2000-03-20 21:50:17 +00:00
/*
* BIRD - - BGP Packet Processing
*
* ( c ) 2000 Martin Mares < mj @ ucw . cz >
*
* Can be freely distributed and used under the terms of the GNU GPL .
*/
2000-05-02 16:07:41 +00:00
# undef LOCAL_DEBUG
2000-03-21 15:53:50 +00:00
2000-03-20 21:50:17 +00:00
# include "nest/bird.h"
# include "nest/iface.h"
# include "nest/protocol.h"
# include "nest/route.h"
2008-10-26 21:36:08 +00:00
# include "nest/attrs.h"
2010-01-03 11:17:52 +00:00
# include "nest/mrtdump.h"
2000-03-20 21:50:17 +00:00
# include "conf/conf.h"
2000-03-21 15:53:50 +00:00
# include "lib/unaligned.h"
# include "lib/socket.h"
2000-03-20 21:50:17 +00:00
2008-12-19 00:34:39 +00:00
# include "nest/cli.h"
2000-03-20 21:50:17 +00:00
# include "bgp.h"
2000-03-21 15:53:50 +00:00
2009-02-26 13:23:54 +00:00
static struct rate_limit rl_rcv_update , rl_snd_update ;
2010-01-03 11:17:52 +00:00
/*
* MRT Dump format is not semantically specified .
* We will use these values in appropriate fields :
*
* Local AS , Remote AS - configured AS numbers for given BGP instance .
* Local IP , Remote IP - IP addresses of the TCP connection ( 0 if no connection )
*
* We dump two kinds of MRT messages : STATE_CHANGE ( for BGP state
* changes ) and MESSAGE ( for received BGP messages ) .
*
* STATE_CHANGE uses always AS4 variant , but MESSAGE uses AS4 variant
* only when AS4 session is established and even in that case MESSAGE
* does not use AS4 variant for initial OPEN message . This strange
* behavior is here for compatibility with Quagga and Bgpdump ,
*/
static byte *
mrt_put_bgp4_hdr ( byte * buf , struct bgp_conn * conn , int as4 )
{
struct bgp_proto * p = conn - > bgp ;
if ( as4 )
{
put_u32 ( buf + 0 , p - > remote_as ) ;
put_u32 ( buf + 4 , p - > local_as ) ;
buf + = 8 ;
}
else
{
put_u16 ( buf + 0 , ( p - > remote_as < = 0xFFFF ) ? p - > remote_as : AS_TRANS ) ;
put_u16 ( buf + 2 , ( p - > local_as < = 0xFFFF ) ? p - > local_as : AS_TRANS ) ;
buf + = 4 ;
}
2010-07-12 15:39:39 +00:00
put_u16 ( buf + 0 , p - > neigh ? p - > neigh - > iface - > index : 0 ) ;
2010-01-03 11:17:52 +00:00
put_u16 ( buf + 2 , BGP_AF ) ;
buf + = 4 ;
buf = ipa_put_addr ( buf , conn - > sk ? conn - > sk - > daddr : IPA_NONE ) ;
buf = ipa_put_addr ( buf , conn - > sk ? conn - > sk - > saddr : IPA_NONE ) ;
return buf ;
}
static void
mrt_dump_bgp_packet ( struct bgp_conn * conn , byte * pkt , unsigned len )
{
byte buf [ BGP_MAX_PACKET_LENGTH + 128 ] ;
byte * bp = buf + MRTDUMP_HDR_LENGTH ;
int as4 = conn - > bgp - > as4_session ;
bp = mrt_put_bgp4_hdr ( bp , conn , as4 ) ;
memcpy ( bp , pkt , len ) ;
bp + = len ;
mrt_dump_message ( & conn - > bgp - > p , BGP4MP , as4 ? BGP4MP_MESSAGE_AS4 : BGP4MP_MESSAGE ,
buf , bp - buf ) ;
}
static inline u16
convert_state ( unsigned state )
{
/* Convert state from our BS_* values to values used in MRTDump */
return ( state = = BS_CLOSE ) ? 1 : state + 1 ;
}
void
mrt_dump_bgp_state_change ( struct bgp_conn * conn , unsigned old , unsigned new )
{
byte buf [ 128 ] ;
byte * bp = buf + MRTDUMP_HDR_LENGTH ;
bp = mrt_put_bgp4_hdr ( bp , conn , 1 ) ;
put_u16 ( bp + 0 , convert_state ( old ) ) ;
put_u16 ( bp + 2 , convert_state ( new ) ) ;
bp + = 4 ;
mrt_dump_message ( & conn - > bgp - > p , BGP4MP , BGP4MP_STATE_CHANGE_AS4 , buf , bp - buf ) ;
}
2000-03-21 15:53:50 +00:00
static byte *
bgp_create_notification ( struct bgp_conn * conn , byte * buf )
{
2000-05-02 16:07:41 +00:00
struct bgp_proto * p = conn - > bgp ;
BGP_TRACE ( D_PACKETS , " Sending NOTIFICATION(code=%d.%d) " , conn - > notify_code , conn - > notify_subcode ) ;
2000-03-21 15:53:50 +00:00
buf [ 0 ] = conn - > notify_code ;
buf [ 1 ] = conn - > notify_subcode ;
2000-04-25 21:13:25 +00:00
memcpy ( buf + 2 , conn - > notify_data , conn - > notify_size ) ;
return buf + 2 + conn - > notify_size ;
2000-03-21 15:53:50 +00:00
}
2008-10-26 21:36:08 +00:00
# ifdef IPV6
static byte *
bgp_put_cap_ipv6 ( struct bgp_conn * conn UNUSED , byte * buf )
{
* buf + + = 1 ; /* Capability 1: Multiprotocol extensions */
* buf + + = 4 ; /* Capability data length */
* buf + + = 0 ; /* We support AF IPv6 */
* buf + + = BGP_AF_IPV6 ;
* buf + + = 0 ; /* RFU */
* buf + + = 1 ; /* and SAFI 1 */
return buf ;
}
2009-03-05 10:52:47 +00:00
# else
static byte *
bgp_put_cap_ipv4 ( struct bgp_conn * conn UNUSED , byte * buf )
{
* buf + + = 1 ; /* Capability 1: Multiprotocol extensions */
* buf + + = 4 ; /* Capability data length */
* buf + + = 0 ; /* We support AF IPv4 */
* buf + + = BGP_AF_IPV4 ;
* buf + + = 0 ; /* RFU */
* buf + + = 1 ; /* and SAFI 1 */
return buf ;
}
2008-10-26 21:36:08 +00:00
# endif
2009-11-26 19:47:59 +00:00
static byte *
bgp_put_cap_rr ( struct bgp_conn * conn UNUSED , byte * buf )
{
* buf + + = 2 ; /* Capability 2: Support for route refresh */
* buf + + = 0 ; /* Capability data length */
return buf ;
}
2008-10-26 21:36:08 +00:00
static byte *
bgp_put_cap_as4 ( struct bgp_conn * conn , byte * buf )
{
* buf + + = 65 ; /* Capability 65: Support for 4-octet AS number */
* buf + + = 4 ; /* Capability data length */
put_u32 ( buf , conn - > bgp - > local_as ) ;
return buf + 4 ;
}
2000-03-21 15:53:50 +00:00
static byte *
bgp_create_open ( struct bgp_conn * conn , byte * buf )
{
2000-05-02 16:07:41 +00:00
struct bgp_proto * p = conn - > bgp ;
2008-10-26 21:36:08 +00:00
byte * cap ;
int cap_len ;
2000-05-02 16:07:41 +00:00
BGP_TRACE ( D_PACKETS , " Sending OPEN(ver=%d,as=%d,hold=%d,id=%08x) " ,
BGP_VERSION , p - > local_as , p - > cf - > hold_time , p - > local_id ) ;
2000-03-21 15:53:50 +00:00
buf [ 0 ] = BGP_VERSION ;
2008-10-26 21:36:08 +00:00
put_u16 ( buf + 1 , ( p - > local_as < 0xFFFF ) ? p - > local_as : AS_TRANS ) ;
2000-05-02 16:07:41 +00:00
