mirror of
https://gitlab.nic.cz/labs/bird.git
synced 2024-12-23 10:11:53 +00:00
e8cad1f275
The code contains hard to debug bug where we periodically do some kind of error. The problem is caused by weird values after the AgentX PDU header, exactly where the first OID should lie. We expend value less than 15 but we found values like 0x00003b47. We found possible cause on assignment to socket's receive buffer position in proto/snmp/subagent.c:snmp_rx at line 1569. An erroneous behavior may have been caused by off-by-on error. More investigation is needed to gain full picture. To resolve this issue we use much more simpler approach. We will set max packet size and wait until whole packet has arrived.
1284 lines
34 KiB
C
1284 lines
34 KiB
C
/*
|
|
* BIRD -- Simple Network Management Protocol (SNMP)
|
|
* BGP4-MIB bgpPeerTable
|
|
*
|
|
* (c) 2022 Vojtech Vilimek <vojtech.vilimek@nic.cz>
|
|
* (c) 2022 CZ.NIC z.s.p.o
|
|
*
|
|
* Can be freely distributed and used under the terms of the GNU GPL.
|
|
*/
|
|
|
|
#include "snmp.h"
|
|
#include "snmp_utils.h"
|
|
#include "subagent.h"
|
|
#include "bgp_mib.h"
|
|
|
|
STATIC_ASSERT(BGP_MIB_IDLE == BS_IDLE + 1);
|
|
STATIC_ASSERT(BGP_MIB_CONNECT == BS_CONNECT + 1);
|
|
STATIC_ASSERT(BGP_MIB_ACTIVE == BS_ACTIVE + 1);
|
|
STATIC_ASSERT(BGP_MIB_OPENSENT == BS_OPENSENT + 1);
|
|
STATIC_ASSERT(BGP_MIB_OPENCONFIRM == BS_OPENCONFIRM + 1);
|
|
STATIC_ASSERT(BGP_MIB_ESTABLISHED == BS_ESTABLISHED + 1);
|
|
|
|
/* hash table macros */
|
|
#define SNMP_HASH_KEY(n) n->peer_ip
|
|
#define SNMP_HASH_NEXT(n) n->next
|
|
#define SNMP_HASH_EQ(ip1, ip2) ip4_equal(ip1, ip2)
|
|
#define SNMP_HASH_FN(ip) ip4_hash(ip)
|
|
|
|
#define SNMP_HASH_LESS4(ip1, ip2) ip4_less(ip1, ip2)
|
|
#define SNMP_HASH_LESS6(ip1, ip2) ip6_less(ip1, ip2)
|
|
|
|
/* hash table only store ip4 addresses */
|
|
#define SNMP_HASH_LESS(ip1, ip2) SNMP_HASH_LESS4(ip1,ip2)
|
|
|
|
static inline void ip4_to_oid(struct oid *oid, ip4_addr addr);
|
|
|
|
|
|
static inline void
|
|
snmp_hash_add_peer(struct snmp_proto *p, struct snmp_bgp_peer *peer)
|
|
{
|
|
HASH_INSERT(p->bgp_hash, SNMP_HASH, peer);
|
|
}
|
|
|
|
static inline struct snmp_bgp_peer *
|
|
snmp_hash_find(struct snmp_proto *p, ip4_addr key)
|
|
{
|
|
return HASH_FIND(p->bgp_hash, SNMP_HASH, key);
|
|
}
|
|
|
|
static inline void
|
|
snmp_bgp_last_error(const struct bgp_proto *bgp, char err[2])
|
|
{
|
|
err[0] = bgp->last_error_code & 0x00FF0000 >> 16;
|
|
err[1] = bgp->last_error_code & 0x000000FF;
|
|
}
|
|
|
|
static u8
|
|
bgp_get_candidate(u32 field)
|
|
{
|
|
const u8 translation_table[] = {
|
|
[SNMP_BGP_PEER_IDENTIFIER] = BGP_INTERNAL_PEER_IDENTIFIER,
|
|
[SNMP_BGP_STATE] = BGP_INTERNAL_STATE,
|
|
[SNMP_BGP_ADMIN_STATUS] = BGP_INTERNAL_ADMIN_STATUS,
|
|
[SNMP_BGP_NEGOTIATED_VERSION] = BGP_INTERNAL_NEGOTIATED_VERSION,
|
|
[SNMP_BGP_LOCAL_ADDR] = BGP_INTERNAL_LOCAL_ADDR,
|
|
[SNMP_BGP_LOCAL_PORT] = BGP_INTERNAL_LOCAL_PORT,
|
|
[SNMP_BGP_REMOTE_ADDR] = BGP_INTERNAL_REMOTE_ADDR,
|
|
[SNMP_BGP_REMOTE_PORT] = BGP_INTERNAL_REMOTE_PORT,
|
|
[SNMP_BGP_REMOTE_AS] = BGP_INTERNAL_REMOTE_AS,
|
|
[SNMP_BGP_RX_UPDATES] = BGP_INTERNAL_RX_UPDATES,
|
|
[SNMP_BGP_TX_UPDATES] = BGP_INTERNAL_TX_UPDATES,
|
|
[SNMP_BGP_RX_MESSAGES] = BGP_INTERNAL_RX_MESSAGES,
|
|
[SNMP_BGP_TX_MESSAGES] = BGP_INTERNAL_TX_MESSAGES,
|
|
[SNMP_BGP_LAST_ERROR] = BGP_INTERNAL_LAST_ERROR,
|
|
[SNMP_BGP_FSM_TRANSITIONS] = BGP_INTERNAL_FSM_TRANSITIONS,
|
|
[SNMP_BGP_FSM_ESTABLISHED_TIME] = BGP_INTERNAL_FSM_ESTABLISHED_TIME,
|
|
[SNMP_BGP_RETRY_INTERVAL] = BGP_INTERNAL_RETRY_INTERVAL,
|
|
[SNMP_BGP_HOLD_TIME] = BGP_INTERNAL_HOLD_TIME,
|
|
[SNMP_BGP_KEEPALIVE] = BGP_INTERNAL_KEEPALIVE,
|
|
[SNMP_BGP_HOLD_TIME_CONFIGURED] = BGP_INTERNAL_HOLD_TIME_CONFIGURED,
|
|
[SNMP_BGP_KEEPALIVE_CONFIGURED] = BGP_INTERNAL_KEEPALIVE_CONFIGURED,
|
|
[SNMP_BGP_ORIGINATION_INTERVAL] = BGP_INTERNAL_ORIGINATION_INTERVAL,
|
|
[SNMP_BGP_MIN_ROUTE_ADVERTISEMENT] = BGP_INTERNAL_MIN_ROUTE_ADVERTISEMENT,
|
|
[SNMP_BGP_IN_UPDATE_ELAPSED_TIME] = BGP_INTERNAL_IN_UPDATE_ELAPSED_TIME,
|
|
};
|
|
|
|
/*
|
|
* First value is in secord cell of array translation_table, as the
|
|
* SNMP_BPG_IDENTIFIER == 1
|
|
*/
|
|
if (field > 0 && field <= ARRAY_SIZE(translation_table)- 1)
|
|
return translation_table[field];
|
|
if (field == 0)
|
|
return BGP_INTERNAL_PEER_ENTRY;
|
|
else
|
|
return BGP_INTERNAL_PEER_TABLE_END;
|
|
}
|
|
|
|
/**
|
|
* snmp_bgp_state - linearize oid from BGP4-MIB
|
|
* @oid: prefixed object identifier from BGP4-MIB::bgp subtree
|
|
*
|
|
* Returns linearized state for Get-PDU, GetNext-PDU and GetBulk-PDU packets.
