning
and all routes' stale_cycle also have the same value.
The route refresh looks like follows:
+ ----------- + --------- + ----------- + ------------- + ------------ +
| | stale_set | stale_valid | stale_pruning | stale_pruned |
| Base | x | x | x | x |
| Begin | x+1 | x | x | x |
... now routes are being inserted with stale_cycle == (x+1)
| End | x+1 | x+1 | x | x |
... now table pruning routine is scheduled
| Prune begin | x+1 | x+1 | x+1 | x |
... now routes with stale_cycle not between stale_set and stale_valid
are deleted
| Prune end | x+1 | x+1 | x+1 | x+1 |
+ ----------- + --------- + ----------- + ------------- + ------------ +
The pruning routine is asynchronous and may have high latency in
high-load environments. Therefore, multiple route refresh requests may
happen before the pruning routine starts, leading to this situation:
| Prune begin | x+k | x+k | x -> x+k | x |
... or even
| Prune begin | x+k+1 | x+k | x -> x+k | x |
... if the prune event starts while another route refresh is running.
In such a case, the pruning routine still deletes routes not fitting
between stale_set and and stale_valid, effectively pruning the remnants
of all unpruned route refreshes from before:
| Prune end | x+k | x+k | x+k | x+k |
In extremely rare cases, there may happen too many route refreshes
before any route prune routine finishes. If the difference between
stale_valid and stale_pruned becomes more than 128 when requesting for
another route refresh, the routine walks the table synchronously and
resets all the stale values to a base state, while logging a warning.
2022-07-12 08:36:10 +00:00
|
|
|
}
|
|
|
|
|
2023-03-19 12:21:35 +00:00
|
|
|
/* Now we can safely increase the stale_set modifier */
|
|
|
|
hook->stale_set++;
|
|
|
|
|
2023-01-19 09:56:16 +00:00
|
|
|
/* The table must know that we're route-refreshing */
|
|
|
|
tab->rr_counter++;
|
|
|
|
|
2023-09-14 12:40:33 +00:00
|
|
|
rt_refresh_trace(tab, hook, "route refresh begin");
|
2022-09-07 11:54:20 +00:00
|
|
|
}
|
2014-03-20 13:07:12 +00:00
|
|
|
}
|
|
|
|
|
2014-03-23 00:35:33 +00:00
|
|
|
/**
|
|
|
|
* rt_refresh_end - end a refresh cycle
|
|
|
|
* @t: related routing table
|
2016-01-26 10:48:58 +00:00
|
|
|
* @c: related channel
|
2014-03-23 00:35:33 +00:00
|
|
|
*
|
2016-01-26 10:48:58 +00:00
|
|
|
* This function ends a refresh cycle for given routing table and announce
|
2014-03-23 00:35:33 +00:00
|
|
|
* hook. See rt_refresh_begin() for description of refresh cycles.
|
|
|
|
*/
|
2014-03-20 13:07:12 +00:00
|
|
|
void
|
Route refresh in tables uses a stale counter.
Until now, we were marking routes as REF_STALE and REF_DISCARD to
cleanup old routes after route refresh. This needed a synchronous route
table walk at both beginning and the end of route refresh routine,
marking the routes by the flags.
We avoid these walks by using a stale counter. Every route contains:
u8 stale_cycle;
Every import hook contains:
u8 stale_set;
u8 stale_valid;
u8 stale_pruned;
u8 stale_pruning;
In base_state, stale_set == stale_valid == stale_pruned == stale_pruning
and all routes' stale_cycle also have the same value.
The route refresh looks like follows:
+ ----------- + --------- + ----------- + ------------- + ------------ +
| | stale_set | stale_valid | stale_pruning | stale_pruned |
| Base | x | x | x | x |
| Begin | x+1 | x | x | x |
... now routes are being inserted with stale_cycle == (x+1)
| End | x+1 | x+1 | x | x |
... now table pruning routine is scheduled
| Prune begin | x+1 | x+1 | x+1 | x |
... now routes with stale_cycle not between stale_set and stale_valid
are deleted
| Prune end | x+1 | x+1 | x+1 | x+1 |
+ ----------- + --------- + ----------- + ------------- + ------------ +
The pruning routine is asynchronous and may have high latency in
high-load environments. Therefore, multiple route refresh requests may
happen before the pruning routine starts, leading to this situation:
| Prune begin | x+k | x+k | x -> x+k | x |
... or even
| Prune begin | x+k+1 | x+k | x -> x+k | x |
... if the prune event starts while another route refresh is running.
In such a case, the pruning routine still deletes routes not fitting
between stale_set and and stale_valid, effectively pruning the remnants
of all unpruned route refreshes from before:
| Prune end | x+k | x+k | x+k | x+k |
In extremely rare cases, there may happen too many route refreshes
before any route prune routine finishes. If the difference between
stale_valid and stale_pruned becomes more than 128 when requesting for
another route refresh, the routine walks the table synchronously and
resets all the stale values to a base state, while logging a warning.
2022-07-12 08:36:10 +00:00
|
|
|
rt_refresh_end(struct rt_import_request *req)
|
2014-03-20 13:07:12 +00:00
|
|
|
{
|
Route refresh in tables uses a stale counter.
Until now, we were marking routes as REF_STALE and REF_DISCARD to
cleanup old routes after route refresh. This needed a synchronous route
table walk at both beginning and the end of route refresh routine,
marking the routes by the flags.
We avoid these walks by using a stale counter. Every route contains:
u8 stale_cycle;
Every import hook contains:
u8 stale_set;
u8 stale_valid;
u8 stale_pruned;
u8 stale_pruning;
In base_state, stale_set == stale_valid == stale_pruned == stale_pruning
and all routes' stale_cycle also have the same value.
The route refresh looks like follows:
+ ----------- + --------- + ----------- + ------------- + ------------ +
| | stale_set | stale_valid | stale_pruning | stale_pruned |
| Base | x | x | x | x |
| Begin | x+1 | x | x | x |
... now routes are being inserted with stale_cycle == (x+1)
| End | x+1 | x+1 | x | x |
... now table pruning routine is scheduled
| Prune begin | x+1 | x+1 | x+1 | x |
... now routes with stale_cycle not between stale_set and stale_valid
are deleted
| Prune end | x+1 | x+1 | x+1 | x+1 |
+ ----------- + --------- + ----------- + ------------- + ------------ +
The pruning routine is asynchronous and may have high latency in
high-load environments. Therefore, multiple route refresh requests may
happen before the pruning routine starts, leading to this situation:
| Prune begin | x+k | x+k | x -> x+k | x |
... or even
| Prune begin | x+k+1 | x+k | x -> x+k | x |
... if the prune event starts while another route refresh is running.
In such a case, the pruning routine still deletes routes not fitting
between stale_set and and stale_valid, effectively pruning the remnants
of all unpruned route refreshes from before:
| Prune end | x+k | x+k | x+k | x+k |
In extremely rare cases, there may happen too many route refreshes
before any route prune routine finishes. If the difference between
stale_valid and stale_pruned becomes more than 128 when requesting for
another route refresh, the routine walks the table synchronously and
resets all the stale values to a base state, while logging a warning.
2022-07-12 08:36:10 +00:00
|
|
|
struct rt_import_hook *hook = req->hook;
|
|
|
|
ASSERT_DIE(hook);
|
2014-03-20 13:07:12 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
RT_LOCKED(hook->table, tab)
|
|
|
|
{
|
2023-03-19 12:21:35 +00:00
|
|
|
/* Now valid routes are only those one with the latest stale_set value */
|
2023-09-14 12:40:33 +00:00
|
|
|
UNUSED uint cnt = hook->stale_set - hook->stale_valid;
|
2023-03-19 12:21:35 +00:00
|
|
|
hook->stale_valid = hook->stale_set;
|
2014-03-20 13:07:12 +00:00
|
|
|
|
2023-01-19 09:56:16 +00:00
|
|
|
/* Here we can't kick the timer as we aren't in the table service loop */
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_schedule_prune(tab);
|
Route refresh in tables uses a stale counter.
Until now, we were marking routes as REF_STALE and REF_DISCARD to
cleanup old routes after route refresh. This needed a synchronous route
table walk at both beginning and the end of route refresh routine,
marking the routes by the flags.
We avoid these walks by using a stale counter. Every route contains:
u8 stale_cycle;
Every import hook contains:
u8 stale_set;
u8 stale_valid;
u8 stale_pruned;
u8 stale_pruning;
In base_state, stale_set == stale_valid == stale_pruned == stale_pruning
and all routes' stale_cycle also have the same value.
The route refresh looks like follows:
+ ----------- + --------- + ----------- + ------------- + ------------ +
| | stale_set | stale_valid | stale_pruning | stale_pruned |
| Base | x | x | x | x |
| Begin | x+1 | x | x | x |
... now routes are being inserted with stale_cycle == (x+1)
| End | x+1 | x+1 | x | x |
... now table pruning routine is scheduled
| Prune begin | x+1 | x+1 | x+1 | x |
... now routes with stale_cycle not between stale_set and stale_valid
are deleted
| Prune end | x+1 | x+1 | x+1 | x+1 |
+ ----------- + --------- + ----------- + ------------- + ------------ +
The pruning routine is asynchronous and may have high latency in
high-load environments. Therefore, multiple route refresh requests may
happen before the pruning routine starts, leading to this situation:
| Prune begin | x+k | x+k | x -> x+k | x |
... or even
| Prune begin | x+k+1 | x+k | x -> x+k | x |
... if the prune event starts while another route refresh is running.
In such a case, the pruning routine still deletes routes not fitting
between stale_set and and stale_valid, effectively pruning the remnants
of all unpruned route refreshes from before:
| Prune end | x+k | x+k | x+k | x+k |
In extremely rare cases, there may happen too many route refreshes
before any route prune routine finishes. If the difference between
stale_valid and stale_pruned becomes more than 128 when requesting for
another route refresh, the routine walks the table synchronously and
resets all the stale values to a base state, while logging a warning.
2022-07-12 08:36:10 +00:00
|
|
|
|
2023-09-14 12:40:33 +00:00
|
|
|
rt_refresh_trace(tab, hook, "route refresh end");
|
2022-09-07 11:54:20 +00:00
|
|
|
}
|
2014-03-20 13:07:12 +00:00
|
|
|
}
|
|
|
|
|
2023-09-14 12:40:33 +00:00
|
|
|
/**
|
|
|
|
* rt_refresh_trace - log information about route refresh
|
|
|
|
* @tab: table
|
|
|
|
* @ih: import hook doing the route refresh
|
|
|
|
* @msg: what is happening
|
|
|
|
*
|
|
|
|
* This function consistently logs route refresh messages.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
rt_refresh_trace(struct rtable_private *tab, struct rt_import_hook *ih, const char *msg)
|
|
|
|
{
|
|
|
|
if (ih->req->trace_routes & D_STATES)
|
|
|
|
log(L_TRACE "%s: %s: rr %u set %u valid %u pruning %u pruned %u", ih->req->name, msg,
|
|
|
|
tab->rr_counter, ih->stale_set, ih->stale_valid, ih->stale_pruning, ih->stale_pruned);
|
|
|
|
}
|
|
|
|
|
2000-06-01 17:12:19 +00:00
|
|
|
/**
|
|
|
|
* rte_dump - dump a route
|
|
|
|
* @e: &rte to be dumped
|
|
|
|
*
|
|
|
|
* This functions dumps contents of a &rte to debug output.
|
|
|
|
*/
|
1998-05-20 11:54:33 +00:00
|
|
|
void
|
2020-01-28 10:42:46 +00:00
|
|
|
rte_dump(struct rte_storage *e)
|
1998-05-20 11:54:33 +00:00
|
|
|
{
|
2024-01-28 12:09:48 +00:00
|
|
|
debug("(%u) %-1N", NET_TO_INDEX(e->rte.net)->index, e->rte.net);
|
|
|
|
debug("ID=%d ", e->rte.id);
|
|
|
|
debug("SENDER=%s ", e->rte.sender->req->name);
|
2020-01-28 10:42:46 +00:00
|
|
|
debug("PF=%02x ", e->rte.pflags);
|
2023-11-01 17:25:40 +00:00
|
|
|
debug("SRC=%uG ", e->rte.src->global_id);
|
2022-06-08 13:31:28 +00:00
|
|
|
ea_dump(e->rte.attrs);
|
1998-06-04 20:28:19 +00:00
|
|
|
debug("\n");
|
1998-05-20 11:54:33 +00:00
|
|
|
}
|
1998-05-15 07:54:32 +00:00
|
|
|
|
2000-06-01 17:12:19 +00:00
|
|
|
/**
|
|
|
|
* rt_dump - dump a routing table
|
|
|
|
* @t: routing table to be dumped
|
|
|
|
*
|
|
|
|
* This function dumps contents of a given routing table to debug output.
|
|
|
|
*/
|
1998-05-20 11:54:33 +00:00
|
|
|
void
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_dump(rtable *tp)
|
1998-05-20 11:54:33 +00:00
|
|
|
{
|
2022-09-07 11:54:20 +00:00
|
|
|
RT_LOCKED(tp, t)
|
|
|
|
{
|
|
|
|
|
2021-06-21 15:07:31 +00:00
|
|
|
debug("Dump of routing table <%s>%s\n", t->name, t->deleted ? " (deleted)" : "");
|
2023-12-08 15:13:14 +00:00
|
|
|
for (u32 i=0; i<t->routes_block_size; i++)
|
|
|
|
for (struct rte_storage *e = t->routes[i].routes; e; e = e->next)
|
|
|
|
rte_dump(e);
|
1998-06-04 20:28:19 +00:00
|
|
|
debug("\n");
|
2022-09-07 11:54:20 +00:00
|
|
|
|
|
|
|
}
|
1998-05-20 11:54:33 +00:00
|
|
|
}
|
1998-05-15 07:54:32 +00:00
|
|
|
|
2000-06-01 17:12:19 +00:00
|
|
|
/**
|
|
|
|
* rt_dump_all - dump all routing tables
|
|
|
|
*
|
|
|
|
* This function dumps contents of all routing tables to debug output.
|
|
|
|
*/
|
1998-05-24 14:49:14 +00:00
|
|
|
void
|
|
|
|
rt_dump_all(void)
|
|
|
|
{
|
1999-05-17 20:14:52 +00:00
|
|
|
rtable *t;
|
2021-03-30 13:09:53 +00:00
|
|
|
node *n;
|
1999-05-17 20:14:52 +00:00
|
|
|
|
2021-03-30 13:09:53 +00:00
|
|
|
WALK_LIST2(t, n, routing_tables, n)
|
1999-05-17 20:14:52 +00:00
|
|
|
rt_dump(t);
|
2021-06-21 15:07:31 +00:00
|
|
|
|
|
|
|
WALK_LIST2(t, n, deleted_routing_tables, n)
|
|
|
|
rt_dump(t);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_dump_hooks(rtable *tp)
|
2021-06-21 15:07:31 +00:00
|
|
|
{
|
2022-09-07 11:54:20 +00:00
|
|
|
RT_LOCKED(tp, tab)
|
|
|
|
{
|
|
|
|
|
2021-06-21 15:07:31 +00:00
|
|
|
debug("Dump of hooks in routing table <%s>%s\n", tab->name, tab->deleted ? " (deleted)" : "");
|
2022-08-31 12:01:59 +00:00
|
|
|
debug(" nhu_state=%u use_count=%d rt_count=%u\n",
|
|
|
|
tab->nhu_state, tab->use_count, tab->rt_count);
|
2021-06-21 15:07:31 +00:00
|
|
|
debug(" last_rt_change=%t gc_time=%t gc_counter=%d prune_state=%u\n",
|
|
|
|
tab->last_rt_change, tab->gc_time, tab->gc_counter, tab->prune_state);
|
|
|
|
|
|
|
|
struct rt_import_hook *ih;
|
|
|
|
WALK_LIST(ih, tab->imports)
|
|
|
|
{
|
|
|
|
ih->req->dump_req(ih->req);
|
|
|
|
debug(" Import hook %p requested by %p: pref=%u"
|
|
|
|
" last_state_change=%t import_state=%u stopped=%p\n",
|
|
|
|
ih, ih->req, ih->stats.pref,
|
|
|
|
ih->last_state_change, ih->import_state, ih->stopped);
|
|
|
|
}
|
|
|
|
|
2024-02-09 16:02:44 +00:00
|
|
|
struct rt_export_hook *eh;
|
|
|
|
WALK_LIST(eh, tab->exporter.hooks)
|
2021-06-21 15:07:31 +00:00
|
|
|
{
|
2024-02-09 16:02:44 +00:00
|
|
|
eh->req->dump_req(eh->req);
|
2021-06-21 15:07:31 +00:00
|
|
|
debug(" Export hook %p requested by %p:"
|
2021-09-27 11:04:16 +00:00
|
|
|
" refeed_pending=%u last_state_change=%t export_state=%u\n",
|
2024-02-09 16:02:44 +00:00
|
|
|
eh, eh->req, eh->refeed_pending, eh->last_state_change,
|
|
|
|
atomic_load_explicit(&eh->export_state, memory_order_relaxed));
|
2021-06-21 15:07:31 +00:00
|
|
|
}
|
|
|
|
debug("\n");
|
2022-09-07 11:54:20 +00:00
|
|
|
|
|
|
|
}
|
2021-06-21 15:07:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
rt_dump_hooks_all(void)
|
|
|
|
{
|
|
|
|
rtable *t;
|
|
|
|
node *n;
|
|
|
|
|
|
|
|
debug("Dump of all table hooks\n");
|
|
|
|
|
|
|
|
WALK_LIST2(t, n, routing_tables, n)
|
|
|
|
rt_dump_hooks(t);
|
|
|
|
|
|
|
|
WALK_LIST2(t, n, deleted_routing_tables, n)
|
|
|
|
rt_dump_hooks(t);
|
1998-05-24 14:49:14 +00:00
|
|
|
}
|
|
|
|
|
2010-07-05 15:50:19 +00:00
|
|
|
static inline void
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_schedule_nhu(struct rtable_private *tab)
|
2010-07-05 15:50:19 +00:00
|
|
|
{
|
2022-09-07 11:12:44 +00:00
|
|
|
if (tab->nhu_corked)
|
|
|
|
{
|
|
|
|
if (!(tab->nhu_corked & NHU_SCHEDULED))
|
|
|
|
tab->nhu_corked |= NHU_SCHEDULED;
|
|
|
|
}
|
|
|
|
else if (!(tab->nhu_state & NHU_SCHEDULED))
|
|
|
|
{
|
|
|
|
rt_trace(tab, D_EVENTS, "Scheduling NHU");
|
2010-07-05 15:50:19 +00:00
|
|
|
|
2022-09-07 11:12:44 +00:00
|
|
|
/* state change:
|
|
|
|
* NHU_CLEAN -> NHU_SCHEDULED
|
|
|
|
* NHU_RUNNING -> NHU_DIRTY
|
|
|
|
*/
|
|
|
|
if ((tab->nhu_state |= NHU_SCHEDULED) == NHU_SCHEDULED)
|
2022-09-12 08:25:14 +00:00
|
|
|
birdloop_flag(tab->loop, RTF_NHU);
|
2022-09-07 11:12:44 +00:00
|
|
|
}
|
2010-07-05 15:50:19 +00:00
|
|
|
}
|
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
void
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_schedule_prune(struct rtable_private *tab)
|
2012-03-28 16:40:04 +00:00
|
|
|
{
|
2016-01-26 10:48:58 +00:00
|
|
|
if (tab->prune_state == 0)
|
2022-09-12 08:25:14 +00:00
|
|
|
birdloop_flag(tab->loop, RTF_CLEANUP);
|
2012-03-28 16:40:04 +00:00
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
/* state change 0->1, 2->3 */
|
|
|
|
tab->prune_state |= 1;
|
2012-03-28 16:40:04 +00:00
|
|
|
}
|
|
|
|
|
2022-07-15 12:57:02 +00:00
|
|
|
static void
|
2024-02-09 16:02:44 +00:00
|
|
|
rt_export_used(struct rt_exporter *e, const char *who, const char *why)
|
2021-09-27 11:04:16 +00:00
|
|
|
{
|
2022-09-07 11:54:20 +00:00
|
|
|
struct rtable_private *tab = SKIP_BACK(struct rtable_private, exporter, e);
|
|
|
|
ASSERT_DIE(RT_IS_LOCKED(tab));
|
2022-07-15 12:57:02 +00:00
|
|
|
|
2022-09-23 07:58:00 +00:00
|
|
|
rt_trace(tab, D_EVENTS, "Export cleanup requested by %s %s", who, why);
|
2021-09-27 11:04:16 +00:00
|
|
|
|
|
|
|
if (tab->export_used)
|
|
|
|
return;
|
|
|
|
|
|
|
|
tab->export_used = 1;
|
2022-09-12 08:25:14 +00:00
|
|
|
birdloop_flag(tab->loop, RTF_CLEANUP);
|
2021-09-27 11:04:16 +00:00
|
|
|
}
|
2016-01-26 10:48:58 +00:00
|
|
|
|
2000-04-27 22:28:49 +00:00
|
|
|
static void
|
2022-09-12 08:25:14 +00:00
|
|
|
rt_flag_handler(struct birdloop_flag_handler *fh, u32 flags)
|
1999-02-13 21:29:01 +00:00
|
|
|
{
|
2022-09-12 08:25:14 +00:00
|
|
|
RT_LOCKED(RT_PUB(SKIP_BACK(struct rtable_private, fh, fh)), tab)
|
2022-09-07 11:54:20 +00:00
|
|
|
{
|
2022-09-12 08:25:14 +00:00
|
|
|
ASSERT_DIE(birdloop_inside(tab->loop));
|
|
|
|
rt_lock_table(tab);
|
2010-07-05 15:50:19 +00:00
|
|
|
|
2022-09-12 08:25:14 +00:00
|
|
|
if (flags & RTF_NHU)
|
|
|
|
rt_next_hop_update(tab);
|
2016-05-12 14:04:47 +00:00
|
|
|
|
2022-09-12 08:25:14 +00:00
|
|
|
if (flags & RTF_EXPORT)
|
2022-09-26 10:09:14 +00:00
|
|
|
rt_kick_export_settle(tab);
|
2021-09-27 11:04:16 +00:00
|
|
|
|
2022-09-12 08:25:14 +00:00
|
|
|
if (flags & RTF_CLEANUP)
|
|
|
|
{
|
|
|
|
if (tab->export_used)
|
|
|
|
