blob: 0f0f3fed308a36117c2057a9c5fe8f38b4ea758f [file] [log] [blame]
paul718e3742002-12-13 20:15:29 +00001/* Kernel routing table updates using netlink over GNU/Linux system.
2 * Copyright (C) 1997, 98, 99 Kunihiro Ishiguro
3 *
4 * This file is part of GNU Zebra.
5 *
6 * GNU Zebra is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License as published by the
8 * Free Software Foundation; either version 2, or (at your option) any
9 * later version.
10 *
11 * GNU Zebra is distributed in the hope that it will be useful, but
12 * WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with GNU Zebra; see the file COPYING. If not, write to the Free
18 * Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA
19 * 02111-1307, USA.
20 */
21
22#include <zebra.h>
23
24/* Hack for GNU libc version 2. */
25#ifndef MSG_TRUNC
26#define MSG_TRUNC 0x20
27#endif /* MSG_TRUNC */
28
29#include "linklist.h"
30#include "if.h"
31#include "log.h"
32#include "prefix.h"
33#include "connected.h"
34#include "table.h"
Josh Bailey26e2ae32012-03-22 01:09:21 -070035#include "memory.h"
paul718e3742002-12-13 20:15:29 +000036#include "rib.h"
paule04ab742003-01-17 23:47:00 +000037#include "thread.h"
pauledd7c242003-06-04 13:59:38 +000038#include "privs.h"
Feng Lu0d0686f2015-05-22 11:40:02 +020039#include "vrf.h"
paul718e3742002-12-13 20:15:29 +000040
41#include "zebra/zserv.h"
paul6621ca82005-11-23 13:02:08 +000042#include "zebra/rt.h"
paul718e3742002-12-13 20:15:29 +000043#include "zebra/redistribute.h"
44#include "zebra/interface.h"
45#include "zebra/debug.h"
46
Avneesh Sachdev78deec42012-11-13 22:48:56 +000047#include "rt_netlink.h"
JR Rivers3cadc0c2012-04-01 12:16:31 -070048
Stephen Hemminger1423c802008-08-14 17:59:25 +010049static const struct message nlmsg_str[] = {
paul718e3742002-12-13 20:15:29 +000050 {RTM_NEWROUTE, "RTM_NEWROUTE"},
51 {RTM_DELROUTE, "RTM_DELROUTE"},
52 {RTM_GETROUTE, "RTM_GETROUTE"},
53 {RTM_NEWLINK, "RTM_NEWLINK"},
54 {RTM_DELLINK, "RTM_DELLINK"},
55 {RTM_GETLINK, "RTM_GETLINK"},
56 {RTM_NEWADDR, "RTM_NEWADDR"},
57 {RTM_DELADDR, "RTM_DELADDR"},
58 {RTM_GETADDR, "RTM_GETADDR"},
paul7021c422003-07-15 12:52:22 +000059 {0, NULL}
paul718e3742002-12-13 20:15:29 +000060};
61
paulb21b19c2003-06-15 01:28:29 +000062extern struct zebra_t zebrad;
paul718e3742002-12-13 20:15:29 +000063
pauledd7c242003-06-04 13:59:38 +000064extern struct zebra_privs_t zserv_privs;
65
hassoc34b6b52004-08-31 13:41:49 +000066extern u_int32_t nl_rcvbufsize;
67
ajsd2fc8892005-04-02 18:38:43 +000068/* Note: on netlink systems, there should be a 1-to-1 mapping between interface
69 names and ifindex values. */
70static void
71set_ifindex(struct interface *ifp, unsigned int ifi_index)
72{
73 struct interface *oifp;
74