put_u16 ( buf + 3 , p - > cf - > hold_time ) ;
put_u32 ( buf + 5 , p - > local_id ) ;
2008-12-24 16:24:41 +00:00
if ( conn - > start_state = = BSS_CONNECT_NOCAP )
{
BGP_TRACE ( D_PACKETS , " Skipping capabilities " ) ;
buf [ 9 ] = 0 ;
return buf + 10 ;
}
2008-10-26 21:36:08 +00:00
/* Skipped 3 B for length field and Capabilities parameter header */
cap = buf + 12 ;
2009-03-05 10:52:47 +00:00
# ifndef IPV6
if ( p - > cf - > advertise_ipv4 )
cap = bgp_put_cap_ipv4 ( conn , cap ) ;
# endif
2008-10-26 21:36:08 +00:00
# ifdef IPV6
cap = bgp_put_cap_ipv6 ( conn , cap ) ;
2003-02-22 10:40:35 +00:00
# endif
2009-03-13 11:49:44 +00:00
2009-11-26 19:47:59 +00:00
if ( p - > cf - > enable_refresh )
cap = bgp_put_cap_rr ( conn , cap ) ;
2008-12-24 16:24:41 +00:00
if ( conn - > want_as4_support )
2008-10-26 21:36:08 +00:00
cap = bgp_put_cap_as4 ( conn , cap ) ;
cap_len = cap - buf - 12 ;
if ( cap_len > 0 )
{
buf [ 9 ] = cap_len + 2 ; /* Optional params len */
buf [ 10 ] = 2 ; /* Option: Capability list */
buf [ 11 ] = cap_len ; /* Option length */
return cap ;
}
else
{
buf [ 9 ] = 0 ; /* No optional parameters */
return buf + 10 ;
}
2000-03-21 15:53:50 +00:00
}
2000-04-17 09:37:31 +00:00
static unsigned int
bgp_encode_prefixes ( struct bgp_proto * p , byte * w , struct bgp_bucket * buck , unsigned int remains )
{
byte * start = w ;
ip_addr a ;
int bytes ;
while ( ! EMPTY_LIST ( buck - > prefixes ) & & remains > = 5 )
{
struct bgp_prefix * px = SKIP_BACK ( struct bgp_prefix , bucket_node , HEAD ( buck - > prefixes ) ) ;
DBG ( " \t Dequeued route %I/%d \n " , px - > n . prefix , px - > n . pxlen ) ;
* w + + = px - > n . pxlen ;
bytes = ( px - > n . pxlen + 7 ) / 8 ;
a = px - > n . prefix ;
ipa_hton ( a ) ;
memcpy ( w , & a , bytes ) ;
w + = bytes ;
2000-05-08 14:53:22 +00:00
remains - = bytes + 1 ;
2000-04-17 09:37:31 +00:00
rem_node ( & px - > bucket_node ) ;
fib_delete ( & p - > prefix_fib , px ) ;
}
return w - start ;
}
2009-02-27 14:24:46 +00:00
static void
bgp_flush_prefixes ( struct bgp_proto * p , struct bgp_bucket * buck )
{
while ( ! EMPTY_LIST ( buck - > prefixes ) )
{
struct bgp_prefix * px = SKIP_BACK ( struct bgp_prefix , bucket_node , HEAD ( buck - > prefixes ) ) ;
log ( L_ERR " %s: - route %I/%d skipped " , p - > p . name , px - > n . prefix , px - > n . pxlen ) ;
rem_node ( & px - > bucket_node ) ;
fib_delete ( & p - > prefix_fib , px ) ;
}
}
2000-05-04 09:03:31 +00:00
# ifndef IPV6 /* IPv4 version */
2000-03-21 15:53:50 +00:00
static byte *
bgp_create_update ( struct bgp_conn * conn , byte * buf )
{
2000-05-02 16:07:41 +00:00
struct bgp_proto * p = conn - > bgp ;
2000-04-17 09:37:31 +00:00
struct bgp_bucket * buck ;
int remains = BGP_MAX_PACKET_LENGTH - BGP_HEADER_LENGTH - 4 ;
2000-05-04 20:02:56 +00:00
byte * w ;
2000-04-17 09:37:31 +00:00
int wd_size = 0 ;
int r_size = 0 ;
2000-05-04 20:02:56 +00:00
int a_size = 0 ;
2000-04-17 09:37:31 +00:00
w = buf + 2 ;
2000-05-02 16:07:41 +00:00
if ( ( buck = p - > withdraw_bucket ) & & ! EMPTY_LIST ( buck - > prefixes ) )
2000-04-17 09:37:31 +00:00
{
DBG ( " Withdrawn routes: \n " ) ;
2000-05-02 16:07:41 +00:00
wd_size = bgp_encode_prefixes ( p , w , buck , remains ) ;
2000-04-17 09:37:31 +00:00
w + = wd_size ;
remains - = wd_size ;
}
put_u16 ( buf , wd_size ) ;
2000-03-30 10:44:20 +00:00
2009-02-27 14:24:46 +00:00
if ( remains > = 3072 )
2000-04-17 09:37:31 +00:00
{
2000-05-02 16:07:41 +00:00
while ( ( buck = ( struct bgp_bucket * ) HEAD ( p - > bucket_queue ) ) - > send_node . next )
2000-04-17 09:37:31 +00:00
{
if ( EMPTY_LIST ( buck - > prefixes ) )
{
DBG ( " Deleting empty bucket %p \n " , buck ) ;
rem_node ( & buck - > send_node ) ;
2000-05-02 16:07:41 +00:00
bgp_free_bucket ( p , buck ) ;
2000-04-17 09:37:31 +00:00
continue ;
}
2009-02-27 14:24:46 +00:00
2000-04-17 09:37:31 +00:00
DBG ( " Processing bucket %p \n " , buck ) ;
2009-02-27 14:24:46 +00:00
a_size = bgp_encode_attrs ( p , w + 2 , buck - > eattrs , 2048 ) ;
if ( a_size < 0 )
{
2009-11-18 19:32:36 +00:00
log ( L_ERR " %s: Attribute list too long, skipping corresponding routes " , p - > p . name ) ;
2009-02-27 14:24:46 +00:00
bgp_flush_prefixes ( p , buck ) ;
rem_node ( & buck - > send_node ) ;
bgp_free_bucket ( p , buck ) ;
continue ;
}
2000-05-04 20:02:56 +00:00
put_u16 ( w , a_size ) ;
w + = a_size + 2 ;
r_size = bgp_encode_prefixes ( p , w , buck , remains - a_size ) ;
2000-04-17 09:37:31 +00:00
w + = r_size ;
break ;
}
}
2000-05-08 12:37:24 +00:00
if ( ! a_size ) /* Attributes not already encoded */
2000-04-17 09:37:31 +00:00
{
put_u16 ( w , 0 ) ;
w + = 2 ;
}
2000-05-19 18:05:19 +00:00
if ( wd_size | | r_size )
{
2009-02-26 13:23:54 +00:00
BGP_TRACE_RL ( & rl_snd_update , D_PACKETS , " Sending UPDATE " ) ;
2000-05-19 18:05:19 +00:00
return w ;
}
else
return NULL ;
2000-03-21 15:53:50 +00:00
}
2000-05-04 09:03:31 +00:00
# else /* IPv6 version */
static byte *
bgp_create_update ( struct bgp_conn * conn , byte * buf )
{
2000-05-04 20:02:56 +00:00
struct bgp_proto * p = conn - > bgp ;
struct bgp_bucket * buck ;
2009-11-18 19:32:36 +00:00
int size , second , rem_stored ;
2000-05-04 20:02:56 +00:00
int remains = BGP_MAX_PACKET_LENGTH - BGP_HEADER_LENGTH - 4 ;
2009-11-18 19:32:36 +00:00
byte * w , * w_stored , * tmp , * tstart ;
2009-04-29 16:58:24 +00:00
ip_addr * ipp , ip , ip_ll ;
2000-05-04 20:02:56 +00:00
ea_list * ea ;
eattr * nh ;
neighbor * n ;
put_u16 ( buf , 0 ) ;
w = buf + 4 ;
if ( ( buck = p - > withdraw_bucket ) & & ! EMPTY_LIST ( buck - > prefixes ) )
{
DBG ( " Withdrawn routes: \n " ) ;
2008-10-26 21:45:09 +00:00
tmp = bgp_attach_attr_wa ( & ea , bgp_linpool , BA_MP_UNREACH_NLRI , remains - 8 ) ;
2000-05-04 20:02:56 +00:00
* tmp + + = 0 ;
* tmp + + = BGP_AF_IPV6 ;