rt_export_cleanup(tab);
|
|
|
|
|
|
|
|
if (tab->prune_state)
|
|
|
|
rt_prune_table(tab);
|
|
|
|
}
|
2016-05-12 14:04:47 +00:00
|
|
|
|
2023-03-06 12:16:12 +00:00
|
|
|
if (flags & RTF_DELETE)
|
|
|
|
{
|
|
|
|
if (tab->hostcache)
|
|
|
|
rt_stop_export(&tab->hostcache->req, NULL);
|
|
|
|
|
|
|
|
rt_unlock_table(tab);
|
|
|
|
}
|
|
|
|
|
2022-09-12 08:25:14 +00:00
|
|
|
rt_unlock_table(tab);
|
2022-09-07 11:54:20 +00:00
|
|
|
}
|
1999-02-13 21:29:01 +00:00
|
|
|
}
|
|
|
|
|
2022-06-04 15:34:57 +00:00
|
|
|
static void
|
|
|
|
rt_prune_timer(timer *t)
|
|
|
|
{
|
2022-09-07 11:54:20 +00:00
|
|
|
RT_LOCKED((rtable *) t->data, tab)
|
|
|
|
if (tab->gc_counter >= tab->config->gc_threshold)
|
|
|
|
rt_schedule_prune(tab);
|
2022-06-04 15:34:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_kick_prune_timer(struct rtable_private *tab)
|
2022-06-04 15:34:57 +00:00
|
|
|
{
|
|
|
|
/* Return if prune is already scheduled */
|
|
|
|
if (tm_active(tab->prune_timer) || (tab->prune_state & 1))
|
|
|
|
return;
|
|
|
|
|
|
|
|
/* Randomize GC period to +/- 50% */
|
|
|
|
btime gc_period = tab->config->gc_period;
|
|
|
|
gc_period = (gc_period / 2) + (random_u32() % (uint) gc_period);
|
2022-09-09 11:52:37 +00:00
|
|
|
tm_start_in(tab->prune_timer, gc_period, tab->loop);
|
2022-06-04 15:34:57 +00:00
|
|
|
}
|
|
|
|
|
2024-02-11 21:58:29 +00:00
|
|
|
#define TLIST_PREFIX rt_flowspec_link
|
|
|
|
#define TLIST_TYPE struct rt_flowspec_link
|
|
|
|
#define TLIST_ITEM n
|
|
|
|
#define TLIST_WANT_WALK
|
|
|
|
#define TLIST_WANT_ADD_TAIL
|
|
|
|
#define TLIST_DEFINED_BEFORE
|
|
|
|
|
|
|
|
struct rt_flowspec_link {
|
|
|
|
TLIST_DEFAULT_NODE;
|
|
|
|
rtable *src;
|
|
|
|
rtable *dst;
|
|
|
|
u32 uc;
|
|
|
|
struct rt_export_request req;
|
|
|
|
};
|
|
|
|
|
|
|
|
#include "lib/tlists.h"
|
|
|
|
|
2022-06-04 15:34:57 +00:00
|
|
|
|
2022-08-31 14:04:36 +00:00
|
|
|
static void
|
|
|
|
rt_flowspec_export_one(struct rt_export_request *req, const net_addr *net, struct rt_pending_export *first)
|
|
|
|
{
|
|
|
|
struct rt_flowspec_link *ln = SKIP_BACK(struct rt_flowspec_link, req, req);
|
2022-09-07 11:54:20 +00:00
|
|
|
rtable *dst_pub = ln->dst;
|
|
|
|
ASSUME(rt_is_flow(dst_pub));
|
2023-11-14 11:53:40 +00:00
|
|
|
|
|
|
|
RT_LOCKED(dst_pub, dst)
|
|
|
|
{
|
2022-08-31 14:04:36 +00:00
|
|
|
|
2022-09-05 10:55:36 +00:00
|
|
|
/* No need to inspect it further if recalculation is already scheduled */
|
2022-08-31 14:04:36 +00:00
|
|
|
if ((dst->nhu_state == NHU_SCHEDULED) || (dst->nhu_state == NHU_DIRTY)
|
|
|
|
|| !trie_match_net(dst->flowspec_trie, net))
|
|
|
|
{
|
2023-03-31 08:46:17 +00:00
|
|
|
rpe_mark_seen_all(req->hook, first, NULL, NULL);
|
2022-08-31 14:04:36 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* This net may affect some flowspecs, check the actual change */
|
2023-07-03 18:38:24 +00:00
|
|
|
const rte *o = RTE_VALID_OR_NULL(first->old_best);
|
2024-02-07 16:30:43 +00:00
|
|
|
const rte *new_best = first->new_best;
|
2022-08-31 14:04:36 +00:00
|
|
|
|
|
|
|
RPE_WALK(first, rpe, NULL)
|
|
|
|
{
|
|
|
|
rpe_mark_seen(req->hook, rpe);
|
|
|
|
new_best = rpe->new_best;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Yes, something has actually changed. Schedule the update. */
|
|
|
|
if (o != RTE_VALID_OR_NULL(new_best))
|
|
|
|
rt_schedule_nhu(dst);
|
2022-09-07 11:54:20 +00:00
|
|
|
|
2023-11-14 11:53:40 +00:00
|
|
|
}
|
2022-08-31 14:04:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
rt_flowspec_dump_req(struct rt_export_request *req)
|
|
|
|
{
|
|
|
|
struct rt_flowspec_link *ln = SKIP_BACK(struct rt_flowspec_link, req, req);
|
|
|
|
debug(" Flowspec link for table %s (%p)\n", ln->dst->name, req);
|
|
|
|
}
|
|
|
|
|
2022-09-23 07:58:00 +00:00
|
|
|
static void
|
|
|
|
rt_flowspec_log_state_change(struct rt_export_request *req, u8 state)
|
|
|
|
{
|
|
|
|
struct rt_flowspec_link *ln = SKIP_BACK(struct rt_flowspec_link, req, req);
|
|
|
|
rt_trace(ln->dst, D_STATES, "Flowspec link from %s export state changed to %s",
|
|
|
|
ln->src->name, rt_export_state_name(state));
|
|
|
|
}
|
|
|
|
|
2021-12-20 19:25:35 +00:00
|
|
|
static struct rt_flowspec_link *
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_flowspec_find_link(struct rtable_private *src, rtable *dst)
|
2021-12-20 19:25:35 +00:00
|
|
|
{
|
2024-02-11 21:58:29 +00:00
|
|
|
WALK_TLIST(rt_flowspec_link, ln, &src->flowspec_links)
|
|
|
|
if (ln->dst == dst && ln->req.hook)
|
|
|
|
switch (atomic_load_explicit(&ln->req.hook->export_state, memory_order_acquire))
|
|
|
|
{
|
|
|
|
case TES_HUNGRY:
|
|
|
|
case TES_FEEDING:
|
|
|
|
case TES_READY:
|
|
|
|
return ln;
|
|
|
|
}
|
2021-12-20 19:25:35 +00:00
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_flowspec_link(rtable *src_pub, rtable *dst_pub)
|
2021-12-20 19:25:35 +00:00
|
|
|
{
|
2022-09-07 11:54:20 +00:00
|
|
|
ASSERT(rt_is_ip(src_pub));
|
|
|
|
ASSERT(rt_is_flow(dst_pub));
|
2021-12-20 19:25:35 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
int lock_dst = 0;
|
2021-12-20 19:25:35 +00:00
|
|
|
|
2023-02-07 16:01:34 +00:00
|
|
|
birdloop_enter(dst_pub->loop);
|
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
RT_LOCKED(src_pub, src)
|
2021-12-20 19:25:35 +00:00
|
|
|
{
|
2022-09-07 11:54:20 +00:00
|
|
|
struct rt_flowspec_link *ln = rt_flowspec_find_link(src, dst_pub);
|
|
|
|
|
|
|
|
if (!ln)
|
|
|
|
{
|
2023-04-21 13:26:06 +00:00
|
|
|
pool *p = birdloop_pool(dst_pub->loop);
|
2022-09-07 11:54:20 +00:00
|
|
|
ln = mb_allocz(p, sizeof(struct rt_flowspec_link));
|
|
|
|
ln->src = src_pub;
|
|
|
|
ln->dst = dst_pub;
|
|
|
|
ln->req = (struct rt_export_request) {
|
|
|
|
.name = mb_sprintf(p, "%s.flowspec.notifier", dst_pub->name),
|
2023-02-07 16:01:34 +00:00
|
|
|
.list = birdloop_event_list(dst_pub->loop),
|
2023-04-21 13:26:06 +00:00
|
|
|
.pool = p,
|
2022-09-07 11:54:20 +00:00
|
|
|
.trace_routes = src->config->debug,
|
|
|
|
.dump_req = rt_flowspec_dump_req,
|
2022-09-23 07:58:00 +00:00
|
|
|
.log_state_change = rt_flowspec_log_state_change,
|
2022-09-07 11:54:20 +00:00
|
|
|
.export_one = rt_flowspec_export_one,
|
|
|
|
};
|
2024-02-11 21:58:29 +00:00
|
|
|
rt_flowspec_link_add_tail(&src->flowspec_links, ln);
|
2022-09-07 11:54:20 +00:00
|
|
|
|
|
|
|
rt_table_export_start_locked(src, &ln->req);
|
|
|
|
|
|
|
|
lock_dst = 1;
|
|
|
|
}
|
2022-08-31 14:04:36 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
ln->uc++;
|
2021-12-20 19:25:35 +00:00
|
|
|
}
|
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
if (lock_dst)
|
|
|
|
rt_lock_table(dst_pub);
|
2023-02-07 16:01:34 +00:00
|
|
|
|
|
|
|
birdloop_leave(dst_pub->loop);
|
2021-12-20 19:25:35 +00:00
|
|
|
}
|
|
|
|
|
2022-08-31 14:04:36 +00:00
|
|
|
static void
|
|
|
|
rt_flowspec_link_stopped(struct rt_export_request *req)
|
2021-12-20 19:25:35 +00:00
|
|
|
{
|
2022-08-31 14:04:36 +00:00
|
|
|
struct rt_flowspec_link *ln = SKIP_BACK(struct rt_flowspec_link, req, req);
|
|
|
|
rtable *dst = ln->dst;
|
2021-12-20 19:25:35 +00:00
|
|
|
|
2022-08-31 14:04:36 +00:00
|
|
|
mb_free(ln);
|
|
|
|
rt_unlock_table(dst);
|
2021-12-20 19:25:35 +00:00
|
|
|
}
|
|
|
|
|
2022-08-31 14:04:36 +00:00
|
|
|
void
|
|
|
|
rt_flowspec_unlink(rtable *src, rtable *dst)
|
2021-12-20 19:25:35 +00:00
|
|
|
{
|
2023-02-07 16:01:34 +00:00
|
|
|
birdloop_enter(dst->loop);
|
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
struct rt_flowspec_link *ln;
|
|
|
|
RT_LOCKED(src, t)
|
|
|
|
{
|
|
|
|
ln = rt_flowspec_find_link(t, dst);
|
2021-12-20 19:25:35 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
ASSERT(ln && (ln->uc > 0));
|
2021-12-20 19:25:35 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
if (!--ln->uc)
|
2024-02-11 21:58:29 +00:00
|
|
|
{
|
|
|
|
rt_flowspec_link_rem_node(&t->flowspec_links, ln);
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_stop_export(&ln->req, rt_flowspec_link_stopped);
|
2024-02-11 21:58:29 +00:00
|
|
|
}
|
2022-09-07 11:54:20 +00:00
|
|
|
}
|
2023-02-07 16:01:34 +00:00
|
|
|
|
|
|
|
birdloop_leave(dst->loop);
|
2021-12-20 19:25:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_flowspec_reset_trie(struct rtable_private *tab)
|
2021-12-20 19:25:35 +00:00
|
|
|
{
|
|
|
|
linpool *lp = tab->flowspec_trie->lp;
|
|
|
|
int ipv4 = tab->flowspec_trie->ipv4;
|
|
|
|
|
|
|
|
lp_flush(lp);
|
|
|
|
tab->flowspec_trie = f_new_trie(lp, 0);
|
|
|
|
tab->flowspec_trie->ipv4 = ipv4;
|
|
|
|
}
|
|
|
|
|
2021-03-30 16:51:31 +00:00
|
|
|
static void
|
|
|
|
rt_free(resource *_r)
|
|
|
|
{
|
2022-09-07 11:54:20 +00:00
|
|
|
struct rtable_private *r = SKIP_BACK(struct rtable_private, r, _r);
|
|
|
|
|
2021-03-30 16:51:31 +00:00
|
|
|
DBG("Deleting routing table %s\n", r->name);
|
|
|
|
ASSERT_DIE(r->use_count == 0);
|
|
|
|
|
|
|
|
r->config->table = NULL;
|
|
|
|
rem_node(&r->n);
|
|
|
|
|
|
|
|
if (r->hostcache)
|
|
|
|
rt_free_hostcache(r);
|
|
|
|
|
|
|
|
/* Freed automagically by the resource pool
|
|
|
|
fib_free(&r->fib);
|
|
|
|
hmap_free(&r->id_map);
|
|
|
|
rfree(r->rt_event);
|
|
|
|
mb_free(r);
|
|
|
|
*/
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2023-02-28 09:42:47 +00:00
|
|
|
rt_res_dump(resource *_r, unsigned indent)
|
2021-03-30 16:51:31 +00:00
|
|
|
{
|
2022-09-07 11:54:20 +00:00
|
|
|
struct rtable_private *r = SKIP_BACK(struct rtable_private, r, _r);
|
|
|
|
|
2021-03-30 16:51:31 +00:00
|
|
|
debug("name \"%s\", addr_type=%s, rt_count=%u, use_count=%d\n",
|
|
|
|
r->name, net_label[r->addr_type], r->rt_count, r->use_count);
|
2023-02-28 09:42:47 +00:00
|
|
|
|
|
|
|
char x[32];
|
|
|
|
bsprintf(x, "%%%dspending export %%p\n", indent + 2);
|
|
|
|
|
|
|
|
node *n;
|
|
|
|
WALK_LIST(n, r->exporter.pending)
|
|
|
|
debug(x, "", n);
|
2021-03-30 16:51:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static struct resclass rt_class = {
|
|
|
|
.name = "Routing table",
|
2022-09-07 11:54:20 +00:00
|
|
|
.size = sizeof(rtable),
|
2021-03-30 16:51:31 +00:00
|
|
|
.free = rt_free,
|
|
|
|
.dump = rt_res_dump,
|
|
|
|
.lookup = NULL,
|
|
|
|
.memsize = NULL,
|
|
|
|
};
|
|
|
|
|
2024-02-09 16:02:44 +00:00
|
|
|
static const struct rt_exporter_class rt_exporter_class = {
|
2022-09-05 04:58:42 +00:00
|
|
|
.start = rt_table_export_start,
|
|
|
|
.stop = rt_table_export_stop,
|
|
|
|
.done = rt_table_export_done,
|
|
|
|
};
|
|
|
|
|
|
|
|
void
|
|
|
|
rt_exporter_init(struct rt_exporter *e)
|
|
|
|
{
|
|
|
|
init_list(&e->hooks);
|
|
|
|
}
|
|
|
|
|
2022-09-05 10:55:36 +00:00
|
|
|
static struct idm rtable_idm;
|
|
|
|
uint rtable_max_id = 0;
|
|
|
|
|
2021-03-30 16:51:31 +00:00
|
|
|
rtable *
|
|
|
|
rt_setup(pool *pp, struct rtable_config *cf)
|
2000-03-04 22:21:06 +00:00
|
|
|
{
|
2022-09-09 11:52:37 +00:00
|
|
|
ASSERT_DIE(birdloop_inside(&main_birdloop));
|
|
|
|
|
2023-04-22 19:20:19 +00:00
|
|
|
/* Start the service thread */
|
|
|
|
struct birdloop *loop = birdloop_new(pp, DOMAIN_ORDER(service), 0, "Routing table service %s", cf->name);
|
2023-04-21 13:26:06 +00:00
|
|
|
birdloop_enter(loop);
|
2023-04-22 19:20:19 +00:00
|
|
|
pool *sp = birdloop_pool(loop);
|
2023-04-21 13:26:06 +00:00
|
|
|
|
|
|
|
/* Create the table domain and pool */
|
2023-04-24 14:10:59 +00:00
|
|
|
DOMAIN(rtable) dom = DOMAIN_NEW(rtable);
|
2023-04-21 13:26:06 +00:00
|
|
|
LOCK_DOMAIN(rtable, dom);
|
|
|
|
|
|
|
|
pool *p = rp_newf(sp, dom.rtable, "Routing table data %s", cf->name);
|
2021-03-30 16:51:31 +00:00
|
|
|
|
2023-04-22 19:20:19 +00:00
|
|
|
/* Create the actual table */
|
2022-09-07 11:54:20 +00:00
|
|
|
struct rtable_private *t = ralloc(p, &rt_class);
|
2021-03-30 16:51:31 +00:00
|
|
|
t->rp = p;
|
2023-04-22 19:20:19 +00:00
|
|
|
t->loop = loop;
|
2023-04-21 13:26:06 +00:00
|
|
|
t->lock = dom;
|
2021-03-30 16:51:31 +00:00
|
|
|
|
2020-01-28 10:42:46 +00:00
|
|
|
t->rte_slab = sl_new(p, sizeof(struct rte_storage));
|
|
|
|
|
2018-02-06 15:08:45 +00:00
|
|
|
t->name = cf->name;
|
2000-03-04 22:21:06 +00:00
|
|
|
t->config = cf;
|
2018-02-06 15:08:45 +00:00
|
|
|
t->addr_type = cf->addr_type;
|
2023-12-07 13:38:05 +00:00
|
|
|
t->debug = cf->debug;
|
2022-09-05 10:55:36 +00:00
|
|
|
t->id = idm_alloc(&rtable_idm);
|
|
|
|
if (t->id >= rtable_max_id)
|
|
|
|
rtable_max_id = t->id + 1;
|
2021-03-30 16:51:31 +00:00
|
|
|
|
2023-12-08 15:13:14 +00:00
|
|
|
t->netindex = rt_global_netindex_hash;
|
|
|
|
t->routes = mb_allocz(p, (t->routes_block_size = 128) * sizeof(net));
|
2016-01-26 10:48:58 +00:00
|
|
|
|
2021-11-29 18:23:42 +00:00
|
|
|
if (cf->trie_used)
|
|
|
|
{
|
|
|
|
t->trie = f_new_trie(lp_new_default(p), 0);
|
|
|
|
t->trie->ipv4 = net_val_match(t->addr_type, NB_IP4 | NB_VPN4 | NB_ROA4);
|
|
|
|
}
|
|
|
|
|
2022-07-11 15:08:59 +00:00
|
|
|
init_list(&t->imports);
|
2022-06-20 19:29:10 +00:00
|
|
|
|
2022-07-11 15:08:59 +00:00
|
|
|
hmap_init(&t->id_map, p, 1024);
|
|
|
|
hmap_set(&t->id_map, 0);
|
2021-03-30 16:51:31 +00:00
|
|
|
|
2022-09-12 08:25:14 +00:00
|
|
|
t->fh = (struct birdloop_flag_handler) { .hook = rt_flag_handler, };
|
2022-09-09 11:52:37 +00:00
|
|
|
t->nhu_uncork_event = ev_new_init(p, rt_nhu_uncork, t);
|
2022-07-13 10:02:34 +00:00
|
|
|
t->prune_timer = tm_new_init(p, rt_prune_timer, t, 0, 0);
|
2022-07-11 15:08:59 +00:00
|
|
|
t->last_rt_change = t->gc_time = current_time();
|
2022-09-05 04:58:42 +00:00
|
|
|
|
2022-09-21 16:43:44 +00:00
|
|
|
t->export_settle = SETTLE_INIT(&cf->export_settle, rt_announce_exports, NULL);
|
|
|
|
|
2024-02-09 16:02:44 +00:00
|
|
|
t->exporter = (struct rt_exporter) {
|
|
|
|
.class = &rt_exporter_class,
|
|
|
|
.addr_type = t->addr_type,
|
|
|
|
.rp = t->rp,
|
2022-09-05 04:58:42 +00:00
|
|
|
.next_seq = 1,
|
|
|
|
};
|
|
|
|
|
2024-02-09 16:02:44 +00:00
|
|
|
rt_exporter_init(&t->exporter);
|
2022-09-05 04:58:42 +00:00
|
|
|
|
|
|
|
init_list(&t->exporter.pending);
|
2021-12-20 19:25:35 +00:00
|
|
|
|
2022-07-28 11:50:59 +00:00
|
|
|
t->cork_threshold = cf->cork_threshold;
|
|
|
|
|
2022-07-11 15:08:59 +00:00
|
|
|
t->rl_pipe = (struct tbf) TBF_DEFAULT_LOG_LIMITS;
|
2022-03-09 12:49:31 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
if (rt_is_flow(RT_PUB(t)))
|
2022-07-11 15:08:59 +00:00
|
|
|
{
|
|
|
|
t->flowspec_trie = f_new_trie(lp_new_default(p), 0);
|
|
|
|
t->flowspec_trie->ipv4 = (t->addr_type == NET_FLOW4);
|
2021-03-30 16:51:31 +00:00
|
|
|
}
|
2021-02-10 02:09:57 +00:00
|
|
|
|
2023-04-21 13:26:06 +00:00
|
|
|
UNLOCK_DOMAIN(rtable, dom);
|
|
|
|
|
2023-04-22 19:20:19 +00:00
|
|
|
/* Setup the service thread flag handler */
|
2022-09-12 08:25:14 +00:00
|
|
|
birdloop_flag_set_handler(t->loop, &t->fh);
|
|
|
|
birdloop_leave(t->loop);
|
2022-09-09 11:52:37 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
return RT_PUB(t);
|
2000-03-04 22:21:06 +00:00
|
|
|
}
|
|
|
|
|
2000-06-01 17:12:19 +00:00
|
|
|
/**
|
|
|
|
* rt_init - initialize routing tables
|
|
|
|
*
|
|
|
|
* This function is called during BIRD startup. It initializes the
|
|
|
|
* routing table module.
|
|
|
|
*/
|
1998-05-20 11:54:33 +00:00
|
|
|
void
|
|
|
|
rt_init(void)
|
|
|
|
{
|
|
|
|
rta_init();
|
2023-04-21 13:26:06 +00:00
|
|
|
rt_table_pool = rp_new(&root_pool, the_bird_domain.the_bird, "Routing tables");
|
1999-05-17 20:14:52 +00:00
|
|
|
init_list(&routing_tables);
|
2021-06-21 15:07:31 +00:00
|
|
|
init_list(&deleted_routing_tables);
|
2022-07-28 11:50:59 +00:00
|
|
|
ev_init_list(&rt_cork.queue, &main_birdloop, "Route cork release");
|
|
|
|
rt_cork.run = (event) { .hook = rt_cork_release_hook };
|
2022-09-05 10:55:36 +00:00
|
|
|
idm_init(&rtable_idm, rt_table_pool, 256);
|
2023-12-08 15:13:14 +00:00
|
|
|
rt_global_netindex_hash = netindex_hash_new(rt_table_pool);
|
|
|
|
}
|
|
|
|
|
|
|
|
static _Bool
|
|
|
|
rt_prune_net(struct rtable_private *tab, struct network *n)
|
|
|
|
{
|
|
|
|
for (struct rte_storage *e = n->routes; e; e = e->next)
|
|
|
|
{
|
|
|
|
struct rt_import_hook *s = e->rte.sender;
|
|
|
|
if ((s->import_state == TIS_FLUSHING) ||
|
|
|
|
(e->rte.stale_cycle < s->stale_valid) ||
|
|
|
|
(e->rte.stale_cycle > s->stale_set))
|
|
|
|
{
|
|
|
|
struct netindex *i = RTE_GET_NETINDEX(&e->rte);
|
|
|
|
rte_recalculate(tab, e->rte.sender, i, n, NULL, e->rte.src);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
1998-05-20 11:54:33 +00:00
|
|
|
}
|
1999-02-13 19:15:28 +00:00
|
|
|
|
2012-03-28 16:40:04 +00:00
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
/**
|
|
|
|
* rt_prune_table - prune a routing table
|
|
|
|
*
|
|
|
|
* The prune loop scans routing tables and removes routes belonging to flushing
|
|
|
|
* protocols, discarded routes and also stale network entries. It is called from
|
|
|
|
* rt_event(). The event is rescheduled if the current iteration do not finish
|
|
|
|
* the table. The pruning is directed by the prune state (@prune_state),
|
|
|
|
* specifying whether the prune cycle is scheduled or running, and there
|
|
|
|
* is also a persistent pruning iterator (@prune_fit).
|
|
|
|
*
|
|
|
|
* The prune loop is used also for channel flushing. For this purpose, the
|
|
|
|
* channels to flush are marked before the iteration and notified after the
|
|
|
|
* iteration.
|
|
|
|
*/
|
|
|
|
static void
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_prune_table(struct rtable_private *tab)
|
2012-03-28 16:40:04 +00:00
|
|
|
{
|
2022-05-15 13:05:13 +00:00
|
|
|
int limit = 2000;
|
2016-01-26 10:48:58 +00:00
|
|
|
|
2021-06-21 15:07:31 +00:00
|
|
|
struct rt_import_hook *ih;
|
2016-01-26 10:48:58 +00:00
|
|
|
node *n, *x;
|
1999-02-13 19:15:28 +00:00
|
|
|
|
2022-08-30 17:40:58 +00:00
|
|
|
rt_trace(tab, D_STATES, "Pruning");
|
2012-03-28 16:40:04 +00:00
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
if (tab->prune_state == 0)
|
|
|
|
return;
|
2012-03-28 16:40:04 +00:00
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
if (tab->prune_state == 1)
|
|
|
|
{
|
|
|
|
/* Mark channels to flush */
|
2021-06-21 15:07:31 +00:00
|
|
|
WALK_LIST2(ih, n, tab->imports, n)
|
|
|
|
if (ih->import_state == TIS_STOP)
|
|
|
|
rt_set_import_state(ih, TIS_FLUSHING);
|
Route refresh in tables uses a stale counter.
