blob: cbcbe7c566186b3354c9cec0c1f3e713697ed580 [file] [log] [blame]
paul718e3742002-12-13 20:15:29 +00001/* Kernel routing table updates using netlink over GNU/Linux system.
2 * Copyright (C) 1997, 98, 99 Kunihiro Ishiguro
3 *
4 * This file is part of GNU Zebra.
5 *
6 * GNU Zebra is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License as published by the
8 * Free Software Foundation; either version 2, or (at your option) any
9 * later version.
10 *
11 * GNU Zebra is distributed in the hope that it will be useful, but
12 * WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with GNU Zebra; see the file COPYING. If not, write to the Free
18 * Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA
19 * 02111-1307, USA.
20 */
21
22#include <zebra.h>
23
24/* Hack for GNU libc version 2. */
25#ifndef MSG_TRUNC
26#define MSG_TRUNC 0x20
27#endif /* MSG_TRUNC */
28
29#include "linklist.h"
30#include "if.h"
31#include "log.h"
32#include "prefix.h"
33#include "connected.h"
34#include "table.h"
Josh Bailey26e2ae32012-03-22 01:09:21 -070035#include "memory.h"
paul718e3742002-12-13 20:15:29 +000036#include "rib.h"
paule04ab742003-01-17 23:47:00 +000037#include "thread.h"
pauledd7c242003-06-04 13:59:38 +000038#include "privs.h"
Feng Lu0d0686f2015-05-22 11:40:02 +020039#include "vrf.h"
paul718e3742002-12-13 20:15:29 +000040
41#include "zebra/zserv.h"
paul6621ca82005-11-23 13:02:08 +000042#include "zebra/rt.h"
paul718e3742002-12-13 20:15:29 +000043#include "zebra/redistribute.h"
44#include "zebra/interface.h"
45#include "zebra/debug.h"
46
Avneesh Sachdev78deec42012-11-13 22:48:56 +000047#include "rt_netlink.h"
JR Rivers3cadc0c2012-04-01 12:16:31 -070048
Stephen Hemminger1423c802008-08-14 17:59:25 +010049static const struct message nlmsg_str[] = {
paul718e3742002-12-13 20:15:29 +000050 {RTM_NEWROUTE, "RTM_NEWROUTE"},
51 {RTM_DELROUTE, "RTM_DELROUTE"},
52 {RTM_GETROUTE, "RTM_GETROUTE"},
53 {RTM_NEWLINK, "RTM_NEWLINK"},
54 {RTM_DELLINK, "RTM_DELLINK"},
55 {RTM_GETLINK, "RTM_GETLINK"},
56 {RTM_NEWADDR, "RTM_NEWADDR"},
57 {RTM_DELADDR, "RTM_DELADDR"},
58 {RTM_GETADDR, "RTM_GETADDR"},
paul7021c422003-07-15 12:52:22 +000059 {0, NULL}
paul718e3742002-12-13 20:15:29 +000060};
61
paulb21b19c2003-06-15 01:28:29 +000062extern struct zebra_t zebrad;
paul718e3742002-12-13 20:15:29 +000063
pauledd7c242003-06-04 13:59:38 +000064extern struct zebra_privs_t zserv_privs;
65
hassoc34b6b52004-08-31 13:41:49 +000066extern u_int32_t nl_rcvbufsize;
67
ajsd2fc8892005-04-02 18:38:43 +000068/* Note: on netlink systems, there should be a 1-to-1 mapping between interface
69 names and ifindex values. */
70static void
71set_ifindex(struct interface *ifp, unsigned int ifi_index)
72{
73 struct interface *oifp;
74
75 if (((oifp = if_lookup_by_index(ifi_index)) != NULL) && (oifp != ifp))
76 {
77 if (ifi_index == IFINDEX_INTERNAL)
78 zlog_err("Netlink is setting interface %s ifindex to reserved "
79 "internal value %u", ifp->name, ifi_index);
80 else
81 {
82 if (IS_ZEBRA_DEBUG_KERNEL)
83 zlog_debug("interface index %d was renamed from %s to %s",
84 ifi_index, oifp->name, ifp->name);
85 if (if_is_up(oifp))
86 zlog_err("interface rename detected on up interface: index %d "
87 "was renamed from %s to %s, results are uncertain!",
88 ifi_index, oifp->name, ifp->name);
89 if_delete_update(oifp);
90 }
91 }
92 ifp->ifindex = ifi_index;
93}
94
Ulrich Weberf1ef81b2013-01-22 10:39:18 +000095#ifndef SO_RCVBUFFORCE
96#define SO_RCVBUFFORCE (33)
97#endif
98
Stephen Hemminger30afea32008-08-16 18:25:47 +010099static int
100netlink_recvbuf (struct nlsock *nl, uint32_t newsize)
101{
102 u_int32_t oldsize;
103 socklen_t newlen = sizeof(newsize);
104 socklen_t oldlen = sizeof(oldsize);
105 int ret;
106
107 ret = getsockopt(nl->sock, SOL_SOCKET, SO_RCVBUF, &oldsize, &oldlen);
108 if (ret < 0)
109 {
110 zlog (NULL, LOG_ERR, "Can't get %s receive buffer size: %s", nl->name,
111 safe_strerror (errno));
112 return -1;
113 }
114
Ulrich Weberf1ef81b2013-01-22 10:39:18 +0000115 /* Try force option (linux >= 2.6.14) and fall back to normal set */
116 if ( zserv_privs.change (ZPRIVS_RAISE) )
117 zlog_err ("routing_socket: Can't raise privileges");
118 ret = setsockopt(nl->sock, SOL_SOCKET, SO_RCVBUFFORCE, &nl_rcvbufsize,
Stephen Hemminger30afea32008-08-16 18:25:47 +0100119 sizeof(nl_rcvbufsize));
Ulrich Weberf1ef81b2013-01-22 10:39:18 +0000120 if ( zserv_privs.change (ZPRIVS_LOWER) )
121 zlog_err ("routing_socket: Can't lower privileges");
122 if (ret < 0)
123 ret = setsockopt(nl->sock, SOL_SOCKET, SO_RCVBUF, &nl_rcvbufsize,
124 sizeof(nl_rcvbufsize));
Stephen Hemminger30afea32008-08-16 18:25:47 +0100125 if (ret < 0)
126 {
127 zlog (NULL, LOG_ERR, "Can't set %s receive buffer size: %s", nl->name,
128 safe_strerror (errno));
129 return -1;
130 }
131
132 ret = getsockopt(nl->sock, SOL_SOCKET, SO_RCVBUF, &newsize, &newlen);
133 if (ret < 0)
134 {
135 zlog (NULL, LOG_ERR, "Can't get %s receive buffer size: %s", nl->name,
136 safe_strerror (errno));
137 return -1;
138 }
139
140 zlog (NULL, LOG_INFO,
141 "Setting netlink socket receive buffer size: %u -> %u",
142 oldsize, newsize);
143 return 0;
144}
145
paul718e3742002-12-13 20:15:29 +0000146/* Make socket for Linux netlink interface. */
147static int
Feng Lu758fb8f2014-07-03 18:23:09 +0800148netlink_socket (struct nlsock *nl, unsigned long groups, vrf_id_t vrf_id)
paul718e3742002-12-13 20:15:29 +0000149{
150 int ret;
151 struct sockaddr_nl snl;
152 int sock;
153 int namelen;
ajs4be019d2005-01-29 16:12:41 +0000154 int save_errno;
paul718e3742002-12-13 20:15:29 +0000155
Michal Sekletar8e998b12014-05-16 14:13:43 +0000156 if (zserv_privs.change (ZPRIVS_RAISE))
157 {
158 zlog (NULL, LOG_ERR, "Can't raise privileges");
159 return -1;
160 }
161
Feng Lu758fb8f2014-07-03 18:23:09 +0800162 sock = vrf_socket (AF_NETLINK, SOCK_RAW, NETLINK_ROUTE, vrf_id);
paul718e3742002-12-13 20:15:29 +0000163 if (sock < 0)
164 {
165 zlog (NULL, LOG_ERR, "Can't open %s socket: %s", nl->name,
ajs6099b3b2004-11-20 02:06:59 +0000166 safe_strerror (errno));
paul718e3742002-12-13 20:15:29 +0000167 return -1;
168 }
169
paul718e3742002-12-13 20:15:29 +0000170 memset (&snl, 0, sizeof snl);
171 snl.nl_family = AF_NETLINK;
172 snl.nl_groups = groups;
173
174 /* Bind the socket to the netlink structure for anything. */
175 ret = bind (sock, (struct sockaddr *) &snl, sizeof snl);
ajs4be019d2005-01-29 16:12:41 +0000176 save_errno = errno;
hasso55e7ecd2004-08-06 08:41:56 +0000177 if (zserv_privs.change (ZPRIVS_LOWER))
178 zlog (NULL, LOG_ERR, "Can't lower privileges");
179
paul718e3742002-12-13 20:15:29 +0000180 if (ret < 0)
181 {
paul7021c422003-07-15 12:52:22 +0000182 zlog (NULL, LOG_ERR, "Can't bind %s socket to group 0x%x: %s",
ajs4be019d2005-01-29 16:12:41 +0000183 nl->name, snl.nl_groups, safe_strerror (save_errno));
paul718e3742002-12-13 20:15:29 +0000184 close (sock);
185 return -1;
186 }
paul7021c422003-07-15 12:52:22 +0000187
paul718e3742002-12-13 20:15:29 +0000188 /* multiple netlink sockets will have different nl_pid */
189 namelen = sizeof snl;
hassoc9e52be2004-09-26 16:09:34 +0000190 ret = getsockname (sock, (struct sockaddr *) &snl, (socklen_t *) &namelen);
paul718e3742002-12-13 20:15:29 +0000191 if (ret < 0 || namelen != sizeof snl)
192 {
193 zlog (NULL, LOG_ERR, "Can't get %s socket name: %s", nl->name,
ajs6099b3b2004-11-20 02:06:59 +0000194 safe_strerror (errno));
paul718e3742002-12-13 20:15:29 +0000195 close (sock);
196 return -1;
197 }
198
199 nl->snl = snl;
200 nl->sock = sock;
201 return ret;
202}
203
204/* Get type specified information from netlink. */
205static int
206netlink_request (int family, int type, struct nlsock *nl)
207{
208 int ret;
209 struct sockaddr_nl snl;
ajs4be019d2005-01-29 16:12:41 +0000210 int save_errno;
paul718e3742002-12-13 20:15:29 +0000211
212 struct
213 {
214 struct nlmsghdr nlh;
215 struct rtgenmsg g;
216 } req;
217
218
219 /* Check netlink socket. */
220 if (nl->sock < 0)
221 {
222 zlog (NULL, LOG_ERR, "%s socket isn't active.", nl->name);
223 return -1;
224 }
225
226 memset (&snl, 0, sizeof snl);
227 snl.nl_family = AF_NETLINK;
228
ajsc05612b2005-10-01 16:36:54 +0000229 memset (&req, 0, sizeof req);
paul718e3742002-12-13 20:15:29 +0000230 req.nlh.nlmsg_len = sizeof req;
231 req.nlh.nlmsg_type = type;
232 req.nlh.nlmsg_flags = NLM_F_ROOT | NLM_F_MATCH | NLM_F_REQUEST;
Stephen Hemminger3d265b42008-08-16 17:30:39 +0100233 req.nlh.nlmsg_pid = nl->snl.nl_pid;
paul718e3742002-12-13 20:15:29 +0000234 req.nlh.nlmsg_seq = ++nl->seq;
235 req.g.rtgen_family = family;
pauledd7c242003-06-04 13:59:38 +0000236
237 /* linux appears to check capabilities on every message
238 * have to raise caps for every message sent
239 */
paul7021c422003-07-15 12:52:22 +0000240 if (zserv_privs.change (ZPRIVS_RAISE))
pauledd7c242003-06-04 13:59:38 +0000241 {
242 zlog (NULL, LOG_ERR, "Can't raise privileges");
243 return -1;
244 }
paul7021c422003-07-15 12:52:22 +0000245
246 ret = sendto (nl->sock, (void *) &req, sizeof req, 0,
247 (struct sockaddr *) &snl, sizeof snl);
ajs4be019d2005-01-29 16:12:41 +0000248 save_errno = errno;
paul7021c422003-07-15 12:52:22 +0000249
250 if (zserv_privs.change (ZPRIVS_LOWER))
251 zlog (NULL, LOG_ERR, "Can't lower privileges");
252
paul718e3742002-12-13 20:15:29 +0000253 if (ret < 0)
paul7021c422003-07-15 12:52:22 +0000254 {
255 zlog (NULL, LOG_ERR, "%s sendto failed: %s", nl->name,
ajs4be019d2005-01-29 16:12:41 +0000256 safe_strerror (save_errno));
paul718e3742002-12-13 20:15:29 +0000257 return -1;
258 }
pauledd7c242003-06-04 13:59:38 +0000259
paul718e3742002-12-13 20:15:29 +0000260 return 0;
261}
262
263/* Receive message from netlink interface and pass those information
264 to the given function. */