75 if (((oifp = if_lookup_by_index(ifi_index)) != NULL) && (oifp != ifp))
76 {
77 if (ifi_index == IFINDEX_INTERNAL)
78 zlog_err("Netlink is setting interface %s ifindex to reserved "
79 "internal value %u", ifp->name, ifi_index);
80 else
81 {
82 if (IS_ZEBRA_DEBUG_KERNEL)
83 zlog_debug("interface index %d was renamed from %s to %s",
84 ifi_index, oifp->name, ifp->name);
85 if (if_is_up(oifp))
86 zlog_err("interface rename detected on up interface: index %d "
87 "was renamed from %s to %s, results are uncertain!",
88 ifi_index, oifp->name, ifp->name);
89 if_delete_update(oifp);
90 }
91 }
92 ifp->ifindex = ifi_index;
93}
94
Ulrich Weberf1ef81b2013-01-22 10:39:18 +000095#ifndef SO_RCVBUFFORCE
96#define SO_RCVBUFFORCE (33)
97#endif
98
Stephen Hemminger30afea32008-08-16 18:25:47 +010099static int
100netlink_recvbuf (struct nlsock *nl, uint32_t newsize)
101{
102 u_int32_t oldsize;
103 socklen_t newlen = sizeof(newsize);
104 socklen_t oldlen = sizeof(oldsize);
105 int ret;
106
107 ret = getsockopt(nl->sock, SOL_SOCKET, SO_RCVBUF, &oldsize, &oldlen);
108 if (ret < 0)
109 {
110 zlog (NULL, LOG_ERR, "Can't get %s receive buffer size: %s", nl->name,
111 safe_strerror (errno));
112 return -1;
113 }
114
Ulrich Weberf1ef81b2013-01-22 10:39:18 +0000115 /* Try force option (linux >= 2.6.14) and fall back to normal set */
116 if ( zserv_privs.change (ZPRIVS_RAISE) )
117 zlog_err ("routing_socket: Can't raise privileges");
118 ret = setsockopt(nl->sock, SOL_SOCKET, SO_RCVBUFFORCE, &nl_rcvbufsize,
Stephen Hemminger30afea32008-08-16 18:25:47 +0100119 sizeof(nl_rcvbufsize));
Ulrich Weberf1ef81b2013-01-22 10:39:18 +0000120 if ( zserv_privs.change (ZPRIVS_LOWER) )
121 zlog_err ("routing_socket: Can't lower privileges");
122 if (ret < 0)
123 ret = setsockopt(nl->sock, SOL_SOCKET, SO_RCVBUF, &nl_rcvbufsize,
124 sizeof(nl_rcvbufsize));
Stephen Hemminger30afea32008-08-16 18:25:47 +0100125 if (ret < 0)
126 {
127 zlog (NULL, LOG_ERR, "Can't set %s receive buffer size: %s", nl->name,
128 safe_strerror (errno));
129 return -1;
130 }
131
132 ret = getsockopt(nl->sock, SOL_SOCKET, SO_RCVBUF, &newsize, &newlen);
133 if (ret < 0)
134 {
135 zlog (NULL, LOG_ERR, "Can't get %s receive buffer size: %s", nl->name,
136 safe_strerror (errno));
137 return -1;
138 }
139
140 zlog (NULL, LOG_INFO,
141 "Setting netlink socket receive buffer size: %u -> %u",
142 oldsize, newsize);
143 return 0;
144}
145
paul718e3742002-12-13 20:15:29 +0000146/* Make socket for Linux netlink interface. */
147static int
Feng Lu758fb8f2014-07-03 18:23:09 +0800148netlink_socket (struct nlsock *nl, unsigned long groups, vrf_id_t vrf_id)
paul718e3742002-12-13 20:15:29 +0000149{
150 int ret;
151 struct sockaddr_nl snl;
152 int sock;
153 int namelen;
ajs4be019d2005-01-29 16:12:41 +0000154 int save_errno;