|
|
*/
|
|
static u8
|
|
snmp_bgp_state(const struct oid *oid)
|
|
{
|
|
/*
|
|
* Ids of Object Identifier that are already checked:
|
|
* internet oid.prefix
|
|
* v...... v
|
|
* (*oid): .1.3.6.1.2.1.15
|
|
* -> BGP4-MIB::bgp (root)
|
|
*/
|
|
|
|
if (snmp_is_oid_empty(oid))
|
|
return BGP_INTERNAL_END;
|
|
|
|
u8 state = BGP_INTERNAL_NO_VALUE;
|
|
|
|
u8 candidate;
|
|
switch (oid->n_subid)
|
|
{
|
|
default:
|
|
if (oid->n_subid < 2)
|
|
{
|
|
state = BGP_INTERNAL_INVALID;
|
|
break;
|
|
}
|
|
|
|
/* fall through */
|
|
|
|
/*
|
|
* Between ids[5] and ids[8] (n_subid == 9) should be IP address.
|
|
* Validity is checked later in execution because
|
|
* this field also could mean a query boundry (upper or lower).
|
|
*/
|
|
case 9:
|
|
case 8:
|
|
case 7:
|
|
case 6:
|
|
case 5:
|
|
state = bgp_get_candidate(oid->ids[4]);
|
|
|
|
/* fall through */
|
|
|
|
case 4:
|
|
if (oid->ids[3] == SNMP_BGP_PEER_ENTRY)
|
|
state = (state == BGP_INTERNAL_NO_VALUE) ?
|
|
BGP_INTERNAL_PEER_ENTRY : state;
|
|
else
|
|
state = BGP_INTERNAL_NO_VALUE;
|
|
|
|
/* fall through */
|
|
|
|
case 3:
|
|
/* u8 candidate; */
|
|
switch (oid->ids[2])
|
|
{
|
|
|
|
case SNMP_BGP_VERSION:
|
|
state = BGP_INTERNAL_VERSION;
|
|
break;
|
|
case SNMP_BGP_LOCAL_AS:
|
|
state = BGP_INTERNAL_LOCAL_AS;
|
|
break;
|
|
case SNMP_BGP_PEER_TABLE:
|
|
/* We use candidate to avoid overriding more specific state */
|
|
candidate = BGP_INTERNAL_PEER_TABLE;
|
|
break;
|
|
case SNMP_BGP_IDENTIFIER:
|
|
state = BGP_INTERNAL_IDENTIFIER;
|
|
break;
|
|
|
|
default: /* test fails */
|
|
/* We force state invalidation */
|
|
if (oid->ids[2] < SNMP_BGP_VERSION)
|
|
{
|
|
state = BGP_INTERNAL_NO_VALUE;
|
|
candidate = BGP_INTERNAL_NO_VALUE;
|
|
}
|
|
else /* oid->ids[2] > SNMP_BGP_PEER_TABLE */
|
|
state = BGP_INTERNAL_END;
|
|
}
|
|
state = (state == BGP_INTERNAL_NO_VALUE) ?
|
|
candidate : state;
|
|
|
|
/* fall through */
|
|
|
|
case 2: /* We found bare BGP4-MIB::bgp ObjectId */
|
|
if (state == BGP_INTERNAL_NO_VALUE ||
|
|
state == BGP_INTERNAL_INVALID)
|
|
state = BGP_INTERNAL_BGP;
|
|
}
|
|
|
|
return state;
|
|
}
|
|
|
|
void
|
|
snmp_bgp_reg_ok(struct snmp_proto *p, struct agentx_response *r, struct oid *oid)
|
|
{
|
|
const struct oid *in_buf = ((void *) r) + sizeof(r);
|
|
struct oid *dup = snmp_prefixize(p, in_buf);
|
|
|
|
ASSUME(snmp_bgp_state(oid) == snmp_bgp_state(dup));
|
|
mb_free(dup);
|
|
}
|
|
|
|
void
|
|
snmp_bgp_reg_failed(struct snmp_proto *p, struct agentx_response UNUSED *r, struct oid UNUSED *oid)
|
|
{
|
|
// TODO add more sensible action
|
|
snmp_stop_subagent(p);
|
|
}
|
|
|
|
/*
|
|
* snmp_bgp_notify_common - common functionaly for BGP4-MIB notifications
|
|
* @p: SNMP protocol instance
|
|
* @type
|
|
*
|
|
*/
|
|
static void
|
|
snmp_bgp_notify_common(struct snmp_proto *p, uint type, ip4_addr ip4, char last_error[], uint state_val)
|
|
{
|
|
#define SNMP_OID_SIZE_FROM_LEN(x) (sizeof(struct oid) + (x) * sizeof(u32))
|
|
|
|
/* OIDs, VB type headers, octet string, ip4 address, integer */
|
|
uint sz = 3 * SNMP_OID_SIZE_FROM_LEN(9) + 3 * 4 + 8 + 8 + 4;
|
|
|
|
/* trap OID bgpEstablishedNotification (.1.3.6.1.2.1.0.1) */
|
|
struct oid *head = mb_alloc(p->pool, SNMP_OID_SIZE_FROM_LEN(3)) + sz;
|
|
head->n_subid = 3;
|
|
head->prefix = 2;
|
|
head->include = head->pad = 0;
|
|
|
|
u32 trap_ids[] = { 1, 0, type };
|
|
for (uint i = 0; i < head->n_subid; i++)
|
|
head->ids[i] = trap_ids[i];
|
|
|
|
|
|
void *data = (void *) head + sz;
|
|
|
|
struct agentx_varbind *addr_vb = data;
|
|
// TODO remove magic constants; use measuring functions instead
|
|
/* +4 for varbind header, +8 for octet string */
|
|
struct agentx_varbind *error_vb = data + SNMP_OID_SIZE_FROM_LEN(9) + 4 + 8;
|
|
struct agentx_varbind *state_vb = (void *) error_vb + SNMP_OID_SIZE_FROM_LEN(9) + 4 + 8;
|
|
|
|
addr_vb->pad = error_vb->pad = state_vb->pad = 0;
|
|
|
|
struct oid *addr = &addr_vb->name;
|
|
struct oid *error = &error_vb->name;
|
|
struct oid *state = &state_vb->name;
|
|
|
|
addr->n_subid = error->n_subid = state->n_subid = 9;
|
|
addr->prefix = error->prefix = state->prefix = 2;
|
|
addr->include = error->include = state->include = 0;
|
|
addr->pad = error->pad = state->pad = 0;
|
|
|
|
u32 oid_ids[] = {
|
|
SNMP_MIB_2, SNMP_BGP4_MIB, SNMP_BGP_PEER_TABLE, SNMP_BGP_PEER_ENTRY
|
|
};
|
|
|
|
for (uint i = 0; i < sizeof(oid_ids) / sizeof(oid_ids[0]); i++)
|
|
addr->ids[i] = error->ids[i] = state->ids[i] = oid_ids[i];
|
|
|
|
addr->ids[4] = SNMP_BGP_REMOTE_ADDR;
|
|
error->ids[4] = SNMP_BGP_LAST_ERROR;
|
|
state->ids[4] = SNMP_BGP_STATE;
|
|
|
|
for (uint i = 0; i < 4; i++)
|
|
addr->ids[5 + i] = error->ids[5 + i] = state->ids[5 + i] \
|
|
= (ip4_to_u32(ip4) >> (8 * (3-i))) & 0xFF;
|
|
|
|
snmp_varbind_ip4(addr_vb, 100, ip4);
|
|
|
|
snmp_varbind_nstr(error_vb, 100, last_error, 2);
|
|
|
|
snmp_varbind_int(state_vb, 100, state_val);
|
|
|
|
snmp_notify_pdu(p, head, data, sz, 0);
|
|
mb_free(head);
|
|
mb_free(data);
|
|
|
|
#undef SNMP_OID_SIZE_FROM_LEN
|
|
}
|
|
|
|
/*
|
|
* snmp_bgp_fsm_state - extract BGP FSM state for SNMP BGP4-MIB
|
|
* @bgp_proto: BGP instance
|
|
*
|
|
* Return FSM state in BGP4-MIB encoding
|
|
*/
|
|
static inline uint
|
|
snmp_bgp_fsm_state(const struct bgp_proto *bgp_proto)
|
|
{
|
|
const struct bgp_conn *bgp_conn = bgp_proto->conn;
|
|
const struct bgp_conn *bgp_in = &bgp_proto->incoming_conn;
|
|