265static int
Feng Lu758fb8f2014-07-03 18:23:09 +0800266netlink_parse_info (int (*filter) (struct sockaddr_nl *, struct nlmsghdr *,
267 vrf_id_t),
268 struct nlsock *nl, struct zebra_vrf *zvrf)
paul718e3742002-12-13 20:15:29 +0000269{
270 int status;
271 int ret = 0;
272 int error;
273
274 while (1)
275 {
JR Rivers3cadc0c2012-04-01 12:16:31 -0700276 char buf[NL_PKT_BUF_SIZE];
Timo Teräsc299ed72014-07-29 09:41:55 +0000277 struct iovec iov = {
278 .iov_base = buf,
279 .iov_len = sizeof buf
280 };
paul718e3742002-12-13 20:15:29 +0000281 struct sockaddr_nl snl;
Timo Teräsc299ed72014-07-29 09:41:55 +0000282 struct msghdr msg = {
283 .msg_name = (void *) &snl,
284 .msg_namelen = sizeof snl,
285 .msg_iov = &iov,
286 .msg_iovlen = 1
287 };
paul718e3742002-12-13 20:15:29 +0000288 struct nlmsghdr *h;
paul7021c422003-07-15 12:52:22 +0000289
paul718e3742002-12-13 20:15:29 +0000290 status = recvmsg (nl->sock, &msg, 0);
paul718e3742002-12-13 20:15:29 +0000291 if (status < 0)
paul7021c422003-07-15 12:52:22 +0000292 {
Stephen Hemminger4c699472008-08-17 17:01:44 +0100293 if (errno == EINTR)
paul7021c422003-07-15 12:52:22 +0000294 continue;
Stephen Hemminger4c699472008-08-17 17:01:44 +0100295 if (errno == EWOULDBLOCK || errno == EAGAIN)
paul7021c422003-07-15 12:52:22 +0000296 break;
ajs4be019d2005-01-29 16:12:41 +0000297 zlog (NULL, LOG_ERR, "%s recvmsg overrun: %s",
Stephen Hemminger4c699472008-08-17 17:01:44 +0100298 nl->name, safe_strerror(errno));
paul7021c422003-07-15 12:52:22 +0000299 continue;
300 }
paul718e3742002-12-13 20:15:29 +0000301
302 if (status == 0)
paul7021c422003-07-15 12:52:22 +0000303 {
304 zlog (NULL, LOG_ERR, "%s EOF", nl->name);
305 return -1;
306 }
paul718e3742002-12-13 20:15:29 +0000307
308 if (msg.msg_namelen != sizeof snl)
paul7021c422003-07-15 12:52:22 +0000309 {
310 zlog (NULL, LOG_ERR, "%s sender address length error: length %d",
311 nl->name, msg.msg_namelen);
312 return -1;
313 }
paulb84d3a12003-11-17 10:31:01 +0000314
hasso206d8052005-04-09 16:38:51 +0000315 for (h = (struct nlmsghdr *) buf; NLMSG_OK (h, (unsigned int) status);
paul7021c422003-07-15 12:52:22 +0000316 h = NLMSG_NEXT (h, status))
317 {
318 /* Finish of reading. */
319 if (h->nlmsg_type == NLMSG_DONE)
320 return ret;
paul718e3742002-12-13 20:15:29 +0000321
paul7021c422003-07-15 12:52:22 +0000322 /* Error handling. */
323 if (h->nlmsg_type == NLMSG_ERROR)
324 {
325 struct nlmsgerr *err = (struct nlmsgerr *) NLMSG_DATA (h);
Stephen Hemminger898987e2008-08-17 16:56:15 +0100326 int errnum = err->error;
327 int msg_type = err->msg.nlmsg_type;
paul7021c422003-07-15 12:52:22 +0000328
paul718e3742002-12-13 20:15:29 +0000329 /* If the error field is zero, then this is an ACK */
paul7021c422003-07-15 12:52:22 +0000330 if (err->error == 0)
paul718e3742002-12-13 20:15:29 +0000331 {
paul7021c422003-07-15 12:52:22 +0000332 if (IS_ZEBRA_DEBUG_KERNEL)
333 {
hasso1ada8192005-06-12 11:28:18 +0000334 zlog_debug ("%s: %s ACK: type=%s(%u), seq=%u, pid=%u",
paul7021c422003-07-15 12:52:22 +0000335 __FUNCTION__, nl->name,
336 lookup (nlmsg_str, err->msg.nlmsg_type),
337 err->msg.nlmsg_type, err->msg.nlmsg_seq,
338 err->msg.nlmsg_pid);
paul718e3742002-12-13 20:15:29 +0000339 }
paul7021c422003-07-15 12:52:22 +0000340
341 /* return if not a multipart message, otherwise continue */
342 if (!(h->nlmsg_flags & NLM_F_MULTI))
343 {
344 return 0;
paul718e3742002-12-13 20:15:29 +0000345 }
paul7021c422003-07-15 12:52:22 +0000346 continue;
paul718e3742002-12-13 20:15:29 +0000347 }
paul7021c422003-07-15 12:52:22 +0000348
paul718e3742002-12-13 20:15:29 +0000349 if (h->nlmsg_len < NLMSG_LENGTH (sizeof (struct nlmsgerr)))
paul7021c422003-07-15 12:52:22 +0000350 {
351 zlog (NULL, LOG_ERR, "%s error: message truncated",
352 nl->name);
353 return -1;
354 }
pauld753e9e2003-01-22 19:45:50 +0000355
Stephen Hemminger898987e2008-08-17 16:56:15 +0100356 /* Deal with errors that occur because of races in link handling */
Feng Lu758fb8f2014-07-03 18:23:09 +0800357 if (nl == &zvrf->netlink_cmd
Stephen Hemminger898987e2008-08-17 16:56:15 +0100358 && ((msg_type == RTM_DELROUTE &&
359 (-errnum == ENODEV || -errnum == ESRCH))
360 || (msg_type == RTM_NEWROUTE && -errnum == EEXIST)))
361 {
362 if (IS_ZEBRA_DEBUG_KERNEL)
363 zlog_debug ("%s: error: %s type=%s(%u), seq=%u, pid=%u",
364 nl->name, safe_strerror (-errnum),
365 lookup (nlmsg_str, msg_type),
366 msg_type, err->msg.nlmsg_seq, err->msg.nlmsg_pid);
367 return 0;
368 }
paul718e3742002-12-13 20:15:29 +0000369
Stephen Hemminger898987e2008-08-17 16:56:15 +0100370 zlog_err ("%s error: %s, type=%s(%u), seq=%u, pid=%u",
371 nl->name, safe_strerror (-errnum),
372 lookup (nlmsg_str, msg_type),
373 msg_type, err->msg.nlmsg_seq, err->msg.nlmsg_pid);
paul7021c422003-07-15 12:52:22 +0000374 return -1;
375 }
paul718e3742002-12-13 20:15:29 +0000376
paul7021c422003-07-15 12:52:22 +0000377 /* OK we got netlink message. */
378 if (IS_ZEBRA_DEBUG_KERNEL)
hasso1ada8192005-06-12 11:28:18 +0000379 zlog_debug ("netlink_parse_info: %s type %s(%u), seq=%u, pid=%u",
paul7021c422003-07-15 12:52:22 +0000380 nl->name,
381 lookup (nlmsg_str, h->nlmsg_type), h->nlmsg_type,
382 h->nlmsg_seq, h->nlmsg_pid);
383
Christian Franke599da952013-01-24 14:04:43 +0000384 /* skip unsolicited messages originating from command socket
385 * linux sets the originators port-id for {NEW|DEL}ADDR messages,
386 * so this has to be checked here. */
Feng Lu758fb8f2014-07-03 18:23:09 +0800387 if (nl != &zvrf->netlink_cmd
388 && h->nlmsg_pid == zvrf->netlink_cmd.snl.nl_pid
Christian Franke599da952013-01-24 14:04:43 +0000389 && (h->nlmsg_type != RTM_NEWADDR && h->nlmsg_type != RTM_DELADDR))
paul7021c422003-07-15 12:52:22 +0000390 {
391 if (IS_ZEBRA_DEBUG_KERNEL)
ajsb6178002004-12-07 21:12:56 +0000392 zlog_debug ("netlink_parse_info: %s packet comes from %s",
Feng Lu758fb8f2014-07-03 18:23:09 +0800393 zvrf->netlink_cmd.name, nl->name);
paul7021c422003-07-15 12:52:22 +0000394 continue;
395 }
396
Feng Lu758fb8f2014-07-03 18:23:09 +0800397 error = (*filter) (&snl, h, zvrf->vrf_id);
paul7021c422003-07-15 12:52:22 +0000398 if (error < 0)
399 {
400 zlog (NULL, LOG_ERR, "%s filter function error", nl->name);
401 ret = error;
402 }
403 }
paul718e3742002-12-13 20:15:29 +0000404
405 /* After error care. */
406 if (msg.msg_flags & MSG_TRUNC)
paul7021c422003-07-15 12:52:22 +0000407 {
408 zlog (NULL, LOG_ERR, "%s error: message truncated", nl->name);
409 continue;
410 }
paul718e3742002-12-13 20:15:29 +0000411 if (status)
paul7021c422003-07-15 12:52:22 +0000412 {
413 zlog (NULL, LOG_ERR, "%s error: data remnant size %d", nl->name,
414 status);
415 return -1;
416 }
paul718e3742002-12-13 20:15:29 +0000417 }
418 return ret;
419}
420
421/* Utility function for parse rtattr. */
422static void
paul7021c422003-07-15 12:52:22 +0000423netlink_parse_rtattr (struct rtattr **tb, int max, struct rtattr *rta,
424 int len)
paul718e3742002-12-13 20:15:29 +0000425{
paul7021c422003-07-15 12:52:22 +0000426 while (RTA_OK (rta, len))
paul718e3742002-12-13 20:15:29 +0000427 {
428 if (rta->rta_type <= max)
paul7021c422003-07-15 12:52:22 +0000429 tb[rta->rta_type] = rta;
430 rta = RTA_NEXT (rta, len);
paul718e3742002-12-13 20:15:29 +0000431 }
432}
433
Josh Bailey26e2ae32012-03-22 01:09:21 -0700434/* Utility function to parse hardware link-layer address and update ifp */
435static void
436netlink_interface_update_hw_addr (struct rtattr **tb, struct interface *ifp)
437{
438 int i;
439
440 if (tb[IFLA_ADDRESS])
441 {
442 int hw_addr_len;
443
444 hw_addr_len = RTA_PAYLOAD (tb[IFLA_ADDRESS]);
445
446 if (hw_addr_len > INTERFACE_HWADDR_MAX)
447 zlog_warn ("Hardware address is too large: %d", hw_addr_len);
448 else
449 {
450 ifp->hw_addr_len = hw_addr_len;
451 memcpy (ifp->hw_addr, RTA_DATA (tb[IFLA_ADDRESS]), hw_addr_len);
452
453 for (i = 0; i < hw_addr_len; i++)
454 if (ifp->hw_addr[i] != 0)
455 break;
456
457 if (i == hw_addr_len)
458 ifp->hw_addr_len = 0;
459 else
460 ifp->hw_addr_len = hw_addr_len;
461 }
462 }
463}
464
paul718e3742002-12-13 20:15:29 +0000465/* Called from interface_lookup_netlink(). This function is only used
466 during bootstrap. */
Stephen Hemminger6072b242008-08-14 16:52:26 +0100467static int
Feng Lu758fb8f2014-07-03 18:23:09 +0800468netlink_interface (struct sockaddr_nl *snl, struct nlmsghdr *h,
469 vrf_id_t vrf_id)
paul718e3742002-12-13 20:15:29 +0000470{
471 int len;
472 struct ifinfomsg *ifi;
473 struct rtattr *tb[IFLA_MAX + 1];
474 struct interface *ifp;
475 char *name;
paul718e3742002-12-13 20:15:29 +0000476
477 ifi = NLMSG_DATA (h);
478
479 if (h->nlmsg_type != RTM_NEWLINK)
480 return 0;
481
482 len = h->nlmsg_len - NLMSG_LENGTH (sizeof (struct ifinfomsg));
483 if (len < 0)
484 return -1;
485
486 /* Looking up interface name. */
487 memset (tb, 0, sizeof tb);
488 netlink_parse_rtattr (tb, IFLA_MAX, IFLA_RTA (ifi), len);
paulc15cb242005-01-24 09:05:27 +0000489
paul1e193152005-02-14 23:53:05 +0000490#ifdef IFLA_WIRELESS
paulc15cb242005-01-24 09:05:27 +0000491 /* check for wireless messages to ignore */
492 if ((tb[IFLA_WIRELESS] != NULL) && (ifi->ifi_change == 0))
493 {
494 if (IS_ZEBRA_DEBUG_KERNEL)
495 zlog_debug ("%s: ignoring IFLA_WIRELESS message", __func__);
496 return 0;
497 }
paul1e193152005-02-14 23:53:05 +0000498#endif /* IFLA_WIRELESS */
paulc15cb242005-01-24 09:05:27 +0000499
paul718e3742002-12-13 20:15:29 +0000500 if (tb[IFLA_IFNAME] == NULL)
501 return -1;
paul7021c422003-07-15 12:52:22 +0000502 name = (char *) RTA_DATA (tb[IFLA_IFNAME]);
paul718e3742002-12-13 20:15:29 +0000503
504 /* Add interface. */
Feng Lu758fb8f2014-07-03 18:23:09 +0800505 ifp = if_get_by_name_vrf (name, vrf_id);
ajsd2fc8892005-04-02 18:38:43 +0000506 set_ifindex(ifp, ifi->ifi_index);