paul718e3742002-12-13 20:15:29 +0000155
Michal Sekletar8e998b12014-05-16 14:13:43 +0000156 if (zserv_privs.change (ZPRIVS_RAISE))
157 {
158 zlog (NULL, LOG_ERR, "Can't raise privileges");
159 return -1;
160 }
161
Feng Lu758fb8f2014-07-03 18:23:09 +0800162 sock = vrf_socket (AF_NETLINK, SOCK_RAW, NETLINK_ROUTE, vrf_id);
paul718e3742002-12-13 20:15:29 +0000163 if (sock < 0)
164 {
165 zlog (NULL, LOG_ERR, "Can't open %s socket: %s", nl->name,
ajs6099b3b2004-11-20 02:06:59 +0000166 safe_strerror (errno));
paul718e3742002-12-13 20:15:29 +0000167 return -1;
168 }
169
paul718e3742002-12-13 20:15:29 +0000170 memset (&snl, 0, sizeof snl);
171 snl.nl_family = AF_NETLINK;
172 snl.nl_groups = groups;
173
174 /* Bind the socket to the netlink structure for anything. */
175 ret = bind (sock, (struct sockaddr *) &snl, sizeof snl);
ajs4be019d2005-01-29 16:12:41 +0000176 save_errno = errno;
hasso55e7ecd2004-08-06 08:41:56 +0000177 if (zserv_privs.change (ZPRIVS_LOWER))
178 zlog (NULL, LOG_ERR, "Can't lower privileges");
179
paul718e3742002-12-13 20:15:29 +0000180 if (ret < 0)
181 {
paul7021c422003-07-15 12:52:22 +0000182 zlog (NULL, LOG_ERR, "Can't bind %s socket to group 0x%x: %s",
ajs4be019d2005-01-29 16:12:41 +0000183 nl->name, snl.nl_groups, safe_strerror (save_errno));
paul718e3742002-12-13 20:15:29 +0000184 close (sock);
185 return -1;
186 }
paul7021c422003-07-15 12:52:22 +0000187
paul718e3742002-12-13 20:15:29 +0000188 /* multiple netlink sockets will have different nl_pid */
189 namelen = sizeof snl;
hassoc9e52be2004-09-26 16:09:34 +0000190 ret = getsockname (sock, (struct sockaddr *) &snl, (socklen_t *) &namelen);
paul718e3742002-12-13 20:15:29 +0000191 if (ret < 0 || namelen != sizeof snl)
192 {
193 zlog (NULL, LOG_ERR, "Can't get %s socket name: %s", nl->name,
ajs6099b3b2004-11-20 02:06:59 +0000194 safe_strerror (errno));
paul718e3742002-12-13 20:15:29 +0000195 close (sock);
196 return -1;
197 }
198
199 nl->snl = snl;
200 nl->sock = sock;
201 return ret;
202}
203
204/* Get type specified information from netlink. */
205static int
206netlink_request (int family, int type, struct nlsock *nl)
207{
208 int ret;
209 struct sockaddr_nl snl;
ajs4be019d2005-01-29 16:12:41 +0000210 int save_errno;
paul718e3742002-12-13 20:15:29 +0000211
212 struct
213 {
214 struct nlmsghdr nlh;
215 struct rtgenmsg g;
216 } req;
217
218
219 /* Check netlink socket. */
220 if (nl->sock < 0)
221 {
222 zlog (NULL, LOG_ERR, "%s socket isn't active.", nl->name);
223 return -1;
224 }
225
226 memset (&snl, 0, sizeof snl);
227 snl.nl_family = AF_NETLINK;
228
ajsc05612b2005-10-01 16:36:54 +0000229 memset (&req, 0, sizeof req);
paul718e3742002-12-13 20:15:29 +0000230 req.nlh.nlmsg_len = sizeof req;
231 req.nlh.nlmsg_type = type;