const struct bgp_conn *bgp_out = &bgp_proto->outgoing_conn;
|
|
|
|
if (bgp_conn)
|
|
return bgp_conn->state + 1;
|
|
|
|
if (MAX(bgp_in->state, bgp_out->state) == BS_CLOSE &&
|
|
MIN(bgp_in->state, bgp_out->state) != BS_CLOSE)
|
|
return MIN(bgp_in->state, bgp_out->state);
|
|
if (MIN(bgp_in->state, bgp_out->state) == BS_CLOSE)
|
|
return BS_IDLE;
|
|
|
|
return MAX(bgp_in->state, bgp_out->state);
|
|
}
|
|
|
|
static void
|
|
snmp_bgp_notify_wrapper(struct snmp_proto *p, struct bgp_proto *bgp, uint type)
|
|
{
|
|
// possibly dangerous
|
|
ip4_addr ip4 = ipa_to_ip4(bgp->remote_ip);
|
|
char last_error[2];
|
|
snmp_bgp_last_error(bgp, last_error);
|
|
uint state_val = snmp_bgp_fsm_state(bgp);
|
|
snmp_bgp_notify_common(p, type, ip4, last_error, state_val);
|
|
}
|
|
|
|
void
|
|
snmp_bgp_notify_established(struct snmp_proto *p, struct bgp_proto *bgp)
|
|
{
|
|
/* .1.3.6.1.2.15.0.>1< i.e. BGP4-MIB::bgpEstablishedNotification */
|
|
snmp_bgp_notify_wrapper(p, bgp, 1);
|
|
}
|
|
|
|
void
|
|
snmp_bgp_notify_backward_trans(struct snmp_proto *p, struct bgp_proto *bgp)
|
|
{
|
|
/* .1.3.6.1.2.15.0.>2< i.e. BGP4-MIB::bgpBackwardTransNotification */
|
|
snmp_bgp_notify_wrapper(p, bgp, 2);
|
|
}
|
|
|
|
void
|
|
snmp_bgp_register(struct snmp_proto *p)
|
|
{
|
|
//u32 bgp_mib_prefix[] = {1, 15, 1};
|
|
u32 bgp_mib_prefix[] = { 1, 15 };
|
|
|
|
{
|
|
/* Register the whole BGP4-MIB::bgp root tree node */
|
|
struct snmp_registration *reg;
|
|
reg = snmp_registration_create(p, SNMP_BGP4_MIB);
|
|
|
|
struct oid *oid = mb_alloc(p->pool,
|
|
snmp_oid_sizeof(ARRAY_SIZE(bgp_mib_prefix)));
|
|
STORE_U8(oid->n_subid, ARRAY_SIZE(bgp_mib_prefix));
|
|
STORE_U8(oid->prefix, SNMP_MGMT);
|
|
|
|
memcpy(oid->ids, bgp_mib_prefix, sizeof(bgp_mib_prefix));
|
|
reg->oid = oid;
|
|
|
|
/*
|
|
* We set both upper bound and index to zero, therefore only single OID
|
|
* is being registered.
|
|
*/
|
|
snmp_register(p, oid, 0, 0, SNMP_REGISTER_TREE, SNMP_DEFAULT_CONTEXT);
|
|
}
|
|
}
|
|
|
|
static int
|
|
snmp_bgp_valid_ip4(struct oid *o)
|
|
{
|
|
return snmp_valid_ip4_index(o, 5);
|
|
}
|
|
|
|
|
|
static inline ip4_addr
|
|
ip4_from_oid(const struct oid *o)
|
|
{
|
|
return ip4_build(
|
|
o->n_subid > 5 ? (o->ids[5] & 0xff) : 0,
|
|
o->n_subid > 6 ? (o->ids[6] & 0xff) : 0,
|
|
o->n_subid > 7 ? (o->ids[7] & 0xff) : 0,
|
|
o->n_subid > 8 ? (o->ids[8] & 0xff) : 0
|
|
);
|
|
}
|
|
|
|
static inline void
|
|
ip4_to_oid(struct oid *o, ip4_addr addr)
|
|
{
|
|
u32 tmp = ip4_to_u32(addr);
|
|
ASSUME(o->n_subid >= 9);
|
|
STORE_U32(o->ids[5], (tmp & 0xFF000000) >> 24);
|
|
STORE_U32(o->ids[6], (tmp & 0x00FF0000) >> 16);
|
|
STORE_U32(o->ids[7], (tmp & 0x0000FF00) >> 8);
|
|
STORE_U32(o->ids[8], (tmp & 0x000000FF) >> 0);
|
|
}
|
|
|
|
static void
|
|
print_bgp_record(const struct bgp_proto *bgp_proto)
|
|
{
|
|
//struct proto_config *cf = bgp_proto->p.cf;
|
|
struct bgp_conn *conn = bgp_proto->conn;
|
|
|
|
DBG(" name: %s", cf->name);
|
|
DBG(".");
|
|
DBG(" rem. identifier: %u", bgp_proto->remote_id);
|
|
DBG(" local ip: %I", config->local_ip);
|
|
DBG(" remote ip: %I", config->remote_ip);
|
|
DBG(" local port: %u", config->local_port);
|
|
DBG(" remote port: %u", config->remote_port);
|
|
|
|
if (conn) {
|
|
DBG(" state: %u", conn->state);
|
|
DBG(" remote as: %u", conn->remote_caps->as4_number);
|
|
}
|
|
|
|
DBG(" in updates: %u", bgp_proto->stats.rx_updates);
|
|
DBG(" out updates: %u", bgp_proto->stats.tx_updates);
|
|
DBG(" in total: %u", bgp_proto->stats.rx_messages);
|
|
DBG(" out total: %u", bgp_proto->stats.tx_messages);
|
|
DBG(" fsm transitions: %u",
|
|
bgp_proto->stats.fsm_established_transitions);
|
|
|
|
DBG(" fsm total time: -- (0)"); // not supported by bird
|
|
DBG(" retry interval: %u", config->connect_retry_time);
|
|
|
|
DBG(" hold configurated: %u", config->hold_time );
|
|
DBG(" keep alive config: %u", config->keepalive_time );
|
|
|
|
DBG(" min AS origin. int.: -- (0)"); // not supported by bird
|
|
DBG(" min route advertisement: %u", 0 );
|
|
DBG(" in update elapsed time: %u", 0 );
|
|
|
|
if (!conn)
|
|
DBG(" no connection established");
|
|
|
|
DBG(" outgoinin_conn state %u", bgp_proto->outgoing_conn.state + 1);
|
|
DBG(" incoming_conn state: %u", bgp_proto->incoming_conn.state + 1);
|
|
}
|
|
|
|
static void
|
|
print_bgp_record_all(struct snmp_proto *p)
|
|
{
|
|
DBG("dumping watched bgp status");
|
|
HASH_WALK(p->bgp_hash, next, peer)
|
|
{
|
|
print_bgp_record(peer->bgp_proto);
|
|
}
|
|
HASH_WALK_END;
|
|
DBG("dumping watched end");
|
|
}
|
|
|
|
|
|
|
|
static inline int
|
|
is_dynamic(u8 state)
|
|
{
|
|
return (state >= BGP_INTERNAL_PEER_IDENTIFIER &&
|
|
state <= BGP_INTERNAL_IN_UPDATE_ELAPSED_TIME);
|
|
}
|
|
|
|
static inline int
|
|
is_static(u8 state)
|
|
{
|
|
return (state == BGP_INTERNAL_VERSION ||
|
|
state == BGP_INTERNAL_LOCAL_AS ||
|
|
state == BGP_INTERNAL_IDENTIFIER);
|
|
}
|
|
|
|
static inline int
|
|
snmp_bgp_has_value(u8 state)
|
|
{
|
|
if (state <= BGP_INTERNAL_BGP ||
|
|
state == BGP_INTERNAL_PEER_TABLE ||
|
|
state == BGP_INTERNAL_PEER_ENTRY ||
|
|
state == BGP_INTERNAL_PEER_TABLE_END ||
|
|
state >= BGP_INTERNAL_END)
|
|
return 0;
|
|
else
|
|
return 1;
|
|
}
|
|
|
|
/**
|
|
* snmp_bgp_get_valid - only states with valid value
|
|
* @state: BGP linearized state
|
|
*
|
|
* Returns @state if has value in BGP4-MIB, zero otherwise. Used for Get-PDU
|
|
* packets.