paul718e3742002-12-13 20:15:29 +0000507 ifp->flags = ifi->ifi_flags & 0x0000fffff;
Stephen Hemminger4308abb2008-12-01 14:19:38 -0800508 ifp->mtu6 = ifp->mtu = *(uint32_t *) RTA_DATA (tb[IFLA_MTU]);
Brett Cipherydb19c852013-10-03 13:48:54 +0000509 ifp->metric = 0;
paul718e3742002-12-13 20:15:29 +0000510
511 /* Hardware type and address. */
512 ifp->hw_type = ifi->ifi_type;
Josh Bailey26e2ae32012-03-22 01:09:21 -0700513 netlink_interface_update_hw_addr (tb, ifp);
paul718e3742002-12-13 20:15:29 +0000514
515 if_add_update (ifp);
516
517 return 0;
518}
519
520/* Lookup interface IPv4/IPv6 address. */
Stephen Hemminger6072b242008-08-14 16:52:26 +0100521static int
Feng Lu758fb8f2014-07-03 18:23:09 +0800522netlink_interface_addr (struct sockaddr_nl *snl, struct nlmsghdr *h,
523 vrf_id_t vrf_id)
paul718e3742002-12-13 20:15:29 +0000524{
525 int len;
526 struct ifaddrmsg *ifa;
paul7021c422003-07-15 12:52:22 +0000527 struct rtattr *tb[IFA_MAX + 1];
paul718e3742002-12-13 20:15:29 +0000528 struct interface *ifp;
Andrew J. Schorre4529632006-12-12 19:18:21 +0000529 void *addr;
530 void *broad;
paul718e3742002-12-13 20:15:29 +0000531 u_char flags = 0;
532 char *label = NULL;
533
534 ifa = NLMSG_DATA (h);
535
paul7021c422003-07-15 12:52:22 +0000536 if (ifa->ifa_family != AF_INET
paul718e3742002-12-13 20:15:29 +0000537#ifdef HAVE_IPV6
538 && ifa->ifa_family != AF_INET6
539#endif /* HAVE_IPV6 */
paul7021c422003-07-15 12:52:22 +0000540 )
paul718e3742002-12-13 20:15:29 +0000541 return 0;
542
543 if (h->nlmsg_type != RTM_NEWADDR && h->nlmsg_type != RTM_DELADDR)
544 return 0;
545
paul7021c422003-07-15 12:52:22 +0000546 len = h->nlmsg_len - NLMSG_LENGTH (sizeof (struct ifaddrmsg));
paul718e3742002-12-13 20:15:29 +0000547 if (len < 0)
548 return -1;
549
550 memset (tb, 0, sizeof tb);
551 netlink_parse_rtattr (tb, IFA_MAX, IFA_RTA (ifa), len);
552
Feng Lu758fb8f2014-07-03 18:23:09 +0800553 ifp = if_lookup_by_index_vrf (ifa->ifa_index, vrf_id);
paul718e3742002-12-13 20:15:29 +0000554 if (ifp == NULL)
555 {
Feng Lu758fb8f2014-07-03 18:23:09 +0800556 zlog_err ("netlink_interface_addr can't find interface by index %d vrf %u",
557 ifa->ifa_index, vrf_id);
paul718e3742002-12-13 20:15:29 +0000558 return -1;
559 }
560
paul7021c422003-07-15 12:52:22 +0000561 if (IS_ZEBRA_DEBUG_KERNEL) /* remove this line to see initial ifcfg */
paul718e3742002-12-13 20:15:29 +0000562 {
paul00df0c12002-12-13 21:07:36 +0000563 char buf[BUFSIZ];
Feng Lu758fb8f2014-07-03 18:23:09 +0800564 zlog_debug ("netlink_interface_addr %s %s vrf %u:",
565 lookup (nlmsg_str, h->nlmsg_type), ifp->name, vrf_id);
paul718e3742002-12-13 20:15:29 +0000566 if (tb[IFA_LOCAL])
hasso206d8052005-04-09 16:38:51 +0000567 zlog_debug (" IFA_LOCAL %s/%d",
568 inet_ntop (ifa->ifa_family, RTA_DATA (tb[IFA_LOCAL]),
569 buf, BUFSIZ), ifa->ifa_prefixlen);
paul718e3742002-12-13 20:15:29 +0000570 if (tb[IFA_ADDRESS])
hasso206d8052005-04-09 16:38:51 +0000571 zlog_debug (" IFA_ADDRESS %s/%d",
572 inet_ntop (ifa->ifa_family, RTA_DATA (tb[IFA_ADDRESS]),
573 buf, BUFSIZ), ifa->ifa_prefixlen);
paul718e3742002-12-13 20:15:29 +0000574 if (tb[IFA_BROADCAST])
hasso206d8052005-04-09 16:38:51 +0000575 zlog_debug (" IFA_BROADCAST %s/%d",
576 inet_ntop (ifa->ifa_family, RTA_DATA (tb[IFA_BROADCAST]),
577 buf, BUFSIZ), ifa->ifa_prefixlen);
paul00df0c12002-12-13 21:07:36 +0000578 if (tb[IFA_LABEL] && strcmp (ifp->name, RTA_DATA (tb[IFA_LABEL])))
ajsb6178002004-12-07 21:12:56 +0000579 zlog_debug (" IFA_LABEL %s", (char *)RTA_DATA (tb[IFA_LABEL]));
pauld34b8992006-01-17 18:03:04 +0000580
581 if (tb[IFA_CACHEINFO])
582 {
583 struct ifa_cacheinfo *ci = RTA_DATA (tb[IFA_CACHEINFO]);
584 zlog_debug (" IFA_CACHEINFO pref %d, valid %d",
585 ci->ifa_prefered, ci->ifa_valid);
586 }
paul718e3742002-12-13 20:15:29 +0000587 }
paul31a476c2003-09-29 19:54:53 +0000588
Andrew J. Schorre4529632006-12-12 19:18:21 +0000589 /* logic copied from iproute2/ip/ipaddress.c:print_addrinfo() */
590 if (tb[IFA_LOCAL] == NULL)
591 tb[IFA_LOCAL] = tb[IFA_ADDRESS];
paul31a476c2003-09-29 19:54:53 +0000592 if (tb[IFA_ADDRESS] == NULL)
593 tb[IFA_ADDRESS] = tb[IFA_LOCAL];
594
Andrew J. Schorre4529632006-12-12 19:18:21 +0000595 /* local interface address */
596 addr = (tb[IFA_LOCAL] ? RTA_DATA(tb[IFA_LOCAL]) : NULL);
597
598 /* is there a peer address? */
Andrew J. Schorre4529632006-12-12 19:18:21 +0000599 if (tb[IFA_ADDRESS] &&
vize068fd772007-08-10 06:25:20 +0000600 memcmp(RTA_DATA(tb[IFA_ADDRESS]), RTA_DATA(tb[IFA_LOCAL]), RTA_PAYLOAD(tb[IFA_ADDRESS])))
paul7021c422003-07-15 12:52:22 +0000601 {
Andrew J. Schorre4529632006-12-12 19:18:21 +0000602 broad = RTA_DATA(tb[IFA_ADDRESS]);
603 SET_FLAG (flags, ZEBRA_IFA_PEER);
paul7021c422003-07-15 12:52:22 +0000604 }
paul31a476c2003-09-29 19:54:53 +0000605 else
Andrew J. Schorre4529632006-12-12 19:18:21 +0000606 /* seeking a broadcast address */
607 broad = (tb[IFA_BROADCAST] ? RTA_DATA(tb[IFA_BROADCAST]) : NULL);
paul00df0c12002-12-13 21:07:36 +0000608
Paul Jakma27b47252006-07-02 16:38:54 +0000609 /* addr is primary key, SOL if we don't have one */
610 if (addr == NULL)
611 {
612 zlog_debug ("%s: NULL address", __func__);
613 return -1;
614 }
615
paul718e3742002-12-13 20:15:29 +0000616 /* Flags. */
617 if (ifa->ifa_flags & IFA_F_SECONDARY)
618 SET_FLAG (flags, ZEBRA_IFA_SECONDARY);
619
620 /* Label */
621 if (tb[IFA_LABEL])
622 label = (char *) RTA_DATA (tb[IFA_LABEL]);
623
624 if (ifp && label && strcmp (ifp->name, label) == 0)
625 label = NULL;
626
627 /* Register interface address to the interface. */
628 if (ifa->ifa_family == AF_INET)
629 {
paul7021c422003-07-15 12:52:22 +0000630 if (h->nlmsg_type == RTM_NEWADDR)
631 connected_add_ipv4 (ifp, flags,
632 (struct in_addr *) addr, ifa->ifa_prefixlen,
633 (struct in_addr *) broad, label);
634 else
635 connected_delete_ipv4 (ifp, flags,
636 (struct in_addr *) addr, ifa->ifa_prefixlen,
paul0752ef02005-11-03 12:35:21 +0000637 (struct in_addr *) broad);
paul718e3742002-12-13 20:15:29 +0000638 }
639#ifdef HAVE_IPV6
640 if (ifa->ifa_family == AF_INET6)
641 {
642 if (h->nlmsg_type == RTM_NEWADDR)
Andrew J. Schorre4529632006-12-12 19:18:21 +0000643 connected_add_ipv6 (ifp, flags,
paul7021c422003-07-15 12:52:22 +0000644 (struct in6_addr *) addr, ifa->ifa_prefixlen,
paul0752ef02005-11-03 12:35:21 +0000645 (struct in6_addr *) broad, label);
paul718e3742002-12-13 20:15:29 +0000646 else
paul7021c422003-07-15 12:52:22 +0000647 connected_delete_ipv6 (ifp,
648 (struct in6_addr *) addr, ifa->ifa_prefixlen,
649 (struct in6_addr *) broad);
paul718e3742002-12-13 20:15:29 +0000650 }
paul7021c422003-07-15 12:52:22 +0000651#endif /* HAVE_IPV6 */
paul718e3742002-12-13 20:15:29 +0000652
653 return 0;
654}
655
656/* Looking up routing table by netlink interface. */
Stephen Hemminger6072b242008-08-14 16:52:26 +0100657static int
Feng Lu758fb8f2014-07-03 18:23:09 +0800658netlink_routing_table (struct sockaddr_nl *snl, struct nlmsghdr *h,
659 vrf_id_t vrf_id)
paul718e3742002-12-13 20:15:29 +0000660{
661 int len;
662 struct rtmsg *rtm;
paul7021c422003-07-15 12:52:22 +0000663 struct rtattr *tb[RTA_MAX + 1];
paul718e3742002-12-13 20:15:29 +0000664 u_char flags = 0;
paul7021c422003-07-15 12:52:22 +0000665
666 char anyaddr[16] = { 0 };
paul718e3742002-12-13 20:15:29 +0000667
668 int index;
669 int table;
hasso34195bf2004-04-06 12:07:06 +0000670 int metric;
671
paul718e3742002-12-13 20:15:29 +0000672 void *dest;
673 void *gate;
Paul Jakma7514fb72007-05-02 16:05:35 +0000674 void *src;
paul718e3742002-12-13 20:15:29 +0000675
676 rtm = NLMSG_DATA (h);
677
678 if (h->nlmsg_type != RTM_NEWROUTE)
679 return 0;
680 if (rtm->rtm_type != RTN_UNICAST)
681 return 0;
682
683 table = rtm->rtm_table;
paul7021c422003-07-15 12:52:22 +0000684#if 0 /* we weed them out later in rib_weed_tables () */
paulb21b19c2003-06-15 01:28:29 +0000685 if (table != RT_TABLE_MAIN && table != zebrad.rtm_table_default)
paul718e3742002-12-13 20:15:29 +0000686 return 0;
687#endif
688
paul7021c422003-07-15 12:52:22 +0000689 len = h->nlmsg_len - NLMSG_LENGTH (sizeof (struct rtmsg));
paul718e3742002-12-13 20:15:29 +0000690 if (len < 0)
691 return -1;
692
693 memset (tb, 0, sizeof tb);
694 netlink_parse_rtattr (tb, RTA_MAX, RTM_RTA (rtm), len);
695
696 if (rtm->rtm_flags & RTM_F_CLONED)
697 return 0;
698 if (rtm->rtm_protocol == RTPROT_REDIRECT)
699 return 0;
700 if (rtm->rtm_protocol == RTPROT_KERNEL)
701 return 0;
702
703 if (rtm->rtm_src_len != 0)
704 return 0;
705
706 /* Route which inserted by Zebra. */
707 if (rtm->rtm_protocol == RTPROT_ZEBRA)
708 flags |= ZEBRA_FLAG_SELFROUTE;
paul7021c422003-07-15 12:52:22 +0000709
paul718e3742002-12-13 20:15:29 +0000710 index = 0;
hasso34195bf2004-04-06 12:07:06 +0000711 metric = 0;
paul718e3742002-12-13 20:15:29 +0000712 dest = NULL;
713 gate = NULL;
Paul Jakma7514fb72007-05-02 16:05:35 +0000714 src = NULL;
paul718e3742002-12-13 20:15:29 +0000715
716 if (tb[RTA_OIF])
717 index = *(int *) RTA_DATA (tb[RTA_OIF]);
718
719 if (tb[RTA_DST])
720 dest = RTA_DATA (tb[RTA_DST]);
721 else
722 dest = anyaddr;
723
Paul Jakma7514fb72007-05-02 16:05:35 +0000724 if (tb[RTA_PREFSRC])
725 src = RTA_DATA (tb[RTA_PREFSRC]);
726
paul718e3742002-12-13 20:15:29 +0000727 if (tb[RTA_GATEWAY])
728 gate = RTA_DATA (tb[RTA_GATEWAY]);
729
hasso34195bf2004-04-06 12:07:06 +0000730 if (tb[RTA_PRIORITY])
731 metric = *(int *) RTA_DATA(tb[RTA_PRIORITY]);
732
paul718e3742002-12-13 20:15:29 +0000733 if (rtm->rtm_family == AF_INET)
734 {
735 struct prefix_ipv4 p;
736 p.family = AF_INET;
737 memcpy (&p.prefix, dest, 4);
738 p.prefixlen = rtm->rtm_dst_len;
739
Josh Bailey26e2ae32012-03-22 01:09:21 -0700740 if (!tb[RTA_MULTIPATH])
741 rib_add_ipv4 (ZEBRA_ROUTE_KERNEL, flags, &p, gate, src, index,