* tmp + + = 1 ;
2009-04-23 12:16:05 +00:00
ea - > attrs [ 0 ] . u . ptr - > length = 3 + bgp_encode_prefixes ( p , tmp , buck , remains - 11 ) ;
2008-10-26 21:36:08 +00:00
size = bgp_encode_attrs ( p , w , ea , remains ) ;
2009-02-27 14:24:46 +00:00
ASSERT ( size > = 0 ) ;
2000-05-04 20:02:56 +00:00
w + = size ;
remains - = size ;
}
2009-02-27 14:24:46 +00:00
if ( remains > = 3072 )
2000-05-04 20:02:56 +00:00
{
while ( ( buck = ( struct bgp_bucket * ) HEAD ( p - > bucket_queue ) ) - > send_node . next )
{
if ( EMPTY_LIST ( buck - > prefixes ) )
{
DBG ( " Deleting empty bucket %p \n " , buck ) ;
rem_node ( & buck - > send_node ) ;
bgp_free_bucket ( p , buck ) ;
continue ;
}
2009-02-27 14:24:46 +00:00
2000-05-04 20:02:56 +00:00
DBG ( " Processing bucket %p \n " , buck ) ;
2009-11-18 19:32:36 +00:00
rem_stored = remains ;
w_stored = w ;
2009-02-27 14:24:46 +00:00
2009-11-18 19:32:36 +00:00
size = bgp_encode_attrs ( p , w , buck - > eattrs , 2048 ) ;
2009-02-27 14:24:46 +00:00
if ( size < 0 )
{
2009-11-18 19:32:36 +00:00
log ( L_ERR " %s: Attribute list too long, skipping corresponding routes " , p - > p . name ) ;
2009-02-27 14:24:46 +00:00
bgp_flush_prefixes ( p , buck ) ;
rem_node ( & buck - > send_node ) ;
bgp_free_bucket ( p , buck ) ;
continue ;
}
2000-05-04 20:02:56 +00:00
w + = size ;
remains - = size ;
2009-04-29 16:58:24 +00:00
2009-11-18 19:32:36 +00:00
/* We have two addresses here in NEXT_HOP eattr. Really.
2009-09-18 11:59:04 +00:00
Unless NEXT_HOP was modified by filter */
2009-11-18 19:32:36 +00:00
nh = ea_find ( buck - > eattrs , EA_CODE ( EAP_BGP , BA_NEXT_HOP ) ) ;
ASSERT ( nh ) ;
2009-09-18 11:59:04 +00:00
second = ( nh - > u . ptr - > length = = NEXT_HOP_LENGTH ) ;
2009-04-29 16:58:24 +00:00
ipp = ( ip_addr * ) nh - > u . ptr - > data ;
ip = ipp [ 0 ] ;
ip_ll = IPA_NONE ;
2009-04-28 16:11:56 +00:00
if ( ipa_equal ( ip , p - > source_addr ) )
2009-04-29 16:58:24 +00:00
ip_ll = p - > local_link ;
2000-05-04 20:02:56 +00:00
else
{
2009-04-29 16:58:24 +00:00
/* If we send a route with 'third party' next hop destinated
* in the same interface , we should also send a link local
* next hop address . We use the received one ( stored in the
* other part of BA_NEXT_HOP eattr ) . If we didn ' t received
2009-05-06 13:18:52 +00:00
* it ( for example it is a static route ) , we can ' t use
* ' third party ' next hop and we have to use local IP address
* as next hop . Sending original next hop address without
* link local address seems to be a natural way to solve that
* problem , but it is contrary to RFC 2545 and Quagga does not
* accept such routes .
2009-04-29 16:58:24 +00:00
*/
2000-05-04 20:02:56 +00:00
n = neigh_find ( & p - > p , & ip , 0 ) ;
2010-07-12 15:39:39 +00:00
if ( n & & p - > neigh & & n - > iface = = p - > neigh - > iface )
2009-05-06 13:18:52 +00:00
{
2009-09-18 11:59:04 +00:00
if ( second & & ipa_nonzero ( ipp [ 1 ] ) )
2009-05-06 13:18:52 +00:00
ip_ll = ipp [ 1 ] ;
else
{
2009-11-18 19:32:36 +00:00
switch ( p - > cf - > missing_lladdr )
{
case MLL_SELF :
ip = p - > source_addr ;
ip_ll = p - > local_link ;
break ;
case MLL_DROP :
log ( L_ERR " %s: Missing link-local next hop address, skipping corresponding routes " , p - > p . name ) ;
w = w_stored ;
remains = rem_stored ;
bgp_flush_prefixes ( p , buck ) ;
rem_node ( & buck - > send_node ) ;
bgp_free_bucket ( p , buck ) ;
continue ;
case MLL_IGNORE :
break ;
}
2009-05-06 13:18:52 +00:00
}
}
2000-05-04 20:02:56 +00:00
}
2009-04-29 16:58:24 +00:00
2009-11-18 19:32:36 +00:00
tstart = tmp = bgp_attach_attr_wa ( & ea , bgp_linpool , BA_MP_REACH_NLRI , remains - 8 ) ;
* tmp + + = 0 ;
* tmp + + = BGP_AF_IPV6 ;
* tmp + + = 1 ;
2009-04-29 16:58:24 +00:00
if ( ipa_nonzero ( ip_ll ) )
2000-05-04 20:02:56 +00:00
{
* tmp + + = 32 ;
ipa_hton ( ip ) ;
memcpy ( tmp , & ip , 16 ) ;
ipa_hton ( ip_ll ) ;
memcpy ( tmp + 16 , & ip_ll , 16 ) ;
tmp + = 32 ;
}
else
{
* tmp + + = 16 ;
ipa_hton ( ip ) ;
memcpy ( tmp , & ip , 16 ) ;
tmp + = 16 ;
}
2009-04-29 16:58:24 +00:00
2000-05-04 20:02:56 +00:00
* tmp + + = 0 ; /* No SNPA information */
tmp + = bgp_encode_prefixes ( p , tmp , buck , remains - ( 8 + 3 + 32 + 1 ) ) ;
ea - > attrs [ 0 ] . u . ptr - > length = tmp - tstart ;
2009-02-27 14:24:46 +00:00
size = bgp_encode_attrs ( p , w , ea , remains ) ;
ASSERT ( size > = 0 ) ;
w + = size ;
2000-05-04 20:02:56 +00:00
break ;
}
}
size = w - ( buf + 4 ) ;
put_u16 ( buf + 2 , size ) ;
lp_flush ( bgp_linpool ) ;
2000-05-19 18:05:19 +00:00
if ( size )
{
2009-02-26 13:23:54 +00:00
BGP_TRACE_RL ( & rl_snd_update , D_PACKETS , " Sending UPDATE " ) ;
2000-05-19 18:05:19 +00:00
return w ;
}
else
return NULL ;
2000-05-04 09:03:31 +00:00
}
# endif
2009-11-26 19:47:59 +00:00
static byte *
bgp_create_route_refresh ( struct bgp_conn * conn , byte * buf )
{
struct bgp_proto * p = conn - > bgp ;
BGP_TRACE ( D_PACKETS , " Sending ROUTE-REFRESH " ) ;
2010-01-03 11:17:52 +00:00
* buf + + = 0 ;
* buf + + = BGP_AF ;
2009-11-26 19:47:59 +00:00
* buf + + = 0 ; /* RFU */
* buf + + = 1 ; /* and SAFI 1 */
return buf ;
}
2000-03-21 15:53:50 +00:00
static void
bgp_create_header ( byte * buf , unsigned int len , unsigned int type )
{
memset ( buf , 0xff , 16 ) ; /* Marker */
put_u16 ( buf + 16 , len ) ;
buf [ 18 ] = type ;
}
2000-06-04 17:06:18 +00:00
/**
* bgp_fire_tx - transmit packets
* @ conn : connection
*
* Whenever the transmit buffers of the underlying TCP connection
* are free and we have any packets queued for sending , the socket functions
* call bgp_fire_tx ( ) which takes care of selecting the highest priority packet
* queued ( Notification > Keepalive > Open > Update ) , assembling its header
* and body and sending it to the connection .