232 req.nlh.nlmsg_flags = NLM_F_ROOT | NLM_F_MATCH | NLM_F_REQUEST;
Stephen Hemminger3d265b42008-08-16 17:30:39 +0100233 req.nlh.nlmsg_pid = nl->snl.nl_pid;
paul718e3742002-12-13 20:15:29 +0000234 req.nlh.nlmsg_seq = ++nl->seq;
235 req.g.rtgen_family = family;
pauledd7c242003-06-04 13:59:38 +0000236
237 /* linux appears to check capabilities on every message
238 * have to raise caps for every message sent
239 */
paul7021c422003-07-15 12:52:22 +0000240 if (zserv_privs.change (ZPRIVS_RAISE))
pauledd7c242003-06-04 13:59:38 +0000241 {
242 zlog (NULL, LOG_ERR, "Can't raise privileges");
243 return -1;
244 }
paul7021c422003-07-15 12:52:22 +0000245
246 ret = sendto (nl->sock, (void *) &req, sizeof req, 0,
247 (struct sockaddr *) &snl, sizeof snl);
ajs4be019d2005-01-29 16:12:41 +0000248 save_errno = errno;
paul7021c422003-07-15 12:52:22 +0000249
250 if (zserv_privs.change (ZPRIVS_LOWER))
251 zlog (NULL, LOG_ERR, "Can't lower privileges");
252
paul718e3742002-12-13 20:15:29 +0000253 if (ret < 0)
paul7021c422003-07-15 12:52:22 +0000254 {
255 zlog (NULL, LOG_ERR, "%s sendto failed: %s", nl->name,
ajs4be019d2005-01-29 16:12:41 +0000256 safe_strerror (save_errno));
paul718e3742002-12-13 20:15:29 +0000257 return -1;
258 }
pauledd7c242003-06-04 13:59:38 +0000259
paul718e3742002-12-13 20:15:29 +0000260 return 0;
261}
262
263/* Receive message from netlink interface and pass those information
264 to the given function. */
265static int
Feng Lu758fb8f2014-07-03 18:23:09 +0800266netlink_parse_info (int (*filter) (struct sockaddr_nl *, struct nlmsghdr *,
267 vrf_id_t),
268 struct nlsock *nl, struct zebra_vrf *zvrf)
paul718e3742002-12-13 20:15:29 +0000269{
270 int status;
271 int ret = 0;
272 int error;
273
274 while (1)
275 {
JR Rivers3cadc0c2012-04-01 12:16:31 -0700276 char buf[NL_PKT_BUF_SIZE];
Timo Teräsc299ed72014-07-29 09:41:55 +0000277 struct iovec iov = {
278 .iov_base = buf,
279 .iov_len = sizeof buf
280 };
paul718e3742002-12-13 20:15:29 +0000281 struct sockaddr_nl snl;
Timo Teräsc299ed72014-07-29 09:41:55 +0000282 struct msghdr msg = {
283 .msg_name = (void *) &snl,
284 .msg_namelen = sizeof snl,
285 .msg_iov = &iov,
286 .msg_iovlen = 1
287 };
paul718e3742002-12-13 20:15:29 +0000288 struct nlmsghdr *h;
paul7021c422003-07-15 12:52:22 +0000289
paul718e3742002-12-13 20:15:29 +0000290 status = recvmsg (nl->sock, &msg, 0);
paul718e3742002-12-13 20:15:29 +0000291 if (status < 0)
paul7021c422003-07-15 12:52:22 +0000292 {
Stephen Hemminger4c699472008-08-17 17:01:44 +0100293 if (errno == EINTR)
paul7021c422003-07-15 12:52:22 +0000294 continue;
Stephen Hemminger4c699472008-08-17 17:01:44 +0100295 if (errno == EWOULDBLOCK || errno == EAGAIN)
paul7021c422003-07-15 12:52:22 +0000296 break;