Until now, we were marking routes as REF_STALE and REF_DISCARD to
cleanup old routes after route refresh. This needed a synchronous route
table walk at both beginning and the end of route refresh routine,
marking the routes by the flags.
We avoid these walks by using a stale counter. Every route contains:
u8 stale_cycle;
Every import hook contains:
u8 stale_set;
u8 stale_valid;
u8 stale_pruned;
u8 stale_pruning;
In base_state, stale_set == stale_valid == stale_pruned == stale_pruning
and all routes' stale_cycle also have the same value.
The route refresh looks like follows:
+ ----------- + --------- + ----------- + ------------- + ------------ +
| | stale_set | stale_valid | stale_pruning | stale_pruned |
| Base | x | x | x | x |
| Begin | x+1 | x | x | x |
... now routes are being inserted with stale_cycle == (x+1)
| End | x+1 | x+1 | x | x |
... now table pruning routine is scheduled
| Prune begin | x+1 | x+1 | x+1 | x |
... now routes with stale_cycle not between stale_set and stale_valid
are deleted
| Prune end | x+1 | x+1 | x+1 | x+1 |
+ ----------- + --------- + ----------- + ------------- + ------------ +
The pruning routine is asynchronous and may have high latency in
high-load environments. Therefore, multiple route refresh requests may
happen before the pruning routine starts, leading to this situation:
| Prune begin | x+k | x+k | x -> x+k | x |
... or even
| Prune begin | x+k+1 | x+k | x -> x+k | x |
... if the prune event starts while another route refresh is running.
In such a case, the pruning routine still deletes routes not fitting
between stale_set and and stale_valid, effectively pruning the remnants
of all unpruned route refreshes from before:
| Prune end | x+k | x+k | x+k | x+k |
In extremely rare cases, there may happen too many route refreshes
before any route prune routine finishes. If the difference between
stale_valid and stale_pruned becomes more than 128 when requesting for
another route refresh, the routine walks the table synchronously and
resets all the stale values to a base state, while logging a warning.
2022-07-12 08:36:10 +00:00
|
|
|
else if ((ih->stale_valid != ih->stale_pruning) && (ih->stale_pruning == ih->stale_pruned))
|
|
|
|
{
|
|
|
|
ih->stale_pruning = ih->stale_valid;
|
2023-09-14 12:40:33 +00:00
|
|
|
rt_refresh_trace(tab, ih, "table prune after refresh begin");
|
Route refresh in tables uses a stale counter.
Until now, we were marking routes as REF_STALE and REF_DISCARD to
cleanup old routes after route refresh. This needed a synchronous route
table walk at both beginning and the end of route refresh routine,
marking the routes by the flags.
We avoid these walks by using a stale counter. Every route contains:
u8 stale_cycle;
Every import hook contains:
u8 stale_set;
u8 stale_valid;
u8 stale_pruned;
u8 stale_pruning;
In base_state, stale_set == stale_valid == stale_pruned == stale_pruning
and all routes' stale_cycle also have the same value.
The route refresh looks like follows:
+ ----------- + --------- + ----------- + ------------- + ------------ +
| | stale_set | stale_valid | stale_pruning | stale_pruned |
| Base | x | x | x | x |
| Begin | x+1 | x | x | x |
... now routes are being inserted with stale_cycle == (x+1)
| End | x+1 | x+1 | x | x |
... now table pruning routine is scheduled
| Prune begin | x+1 | x+1 | x+1 | x |
... now routes with stale_cycle not between stale_set and stale_valid
are deleted
| Prune end | x+1 | x+1 | x+1 | x+1 |
+ ----------- + --------- + ----------- + ------------- + ------------ +
The pruning routine is asynchronous and may have high latency in
high-load environments. Therefore, multiple route refresh requests may
happen before the pruning routine starts, leading to this situation:
| Prune begin | x+k | x+k | x -> x+k | x |
... or even
| Prune begin | x+k+1 | x+k | x -> x+k | x |
... if the prune event starts while another route refresh is running.
In such a case, the pruning routine still deletes routes not fitting
between stale_set and and stale_valid, effectively pruning the remnants
of all unpruned route refreshes from before:
| Prune end | x+k | x+k | x+k | x+k |
In extremely rare cases, there may happen too many route refreshes
before any route prune routine finishes. If the difference between
stale_valid and stale_pruned becomes more than 128 when requesting for
another route refresh, the routine walks the table synchronously and
resets all the stale values to a base state, while logging a warning.
2022-07-12 08:36:10 +00:00
|
|
|
}
|
2016-01-26 10:48:58 +00:00
|
|
|
|
2023-12-08 15:13:14 +00:00
|
|
|
tab->prune_index = 0;
|
2016-01-26 10:48:58 +00:00
|
|
|
tab->prune_state = 2;
|
2022-02-03 05:08:51 +00:00
|
|
|
|
2022-06-04 15:34:57 +00:00
|
|
|
tab->gc_counter = 0;
|
|
|
|
tab->gc_time = current_time();
|
|
|
|
|
2022-02-03 05:08:51 +00:00
|
|
|
if (tab->prune_trie)
|
|
|
|
{
|
|
|
|
/* Init prefix trie pruning */
|
|
|
|
tab->trie_new = f_new_trie(lp_new_default(tab->rp), 0);
|
|
|
|
tab->trie_new->ipv4 = tab->trie->ipv4;
|
|
|
|
}
|
2016-01-26 10:48:58 +00:00
|
|
|
}
|
2012-03-28 16:40:04 +00:00
|
|
|
|
2023-12-08 15:13:14 +00:00
|
|
|
for (; tab->prune_index < tab->routes_block_size; tab->prune_index++)
|
1999-02-13 19:15:28 +00:00
|
|
|
{
|
2023-12-08 15:13:14 +00:00
|
|
|
net *n = &tab->routes[tab->prune_index];
|
|
|
|
if (!n->routes)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
while ((limit > 0) && rt_prune_net(tab, n))
|
|
|
|
limit--;
|
|
|
|
|
2022-02-03 05:08:51 +00:00
|
|
|
if (limit <= 0)
|
|
|
|
{
|
2022-09-12 08:25:14 +00:00
|
|
|
birdloop_flag(tab->loop, RTF_CLEANUP);
|
2022-02-03 05:08:51 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2023-12-08 15:13:14 +00:00
|
|
|
if (tab->trie_new && n->routes)
|
2018-07-31 16:40:38 +00:00
|
|
|
{
|
2023-12-08 15:13:14 +00:00
|
|
|
const net_addr *a = n->routes->rte.net;
|
|
|
|
trie_add_prefix(tab->trie_new, a, a->pxlen, a->pxlen);
|
2022-02-03 05:08:51 +00:00
|
|
|
limit--;
|
|
|
|
}
|
1999-02-13 19:15:28 +00:00
|
|
|
}
|
2012-03-28 16:40:04 +00:00
|
|
|
|
2022-09-01 09:17:35 +00:00
|
|
|
rt_trace(tab, D_EVENTS, "Prune done, scheduling export timer");
|
2022-09-26 10:09:14 +00:00
|
|
|
rt_kick_export_settle(tab);
|
2022-09-01 09:17:35 +00:00
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
/* state change 2->0, 3->1 */
|
2022-09-12 16:27:01 +00:00
|
|
|
if (tab->prune_state &= 1)
|
|
|
|
birdloop_flag(tab->loop, RTF_CLEANUP);
|
2014-03-20 13:07:12 +00:00
|
|
|
|
2022-02-03 05:08:51 +00:00
|
|
|
if (tab->trie_new)
|
|
|
|
{
|
|
|
|
/* Finish prefix trie pruning */
|
2022-02-04 04:34:02 +00:00
|
|
|
|
|
|
|
if (!tab->trie_lock_count)
|
|
|
|
{
|
|
|
|
rfree(tab->trie->lp);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
ASSERT(!tab->trie_old);
|
|
|
|
tab->trie_old = tab->trie;
|
|
|
|
tab->trie_old_lock_count = tab->trie_lock_count;
|
|
|
|
tab->trie_lock_count = 0;
|
|
|
|
}
|
|
|
|
|
2022-02-03 05:08:51 +00:00
|
|
|
tab->trie = tab->trie_new;
|
|
|
|
tab->trie_new = NULL;
|
|
|
|
tab->prune_trie = 0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Schedule prefix trie pruning */
|
2023-12-08 15:13:14 +00:00
|
|
|
if (tab->trie && !tab->trie_old && (tab->trie->prefix_count > (2 * tab->net_count)))
|
2022-02-03 05:08:51 +00:00
|
|
|
{
|
|
|
|
/* state change 0->1, 2->3 */
|
|
|
|
tab->prune_state |= 1;
|
|
|
|
tab->prune_trie = 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
/* Close flushed channels */
|
2021-06-21 15:07:31 +00:00
|
|
|
WALK_LIST2_DELSAFE(ih, n, x, tab->imports, n)
|
|
|
|
if (ih->import_state == TIS_FLUSHING)
|
|
|
|
{
|
2023-01-19 09:56:16 +00:00
|
|
|
DBG("flushing %s %s rr %u", ih->req->name, tab->name, tab->rr_counter);
|
2022-07-15 12:57:02 +00:00
|
|
|
ih->flush_seq = tab->exporter.next_seq;
|
2021-09-27 11:04:16 +00:00
|
|
|
rt_set_import_state(ih, TIS_WAITING);
|
2022-09-26 10:09:14 +00:00
|
|
|
tab->rr_counter--;
|
2023-01-19 09:56:16 +00:00
|
|
|
tab->wait_counter++;
|
2021-06-21 15:07:31 +00:00
|
|
|
}
|
Route refresh in tables uses a stale counter.
Until now, we were marking routes as REF_STALE and REF_DISCARD to
cleanup old routes after route refresh. This needed a synchronous route
table walk at both beginning and the end of route refresh routine,
marking the routes by the flags.
We avoid these walks by using a stale counter. Every route contains:
u8 stale_cycle;
Every import hook contains:
u8 stale_set;
u8 stale_valid;
u8 stale_pruned;
u8 stale_pruning;
In base_state, stale_set == stale_valid == stale_pruned == stale_pruning
and all routes' stale_cycle also have the same value.
The route refresh looks like follows:
+ ----------- + --------- + ----------- + ------------- + ------------ +
| | stale_set | stale_valid | stale_pruning | stale_pruned |
| Base | x | x | x | x |
| Begin | x+1 | x | x | x |
... now routes are being inserted with stale_cycle == (x+1)
| End | x+1 | x+1 | x | x |
... now table pruning routine is scheduled
| Prune begin | x+1 | x+1 | x+1 | x |
... now routes with stale_cycle not between stale_set and stale_valid
are deleted
| Prune end | x+1 | x+1 | x+1 | x+1 |
+ ----------- + --------- + ----------- + ------------- + ------------ +
The pruning routine is asynchronous and may have high latency in
high-load environments. Therefore, multiple route refresh requests may
happen before the pruning routine starts, leading to this situation:
| Prune begin | x+k | x+k | x -> x+k | x |
... or even
| Prune begin | x+k+1 | x+k | x -> x+k | x |
... if the prune event starts while another route refresh is running.
In such a case, the pruning routine still deletes routes not fitting
between stale_set and and stale_valid, effectively pruning the remnants
of all unpruned route refreshes from before:
| Prune end | x+k | x+k | x+k | x+k |
In extremely rare cases, there may happen too many route refreshes
before any route prune routine finishes. If the difference between
stale_valid and stale_pruned becomes more than 128 when requesting for
another route refresh, the routine walks the table synchronously and
resets all the stale values to a base state, while logging a warning.
2022-07-12 08:36:10 +00:00
|
|
|
else if (ih->stale_pruning != ih->stale_pruned)
|
|
|
|
{
|
2023-01-19 09:56:16 +00:00
|
|
|
tab->rr_counter -= (ih->stale_pruning - ih->stale_pruned);
|
Route refresh in tables uses a stale counter.
Until now, we were marking routes as REF_STALE and REF_DISCARD to
cleanup old routes after route refresh. This needed a synchronous route
table walk at both beginning and the end of route refresh routine,
marking the routes by the flags.
We avoid these walks by using a stale counter. Every route contains:
u8 stale_cycle;
Every import hook contains:
u8 stale_set;
u8 stale_valid;
u8 stale_pruned;
u8 stale_pruning;
In base_state, stale_set == stale_valid == stale_pruned == stale_pruning
and all routes' stale_cycle also have the same value.
The route refresh looks like follows:
+ ----------- + --------- + ----------- + ------------- + ------------ +
| | stale_set | stale_valid | stale_pruning | stale_pruned |
| Base | x | x | x | x |
| Begin | x+1 | x | x | x |
... now routes are being inserted with stale_cycle == (x+1)
| End | x+1 | x+1 | x | x |
... now table pruning routine is scheduled
| Prune begin | x+1 | x+1 | x+1 | x |
... now routes with stale_cycle not between stale_set and stale_valid
are deleted
| Prune end | x+1 | x+1 | x+1 | x+1 |
+ ----------- + --------- + ----------- + ------------- + ------------ +
The pruning routine is asynchronous and may have high latency in
high-load environments. Therefore, multiple route refresh requests may
happen before the pruning routine starts, leading to this situation:
| Prune begin | x+k | x+k | x -> x+k | x |
... or even
| Prune begin | x+k+1 | x+k | x -> x+k | x |
... if the prune event starts while another route refresh is running.
In such a case, the pruning routine still deletes routes not fitting
between stale_set and and stale_valid, effectively pruning the remnants
of all unpruned route refreshes from before:
| Prune end | x+k | x+k | x+k | x+k |
In extremely rare cases, there may happen too many route refreshes
before any route prune routine finishes. If the difference between
stale_valid and stale_pruned becomes more than 128 when requesting for
another route refresh, the routine walks the table synchronously and
resets all the stale values to a base state, while logging a warning.
2022-07-12 08:36:10 +00:00
|
|
|
ih->stale_pruned = ih->stale_pruning;
|
2023-09-14 12:40:33 +00:00
|
|
|
rt_refresh_trace(tab, ih, "table prune after refresh end");
|
Route refresh in tables uses a stale counter.
Until now, we were marking routes as REF_STALE and REF_DISCARD to
cleanup old routes after route refresh. This needed a synchronous route
table walk at both beginning and the end of route refresh routine,
marking the routes by the flags.
We avoid these walks by using a stale counter. Every route contains:
u8 stale_cycle;
Every import hook contains:
u8 stale_set;
u8 stale_valid;
u8 stale_pruned;
u8 stale_pruning;
In base_state, stale_set == stale_valid == stale_pruned == stale_pruning
and all routes' stale_cycle also have the same value.
The route refresh looks like follows:
+ ----------- + --------- + ----------- + ------------- + ------------ +
| | stale_set | stale_valid | stale_pruning | stale_pruned |
| Base | x | x | x | x |
| Begin | x+1 | x | x | x |
... now routes are being inserted with stale_cycle == (x+1)
| End | x+1 | x+1 | x | x |
... now table pruning routine is scheduled
| Prune begin | x+1 | x+1 | x+1 | x |
... now routes with stale_cycle not between stale_set and stale_valid
are deleted
| Prune end | x+1 | x+1 | x+1 | x+1 |
+ ----------- + --------- + ----------- + ------------- + ------------ +
The pruning routine is asynchronous and may have high latency in
high-load environments. Therefore, multiple route refresh requests may
happen before the pruning routine starts, leading to this situation:
| Prune begin | x+k | x+k | x -> x+k | x |
... or even
| Prune begin | x+k+1 | x+k | x -> x+k | x |
... if the prune event starts while another route refresh is running.
In such a case, the pruning routine still deletes routes not fitting
between stale_set and and stale_valid, effectively pruning the remnants
of all unpruned route refreshes from before:
| Prune end | x+k | x+k | x+k | x+k |
In extremely rare cases, there may happen too many route refreshes
before any route prune routine finishes. If the difference between
stale_valid and stale_pruned becomes more than 128 when requesting for
another route refresh, the routine walks the table synchronously and
resets all the stale values to a base state, while logging a warning.
2022-07-12 08:36:10 +00:00
|
|
|
}
|
2021-09-27 11:04:16 +00:00
|
|
|
|
|
|
|
/* In some cases, we may want to directly proceed to export cleanup */
|
2024-02-09 16:02:44 +00:00
|
|
|
if (tab->wait_counter && (EMPTY_LIST(tab->exporter.hooks) || !tab->exporter.first))
|
2021-09-27 11:04:16 +00:00
|
|
|
rt_export_cleanup(tab);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_export_cleanup(struct rtable_private *tab)
|
2021-09-27 11:04:16 +00:00
|
|
|
{
|
|
|
|
tab->export_used = 0;
|
|
|
|
|
|
|
|
u64 min_seq = ~((u64) 0);
|
|
|
|
struct rt_pending_export *last_export_to_free = NULL;
|
2022-07-15 12:57:02 +00:00
|
|
|
struct rt_pending_export *first = tab->exporter.first;
|
2022-08-30 16:05:00 +00:00
|
|
|
int want_prune = 0;
|
2021-09-27 11:04:16 +00:00
|
|
|
|
2024-02-09 16:02:44 +00:00
|
|
|
struct rt_export_hook *eh;
|
2021-09-27 11:04:16 +00:00
|
|
|
node *n;
|
2024-02-09 16:02:44 +00:00
|
|
|
WALK_LIST2(eh, n, tab->exporter.hooks, n)
|
2021-09-27 11:04:16 +00:00
|
|
|
{
|
2024-02-09 16:02:44 +00:00
|
|
|
switch (atomic_load_explicit(&eh->export_state, memory_order_acquire))
|
2021-09-27 11:04:16 +00:00
|
|
|
{
|
2022-10-11 09:08:49 +00:00
|
|
|
/* Export cleanup while feeding isn't implemented */
|
|
|
|
case TES_FEEDING:
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
/* States not interfering with export cleanup */
|
|
|
|
case TES_DOWN: /* This should not happen at all */
|
2024-02-09 16:02:44 +00:00
|
|
|
log(L_WARN "%s: Export cleanup found hook %s in explicit state TES_DOWN", tab->name, eh->req->name);
|
2022-10-11 09:08:49 +00:00
|
|
|
/* fall through */
|
|
|
|
case TES_HUNGRY: /* Feeding waiting for uncork */
|
|
|
|
case TES_STOP: /* No more export will happen on this hook */
|
2021-09-27 11:04:16 +00:00
|
|
|
continue;
|
|
|
|
|
2022-10-11 09:08:49 +00:00
|
|
|
/* Regular export */
|
2021-09-27 11:04:16 +00:00
|
|
|
case TES_READY:
|
|
|
|
{
|
|
|
|
struct rt_pending_export *last = atomic_load_explicit(&eh->last_export, memory_order_acquire);
|
|
|
|
if (!last)
|
|
|
|
/* No last export means that the channel has exported nothing since last cleanup */
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
else if (min_seq > last->seq)
|
|
|
|
{
|
|
|
|
min_seq = last->seq;
|
|
|
|
last_export_to_free = last;
|
|
|
|
}
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
default:
|
2024-02-09 16:02:44 +00:00
|
|
|
bug("%s: Strange export state of hook %s: %d", tab->name, eh->req->name, atomic_load_explicit(&eh->export_state, memory_order_relaxed));
|
2021-09-27 11:04:16 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-07-15 12:57:02 +00:00
|
|
|
tab->exporter.first = last_export_to_free ? rt_next_export_fast(last_export_to_free) : NULL;
|
2021-09-27 11:04:16 +00:00
|
|
|
|
2022-08-30 17:40:58 +00:00
|
|
|
rt_trace(tab, D_STATES, "Export cleanup, old exporter.first seq %lu, new %lu, min_seq %ld",
|
2022-07-15 12:57:02 +00:00
|
|
|
first ? first->seq : 0,
|
|
|
|
tab->exporter.first ? tab->exporter.first->seq : 0,
|
2021-09-27 11:04:16 +00:00
|
|
|
min_seq);
|
|
|
|
|
2024-02-09 16:02:44 +00:00
|
|
|
WALK_LIST2(eh, n, tab->exporter.hooks, n)
|
2021-09-27 11:04:16 +00:00
|
|
|
{
|
2024-02-09 16:02:44 +00:00
|
|
|
if (atomic_load_explicit(&eh->export_state, memory_order_acquire) != TES_READY)
|
2021-09-27 11:04:16 +00:00
|
|
|
continue;
|
|
|
|
|
|
|
|
struct rt_pending_export *last = atomic_load_explicit(&eh->last_export, memory_order_acquire);
|
|
|
|
if (last == last_export_to_free)
|
|
|
|
{
|
|
|
|
/* This may fail when the channel managed to export more inbetween. This is OK. */
|
|
|
|
atomic_compare_exchange_strong_explicit(
|
|
|
|
&eh->last_export, &last, NULL,
|
|
|
|
memory_order_release,
|
|
|
|
memory_order_relaxed);
|
|
|
|
|
|
|
|
DBG("store hook=%p last_export=NULL\n", eh);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-07-15 12:57:02 +00:00
|
|
|
while (first && (first->seq <= min_seq))
|
2021-09-27 11:04:16 +00:00
|
|
|
{
|
2022-07-15 12:57:02 +00:00
|
|
|
ASSERT_DIE(first->new || first->old);
|
2021-09-27 11:04:16 +00:00
|
|
|
|
2022-07-15 12:57:02 +00:00
|
|
|
const net_addr *n = first->new ?