*/
2000-03-30 10:44:20 +00:00
static int
2000-03-21 15:53:50 +00:00
bgp_fire_tx ( struct bgp_conn * conn )
{
2000-05-02 16:07:41 +00:00
struct bgp_proto * p = conn - > bgp ;
2000-03-21 15:53:50 +00:00
unsigned int s = conn - > packets_to_send ;
sock * sk = conn - > sk ;
2000-05-08 14:53:22 +00:00
byte * buf , * pkt , * end ;
2000-03-21 15:53:50 +00:00
int type ;
2000-05-08 14:53:22 +00:00
if ( ! sk )
{
conn - > packets_to_send = 0 ;
return 0 ;
}
buf = sk - > tbuf ;
pkt = buf + BGP_HEADER_LENGTH ;
2000-03-21 15:53:50 +00:00
if ( s & ( 1 < < PKT_SCHEDULE_CLOSE ) )
{
2008-12-19 00:34:39 +00:00
/* We can finally close connection and enter idle state */
bgp_conn_enter_idle_state ( conn ) ;
2000-03-30 10:44:20 +00:00
return 0 ;
2000-03-21 15:53:50 +00:00
}
if ( s & ( 1 < < PKT_NOTIFICATION ) )
{
s = 1 < < PKT_SCHEDULE_CLOSE ;
type = PKT_NOTIFICATION ;
end = bgp_create_notification ( conn , pkt ) ;
}
else if ( s & ( 1 < < PKT_KEEPALIVE ) )
{
s & = ~ ( 1 < < PKT_KEEPALIVE ) ;
type = PKT_KEEPALIVE ;
end = pkt ; /* Keepalives carry no data */
2000-05-02 16:07:41 +00:00
BGP_TRACE ( D_PACKETS , " Sending KEEPALIVE " ) ;
2000-03-30 10:44:20 +00:00
bgp_start_timer ( conn - > keepalive_timer , conn - > keepalive_time ) ;
2000-03-21 15:53:50 +00:00
}
else if ( s & ( 1 < < PKT_OPEN ) )
{
s & = ~ ( 1 < < PKT_OPEN ) ;
type = PKT_OPEN ;
end = bgp_create_open ( conn , pkt ) ;
}
2009-11-26 19:47:59 +00:00
else if ( s & ( 1 < < PKT_ROUTE_REFRESH ) )
{
s & = ~ ( 1 < < PKT_ROUTE_REFRESH ) ;
type = PKT_ROUTE_REFRESH ;
end = bgp_create_route_refresh ( conn , pkt ) ;
}
2000-03-21 15:53:50 +00:00
else if ( s & ( 1 < < PKT_UPDATE ) )
{
end = bgp_create_update ( conn , pkt ) ;
type = PKT_UPDATE ;
if ( ! end )
{
conn - > packets_to_send = 0 ;
2000-03-30 10:44:20 +00:00
return 0 ;
2000-03-21 15:53:50 +00:00
}
}
else
2000-03-30 10:44:20 +00:00
return 0 ;
2000-03-21 15:53:50 +00:00
conn - > packets_to_send = s ;
bgp_create_header ( buf , end - buf , type ) ;
2000-03-30 10:44:20 +00:00
return sk_send ( sk , end - buf ) ;
2000-03-21 15:53:50 +00:00
}
2000-06-04 17:06:18 +00:00
/**
* bgp_schedule_packet - schedule a packet for transmission
* @ conn : connection
* @ type : packet type
*
* Schedule a packet of type @ type to be sent as soon as possible .
*/
2000-03-21 15:53:50 +00:00
void
bgp_schedule_packet ( struct bgp_conn * conn , int type )
{
DBG ( " BGP: Scheduling packet type %d \n " , type ) ;
conn - > packets_to_send | = 1 < < type ;
2000-05-08 14:53:22 +00:00
if ( conn - > sk & & conn - > sk - > tpos = = conn - > sk - > tbuf )
2008-12-19 00:34:39 +00:00
ev_schedule ( conn - > tx_ev ) ;
}
void
bgp_kick_tx ( void * vconn )
{
struct bgp_conn * conn = vconn ;
DBG ( " BGP: kicking TX \n " ) ;
2010-05-14 14:54:39 +00:00
while ( bgp_fire_tx ( conn ) > 0 )
2008-12-19 00:34:39 +00:00
;
2000-03-21 15:53:50 +00:00
}
void
bgp_tx ( sock * sk )
{
struct bgp_conn * conn = sk - > data ;
DBG ( " BGP: TX hook \n " ) ;
2010-05-14 14:54:39 +00:00
while ( bgp_fire_tx ( conn ) > 0 )
2000-03-30 10:44:20 +00:00
;
}
2008-10-26 21:36:08 +00:00
/* Capatibility negotiation as per RFC 2842 */
void
bgp_parse_capabilities ( struct bgp_conn * conn , byte * opt , int len )
{
2010-02-21 13:34:53 +00:00
// struct bgp_proto *p = conn->bgp;
2008-10-26 21:36:08 +00:00
int cl ;
while ( len > 0 )
{
if ( len < 2 | | len < 2 + opt [ 1 ] )
goto err ;
cl = opt [ 1 ] ;
switch ( opt [ 0 ] )
{
2010-01-03 11:17:52 +00:00
case 2 : /* Route refresh capability, RFC 2918 */
2009-11-26 19:47:59 +00:00
if ( cl ! = 0 )
goto err ;
conn - > peer_refresh_support = 1 ;
break ;
2010-01-03 11:17:52 +00:00
case 65 : /* AS4 capability, RFC 4893 */
2008-10-26 21:36:08 +00:00
if ( cl ! = 4 )
goto err ;
2008-12-24 16:24:41 +00:00
conn - > peer_as4_support = 1 ;
if ( conn - > want_as4_support )
2008-10-26 21:36:08 +00:00
conn - > advertised_as = get_u32 ( opt + 2 ) ;
break ;
/* We can safely ignore all other capabilities */
}
len - = 2 + cl ;
opt + = 2 + cl ;
}
return ;
err :
bgp_error ( conn , 2 , 0 , NULL , 0 ) ;
return ;
}
2000-04-25 13:32:17 +00:00
static int
bgp_parse_options ( struct bgp_conn * conn , byte * opt , int len )
{
2009-03-13 11:49:44 +00:00
struct bgp_proto * p = conn - > bgp ;
2008-10-26 21:36:08 +00:00
int ol ;
2000-04-25 13:32:17 +00:00
while ( len > 0 )
{
if ( len < 2 | | len < 2 + opt [ 1 ] )
2000-04-25 21:13:25 +00:00
{ bgp_error ( conn , 2 , 0 , NULL , 0 ) ; return 0 ; }
2000-04-25 13:32:17 +00:00
# ifdef LOCAL_DEBUG
{
int i ;
DBG ( " \t Option %02x: " , opt [ 0 ] ) ;
for ( i = 0 ; i < opt [ 1 ] ; i + + )
DBG ( " %02x " , opt [ 2 + i ] ) ;
DBG ( " \n " ) ;
}
# endif
2008-10-26 21:36:08 +00:00
ol = opt [ 1 ] ;
2000-04-25 13:32:17 +00:00
switch ( opt [ 0 ] )
{
case 2 :
2009-03-13 11:49:44 +00:00
if ( conn - > start_state = = BSS_CONNECT_NOCAP )
BGP_TRACE ( D_PACKETS , " Ignoring received capabilities " ) ;
else
bgp_parse_capabilities ( conn , opt + 2 , ol ) ;
2000-04-25 13:32:17 +00:00
break ;
2008-10-26 21:36:08 +00:00
2000-04-25 13:32:17 +00:00
default :
/*
* BGP specs don ' t tell us to send which option
* we didn ' t recognize , but it ' s common practice
* to do so . Also , capability negotiation with
* Cisco routers doesn ' t work without that .