ajs4be019d2005-01-29 16:12:41 +0000297 zlog (NULL, LOG_ERR, "%s recvmsg overrun: %s",
Stephen Hemminger4c699472008-08-17 17:01:44 +0100298 nl->name, safe_strerror(errno));
paul7021c422003-07-15 12:52:22 +0000299 continue;
300 }
paul718e3742002-12-13 20:15:29 +0000301
302 if (status == 0)
paul7021c422003-07-15 12:52:22 +0000303 {
304 zlog (NULL, LOG_ERR, "%s EOF", nl->name);
305 return -1;
306 }
paul718e3742002-12-13 20:15:29 +0000307
308 if (msg.msg_namelen != sizeof snl)
paul7021c422003-07-15 12:52:22 +0000309 {
310 zlog (NULL, LOG_ERR, "%s sender address length error: length %d",
311 nl->name, msg.msg_namelen);
312 return -1;
313 }
paulb84d3a12003-11-17 10:31:01 +0000314
hasso206d8052005-04-09 16:38:51 +0000315 for (h = (struct nlmsghdr *) buf; NLMSG_OK (h, (unsigned int) status);
paul7021c422003-07-15 12:52:22 +0000316 h = NLMSG_NEXT (h, status))
317 {
318 /* Finish of reading. */
319 if (h->nlmsg_type == NLMSG_DONE)
320 return ret;
paul718e3742002-12-13 20:15:29 +0000321
paul7021c422003-07-15 12:52:22 +0000322 /* Error handling. */
323 if (h->nlmsg_type == NLMSG_ERROR)
324 {
325 struct nlmsgerr *err = (struct nlmsgerr *) NLMSG_DATA (h);
Stephen Hemminger898987e2008-08-17 16:56:15 +0100326 int errnum = err->error;
327 int msg_type = err->msg.nlmsg_type;
paul7021c422003-07-15 12:52:22 +0000328
paul718e3742002-12-13 20:15:29 +0000329 /* If the error field is zero, then this is an ACK */
paul7021c422003-07-15 12:52:22 +0000330 if (err->error == 0)
paul718e3742002-12-13 20:15:29 +0000331 {
paul7021c422003-07-15 12:52:22 +0000332 if (IS_ZEBRA_DEBUG_KERNEL)
333 {
hasso1ada8192005-06-12 11:28:18 +0000334 zlog_debug ("%s: %s ACK: type=%s(%u), seq=%u, pid=%u",
paul7021c422003-07-15 12:52:22 +0000335 __FUNCTION__, nl->name,
336 lookup (nlmsg_str, err->msg.nlmsg_type),
337 err->msg.nlmsg_type, err->msg.nlmsg_seq,
338 err->msg.nlmsg_pid);
paul718e3742002-12-13 20:15:29 +0000339 }
paul7021c422003-07-15 12:52:22 +0000340
341 /* return if not a multipart message, otherwise continue */
342 if (!(h->nlmsg_flags & NLM_F_MULTI))
343 {
344 return 0;
paul718e3742002-12-13 20:15:29 +0000345 }
paul7021c422003-07-15 12:52:22 +0000346 continue;
paul718e3742002-12-13 20:15:29 +0000347 }
paul7021c422003-07-15 12:52:22 +0000348
paul718e3742002-12-13 20:15:29 +0000349 if (h->nlmsg_len < NLMSG_LENGTH (sizeof (struct nlmsgerr)))
paul7021c422003-07-15 12:52:22 +0000350 {
351 zlog (NULL, LOG_ERR, "%s error: message truncated",
352 nl->name);
353 return -1;
354 }
pauld753e9e2003-01-22 19:45:50 +0000355
Stephen Hemminger898987e2008-08-17 16:56:15 +0100356 /* Deal with errors that occur because of races in link handling */
Feng Lu758fb8f2014-07-03 18:23:09 +0800357 if (nl == &zvrf->netlink_cmd
Stephen Hemminger898987e2008-08-17 16:56:15 +0100358 && ((msg_type == RTM_DELROUTE &&