|
2024-02-07 16:30:43 +00:00
|
|
|
first->new->net :
|
|
|
|
first->old->net;
|
2023-12-08 15:13:14 +00:00
|
|
|
struct netindex *i = NET_TO_INDEX(n);
|
|
|
|
ASSERT_DIE(i->index < tab->routes_block_size);
|
|
|
|
net *net = &tab->routes[i->index];
|
2021-09-27 11:04:16 +00:00
|
|
|
|
2022-07-15 12:57:02 +00:00
|
|
|
ASSERT_DIE(net->first == first);
|
2022-08-31 09:58:27 +00:00
|
|
|
|
2022-07-15 12:57:02 +00:00
|
|
|
if (first == net->last)
|
2021-09-27 11:04:16 +00:00
|
|
|
/* The only export here */
|
|
|
|
net->last = net->first = NULL;
|
|
|
|
else
|
|
|
|
/* First is now the next one */
|
2022-07-15 12:57:02 +00:00
|
|
|
net->first = atomic_load_explicit(&first->next, memory_order_relaxed);
|
2021-09-27 11:04:16 +00:00
|
|
|
|
2022-08-30 16:05:00 +00:00
|
|
|
want_prune += !net->routes && !net->first;
|
|
|
|
|
2021-09-27 11:04:16 +00:00
|
|
|
/* For now, the old route may be finally freed */
|
2022-07-15 12:57:02 +00:00
|
|
|
if (first->old)
|
2021-09-27 11:04:16 +00:00
|
|
|
{
|
2024-02-07 16:30:43 +00:00
|
|
|
rt_rte_trace_in(D_ROUTES, first->old->sender->req, first->old, "freed");
|
|
|
|
hmap_clear(&tab->id_map, first->old->id);
|
|
|
|
rte_free(SKIP_BACK(struct rte_storage, rte, first->old), tab);
|
2021-09-27 11:04:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef LOCAL_DEBUG
|
2022-07-15 12:57:02 +00:00
|
|
|
memset(first, 0xbd, sizeof(struct rt_pending_export));
|
2021-09-27 11:04:16 +00:00
|
|
|
#endif
|
|
|
|
|
2022-07-15 12:57:02 +00:00
|
|
|
struct rt_export_block *reb = HEAD(tab->exporter.pending);
|
|
|
|
ASSERT_DIE(reb == PAGE_HEAD(first));
|
2021-09-27 11:04:16 +00:00
|
|
|
|
2022-07-15 12:57:02 +00:00
|
|
|
u32 pos = (first - &reb->export[0]);
|
2021-09-27 11:04:16 +00:00
|
|
|
u32 end = atomic_load_explicit(&reb->end, memory_order_relaxed);
|
|
|
|
ASSERT_DIE(pos < end);
|
|
|
|
|
|
|
|
struct rt_pending_export *next = NULL;
|
2022-08-31 09:58:27 +00:00
|
|
|
|
2021-09-27 11:04:16 +00:00
|
|
|
if (++pos < end)
|
|
|
|
next = &reb->export[pos];
|
|
|
|
else
|
|
|
|
{
|
|
|
|
rem_node(&reb->n);
|
|
|
|
|
|
|
|
#ifdef LOCAL_DEBUG
|
|
|
|
memset(reb, 0xbe, page_size);
|
|
|
|
#endif
|
|
|
|
|
2022-07-15 12:57:02 +00:00
|
|
|
free_page(reb);
|
2021-09-27 11:04:16 +00:00
|
|
|
|
2022-07-15 12:57:02 +00:00
|
|
|
if (EMPTY_LIST(tab->exporter.pending))
|
2021-09-27 11:04:16 +00:00
|
|
|
{
|
2022-08-30 17:40:58 +00:00
|
|
|
rt_trace(tab, D_EVENTS, "Resetting export seq");
|
2021-09-27 11:04:16 +00:00
|
|
|
|
|
|
|
node *n;
|
2024-02-09 16:02:44 +00:00
|
|
|
WALK_LIST2(eh, n, tab->exporter.hooks, n)
|
2021-09-27 11:04:16 +00:00
|
|
|
{
|
2024-02-09 16:02:44 +00:00
|
|
|
if (atomic_load_explicit(&eh->export_state, memory_order_acquire) != TES_READY)
|
2021-09-27 11:04:16 +00:00
|
|
|
continue;
|
|
|
|
|
|
|
|
ASSERT_DIE(atomic_load_explicit(&eh->last_export, memory_order_acquire) == NULL);
|
2024-02-09 16:02:44 +00:00
|
|
|
bmap_reset(&eh->seq_map, 16);
|
2021-09-27 11:04:16 +00:00
|
|
|
}
|
|
|
|
|
2022-07-15 12:57:02 +00:00
|
|
|
tab->exporter.next_seq = 1;
|
2021-09-27 11:04:16 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2022-07-15 12:57:02 +00:00
|
|
|
reb = HEAD(tab->exporter.pending);
|
2021-09-27 11:04:16 +00:00
|
|
|
next = &reb->export[0];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-07-15 12:57:02 +00:00
|
|
|
first = next;
|
2021-09-27 11:04:16 +00:00
|
|
|
}
|
|
|
|
|
2022-07-28 11:50:59 +00:00
|
|
|
rt_check_cork_low(tab);
|
|
|
|
|
2021-09-27 11:04:16 +00:00
|
|
|
done:;
|
|
|
|
struct rt_import_hook *ih; node *x;
|
2023-01-19 09:56:16 +00:00
|
|
|
if (tab->wait_counter)
|
|
|
|
WALK_LIST2_DELSAFE(ih, n, x, tab->imports, n)
|
|
|
|
if (ih->import_state == TIS_WAITING)
|
|
|
|
if (!first || (first->seq >= ih->flush_seq))
|
|
|
|
{
|
|
|
|
ih->import_state = TIS_CLEARED;
|
|
|
|
tab->wait_counter--;
|
|
|
|
ev_send(ih->req->list, &ih->announce_event);
|
|
|
|
}
|
2021-09-27 11:04:16 +00:00
|
|
|
|
2022-08-30 16:05:00 +00:00
|
|
|
if ((tab->gc_counter += want_prune) >= tab->config->gc_threshold)
|
|
|
|
rt_kick_prune_timer(tab);
|
|
|
|
|
2021-09-27 11:04:16 +00:00
|
|
|
if (tab->export_used)
|
2022-09-12 08:25:14 +00:00
|
|
|
birdloop_flag(tab->loop, RTF_CLEANUP);
|
2021-09-27 11:04:16 +00:00
|
|
|
|
2022-09-12 08:25:14 +00:00
|
|
|
if (EMPTY_LIST(tab->exporter.pending))
|
2022-09-21 16:43:44 +00:00
|
|
|
settle_cancel(&tab->export_settle);
|
1999-05-17 20:14:52 +00:00
|
|
|
}
|
|
|
|
|
2022-07-28 11:50:59 +00:00
|
|
|
static void
|
|
|
|
rt_cork_release_hook(void *data UNUSED)
|
|
|
|
{
|
|
|
|
do synchronize_rcu();
|
|
|
|
while (
|
|
|
|
!atomic_load_explicit(&rt_cork.active, memory_order_acquire) &&
|
|
|
|
ev_run_list(&rt_cork.queue)
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2022-02-04 04:34:02 +00:00
|
|
|
/**
|
|
|
|
* rt_lock_trie - lock a prefix trie of a routing table
|
|
|
|
* @tab: routing table with prefix trie to be locked
|
|
|
|
*
|
|
|
|
* The prune loop may rebuild the prefix trie and invalidate f_trie_walk_state
|
|
|
|
* structures. Therefore, asynchronous walks should lock the prefix trie using
|
|
|
|
* this function. That allows the prune loop to rebuild the trie, but postpones
|
|
|
|
* its freeing until all walks are done (unlocked by rt_unlock_trie()).
|
|
|
|
*
|
|
|
|
* Return a current trie that will be locked, the value should be passed back to
|
|
|
|
* rt_unlock_trie() for unlocking.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
struct f_trie *
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_lock_trie(struct rtable_private *tab)
|
2022-02-04 04:34:02 +00:00
|
|
|
{
|
|
|
|
ASSERT(tab->trie);
|
|
|
|
|
|
|
|
tab->trie_lock_count++;
|
|
|
|
return tab->trie;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* rt_unlock_trie - unlock a prefix trie of a routing table
|
|
|
|
* @tab: routing table with prefix trie to be locked
|
|
|
|
* @trie: value returned by matching rt_lock_trie()
|
|
|
|
*
|
|
|
|
* Done for trie locked by rt_lock_trie() after walk over the trie is done.
|
|
|
|
* It may free the trie and schedule next trie pruning.
|
|
|
|
*/
|
|
|
|
void
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_unlock_trie(struct rtable_private *tab, struct f_trie *trie)
|
2022-02-04 04:34:02 +00:00
|
|
|
{
|
|
|
|
ASSERT(trie);
|
|
|
|
|
|
|
|
if (trie == tab->trie)
|
|
|
|
{
|
|
|
|
/* Unlock the current prefix trie */
|
|
|
|
ASSERT(tab->trie_lock_count);
|
|
|
|
tab->trie_lock_count--;
|
|
|
|
}
|
|
|
|
else if (trie == tab->trie_old)
|
|
|
|
{
|
|
|
|
/* Unlock the old prefix trie */
|
|
|
|
ASSERT(tab->trie_old_lock_count);
|
|
|
|
tab->trie_old_lock_count--;
|
|
|
|
|
|
|
|
/* Free old prefix trie that is no longer needed */
|
|
|
|
if (!tab->trie_old_lock_count)
|
|
|
|
{
|
|
|
|
rfree(tab->trie_old->lp);
|
|
|
|
tab->trie_old = NULL;
|
|
|
|
|
|
|
|
/* Kick prefix trie pruning that was postponed */
|
2023-12-08 15:13:14 +00:00
|
|
|
if (tab->trie && (tab->trie->prefix_count > (2 * tab->net_count)))
|
2022-02-04 04:34:02 +00:00
|
|
|
{
|
|
|
|
tab->prune_trie = 1;
|
2023-01-19 09:56:16 +00:00
|
|
|
rt_kick_prune_timer(tab);
|
2022-02-04 04:34:02 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
log(L_BUG "Invalid arg to rt_unlock_trie()");
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-07-05 15:50:19 +00:00
|
|
|
void
|
|
|
|
rt_preconfig(struct config *c)
|
|
|
|
{
|
|
|
|
init_list(&c->tables);
|
2016-01-26 10:48:58 +00:00
|
|
|
|
2023-10-27 16:29:31 +00:00
|
|
|
c->def_tables[NET_IP4] = cf_define_symbol(c, cf_get_symbol(c, "master4"), SYM_TABLE, table, NULL);
|
|
|
|
c->def_tables[NET_IP6] = cf_define_symbol(c, cf_get_symbol(c, "master6"), SYM_TABLE, table, NULL);
|
2010-07-05 15:50:19 +00:00
|
|
|
}
|
|
|
|
|
2022-06-04 15:34:57 +00:00
|
|
|
void
|
|
|
|
rt_postconfig(struct config *c)
|
|
|
|
{
|
|
|
|
uint num_tables = list_length(&c->tables);
|
|
|
|
btime def_gc_period = 400 MS * num_tables;
|
|
|
|
def_gc_period = MAX(def_gc_period, 10 S);
|
|
|
|
def_gc_period = MIN(def_gc_period, 600 S);
|
|
|
|
|
|
|
|
struct rtable_config *rc;
|
|
|
|
WALK_LIST(rc, c->tables)
|
|
|
|
if (rc->gc_period == (uint) -1)
|
|
|
|
rc->gc_period = (uint) def_gc_period;
|
2022-09-01 12:21:56 +00:00
|
|
|
|
|
|
|
for (uint net_type = 0; net_type < NET_MAX; net_type++)
|
|
|
|
if (c->def_tables[net_type] && !c->def_tables[net_type]->table)
|
|
|
|
{
|
|
|
|
c->def_tables[net_type]->class = SYM_VOID;
|
|
|
|
c->def_tables[net_type] = NULL;
|
|
|
|
}
|
2022-06-04 15:34:57 +00:00
|
|
|
}
|
|
|
|
|
2010-07-05 15:50:19 +00:00
|
|
|
|
2016-01-26 10:48:58 +00:00
|
|
|
/*
|
2010-07-05 15:50:19 +00:00
|
|
|
* Some functions for handing internal next hop updates
|
|
|
|
* triggered by rt_schedule_nhu().
|
|
|
|
*/
|
|
|
|
|
2017-03-22 14:00:07 +00:00
|
|
|
void
|
2022-09-07 11:54:20 +00:00
|
|
|
ea_set_hostentry(ea_list **to, rtable *dep, rtable *src, ip_addr gw, ip_addr ll, u32 lnum, u32 labels[lnum])
|
2010-07-05 15:50:19 +00:00
|
|
|
{
|
2024-01-30 22:13:49 +00:00
|
|
|
struct {
|
|
|
|
struct hostentry_adata head;
|
|
|
|
u32 label_space[lnum];
|
|
|
|
} h;
|
|
|
|
|
|
|
|
memset(&h, 0, sizeof h);
|
2022-05-15 13:53:35 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
RT_LOCKED(src, tab)
|
2024-01-30 22:13:49 +00:00
|
|
|
h.head.he = rt_get_hostentry(tab, gw, ll, dep);
|
|
|
|
|
|
|
|
memcpy(h.head.labels, labels, lnum * sizeof(u32));
|
2022-05-15 13:53:35 +00:00
|
|
|
|
2024-01-30 22:13:49 +00:00
|
|
|
ea_set_attr_data(to, &ea_gen_hostentry, 0, h.head.ad.data, (byte *) &h.head.labels[lnum] - h.head.ad.data);
|
2022-05-15 13:53:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void
|
2023-08-28 13:36:40 +00:00
|
|
|
rta_apply_hostentry(struct rtable_private *tab UNUSED, ea_list **to, struct hostentry_adata *head)
|
2010-07-05 15:50:19 +00:00
|
|
|
{
|
2022-05-15 13:53:35 +00:00
|
|
|
struct hostentry *he = head->he;
|
|
|
|
u32 *labels = head->labels;
|
|
|
|
u32 lnum = (u32 *) (head->ad.data + head->ad.length) - labels;
|
|
|
|
|
2022-05-30 10:03:03 +00:00
|
|
|
ea_set_attr_u32(to, &ea_gen_igp_metric, 0, he->igp_metric);
|
2016-08-09 12:47:51 +00:00
|
|
|
|
2022-05-15 16:09:30 +00:00
|
|
|
if (!he->src)
|
2016-08-09 12:47:51 +00:00
|
|
|
{
|
2022-05-30 10:03:03 +00:00
|
|
|
ea_set_dest(to, 0, RTD_UNREACHABLE);
|
2016-08-09 12:47:51 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2022-05-30 10:03:03 +00:00
|
|
|
eattr *he_nh_ea = ea_find(he->src, &ea_gen_nexthop);
|
2022-05-15 16:09:30 +00:00
|
|
|
ASSERT_DIE(he_nh_ea);
|
|
|
|
|
|
|
|
struct nexthop_adata *nhad = (struct nexthop_adata *) he_nh_ea->u.ptr;
|
|
|
|
int idest = nhea_dest(he_nh_ea);
|
|
|
|
|
|
|
|
if ((idest != RTD_UNICAST) ||
|
|
|
|
!lnum && he->nexthop_linkable)
|
2017-03-17 14:48:09 +00:00
|
|
|
{ /* Just link the nexthop chain, no label append happens. */
|
2022-05-30 10:03:03 +00:00
|
|
|
ea_copy_attr(to, he->src, &ea_gen_nexthop);
|
2017-03-17 14:48:09 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2022-05-05 16:08:37 +00:00
|
|
|
uint total_size = OFFSETOF(struct nexthop_adata, nh);
|
|
|
|
|
|
|
|
NEXTHOP_WALK(nh, nhad)
|
2016-08-09 12:47:51 +00:00
|
|
|
{
|
2022-05-15 13:53:35 +00:00
|
|
|
if (nh->labels + lnum > MPLS_MAX_LABEL_STACK)
|
2017-03-17 14:48:09 +00:00
|
|
|
{
|
2022-05-05 16:08:37 +00:00
|
|
|
log(L_WARN "Sum of label stack sizes %d + %d = %d exceedes allowed maximum (%d)",
|
2022-05-15 13:53:35 +00:00
|
|
|
nh->labels, lnum, nh->labels + lnum, MPLS_MAX_LABEL_STACK);
|
2022-05-05 16:08:37 +00:00
|
|
|
continue;
|
2017-03-17 14:48:09 +00:00
|
|
|
}
|
2017-02-24 13:05:11 +00:00
|
|
|
|
2022-05-15 13:53:35 +00:00
|
|
|
total_size += NEXTHOP_SIZE_CNT(nh->labels + lnum);
|
2022-05-05 16:08:37 +00:00
|
|
|
}
|
2019-10-10 13:25:36 +00:00
|
|
|
|
2022-05-05 16:08:37 +00:00
|
|
|
if (total_size == OFFSETOF(struct nexthop_adata, nh))
|
|
|
|
{
|
|
|
|
log(L_WARN "No valid nexthop remaining, setting route unreachable");
|
|
|
|
|
2022-05-15 16:09:30 +00:00
|
|
|
struct nexthop_adata nha = {
|
|
|
|
.ad.length = NEXTHOP_DEST_SIZE,
|
|
|
|
.dest = RTD_UNREACHABLE,
|
|
|
|
};
|
|
|
|
|
2022-05-30 10:03:03 +00:00
|
|
|
ea_set_attr_data(to, &ea_gen_nexthop, 0, &nha.ad.data, nha.ad.length);
|
2022-05-05 16:08:37 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct nexthop_adata *new = (struct nexthop_adata *) tmp_alloc_adata(total_size);
|
|
|
|
struct nexthop *dest = &new->nh;
|
|
|
|
|
|
|
|
NEXTHOP_WALK(nh, nhad)
|
|
|
|
{
|
2022-05-15 13:53:35 +00:00
|
|
|
if (nh->labels + lnum > MPLS_MAX_LABEL_STACK)
|
2022-05-05 16:08:37 +00:00
|
|
|
continue;
|
|
|
|
|
|
|
|
memcpy(dest, nh, NEXTHOP_SIZE(nh));
|
2022-05-15 13:53:35 +00:00
|
|
|
if (lnum)
|
2019-10-10 13:25:36 +00:00
|
|
|
{
|
2022-05-15 13:53:35 +00:00
|
|
|
memcpy(&(dest->label[dest->labels]), labels, lnum * sizeof labels[0]);
|
|
|
|
dest->labels += lnum;
|
2019-10-10 13:25:36 +00:00
|
|
|
}
|
|
|
|
|
2017-03-17 14:48:09 +00:00
|
|
|
if (ipa_nonzero(nh->gw))
|
2022-05-05 16:08:37 +00:00
|
|
|
/* Router nexthop */
|
|
|
|
dest->flags = (dest->flags & RNF_ONLINK);
|
2019-10-10 13:06:32 +00:00
|
|
|
else if (!(nh->iface->flags & IF_MULTIACCESS) || (nh->iface->flags & IF_LOOPBACK))
|
2022-05-05 16:08:37 +00:00
|
|
|
dest->gw = IPA_NONE; /* PtP link - no need for nexthop */
|
2017-03-17 14:48:09 +00:00
|
|
|
else if (ipa_nonzero(he->link))
|
2022-05-05 16:08:37 +00:00
|
|
|
dest->gw = he->link; /* Device nexthop with link-local address known */
|
2017-03-17 14:48:09 +00:00
|
|
|
else
|
2022-05-05 16:08:37 +00:00
|
|
|
dest->gw = he->addr; /* Device nexthop with link-local address unknown */
|
|
|
|
|
|
|
|
dest = NEXTHOP_NEXT(dest);
|
2016-08-09 12:47:51 +00:00
|
|
|
}
|
2017-02-24 13:05:11 +00:00
|
|
|
|
2022-05-05 16:08:37 +00:00
|
|
|
/* Fix final length */
|
|
|
|
new->ad.length = (void *) dest - (void *) new->ad.data;
|