*/
2008-10-26 21:36:08 +00:00
bgp_error ( conn , 2 , 4 , opt , ol ) ;
2000-04-25 13:32:17 +00:00
return 0 ;
}
2008-10-26 21:36:08 +00:00
len - = 2 + ol ;
opt + = 2 + ol ;
2000-04-25 13:32:17 +00:00
}
return 0 ;
}
2000-03-30 10:44:20 +00:00
static void
bgp_rx_open ( struct bgp_conn * conn , byte * pkt , int len )
{
2000-03-30 17:39:48 +00:00
struct bgp_conn * other ;
2000-03-30 10:44:20 +00:00
struct bgp_proto * p = conn - > bgp ;
2008-10-26 21:36:08 +00:00
unsigned hold ;
2009-03-13 11:49:44 +00:00
u16 base_as ;
2000-03-30 10:44:20 +00:00
u32 id ;
/* Check state */
if ( conn - > state ! = BS_OPENSENT )
2008-12-19 00:34:39 +00:00
{ bgp_error ( conn , 5 , 0 , NULL , 0 ) ; return ; }
2000-03-30 10:44:20 +00:00
/* Check message contents */
if ( len < 29 | | len ! = 29 + pkt [ 28 ] )
2000-04-25 21:13:25 +00:00
{ bgp_error ( conn , 1 , 2 , pkt + 16 , 2 ) ; return ; }
2000-03-30 10:44:20 +00:00
if ( pkt [ 19 ] ! = BGP_VERSION )
2000-04-25 21:13:25 +00:00
{ bgp_error ( conn , 2 , 1 , pkt + 19 , 1 ) ; return ; } /* RFC 1771 says 16 bits, draft-09 tells to use 8 */
2009-03-13 11:49:44 +00:00
conn - > advertised_as = base_as = get_u16 ( pkt + 20 ) ;
2000-03-30 10:44:20 +00:00
hold = get_u16 ( pkt + 22 ) ;
id = get_u32 ( pkt + 24 ) ;
2008-10-26 21:36:08 +00:00
BGP_TRACE ( D_PACKETS , " Got OPEN(as=%d,hold=%d,id=%08x) " , conn - > advertised_as , hold , id ) ;
2000-04-25 13:32:17 +00:00
if ( bgp_parse_options ( conn , pkt + 29 , pkt [ 28 ] ) )
return ;
2008-10-26 21:36:08 +00:00
if ( hold > 0 & & hold < 3 )
{ bgp_error ( conn , 2 , 6 , pkt + 22 , 2 ) ; return ; }
2000-03-30 10:44:20 +00:00
if ( ! id | | id = = 0xffffffff | | id = = p - > local_id )
2000-04-25 21:13:25 +00:00
{ bgp_error ( conn , 2 , 3 , pkt + 24 , - 4 ) ; return ; }
2000-03-30 10:44:20 +00:00
2009-03-13 11:49:44 +00:00
if ( ( conn - > advertised_as ! = base_as ) & & ( base_as ! = AS_TRANS ) )
log ( L_WARN " %s: Peer advertised inconsistent AS numbers " , p - > p . name ) ;
2008-10-26 21:36:08 +00:00
if ( conn - > advertised_as ! = p - > remote_as )
2009-09-24 21:14:44 +00:00
{
if ( conn - > peer_as4_support )
{
u32 val = htonl ( conn - > advertised_as ) ;
bgp_error ( conn , 2 , 2 , ( byte * ) & val , 4 ) ;
}
else
bgp_error ( conn , 2 , 2 , pkt + 20 , 2 ) ;
return ;
}
2008-10-26 21:36:08 +00:00
2000-03-30 17:39:48 +00:00
/* Check the other connection */
other = ( conn = = & p - > outgoing_conn ) ? & p - > incoming_conn : & p - > outgoing_conn ;
switch ( other - > state )
{
case BS_IDLE :
case BS_CONNECT :
case BS_ACTIVE :
case BS_OPENSENT :
2008-12-19 00:34:39 +00:00
case BS_CLOSE :
2000-03-30 17:39:48 +00:00
break ;
case BS_OPENCONFIRM :
if ( ( p - > local_id < id ) = = ( conn = = & p - > incoming_conn ) )
{
/* Should close the other connection */
2000-05-02 16:07:41 +00:00
BGP_TRACE ( D_EVENTS , " Connection collision, giving up the other connection " ) ;
2009-06-06 22:38:38 +00:00
bgp_error ( other , 6 , 7 , NULL , 0 ) ;
2000-03-30 17:39:48 +00:00
break ;
}
/* Fall thru */
case BS_ESTABLISHED :
/* Should close this connection */
2000-05-02 16:07:41 +00:00
BGP_TRACE ( D_EVENTS , " Connection collision, giving up this connection " ) ;
2009-06-06 22:38:38 +00:00
bgp_error ( conn , 6 , 7 , NULL , 0 ) ;
2000-03-30 17:39:48 +00:00
return ;
default :
bug ( " bgp_rx_open: Unknown state " ) ;
}
2000-03-30 10:44:20 +00:00
/* Update our local variables */
2008-12-19 00:34:39 +00:00
conn - > hold_time = MIN ( hold , p - > cf - > hold_time ) ;
2000-03-30 10:44:20 +00:00
conn - > keepalive_time = p - > cf - > keepalive_time ? : conn - > hold_time / 3 ;
p - > remote_id = id ;
2008-12-24 16:24:41 +00:00
p - > as4_session = conn - > want_as4_support & & conn - > peer_as4_support ;
2008-12-19 00:34:39 +00:00
DBG ( " BGP: Hold timer set to %d, keepalive to %d, AS to %d, ID to %x, AS4 session to %d \n " , conn - > hold_time , conn - > keepalive_time , p - > remote_as , p - > remote_id , p - > as4_session ) ;
2000-03-30 10:44:20 +00:00
bgp_schedule_packet ( conn , PKT_KEEPALIVE ) ;
bgp_start_timer ( conn - > hold_timer , conn - > hold_time ) ;
2010-01-03 11:17:52 +00:00
bgp_conn_enter_openconfirm_state ( conn ) ;
2000-03-30 10:44:20 +00:00
}
2000-03-30 18:44:23 +00:00
# define DECODE_PREFIX(pp, ll) do { \
int b = * pp + + ; \
int q ; \
ll - - ; \
2000-05-04 09:03:31 +00:00
if ( b > BITS_PER_IP_ADDRESS ) { err = 10 ; goto bad ; } \
2000-03-30 18:44:23 +00:00
q = ( b + 7 ) / 8 ; \
2000-05-04 09:03:31 +00:00
if ( ll < q ) { err = 1 ; goto bad ; } \
2000-03-31 23:21:37 +00:00
memcpy ( & prefix , pp , q ) ; \
2000-03-30 18:44:23 +00:00
pp + = q ; \
ll - = q ; \
2000-04-17 09:37:31 +00:00
ipa_ntoh ( prefix ) ; \
prefix = ipa_and ( prefix , ipa_mkmask ( b ) ) ; \
2000-03-31 23:21:37 +00:00
pxlen = b ; \
2000-03-30 18:44:23 +00:00
} while ( 0 )
2000-05-04 09:03:31 +00:00
static inline int
2010-07-05 15:50:19 +00:00
bgp_set_next_hop ( struct bgp_proto * p , rta * a )
2000-05-04 09:03:31 +00:00
{
struct eattr * nh = ea_find ( a - > eattrs , EA_CODE ( EAP_BGP , BA_NEXT_HOP ) ) ;
2010-07-05 15:50:19 +00:00
ip_addr nexthop = * ( ip_addr * ) nh - > u . ptr - > data ;
if ( ! p - > is_internal ) /* FIXME better option
*/
2000-05-04 09:03:31 +00:00
{
2010-07-05 15:50:19 +00:00
neighbor * ng = neigh_find ( & p - > p , & nexthop , 0 ) ? : p - > neigh ;
if ( ng - > scope = = SCOPE_HOST )
return 0 ;
a - > dest = RTD_ROUTER ;
a - > gw = ng - > addr ;
a - > iface = ng - > iface ;
a - > hostentry = NULL ;
2000-05-04 09:03:31 +00:00
}
2000-06-01 13:00:19 +00:00
else
2010-07-05 15:50:19 +00:00