Feng Lu758fb8f2014-07-03 18:23:09 +0800742 vrf_id, table, metric, 0, SAFI_UNICAST);
Josh Bailey26e2ae32012-03-22 01:09:21 -0700743 else
744 {
745 /* This is a multipath route */
746
747 struct rib *rib;
748 struct rtnexthop *rtnh =
749 (struct rtnexthop *) RTA_DATA (tb[RTA_MULTIPATH]);
750
751 len = RTA_PAYLOAD (tb[RTA_MULTIPATH]);
752
753 rib = XCALLOC (MTYPE_RIB, sizeof (struct rib));
754 rib->type = ZEBRA_ROUTE_KERNEL;
755 rib->distance = 0;
756 rib->flags = flags;
757 rib->metric = metric;
Feng Lu758fb8f2014-07-03 18:23:09 +0800758 rib->vrf_id = vrf_id;
Josh Bailey26e2ae32012-03-22 01:09:21 -0700759 rib->table = table;
760 rib->nexthop_num = 0;
761 rib->uptime = time (NULL);
762
763 for (;;)
764 {
765 if (len < (int) sizeof (*rtnh) || rtnh->rtnh_len > len)
766 break;
767
Josh Bailey26e2ae32012-03-22 01:09:21 -0700768 index = rtnh->rtnh_ifindex;
769 gate = 0;
770 if (rtnh->rtnh_len > sizeof (*rtnh))
771 {
772 memset (tb, 0, sizeof (tb));
773 netlink_parse_rtattr (tb, RTA_MAX, RTNH_DATA (rtnh),
774 rtnh->rtnh_len - sizeof (*rtnh));
775 if (tb[RTA_GATEWAY])
776 gate = RTA_DATA (tb[RTA_GATEWAY]);
777 }
778
779 if (gate)
780 {
781 if (index)
782 nexthop_ipv4_ifindex_add (rib, gate, src, index);
783 else
784 nexthop_ipv4_add (rib, gate, src);
785 }
786 else
787 nexthop_ifindex_add (rib, index);
788
789 len -= NLMSG_ALIGN(rtnh->rtnh_len);
790 rtnh = RTNH_NEXT(rtnh);
791 }
792
793 if (rib->nexthop_num == 0)
794 XFREE (MTYPE_RIB, rib);
795 else
Avneesh Sachdev14d2bba2012-04-11 23:51:08 -0700796 rib_add_ipv4_multipath (&p, rib, SAFI_UNICAST);
Josh Bailey26e2ae32012-03-22 01:09:21 -0700797 }
paul718e3742002-12-13 20:15:29 +0000798 }
799#ifdef HAVE_IPV6
800 if (rtm->rtm_family == AF_INET6)
801 {
802 struct prefix_ipv6 p;
803 p.family = AF_INET6;
804 memcpy (&p.prefix, dest, 16);
805 p.prefixlen = rtm->rtm_dst_len;
806
Feng Lu758fb8f2014-07-03 18:23:09 +0800807 rib_add_ipv6 (ZEBRA_ROUTE_KERNEL, flags, &p, gate, index, vrf_id,
Feng Lu0d0686f2015-05-22 11:40:02 +0200808 table, metric, 0, SAFI_UNICAST);
paul718e3742002-12-13 20:15:29 +0000809 }
810#endif /* HAVE_IPV6 */
811
812 return 0;
813}
814
Stephen Hemminger1423c802008-08-14 17:59:25 +0100815static const struct message rtproto_str[] = {
paul718e3742002-12-13 20:15:29 +0000816 {RTPROT_REDIRECT, "redirect"},
817 {RTPROT_KERNEL, "kernel"},
818 {RTPROT_BOOT, "boot"},
819 {RTPROT_STATIC, "static"},
820 {RTPROT_GATED, "GateD"},
821 {RTPROT_RA, "router advertisement"},
822 {RTPROT_MRT, "MRT"},
823 {RTPROT_ZEBRA, "Zebra"},
824#ifdef RTPROT_BIRD
825 {RTPROT_BIRD, "BIRD"},
826#endif /* RTPROT_BIRD */
827 {0, NULL}
828};
829
830/* Routing information change from the kernel. */
Stephen Hemminger6072b242008-08-14 16:52:26 +0100831static int
Feng Lu758fb8f2014-07-03 18:23:09 +0800832netlink_route_change (struct sockaddr_nl *snl, struct nlmsghdr *h,
833 vrf_id_t vrf_id)
paul718e3742002-12-13 20:15:29 +0000834{
835 int len;
836 struct rtmsg *rtm;
paul7021c422003-07-15 12:52:22 +0000837 struct rtattr *tb[RTA_MAX + 1];
838
839 char anyaddr[16] = { 0 };
paul718e3742002-12-13 20:15:29 +0000840
841 int index;
842 int table;
Josh Bailey26e2ae32012-03-22 01:09:21 -0700843 int metric;
Dmitry Popov83d16142011-09-11 13:48:25 +0400844
paul718e3742002-12-13 20:15:29 +0000845 void *dest;
846 void *gate;
Paul Jakma7514fb72007-05-02 16:05:35 +0000847 void *src;
paul718e3742002-12-13 20:15:29 +0000848
849 rtm = NLMSG_DATA (h);
850
paul7021c422003-07-15 12:52:22 +0000851 if (!(h->nlmsg_type == RTM_NEWROUTE || h->nlmsg_type == RTM_DELROUTE))
paul718e3742002-12-13 20:15:29 +0000852 {
853 /* If this is not route add/delete message print warning. */
Feng Lu758fb8f2014-07-03 18:23:09 +0800854 zlog_warn ("Kernel message: %d vrf %u\n", h->nlmsg_type, vrf_id);
paul718e3742002-12-13 20:15:29 +0000855 return 0;
856 }
857
858 /* Connected route. */
859 if (IS_ZEBRA_DEBUG_KERNEL)
Feng Lu758fb8f2014-07-03 18:23:09 +0800860 zlog_debug ("%s %s %s proto %s vrf %u",
paul7021c422003-07-15 12:52:22 +0000861 h->nlmsg_type ==
862 RTM_NEWROUTE ? "RTM_NEWROUTE" : "RTM_DELROUTE",
863 rtm->rtm_family == AF_INET ? "ipv4" : "ipv6",
864 rtm->rtm_type == RTN_UNICAST ? "unicast" : "multicast",
Feng Lu758fb8f2014-07-03 18:23:09 +0800865 lookup (rtproto_str, rtm->rtm_protocol),
866 vrf_id);
paul718e3742002-12-13 20:15:29 +0000867
868 if (rtm->rtm_type != RTN_UNICAST)
869 {
870 return 0;
871 }
872
873 table = rtm->rtm_table;
paulb21b19c2003-06-15 01:28:29 +0000874 if (table != RT_TABLE_MAIN && table != zebrad.rtm_table_default)
paul718e3742002-12-13 20:15:29 +0000875 {
876 return 0;
877 }
878
paul7021c422003-07-15 12:52:22 +0000879 len = h->nlmsg_len - NLMSG_LENGTH (sizeof (struct rtmsg));
paul718e3742002-12-13 20:15:29 +0000880 if (len < 0)
881 return -1;
882
883 memset (tb, 0, sizeof tb);
884 netlink_parse_rtattr (tb, RTA_MAX, RTM_RTA (rtm), len);
885
886 if (rtm->rtm_flags & RTM_F_CLONED)
887 return 0;
888 if (rtm->rtm_protocol == RTPROT_REDIRECT)
889 return 0;
890 if (rtm->rtm_protocol == RTPROT_KERNEL)
891 return 0;
892
893 if (rtm->rtm_protocol == RTPROT_ZEBRA && h->nlmsg_type == RTM_NEWROUTE)
894 return 0;
895
896 if (rtm->rtm_src_len != 0)
897 {
Feng Lu758fb8f2014-07-03 18:23:09 +0800898 zlog_warn ("netlink_route_change(): no src len, vrf %u", vrf_id);
paul718e3742002-12-13 20:15:29 +0000899 return 0;
900 }
paul7021c422003-07-15 12:52:22 +0000901
paul718e3742002-12-13 20:15:29 +0000902 index = 0;
Josh Bailey26e2ae32012-03-22 01:09:21 -0700903 metric = 0;
paul718e3742002-12-13 20:15:29 +0000904 dest = NULL;
905 gate = NULL;
Paul Jakma7514fb72007-05-02 16:05:35 +0000906 src = NULL;
paul718e3742002-12-13 20:15:29 +0000907
908 if (tb[RTA_OIF])
909 index = *(int *) RTA_DATA (tb[RTA_OIF]);
910
911 if (tb[RTA_DST])
912 dest = RTA_DATA (tb[RTA_DST]);
913 else
914 dest = anyaddr;
915
916 if (tb[RTA_GATEWAY])
917 gate = RTA_DATA (tb[RTA_GATEWAY]);
918
Paul Jakma7514fb72007-05-02 16:05:35 +0000919 if (tb[RTA_PREFSRC])
920 src = RTA_DATA (tb[RTA_PREFSRC]);
921
Dmitry Popov83d16142011-09-11 13:48:25 +0400922 if (h->nlmsg_type == RTM_NEWROUTE && tb[RTA_PRIORITY])
Josh Bailey26e2ae32012-03-22 01:09:21 -0700923 metric = *(int *) RTA_DATA(tb[RTA_PRIORITY]);
924
paul718e3742002-12-13 20:15:29 +0000925 if (rtm->rtm_family == AF_INET)
926 {
927 struct prefix_ipv4 p;
928 p.family = AF_INET;
929 memcpy (&p.prefix, dest, 4);
930 p.prefixlen = rtm->rtm_dst_len;
931
932 if (IS_ZEBRA_DEBUG_KERNEL)
paul7021c422003-07-15 12:52:22 +0000933 {
Timo Teräsbe6335d2015-05-23 11:08:41 +0300934 char buf[PREFIX_STRLEN];
Feng Lu758fb8f2014-07-03 18:23:09 +0800935 zlog_debug ("%s %s vrf %u",
Timo Teräsbe6335d2015-05-23 11:08:41 +0300936 h->nlmsg_type == RTM_NEWROUTE ? "RTM_NEWROUTE" : "RTM_DELROUTE",
Feng Lu758fb8f2014-07-03 18:23:09 +0800937 prefix2str (&p, buf, sizeof(buf)), vrf_id);
paul7021c422003-07-15 12:52:22 +0000938 }
paul718e3742002-12-13 20:15:29 +0000939
940 if (h->nlmsg_type == RTM_NEWROUTE)
Josh Bailey26e2ae32012-03-22 01:09:21 -0700941 {
942 if (!tb[RTA_MULTIPATH])
Feng Lu758fb8f2014-07-03 18:23:09 +0800943 rib_add_ipv4 (ZEBRA_ROUTE_KERNEL, 0, &p, gate, src, index, vrf_id,
Feng Lu0d0686f2015-05-22 11:40:02 +0200944 table, metric, 0, SAFI_UNICAST);
Josh Bailey26e2ae32012-03-22 01:09:21 -0700945 else
946 {
947 /* This is a multipath route */
948
949 struct rib *rib;
950 struct rtnexthop *rtnh =
951 (struct rtnexthop *) RTA_DATA (tb[RTA_MULTIPATH]);
952
953 len = RTA_PAYLOAD (tb[RTA_MULTIPATH]);
954
955 rib = XCALLOC (MTYPE_RIB, sizeof (struct rib));
956 rib->type = ZEBRA_ROUTE_KERNEL;
957 rib->distance = 0;
958 rib->flags = 0;
959 rib->metric = metric;
Feng Lu758fb8f2014-07-03 18:23:09 +0800960 rib->vrf_id = vrf_id;
Josh Bailey26e2ae32012-03-22 01:09:21 -0700961 rib->table = table;
962 rib->nexthop_num = 0;
963 rib->uptime = time (NULL);
964
965 for (;;)
966 {
967 if (len < (int) sizeof (*rtnh) || rtnh->rtnh_len > len)
968 break;
969
Josh Bailey26e2ae32012-03-22 01:09:21 -0700970 index = rtnh->rtnh_ifindex;
971 gate = 0;
972 if (rtnh->rtnh_len > sizeof (*rtnh))
973 {
974 memset (tb, 0, sizeof (tb));
975 netlink_parse_rtattr (tb, RTA_MAX, RTNH_DATA (rtnh),
976 rtnh->rtnh_len - sizeof (*rtnh));
977 if (tb[RTA_GATEWAY])
978 gate = RTA_DATA (tb[RTA_GATEWAY]);
979 }
980
981 if (gate)
982 {
983 if (index)
984 nexthop_ipv4_ifindex_add (rib, gate, src, index);
985 else
986 nexthop_ipv4_add (rib, gate, src);
987 }
988 else
989 nexthop_ifindex_add (rib, index);
990
991 len -= NLMSG_ALIGN(rtnh->rtnh_len);
992 rtnh = RTNH_NEXT(rtnh);
993 }
994
995 if (rib->nexthop_num == 0)
996 XFREE (MTYPE_RIB, rib);
997 else
Avneesh Sachdev14d2bba2012-04-11 23:51:08 -0700998 rib_add_ipv4_multipath (&p, rib, SAFI_UNICAST);
Josh Bailey26e2ae32012-03-22 01:09:21 -0700999 }
1000 }
paul718e3742002-12-13 20:15:29 +00001001 else
Feng Lu758fb8f2014-07-03 18:23:09 +08001002 rib_delete_ipv4 (ZEBRA_ROUTE_KERNEL, 0, &p, gate, index, vrf_id,
Feng Lu0d0686f2015-05-22 11:40:02 +02001003 SAFI_UNICAST);
paul718e3742002-12-13 20:15:29 +00001004 }
1005
1006#ifdef HAVE_IPV6
1007 if (rtm->rtm_family == AF_INET6)
1008 {
1009 struct prefix_ipv6 p;
paul718e3742002-12-13 20:15:29 +00001010
1011 p.family = AF_INET6;
1012 memcpy (&p.prefix, dest, 16);
1013 p.prefixlen = rtm->rtm_dst_len;
1014
1015 if (IS_ZEBRA_DEBUG_KERNEL)
paul7021c422003-07-15 12:52:22 +00001016 {
Timo Teräsbe6335d2015-05-23 11:08:41 +03001017 char buf[PREFIX_STRLEN];
Feng Lu758fb8f2014-07-03 18:23:09 +08001018 zlog_debug ("%s %s vrf %u",
Timo Teräsbe6335d2015-05-23 11:08:41 +03001019 h->nlmsg_type == RTM_NEWROUTE ? "RTM_NEWROUTE" : "RTM_DELROUTE",
Feng Lu758fb8f2014-07-03 18:23:09 +08001020 prefix2str (&p, buf, sizeof(buf)), vrf_id);
paul7021c422003-07-15 12:52:22 +00001021 }
paul718e3742002-12-13 20:15:29 +00001022
1023 if (h->nlmsg_type == RTM_NEWROUTE)