|
|
*/
|
|
u8
|
|
snmp_bgp_get_valid(u8 state)
|
|
{
|
|
if (state == BGP_INTERNAL_INVALID ||
|
|
state == BGP_INTERNAL_BGP ||
|
|
state == BGP_INTERNAL_PEER_TABLE ||
|
|
state == BGP_INTERNAL_PEER_ENTRY ||
|
|
state == BGP_INTERNAL_PEER_TABLE_END ||
|
|
state >= BGP_INTERNAL_END)
|
|
return 0;
|
|
else
|
|
return state;
|
|
}
|
|
|
|
/**
|
|
* snmp_bgp_next_state - next state that has value
|
|
* @state: BGP linearized state
|
|
*
|
|
* Returns successor state of @state with valid value in BG4-MIB. Used for
|
|
* GetNext-PDU and GetBulk-PDU packets.
|
|
*/
|
|
u8
|
|
snmp_bgp_next_state(u8 state)
|
|
{
|
|
switch (state)
|
|
{
|
|
case BGP_INTERNAL_LOCAL_AS:
|
|
case BGP_INTERNAL_PEER_TABLE:
|
|
case BGP_INTERNAL_PEER_ENTRY:
|
|
return BGP_INTERNAL_PEER_IDENTIFIER;
|
|
|
|
case BGP_INTERNAL_IN_UPDATE_ELAPSED_TIME:
|
|
case BGP_INTERNAL_PEER_TABLE_END:
|
|
return BGP_INTERNAL_IDENTIFIER;
|
|
|
|
case BGP_INTERNAL_IDENTIFIER:
|
|
case BGP_INTERNAL_END:
|
|
return BGP_INTERNAL_END;
|
|
|
|
default:
|
|
return state + 1;
|
|
}
|
|
}
|
|
|
|
int
|
|
snmp_bgp_is_supported(struct oid *o)
|
|
{
|
|
if (o->prefix == 2 && o->n_subid > 0 && o->ids[0] == 1)
|
|
{
|
|
if (o->n_subid == 2 && (o->ids[1] == SNMP_BGP4_MIB ||
|
|
o->ids[1] == SNMP_BGP_LOCAL_AS))
|
|
return 1;
|
|
else if (o->n_subid > 2 && o->ids[1] == SNMP_BGP_PEER_TABLE &&
|
|
o->ids[2] == SNMP_BGP_PEER_ENTRY)
|
|
{
|
|
if (o->n_subid == 3)
|
|
return 1;
|
|
if (o->n_subid == 8 && o->ids[3] > 0)
|
|
return 1;
|
|
}
|
|
return 0;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
oid_state_compare(const struct oid *oid, u8 state)
|
|
{
|
|
ASSUME(oid != NULL);
|
|
if (state >= BGP_INTERNAL_PEER_IDENTIFIER &&
|
|
state <= BGP_INTERNAL_IN_UPDATE_ELAPSED_TIME)
|
|
return (oid->n_subid > 9) - (oid->n_subid < 9);
|
|
if ((state >= BGP_INTERNAL_VERSION && state <= BGP_INTERNAL_PEER_TABLE) ||
|
|
(state == BGP_INTERNAL_IDENTIFIER))
|
|
return (oid->n_subid > 3) - (oid->n_subid < 3);
|
|
if (state == BGP_INTERNAL_PEER_ENTRY)
|
|
return (oid->n_subid > 4) - (oid->n_subid < 4);
|
|
if (state == BGP_INTERNAL_BGP)
|
|
return (oid->n_subid > 2) - (oid->n_subid < 2);
|
|
|
|
return -1;
|
|
}
|
|
|
|
static struct oid *
|
|
update_bgp_oid(struct oid *oid, u8 state)
|
|
{
|
|
if (state == BGP_INTERNAL_END || state == BGP_INTERNAL_INVALID ||
|
|
state == BGP_INTERNAL_NO_VALUE)
|
|
return oid;
|
|
|
|
/* No need to reallocate anything if the OID has same lin. state */
|
|
if (snmp_bgp_state(oid) == state)
|
|
{
|
|
if (state >= BGP_INTERNAL_PEER_IDENTIFIER &&
|
|
state <= BGP_INTERNAL_IN_UPDATE_ELAPSED_TIME &&
|
|
oid->n_subid == 9)
|
|
return oid;
|
|
if (state >= BGP_INTERNAL_VERSION &&
|
|
state <= BGP_INTERNAL_PEER_TABLE && oid->n_subid == 3)
|
|
return oid;
|
|
if (state == BGP_INTERNAL_PEER_ENTRY && oid->n_subid == 4)
|
|
return oid;
|
|
if (state == BGP_INTERNAL_BGP && oid->n_subid == 2)
|
|
return oid;
|
|
}
|
|
|
|
switch (state)
|
|
{
|
|
case BGP_INTERNAL_BGP:
|
|
/* This could potentially destroy same old data */
|
|
if (oid->n_subid != 2)
|
|
oid = mb_realloc(oid, snmp_oid_sizeof(2));
|
|
|
|
oid->n_subid = 2;
|
|
oid->ids[0] = SNMP_MIB_2;
|
|
oid->ids[1] = SNMP_BGP4_MIB;
|
|
break;
|
|
|
|
case BGP_INTERNAL_VERSION:
|
|
if (oid->n_subid != 3)
|
|
oid = mb_realloc(oid, snmp_oid_sizeof(3));
|
|
|
|
oid->n_subid = 3;
|
|
oid->ids[2] = SNMP_BGP_VERSION;
|
|
break;
|
|
|
|
case BGP_INTERNAL_LOCAL_AS:
|
|
if (oid->n_subid != 3)
|
|
oid = mb_realloc(oid, snmp_oid_sizeof(3));
|
|
|
|
oid->n_subid = 3;
|
|
oid->ids[2] = SNMP_BGP_LOCAL_AS;
|
|
break;
|
|
|
|
case BGP_INTERNAL_PEER_IDENTIFIER:
|
|
if (oid->n_subid != 9)
|
|
{
|
|
oid = mb_realloc(oid, snmp_oid_sizeof(9));
|
|
|
|
if (oid->n_subid < 6)
|
|
oid->ids[5] = 0;
|