359 (-errnum == ENODEV || -errnum == ESRCH))
360 || (msg_type == RTM_NEWROUTE && -errnum == EEXIST)))
361 {
362 if (IS_ZEBRA_DEBUG_KERNEL)
363 zlog_debug ("%s: error: %s type=%s(%u), seq=%u, pid=%u",
364 nl->name, safe_strerror (-errnum),
365 lookup (nlmsg_str, msg_type),
366 msg_type, err->msg.nlmsg_seq, err->msg.nlmsg_pid);
367 return 0;
368 }
paul718e3742002-12-13 20:15:29 +0000369
Stephen Hemminger898987e2008-08-17 16:56:15 +0100370 zlog_err ("%s error: %s, type=%s(%u), seq=%u, pid=%u",
371 nl->name, safe_strerror (-errnum),
372 lookup (nlmsg_str, msg_type),
373 msg_type, err->msg.nlmsg_seq, err->msg.nlmsg_pid);
paul7021c422003-07-15 12:52:22 +0000374 return -1;
375 }
paul718e3742002-12-13 20:15:29 +0000376
paul7021c422003-07-15 12:52:22 +0000377 /* OK we got netlink message. */
378 if (IS_ZEBRA_DEBUG_KERNEL)
hasso1ada8192005-06-12 11:28:18 +0000379 zlog_debug ("netlink_parse_info: %s type %s(%u), seq=%u, pid=%u",
paul7021c422003-07-15 12:52:22 +0000380 nl->name,
381 lookup (nlmsg_str, h->nlmsg_type), h->nlmsg_type,
382 h->nlmsg_seq, h->nlmsg_pid);
383
Christian Franke599da952013-01-24 14:04:43 +0000384 /* skip unsolicited messages originating from command socket
385 * linux sets the originators port-id for {NEW|DEL}ADDR messages,
386 * so this has to be checked here. */
Feng Lu758fb8f2014-07-03 18:23:09 +0800387 if (nl != &zvrf->netlink_cmd
388 && h->nlmsg_pid == zvrf->netlink_cmd.snl.nl_pid
Christian Franke599da952013-01-24 14:04:43 +0000389 && (h->nlmsg_type != RTM_NEWADDR && h->nlmsg_type != RTM_DELADDR))
paul7021c422003-07-15 12:52:22 +0000390 {
391 if (IS_ZEBRA_DEBUG_KERNEL)
ajsb6178002004-12-07 21:12:56 +0000392 zlog_debug ("netlink_parse_info: %s packet comes from %s",
Feng Lu758fb8f2014-07-03 18:23:09 +0800393 zvrf->netlink_cmd.name, nl->name);
paul7021c422003-07-15 12:52:22 +0000394 continue;
395 }
396
Feng Lu758fb8f2014-07-03 18:23:09 +0800397 error = (*filter) (&snl, h, zvrf->vrf_id);
paul7021c422003-07-15 12:52:22 +0000398 if (error < 0)
399 {
400 zlog (NULL, LOG_ERR, "%s filter function error", nl->name);
401 ret = error;
402 }
403 }
paul718e3742002-12-13 20:15:29 +0000404
405 /* After error care. */
406 if (msg.msg_flags & MSG_TRUNC)
paul7021c422003-07-15 12:52:22 +0000407 {
408 zlog (NULL, LOG_ERR, "%s error: message truncated", nl->name);
409 continue;
410 }
paul718e3742002-12-13 20:15:29 +0000411 if (status)
paul7021c422003-07-15 12:52:22 +0000412 {
413 zlog (NULL, LOG_ERR, "%s error: data remnant size %d", nl->name,
414 status);
415 return -1;
416 }
paul718e3742002-12-13 20:15:29 +0000417 }
418 return ret;
419}
420
421/* Utility function for parse rtattr. */
422static void
paul7021c422003-07-15 12:52:22 +0000423netlink_parse_rtattr (struct rtattr **tb, int max, struct rtattr *rta,