rta_set_recursive_next_hop ( p - > p . table , a , p - > igp_table , & nexthop ) ;
2000-05-04 09:03:31 +00:00
return 1 ;
}
# ifndef IPV6 /* IPv4 version */
2000-03-30 10:44:20 +00:00
static void
2000-05-04 09:03:31 +00:00
bgp_do_rx_update ( struct bgp_conn * conn ,
byte * withdrawn , int withdrawn_len ,
byte * nlri , int nlri_len ,
byte * attrs , int attr_len )
2000-03-30 10:44:20 +00:00
{
2000-05-02 16:07:41 +00:00
struct bgp_proto * p = conn - > bgp ;
2000-05-04 09:03:31 +00:00
rta * a0 ;
rta * a = NULL ;
2000-03-31 23:21:37 +00:00
ip_addr prefix ;
net * n ;
2000-05-04 09:03:31 +00:00
int err = 0 , pxlen ;
2000-03-30 18:44:23 +00:00
/* Withdraw routes */
while ( withdrawn_len )
{
DECODE_PREFIX ( withdrawn , withdrawn_len ) ;
2000-03-31 23:21:37 +00:00
DBG ( " Withdraw %I/%d \n " , prefix , pxlen ) ;
2000-05-02 16:07:41 +00:00
if ( n = net_find ( p - > p . table , prefix , pxlen ) )
2009-06-01 12:07:13 +00:00
rte_update ( p - > p . table , n , & p - > p , & p - > p , NULL ) ;
2000-03-30 18:44:23 +00:00
}
2000-04-27 22:40:19 +00:00
if ( ! attr_len & & ! nlri_len ) /* shortcut */
return ;
2000-04-21 12:25:35 +00:00
a0 = bgp_decode_attrs ( conn , attrs , attr_len , bgp_linpool , nlri_len ) ;
2010-07-05 15:50:19 +00:00
if ( a0 & & nlri_len & & bgp_set_next_hop ( p , a0 ) )
2000-03-30 18:44:23 +00:00
{
2000-04-21 12:25:35 +00:00
a = rta_lookup ( a0 ) ;
2000-03-31 23:21:37 +00:00
while ( nlri_len )
2000-03-30 18:44:23 +00:00
{
2000-03-31 23:21:37 +00:00
rte * e ;
2000-04-01 09:17:33 +00:00
DECODE_PREFIX ( nlri , nlri_len ) ;
2000-03-31 23:21:37 +00:00
DBG ( " Add %I/%d \n " , prefix , pxlen ) ;
2000-04-01 09:17:33 +00:00
e = rte_get_temp ( rta_clone ( a ) ) ;
2000-05-02 16:07:41 +00:00
n = net_get ( p - > p . table , prefix , pxlen ) ;
2000-03-31 23:21:37 +00:00
e - > net = n ;
e - > pflags = 0 ;
2009-06-01 12:07:13 +00:00
rte_update ( p - > p . table , n , & p - > p , & p - > p , e ) ;
2009-06-04 11:31:09 +00:00
if ( bgp_apply_limits ( p ) < 0 )
goto bad2 ;
2000-03-30 18:44:23 +00:00
}
2009-06-04 11:31:09 +00:00
rta_free ( a ) ;
2000-03-30 18:44:23 +00:00
}
2009-06-04 11:31:09 +00:00
return ;
bad :
bgp_error ( conn , 3 , err , NULL , 0 ) ;
bad2 :
2000-05-04 09:03:31 +00:00
if ( a )
rta_free ( a ) ;
2000-04-01 09:17:33 +00:00
return ;
2000-05-04 09:03:31 +00:00
}
2000-04-01 09:17:33 +00:00
2000-05-04 09:03:31 +00:00
# else /* IPv6 version */
# define DO_NLRI(name) \
start = x = p - > name # # _start ; \
len = len0 = p - > name # # _len ; \
if ( len ) \
{ \
if ( len < 3 ) goto bad ; \
af = get_u16 ( x ) ; \
sub = x [ 2 ] ; \
x + = 3 ; \
len - = 3 ; \
DBG ( " \t NLRI AF=%d sub=%d len=%d \n " , af , sub , len ) ; \
} \
else \
af = 0 ; \
if ( af = = BGP_AF_IPV6 )
static void
bgp_do_rx_update ( struct bgp_conn * conn ,
byte * withdrawn , int withdrawn_len ,
byte * nlri , int nlri_len ,
byte * attrs , int attr_len )
{
struct bgp_proto * p = conn - > bgp ;
byte * start , * x ;
int len , len0 ;
unsigned af , sub ;
rta * a0 ;
rta * a = NULL ;
ip_addr prefix ;
net * n ;
int err = 0 , pxlen ;
p - > mp_reach_len = 0 ;
p - > mp_unreach_len = 0 ;
a0 = bgp_decode_attrs ( conn , attrs , attr_len , bgp_linpool , 0 ) ;
if ( ! a0 )
return ;
DO_NLRI ( mp_unreach )
{
while ( len )
{
DECODE_PREFIX ( x , len ) ;
DBG ( " Withdraw %I/%d \n " , prefix , pxlen ) ;
if ( n = net_find ( p - > p . table , prefix , pxlen ) )
2009-06-01 12:07:13 +00:00
rte_update ( p - > p . table , n , & p - > p , & p - > p , NULL ) ;
2000-05-04 09:03:31 +00:00
}
}
DO_NLRI ( mp_reach )
{
/* Create fake NEXT_HOP attribute */
if ( len < 1 | | ( * x ! = 16 & & * x ! = 32 ) | | len < * x + 2 )
goto bad ;
2009-04-29 16:58:24 +00:00
ip_addr * nh = ( ip_addr * ) bgp_attach_attr_wa ( & a0 - > eattrs , bgp_linpool , BA_NEXT_HOP , NEXT_HOP_LENGTH ) ;
2009-04-23 21:15:07 +00:00
memcpy ( nh , x + 1 , 16 ) ;
2009-04-29 16:58:24 +00:00
ipa_ntoh ( nh [ 0 ] ) ;
/* We store received link local address in the other part of BA_NEXT_HOP eattr. */
if ( * x = = 32 )
{
memcpy ( nh + 1 , x + 17 , 16 ) ;
ipa_ntoh ( nh [ 1 ] ) ;
}
else
nh [ 1 ] = IPA_NONE ;
2009-04-23 21:15:07 +00:00
/* Also ignore one reserved byte */
len - = * x + 2 ;
x + = * x + 2 ;
2000-05-04 09:03:31 +00:00
if ( bgp_get_nexthop ( p , a0 ) )
{
a = rta_lookup ( a0 ) ;
while ( len )
{
rte * e ;
DECODE_PREFIX ( x , len ) ;
DBG ( " Add %I/%d \n " , prefix , pxlen ) ;
e = rte_get_temp ( rta_clone ( a ) ) ;
n = net_get ( p - > p . table , prefix , pxlen ) ;
e - > net = n ;
e - > pflags = 0 ;
2009-06-01 12:07:13 +00:00
rte_update ( p - > p . table , n , & p - > p , & p - > p , e ) ;
2009-06-04 11:31:09 +00:00
if ( bgp_apply_limits ( p ) < 0 )
goto bad2 ;
2000-05-04 09:03:31 +00:00
}
rta_free ( a ) ;
}
}
return ;
2009-06-04 11:31:09 +00:00
bad :
2000-05-04 09:03:31 +00:00
bgp_error ( conn , 3 , 9 , start , len0 ) ;
2009-06-04 11:31:09 +00:00
bad2 :
2000-04-01 09:17:33 +00:00
if ( a )
rta_free ( a ) ;
2000-05-04 09:03:31 +00:00
return ;
}
# endif
static void
bgp_rx_update ( struct bgp_conn * conn , byte * pkt , int len )
{
struct bgp_proto * p = conn - > bgp ;
byte * withdrawn , * attrs , * nlri ;
int withdrawn_len , attr_len , nlri_len ;
2009-02-26 13:23:54 +00:00
BGP_TRACE_RL ( & rl_rcv_update , D_PACKETS , " Got UPDATE " ) ;
2010-02-02 09:14:21 +00:00
/* Workaround for some BGP implementations that skip initial KEEPALIVE */
if ( conn - > state = = BS_OPENCONFIRM )
bgp_conn_enter_established_state ( conn ) ;
2000-05-04 09:03:31 +00:00
if ( conn - > state ! = BS_ESTABLISHED )
{ bgp_error ( conn , 5 , 0 , NULL , 0 ) ; return ; }