|
if (oid->n_subid < 7)
|
|
oid->ids[6] = 0;
|
|
if (oid->n_subid < 8)
|
|
oid->ids[7] = 0;
|
|
if (oid->n_subid < 9)
|
|
oid->ids[8] = 0;
|
|
}
|
|
|
|
oid->ids[2] = SNMP_BGP_PEER_TABLE;
|
|
oid->ids[3] = SNMP_BGP_PEER_ENTRY;
|
|
|
|
oid->ids[4] = SNMP_BGP_PEER_IDENTIFIER;
|
|
oid->n_subid = 9;
|
|
break;
|
|
|
|
#define SNMP_UPDATE_CASE(num, update) \
|
|
case num: \
|
|
if (oid->n_subid != 9) \
|
|
{ \
|
|
oid = mb_realloc(oid, snmp_oid_sizeof(9)); \
|
|
\
|
|
if (oid->n_subid < 6) \
|
|
oid->ids[5] = 0; \
|
|
if (oid->n_subid < 7) \
|
|
oid->ids[6] = 0; \
|
|
if (oid->n_subid < 8) \
|
|
oid->ids[7] = 0; \
|
|
if (oid->n_subid < 9) \
|
|
oid->ids[8] = 0; \
|
|
} \
|
|
oid->n_subid = 9; \
|
|
oid->ids[4] = update; \
|
|
break;
|
|
|
|
SNMP_UPDATE_CASE(BGP_INTERNAL_STATE, SNMP_BGP_STATE)
|
|
|
|
SNMP_UPDATE_CASE(BGP_INTERNAL_ADMIN_STATUS, SNMP_BGP_ADMIN_STATUS)
|
|
|
|
SNMP_UPDATE_CASE(BGP_INTERNAL_NEGOTIATED_VERSION, SNMP_BGP_NEGOTIATED_VERSION)
|
|
|
|
SNMP_UPDATE_CASE(BGP_INTERNAL_LOCAL_ADDR, SNMP_BGP_LOCAL_ADDR)
|
|
|
|
SNMP_UPDATE_CASE(BGP_INTERNAL_LOCAL_PORT, SNMP_BGP_LOCAL_PORT)
|
|
|
|
SNMP_UPDATE_CASE(BGP_INTERNAL_REMOTE_ADDR, SNMP_BGP_REMOTE_ADDR)
|
|
|
|
SNMP_UPDATE_CASE(BGP_INTERNAL_REMOTE_PORT, SNMP_BGP_REMOTE_PORT)
|
|
|
|
SNMP_UPDATE_CASE(BGP_INTERNAL_REMOTE_AS, SNMP_BGP_REMOTE_AS)
|
|
|
|
SNMP_UPDATE_CASE(BGP_INTERNAL_RX_UPDATES, SNMP_BGP_RX_UPDATES)
|
|
|
|
SNMP_UPDATE_CASE(BGP_INTERNAL_TX_UPDATES, SNMP_BGP_TX_UPDATES)
|
|
|
|
SNMP_UPDATE_CASE(BGP_INTERNAL_RX_MESSAGES, SNMP_BGP_RX_MESSAGES)
|
|
|
|
SNMP_UPDATE_CASE(BGP_INTERNAL_TX_MESSAGES, SNMP_BGP_TX_MESSAGES)
|
|
|
|
SNMP_UPDATE_CASE(BGP_INTERNAL_LAST_ERROR, SNMP_BGP_LAST_ERROR)
|
|
|
|
SNMP_UPDATE_CASE(BGP_INTERNAL_FSM_TRANSITIONS, SNMP_BGP_FSM_TRANSITIONS)
|
|
|
|
SNMP_UPDATE_CASE(BGP_INTERNAL_FSM_ESTABLISHED_TIME, SNMP_BGP_FSM_ESTABLISHED_TIME)
|
|
|
|
SNMP_UPDATE_CASE(BGP_INTERNAL_RETRY_INTERVAL, SNMP_BGP_RETRY_INTERVAL)
|
|
|
|
SNMP_UPDATE_CASE(BGP_INTERNAL_HOLD_TIME, SNMP_BGP_HOLD_TIME)
|
|
|
|
SNMP_UPDATE_CASE(BGP_INTERNAL_KEEPALIVE, SNMP_BGP_KEEPALIVE)
|
|
|
|
SNMP_UPDATE_CASE(BGP_INTERNAL_HOLD_TIME_CONFIGURED, SNMP_BGP_HOLD_TIME_CONFIGURED)
|
|
|
|
SNMP_UPDATE_CASE(BGP_INTERNAL_KEEPALIVE_CONFIGURED, SNMP_BGP_KEEPALIVE_CONFIGURED)
|
|
|
|
SNMP_UPDATE_CASE(BGP_INTERNAL_ORIGINATION_INTERVAL, SNMP_BGP_ORIGINATION_INTERVAL)
|
|
|
|
SNMP_UPDATE_CASE(BGP_INTERNAL_MIN_ROUTE_ADVERTISEMENT, SNMP_BGP_MIN_ROUTE_ADVERTISEMENT)
|
|
|
|
SNMP_UPDATE_CASE(BGP_INTERNAL_IN_UPDATE_ELAPSED_TIME, SNMP_BGP_IN_UPDATE_ELAPSED_TIME)
|
|
|
|
case BGP_INTERNAL_IDENTIFIER:
|
|
if (oid->n_subid != 3)
|
|
oid = mb_realloc(oid, snmp_oid_sizeof(3));
|
|
|
|
oid->n_subid = 3;
|
|
oid->ids[2] = 4;
|
|
break;
|
|
|
|
default:
|
|
/* intentionally left blank */
|
|
break;
|
|
//die("update unavailable");
|
|
}
|
|
|
|
return oid;
|
|
#undef SNMP_UPDATE_CASE
|
|
}
|
|
|
|
static struct oid *
|
|
bgp_find_dynamic_oid(struct snmp_proto *p, struct oid *o_start, const struct oid *o_end, u8 start_state)
|
|
{
|
|
ASSUME(o_start != NULL);
|
|
ASSUME(o_end != NULL);
|
|
|
|
ip4_addr ip4 = ip4_from_oid(o_start);
|
|
ip4_addr dest;
|
|
|
|
if (o_start->n_subid < 9)
|
|
o_start->include = 1;
|
|
|
|
int check_dest = snmp_is_oid_empty(o_end);
|
|
if (check_dest)
|
|
{
|
|
u8 end_state = snmp_bgp_state(o_end);
|
|
dest = (start_state == end_state && o_end->n_subid > 5) ?
|
|
ip4_from_oid(o_end) :
|
|
ip4_from_u32(UINT32_MAX);
|
|
}
|
|
|
|
net_addr net;
|
|
net_fill_ip4(&net, ip4, IP4_MAX_PREFIX_LENGTH);
|
|
|
|
struct f_trie_walk_state ws;
|
|
|
|
trie_walk_init(&ws, p->bgp_trie, NULL, 0);
|
|
|
|
if (!trie_walk_next(&ws, &net))
|
|
return NULL;
|
|
|
|
/*
|
|
* If the o_end is empty, then there are no conditions on the ip4 address.