Feng Lu758fb8f2014-07-03 18:23:09 +08001024 rib_add_ipv6 (ZEBRA_ROUTE_KERNEL, 0, &p, gate, index, vrf_id, table,
Feng Lu0d0686f2015-05-22 11:40:02 +02001025 metric, 0, SAFI_UNICAST);
paul718e3742002-12-13 20:15:29 +00001026 else
Feng Lu758fb8f2014-07-03 18:23:09 +08001027 rib_delete_ipv6 (ZEBRA_ROUTE_KERNEL, 0, &p, gate, index, vrf_id,
Feng Lu0d0686f2015-05-22 11:40:02 +02001028 SAFI_UNICAST);
paul718e3742002-12-13 20:15:29 +00001029 }
1030#endif /* HAVE_IPV6 */
1031
1032 return 0;
1033}
1034
Stephen Hemminger6072b242008-08-14 16:52:26 +01001035static int
Feng Lu758fb8f2014-07-03 18:23:09 +08001036netlink_link_change (struct sockaddr_nl *snl, struct nlmsghdr *h,
1037 vrf_id_t vrf_id)
paul718e3742002-12-13 20:15:29 +00001038{
1039 int len;
1040 struct ifinfomsg *ifi;
paul7021c422003-07-15 12:52:22 +00001041 struct rtattr *tb[IFLA_MAX + 1];
paul718e3742002-12-13 20:15:29 +00001042 struct interface *ifp;
1043 char *name;
1044
1045 ifi = NLMSG_DATA (h);
1046
paul7021c422003-07-15 12:52:22 +00001047 if (!(h->nlmsg_type == RTM_NEWLINK || h->nlmsg_type == RTM_DELLINK))
paul718e3742002-12-13 20:15:29 +00001048 {
1049 /* If this is not link add/delete message so print warning. */
Feng Lu758fb8f2014-07-03 18:23:09 +08001050 zlog_warn ("netlink_link_change: wrong kernel message %d vrf %u\n",
1051 h->nlmsg_type, vrf_id);
paul718e3742002-12-13 20:15:29 +00001052 return 0;
1053 }
1054
1055 len = h->nlmsg_len - NLMSG_LENGTH (sizeof (struct ifinfomsg));
1056 if (len < 0)
1057 return -1;
1058
1059 /* Looking up interface name. */
1060 memset (tb, 0, sizeof tb);
1061 netlink_parse_rtattr (tb, IFLA_MAX, IFLA_RTA (ifi), len);
paulc15cb242005-01-24 09:05:27 +00001062
paul1e193152005-02-14 23:53:05 +00001063#ifdef IFLA_WIRELESS
paulc15cb242005-01-24 09:05:27 +00001064 /* check for wireless messages to ignore */
1065 if ((tb[IFLA_WIRELESS] != NULL) && (ifi->ifi_change == 0))
1066 {
1067 if (IS_ZEBRA_DEBUG_KERNEL)
Feng Lu758fb8f2014-07-03 18:23:09 +08001068 zlog_debug ("%s: ignoring IFLA_WIRELESS message, vrf %u", __func__,
1069 vrf_id);
paulc15cb242005-01-24 09:05:27 +00001070 return 0;
1071 }
paul1e193152005-02-14 23:53:05 +00001072#endif /* IFLA_WIRELESS */
paulc15cb242005-01-24 09:05:27 +00001073
paul718e3742002-12-13 20:15:29 +00001074 if (tb[IFLA_IFNAME] == NULL)
1075 return -1;
paul7021c422003-07-15 12:52:22 +00001076 name = (char *) RTA_DATA (tb[IFLA_IFNAME]);
paul718e3742002-12-13 20:15:29 +00001077
1078 /* Add interface. */
1079 if (h->nlmsg_type == RTM_NEWLINK)
1080 {
Feng Lu758fb8f2014-07-03 18:23:09 +08001081 ifp = if_lookup_by_name_vrf (name, vrf_id);
paul718e3742002-12-13 20:15:29 +00001082
paul7021c422003-07-15 12:52:22 +00001083 if (ifp == NULL || !CHECK_FLAG (ifp->status, ZEBRA_INTERFACE_ACTIVE))
1084 {
1085 if (ifp == NULL)
Feng Lu758fb8f2014-07-03 18:23:09 +08001086 ifp = if_get_by_name_vrf (name, vrf_id);
paul718e3742002-12-13 20:15:29 +00001087
ajsd2fc8892005-04-02 18:38:43 +00001088 set_ifindex(ifp, ifi->ifi_index);
paul7021c422003-07-15 12:52:22 +00001089 ifp->flags = ifi->ifi_flags & 0x0000fffff;
paul44145db2004-05-09 11:00:23 +00001090 ifp->mtu6 = ifp->mtu = *(int *) RTA_DATA (tb[IFLA_MTU]);
Brett Cipherydb19c852013-10-03 13:48:54 +00001091 ifp->metric = 0;
paul718e3742002-12-13 20:15:29 +00001092
Josh Bailey26e2ae32012-03-22 01:09:21 -07001093 netlink_interface_update_hw_addr (tb, ifp);
1094
paul7021c422003-07-15 12:52:22 +00001095 /* If new link is added. */
1096 if_add_update (ifp);
1097 }
paul718e3742002-12-13 20:15:29 +00001098 else
paul7021c422003-07-15 12:52:22 +00001099 {
1100 /* Interface status change. */
ajsd2fc8892005-04-02 18:38:43 +00001101 set_ifindex(ifp, ifi->ifi_index);
paul44145db2004-05-09 11:00:23 +00001102 ifp->mtu6 = ifp->mtu = *(int *) RTA_DATA (tb[IFLA_MTU]);
Brett Cipherydb19c852013-10-03 13:48:54 +00001103 ifp->metric = 0;
paul718e3742002-12-13 20:15:29 +00001104
Josh Bailey26e2ae32012-03-22 01:09:21 -07001105 netlink_interface_update_hw_addr (tb, ifp);
1106
paul7021c422003-07-15 12:52:22 +00001107 if (if_is_operative (ifp))
1108 {
1109 ifp->flags = ifi->ifi_flags & 0x0000fffff;
1110 if (!if_is_operative (ifp))
1111 if_down (ifp);
ajsa608bbf2005-03-29 17:03:49 +00001112 else
1113 /* Must notify client daemons of new interface status. */
1114 zebra_interface_up_update (ifp);
paul7021c422003-07-15 12:52:22 +00001115 }
1116 else
1117 {
1118 ifp->flags = ifi->ifi_flags & 0x0000fffff;
1119 if (if_is_operative (ifp))
1120 if_up (ifp);
1121 }
1122 }
paul718e3742002-12-13 20:15:29 +00001123 }
1124 else
1125 {
1126 /* RTM_DELLINK. */
Feng Lu758fb8f2014-07-03 18:23:09 +08001127 ifp = if_lookup_by_name_vrf (name, vrf_id);
paul718e3742002-12-13 20:15:29 +00001128
1129 if (ifp == NULL)
paul7021c422003-07-15 12:52:22 +00001130 {
Feng Lu758fb8f2014-07-03 18:23:09 +08001131 zlog_warn ("interface %s vrf %u is deleted but can't find",
1132 name, vrf_id);
paul7021c422003-07-15 12:52:22 +00001133 return 0;
1134 }
1135
paul718e3742002-12-13 20:15:29 +00001136 if_delete_update (ifp);
1137 }
1138
1139 return 0;
1140}
1141
Stephen Hemminger6072b242008-08-14 16:52:26 +01001142static int
Feng Lu758fb8f2014-07-03 18:23:09 +08001143netlink_information_fetch (struct sockaddr_nl *snl, struct nlmsghdr *h,
1144 vrf_id_t vrf_id)
paul718e3742002-12-13 20:15:29 +00001145{
Stephen Hemminger3d265b42008-08-16 17:30:39 +01001146 /* JF: Ignore messages that aren't from the kernel */
1147 if ( snl->nl_pid != 0 )
1148 {
1149 zlog ( NULL, LOG_ERR, "Ignoring message from pid %u", snl->nl_pid );
1150 return 0;
1151 }
1152
paul718e3742002-12-13 20:15:29 +00001153 switch (h->nlmsg_type)
1154 {
1155 case RTM_NEWROUTE:
Feng Lu758fb8f2014-07-03 18:23:09 +08001156 return netlink_route_change (snl, h, vrf_id);
paul718e3742002-12-13 20:15:29 +00001157 break;
1158 case RTM_DELROUTE:
Feng Lu758fb8f2014-07-03 18:23:09 +08001159 return netlink_route_change (snl, h, vrf_id);
paul718e3742002-12-13 20:15:29 +00001160 break;
1161 case RTM_NEWLINK:
Feng Lu758fb8f2014-07-03 18:23:09 +08001162 return netlink_link_change (snl, h, vrf_id);
paul718e3742002-12-13 20:15:29 +00001163 break;
1164 case RTM_DELLINK:
Feng Lu758fb8f2014-07-03 18:23:09 +08001165 return netlink_link_change (snl, h, vrf_id);
paul718e3742002-12-13 20:15:29 +00001166 break;
1167 case RTM_NEWADDR:
Feng Lu758fb8f2014-07-03 18:23:09 +08001168 return netlink_interface_addr (snl, h, vrf_id);
paul718e3742002-12-13 20:15:29 +00001169 break;
1170 case RTM_DELADDR:
Feng Lu758fb8f2014-07-03 18:23:09 +08001171 return netlink_interface_addr (snl, h, vrf_id);
paul718e3742002-12-13 20:15:29 +00001172 break;
1173 default:
Feng Lu758fb8f2014-07-03 18:23:09 +08001174 zlog_warn ("Unknown netlink nlmsg_type %d vrf %u\n", h->nlmsg_type,
1175 vrf_id);
paul718e3742002-12-13 20:15:29 +00001176 break;
1177 }
1178 return 0;
1179}
1180
1181/* Interface lookup by netlink socket. */
1182int
Feng Lu758fb8f2014-07-03 18:23:09 +08001183interface_lookup_netlink (struct zebra_vrf *zvrf)
paul718e3742002-12-13 20:15:29 +00001184{
1185 int ret;
paul7021c422003-07-15 12:52:22 +00001186
paul718e3742002-12-13 20:15:29 +00001187 /* Get interface information. */
Feng Lu758fb8f2014-07-03 18:23:09 +08001188 ret = netlink_request (AF_PACKET, RTM_GETLINK, &zvrf->netlink_cmd);
paul718e3742002-12-13 20:15:29 +00001189 if (ret < 0)
1190 return ret;
Feng Lu758fb8f2014-07-03 18:23:09 +08001191 ret = netlink_parse_info (netlink_interface, &zvrf->netlink_cmd, zvrf);
paul718e3742002-12-13 20:15:29 +00001192 if (ret < 0)
1193 return ret;
1194
1195 /* Get IPv4 address of the interfaces. */
Feng Lu758fb8f2014-07-03 18:23:09 +08001196 ret = netlink_request (AF_INET, RTM_GETADDR, &zvrf->netlink_cmd);
paul718e3742002-12-13 20:15:29 +00001197 if (ret < 0)
1198 return ret;
Feng Lu758fb8f2014-07-03 18:23:09 +08001199 ret = netlink_parse_info (netlink_interface_addr, &zvrf->netlink_cmd, zvrf);
paul718e3742002-12-13 20:15:29 +00001200 if (ret < 0)
1201 return ret;
1202
1203#ifdef HAVE_IPV6
1204 /* Get IPv6 address of the interfaces. */
Feng Lu758fb8f2014-07-03 18:23:09 +08001205 ret = netlink_request (AF_INET6, RTM_GETADDR, &zvrf->netlink_cmd);
paul718e3742002-12-13 20:15:29 +00001206 if (ret < 0)
1207 return ret;
Feng Lu758fb8f2014-07-03 18:23:09 +08001208 ret = netlink_parse_info (netlink_interface_addr, &zvrf->netlink_cmd, zvrf);
paul718e3742002-12-13 20:15:29 +00001209 if (ret < 0)
1210 return ret;
1211#endif /* HAVE_IPV6 */
1212
1213 return 0;
1214}
1215
1216/* Routing table read function using netlink interface. Only called
1217 bootstrap time. */
1218int
Feng Lu758fb8f2014-07-03 18:23:09 +08001219netlink_route_read (struct zebra_vrf *zvrf)
paul718e3742002-12-13 20:15:29 +00001220{
1221 int ret;
paul7021c422003-07-15 12:52:22 +00001222
paul718e3742002-12-13 20:15:29 +00001223 /* Get IPv4 routing table. */
Feng Lu758fb8f2014-07-03 18:23:09 +08001224 ret = netlink_request (AF_INET, RTM_GETROUTE, &zvrf->netlink_cmd);
paul718e3742002-12-13 20:15:29 +00001225 if (ret < 0)
1226 return ret;
Feng Lu758fb8f2014-07-03 18:23:09 +08001227 ret = netlink_parse_info (netlink_routing_table, &zvrf->netlink_cmd, zvrf);
paul718e3742002-12-13 20:15:29 +00001228 if (ret < 0)
1229 return ret;
1230
1231#ifdef HAVE_IPV6
1232 /* Get IPv6 routing table. */
Feng Lu758fb8f2014-07-03 18:23:09 +08001233 ret = netlink_request (AF_INET6, RTM_GETROUTE, &zvrf->netlink_cmd);
paul718e3742002-12-13 20:15:29 +00001234 if (ret < 0)
1235 return ret;
Feng Lu758fb8f2014-07-03 18:23:09 +08001236 ret = netlink_parse_info (netlink_routing_table, &zvrf->netlink_cmd, zvrf);
paul718e3742002-12-13 20:15:29 +00001237 if (ret < 0)
1238 return ret;
1239#endif /* HAVE_IPV6 */
1240
1241 return 0;
1242}
1243
1244/* Utility function comes from iproute2.