2022-05-30 10:03:03 +00:00
|
|
|
ea_set_attr(to, EA_LITERAL_DIRECT_ADATA(
|
2022-05-05 16:08:37 +00:00
|
|
|
&ea_gen_nexthop, 0, &new->ad));
|
2010-07-05 15:50:19 +00:00
|
|
|
}
|
|
|
|
|
2022-05-15 13:53:35 +00:00
|
|
|
static inline struct hostentry_adata *
|
2022-05-30 10:03:03 +00:00
|
|
|
rta_next_hop_outdated(ea_list *a)
|
2021-12-20 19:25:35 +00:00
|
|
|
{
|
2022-05-15 16:09:30 +00:00
|
|
|
/* First retrieve the hostentry */
|
2022-05-30 10:03:03 +00:00
|
|
|
eattr *heea = ea_find(a, &ea_gen_hostentry);
|
2022-05-15 13:53:35 +00:00
|
|
|
if (!heea)
|
|
|
|
return NULL;
|
2021-12-20 19:25:35 +00:00
|
|
|
|
2022-05-15 13:53:35 +00:00
|
|
|
struct hostentry_adata *head = (struct hostentry_adata *) heea->u.ptr;
|
2021-12-20 19:25:35 +00:00
|
|
|
|
2022-05-15 16:09:30 +00:00
|
|
|
/* If no nexthop is present, we have to create one */
|
2022-05-30 10:03:03 +00:00
|
|
|
eattr *a_nh_ea = ea_find(a, &ea_gen_nexthop);
|
2022-05-15 16:09:30 +00:00
|
|
|
if (!a_nh_ea)
|
|
|
|
return head;
|
|
|
|
|
|
|
|
struct nexthop_adata *nhad = (struct nexthop_adata *) a_nh_ea->u.ptr;
|
|
|
|
|
|
|
|
/* Shortcut for unresolvable hostentry */
|
2022-05-15 13:53:35 +00:00
|
|
|
if (!head->he->src)
|
2022-05-15 16:09:30 +00:00
|
|
|
return NEXTHOP_IS_REACHABLE(nhad) ? head : NULL;
|
2021-12-20 19:25:35 +00:00
|
|
|
|
2022-05-15 16:09:30 +00:00
|
|
|
/* Comparing our nexthop with the hostentry nexthop */
|
2022-05-30 10:03:03 +00:00
|
|
|
eattr *he_nh_ea = ea_find(head->he->src, &ea_gen_nexthop);
|
2022-05-05 16:08:37 +00:00
|
|
|
|
2022-05-15 16:09:30 +00:00
|
|
|
return (
|
2022-05-30 10:03:03 +00:00
|
|
|
(ea_get_int(a, &ea_gen_igp_metric, IGP_METRIC_UNKNOWN) != head->he->igp_metric) ||
|
2022-05-15 13:53:35 +00:00
|
|
|
(!head->he->nexthop_linkable) ||
|
|
|
|
(!he_nh_ea != !a_nh_ea) ||
|
|
|
|
(he_nh_ea && a_nh_ea && !adata_same(he_nh_ea->u.ptr, a_nh_ea->u.ptr)))
|
|
|
|
? head : NULL;
|
2021-12-20 19:25:35 +00:00
|
|
|
}
|
|
|
|
|
2022-09-06 17:38:40 +00:00
|
|
|
static inline int
|
2023-07-03 18:38:24 +00:00
|
|
|
rt_next_hop_update_rte(const rte *old, rte *new)
|
2010-07-05 15:50:19 +00:00
|
|
|
{
|
2022-05-15 13:53:35 +00:00
|
|
|
struct hostentry_adata *head = rta_next_hop_outdated(old->attrs);
|
|
|
|
if (!head)
|
2022-09-06 17:38:40 +00:00
|
|
|
return 0;
|
2010-07-05 15:50:19 +00:00
|
|
|
|
2022-09-06 17:38:40 +00:00
|
|
|
*new = *old;
|
2023-08-28 13:36:40 +00:00
|
|
|
RT_LOCKED(head->he->owner, tab)
|
|
|
|
rta_apply_hostentry(tab, &new->attrs, head);
|
2022-09-06 17:38:40 +00:00
|
|
|
return 1;
|
2010-07-05 15:50:19 +00:00
|
|
|
}
|
|
|
|
|
2022-05-31 10:51:34 +00:00
|
|
|
static inline void
|
|
|
|
rt_next_hop_resolve_rte(rte *r)
|
|
|
|
{
|
2022-06-08 13:31:28 +00:00
|
|
|
eattr *heea = ea_find(r->attrs, &ea_gen_hostentry);
|
2022-05-31 10:51:34 +00:00
|
|
|
if (!heea)
|
|
|
|
return;
|
|
|
|
|
|
|
|
struct hostentry_adata *head = (struct hostentry_adata *) heea->u.ptr;
|
|
|
|
|
2023-08-28 13:36:40 +00:00
|
|
|
RT_LOCKED(head->he->owner, tab)
|
|
|
|
rta_apply_hostentry(tab, &r->attrs, head);
|
2022-05-31 10:51:34 +00:00
|
|
|
}
|
2021-12-20 19:25:35 +00:00
|
|
|
|
|
|
|
#ifdef CONFIG_BGP
|
|
|
|
|
|
|
|
static inline int
|
|
|
|
net_flow_has_dst_prefix(const net_addr *n)
|
|
|
|
{
|
|
|
|
ASSUME(net_is_flow(n));
|
|
|
|
|
|
|
|
if (n->pxlen)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
if (n->type == NET_FLOW4)
|
|
|
|
{
|
|
|
|
const net_addr_flow4 *n4 = (void *) n;
|
|
|
|
return (n4->length > sizeof(net_addr_flow4)) && (n4->data[0] == FLOW_TYPE_DST_PREFIX);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
const net_addr_flow6 *n6 = (void *) n;
|
|
|
|
return (n6->length > sizeof(net_addr_flow6)) && (n6->data[0] == FLOW_TYPE_DST_PREFIX);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int
|
2022-05-30 10:03:03 +00:00
|
|
|
rta_as_path_is_empty(ea_list *a)
|
2021-12-20 19:25:35 +00:00
|
|
|
{
|
2022-05-30 10:03:03 +00:00
|
|
|
eattr *e = ea_find(a, "bgp_path");
|
2021-12-20 19:25:35 +00:00
|
|
|
return !e || (as_path_getlen(e->u.ptr) == 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline u32
|
2022-05-30 10:03:03 +00:00
|
|
|
rta_get_first_asn(ea_list *a)
|
2021-12-20 19:25:35 +00:00
|
|
|
{
|
2022-05-30 10:03:03 +00:00
|
|
|
eattr *e = ea_find(a, "bgp_path");
|
2021-12-20 19:25:35 +00:00
|
|
|
u32 asn;
|
|
|
|
|
|
|
|
return (e && as_path_get_first_regular(e->u.ptr, &asn)) ? asn : 0;
|
|
|
|
}
|
|
|
|
|
2022-06-08 09:47:49 +00:00
|
|
|
static inline enum flowspec_valid
|
2022-05-30 10:03:03 +00:00
|
|
|
rt_flowspec_check(rtable *tab_ip, rtable *tab_flow, const net_addr *n, ea_list *a, int interior)
|
2021-12-20 19:25:35 +00:00
|
|
|
{
|
|
|
|
ASSERT(rt_is_ip(tab_ip));
|
|
|
|
ASSERT(rt_is_flow(tab_flow));
|
|
|
|
|
|
|
|
/* RFC 8955 6. a) Flowspec has defined dst prefix */
|
|
|
|
if (!net_flow_has_dst_prefix(n))
|
2022-06-08 09:47:49 +00:00
|
|
|
return FLOWSPEC_INVALID;
|
2021-12-20 19:25:35 +00:00
|
|
|
|
|
|
|
/* RFC 9117 4.1. Accept AS_PATH is empty (fr */
|
|
|
|
if (interior && rta_as_path_is_empty(a))
|
2022-06-08 09:47:49 +00:00
|
|
|
return FLOWSPEC_VALID;
|
2021-12-20 19:25:35 +00:00
|
|
|
|
|
|
|
|
|
|
|
/* RFC 8955 6. b) Flowspec and its best-match route have the same originator */
|
|
|
|
|
|
|
|
/* Find flowspec dst prefix */
|
|
|
|
net_addr dst;
|
|
|
|
if (n->type == NET_FLOW4)
|
|
|
|
net_fill_ip4(&dst, net4_prefix(n), net4_pxlen(n));
|
|
|
|
else
|
|
|
|
net_fill_ip6(&dst, net6_prefix(n), net6_pxlen(n));
|
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
rte rb = {};
|
|
|
|
net_addr_union nau;
|
|
|
|
RT_LOCKED(tab_ip, tip)
|
|
|
|
{
|
|
|
|
ASSERT(tip->trie);
|
|
|
|
/* Find best-match BGP unicast route for flowspec dst prefix */
|
|
|
|
net *nb = net_route(tip, &dst);
|
|
|
|
if (nb)
|
|
|
|
{
|
2024-02-07 16:30:43 +00:00
|
|
|
rb = RTE_COPY_VALID(RTE_OR_NULL(nb->routes));
|
2022-09-07 11:54:20 +00:00
|
|
|
rta_clone(rb.attrs);
|
2023-12-08 15:13:14 +00:00
|
|
|
net_copy(&nau.n, nb->routes->rte.net);
|
2022-09-07 11:54:20 +00:00
|
|
|
rb.net = &nau.n;
|
|
|
|
}
|
|
|
|
}
|
2021-12-20 19:25:35 +00:00
|
|
|
|
|
|
|
/* Register prefix to trie for tracking further changes */
|
|
|
|
int max_pxlen = (n->type == NET_FLOW4) ? IP4_MAX_PREFIX_LENGTH : IP6_MAX_PREFIX_LENGTH;
|
2022-09-07 11:54:20 +00:00
|
|
|
RT_LOCKED(tab_flow, tfl)
|
|
|
|
trie_add_prefix(tfl->flowspec_trie, &dst, (rb.net ? rb.net->pxlen : 0), max_pxlen);
|
2021-12-20 19:25:35 +00:00
|
|
|
|
|
|
|
/* No best-match BGP route -> no flowspec */
|
2022-09-07 11:54:20 +00:00
|
|
|
if (!rb.attrs || (rt_get_source_attr(&rb) != RTS_BGP))
|
2022-06-08 09:47:49 +00:00
|
|
|
return FLOWSPEC_INVALID;
|
2021-12-20 19:25:35 +00:00
|
|
|
|
|
|
|
/* Find ORIGINATOR_ID values */
|
2022-05-30 10:03:03 +00:00
|
|
|
u32 orig_a = ea_get_int(a, "bgp_originator_id", 0);
|
2022-09-07 11:54:20 +00:00
|
|
|
u32 orig_b = ea_get_int(rb.attrs, "bgp_originator_id", 0);
|
2021-12-20 19:25:35 +00:00
|
|
|
|
|
|
|
/* Originator is either ORIGINATOR_ID (if present), or BGP neighbor address (if not) */
|
2022-04-20 11:56:04 +00:00
|
|
|
if ((orig_a != orig_b) || (!orig_a && !orig_b && !ipa_equal(
|
2022-05-30 10:03:03 +00:00
|
|
|
ea_get_ip(a, &ea_gen_from, IPA_NONE),
|
2022-09-07 11:54:20 +00:00
|
|
|
ea_get_ip(rb.attrs, &ea_gen_from, IPA_NONE)
|
2022-04-20 11:56:04 +00:00
|
|
|
)))
|
2022-06-08 09:47:49 +00:00
|
|
|
return FLOWSPEC_INVALID;
|
2021-12-20 19:25:35 +00:00
|
|
|
|
|
|
|
|
|
|
|
/* Find ASN of the best-match route, for use in next checks */
|
2022-09-07 11:54:20 +00:00
|
|
|
u32 asn_b = rta_get_first_asn(rb.attrs);
|
2021-12-20 19:25:35 +00:00
|
|
|
if (!asn_b)
|
2022-06-08 09:47:49 +00:00
|
|
|
return FLOWSPEC_INVALID;
|
2021-12-20 19:25:35 +00:00
|
|
|
|
|
|
|
/* RFC 9117 4.2. For EBGP, flowspec and its best-match route are from the same AS */
|
|
|
|
if (!interior && (rta_get_first_asn(a) != asn_b))
|
2022-06-08 09:47:49 +00:00
|
|
|
return FLOWSPEC_INVALID;
|
2021-12-20 19:25:35 +00:00
|
|
|
|
|
|
|
/* RFC 8955 6. c) More-specific routes are from the same AS as the best-match route */
|
2022-09-07 11:54:20 +00:00
|
|
|
RT_LOCKED(tab_ip, tip)
|
2021-12-20 19:25:35 +00:00
|
|
|
{
|
2023-12-08 15:13:14 +00:00
|
|
|
NH_LOCK(tip->netindex, nh);
|
2022-09-07 11:54:20 +00:00
|
|
|
TRIE_WALK(tip->trie, subnet, &dst)
|
|
|
|
{
|
2023-12-08 15:13:14 +00:00
|
|
|
net *nc = net_find_valid(tip, nh, &subnet);
|
2022-09-07 11:54:20 +00:00
|
|
|
if (!nc)
|
|
|
|
continue;
|
2021-12-20 19:25:35 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
const rte *rc = &nc->routes->rte;
|
|
|
|
if (rt_get_source_attr(rc) != RTS_BGP)
|
2023-11-14 11:53:40 +00:00
|
|
|
return FLOWSPEC_INVALID;
|
2021-12-20 19:25:35 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
if (rta_get_first_asn(rc->attrs) != asn_b)
|
2023-11-14 11:53:40 +00:00
|
|
|
return FLOWSPEC_INVALID;
|
2022-09-07 11:54:20 +00:00
|
|
|
}
|
|
|
|
TRIE_WALK_END;
|
2021-12-20 19:25:35 +00:00
|
|
|
}
|
|
|
|
|
2022-06-08 09:47:49 +00:00
|
|
|
return FLOWSPEC_VALID;
|
2021-12-20 19:25:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* CONFIG_BGP */
|
|
|
|
|
2022-09-06 17:38:40 +00:00
|
|
|
static int
|
2023-07-03 18:38:24 +00:00
|
|
|
rt_flowspec_update_rte(rtable *tab, const rte *r, rte *new)
|
2021-12-20 19:25:35 +00:00
|
|
|
{
|
|
|
|
#ifdef CONFIG_BGP
|
2022-06-29 10:51:07 +00:00
|
|
|
if (r->generation || (rt_get_source_attr(r) != RTS_BGP))
|
2022-09-06 17:38:40 +00:00
|
|
|
return 0;
|
2022-02-11 21:29:13 +00:00
|
|
|
|
2022-06-07 10:18:23 +00:00
|
|
|
struct bgp_channel *bc = (struct bgp_channel *) SKIP_BACK(struct channel, in_req, r->sender->req);
|
2022-02-11 21:29:13 +00:00
|
|
|
if (!bc->base_table)
|
2022-09-06 17:38:40 +00:00
|
|
|
return 0;
|
2021-12-20 19:25:35 +00:00
|
|
|
|
2022-06-08 09:47:49 +00:00
|
|
|
struct bgp_proto *p = SKIP_BACK(struct bgp_proto, p, bc->c.proto);
|
|
|
|
|
|
|
|
enum flowspec_valid old = rt_get_flowspec_valid(r),
|
2022-09-06 17:38:40 +00:00
|
|
|
valid = rt_flowspec_check(bc->base_table, tab, r->net, r->attrs, p->is_interior);
|
2021-12-20 19:25:35 +00:00
|
|
|
|
2022-05-15 16:09:30 +00:00
|
|
|
if (old == valid)
|
2022-09-06 17:38:40 +00:00
|
|
|
return 0;
|
2021-12-20 19:25:35 +00:00
|
|
|
|
2022-09-06 17:38:40 +00:00
|
|
|
*new = *r;
|
|
|
|
ea_set_attr_u32(&new->attrs, &ea_gen_flowspec_valid, 0, valid);
|
|
|
|
return 1;
|
2021-12-20 19:25:35 +00:00
|
|
|
#else
|
2022-09-06 17:38:40 +00:00
|
|
|
return 0;
|
2021-12-20 19:25:35 +00:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2022-06-07 10:18:23 +00:00
|
|
|
static inline void
|
|
|
|
rt_flowspec_resolve_rte(rte *r, struct channel *c)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_BGP
|
2022-06-08 09:47:49 +00:00
|
|
|
enum flowspec_valid valid, old = rt_get_flowspec_valid(r);
|
2022-06-07 10:18:23 +00:00
|
|
|
struct bgp_channel *bc = (struct bgp_channel *) c;
|
|
|
|
|
2022-06-08 09:47:49 +00:00
|
|
|
if ( (rt_get_source_attr(r) == RTS_BGP)
|
2023-09-14 13:21:53 +00:00
|
|
|
&& (c->class == &channel_bgp)
|
2022-06-08 09:47:49 +00:00
|
|
|
&& (bc->base_table))
|
|
|
|
{
|
|
|
|
struct bgp_proto *p = SKIP_BACK(struct bgp_proto, p, bc->c.proto);
|
|
|
|
valid = rt_flowspec_check(
|
|
|
|
bc->base_table,
|
|
|
|
c->in_req.hook->table,
|
|
|
|
r->net, r->attrs, p->is_interior);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
valid = FLOWSPEC_UNKNOWN;
|
2022-06-07 10:18:23 +00:00
|
|
|
|
2022-06-08 09:47:49 +00:00
|
|
|
if (valid == old)
|
2022-06-07 10:18:23 +00:00
|
|
|
return;
|
|
|
|
|
2022-06-08 09:47:49 +00:00
|
|
|
if (valid == FLOWSPEC_UNKNOWN)
|
2022-06-08 13:31:28 +00:00
|
|
|
ea_unset_attr(&r->attrs, 0, &ea_gen_flowspec_valid);
|
2022-06-08 09:47:49 +00:00
|
|
|
else
|
2022-06-08 13:31:28 +00:00
|
|
|
ea_set_attr_u32(&r->attrs, &ea_gen_flowspec_valid, 0, valid);
|
2022-06-07 10:18:23 +00:00
|
|
|
#endif
|
|
|
|
}
|
2021-12-20 19:25:35 +00:00
|
|
|
|
2010-07-05 15:50:19 +00:00
|
|
|
static inline int
|
2023-12-08 15:13:14 +00:00
|
|
|
rt_next_hop_update_net(struct rtable_private *tab, struct netindex *ni, net *n)
|
2010-07-05 15:50:19 +00:00
|
|
|
{
|
2022-09-06 17:38:40 +00:00
|
|
|
uint count = 0;
|
2023-12-08 15:13:14 +00:00
|
|
|
int is_flow = net_val_match(tab->addr_type, NB_FLOW);
|
2010-07-05 15:50:19 +00:00
|
|
|
|
2021-02-25 20:52:49 +00:00
|
|
|
struct rte_storage *old_best = n->routes;
|
2010-07-05 15:50:19 +00:00
|
|
|
if (!old_best)
|
|
|
|
return 0;
|
|
|
|
|
2021-02-25 20:52:49 +00:00
|
|
|
for (struct rte_storage *e, **k = &n->routes; e = *k; k = &e->next)
|
2022-09-06 17:38:40 +00:00
|
|
|
count++;
|
2021-12-20 19:25:35 +00:00
|
|
|
|
2021-02-25 20:52:49 +00:00
|
|
|
if (!count)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
struct rte_multiupdate {
|
2022-09-06 17:38:40 +00:00
|
|
|
struct rte_storage *old, *new_stored;
|
|
|
|
rte new;
|
|
|
|
} *updates = tmp_allocz(sizeof(struct rte_multiupdate) * (count+1));
|
2010-07-05 15:50:19 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
struct rt_pending_export *last_pending = n->last;
|
2022-09-06 17:38:40 +00:00
|
|
|
|
|
|
|
uint pos = 0;
|
2021-02-25 20:52:49 +00:00
|
|
|
for (struct rte_storage *e, **k = &n->routes; e = *k; k = &e->next)
|
2022-09-06 17:38:40 +00:00
|
|
|
updates[pos++].old = e;
|
2010-07-05 15:50:19 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
/* This is an exceptional place where table can be unlocked while keeping its data:
|
|
|
|
* the reason why this is safe is that NHU must be always run from the same
|
|
|
|
* thread as cleanup routines, therefore the only real problem may arise when
|
|
|
|
* some importer does a change on this particular net (destination) while NHU
|
|
|
|
* is being computed. Statistically, this should almost never happen. In such
|
|
|
|
* case, we just drop all the computed changes and do it once again.