|
|
*/
|
|
int cmp = ip4_compare(net4_prefix(&net), dest);
|
|
if (cmp < 0 || (cmp == 0 && snmp_is_oid_empty(o_end)))
|
|
{
|
|
// TODO repair
|
|
struct oid *o = snmp_oid_duplicate(p->pool, o_start);
|
|
snmp_oid_ip4_index(o, 5, net4_prefix(&net));
|
|
|
|
return o;
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
static struct oid *
|
|
search_bgp_dynamic(struct snmp_proto *p, struct oid *o_start, struct oid *o_end, uint contid
|
|
UNUSED, u8 next_state)
|
|
{
|
|
struct oid *o_copy = o_start;
|
|
do
|
|
{
|
|
o_start = o_copy = update_bgp_oid(o_copy, next_state);
|
|
|
|
o_start = bgp_find_dynamic_oid(p, o_start, o_end, next_state);
|
|
|
|
next_state = snmp_bgp_next_state(next_state);
|
|
/* The search in next state is done from beginning. */
|
|
o_start->ids[5] = o_start->ids[6] = o_start->ids[7] = o_start->ids[8] = 0;
|
|
o_start->include = 1;
|
|
|
|
} while (o_start == NULL && next_state < BGP_INTERNAL_END);
|
|
|
|
return o_start;
|
|
}
|
|
|
|
/**
|
|
* snmp_bgp_find_next_oid - walk bgp peer addresses and update @o_start oid
|
|
*
|
|
* @p:
|
|
* @oid:
|
|
* @contid:
|
|
*/
|
|
static int
|
|
snmp_bgp_find_next_oid(struct snmp_proto *p, struct oid *oid, uint UNUSED contid)
|
|
{
|
|
ip4_addr ip4 = ip4_from_oid(oid);
|
|
//ip_add4 dest = ip4_from_u32(0xFFFFFFFF);
|
|
|
|
net_addr net;
|
|
net_fill_ip4(&net, ip4, IP4_MAX_PREFIX_LENGTH);
|
|
struct f_trie_walk_state ws;
|
|
|
|
int match = trie_walk_init(&ws, p->bgp_trie, &net, 1);
|
|
|
|
if (match && oid->include)
|
|
{
|
|
oid->include = 0;
|
|
return 1;
|
|
}
|
|
|
|
/* We skip the first match as we should not include ip address in oid */
|
|
if (match)
|
|
{
|
|
trie_walk_next(&ws, &net);
|
|
}
|
|
|
|
if (trie_walk_next(&ws, &net))
|
|
{
|
|
u32 res = ipa_to_u32(net_prefix(&net));
|
|
|
|
ASSUME(oid->n_subid == 9);
|
|
oid->ids[5] = (res & 0xFF000000) >> 24;
|
|
oid->ids[6] = (res & 0x00FF0000) >> 16;
|
|
oid->ids[7] = (res & 0x0000FF00) >> 8;
|
|
oid->ids[8] = (res & 0x000000FF) >> 0;
|
|
return 1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static enum snmp_search_res
|
|
snmp_bgp_search_dynamic(struct snmp_proto *p, struct oid **searched, const struct oid *o_end, uint UNUSED contid, u8 next_state)
|
|
{
|
|
struct oid *oid = *searched;
|
|
u8 end_state = MIN(snmp_bgp_state(o_end), BGP_INTERNAL_PEER_TABLE_END);
|
|
|
|
ASSUME(end_state <= BGP_INTERNAL_END);
|
|
ASSUME(oid != NULL);
|
|
|
|
oid = update_bgp_oid(oid, next_state);
|
|
|
|
int found;
|
|
while (!(found = snmp_bgp_find_next_oid(p, oid, contid)) && next_state <= end_state)
|
|
{
|
|
next_state = snmp_bgp_next_state(next_state);
|
|
if (next_state == BGP_INTERNAL_IDENTIFIER)
|
|
break;
|
|
oid = update_bgp_oid(oid, next_state);
|
|
/* In case of search for next bgp state, we want to start from beginning. */
|
|
oid->ids[5] = oid->ids[6] = oid->ids[7] = oid->ids[8] = 0;
|
|
}
|
|
|
|
if (next_state < BGP_INTERNAL_PEER_TABLE_END && next_state <= end_state)
|
|
{
|
|
*searched = oid;
|
|
return SNMP_SEARCH_OK;
|
|
}
|
|
|
|
return SNMP_SEARCH_END_OF_VIEW;
|
|
}
|
|
|
|
enum snmp_search_res
|
|
snmp_bgp_search2(struct snmp_proto *p, struct oid **searched, const struct oid *o_end, uint contid)
|
|
{
|
|
enum snmp_search_res r = SNMP_SEARCH_END_OF_VIEW;
|
|
u8 bgp_state = snmp_bgp_state(*searched);
|
|
u8 state;
|
|
|
|
if (bgp_state == BGP_INTERNAL_END)
|
|
{
|
|
return SNMP_SEARCH_NO_OBJECT;
|
|
}
|
|
|
|
if (is_static(bgp_state) && (*searched)->include)
|
|
{
|
|
return SNMP_SEARCH_OK;
|
|
}
|
|
|
|
state = snmp_bgp_next_state(bgp_state);
|
|
if (is_static(state) && !is_dynamic(bgp_state))
|
|
{
|
|
*searched = update_bgp_oid(*searched, state);
|
|
return SNMP_SEARCH_OK;
|
|
}
|
|
|
|
if (is_dynamic(state) && !is_dynamic(bgp_state))
|
|
{
|
|
for (uint i = 5; i < MIN(9, (*searched)->n_subid); i++)
|
|
(*searched)->ids[i] = 0;
|
|
r = snmp_bgp_search_dynamic(p, searched, o_end, contid, state);
|
|
if (r != SNMP_SEARCH_END_OF_VIEW)
|
|
return r;
|
|
}
|
|
|
|
if (is_dynamic(bgp_state))
|
|
{
|
|
r = snmp_bgp_search_dynamic(p, searched, o_end, contid, bgp_state);
|
|
|
|
if (r != SNMP_SEARCH_END_OF_VIEW)
|
|
return r;
|
|
}
|
|
|
|
state = snmp_bgp_next_state(bgp_state);
|
|
if (state <= BGP_INTERNAL_IDENTIFIER)
|
|
{
|
|
*searched = update_bgp_oid(*searched, state);
|
|
return SNMP_SEARCH_OK;
|
|
}
|
|
|
|
// TODO add route table
|
|
|
|
/* end not found */
|
|
return SNMP_SEARCH_END_OF_VIEW;
|
|
}
|
|
|
|
struct oid *
|
|
snmp_bgp_search(struct snmp_proto *p, struct oid *o_start, struct oid *o_end, uint contid UNUSED)
|
|
{
|
|
u8 start_state = snmp_bgp_state(o_start);
|
|
|
|
// print debugging information
|
|
print_bgp_record_all(p);
|
|
|
|
if (o_start->include && snmp_bgp_has_value(start_state) &&
|
|
!is_dynamic(start_state) && o_start->n_subid == 3)
|
|
{
|
|
/* We disable including for next time searching. */
|
|
o_start->include = 0;
|
|
return o_start;
|
|
}
|
|
else if (o_start->include && snmp_bgp_has_value(start_state) &&
|
|
is_dynamic(start_state))
|
|
return search_bgp_dynamic(p, o_start, o_end, contid, start_state);
|
|
|
|
/* o_start is not inclusive */
|
|
|
|
u8 next_state = snmp_bgp_next_state(start_state);
|
|
// TODO more checks ?!?