1245 Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru> */
Avneesh Sachdev78deec42012-11-13 22:48:56 +00001246int
Paul Jakma7aa9dce2014-09-19 14:42:23 +01001247addattr_l (struct nlmsghdr *n, size_t maxlen, int type, void *data, int alen)
paul718e3742002-12-13 20:15:29 +00001248{
Paul Jakma7aa9dce2014-09-19 14:42:23 +01001249 size_t len;
paul718e3742002-12-13 20:15:29 +00001250 struct rtattr *rta;
1251
paul7021c422003-07-15 12:52:22 +00001252 len = RTA_LENGTH (alen);
paul718e3742002-12-13 20:15:29 +00001253
paul7021c422003-07-15 12:52:22 +00001254 if (NLMSG_ALIGN (n->nlmsg_len) + len > maxlen)
paul718e3742002-12-13 20:15:29 +00001255 return -1;
1256
paul7021c422003-07-15 12:52:22 +00001257 rta = (struct rtattr *) (((char *) n) + NLMSG_ALIGN (n->nlmsg_len));
paul718e3742002-12-13 20:15:29 +00001258 rta->rta_type = type;
1259 rta->rta_len = len;
paul7021c422003-07-15 12:52:22 +00001260 memcpy (RTA_DATA (rta), data, alen);
paul718e3742002-12-13 20:15:29 +00001261 n->nlmsg_len = NLMSG_ALIGN (n->nlmsg_len) + len;
1262
1263 return 0;
1264}
1265
Avneesh Sachdev78deec42012-11-13 22:48:56 +00001266int
paul718e3742002-12-13 20:15:29 +00001267rta_addattr_l (struct rtattr *rta, int maxlen, int type, void *data, int alen)
1268{
1269 int len;
1270 struct rtattr *subrta;
1271
paul7021c422003-07-15 12:52:22 +00001272 len = RTA_LENGTH (alen);
paul718e3742002-12-13 20:15:29 +00001273
paul7021c422003-07-15 12:52:22 +00001274 if (RTA_ALIGN (rta->rta_len) + len > maxlen)
paul718e3742002-12-13 20:15:29 +00001275 return -1;
1276
paul7021c422003-07-15 12:52:22 +00001277 subrta = (struct rtattr *) (((char *) rta) + RTA_ALIGN (rta->rta_len));
paul718e3742002-12-13 20:15:29 +00001278 subrta->rta_type = type;
1279 subrta->rta_len = len;
paul7021c422003-07-15 12:52:22 +00001280 memcpy (RTA_DATA (subrta), data, alen);
paul718e3742002-12-13 20:15:29 +00001281 rta->rta_len = NLMSG_ALIGN (rta->rta_len) + len;
1282
1283 return 0;
1284}
1285
1286/* Utility function comes from iproute2.
1287 Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru> */
Avneesh Sachdev78deec42012-11-13 22:48:56 +00001288int
Paul Jakma7aa9dce2014-09-19 14:42:23 +01001289addattr32 (struct nlmsghdr *n, size_t maxlen, int type, int data)
paul718e3742002-12-13 20:15:29 +00001290{
Paul Jakma7aa9dce2014-09-19 14:42:23 +01001291 size_t len;
paul718e3742002-12-13 20:15:29 +00001292 struct rtattr *rta;
paul7021c422003-07-15 12:52:22 +00001293
1294 len = RTA_LENGTH (4);
1295
paul718e3742002-12-13 20:15:29 +00001296 if (NLMSG_ALIGN (n->nlmsg_len) + len > maxlen)
1297 return -1;
1298
paul7021c422003-07-15 12:52:22 +00001299 rta = (struct rtattr *) (((char *) n) + NLMSG_ALIGN (n->nlmsg_len));
paul718e3742002-12-13 20:15:29 +00001300 rta->rta_type = type;
1301 rta->rta_len = len;
paul7021c422003-07-15 12:52:22 +00001302 memcpy (RTA_DATA (rta), &data, 4);
paul718e3742002-12-13 20:15:29 +00001303 n->nlmsg_len = NLMSG_ALIGN (n->nlmsg_len) + len;
1304
1305 return 0;
1306}
1307
1308static int
Feng Lu758fb8f2014-07-03 18:23:09 +08001309netlink_talk_filter (struct sockaddr_nl *snl, struct nlmsghdr *h,
1310 vrf_id_t vrf_id)
paul718e3742002-12-13 20:15:29 +00001311{
Feng Lu758fb8f2014-07-03 18:23:09 +08001312 zlog_warn ("netlink_talk: ignoring message type 0x%04x vrf %u", h->nlmsg_type,
1313 vrf_id);
paul718e3742002-12-13 20:15:29 +00001314 return 0;
1315}
1316
1317/* sendmsg() to netlink socket then recvmsg(). */
Stephen Hemminger6072b242008-08-14 16:52:26 +01001318static int
Feng Lu758fb8f2014-07-03 18:23:09 +08001319netlink_talk (struct nlmsghdr *n, struct nlsock *nl, struct zebra_vrf *zvrf)
paul718e3742002-12-13 20:15:29 +00001320{
1321 int status;
1322 struct sockaddr_nl snl;
Timo Teräsc299ed72014-07-29 09:41:55 +00001323 struct iovec iov = {
1324 .iov_base = (void *) n,
1325 .iov_len = n->nlmsg_len
1326 };
1327 struct msghdr msg = {
1328 .msg_name = (void *) &snl,
1329 .msg_namelen = sizeof snl,
1330 .msg_iov = &iov,
1331 .msg_iovlen = 1,
1332 };
ajs4be019d2005-01-29 16:12:41 +00001333 int save_errno;
paul7021c422003-07-15 12:52:22 +00001334
paul718e3742002-12-13 20:15:29 +00001335 memset (&snl, 0, sizeof snl);
1336 snl.nl_family = AF_NETLINK;
paul7021c422003-07-15 12:52:22 +00001337
hassob7ed1ec2005-03-31 20:13:49 +00001338 n->nlmsg_seq = ++nl->seq;
paul718e3742002-12-13 20:15:29 +00001339
1340 /* Request an acknowledgement by setting NLM_F_ACK */
1341 n->nlmsg_flags |= NLM_F_ACK;
paul7021c422003-07-15 12:52:22 +00001342
1343 if (IS_ZEBRA_DEBUG_KERNEL)
hassob7ed1ec2005-03-31 20:13:49 +00001344 zlog_debug ("netlink_talk: %s type %s(%u), seq=%u", nl->name,
paul7021c422003-07-15 12:52:22 +00001345 lookup (nlmsg_str, n->nlmsg_type), n->nlmsg_type,
1346 n->nlmsg_seq);
paul718e3742002-12-13 20:15:29 +00001347
1348 /* Send message to netlink interface. */
paul7021c422003-07-15 12:52:22 +00001349 if (zserv_privs.change (ZPRIVS_RAISE))
1350 zlog (NULL, LOG_ERR, "Can't raise privileges");
paul718e3742002-12-13 20:15:29 +00001351 status = sendmsg (nl->sock, &msg, 0);
ajs4be019d2005-01-29 16:12:41 +00001352 save_errno = errno;
paul7021c422003-07-15 12:52:22 +00001353 if (zserv_privs.change (ZPRIVS_LOWER))
1354 zlog (NULL, LOG_ERR, "Can't lower privileges");
1355
paul718e3742002-12-13 20:15:29 +00001356 if (status < 0)
1357 {
1358 zlog (NULL, LOG_ERR, "netlink_talk sendmsg() error: %s",
ajs4be019d2005-01-29 16:12:41 +00001359 safe_strerror (save_errno));
paul718e3742002-12-13 20:15:29 +00001360 return -1;
1361 }
paul7021c422003-07-15 12:52:22 +00001362
paul718e3742002-12-13 20:15:29 +00001363
1364 /*
1365 * Get reply from netlink socket.
1366 * The reply should either be an acknowlegement or an error.
1367 */
Feng Lu758fb8f2014-07-03 18:23:09 +08001368 return netlink_parse_info (netlink_talk_filter, nl, zvrf);
paul718e3742002-12-13 20:15:29 +00001369}
1370
Christian Frankefa713d92013-07-05 15:35:37 +00001371/* This function takes a nexthop as argument and adds
1372 * the appropriate netlink attributes to an existing
1373 * netlink message.
1374 *
1375 * @param routedesc: Human readable description of route type
1376 * (direct/recursive, single-/multipath)
1377 * @param bytelen: Length of addresses in bytes.
1378 * @param nexthop: Nexthop information
1379 * @param nlmsg: nlmsghdr structure to fill in.
1380 * @param req_size: The size allocated for the message.
1381 */
1382static void
1383_netlink_route_build_singlepath(
1384 const char *routedesc,
1385 int bytelen,
1386 struct nexthop *nexthop,
1387 struct nlmsghdr *nlmsg,
Christian Frankee8d3d292013-07-05 15:35:39 +00001388 struct rtmsg *rtmsg,
Christian Frankefa713d92013-07-05 15:35:37 +00001389 size_t req_size)
1390{
Christian Frankee8d3d292013-07-05 15:35:39 +00001391 if (CHECK_FLAG (nexthop->flags, NEXTHOP_FLAG_ONLINK))
1392 rtmsg->rtm_flags |= RTNH_F_ONLINK;
Christian Frankefa713d92013-07-05 15:35:37 +00001393 if (nexthop->type == NEXTHOP_TYPE_IPV4
1394 || nexthop->type == NEXTHOP_TYPE_IPV4_IFINDEX)
1395 {
1396 addattr_l (nlmsg, req_size, RTA_GATEWAY,
1397 &nexthop->gate.ipv4, bytelen);
1398 if (nexthop->src.ipv4.s_addr)
1399 addattr_l (nlmsg, req_size, RTA_PREFSRC,
1400 &nexthop->src.ipv4, bytelen);
1401
1402 if (IS_ZEBRA_DEBUG_KERNEL)
1403 zlog_debug("netlink_route_multipath() (%s): "
1404 "nexthop via %s if %u",
1405 routedesc,
1406 inet_ntoa (nexthop->gate.ipv4),
1407 nexthop->ifindex);
1408 }
1409#ifdef HAVE_IPV6
1410 if (nexthop->type == NEXTHOP_TYPE_IPV6
1411 || nexthop->type == NEXTHOP_TYPE_IPV6_IFNAME
1412 || nexthop->type == NEXTHOP_TYPE_IPV6_IFINDEX)
1413 {
1414 addattr_l (nlmsg, req_size, RTA_GATEWAY,
1415 &nexthop->gate.ipv6, bytelen);
1416
1417 if (IS_ZEBRA_DEBUG_KERNEL)
1418 zlog_debug("netlink_route_multipath() (%s): "
1419 "nexthop via %s if %u",
1420 routedesc,
1421 inet6_ntoa (nexthop->gate.ipv6),
1422 nexthop->ifindex);
1423 }
1424#endif /* HAVE_IPV6 */
1425 if (nexthop->type == NEXTHOP_TYPE_IFINDEX
1426 || nexthop->type == NEXTHOP_TYPE_IFNAME
1427 || nexthop->type == NEXTHOP_TYPE_IPV4_IFINDEX)
1428 {
1429 addattr32 (nlmsg, req_size, RTA_OIF, nexthop->ifindex);
1430
1431 if (nexthop->src.ipv4.s_addr)
1432 addattr_l (nlmsg, req_size, RTA_PREFSRC,
1433 &nexthop->src.ipv4, bytelen);
1434
1435 if (IS_ZEBRA_DEBUG_KERNEL)
1436 zlog_debug("netlink_route_multipath() (%s): "
1437 "nexthop via if %u", routedesc, nexthop->ifindex);
1438 }
1439
1440 if (nexthop->type == NEXTHOP_TYPE_IPV6_IFINDEX
1441 || nexthop->type == NEXTHOP_TYPE_IPV6_IFNAME)
1442 {
1443 addattr32 (nlmsg, req_size, RTA_OIF, nexthop->ifindex);
1444
1445 if (IS_ZEBRA_DEBUG_KERNEL)
1446 zlog_debug("netlink_route_multipath() (%s): "
1447 "nexthop via if %u", routedesc, nexthop->ifindex);
1448 }
1449}
1450
1451/* This function takes a nexthop as argument and
1452 * appends to the given rtattr/rtnexthop pair the
1453 * representation of the nexthop. If the nexthop
1454 * defines a preferred source, the src parameter
1455 * will be modified to point to that src, otherwise
1456 * it will be kept unmodified.
1457 *
1458 * @param routedesc: Human readable description of route type
1459 * (direct/recursive, single-/multipath)
1460 * @param bytelen: Length of addresses in bytes.
1461 * @param nexthop: Nexthop information
1462 * @param rta: rtnetlink attribute structure
1463 * @param rtnh: pointer to an rtnetlink nexthop structure
1464 * @param src: pointer pointing to a location where
1465 * the prefsrc should be stored.