|
|
|
|
* */
|
|
|
|
|
2022-09-06 17:38:40 +00:00
|
|
|
uint mod = 0;
|
2023-11-14 11:53:40 +00:00
|
|
|
RT_UNLOCKED_TEMPORARILY(tpub, tab)
|
|
|
|
{
|
|
|
|
/* DO NOT RETURN OR BREAK OUT OF THIS BLOCK */
|
|
|
|
|
2022-09-06 17:38:40 +00:00
|
|
|
if (is_flow)
|
|
|
|
for (uint i = 0; i < pos; i++)
|
2023-11-14 11:53:40 +00:00
|
|
|
mod += rt_flowspec_update_rte(tpub, &updates[i].old->rte, &updates[i].new);
|
2022-06-07 10:18:23 +00:00
|
|
|
|
2022-09-06 17:38:40 +00:00
|
|
|
else
|
|
|
|
for (uint i = 0; i < pos; i++)
|
|
|
|
mod += rt_next_hop_update_rte(&updates[i].old->rte, &updates[i].new);
|
|
|
|
|
2023-11-14 11:53:40 +00:00
|
|
|
}
|
2022-09-07 11:54:20 +00:00
|
|
|
|
2022-09-06 17:38:40 +00:00
|
|
|
if (!mod)
|
|
|
|
return 0;
|
2010-07-05 15:50:19 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
/* Something has changed inbetween, retry NHU. */
|
|
|
|
if (last_pending != n->last)
|
2023-12-08 15:13:14 +00:00
|
|
|
return rt_next_hop_update_net(tab, ni, n);
|
2011-12-22 12:20:29 +00:00
|
|
|
|
2022-09-06 17:38:40 +00:00
|
|
|
/* Now we reconstruct the original linked list */
|
|
|
|
struct rte_storage **nptr = &n->routes;
|
|
|
|
for (uint i = 0; i < pos; i++)
|
|
|
|
{
|
|
|
|
updates[i].old->next = NULL;
|
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
struct rte_storage *put;
|
|
|
|
if (updates[i].new.attrs)
|
2023-12-08 15:13:14 +00:00
|
|
|
put = updates[i].new_stored = rte_store(&updates[i].new, ni, tab);
|
2022-09-07 11:54:20 +00:00
|
|
|
else
|
|
|
|
put = updates[i].old;
|
|
|
|
|
2022-09-06 17:38:40 +00:00
|
|
|
*nptr = put;
|
|
|
|
nptr = &put->next;
|
|
|
|
}
|
|
|
|
*nptr = NULL;
|
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
/* Call the pre-comparison hooks */
|
|
|
|
for (uint i = 0; i < pos; i++)
|
|
|
|
if (updates[i].new_stored)
|
|
|
|
{
|
|
|
|
/* Get a new ID for the route */
|
2023-07-03 18:38:24 +00:00
|
|
|
rte *new = RTES_WRITE(updates[i].new_stored);
|
|
|
|
new->lastmod = current_time();
|
|
|
|
new->id = hmap_first_zero(&tab->id_map);
|
|
|
|
hmap_set(&tab->id_map, new->id);
|
2022-09-07 11:54:20 +00:00
|
|
|
|
|
|
|
/* Call a pre-comparison hook */
|
|
|
|
/* Not really an efficient way to compute this */
|
|
|
|
if (updates[i].old->rte.src->owner->rte_recalculate)
|
2023-07-03 18:38:24 +00:00
|
|
|
updates[i].old->rte.src->owner->rte_recalculate(tab, n, updates[i].new_stored, updates[i].old, old_best);
|
2022-09-07 11:54:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#if DEBUGGING
|
2022-09-06 17:38:40 +00:00
|
|
|
{
|
|
|
|
uint t = 0;
|
|
|
|
for (struct rte_storage *e = n->routes; e; e = e->next)
|
|
|
|
t++;
|
|
|
|
ASSERT_DIE(t == pos);
|
|
|
|
ASSERT_DIE(pos == count);
|
|
|
|
}
|
2022-09-07 11:54:20 +00:00
|
|
|
#endif
|
2011-12-22 12:20:29 +00:00
|
|
|
|
|
|
|
/* Find the new best route */
|
2021-02-25 20:52:49 +00:00
|
|
|
struct rte_storage **new_best = NULL;
|
|
|
|
for (struct rte_storage *e, **k = &n->routes; e = *k; k = &e->next)
|
2011-12-22 12:20:29 +00:00
|
|
|
{
|
2020-01-28 10:42:46 +00:00
|
|
|
if (!new_best || rte_better(&e->rte, &(*new_best)->rte))
|
2010-07-05 15:50:19 +00:00
|
|
|
new_best = k;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Relink the new best route to the first position */
|
2022-09-06 17:38:40 +00:00
|
|
|
struct rte_storage *new = *new_best;
|
2010-07-05 15:50:19 +00:00
|
|
|
if (new != n->routes)
|
|
|
|
{
|
|
|
|
*new_best = new->next;
|
|
|
|
new->next = n->routes;
|
|
|
|
n->routes = new;
|
|
|
|
}
|
|
|
|
|
2022-09-06 17:38:40 +00:00
|
|
|
uint total = 0;
|
2021-02-25 20:52:49 +00:00
|
|
|
/* Announce the changes */
|
2022-09-06 17:38:40 +00:00
|
|
|
for (uint i=0; i<count; i++)
|
2021-02-25 20:52:49 +00:00
|
|
|
{
|
2022-09-06 17:38:40 +00:00
|
|
|
if (!updates[i].new_stored)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
_Bool nb = (new->rte.src == updates[i].new.src), ob = (i == 0);
|
2021-10-06 13:10:33 +00:00
|
|
|
const char *best_indicator[2][2] = {
|
|
|
|
{ "autoupdated", "autoupdated [-best]" },
|
|
|
|
{ "autoupdated [+best]", "autoupdated [best]" }
|
|
|
|
};
|
2022-09-06 17:38:40 +00:00
|
|
|
rt_rte_trace_in(D_ROUTES, updates[i].new.sender->req, &updates[i].new, best_indicator[nb][ob]);
|
2024-02-07 16:30:43 +00:00
|
|
|
rte_announce(tab, ni, n, &updates[i].new_stored->rte, &updates[i].old->rte, &new->rte, &old_best->rte);
|
2022-09-06 17:38:40 +00:00
|
|
|
|
|
|
|
total++;
|
2021-02-25 20:52:49 +00:00
|
|
|
}
|
2015-06-08 00:20:43 +00:00
|
|
|
|
2022-09-06 17:38:40 +00:00
|
|
|
return total;
|
2010-07-05 15:50:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2022-09-09 11:52:37 +00:00
|
|
|
rt_nhu_uncork(void *_tab)
|
2010-07-05 15:50:19 +00:00
|
|
|
{
|
2022-09-07 11:54:20 +00:00
|
|
|
RT_LOCKED((rtable *) _tab, tab)
|
|
|
|
{
|
2022-09-09 11:52:37 +00:00
|
|
|
ASSERT_DIE(tab->nhu_corked);
|
2022-09-07 11:12:44 +00:00
|
|
|
ASSERT_DIE(tab->nhu_state == 0);
|
2022-09-09 11:52:37 +00:00
|
|
|
|
|
|
|
/* Reset the state */
|
2022-09-07 11:12:44 +00:00
|
|
|
tab->nhu_state = tab->nhu_corked;
|
|
|
|
tab->nhu_corked = 0;
|
|
|
|
rt_trace(tab, D_STATES, "Next hop updater uncorked");
|
2022-09-09 11:52:37 +00:00
|
|
|
|
2022-09-12 08:25:14 +00:00
|
|
|
birdloop_flag(tab->loop, RTF_NHU);
|
2022-09-07 11:12:44 +00:00
|
|
|
}
|
2022-09-09 11:52:37 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2022-09-12 08:25:14 +00:00
|
|
|
rt_next_hop_update(struct rtable_private *tab)
|
2022-09-09 11:52:37 +00:00
|
|
|
{
|
|
|
|
ASSERT_DIE(birdloop_inside(tab->loop));
|
|
|
|
|
|
|
|
if (tab->nhu_corked)
|
|
|
|
return;
|
2022-09-07 11:12:44 +00:00
|
|
|
|
|
|
|
if (!tab->nhu_state)
|
2022-09-09 11:52:37 +00:00
|
|
|
return;
|
2022-09-07 11:12:44 +00:00
|
|
|
|
|
|
|
/* Check corkedness */
|
2022-09-09 11:52:37 +00:00
|
|
|
if (rt_cork_check(tab->nhu_uncork_event))
|
2022-09-07 11:12:44 +00:00
|
|
|
{
|
|
|
|
rt_trace(tab, D_STATES, "Next hop updater corked");
|
|
|
|
if ((tab->nhu_state & NHU_RUNNING)
|
2022-09-21 16:43:44 +00:00
|
|
|
&& !EMPTY_LIST(tab->exporter.pending))
|
2022-09-26 10:09:14 +00:00
|
|
|
rt_kick_export_settle(tab);
|
2022-09-07 11:12:44 +00:00
|
|
|
|
|
|
|
tab->nhu_corked = tab->nhu_state;
|
|
|
|
tab->nhu_state = 0;
|
2022-09-12 08:25:14 +00:00
|
|
|
return;
|
2022-09-07 11:12:44 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
int max_feed = 32;
|
2010-07-05 15:50:19 +00:00
|
|
|
|
2022-09-07 11:12:44 +00:00
|
|
|
/* Initialize a new run */
|
2017-02-22 13:02:03 +00:00
|
|
|
if (tab->nhu_state == NHU_SCHEDULED)
|
2022-09-07 11:12:44 +00:00
|
|
|
{
|
2023-12-08 15:13:14 +00:00
|
|
|
tab->nhu_index = 0;
|
2022-09-07 11:12:44 +00:00
|
|
|
tab->nhu_state = NHU_RUNNING;
|
2021-12-20 19:25:35 +00:00
|
|
|
|
2022-09-07 11:12:44 +00:00
|
|
|
if (tab->flowspec_trie)
|
|
|
|
rt_flowspec_reset_trie(tab);
|
|
|
|
}
|
2010-07-05 15:50:19 +00:00
|
|
|
|
2022-09-07 11:12:44 +00:00
|
|
|
/* Walk the fib one net after another */
|
2023-12-08 15:13:14 +00:00
|
|
|
for (; tab->nhu_index < tab->routes_block_size; tab->nhu_index++)
|
2010-07-05 15:50:19 +00:00
|
|
|
{
|
2023-12-08 15:13:14 +00:00
|
|
|
net *n = &tab->routes[tab->nhu_index];
|
|
|
|
if (!n->routes)
|
|
|
|
continue;
|
|
|
|
|
2010-07-05 15:50:19 +00:00
|
|
|
if (max_feed <= 0)
|
|
|
|
{
|
2022-09-12 08:25:14 +00:00
|
|
|
birdloop_flag(tab->loop, RTF_NHU);
|
|
|
|
return;
|
2010-07-05 15:50:19 +00:00
|
|
|
}
|
2023-12-08 15:13:14 +00:00
|
|
|
|
2023-05-01 13:10:53 +00:00
|
|
|
TMP_SAVED
|
2023-12-08 15:13:14 +00:00
|
|
|
max_feed -= rt_next_hop_update_net(tab, RTE_GET_NETINDEX(&n->routes->rte), n);
|
2010-07-05 15:50:19 +00:00
|
|
|
}
|
|
|
|
|
2022-09-07 11:12:44 +00:00
|
|
|
/* Finished NHU, cleanup */
|
2022-09-01 09:17:35 +00:00
|
|
|
rt_trace(tab, D_EVENTS, "NHU done, scheduling export timer");
|
2022-09-26 10:09:14 +00:00
|
|
|
rt_kick_export_settle(tab);
|
2022-09-01 09:17:35 +00:00
|
|
|
|
2017-02-22 13:02:03 +00:00
|
|
|
/* State change:
|
|
|
|
* NHU_DIRTY -> NHU_SCHEDULED
|
|
|
|
* NHU_RUNNING -> NHU_CLEAN
|
|
|
|
*/
|
2022-09-07 11:12:44 +00:00
|
|
|
if ((tab->nhu_state &= NHU_SCHEDULED) == NHU_SCHEDULED)
|
2022-09-12 08:25:14 +00:00
|
|
|
birdloop_flag(tab->loop, RTF_NHU);
|
2010-07-05 15:50:19 +00:00
|
|
|
}
|
|
|
|
|
2022-09-01 12:21:56 +00:00
|
|
|
void
|
|
|
|
rt_new_default_table(struct symbol *s)
|
|
|
|
{
|
|
|
|
for (uint addr_type = 0; addr_type < NET_MAX; addr_type++)
|
|
|
|
if (s == new_config->def_tables[addr_type])
|
|
|
|
{
|
2023-03-09 15:34:17 +00:00
|
|
|
ASSERT_DIE(!s->table);
|
2022-09-01 12:21:56 +00:00
|
|
|
s->table = rt_new_table(s, addr_type);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
bug("Requested an unknown new default table: %s", s->name);
|
|
|
|
}
|
|
|
|
|
|
|
|
struct rtable_config *
|
|
|
|
rt_get_default_table(struct config *cf, uint addr_type)
|
|
|
|
{
|
|
|
|
struct symbol *ts = cf->def_tables[addr_type];
|
|
|
|
if (!ts)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
if (!ts->table)
|
|
|
|
rt_new_default_table(ts);
|
|
|
|
|
|
|
|
return ts->table;
|
|
|
|
}
|
2010-07-05 15:50:19 +00:00
|
|
|
|
2000-03-04 22:21:06 +00:00
|
|
|
struct rtable_config *
|
2015-11-05 11:48:52 +00:00
|
|
|
rt_new_table(struct symbol *s, uint addr_type)
|
2000-03-04 22:21:06 +00:00
|
|
|
{
|
2023-03-09 15:34:17 +00:00
|
|
|
if (s->table)
|
|
|
|
cf_error("Duplicate configuration of table %s", s->name);
|
|
|
|
|
2000-03-04 22:21:06 +00:00
|
|
|
struct rtable_config *c = cfg_allocz(sizeof(struct rtable_config));
|
|
|
|
|
2022-09-01 12:21:56 +00:00
|
|
|
if (s == new_config->def_tables[addr_type])
|
|
|
|
s->table = c;
|
|
|
|
else
|
2023-10-27 16:29:31 +00:00
|
|
|
cf_define_symbol(new_config, s, SYM_TABLE, table, c);
|
2022-09-01 12:21:56 +00:00
|
|
|
|
2000-03-04 22:21:06 +00:00
|
|
|
c->name = s->name;
|
2015-11-05 11:48:52 +00:00
|
|
|
c->addr_type = addr_type;
|
2022-06-04 15:34:57 +00:00
|
|
|
c->gc_threshold = 1000;
|
|
|
|
c->gc_period = (uint) -1; /* set in rt_postconfig() */
|
2023-01-19 09:56:16 +00:00
|
|
|
c->cork_threshold.low = 1024;
|
|
|
|
c->cork_threshold.high = 8192;
|
2022-09-21 16:43:44 +00:00
|
|
|
c->export_settle = (struct settle_config) {
|
|
|
|
.min = 1 MS,
|
|
|
|
.max = 100 MS,
|
|
|
|
};
|
2022-09-26 10:09:14 +00:00
|
|
|
c->export_rr_settle = (struct settle_config) {
|
|
|
|
.min = 100 MS,
|
|
|
|
.max = 3 S,
|
|
|
|
};
|
2023-12-07 13:38:05 +00:00
|
|
|
c->debug = new_config->table_default_debug;
|
2016-01-26 10:48:58 +00:00
|
|
|
|
|
|
|
add_tail(&new_config->tables, &c->n);
|
|
|
|
|
|
|
|
/* First table of each type is kept as default */
|
|
|
|
if (! new_config->def_tables[addr_type])
|
2022-09-01 12:21:56 +00:00
|
|
|
new_config->def_tables[addr_type] = s;
|
2016-01-26 10:48:58 +00:00
|
|
|
|
2000-03-04 22:21:06 +00:00
|
|
|
return c;
|
|
|
|
}
|
|
|
|
|
2000-06-01 17:12:19 +00:00
|
|
|
/**
|
|
|
|
* rt_lock_table - lock a routing table
|
|
|
|
* @r: routing table to be locked
|
|
|
|
*
|
|
|
|
* Lock a routing table, because it's in use by a protocol,
|
|
|
|
* preventing it from being freed when it gets undefined in a new
|
|
|
|
* configuration.
|
|
|
|
*/
|
2022-09-07 11:54:20 +00:00
|
|
|
void
|
|
|
|
rt_lock_table_priv(struct rtable_private *r, const char *file, uint line)
|
1999-05-17 20:14:52 +00:00
|
|
|
{
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_trace(r, D_STATES, "Locked at %s:%d", file, line);
|
|
|
|
r->use_count++;
|
2000-01-16 16:44:50 +00:00
|
|
|
}
|
|
|
|
|
2000-06-01 17:12:19 +00:00
|
|
|
/**
|
|
|
|
* rt_unlock_table - unlock a routing table
|
|
|
|
* @r: routing table to be unlocked
|
|
|
|
*
|
|
|
|
* Unlock a routing table formerly locked by rt_lock_table(),
|
|
|
|
* that is decrease its use count and delete it if it's scheduled
|
|
|
|
* for deletion by configuration changes.
|
|
|
|
*/
|
2022-09-07 11:54:20 +00:00
|
|
|
void
|
|
|
|
rt_unlock_table_priv(struct rtable_private *r, const char *file, uint line)
|
2000-01-16 16:44:50 +00:00
|
|
|
{
|
2022-09-07 13:06:22 +00:00
|
|
|
rt_trace(r, D_STATES, "Unlocked at %s:%d", file, line);
|
2000-01-16 16:44:50 +00:00
|
|
|
if (!--r->use_count && r->deleted)
|
2022-09-09 11:52:37 +00:00
|
|
|
/* Stop the service thread to finish this up */
|
|
|
|
ev_send(&global_event_list, ev_new_init(r->rp, rt_shutdown, r));
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
rt_shutdown(void *tab_)
|
|
|
|
{
|
|
|
|
struct rtable_private *r = tab_;
|
|
|
|
birdloop_stop(r->loop, rt_delete, r);
|
2022-09-07 11:54:20 +00:00
|
|
|
}
|
2021-03-30 16:51:31 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
static void
|
|
|
|
rt_delete(void *tab_)
|
|
|
|
{
|
2023-04-21 13:26:06 +00:00
|
|
|
ASSERT_DIE(birdloop_inside(&main_birdloop));
|
2022-09-09 11:52:37 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
/* We assume that nobody holds the table reference now as use_count is zero.
|
|
|
|
* Anyway the last holder may still hold the lock. Therefore we lock and
|
|
|
|
* unlock it the last time to be sure that nobody is there. */
|
2023-11-14 11:53:40 +00:00
|
|
|
struct rtable_private *tab = RT_LOCK_SIMPLE((rtable *) tab_);
|
2022-09-07 11:54:20 +00:00
|
|
|
struct config *conf = tab->deleted;
|
2023-04-21 13:26:06 +00:00
|
|
|
DOMAIN(rtable) dom = tab->lock;
|
2022-09-07 11:54:20 +00:00
|
|
|
|
2023-11-14 11:53:40 +00:00
|
|
|
RT_UNLOCK_SIMPLE(RT_PUB(tab));
|
2022-09-07 11:54:20 +00:00
|
|
|
|
2023-04-22 19:20:19 +00:00
|
|
|
/* Everything is freed by freeing the loop */
|
2023-02-24 08:13:35 +00:00
|
|
|
birdloop_free(tab->loop);
|
2022-09-07 11:54:20 +00:00
|
|
|
config_del_obstacle(conf);
|
2022-09-09 11:52:37 +00:00
|
|
|
|
2023-04-21 13:26:06 +00:00
|
|
|
/* Also drop the domain */
|
|
|
|
DOMAIN_FREE(rtable, dom);
|
2000-01-16 16:44:50 +00:00
|
|
|
}
|
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
|
2022-07-28 11:50:59 +00:00
|
|
|
static void
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_check_cork_low(struct rtable_private *tab)
|
2022-07-28 11:50:59 +00:00
|
|
|
{
|
|
|
|
if (!tab->cork_active)
|
|
|
|
return;
|
|
|
|
|
2022-10-06 15:51:32 +00:00
|
|
|
if (tab->deleted || !tab->exporter.first || (tab->exporter.first->seq + tab->cork_threshold.low > tab->exporter.next_seq))
|
2022-07-28 11:50:59 +00:00
|
|
|
{
|
|
|
|
tab->cork_active = 0;
|
|
|
|
rt_cork_release();
|
|
|
|
|
2022-08-30 17:40:58 +00:00
|
|
|
rt_trace(tab, D_STATES, "Uncorked");
|
2022-07-28 11:50:59 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_check_cork_high(struct rtable_private *tab)
|
2022-07-28 11:50:59 +00:00
|
|
|
{
|
2022-10-06 15:51:32 +00:00
|
|
|
if (!tab->deleted && !tab->cork_active && tab->exporter.first && (tab->exporter.first->seq + tab->cork_threshold.high <= tab->exporter.next_seq))
|
2022-07-28 11:50:59 +00:00
|
|
|
{
|
|
|
|
tab->cork_active = 1;
|
|
|
|
rt_cork_acquire();
|
2023-01-19 09:56:16 +00:00
|
|
|
rt_export_used(&tab->exporter, tab->name, "corked");
|
2022-07-28 11:50:59 +00:00
|
|
|
|
2022-08-30 17:40:58 +00:00
|
|
|
rt_trace(tab, D_STATES, "Corked");
|
2022-07-28 11:50:59 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2021-12-22 03:32:26 +00:00
|
|
|
static int
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_reconfigure(struct rtable_private *tab, struct rtable_config *new, struct rtable_config *old)
|
2021-12-22 03:32:26 +00:00
|
|
|
{
|
|
|
|
if ((new->addr_type != old->addr_type) ||
|
|
|
|
(new->sorted != old->sorted) ||
|
|
|
|
(new->trie_used != old->trie_used))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
DBG("\t%s: same\n", new->name);
|
2022-09-07 11:54:20 +00:00
|
|
|
new->table = RT_PUB(tab);
|
2021-12-22 03:32:26 +00:00
|
|
|
tab->name = new->name;
|
|
|
|
tab->config = new;
|
2023-12-07 13:38:05 +00:00
|
|
|
tab->debug = new->debug;
|
2021-12-22 03:32:26 +00:00
|
|
|
|
2022-08-31 12:01:59 +00:00
|
|
|
if (tab->hostcache)
|
|
|
|
tab->hostcache->req.trace_routes = new->debug;
|
|
|
|
|
2024-02-09 16:02:44 +00:00
|
|
|
struct rt_export_hook *hook; node *n;
|
|
|
|
WALK_LIST2(hook, n, tab->exporter.hooks, n)
|
|
|
|
if (hook->req->export_one == rt_flowspec_export_one)
|
|
|
|
hook->req->trace_routes = new->debug;
|
2022-08-31 14:04:36 +00:00
|
|
|
|
2022-07-28 11:50:59 +00:00
|
|
|
tab->cork_threshold = new->cork_threshold;
|
|
|
|
|
|
|
|
if (new->cork_threshold.high != old->cork_threshold.high)
|
|
|
|
rt_check_cork_high(tab);
|
|
|
|
|
|
|
|
if (new->cork_threshold.low != old->cork_threshold.low)
|
|
|
|
rt_check_cork_low(tab);
|
|
|
|
|
2021-12-22 03:32:26 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2018-03-18 12:48:47 +00:00
|
|
|
static struct rtable_config *
|
|
|
|
rt_find_table_config(struct config *cf, char *name)
|
|
|
|
{
|
|
|
|
struct symbol *sym = cf_find_symbol(cf, name);
|
2019-02-15 12:53:17 +00:00
|
|
|
return (sym && (sym->class == SYM_TABLE)) ? sym->table : NULL;
|
2018-03-18 12:48:47 +00:00
|
|
|
}
|
|
|
|
|
2000-06-01 17:12:19 +00:00
|
|
|
/**
|
|
|
|
* rt_commit - commit new routing table configuration
|
|
|
|
* @new: new configuration
|
|
|
|
* @old: original configuration or %NULL if it's boot time config
|
|
|
|
*
|
|
|
|
* Scan differences between @old and @new configuration and modify
|
|
|
|
* the routing tables according to these changes. If @new defines a
|
|
|
|
* previously unknown table, create it, if it omits a table existing
|
|
|
|
* in @old, schedule it for deletion (it gets deleted when all protocols
|
|
|
|
* disconnect from it by calling rt_unlock_table()), if it exists
|
|
|
|
* in both configurations, leave it unchanged.