|
|
if (!is_dynamic(next_state))
|
|
{
|
|
o_start = update_bgp_oid(o_start, next_state);
|
|
return o_start;
|
|
}
|
|
|
|
/* is_dynamic(next_state) == 1 */
|
|
|
|
return search_bgp_dynamic(p, o_start, o_end, 0, next_state);
|
|
}
|
|
|
|
static byte *
|
|
bgp_fill_dynamic(struct snmp_proto UNUSED *p, struct agentx_varbind *vb,
|
|
struct snmp_pdu *c, u8 state)
|
|
{
|
|
struct oid *oid = &vb->name;
|
|
uint size = c->size - snmp_varbind_header_size(vb);
|
|
byte *pkt;
|
|
|
|
ip4_addr addr;
|
|
if (oid_state_compare(oid, state) == 0 && snmp_bgp_valid_ip4(oid))
|
|
addr = ip4_from_oid(oid);
|
|
else
|
|
{
|
|
vb->type = AGENTX_NO_SUCH_INSTANCE;
|
|
pkt = ((byte *) vb) + snmp_varbind_header_size(vb);
|
|
return pkt;
|
|
}
|
|
|
|
struct snmp_bgp_peer *pe = snmp_hash_find(p, addr);
|
|
|
|
if (!pe)
|
|
{
|
|
vb->type = AGENTX_NO_SUCH_INSTANCE;
|
|
return ((byte *) vb) + snmp_varbind_header_size(vb);
|
|
}
|
|
|
|
const struct bgp_proto *bgp_proto = pe->bgp_proto;
|
|
if (!ipa_is_ip4(bgp_proto->remote_ip))
|
|
{
|
|
log(L_ERR, "%s: Found BGP protocol instance with IPv6 address", bgp_proto->p.name);
|
|
vb->type = AGENTX_NO_SUCH_INSTANCE;
|
|
c->error = AGENTX_RES_GEN_ERROR;
|
|
return ((byte *) vb) + snmp_varbind_header_size(vb);
|
|
}
|
|
|
|
ip4_addr proto_ip = ipa_to_ip4(bgp_proto->remote_ip);
|
|
if (!ip4_equal(proto_ip, pe->peer_ip))
|
|
{
|
|
/* Here, we could be in problem as the bgp_proto IP address could be changed */
|
|
log(L_ERR, "%s: Stored hash key IP address and peer remote address differ.",
|
|
bgp_proto->p.name);
|
|
vb->type = AGENTX_NO_SUCH_INSTANCE;
|
|
c->error = AGENTX_RES_GEN_ERROR;
|
|
return ((byte *) vb) + snmp_varbind_header_size(vb);
|
|
}
|
|
|
|
const struct bgp_conn *bgp_conn = bgp_proto->conn;
|
|
const struct bgp_stats *bgp_stats = &bgp_proto->stats;
|
|
const struct bgp_config *bgp_conf = bgp_proto->cf;
|
|
|
|
uint fsm_state = snmp_bgp_fsm_state(bgp_proto);
|
|
|
|
char last_error[2];
|
|
snmp_bgp_last_error(bgp_proto, last_error);
|
|
switch (state)
|
|
{
|
|
case BGP_INTERNAL_PEER_IDENTIFIER:
|
|
if (fsm_state == BGP_MIB_OPENCONFIRM || fsm_state == BGP_MIB_ESTABLISHED)
|
|
pkt = snmp_varbind_ip4(vb, size, ip4_from_u32(bgp_proto->remote_id));
|
|
else
|
|
pkt = snmp_varbind_ip4(vb, size, IP4_NONE);
|
|
break;
|
|
|
|
case BGP_INTERNAL_STATE:
|
|
pkt = snmp_varbind_int(vb, size, fsm_state);
|
|
break;
|
|
|
|
case BGP_INTERNAL_ADMIN_STATUS:
|
|
if (bgp_proto->p.disabled)
|
|
pkt = snmp_varbind_int(vb, size, AGENTX_ADMIN_STOP);
|
|
else
|
|
pkt = snmp_varbind_int(vb, size, AGENTX_ADMIN_START);
|
|
|
|
break;
|
|
|
|
case BGP_INTERNAL_NEGOTIATED_VERSION:
|
|
if (fsm_state == BGP_MIB_ESTABLISHED || fsm_state == BGP_MIB_ESTABLISHED)
|
|
pkt = snmp_varbind_int(vb, size, SNMP_BGP_NEGOTIATED_VER_VALUE);
|
|
else
|
|
pkt = snmp_varbind_int(vb, size, SNMP_BGP_NEGOTIATED_VER_NO_VALUE);
|
|
|
|
break;
|
|
|
|
case BGP_INTERNAL_LOCAL_ADDR:
|
|
pkt = snmp_varbind_ip4(vb, size, ipa_to_ip4(bgp_proto->local_ip));
|
|
break;
|
|
|
|
case BGP_INTERNAL_LOCAL_PORT:
|
|
pkt = snmp_varbind_int(vb, size, bgp_conf->local_port);
|
|
break;
|
|
|
|
case BGP_INTERNAL_REMOTE_ADDR:
|
|
pkt = snmp_varbind_ip4(vb, size, ipa_to_ip4(bgp_proto->remote_ip));
|
|
break;
|
|
|
|
case BGP_INTERNAL_REMOTE_PORT:
|
|
pkt = snmp_varbind_int(vb, size, bgp_conf->remote_port);
|
|
break;
|
|
|
|
case BGP_INTERNAL_REMOTE_AS:
|
|
pkt = snmp_varbind_int(vb, size, bgp_proto->remote_as);
|
|
break;
|
|
|
|
/* IN UPDATES */
|
|
case BGP_INTERNAL_RX_UPDATES:
|
|
pkt = snmp_varbind_counter32(vb, size, bgp_stats->rx_updates);
|
|
break;
|
|
|
|
/* OUT UPDATES */
|
|
case BGP_INTERNAL_TX_UPDATES:
|
|
pkt = snmp_varbind_counter32(vb, size, bgp_stats->tx_updates);
|
|
break;
|
|
|
|
/* IN MESSAGES */
|
|
case BGP_INTERNAL_RX_MESSAGES:
|
|
pkt = snmp_varbind_counter32(vb, size, bgp_stats->rx_messages);
|
|
break;
|
|
|
|
/* OUT MESSAGES */
|
|
case BGP_INTERNAL_TX_MESSAGES:
|
|
pkt = snmp_varbind_counter32(vb, size, bgp_stats->tx_messages);
|
|
break;
|
|
|
|
case BGP_INTERNAL_LAST_ERROR:
|
|
pkt = snmp_varbind_nstr(vb, size, last_error, 2);
|
|
break;
|
|
|
|
case BGP_INTERNAL_FSM_TRANSITIONS:
|
|
pkt = snmp_varbind_counter32(vb, size,
|
|
bgp_stats->fsm_established_transitions);
|
|
break;
|
|
|
|
case BGP_INTERNAL_FSM_ESTABLISHED_TIME:
|
|
pkt = snmp_varbind_gauge32(vb, size,
|
|
(current_time() - bgp_proto->last_established) TO_S);
|
|
break;
|
|
|
|
case BGP_INTERNAL_RETRY_INTERVAL:
|
|
// retry interval != 0
|
|
pkt = snmp_varbind_int(vb, size, bgp_conf->connect_retry_time);
|
|
break;
|
|
|
|
case BGP_INTERNAL_HOLD_TIME:
|
|
// (0, 3..65535)
|
|
pkt = snmp_varbind_int(vb, size, (bgp_conn) ? bgp_conn->hold_time : 0);
|