1466 */
1467static void
1468_netlink_route_build_multipath(
1469 const char *routedesc,
1470 int bytelen,
1471 struct nexthop *nexthop,
1472 struct rtattr *rta,
1473 struct rtnexthop *rtnh,
1474 union g_addr **src
1475 )
1476{
1477 rtnh->rtnh_len = sizeof (*rtnh);
1478 rtnh->rtnh_flags = 0;
1479 rtnh->rtnh_hops = 0;
1480 rta->rta_len += rtnh->rtnh_len;
1481
Christian Frankee8d3d292013-07-05 15:35:39 +00001482 if (CHECK_FLAG (nexthop->flags, NEXTHOP_FLAG_ONLINK))
1483 rtnh->rtnh_flags |= RTNH_F_ONLINK;
1484
Christian Frankefa713d92013-07-05 15:35:37 +00001485 if (nexthop->type == NEXTHOP_TYPE_IPV4
1486 || nexthop->type == NEXTHOP_TYPE_IPV4_IFINDEX)
1487 {
1488 rta_addattr_l (rta, NL_PKT_BUF_SIZE, RTA_GATEWAY,
1489 &nexthop->gate.ipv4, bytelen);
Lu Feng621e2aa2014-07-11 07:52:15 +00001490 rtnh->rtnh_len += sizeof (struct rtattr) + bytelen;
Christian Frankefa713d92013-07-05 15:35:37 +00001491
1492 if (nexthop->src.ipv4.s_addr)
1493 *src = &nexthop->src;
1494
1495 if (IS_ZEBRA_DEBUG_KERNEL)
1496 zlog_debug("netlink_route_multipath() (%s): "
1497 "nexthop via %s if %u",
1498 routedesc,
1499 inet_ntoa (nexthop->gate.ipv4),
1500 nexthop->ifindex);
1501 }
1502#ifdef HAVE_IPV6
1503 if (nexthop->type == NEXTHOP_TYPE_IPV6
1504 || nexthop->type == NEXTHOP_TYPE_IPV6_IFNAME
1505 || nexthop->type == NEXTHOP_TYPE_IPV6_IFINDEX)
1506 {
1507 rta_addattr_l (rta, NL_PKT_BUF_SIZE, RTA_GATEWAY,
1508 &nexthop->gate.ipv6, bytelen);
Lu Feng621e2aa2014-07-11 07:52:15 +00001509 rtnh->rtnh_len += sizeof (struct rtattr) + bytelen;
Christian Frankefa713d92013-07-05 15:35:37 +00001510
1511 if (IS_ZEBRA_DEBUG_KERNEL)
1512 zlog_debug("netlink_route_multipath() (%s): "
1513 "nexthop via %s if %u",
1514 routedesc,
1515 inet6_ntoa (nexthop->gate.ipv6),
1516 nexthop->ifindex);
1517 }
1518#endif /* HAVE_IPV6 */
1519 /* ifindex */
1520 if (nexthop->type == NEXTHOP_TYPE_IPV4_IFINDEX
1521 || nexthop->type == NEXTHOP_TYPE_IFINDEX
1522 || nexthop->type == NEXTHOP_TYPE_IFNAME)
1523 {
1524 rtnh->rtnh_ifindex = nexthop->ifindex;
1525 if (nexthop->src.ipv4.s_addr)
1526 *src = &nexthop->src;
1527 if (IS_ZEBRA_DEBUG_KERNEL)
1528 zlog_debug("netlink_route_multipath() (%s): "
1529 "nexthop via if %u", routedesc, nexthop->ifindex);
1530 }
1531 else if (nexthop->type == NEXTHOP_TYPE_IPV6_IFNAME
1532 || nexthop->type == NEXTHOP_TYPE_IPV6_IFINDEX)
1533 {
1534 rtnh->rtnh_ifindex = nexthop->ifindex;
1535
1536 if (IS_ZEBRA_DEBUG_KERNEL)
1537 zlog_debug("netlink_route_multipath() (%s): "
1538 "nexthop via if %u", routedesc, nexthop->ifindex);
1539 }
1540 else
1541 {
1542 rtnh->rtnh_ifindex = 0;
1543 }
1544}
1545
1546/* Log debug information for netlink_route_multipath
1547 * if debug logging is enabled.
1548 *
1549 * @param cmd: Netlink command which is to be processed
1550 * @param p: Prefix for which the change is due
1551 * @param nexthop: Nexthop which is currently processed
1552 * @param routedesc: Semantic annotation for nexthop
1553 * (recursive, multipath, etc.)
1554 * @param family: Address family which the change concerns
1555 */
1556static void
1557_netlink_route_debug(
1558 int cmd,
1559 struct prefix *p,
1560 struct nexthop *nexthop,
1561 const char *routedesc,
Feng Lu758fb8f2014-07-03 18:23:09 +08001562 int family,
1563 struct zebra_vrf *zvrf)
Christian Frankefa713d92013-07-05 15:35:37 +00001564{
1565 if (IS_ZEBRA_DEBUG_KERNEL)
1566 {
Timo Teräsbe6335d2015-05-23 11:08:41 +03001567 char buf[PREFIX_STRLEN];
Feng Lu758fb8f2014-07-03 18:23:09 +08001568 zlog_debug ("netlink_route_multipath() (%s): %s %s vrf %u type %s",
Christian Frankefa713d92013-07-05 15:35:37 +00001569 routedesc,
1570 lookup (nlmsg_str, cmd),
Timo Teräsbe6335d2015-05-23 11:08:41 +03001571 prefix2str (p, buf, sizeof(buf)),
Kaloyan Kovachev8c56b442015-06-15 17:08:48 +03001572 zvrf->vrf_id,
Timo Teräsbe6335d2015-05-23 11:08:41 +03001573 nexthop_type_to_str (nexthop->type));
Christian Frankefa713d92013-07-05 15:35:37 +00001574 }
1575}
1576
paul718e3742002-12-13 20:15:29 +00001577/* Routing table change via netlink interface. */
Stephen Hemminger6072b242008-08-14 16:52:26 +01001578static int
paul718e3742002-12-13 20:15:29 +00001579netlink_route_multipath (int cmd, struct prefix *p, struct rib *rib,
paul7021c422003-07-15 12:52:22 +00001580 int family)
paul718e3742002-12-13 20:15:29 +00001581{
1582 int bytelen;
1583 struct sockaddr_nl snl;
Christian Frankefa713d92013-07-05 15:35:37 +00001584 struct nexthop *nexthop = NULL, *tnexthop;
1585 int recursing;
1586 int nexthop_num;
paul718e3742002-12-13 20:15:29 +00001587 int discard;
Christian Frankefa713d92013-07-05 15:35:37 +00001588 const char *routedesc;
paul718e3742002-12-13 20:15:29 +00001589
paul7021c422003-07-15 12:52:22 +00001590 struct
paul718e3742002-12-13 20:15:29 +00001591 {
1592 struct nlmsghdr n;
1593 struct rtmsg r;
JR Rivers3cadc0c2012-04-01 12:16:31 -07001594 char buf[NL_PKT_BUF_SIZE];
paul718e3742002-12-13 20:15:29 +00001595 } req;
1596
Feng Lu758fb8f2014-07-03 18:23:09 +08001597 struct zebra_vrf *zvrf = vrf_info_lookup (rib->vrf_id);
1598
Jorge Boncompte [DTI2]a4c06de2012-04-20 14:28:40 +02001599 memset (&req, 0, sizeof req - NL_PKT_BUF_SIZE);
paul718e3742002-12-13 20:15:29 +00001600
1601 bytelen = (family == AF_INET ? 4 : 16);
1602
1603 req.n.nlmsg_len = NLMSG_LENGTH (sizeof (struct rtmsg));
1604 req.n.nlmsg_flags = NLM_F_CREATE | NLM_F_REQUEST;
1605 req.n.nlmsg_type = cmd;
1606 req.r.rtm_family = family;
1607 req.r.rtm_table = rib->table;
1608 req.r.rtm_dst_len = p->prefixlen;
Timo Teräs40da2212008-08-13 17:37:14 +01001609 req.r.rtm_protocol = RTPROT_ZEBRA;
1610 req.r.rtm_scope = RT_SCOPE_UNIVERSE;
paul718e3742002-12-13 20:15:29 +00001611
paul7021c422003-07-15 12:52:22 +00001612 if ((rib->flags & ZEBRA_FLAG_BLACKHOLE) || (rib->flags & ZEBRA_FLAG_REJECT))
paul718e3742002-12-13 20:15:29 +00001613 discard = 1;
1614 else
1615 discard = 0;
1616
paul7021c422003-07-15 12:52:22 +00001617 if (cmd == RTM_NEWROUTE)
paul718e3742002-12-13 20:15:29 +00001618 {
paul7021c422003-07-15 12:52:22 +00001619 if (discard)
paul595db7f2003-05-25 21:35:06 +00001620 {
1621 if (rib->flags & ZEBRA_FLAG_BLACKHOLE)
1622 req.r.rtm_type = RTN_BLACKHOLE;
1623 else if (rib->flags & ZEBRA_FLAG_REJECT)
1624 req.r.rtm_type = RTN_UNREACHABLE;
paul7021c422003-07-15 12:52:22 +00001625 else
1626 assert (RTN_BLACKHOLE != RTN_UNREACHABLE); /* false */
1627 }
paul595db7f2003-05-25 21:35:06 +00001628 else
paul7021c422003-07-15 12:52:22 +00001629 req.r.rtm_type = RTN_UNICAST;
paul718e3742002-12-13 20:15:29 +00001630 }
1631
1632 addattr_l (&req.n, sizeof req, RTA_DST, &p->u.prefix, bytelen);
1633
1634 /* Metric. */
1635 addattr32 (&req.n, sizeof req, RTA_PRIORITY, rib->metric);
1636
1637 if (discard)
1638 {
1639 if (cmd == RTM_NEWROUTE)
Christian Frankefa713d92013-07-05 15:35:37 +00001640 for (ALL_NEXTHOPS_RO(rib->nexthop, nexthop, tnexthop, recursing))
1641 {
1642 /* We shouldn't encounter recursive nexthops on discard routes,
1643 * but it is probably better to handle that case correctly anyway.
1644 */
1645 if (CHECK_FLAG(nexthop->flags, NEXTHOP_FLAG_RECURSIVE))
1646 continue;
1647 SET_FLAG (nexthop->flags, NEXTHOP_FLAG_FIB);
1648 }
paul718e3742002-12-13 20:15:29 +00001649 goto skip;
1650 }
1651
Christian Frankefa713d92013-07-05 15:35:37 +00001652 /* Count overall nexthops so we can decide whether to use singlepath
1653 * or multipath case. */
1654 nexthop_num = 0;
1655 for (ALL_NEXTHOPS_RO(rib->nexthop, nexthop, tnexthop, recursing))
paul718e3742002-12-13 20:15:29 +00001656 {
Christian Frankefa713d92013-07-05 15:35:37 +00001657 if (CHECK_FLAG (nexthop->flags, NEXTHOP_FLAG_RECURSIVE))
1658 continue;
1659 if (cmd == RTM_NEWROUTE && !CHECK_FLAG(nexthop->flags, NEXTHOP_FLAG_ACTIVE))
1660 continue;
1661 if (cmd == RTM_DELROUTE && !CHECK_FLAG (nexthop->flags, NEXTHOP_FLAG_FIB))
1662 continue;
1663
1664 nexthop_num++;
1665 }
1666
1667 /* Singlepath case. */
1668 if (nexthop_num == 1 || MULTIPATH_NUM == 1)
1669 {
1670 nexthop_num = 0;
1671 for (ALL_NEXTHOPS_RO(rib->nexthop, nexthop, tnexthop, recursing))
paul7021c422003-07-15 12:52:22 +00001672 {
Christian Frankefa713d92013-07-05 15:35:37 +00001673 if (CHECK_FLAG (nexthop->flags, NEXTHOP_FLAG_RECURSIVE))
1674 continue;
paul5ec90d22003-06-19 01:41:37 +00001675
paul7021c422003-07-15 12:52:22 +00001676 if ((cmd == RTM_NEWROUTE
1677 && CHECK_FLAG (nexthop->flags, NEXTHOP_FLAG_ACTIVE))
1678 || (cmd == RTM_DELROUTE
1679 && CHECK_FLAG (nexthop->flags, NEXTHOP_FLAG_FIB)))
1680 {
Christian Frankefa713d92013-07-05 15:35:37 +00001681 routedesc = recursing ? "recursive, 1 hop" : "single hop";
paul5ec90d22003-06-19 01:41:37 +00001682
Feng Lu758fb8f2014-07-03 18:23:09 +08001683 _netlink_route_debug(cmd, p, nexthop, routedesc, family, zvrf);
Christian Frankefa713d92013-07-05 15:35:37 +00001684 _netlink_route_build_singlepath(routedesc, bytelen,
Christian Frankee8d3d292013-07-05 15:35:39 +00001685 nexthop, &req.n, &req.r,
1686 sizeof req);
paul718e3742002-12-13 20:15:29 +00001687
paul7021c422003-07-15 12:52:22 +00001688 if (cmd == RTM_NEWROUTE)
1689 SET_FLAG (nexthop->flags, NEXTHOP_FLAG_FIB);
paul718e3742002-12-13 20:15:29 +00001690
paul7021c422003-07-15 12:52:22 +00001691 nexthop_num++;
1692 break;
1693 }
1694 }
paul718e3742002-12-13 20:15:29 +00001695 }
1696 else
1697 {
JR Rivers3cadc0c2012-04-01 12:16:31 -07001698 char buf[NL_PKT_BUF_SIZE];
paul718e3742002-12-13 20:15:29 +00001699 struct rtattr *rta = (void *) buf;
1700 struct rtnexthop *rtnh;
Paul Jakma7514fb72007-05-02 16:05:35 +00001701 union g_addr *src = NULL;
paul718e3742002-12-13 20:15:29 +00001702
1703 rta->rta_type = RTA_MULTIPATH;
paul7021c422003-07-15 12:52:22 +00001704 rta->rta_len = RTA_LENGTH (0);
1705 rtnh = RTA_DATA (rta);
paul718e3742002-12-13 20:15:29 +00001706
1707 nexthop_num = 0;
Christian Frankefa713d92013-07-05 15:35:37 +00001708 for (ALL_NEXTHOPS_RO(rib->nexthop, nexthop, tnexthop, recursing))
paul7021c422003-07-15 12:52:22 +00001709 {
Christian Frankefa713d92013-07-05 15:35:37 +00001710 if (MULTIPATH_NUM != 0 && nexthop_num >= MULTIPATH_NUM)
1711 break;
1712
1713 if (CHECK_FLAG(nexthop->flags, NEXTHOP_FLAG_RECURSIVE))
1714 continue;
1715
paul7021c422003-07-15 12:52:22 +00001716 if ((cmd == RTM_NEWROUTE