|
|
|
|
*/
|
2000-01-16 16:44:50 +00:00
|
|
|
void
|
|
|
|
rt_commit(struct config *new, struct config *old)
|
|
|
|
{
|
|
|
|
struct rtable_config *o, *r;
|
1999-05-17 20:14:52 +00:00
|
|
|
|
2000-01-16 16:44:50 +00:00
|
|
|
DBG("rt_commit:\n");
|
|
|
|
if (old)
|
1999-05-17 20:14:52 +00:00
|
|
|
{
|
2000-01-16 16:44:50 +00:00
|
|
|
WALK_LIST(o, old->tables)
|
2023-11-14 11:53:40 +00:00
|
|
|
RT_LOCKED(o->table, tab)
|
2000-01-16 16:44:50 +00:00
|
|
|
{
|
2021-12-22 03:32:26 +00:00
|
|
|
if (tab->deleted)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
r = rt_find_table_config(new, o->name);
|
|
|
|
if (r && !new->shutdown && rt_reconfigure(tab, r, o))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
DBG("\t%s: deleted\n", o->name);
|
|
|
|
tab->deleted = old;
|
|
|
|
config_add_obstacle(old);
|
|
|
|
rt_lock_table(tab);
|
2022-08-31 12:01:59 +00:00
|
|
|
|
2022-10-06 15:51:32 +00:00
|
|
|
rt_check_cork_low(tab);
|
2022-09-07 11:54:20 +00:00
|
|
|
|
2023-03-06 12:16:12 +00:00
|
|
|
if (tab->hostcache && ev_get_list(&tab->hostcache->update) == &rt_cork.queue)
|
|
|
|
ev_postpone(&tab->hostcache->update);
|
|
|
|
|
|
|
|
/* Force one more loop run */
|
|
|
|
birdloop_flag(tab->loop, RTF_DELETE);
|
2000-01-16 16:44:50 +00:00
|
|
|
}
|
1999-05-17 20:14:52 +00:00
|
|
|
}
|
2000-01-16 16:44:50 +00:00
|
|
|
|
|
|
|
WALK_LIST(r, new->tables)
|
|
|
|
if (!r->table)
|
|
|
|
{
|
2021-03-30 16:51:31 +00:00
|
|
|
r->table = rt_setup(rt_table_pool, r);
|
2000-01-16 16:44:50 +00:00
|
|
|
DBG("\t%s: created\n", r->name);
|
2021-03-30 16:51:31 +00:00
|
|
|
add_tail(&routing_tables, &r->table->n);
|
2000-01-16 16:44:50 +00:00
|
|
|
}
|
|
|
|
DBG("\tdone\n");
|
1999-05-17 20:14:52 +00:00
|
|
|
}
|
1999-12-01 15:10:21 +00:00
|
|
|
|
2022-07-15 12:57:02 +00:00
|
|
|
static void
|
|
|
|
rt_feed_done(struct rt_export_hook *c)
|
|
|
|
{
|
2022-09-05 04:58:42 +00:00
|
|
|
c->event.hook = rt_export_hook;
|
2022-07-15 12:57:02 +00:00
|
|
|
|
2023-08-15 10:31:28 +00:00
|
|
|
rt_set_export_state(c, BIT32_ALL(TES_FEEDING), TES_READY);
|
2022-07-15 12:57:02 +00:00
|
|
|
|
2022-07-18 10:33:00 +00:00
|
|
|
rt_send_export_event(c);
|
2022-07-15 12:57:02 +00:00
|
|
|
}
|
|
|
|
|
2022-09-07 18:26:20 +00:00
|
|
|
typedef struct {
|
|
|
|
uint cnt, pos;
|
|
|
|
union {
|
|
|
|
struct rt_pending_export *rpe;
|
|
|
|
struct {
|
2023-03-30 09:37:16 +00:00
|
|
|
const rte **feed;
|
2023-03-31 08:46:17 +00:00
|
|
|
struct rt_feed_block_aux {
|
|
|
|
struct rt_pending_export *first, *last;
|
|
|
|
uint start;
|
|
|
|
} *aux;
|
2022-09-07 18:26:20 +00:00
|
|
|
};
|
|
|
|
};
|
|
|
|
} rt_feed_block;
|
|
|
|
|
|
|
|
static int
|
2024-02-09 16:02:44 +00:00
|
|
|
rt_prepare_feed(struct rt_export_hook *c, net *n, rt_feed_block *b)
|
2022-09-07 18:26:20 +00:00
|
|
|
{
|
2024-02-09 16:02:44 +00:00
|
|
|
struct rt_export_request *req = c->req;
|
2023-09-24 09:47:24 +00:00
|
|
|
uint bs = req->feed_block_size ?: 16384;
|
2023-05-07 21:04:47 +00:00
|
|
|
|
2022-09-07 18:26:20 +00:00
|
|
|
if (n->routes)
|
|
|
|
{
|
2023-09-24 09:47:24 +00:00
|
|
|
if (req->export_bulk)
|
2022-09-07 18:26:20 +00:00
|
|
|
{
|
|
|
|
uint cnt = rte_feed_count(n);
|
2023-05-07 21:04:47 +00:00
|
|
|
if (b->cnt && (b->cnt + cnt > bs))
|
2022-09-07 18:26:20 +00:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (!b->cnt)
|
|
|
|
{
|
2023-05-07 21:04:47 +00:00
|
|
|
b->feed = tmp_alloc(sizeof(rte *) * MAX(bs, cnt));
|
2023-03-31 08:46:17 +00:00
|
|
|
|
2023-05-07 21:04:47 +00:00
|
|
|
uint aux_block_size = (cnt >= bs) ? 2 : (bs + 2 - cnt);
|
2023-03-31 08:46:17 +00:00
|
|
|
b->aux = tmp_alloc(sizeof(struct rt_feed_block_aux) * aux_block_size);
|
2022-09-07 18:26:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
rte_feed_obtain(n, &b->feed[b->cnt], cnt);
|
2023-03-31 08:46:17 +00:00
|
|
|
|
|
|
|
b->aux[b->pos++] = (struct rt_feed_block_aux) {
|
|
|
|
.start = b->cnt,
|
|
|
|
.first = n->first,
|
|
|
|
.last = n->last,
|
|
|
|
};
|
|
|
|
|
2022-09-07 18:26:20 +00:00
|
|
|
b->cnt += cnt;
|
|
|
|
}
|
2023-05-07 21:04:47 +00:00
|
|
|
else if (b->pos == bs)
|
2022-09-07 18:26:20 +00:00
|
|
|
return 0;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (!b->pos)
|
2023-05-07 21:04:47 +00:00
|
|
|
b->rpe = tmp_alloc(sizeof(struct rt_pending_export) * bs);
|
2022-09-07 18:26:20 +00:00
|
|
|
|
2024-02-07 16:30:43 +00:00
|
|
|
const rte *new = RTE_OR_NULL(n->routes);
|
|
|
|
b->rpe[b->pos++] = (struct rt_pending_export) { .new = new, .new_best = new, };
|
2022-09-07 18:26:20 +00:00
|
|
|
}
|
|
|
|
}
|
2023-09-24 09:47:24 +00:00
|
|
|
else
|
|
|
|
if (req->mark_seen)
|
|
|
|
RPE_WALK(n->first, rpe, NULL)
|
|
|
|
req->mark_seen(req, rpe);
|
|
|
|
else
|
|
|
|
RPE_WALK(n->first, rpe, NULL)
|
2024-02-09 16:02:44 +00:00
|
|
|
rpe_mark_seen(c, rpe);
|
2022-09-07 18:26:20 +00:00
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2024-02-09 16:02:44 +00:00
|
|
|
rt_process_feed(struct rt_export_hook *c, rt_feed_block *b)
|
2022-09-07 18:26:20 +00:00
|
|
|
{
|
|
|
|
if (!b->pos)
|
|
|
|
return;
|
|
|
|
|
2024-02-09 16:02:44 +00:00
|
|
|
if (c->req->export_bulk)
|
2022-09-07 18:26:20 +00:00
|
|
|
{
|
2023-03-31 08:46:17 +00:00
|
|
|
b->aux[b->pos].start = b->cnt;
|
2022-09-07 18:26:20 +00:00
|
|
|
for (uint p = 0; p < b->pos; p++)
|
|
|
|
{
|
2023-03-31 08:46:17 +00:00
|
|
|
struct rt_feed_block_aux *aux = &b->aux[p];
|
|
|
|
const rte **feed = &b->feed[aux->start];
|
|
|
|
|
2024-02-09 16:02:44 +00:00
|
|
|
c->req->export_bulk(c->req, feed[0]->net, aux->first, aux->last, feed, (aux+1)->start - aux->start);
|
2022-09-07 18:26:20 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
for (uint p = 0; p < b->pos; p++)
|
2024-02-09 16:02:44 +00:00
|
|
|
c->req->export_one(c->req, b->rpe[p].new->net, &b->rpe[p]);
|
2022-09-07 18:26:20 +00:00
|
|
|
}
|
|
|
|
|
2000-06-01 17:12:19 +00:00
|
|
|
/**
|
2022-06-22 10:45:42 +00:00
|
|
|
* rt_feed_by_fib - advertise all routes to a channel by walking a fib
|
2016-01-26 10:48:58 +00:00
|
|
|
* @c: channel to be fed
|
2000-06-01 17:12:19 +00:00
|
|
|
*
|
2016-01-26 10:48:58 +00:00
|
|
|
* This function performs one pass of advertisement of routes to a channel that
|
|
|
|
* is in the ES_FEEDING state. It is called by the protocol code as long as it
|
|
|
|
* has something to do. (We avoid transferring all the routes in single pass in
|
|
|
|
* order not to monopolize CPU time.)
|
2000-06-01 17:12:19 +00:00
|
|
|
*/
|
2021-06-21 15:07:31 +00:00
|
|
|
static void
|
2022-06-22 10:45:42 +00:00
|
|
|
rt_feed_by_fib(void *data)
|
2000-05-19 10:46:26 +00:00
|
|
|
{
|
2024-02-09 16:02:44 +00:00
|
|
|
struct rt_export_hook *c = data;
|
2022-09-07 18:26:20 +00:00
|
|
|
rt_feed_block block = {};
|
2000-05-19 10:46:26 +00:00
|
|
|
|
2023-11-14 11:53:40 +00:00
|
|
|
_Bool done = 1;
|
|
|
|
|
2024-02-09 16:02:44 +00:00
|
|
|
ASSERT(atomic_load_explicit(&c->export_state, memory_order_relaxed) == TES_FEEDING);
|
2000-05-19 10:46:26 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
RT_LOCKED(RT_PUB(SKIP_BACK(struct rtable_private, exporter, c->table)), tab)
|
|
|
|
{
|
2022-06-20 19:29:10 +00:00
|
|
|
|
2023-12-08 15:13:14 +00:00
|
|
|
for (; c->feed_index < tab->routes_block_size; c->feed_index++)
|
2000-05-19 10:46:26 +00:00
|
|
|
{
|
2023-12-08 15:13:14 +00:00
|
|
|
net *n = &tab->routes[c->feed_index];
|
2024-01-30 20:29:00 +00:00
|
|
|
const net_addr *a;
|
|
|
|
if (n->routes)
|
|
|
|
a = n->routes->rte.net;
|
|
|
|
else if (!n->first)
|
2023-12-08 15:13:14 +00:00
|
|
|
continue;
|
2024-01-30 20:29:00 +00:00
|
|
|
else if (n->first->old)
|
2024-02-07 16:30:43 +00:00
|
|
|
a = n->first->old->net;
|
2024-01-30 20:29:00 +00:00
|
|
|
else
|
2024-02-07 16:30:43 +00:00
|
|
|
a = n->first->new->net;
|
2023-12-08 15:13:14 +00:00
|
|
|
|
2024-02-09 16:02:44 +00:00
|
|
|
if (rt_prefilter_net(&c->req->prefilter, a))
|
2022-09-07 18:26:20 +00:00
|
|
|
{
|
|
|
|
if (!rt_prepare_feed(c, n, &block))
|
2000-05-19 10:59:47 +00:00
|
|
|
{
|
2023-11-14 11:53:40 +00:00
|
|
|
done = 0;
|
|
|
|
break;
|
2000-05-19 10:59:47 +00:00
|
|
|
}
|
2022-09-07 18:26:20 +00:00
|
|
|
}
|
2023-10-04 09:03:29 +00:00
|
|
|
else
|
2024-02-09 16:02:44 +00:00
|
|
|
req_trace(c->req, D_ROUTES, "Feeding %N rejected by prefilter", a);
|
2022-06-22 10:45:42 +00:00
|
|
|
}
|
2022-09-07 11:54:20 +00:00
|
|
|
}
|
2022-06-22 10:45:42 +00:00
|
|
|
|
2022-09-07 18:26:20 +00:00
|
|
|
rt_process_feed(c, &block);
|
2023-11-14 11:53:40 +00:00
|
|
|
|
|
|
|
if (done)
|
2024-02-09 16:02:44 +00:00
|
|
|
rt_feed_done(c);
|
2023-11-14 11:53:40 +00:00
|
|
|
else
|
2024-02-09 16:02:44 +00:00
|
|
|
rt_send_export_event(c);
|
2022-06-22 10:45:42 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
rt_feed_by_trie(void *data)
|
|
|
|
{
|
2024-02-09 16:02:44 +00:00
|
|
|
struct rt_export_hook *c = data;
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_feed_block block = {};
|
|
|
|
|
|
|
|
RT_LOCKED(RT_PUB(SKIP_BACK(struct rtable_private, exporter, c->table)), tab)
|
|
|
|
{
|
2022-06-22 10:45:42 +00:00
|
|
|
|
|
|
|
ASSERT_DIE(c->walk_state);
|
|
|
|
struct f_trie_walk_state *ws = c->walk_state;
|
|
|
|
|
2024-02-09 16:02:44 +00:00
|
|
|
ASSERT(atomic_load_explicit(&c->export_state, memory_order_relaxed) == TES_FEEDING);
|
2022-06-22 10:45:42 +00:00
|
|
|
|
2022-09-07 18:26:20 +00:00
|
|
|
do {
|
|
|
|
if (!c->walk_last.type)
|
|
|
|
continue;
|
|
|
|
|
2023-12-08 15:13:14 +00:00
|
|
|
const struct netindex *i = net_find_index(tab->netindex, &c->walk_last);
|
|
|
|
net *n = i ? net_find(tab, i) : NULL;
|
2022-06-22 10:45:42 +00:00
|
|
|
if (!n)
|
|
|
|
continue;
|
|
|
|
|
2022-09-07 18:26:20 +00:00
|
|
|
if (!rt_prepare_feed(c, n, &block))
|
2023-11-14 11:53:40 +00:00
|
|
|
return
|
|
|
|
rt_process_feed(c, &block),
|
2024-02-09 16:02:44 +00:00
|
|
|
rt_send_export_event(c);
|
2022-06-22 10:45:42 +00:00
|
|
|
}
|
2022-09-07 18:26:20 +00:00
|
|
|
while (trie_walk_next(ws, &c->walk_last));
|
2015-05-31 09:29:53 +00:00
|
|
|
|
2022-06-22 10:45:42 +00:00
|
|
|
rt_unlock_trie(tab, c->walk_lock);
|
|
|
|
c->walk_lock = NULL;
|
|
|
|
|
|
|
|
mb_free(c->walk_state);
|
|
|
|
c->walk_state = NULL;
|
|
|
|
|
2022-09-07 18:26:20 +00:00
|
|
|
c->walk_last.type = 0;
|
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
rt_process_feed(c, &block);
|
2024-02-09 16:02:44 +00:00
|
|
|
rt_feed_done(c);
|
2022-06-22 10:45:42 +00:00
|
|
|
}
|
|
|
|
|
2022-06-27 17:53:06 +00:00
|
|
|
static void
|
|
|
|
rt_feed_equal(void *data)
|
|
|
|
{
|
2024-02-09 16:02:44 +00:00
|
|
|
struct rt_export_hook *c = data;
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_feed_block block = {};
|
|
|
|
net *n;
|
2022-06-27 17:53:06 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
RT_LOCKED(RT_PUB(SKIP_BACK(struct rtable_private, exporter, c->table)), tab)
|
|
|
|
{
|
2024-02-09 16:02:44 +00:00
|
|
|
ASSERT_DIE(atomic_load_explicit(&c->export_state, memory_order_relaxed) == TES_FEEDING);
|
|
|
|
ASSERT_DIE(c->req->prefilter.mode == TE_ADDR_EQUAL);
|
2022-06-27 17:53:06 +00:00
|
|
|
|
2024-02-09 16:02:44 +00:00
|
|
|
const struct netindex *i = net_find_index(tab->netindex, c->req->prefilter.addr);
|
2023-12-08 15:13:14 +00:00
|
|
|
if (i && (n = net_find(tab, i)))
|
2022-09-07 11:54:20 +00:00
|
|
|
ASSERT_DIE(rt_prepare_feed(c, n, &block));
|
|
|
|
}
|
2022-09-07 18:26:20 +00:00
|
|
|
|
2022-06-27 17:53:06 +00:00
|
|
|
if (n)
|
2022-09-07 18:26:20 +00:00
|
|
|
rt_process_feed(c, &block);
|
2022-06-27 17:53:06 +00:00
|
|
|
|
2024-02-09 16:02:44 +00:00
|
|
|
rt_feed_done(c);
|
2022-06-27 17:53:06 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
rt_feed_for(void *data)
|
|
|
|
{
|
2024-02-09 16:02:44 +00:00
|
|
|
struct rt_export_hook *c = data;
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_feed_block block = {};
|
|
|
|
net *n;
|
2022-06-27 17:53:06 +00:00
|
|
|
|
2022-09-07 11:54:20 +00:00
|
|
|
RT_LOCKED(RT_PUB(SKIP_BACK(struct rtable_private, exporter, c->table)), tab)
|
|
|
|
{
|
2024-02-09 16:02:44 +00:00
|
|
|
ASSERT_DIE(atomic_load_explicit(&c->export_state, memory_order_relaxed) == TES_FEEDING);
|
|
|
|
ASSERT_DIE(c->req->prefilter.mode == TE_ADDR_FOR);
|
2022-06-27 17:53:06 +00:00
|
|
|
|
2024-02-09 16:02:44 +00:00
|
|
|
if (n = net_route(tab, c->req->prefilter.addr))
|
2022-09-07 11:54:20 +00:00
|
|
|
ASSERT_DIE(rt_prepare_feed(c, n, &block));
|
|
|
|
}
|
2022-09-07 18:26:20 +00:00
|
|
|
|
2022-06-27 17:53:06 +00:00
|
|
|
if (n)
|
2022-09-07 18:26:20 +00:00
|
|
|
rt_process_feed(c, &block);
|
2000-05-19 10:46:26 +00:00
|
|
|
|
2024-02-09 16:02:44 +00:00
|
|
|
rt_feed_done(c);
|
2022-07-15 12:57:02 +00:00
|
|
|
}
|
2018-09-27 20:57:55 +00:00
|
|
|
|
2022-09-07 18:26:20 +00:00
|
|
|
|
2019-08-13 16:22:07 +00:00
|
|
|
/*
|
|
|
|
* Import table
|
|
|
|
*/
|
|
|
|
|
2023-03-31 08:46:17 +00:00
|
|
|
void channel_reload_export_bulk(struct rt_export_request *req, const net_addr *net,
|
|
|
|
struct rt_pending_export *first, struct rt_pending_export *last,
|
|
|
|
const rte **feed, uint count)
|
2018-09-27 20:57:55 +00:00
|
|
|
{
|
2022-06-16 21:24:56 +00:00
|
|
|
struct channel *c = SKIP_BACK(struct channel, reload_req, req);
|
2018-09-27 20:57:55 +00:00
|
|
|
|
2022-06-16 21:24:56 +00:00
|
|
|
for (uint i=0; i<count; i++)
|
|
|
|
if (feed[i]->sender == c->in_req.hook)
|
2018-09-27 20:57:55 +00:00
|
|
|
{
|
2023-03-08 20:38:18 +00:00
|
|
|
/* Strip the table-specific information */
|
|
|
|
rte new = rte_init_from(feed[i]);
|
|
|
|
|
2022-06-16 21:24:56 +00:00
|
|
|
/* Strip the later attribute layers */
|
|
|
|
while (new.attrs->next)
|
|
|
|
new.attrs = new.attrs->next;
|
2019-08-26 19:53:56 +00:00
|
|
|
|
2022-06-16 21:24:56 +00:00
|
|
|
/* And reload the route */
|
|
|
|
rte_update(c, net, &new, new.src);
|
2018-09-27 20:57:55 +00:00
|
|
|
}
|
2023-03-31 08:46:17 +00:00
|
|
|
|
|
|
|
rpe_mark_seen_all(req->hook, first, last, NULL);
|
2018-09-27 20:57:55 +00:00
|
|
|
}
|
|
|
|
|
2019-08-13 16:22:07 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Hostcache
|
|
|
|
*/
|
|
|
|
|
2015-12-24 14:52:03 +00:00
|
|
|
static inline u32
|
2010-07-26 14:39:27 +00:00
|
|
|
hc_hash(ip_addr a, rtable *dep)
|
|
|
|
{
|
2015-12-24 14:52:03 +00:00
|
|
|
return ipa_hash(a) ^ ptr_hash(dep);
|
2010-07-26 14:39:27 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline void
|
|
|
|
hc_insert(struct hostcache *hc, struct hostentry *he)
|
|
|
|
{
|
2015-05-19 06:53:34 +00:00
|
|
|
uint k = he->hash_key >> hc->hash_shift;
|
2010-07-26 14:39:27 +00:00
|
|
|
he->next = hc->hash_table[k];
|
|
|
|
hc->hash_table[k] = he;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void
|
|
|
|
hc_remove(struct hostcache *hc, struct hostentry *he)
|
|
|
|
{
|
|
|
|
struct hostentry **hep;
|
2015-05-19 06:53:34 +00:00
|
|
|
uint k = he->hash_key >> hc->hash_shift;
|
2010-07-26 14:39:27 +00:00
|
|
|
|
|
|
|
for (hep = &hc->hash_table[k]; *hep != he; hep = &(*hep)->next);
|
|
|
|
*hep = he->next;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define HC_DEF_ORDER 10
|
|
|
|
#define HC_HI_MARK *4
|
|
|
|
#define HC_HI_STEP 2
|
|
|
|
#define HC_HI_ORDER 16 /* Must be at most 16 */
|
|
|
|
#define HC_LO_MARK /5
|
|
|
|
#define HC_LO_STEP 2
|
|
|
|
#define HC_LO_ORDER 10
|
|
|
|
|
|
|
|
static void
|
2021-03-30 16:51:31 +00:00
|
|
|
hc_alloc_table(struct hostcache *hc, pool *p, unsigned order)
|
2010-07-26 14:39:27 +00:00
|
|
|
{
|
2016-10-14 13:37:04 +00:00
|
|
|
uint hsize = 1 << order;
|
2010-07-26 14:39:27 +00:00
|
|
|
hc->hash_order = order;
|
2015-12-24 14:52:03 +00:00
|
|
|
hc->hash_shift = 32 - order;
|
2016-10-14 13:37:04 +00:00
|
|
|
hc->hash_max = (order >= HC_HI_ORDER) ? ~0U : (hsize HC_HI_MARK);
|
|
|
|
hc->hash_min = (order <= HC_LO_ORDER) ? 0U : (hsize HC_LO_MARK);
|
2010-07-26 14:39:27 +00:00
|
|
|
|
2021-03-30 16:51:31 +00:00
|
|
|
hc->hash_table = mb_allocz(p, hsize * sizeof(struct hostentry *));
|
2010-07-26 14:39:27 +00:00
|
|
|
}
|
|
|
|
|
2010-07-05 15:50:19 +00:00
|
|
|
static void
|
2021-03-30 16:51:31 +00:00
|
|
|
hc_resize(struct hostcache *hc, pool *p, unsigned new_order)
|
2010-07-05 15:50:19 +00:00
|
|
|
{
|
2010-07-26 14:39:27 +00:00
|
|
|
struct hostentry **old_table = hc->hash_table;
|
|
|
|
struct hostentry *he, *hen;
|
2016-10-14 13:37:04 +00:00
|
|
|
uint old_size = 1 << hc->hash_order;
|
|
|
|
uint i;
|
2010-07-26 14:39:27 +00:00
|
|
|
|
2021-03-30 16:51:31 +00:00
|
|
|
hc_alloc_table(hc, p, new_order);
|
2010-07-26 14:39:27 +00:00
|
|
|
for (i = 0; i < old_size; i++)
|
|
|
|
for (he = old_table[i]; he != NULL; he=hen)
|
|
|
|
{
|
|
|
|
hen = he->next;