bgp_start_timer ( conn - > hold_timer , conn - > hold_time ) ;
/* Find parts of the packet and check sizes */
if ( len < 23 )
{
bgp_error ( conn , 1 , 2 , pkt + 16 , 2 ) ;
return ;
}
withdrawn = pkt + 21 ;
withdrawn_len = get_u16 ( pkt + 19 ) ;
if ( withdrawn_len + 23 > len )
goto malformed ;
attrs = withdrawn + withdrawn_len + 2 ;
attr_len = get_u16 ( attrs - 2 ) ;
if ( withdrawn_len + attr_len + 23 > len )
goto malformed ;
nlri = attrs + attr_len ;
nlri_len = len - withdrawn_len - attr_len - 23 ;
if ( ! attr_len & & nlri_len )
goto malformed ;
DBG ( " Sizes: withdrawn=%d, attrs=%d, NLRI=%d \n " , withdrawn_len , attr_len , nlri_len ) ;
lp_flush ( bgp_linpool ) ;
bgp_do_rx_update ( conn , withdrawn , withdrawn_len , nlri , nlri_len , attrs , attr_len ) ;
return ;
malformed :
2000-04-25 21:13:25 +00:00
bgp_error ( conn , 3 , 1 , NULL , 0 ) ;
}
static struct {
byte major , minor ;
byte * msg ;
} bgp_msg_table [ ] = {
{ 1 , 0 , " Invalid message header " } ,
{ 1 , 1 , " Connection not synchronized " } ,
{ 1 , 2 , " Bad message length " } ,
{ 1 , 3 , " Bad message type " } ,
{ 2 , 0 , " Invalid OPEN message " } ,
{ 2 , 1 , " Unsupported version number " } ,
{ 2 , 2 , " Bad peer AS " } ,
{ 2 , 3 , " Bad BGP identifier " } ,
{ 2 , 4 , " Unsupported optional parameter " } ,
{ 2 , 5 , " Authentication failure " } ,
{ 2 , 6 , " Unacceptable hold time " } ,
2008-10-26 21:36:08 +00:00
{ 2 , 7 , " Required capability missing " } , /* [RFC3392] */
2010-05-02 20:41:40 +00:00
{ 2 , 8 , " No supported AFI/SAFI " } , /* This error msg is nonstandard */
2000-04-25 21:13:25 +00:00
{ 3 , 0 , " Invalid UPDATE message " } ,
{ 3 , 1 , " Malformed attribute list " } ,
{ 3 , 2 , " Unrecognized well-known attribute " } ,
{ 3 , 3 , " Missing mandatory attribute " } ,
{ 3 , 4 , " Invalid attribute flags " } ,
{ 3 , 5 , " Invalid attribute length " } ,
{ 3 , 6 , " Invalid ORIGIN attribute " } ,
{ 3 , 7 , " AS routing loop " } , /* Deprecated */
{ 3 , 8 , " Invalid NEXT_HOP attribute " } ,
{ 3 , 9 , " Optional attribute error " } ,
{ 3 , 10 , " Invalid network field " } ,
{ 3 , 11 , " Malformed AS_PATH " } ,
{ 4 , 0 , " Hold timer expired " } ,
{ 5 , 0 , " Finite state machine error " } ,
2008-12-24 16:24:41 +00:00
{ 6 , 0 , " Cease " } , /* Subcodes are according to [RFC4486] */
{ 6 , 1 , " Maximum number of prefixes reached " } ,
{ 6 , 2 , " Administrative shutdown " } ,
{ 6 , 3 , " Peer de-configured " } ,
{ 6 , 4 , " Administrative reset " } ,
{ 6 , 5 , " Connection rejected " } ,
{ 6 , 6 , " Other configuration change " } ,
{ 6 , 7 , " Connection collision resolution " } ,
{ 6 , 8 , " Out of Resources " }
2000-04-25 21:13:25 +00:00
} ;
2008-12-19 00:34:39 +00:00
/**
* bgp_error_dsc - return BGP error description
* @ code : BGP error code
* @ subcode : BGP error subcode
*
* bgp_error_dsc ( ) returns error description for BGP errors
* which might be static string or given temporary buffer .
*/
2010-04-06 22:19:23 +00:00
const char *
bgp_error_dsc ( unsigned code , unsigned subcode )
2008-12-19 00:34:39 +00:00
{
2010-04-06 22:19:23 +00:00
static char buff [ 32 ] ;
2008-12-19 00:34:39 +00:00
unsigned i ;
for ( i = 0 ; i < ARRAY_SIZE ( bgp_msg_table ) ; i + + )
if ( bgp_msg_table [ i ] . major = = code & & bgp_msg_table [ i ] . minor = = subcode )
{
return bgp_msg_table [ i ] . msg ;
}
bsprintf ( buff , " Unknown error %d.%d " , code , subcode ) ;
return buff ;
}
2000-04-25 21:13:25 +00:00
void
2009-06-06 22:38:38 +00:00
bgp_log_error ( struct bgp_proto * p , u8 class , char * msg , unsigned code , unsigned subcode , byte * data , unsigned len )
2000-04-25 21:13:25 +00:00
{
2008-12-19 00:34:39 +00:00
const byte * name ;
2000-04-25 21:13:25 +00:00
byte * t , argbuf [ 36 ] ;
unsigned i ;
2009-06-06 22:38:38 +00:00
/* Don't report Cease messages generated by myself */
if ( code = = 6 & & class = = BE_BGP_TX )
2000-04-25 23:08:03 +00:00
return ;
2010-04-06 22:19:23 +00:00
name = bgp_error_dsc ( code , subcode ) ;
2000-04-25 21:13:25 +00:00
t = argbuf ;
if ( len )
{
* t + + = ' : ' ;
* t + + = ' ' ;
2009-09-24 21:14:44 +00:00
if ( ( code = = 2 ) & & ( subcode = = 2 ) & & ( ( len = = 2 ) | | ( len = = 4 ) ) )
{
/* Bad peer AS - we would like to print the AS */
t + = bsprintf ( t , " %d " , ( len = = 2 ) ? get_u16 ( data ) : get_u32 ( data ) ) ;
goto done ;
}
2000-04-25 21:13:25 +00:00
if ( len > 16 )
len = 16 ;
for ( i = 0 ; i < len ; i + + )
t + = bsprintf ( t , " %02x " , data [ i ] ) ;
}
2009-09-24 21:14:44 +00:00
done :
2000-04-25 21:13:25 +00:00
* t = 0 ;
log ( L_REMOTE " %s: %s: %s%s " , p - > p . name , msg , name , argbuf ) ;
2000-03-30 10:44:20 +00:00
}
static void
bgp_rx_notification ( struct bgp_conn * conn , byte * pkt , int len )
{
2008-12-24 16:24:41 +00:00
struct bgp_proto * p = conn - > bgp ;
2000-03-30 10:44:20 +00:00
if ( len < 21 )
{
2000-04-25 21:13:25 +00:00
bgp_error ( conn , 1 , 2 , pkt + 16 , 2 ) ;
2000-03-30 10:44:20 +00:00
return ;
}
2008-12-19 00:34:39 +00:00
unsigned code = pkt [ 19 ] ;
unsigned subcode = pkt [ 20 ] ;
2009-06-06 22:38:38 +00:00
int err = ( code ! = 6 ) ;
2008-12-24 16:24:41 +00:00
2009-06-06 22:38:38 +00:00
bgp_log_error ( p , BE_BGP_RX , " Received " , code , subcode , pkt + 21 , len - 21 ) ;
bgp_store_error ( p , conn , BE_BGP_RX , ( code < < 16 ) | subcode ) ;
2009-03-05 10:52:47 +00:00
2008-12-24 16:24:41 +00:00
# ifndef IPV6
2009-03-13 11:49:44 +00:00
if ( ( code = = 2 ) & & ( ( subcode = = 4 ) | | ( subcode = = 7 ) )
2008-12-24 16:24:41 +00:00
/* Error related to capability:
* 4 - Peer does not support capabilities at all .