|
break;
|
|
|
|
case BGP_INTERNAL_KEEPALIVE:
|
|
if (!bgp_conf->hold_time)
|
|
pkt = snmp_varbind_int(vb, size, 0);
|
|
else
|
|
pkt = snmp_varbind_int(vb, size,
|
|
(bgp_conn) ? bgp_conn->keepalive_time : 0);
|
|
break;
|
|
|
|
case BGP_INTERNAL_HOLD_TIME_CONFIGURED:
|
|
pkt = snmp_varbind_int(vb, size, bgp_conf->hold_time);
|
|
break;
|
|
|
|
case BGP_INTERNAL_KEEPALIVE_CONFIGURED:
|
|
if (!bgp_conf->keepalive_time)
|
|
pkt = snmp_varbind_int(vb, size, 0);
|
|
else
|
|
pkt = snmp_varbind_int(vb, size,
|
|
(bgp_conn) ? bgp_conn->keepalive_time : 0);
|
|
break;
|
|
|
|
case BGP_INTERNAL_ORIGINATION_INTERVAL:
|
|
// (1..65535) but is not supported
|
|
pkt = snmp_varbind_int(vb, size, 0);
|
|
break;
|
|
|
|
case BGP_INTERNAL_MIN_ROUTE_ADVERTISEMENT:
|
|
// (1..65535) but is not supported
|
|
pkt = snmp_varbind_int(vb, size, 0);
|
|
break;
|
|
|
|
case BGP_INTERNAL_IN_UPDATE_ELAPSED_TIME:
|
|
pkt = snmp_varbind_gauge32(vb, size,
|
|
(current_time() - bgp_proto->last_rx_update) TO_S
|
|
);
|
|
break;
|
|
|
|
case BGP_INTERNAL_END:
|
|
break;
|
|
|
|
case BGP_INTERNAL_INVALID:
|
|
break;
|
|
|
|
case BGP_INTERNAL_BGP:
|
|
break;
|
|
case BGP_INTERNAL_PEER_TABLE:
|
|
break;
|
|
case BGP_INTERNAL_PEER_ENTRY:
|
|
break;
|
|
case BGP_INTERNAL_NO_VALUE:
|
|
break;
|
|
}
|
|
|
|
if (!pkt)
|
|
{
|
|
vb->type = AGENTX_NO_SUCH_INSTANCE;
|
|
return ((byte *) vb) + snmp_varbind_header_size(vb);
|
|
}
|
|
|
|
return pkt;
|
|
}
|
|
|
|
|
|
static byte *
|
|
bgp_fill_static(struct snmp_proto *p, struct agentx_varbind *vb, byte *pkt, uint size
|
|
UNUSED, uint contid UNUSED, u8 state)
|
|
{
|
|
ASSUME((void *) pkt == (void *) vb);
|
|
|
|
struct oid *oid = &vb->name;
|
|
|
|
/*
|
|
* snmp_bgp_state() check only prefix. To be sure on OID equivalence we need to
|
|
* compare the oid->n_subid length. All BGP static fields have same n_subid.
|
|
*/
|
|
if (oid_state_compare(oid, state) < 0 || state == BGP_INTERNAL_END)
|
|
{
|
|
vb->type = AGENTX_NO_SUCH_OBJECT;
|
|
return pkt + snmp_varbind_header_size(vb);
|
|
}
|
|
else if (oid_state_compare(oid, state) > 0)
|
|
{
|
|
vb->type = AGENTX_NO_SUCH_INSTANCE;
|
|
return pkt + snmp_varbind_header_size(vb);
|
|
}
|
|
|
|
switch (state)
|
|
{
|
|
case BGP_INTERNAL_VERSION:
|
|
pkt = snmp_varbind_nstr(vb, size, BGP4_VERSIONS, 1);
|
|
break;
|
|
|
|
case BGP_INTERNAL_LOCAL_AS:
|
|
pkt = snmp_varbind_int(vb, size, p->bgp_local_as);
|
|
break;
|
|
|
|
case BGP_INTERNAL_IDENTIFIER:
|
|
pkt = snmp_varbind_ip4(vb, size, p->bgp_local_id);
|
|
break;
|
|
|
|
default:
|
|
vb->type = AGENTX_NO_SUCH_OBJECT;
|
|
pkt += snmp_varbind_header_size(vb);
|
|
break;
|
|
}
|
|
|
|
return pkt;
|
|
}
|
|
|
|
void
|
|
snmp_bgp_fill(struct snmp_proto *p, struct agentx_varbind *vb,
|
|
struct snmp_pdu *c)
|
|
{
|
|
u8 state = snmp_bgp_state(&vb->name);
|
|
|
|
byte *pkt;
|
|
if (is_static(state))
|
|
{
|
|
pkt = bgp_fill_static(p, vb, c->buffer, c->size, 0, state);
|
|
ADVANCE(c->buffer, c->size, pkt - c->buffer);
|
|
return;
|
|
}
|
|
|
|
if (is_dynamic(state))
|
|
{
|
|
pkt = bgp_fill_dynamic(p, vb, c, state);
|
|
ADVANCE(c->buffer, c->size, pkt - c->buffer);
|
|
return;
|
|
}
|
|
|
|
vb->type = AGENTX_NO_SUCH_OBJECT; // TODO
|
|
ADVANCE(c->buffer, c->size, snmp_varbind_header_size(vb));
|
|
}
|
|
|
|
#if 0
|
|
int
|
|
snmp_bgp_testset(struct snmp_proto *p, const struct agentx_varbind *vb, void *tr, struct oid *oid, uint pkt_size)
|
|
{
|
|
// TODO: check the type of varbind vb and it's value correctness, don't overflow the pkt_size
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
/*
|
|
* snmp_bgp_start - prepare BGP4-MIB
|
|
* @p - SNMP protocol instance holding memory pool
|
|
*
|
|
* This function create all runtime bindings to BGP procotol structures.
|
|
* It is gruaranteed that the BGP protocols exist.
|
|
*/
|
|
void
|
|
snmp_bgp_start(struct snmp_proto *p)
|
|
{
|
|
struct snmp_config *cf = SKIP_BACK(struct snmp_config, cf, p->p.cf);
|
|
/* Create binding to BGP protocols */
|
|
|
|
struct snmp_bond *b;
|
|
WALK_LIST(b, cf->bgp_entries)
|
|
{
|
|
const struct bgp_config *bgp_config = (struct bgp_config *) b->config;
|
|
if (ipa_zero(bgp_config->remote_ip))
|
|
die("unsupported dynamic BGP");
|
|
|
|
const struct bgp_proto *bgp = SKIP_BACK(struct bgp_proto, p,
|
|
bgp_config->c.proto);
|
|
|
|
struct snmp_bgp_peer *peer = \
|
|
mb_alloc(p->pool, sizeof(struct snmp_bgp_peer));
|
|
|
|
peer->bgp_proto = bgp;
|
|
peer->peer_ip = ipa_to_ip4(bgp->remote_ip);
|
|
|
|
struct net_addr net;
|
|
net_fill_ip4(&net, ipa_to_ip4(bgp->remote_ip), IP4_MAX_PREFIX_LENGTH);
|
|
trie_add_prefix(p->bgp_trie, &net, IP4_MAX_PREFIX_LENGTH,
|
|
IP4_MAX_PREFIX_LENGTH);
|
|
|
|
snmp_hash_add_peer(p, peer);
|
|
}
|
|
}
|