424 int len)
paul718e3742002-12-13 20:15:29 +0000425{
paul7021c422003-07-15 12:52:22 +0000426 while (RTA_OK (rta, len))
paul718e3742002-12-13 20:15:29 +0000427 {
428 if (rta->rta_type <= max)
paul7021c422003-07-15 12:52:22 +0000429 tb[rta->rta_type] = rta;
430 rta = RTA_NEXT (rta, len);
paul718e3742002-12-13 20:15:29 +0000431 }
432}
433
Josh Bailey26e2ae32012-03-22 01:09:21 -0700434/* Utility function to parse hardware link-layer address and update ifp */
435static void
436netlink_interface_update_hw_addr (struct rtattr **tb, struct interface *ifp)
437{
438 int i;
439
440 if (tb[IFLA_ADDRESS])
441 {
442 int hw_addr_len;
443
444 hw_addr_len = RTA_PAYLOAD (tb[IFLA_ADDRESS]);
445
446 if (hw_addr_len > INTERFACE_HWADDR_MAX)
447 zlog_warn ("Hardware address is too large: %d", hw_addr_len);
448 else
449 {
450 ifp->hw_addr_len = hw_addr_len;
451 memcpy (ifp->hw_addr, RTA_DATA (tb[IFLA_ADDRESS]), hw_addr_len);
452
453 for (i = 0; i < hw_addr_len; i++)
454 if (ifp->hw_addr[i] != 0)
455 break;
456
457 if (i == hw_addr_len)
458 ifp->hw_addr_len = 0;
459 else
460 ifp->hw_addr_len = hw_addr_len;
461 }
462 }
463}
464
paul718e3742002-12-13 20:15:29 +0000465/* Called from interface_lookup_netlink(). This function is only used
466 during bootstrap. */
Stephen Hemminger6072b242008-08-14 16:52:26 +0100467static int
Feng Lu758fb8f2014-07-03 18:23:09 +0800468netlink_interface (struct sockaddr_nl *snl, struct nlmsghdr *h,
469 vrf_id_t vrf_id)
paul718e3742002-12-13 20:15:29 +0000470{
471 int len;
472 struct ifinfomsg *ifi;
473 struct rtattr *tb[IFLA_MAX + 1];
474 struct interface *ifp;
475 char *name;
paul718e3742002-12-13 20:15:29 +0000476
477 ifi = NLMSG_DATA (h);
478
479 if (h->nlmsg_type != RTM_NEWLINK)
480 return 0;
481
482 len = h->nlmsg_len - NLMSG_LENGTH (sizeof (struct ifinfomsg));
483 if (len < 0)
484 return -1;
485
486 /* Looking up interface name. */
487 memset (tb, 0, sizeof tb);
488 netlink_parse_rtattr (tb, IFLA_MAX, IFLA_RTA (ifi), len);
paulc15cb242005-01-24 09:05:27 +0000489
paul1e193152005-02-14 23:53:05 +0000490#ifdef IFLA_WIRELESS
paulc15cb242005-01-24 09:05:27 +0000491 /* check for wireless messages to ignore */
492 if ((tb[IFLA_WIRELESS] != NULL) && (ifi->ifi_change == 0))
493 {
494 if (IS_ZEBRA_DEBUG_KERNEL)
495 zlog_debug ("%s: ignoring IFLA_WIRELESS message", __func__);
496 return 0;
497 }
paul1e193152005-02-14 23:53:05 +0000498#endif /* IFLA_WIRELESS */
paulc15cb242005-01-24 09:05:27 +0000499
paul718e3742002-12-13 20:15:29 +0000500 if (tb[IFLA_IFNAME] == NULL)
501 return -1;
paul7021c422003-07-15 12:52:22 +0000502 name = (char *) RTA_DATA (tb[IFLA_IFNAME]);
paul718e3742002-12-13 20:15:29 +0000503
504 /* Add interface. */