|
|
|
|
hc_insert(hc, he);
|
|
|
|
}
|
|
|
|
mb_free(old_table);
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct hostentry *
|
2021-03-30 16:51:31 +00:00
|
|
|
hc_new_hostentry(struct hostcache *hc, pool *p, ip_addr a, ip_addr ll, rtable *dep, unsigned k)
|
2010-07-26 14:39:27 +00:00
|
|
|
{
|
|
|
|
struct hostentry *he = sl_alloc(hc->slab);
|
|
|
|
|
2017-02-24 13:05:11 +00:00
|
|
|
*he = (struct hostentry) {
|
|
|
|
.addr = a,
|
|
|
|
.link = ll,
|
|
|
|
.tab = dep,
|
|
|
|
.hash_key = k,
|
|
|
|
};
|
2010-07-26 14:39:27 +00:00
|
|
|
|
|
|
|
add_tail(&hc->hostentries, &he->ln);
|
|
|
|
hc_insert(hc, he);
|
|
|
|
|
|
|
|
hc->hash_items++;
|
|
|
|
if (hc->hash_items > hc->hash_max)
|
2021-03-30 16:51:31 +00:00
|
|
|
hc_resize(hc, p, hc->hash_order + HC_HI_STEP);
|
2010-07-26 14:39:27 +00:00
|
|
|
|
|
|
|
return he;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2021-03-30 16:51:31 +00:00
|
|
|
hc_delete_hostentry(struct hostcache *hc, pool *p, struct hostentry *he)
|
2010-07-26 14:39:27 +00:00
|
|
|
{
|
2010-12-07 22:33:55 +00:00
|
|
|
rta_free(he->src);
|
|
|
|
|
2010-07-26 14:39:27 +00:00
|
|
|
rem_node(&he->ln);
|
|
|
|
hc_remove(hc, he);
|
2022-04-04 18:31:14 +00:00
|
|
|
sl_free(he);
|
2010-07-26 14:39:27 +00:00
|
|
|
|
|
|
|
hc->hash_items--;
|
|
|
|
if (hc->hash_items < hc->hash_min)
|
2021-03-30 16:51:31 +00:00
|
|
|
hc_resize(hc, p, hc->hash_order - HC_LO_STEP);
|
2010-07-05 15:50:19 +00:00
|
|
|
}
|
|
|
|
|
2022-08-31 12:01:59 +00:00
|
|
|
static void
|
|
|
|
hc_notify_dump_req(struct rt_export_request *req)
|
|
|
|
{
|
|
|
|
debug(" Table %s (%p)\n", req->name, req);
|
|
|
|
}
|
|
|
|
|
2022-09-23 07:58:00 +00:00
|
|
|
static void
|
|
|
|
hc_notify_log_state_change(struct rt_export_request *req, u8 state)
|
|
|
|
{
|
|
|
|
struct hostcache *hc = SKIP_BACK(struct hostcache, req, req);
|
|
|
|
rt_trace((rtable *) hc->update.data, D_STATES, "HCU Export state changed to %s", rt_export_state_name(state));
|
|
|
|
}
|
|
|
|
|
2022-08-31 12:01:59 +00:00
|
|
|
static void
|
|
|
|
hc_notify_export_one(struct rt_export_request *req, const net_addr *net, struct rt_pending_export *first)
|
|
|
|
{
|
|
|
|
struct hostcache *hc = SKIP_BACK(struct hostcache, req, req);
|
|
|
|
|
2022-09-23 07:57:40 +00:00
|
|
|
RT_LOCKED((rtable *) hc->update.data, tab)
|
|
|
|
if (ev_active(&hc->update) || !trie_match_net(hc->trie, net))
|
2023-05-01 12:20:27 +00:00
|
|
|
/* No interest in this update, mark seen only */
|
2023-03-31 08:46:17 +00:00
|
|
|
rpe_mark_seen_all(req->hook, first, NULL, NULL);
|
2023-05-01 12:20:27 +00:00
|
|
|
else
|
|
|
|
{
|
|
|
|
/* This net may affect some hostentries, check the actual change */
|
2023-07-03 18:38:24 +00:00
|
|
|
const rte *o = RTE_VALID_OR_NULL(first->old_best);
|
2024-02-07 16:30:43 +00:00
|
|
|
const rte *new_best = first->new_best;
|
2022-08-31 12:01:59 +00:00
|
|
|
|
2023-05-01 12:20:27 +00:00
|
|
|
RPE_WALK(first, rpe, NULL)
|
|
|
|
{
|
|
|
|
rpe_mark_seen(req->hook, rpe);
|
|
|
|
new_best = rpe->new_best;
|
|
|
|
}
|
2022-08-31 12:01:59 +00:00
|
|
|
|
2023-05-01 12:20:27 +00:00
|
|
|
/* Yes, something has actually changed. Do the hostcache update. */
|
|
|
|
if ((o != RTE_VALID_OR_NULL(new_best))
|
|
|
|
&& (atomic_load_explicit(&req->hook->export_state, memory_order_acquire) == TES_READY)
|
2022-09-14 08:25:09 +00:00
|
|
|
&& !ev_active(&hc->update))
|
|
|
|
ev_send_loop(tab->loop, &hc->update);
|
2023-05-01 12:20:27 +00:00
|
|
|
}
|
2022-08-31 12:01:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-07-05 15:50:19 +00:00
|
|
|
static void
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_init_hostcache(struct rtable_private *tab)
|
2010-07-05 15:50:19 +00:00
|
|
|
{
|
2021-03-30 16:51:31 +00:00
|
|
|
struct hostcache *hc = mb_allocz(tab->rp, sizeof(struct hostcache));
|
2010-07-05 15:50:19 +00:00
|
|
|
init_list(&hc->hostentries);
|
2010-07-26 14:39:27 +00:00
|
|
|
|
|
|
|
hc->hash_items = 0;
|
2021-03-30 16:51:31 +00:00
|
|
|
hc_alloc_table(hc, tab->rp, HC_DEF_ORDER);
|
|
|
|
hc->slab = sl_new(tab->rp, sizeof(struct hostentry));
|
2010-07-26 14:39:27 +00:00
|
|
|
|
2022-04-04 20:34:14 +00:00
|
|
|
hc->lp = lp_new(tab->rp);
|
2020-03-26 02:57:48 +00:00
|
|
|
hc->trie = f_new_trie(hc->lp, 0);
|
2010-07-27 16:20:12 +00:00
|
|
|
|
2022-08-31 12:01:59 +00:00
|
|
|
hc->update = (event) {
|
|
|
|
.hook = rt_update_hostcache,
|
|
|
|
.data = tab,
|
|
|
|
};
|
|
|
|
|
2010-07-05 15:50:19 +00:00
|
|
|
tab->hostcache = hc;
|
2023-04-21 13:26:06 +00:00
|
|
|
|
|
|
|
ev_send_loop(tab->loop, &hc->update);
|
2010-07-05 15:50:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_free_hostcache(struct rtable_private *tab)
|
2010-07-05 15:50:19 +00:00
|
|
|
{
|
|
|
|
struct hostcache *hc = tab->hostcache;
|
|
|
|
|
|
|
|
node *n;
|
|
|
|
WALK_LIST(n, hc->hostentries)
|
|
|
|
{
|
|
|
|
struct hostentry *he = SKIP_BACK(struct hostentry, ln, n);
|
2010-12-07 22:33:55 +00:00
|
|
|
rta_free(he->src);
|
|
|
|
|
2010-07-05 15:50:19 +00:00
|
|
|
if (he->uc)
|
|
|
|
log(L_ERR "Hostcache is not empty in table %s", tab->name);
|
|
|
|
}
|
|
|
|
|
2021-03-30 16:51:31 +00:00
|
|
|
/* Freed automagically by the resource pool
|
2010-07-26 14:39:27 +00:00
|
|
|
rfree(hc->slab);
|
2010-07-27 16:20:12 +00:00
|
|
|
rfree(hc->lp);
|
2010-07-26 14:39:27 +00:00
|
|
|
mb_free(hc->hash_table);
|
2010-07-05 15:50:19 +00:00
|
|
|
mb_free(hc);
|
2021-03-30 16:51:31 +00:00
|
|
|
*/
|
2010-07-05 15:50:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
if_local_addr(ip_addr a, struct iface *i)
|
|
|
|
{
|
|
|
|
struct ifa *b;
|
|
|
|
|
|
|
|
WALK_LIST(b, i->addrs)
|
|
|
|
if (ipa_equal(a, b->ip))
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-09-28 12:17:20 +00:00
|
|
|
u32
|
2022-05-30 15:11:30 +00:00
|
|
|
rt_get_igp_metric(const rte *rt)
|
2010-07-30 23:04:32 +00:00
|
|
|
{
|
2022-05-30 10:03:03 +00:00
|
|
|
eattr *ea = ea_find(rt->attrs, "igp_metric");
|
2010-08-02 11:11:53 +00:00
|
|
|
|
|
|
|
if (ea)
|
|
|
|
return ea->u.data;
|
|
|
|
|
2022-05-04 12:41:51 +00:00
|
|
|
if (rt_get_source_attr(rt) == RTS_DEVICE)
|
2010-07-30 23:04:32 +00:00
|
|
|
return 0;
|
|
|
|
|
2021-09-27 14:40:28 +00:00
|
|
|
if (rt->src->owner->class->rte_igp_metric)
|
|
|
|
return rt->src->owner->class->rte_igp_metric(rt);
|
2021-03-20 22:18:34 +00:00
|
|
|
|
2010-07-30 23:04:32 +00:00
|
|
|
return IGP_METRIC_UNKNOWN;
|
|
|
|
}
|
|
|
|
|
2010-07-05 15:50:19 +00:00
|
|
|
static int
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_update_hostentry(struct rtable_private *tab, struct hostentry *he)
|
2010-07-05 15:50:19 +00:00
|
|
|
{
|
2022-05-30 10:03:03 +00:00
|
|
|
ea_list *old_src = he->src;
|
2018-01-29 11:49:37 +00:00
|
|
|
int direct = 0;
|
2010-07-27 16:20:12 +00:00
|
|
|
int pxlen = 0;
|
2010-07-05 15:50:19 +00:00
|
|
|
|
2015-12-24 14:52:03 +00:00
|
|
|
/* Reset the hostentry */
|
2010-12-07 22:33:55 +00:00
|
|
|
he->src = NULL;
|
2018-01-29 11:49:37 +00:00
|
|
|
he->nexthop_linkable = 0;
|
2010-12-07 22:33:55 +00:00
|
|
|
he->igp_metric = 0;
|
|
|
|
|
2015-12-24 14:52:03 +00:00
|
|
|
net_addr he_addr;
|
|
|
|
net_fill_ip_host(&he_addr, he->addr);
|
|
|
|
net *n = net_route(tab, &he_addr);
|
2010-07-30 23:04:32 +00:00
|
|
|
if (n)
|
2010-07-05 15:50:19 +00:00
|
|
|
{
|
2020-01-28 10:42:46 +00:00
|
|
|
struct rte_storage *e = n->routes;
|
2022-06-08 13:31:28 +00:00
|
|
|
ea_list *a = e->rte.attrs;
|
2022-07-12 13:05:04 +00:00
|
|
|
u32 pref = rt_get_preference(&e->rte);
|
2010-07-05 15:50:19 +00:00
|
|
|
|
2021-10-22 17:43:55 +00:00
|
|
|
for (struct rte_storage *ee = n->routes; ee; ee = ee->next)
|
2022-07-12 13:05:04 +00:00
|
|
|
if (rte_is_valid(&ee->rte) &&
|
|
|
|
(rt_get_preference(&ee->rte) >= pref) &&
|
|
|
|
ea_find(ee->rte.attrs, &ea_gen_hostentry))
|
2010-08-03 06:26:47 +00:00
|
|
|
{
|
|
|
|
/* Recursive route should not depend on another recursive route */
|
2015-11-05 11:48:52 +00:00
|
|
|
log(L_WARN "Next hop address %I resolvable through recursive route for %N",
|
2023-12-08 15:13:14 +00:00
|
|
|
he->addr, ee->rte.net);
|
2010-12-07 22:33:55 +00:00
|
|
|
goto done;
|
2010-08-03 06:26:47 +00:00
|
|
|
}
|
2010-12-07 22:33:55 +00:00
|
|
|
|
2023-12-08 15:13:14 +00:00
|
|
|
pxlen = e->rte.net->pxlen;
|
2021-10-22 17:43:55 +00:00
|
|
|
|
2022-05-30 10:03:03 +00:00
|
|
|
eattr *nhea = ea_find(a, &ea_gen_nexthop);
|
2022-05-15 16:09:30 +00:00
|
|
|
ASSERT_DIE(nhea);
|
|
|
|
struct nexthop_adata *nhad = (void *) nhea->u.ptr;
|
|
|
|
|
|
|
|
if (NEXTHOP_IS_REACHABLE(nhad))
|
|
|
|
NEXTHOP_WALK(nh, nhad)
|
2017-03-17 14:48:09 +00:00
|
|
|
if (ipa_zero(nh->gw))
|
|
|
|
{
|
|
|
|
if (if_local_addr(he->addr, nh->iface))
|
|
|
|
{
|
|
|
|
/* The host address is a local address, this is not valid */
|
|
|
|
log(L_WARN "Next hop address %I is a local address of iface %s",
|
|
|
|
he->addr, nh->iface->name);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
2018-01-29 11:49:37 +00:00
|
|
|
direct++;
|
2017-03-17 14:48:09 +00:00
|
|
|
}
|
2017-03-08 15:27:18 +00:00
|
|
|
|
2010-12-07 22:33:55 +00:00
|
|
|
he->src = rta_clone(a);
|
2018-01-29 11:49:37 +00:00
|
|
|
he->nexthop_linkable = !direct;
|
2020-01-28 10:42:46 +00:00
|
|
|
he->igp_metric = rt_get_igp_metric(&e->rte);
|
2010-07-05 15:50:19 +00:00
|
|
|
}
|
|
|
|
|
2017-03-08 15:27:18 +00:00
|
|
|
done:
|
2010-07-27 16:20:12 +00:00
|
|
|
/* Add a prefix range to the trie */
|
2015-12-24 14:52:03 +00:00
|
|
|
trie_add_prefix(tab->hostcache->trie, &he_addr, pxlen, he_addr.pxlen);
|
2010-07-27 16:20:12 +00:00
|
|
|
|
2010-12-07 22:33:55 +00:00
|
|
|
rta_free(old_src);
|
|
|
|
return old_src != he->src;
|
2010-07-05 15:50:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2022-08-31 12:01:59 +00:00
|
|
|
rt_update_hostcache(void *data)
|
2010-07-05 15:50:19 +00:00
|
|
|
{
|
2022-09-07 11:54:20 +00:00
|
|
|
rtable **nhu_pending;
|
|
|
|
|
|
|
|
RT_LOCKED((rtable *) data, tab)
|
|
|
|
{
|
2010-07-05 15:50:19 +00:00
|
|
|
struct hostcache *hc = tab->hostcache;
|
2022-08-31 12:01:59 +00:00
|
|
|
|
2023-04-21 13:26:06 +00:00
|
|
|
/* Finish initialization */
|
|
|
|
if (!hc->req.name)
|
|
|
|
{
|
|
|
|
hc->req = (struct rt_export_request) {
|
|
|
|
.name = mb_sprintf(tab->rp, "%s.hcu.notifier", tab->name),
|
|
|
|
.list = birdloop_event_list(tab->loop),
|
|
|
|
.pool = tab->rp,
|
|
|
|
.trace_routes = tab->config->debug,
|
|
|
|
.dump_req = hc_notify_dump_req,
|
|
|
|
.log_state_change = hc_notify_log_state_change,
|
|
|
|
.export_one = hc_notify_export_one,
|
|
|
|
};
|
|
|
|
|
|
|
|
rt_table_export_start_locked(tab, &hc->req);
|
|
|
|
}
|
|
|
|
|
2022-09-14 08:25:09 +00:00
|
|
|
/* Shutdown shortcut */
|
|
|
|
if (!hc->req.hook)
|
2023-11-14 11:53:40 +00:00
|
|
|
return;
|
2022-09-14 08:25:09 +00:00
|
|
|
|
2022-08-31 12:01:59 +00:00
|
|
|
if (rt_cork_check(&hc->update))
|
|
|
|
{
|
|
|
|
rt_trace(tab, D_STATES, "Hostcache update corked");
|
2023-11-14 11:53:40 +00:00
|
|
|
return;
|
2022-08-31 12:01:59 +00:00
|
|
|
}
|
|
|
|
|
2022-09-05 10:55:36 +00:00
|
|
|
/* Destination schedule map */
|
2022-09-07 11:54:20 +00:00
|
|
|
nhu_pending = tmp_allocz(sizeof(rtable *) * rtable_max_id);
|
2022-09-05 10:55:36 +00:00
|
|
|
|
2010-07-05 15:50:19 +00:00
|
|
|
struct hostentry *he;
|
|
|
|
node *n, *x;
|
|
|
|
|
2010-07-27 16:20:12 +00:00
|
|
|
/* Reset the trie */
|
|
|
|
lp_flush(hc->lp);
|
2020-03-26 02:57:48 +00:00
|
|
|
hc->trie = f_new_trie(hc->lp, 0);
|
2010-07-27 16:20:12 +00:00
|
|
|
|
2010-07-05 15:50:19 +00:00
|
|
|
WALK_LIST_DELSAFE(n, x, hc->hostentries)
|
|
|
|
{
|
|
|
|
he = SKIP_BACK(struct hostentry, ln, n);
|
|
|
|
if (!he->uc)
|
|
|
|
{
|
2021-03-30 16:51:31 +00:00
|
|
|
hc_delete_hostentry(hc, tab->rp, he);
|
2010-07-05 15:50:19 +00:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (rt_update_hostentry(tab, he))
|
2022-09-05 10:55:36 +00:00
|
|
|
nhu_pending[he->tab->id] = he->tab;
|
2010-07-05 15:50:19 +00:00
|
|
|
}
|
2022-09-07 11:54:20 +00:00
|
|
|
}
|
2022-09-05 10:55:36 +00:00
|
|
|
|
|
|
|
for (uint i=0; i<rtable_max_id; i++)
|
|
|
|
if (nhu_pending[i])
|
2022-09-07 11:54:20 +00:00
|
|
|
RT_LOCKED(nhu_pending[i], dst)
|
|
|
|
rt_schedule_nhu(dst);
|
2010-07-05 15:50:19 +00:00
|
|
|
}
|
|
|
|
|
2023-04-27 10:38:50 +00:00
|
|
|
struct hostentry_tmp_lock {
|
|
|
|
resource r;
|
|
|
|
rtable *tab;
|
|
|
|
struct hostentry *he;
|
|
|
|
};
|
|
|
|
|
|
|
|
static void
|
|
|
|
hostentry_tmp_unlock(resource *r)
|
|
|
|
{
|
|
|
|
struct hostentry_tmp_lock *l = SKIP_BACK(struct hostentry_tmp_lock, r, r);
|
|
|
|
RT_LOCKED(l->tab, tab)
|
|
|
|
{
|
|
|
|
l->he->uc--;
|
|
|
|
rt_unlock_table(tab);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
hostentry_tmp_lock_dump(resource *r, unsigned indent UNUSED)
|
|
|
|
{
|
|
|
|
struct hostentry_tmp_lock *l = SKIP_BACK(struct hostentry_tmp_lock, r, r);
|
|
|
|
debug("he=%p tab=%s\n", l->he, l->tab->name);
|
|
|
|
}
|
|
|
|
|
|
|
|
struct resclass hostentry_tmp_lock_class = {
|
|
|
|
.name = "Temporary hostentry lock",
|
|
|
|
.size = sizeof(struct hostentry_tmp_lock),
|
|
|
|
.free = hostentry_tmp_unlock,
|
|
|
|
.dump = hostentry_tmp_lock_dump,
|
|
|
|
.lookup = NULL,
|
|
|
|
.memsize = NULL,
|
|
|
|
};
|
|
|
|
|
2022-05-15 13:53:35 +00:00
|
|
|
static struct hostentry *
|
2022-09-07 11:54:20 +00:00
|
|
|
rt_get_hostentry(struct rtable_private *tab, ip_addr a, ip_addr ll, rtable *dep)
|
2010-07-05 15:50:19 +00:00
|
|
|
{
|
2022-10-10 03:06:19 +00:00
|
|
|
ip_addr link = ipa_zero(ll) ? a : ll;
|
2010-07-05 15:50:19 +00:00
|
|
|
struct hostentry *he;
|
|
|
|
|
|
|
|
if (!tab->hostcache)
|
|
|
|
rt_init_hostcache(tab);
|
|
|
|
|
2015-12-24 14:52:03 +00:00
|
|
|
u32 k = hc_hash(a, dep);
|
2010-07-26 14:39:27 +00:00
|
|
|
struct hostcache *hc = tab->hostcache;
|
|
|
|
for (he = hc->hash_table[k >> hc->hash_shift]; he != NULL; he = he->next)
|
2022-10-10 03:06:19 +00:00
|
|
|
if (ipa_equal(he->addr, a) && ipa_equal(he->link, link) && (he->tab == dep))
|
2023-04-27 10:38:50 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
if (!he)
|
|
|
|
{
|
|
|
|
he = hc_new_hostentry(hc, tab->rp, a, link, dep, k);
|
2023-08-28 13:36:40 +00:00
|
|
|
he->owner = RT_PUB(tab);
|
2023-04-27 10:38:50 +00:00
|
|
|
rt_update_hostentry(tab, he);
|
|
|
|
}
|
|
|
|
|
|
|
|
struct hostentry_tmp_lock *l = ralloc(tmp_res.pool, &hostentry_tmp_lock_class);
|
|
|
|
l->he = he;
|
|
|
|
l->tab = RT_PUB(tab);
|
|
|
|
l->he->uc++;
|
|
|
|
rt_lock_table(tab);
|
2010-07-05 15:50:19 +00:00
|
|
|
|
|
|
|
return he;
|
|
|
|
}
|
|
|
|
|
2012-08-14 14:25:22 +00:00
|
|
|
|
2000-06-02 12:29:55 +00:00
|
|
|
/*
|
|
|
|
* Documentation for functions declared inline in route.h
|
|
|
|
*/
|
|
|
|
#if 0
|
|
|
|
|
|
|
|
/**
|
|
|
|
* net_find - find a network entry
|
|
|
|
* @tab: a routing table
|
|
|
|
* @addr: address of the network
|
|
|
|
*
|
|
|
|
* net_find() looks up the given network in routing table @tab and
|
|
|
|
* returns a pointer to its &net entry or %NULL if no such network
|
|
|
|
* exists.
|
|
|
|
*/
|
2015-11-05 11:48:52 +00:00
|
|
|
static inline net *net_find(rtable *tab, net_addr *addr)
|
2000-06-02 12:29:55 +00:00
|
|
|
{ DUMMY; }
|
|
|
|
|
|
|
|
/**
|
|
|
|
* net_get - obtain a network entry
|
|
|
|
* @tab: a routing table
|
|
|
|
* @addr: address of the network
|
|
|
|
*
|
|
|
|
* net_get() looks up the given network in routing table @tab and
|
|
|
|
* returns a pointer to its &net entry. If no such entry exists, it's
|
|
|
|
* created.
|
|
|
|
*/
|
2015-11-05 11:48:52 +00:00
|
|
|
static inline net *net_get(rtable *tab, net_addr *addr)
|
2000-06-02 12:29:55 +00:00
|
|
|
{ DUMMY; }
|
|
|
|
|
|
|
|
/**
|
|
|
|
* rte_cow - copy a route for writing
|
|
|
|
* @r: a route entry to be copied
|
|
|
|
*
|
|
|
|
* rte_cow() takes a &rte and prepares it for modification. The exact action
|
|
|
|
* taken depends on the flags of the &rte -- if it's a temporary entry, it's
|
|
|
|
* just returned unchanged, else a new temporary entry with the same contents
|
|
|
|
* is created.
|
|
|
|
*
|
|
|
|
* The primary use of this function is inside the filter machinery -- when
|
|
|
|
* a filter wants to modify &rte contents (to change the preference or to
|
|
|
|
* attach another set of attributes), it must ensure that the &rte is not
|
|
|
|
* shared with anyone else (and especially that it isn't stored in any routing
|
|
|
|
* table).
|
|
|
|
*
|
2000-06-07 12:29:08 +00:00
|
|
|
* Result: a pointer to the new writable &rte.
|
2000-06-02 12:29:55 +00:00
|
|
|
*/
|
|
|
|
static inline rte * rte_cow(rte *r)
|
|
|
|
{ DUMMY; }
|
|
|
|
|
|
|
|
#endif
|