* 7 - Peer request some capability . Strange unless it is IPv6 only peer .
*/
2009-03-13 11:49:44 +00:00
& & ( p - > cf - > capabilities = = 2 )
/* Capabilities are not explicitly enabled or disabled, therefore heuristic is used */
& & ( conn - > start_state = = BSS_CONNECT )
/* Failed connection attempt have used capabilities */
& & ( p - > cf - > remote_as < = 0xFFFF ) )
/* Not possible with disabled capabilities */
{
/* We try connect without capabilities */
log ( L_WARN " %s: Capability related error received, retry with capabilities disabled " , p - > p . name ) ;
2009-06-06 22:38:38 +00:00
p - > start_state = BSS_CONNECT_NOCAP ;
err = 0 ;
2008-12-24 16:24:41 +00:00
}
# endif
2008-12-19 00:34:39 +00:00
bgp_conn_enter_close_state ( conn ) ;
2000-03-30 10:44:20 +00:00
bgp_schedule_packet ( conn , PKT_SCHEDULE_CLOSE ) ;
2009-06-06 22:38:38 +00:00
if ( err )
{
bgp_update_startup_delay ( p ) ;
bgp_stop ( p , 0 ) ;
}
2000-03-30 10:44:20 +00:00
}
static void
2004-06-05 09:27:17 +00:00
bgp_rx_keepalive ( struct bgp_conn * conn )
2000-03-30 10:44:20 +00:00
{
2000-05-02 16:07:41 +00:00
struct bgp_proto * p = conn - > bgp ;
BGP_TRACE ( D_PACKETS , " Got KEEPALIVE " ) ;
2000-03-30 10:44:20 +00:00
bgp_start_timer ( conn - > hold_timer , conn - > hold_time ) ;
switch ( conn - > state )
{
case BS_OPENCONFIRM :
2008-12-19 00:34:39 +00:00
bgp_conn_enter_established_state ( conn ) ;
2000-03-30 10:44:20 +00:00
break ;
case BS_ESTABLISHED :
break ;
default :
2000-04-25 21:13:25 +00:00
bgp_error ( conn , 5 , 0 , NULL , 0 ) ;
2000-03-30 10:44:20 +00:00
}
}
2009-11-26 19:47:59 +00:00
static void
bgp_rx_route_refresh ( struct bgp_conn * conn , byte * pkt , int len )
{
struct bgp_proto * p = conn - > bgp ;
BGP_TRACE ( D_PACKETS , " Got ROUTE-REFRESH " ) ;
if ( conn - > state ! = BS_ESTABLISHED )
{ bgp_error ( conn , 5 , 0 , NULL , 0 ) ; return ; }
if ( ! p - > cf - > enable_refresh )
{ bgp_error ( conn , 1 , 3 , pkt + 18 , 1 ) ; return ; }
if ( len ! = ( BGP_HEADER_LENGTH + 4 ) )
{ bgp_error ( conn , 1 , 2 , pkt + 16 , 2 ) ; return ; }
/* FIXME - we ignore AFI/SAFI values, as we support
just one value and even an error code for an invalid
request is not defined */
proto_request_feeding ( & p - > p ) ;
}
2000-06-04 17:06:18 +00:00
/**
* bgp_rx_packet - handle a received packet
* @ conn : BGP connection
* @ pkt : start of the packet
* @ len : packet size
*
* bgp_rx_packet ( ) takes a newly received packet and calls the corresponding
* packet handler according to the packet type .
*/
2000-03-30 10:44:20 +00:00
static void
bgp_rx_packet ( struct bgp_conn * conn , byte * pkt , unsigned len )
{
2010-01-03 11:17:52 +00:00
byte type = pkt [ 18 ] ;
DBG ( " BGP: Got packet %02x (%d bytes) \n " , type , len ) ;
if ( conn - > bgp - > p . mrtdump & MD_MESSAGES )
mrt_dump_bgp_packet ( conn , pkt , len ) ;
switch ( type )
2000-03-30 10:44:20 +00:00
{
case PKT_OPEN : return bgp_rx_open ( conn , pkt , len ) ;
case PKT_UPDATE : return bgp_rx_update ( conn , pkt , len ) ;
case PKT_NOTIFICATION : return bgp_rx_notification ( conn , pkt , len ) ;
2004-06-05 09:27:17 +00:00
case PKT_KEEPALIVE : return bgp_rx_keepalive ( conn ) ;
2009-11-26 19:47:59 +00:00
case PKT_ROUTE_REFRESH : return bgp_rx_route_refresh ( conn , pkt , len ) ;
2000-04-25 21:13:25 +00:00
default : bgp_error ( conn , 1 , 3 , pkt + 18 , 1 ) ;
2000-03-30 10:44:20 +00:00
}
2000-03-21 15:53:50 +00:00
}
2000-06-04 17:06:18 +00:00
/**
* bgp_rx - handle received data
* @ sk : socket
* @ size : amount of data received
*
* bgp_rx ( ) is called by the socket layer whenever new data arrive from
* the underlying TCP connection . It assembles the data fragments to packets ,
* checks their headers and framing and passes complete packets to
* bgp_rx_packet ( ) .
*/
2000-03-21 15:53:50 +00:00
int
bgp_rx ( sock * sk , int size )
{
struct bgp_conn * conn = sk - > data ;
byte * pkt_start = sk - > rbuf ;
byte * end = pkt_start + size ;
2000-03-30 10:44:20 +00:00
unsigned i , len ;
2000-03-21 15:53:50 +00:00
DBG ( " BGP: RX hook: Got %d bytes \n " , size ) ;
while ( end > = pkt_start + BGP_HEADER_LENGTH )
{
2008-12-19 00:34:39 +00:00
if ( ( conn - > state = = BS_CLOSE ) | | ( conn - > sk ! = sk ) )
return 0 ;
2000-03-30 10:44:20 +00:00
for ( i = 0 ; i < 16 ; i + + )
if ( pkt_start [ i ] ! = 0xff )
{
2000-04-25 21:13:25 +00:00
bgp_error ( conn , 1 , 1 , NULL , 0 ) ;
2000-03-30 10:44:20 +00:00
break ;
}
len = get_u16 ( pkt_start + 16 ) ;
if ( len < BGP_HEADER_LENGTH | | len > BGP_MAX_PACKET_LENGTH )
{
2000-04-25 21:13:25 +00:00
bgp_error ( conn , 1 , 2 , pkt_start + 16 , 2 ) ;
2000-03-30 10:44:20 +00:00
break ;
}
2000-04-19 13:54:35 +00:00
if ( end < pkt_start + len )
break ;
bgp_rx_packet ( conn , pkt_start , len ) ;
pkt_start + = len ;
2000-03-21 15:53:50 +00:00
}
if ( pkt_start ! = sk - > rbuf )
{
memmove ( sk - > rbuf , pkt_start , end - pkt_start ) ;
sk - > rpos = sk - > rbuf + ( end - pkt_start ) ;
}
return 0 ;
}