1717 && CHECK_FLAG (nexthop->flags, NEXTHOP_FLAG_ACTIVE))
1718 || (cmd == RTM_DELROUTE
1719 && CHECK_FLAG (nexthop->flags, NEXTHOP_FLAG_FIB)))
1720 {
Christian Frankefa713d92013-07-05 15:35:37 +00001721 routedesc = recursing ? "recursive, multihop" : "multihop";
paul7021c422003-07-15 12:52:22 +00001722 nexthop_num++;
paul718e3742002-12-13 20:15:29 +00001723
Christian Frankefa713d92013-07-05 15:35:37 +00001724 _netlink_route_debug(cmd, p, nexthop,
Feng Lu758fb8f2014-07-03 18:23:09 +08001725 routedesc, family, zvrf);
Christian Frankefa713d92013-07-05 15:35:37 +00001726 _netlink_route_build_multipath(routedesc, bytelen,
1727 nexthop, rta, rtnh, &src);
paul7021c422003-07-15 12:52:22 +00001728 rtnh = RTNH_NEXT (rtnh);
paul718e3742002-12-13 20:15:29 +00001729
paul7021c422003-07-15 12:52:22 +00001730 if (cmd == RTM_NEWROUTE)
1731 SET_FLAG (nexthop->flags, NEXTHOP_FLAG_FIB);
1732 }
1733 }
Paul Jakma7514fb72007-05-02 16:05:35 +00001734 if (src)
1735 addattr_l (&req.n, sizeof req, RTA_PREFSRC, &src->ipv4, bytelen);
paul718e3742002-12-13 20:15:29 +00001736
1737 if (rta->rta_len > RTA_LENGTH (0))
JR Rivers3cadc0c2012-04-01 12:16:31 -07001738 addattr_l (&req.n, NL_PKT_BUF_SIZE, RTA_MULTIPATH, RTA_DATA (rta),
paul7021c422003-07-15 12:52:22 +00001739 RTA_PAYLOAD (rta));
paul718e3742002-12-13 20:15:29 +00001740 }
1741
1742 /* If there is no useful nexthop then return. */
1743 if (nexthop_num == 0)
1744 {
1745 if (IS_ZEBRA_DEBUG_KERNEL)
ajsb6178002004-12-07 21:12:56 +00001746 zlog_debug ("netlink_route_multipath(): No useful nexthop.");
paul718e3742002-12-13 20:15:29 +00001747 return 0;
1748 }
1749
paul7021c422003-07-15 12:52:22 +00001750skip:
paul718e3742002-12-13 20:15:29 +00001751
1752 /* Destination netlink address. */
1753 memset (&snl, 0, sizeof snl);
1754 snl.nl_family = AF_NETLINK;
1755
paul718e3742002-12-13 20:15:29 +00001756 /* Talk to netlink socket. */
Feng Lu758fb8f2014-07-03 18:23:09 +08001757 return netlink_talk (&req.n, &zvrf->netlink_cmd, zvrf);
paul718e3742002-12-13 20:15:29 +00001758}
1759
1760int
1761kernel_add_ipv4 (struct prefix *p, struct rib *rib)
1762{
1763 return netlink_route_multipath (RTM_NEWROUTE, p, rib, AF_INET);
1764}
1765
1766int
1767kernel_delete_ipv4 (struct prefix *p, struct rib *rib)
1768{
1769 return netlink_route_multipath (RTM_DELROUTE, p, rib, AF_INET);
1770}
1771
1772#ifdef HAVE_IPV6
1773int
1774kernel_add_ipv6 (struct prefix *p, struct rib *rib)
1775{
1776 return netlink_route_multipath (RTM_NEWROUTE, p, rib, AF_INET6);
1777}
1778
1779int
1780kernel_delete_ipv6 (struct prefix *p, struct rib *rib)
1781{
1782 return netlink_route_multipath (RTM_DELROUTE, p, rib, AF_INET6);
1783}
paul718e3742002-12-13 20:15:29 +00001784#endif /* HAVE_IPV6 */
David Lamparter6b0655a2014-06-04 06:53:35 +02001785
paul718e3742002-12-13 20:15:29 +00001786/* Interface address modification. */
Stephen Hemminger6072b242008-08-14 16:52:26 +01001787static int
paul718e3742002-12-13 20:15:29 +00001788netlink_address (int cmd, int family, struct interface *ifp,
paul7021c422003-07-15 12:52:22 +00001789 struct connected *ifc)
paul718e3742002-12-13 20:15:29 +00001790{
1791 int bytelen;
1792 struct prefix *p;
1793
paul7021c422003-07-15 12:52:22 +00001794 struct
paul718e3742002-12-13 20:15:29 +00001795 {
1796 struct nlmsghdr n;
1797 struct ifaddrmsg ifa;
JR Rivers3cadc0c2012-04-01 12:16:31 -07001798 char buf[NL_PKT_BUF_SIZE];
paul718e3742002-12-13 20:15:29 +00001799 } req;
1800
Feng Lu758fb8f2014-07-03 18:23:09 +08001801 struct zebra_vrf *zvrf = vrf_info_lookup (ifp->vrf_id);
1802
paul718e3742002-12-13 20:15:29 +00001803 p = ifc->address;
Jorge Boncompte [DTI2]a4c06de2012-04-20 14:28:40 +02001804 memset (&req, 0, sizeof req - NL_PKT_BUF_SIZE);
paul718e3742002-12-13 20:15:29 +00001805
1806 bytelen = (family == AF_INET ? 4 : 16);
1807
paul7021c422003-07-15 12:52:22 +00001808 req.n.nlmsg_len = NLMSG_LENGTH (sizeof (struct ifaddrmsg));
paul718e3742002-12-13 20:15:29 +00001809 req.n.nlmsg_flags = NLM_F_REQUEST;
1810 req.n.nlmsg_type = cmd;
1811 req.ifa.ifa_family = family;
1812
1813 req.ifa.ifa_index = ifp->ifindex;
1814 req.ifa.ifa_prefixlen = p->prefixlen;
1815
1816 addattr_l (&req.n, sizeof req, IFA_LOCAL, &p->u.prefix, bytelen);
1817
1818 if (family == AF_INET && cmd == RTM_NEWADDR)
1819 {
Andrew J. Schorre4529632006-12-12 19:18:21 +00001820 if (!CONNECTED_PEER(ifc) && ifc->destination)
paul7021c422003-07-15 12:52:22 +00001821 {
1822 p = ifc->destination;
1823 addattr_l (&req.n, sizeof req, IFA_BROADCAST, &p->u.prefix,
1824 bytelen);
1825 }
paul718e3742002-12-13 20:15:29 +00001826 }
1827
1828 if (CHECK_FLAG (ifc->flags, ZEBRA_IFA_SECONDARY))
1829 SET_FLAG (req.ifa.ifa_flags, IFA_F_SECONDARY);
paul7021c422003-07-15 12:52:22 +00001830
paul718e3742002-12-13 20:15:29 +00001831 if (ifc->label)
1832 addattr_l (&req.n, sizeof req, IFA_LABEL, ifc->label,
paul7021c422003-07-15 12:52:22 +00001833 strlen (ifc->label) + 1);
paul718e3742002-12-13 20:15:29 +00001834
Feng Lu758fb8f2014-07-03 18:23:09 +08001835 return netlink_talk (&req.n, &zvrf->netlink_cmd, zvrf);
paul718e3742002-12-13 20:15:29 +00001836}
1837
1838int
1839kernel_address_add_ipv4 (struct interface *ifp, struct connected *ifc)
1840{
1841 return netlink_address (RTM_NEWADDR, AF_INET, ifp, ifc);
1842}
1843
1844int
1845kernel_address_delete_ipv4 (struct interface *ifp, struct connected *ifc)
1846{
1847 return netlink_address (RTM_DELADDR, AF_INET, ifp, ifc);
1848}
1849
paul718e3742002-12-13 20:15:29 +00001850
1851extern struct thread_master *master;
1852
1853/* Kernel route reflection. */
Stephen Hemminger6072b242008-08-14 16:52:26 +01001854static int
paul718e3742002-12-13 20:15:29 +00001855kernel_read (struct thread *thread)
1856{
Feng Lu758fb8f2014-07-03 18:23:09 +08001857 struct zebra_vrf *zvrf = (struct zebra_vrf *)THREAD_ARG (thread);
1858 netlink_parse_info (netlink_information_fetch, &zvrf->netlink, zvrf);
1859 zvrf->t_netlink = thread_add_read (zebrad.master, kernel_read, zvrf,
1860 zvrf->netlink.sock);
paul718e3742002-12-13 20:15:29 +00001861
1862 return 0;
1863}
1864
Stephen Hemminger3d265b42008-08-16 17:30:39 +01001865/* Filter out messages from self that occur on listener socket,
1866 caused by our actions on the command socket
1867 */
1868static void netlink_install_filter (int sock, __u32 pid)
Paul Jakma768a27e2008-05-29 18:23:08 +00001869{
Paul Jakma768a27e2008-05-29 18:23:08 +00001870 struct sock_filter filter[] = {
Stephen Hemminger3d265b42008-08-16 17:30:39 +01001871 /* 0: ldh [4] */
1872 BPF_STMT(BPF_LD|BPF_ABS|BPF_H, offsetof(struct nlmsghdr, nlmsg_type)),
1873 /* 1: jeq 0x18 jt 3 jf 6 */
1874 BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, htons(RTM_NEWROUTE), 1, 0),
1875 /* 2: jeq 0x19 jt 3 jf 6 */
1876 BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, htons(RTM_DELROUTE), 0, 3),
1877 /* 3: ldw [12] */
1878 BPF_STMT(BPF_LD|BPF_ABS|BPF_W, offsetof(struct nlmsghdr, nlmsg_pid)),
1879 /* 4: jeq XX jt 5 jf 6 */
1880 BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, htonl(pid), 0, 1),
1881 /* 5: ret 0 (skip) */
1882 BPF_STMT(BPF_RET|BPF_K, 0),
1883 /* 6: ret 0xffff (keep) */
1884 BPF_STMT(BPF_RET|BPF_K, 0xffff),
Paul Jakma768a27e2008-05-29 18:23:08 +00001885 };
1886
1887 struct sock_fprog prog = {
Balaji.G837d16c2012-09-26 14:09:10 +05301888 .len = array_size(filter),
Paul Jakma768a27e2008-05-29 18:23:08 +00001889 .filter = filter,
1890 };
1891
1892 if (setsockopt(sock, SOL_SOCKET, SO_ATTACH_FILTER, &prog, sizeof(prog)) < 0)
1893 zlog_warn ("Can't install socket filter: %s\n", safe_strerror(errno));
1894}
1895
paul718e3742002-12-13 20:15:29 +00001896/* Exported interface function. This function simply calls
1897 netlink_socket (). */
1898void
Feng Lu758fb8f2014-07-03 18:23:09 +08001899kernel_init (struct zebra_vrf *zvrf)
paul718e3742002-12-13 20:15:29 +00001900{
1901 unsigned long groups;
1902
paul7021c422003-07-15 12:52:22 +00001903 groups = RTMGRP_LINK | RTMGRP_IPV4_ROUTE | RTMGRP_IPV4_IFADDR;
paul718e3742002-12-13 20:15:29 +00001904#ifdef HAVE_IPV6
paul7021c422003-07-15 12:52:22 +00001905 groups |= RTMGRP_IPV6_ROUTE | RTMGRP_IPV6_IFADDR;
paul718e3742002-12-13 20:15:29 +00001906#endif /* HAVE_IPV6 */
Feng Lu758fb8f2014-07-03 18:23:09 +08001907 netlink_socket (&zvrf->netlink, groups, zvrf->vrf_id);
1908 netlink_socket (&zvrf->netlink_cmd, 0, zvrf->vrf_id);
paul718e3742002-12-13 20:15:29 +00001909
1910 /* Register kernel socket. */
Feng Lu758fb8f2014-07-03 18:23:09 +08001911 if (zvrf->netlink.sock > 0)
Paul Jakma768a27e2008-05-29 18:23:08 +00001912 {
Stephen Hemminger4cde9312008-08-16 17:51:27 +01001913 /* Only want non-blocking on the netlink event socket */
Feng Lu758fb8f2014-07-03 18:23:09 +08001914 if (fcntl (zvrf->netlink.sock, F_SETFL, O_NONBLOCK) < 0)
1915 zlog_err ("Can't set %s socket flags: %s", zvrf->netlink.name,
1916 safe_strerror (errno));
Stephen Hemminger4cde9312008-08-16 17:51:27 +01001917
Stephen Hemminger30afea32008-08-16 18:25:47 +01001918 /* Set receive buffer size if it's set from command line */
1919 if (nl_rcvbufsize)
Feng Lu758fb8f2014-07-03 18:23:09 +08001920 netlink_recvbuf (&zvrf->netlink, nl_rcvbufsize);
Stephen Hemminger30afea32008-08-16 18:25:47 +01001921
Feng Lu758fb8f2014-07-03 18:23:09 +08001922 netlink_install_filter (zvrf->netlink.sock, zvrf->netlink_cmd.snl.nl_pid);
1923 zvrf->t_netlink = thread_add_read (zebrad.master, kernel_read, zvrf,
1924 zvrf->netlink.sock);
1925 }
1926}
1927
1928void
1929kernel_terminate (struct zebra_vrf *zvrf)
1930{
1931 THREAD_READ_OFF (zvrf->t_netlink);
1932
1933 if (zvrf->netlink.sock >= 0)
1934 {
1935 close (zvrf->netlink.sock);
1936 zvrf->netlink.sock = -1;
1937 }
1938
1939 if (zvrf->netlink_cmd.sock >= 0)
1940 {
1941 close (zvrf->netlink_cmd.sock);
1942 zvrf->netlink_cmd.sock = -1;
Paul Jakma768a27e2008-05-29 18:23:08 +00001943 }
paul718e3742002-12-13 20:15:29 +00001944}
Avneesh Sachdev78deec42012-11-13 22:48:56 +00001945
1946/*
1947 * nl_msg_type_to_str
1948 */
1949const char *
1950nl_msg_type_to_str (uint16_t msg_type)
1951{
1952 return lookup (nlmsg_str, msg_type);
1953}
1954
1955/*
1956 * nl_rtproto_to_str
1957 */
1958const char *
1959nl_rtproto_to_str (u_char rtproto)
1960{
1961 return lookup (rtproto_str, rtproto);
1962}