Feng Lu758fb8f2014-07-03 18:23:09 +0800505 ifp = if_get_by_name_vrf (name, vrf_id);
ajsd2fc8892005-04-02 18:38:43 +0000506 set_ifindex(ifp, ifi->ifi_index);
paul718e3742002-12-13 20:15:29 +0000507 ifp->flags = ifi->ifi_flags & 0x0000fffff;
Stephen Hemminger4308abb2008-12-01 14:19:38 -0800508 ifp->mtu6 = ifp->mtu = *(uint32_t *) RTA_DATA (tb[IFLA_MTU]);
Brett Cipherydb19c852013-10-03 13:48:54 +0000509 ifp->metric = 0;
paul718e3742002-12-13 20:15:29 +0000510
511 /* Hardware type and address. */
512 ifp->hw_type = ifi->ifi_type;
Josh Bailey26e2ae32012-03-22 01:09:21 -0700513 netlink_interface_update_hw_addr (tb, ifp);
paul718e3742002-12-13 20:15:29 +0000514
515 if_add_update (ifp);
516
517 return 0;
518}
519
520/* Lookup interface IPv4/IPv6 address. */
Stephen Hemminger6072b242008-08-14 16:52:26 +0100521static int
Feng Lu758fb8f2014-07-03 18:23:09 +0800522netlink_interface_addr (struct sockaddr_nl *snl, struct nlmsghdr *h,
523 vrf_id_t vrf_id)
paul718e3742002-12-13 20:15:29 +0000524{
525 int len;
526 struct ifaddrmsg *ifa;
paul7021c422003-07-15 12:52:22 +0000527 struct rtattr *tb[IFA_MAX + 1];
paul718e3742002-12-13 20:15:29 +0000528 struct interface *ifp;
Andrew J. Schorre4529632006-12-12 19:18:21 +0000529 void *addr;
530 void *broad;
paul718e3742002-12-13 20:15:29 +0000531 u_char flags = 0;
532 char *label = NULL;
533
534 ifa = NLMSG_DATA (h);
535
paul7021c422003-07-15 12:52:22 +0000536 if (ifa->ifa_family != AF_INET
paul718e3742002-12-13 20:15:29 +0000537#ifdef HAVE_IPV6
538 && ifa->ifa_family != AF_INET6
539#endif /* HAVE_IPV6 */
paul7021c422003-07-15 12:52:22 +0000540 )
paul718e3742002-12-13 20:15:29 +0000541 return 0;
542
543 if (h->nlmsg_type != RTM_NEWADDR && h->nlmsg_type != RTM_DELADDR)
544 return 0;
545
paul7021c422003-07-15 12:52:22 +0000546 len = h->nlmsg_len - NLMSG_LENGTH (sizeof (struct ifaddrmsg));
paul718e3742002-12-13 20:15:29 +0000547 if (len < 0)
548 return -1;
549
550 memset (tb, 0, sizeof tb);
551 netlink_parse_rtattr (tb, IFA_MAX, IFA_RTA (ifa), len);
552
Feng Lu758fb8f2014-07-03 18:23:09 +0800553 ifp = if_lookup_by_index_vrf (ifa->ifa_index, vrf_id);
paul718e3742002-12-13 20:15:29 +0000554 if (ifp == NULL)
555 {
Feng Lu758fb8f2014-07-03 18:23:09 +0800556 zlog_err ("netlink_interface_addr can't find interface by index %d vrf %u",
557 ifa->ifa_index, vrf_id);
paul718e3742002-12-13 20:15:29 +0000558 return -1;
559 }
560
paul7021c422003-07-15 12:52:22 +0000561 if (IS_ZEBRA_DEBUG_KERNEL) /* remove this line to see initial ifcfg */
paul718e3742002-12-13 20:15:29 +0000562 {
paul00df0c12002-12-13 21:07:36 +0000563 char buf[BUFSIZ];
Feng Lu758fb8f2014-07-03 18:23:09 +0800564 zlog_debug ("netlink_interface_addr %s %s vrf %u:",
565 lookup (nlmsg_str, h->nlmsg_type), ifp->name, vrf_id);
paul718e3742002-12-13 20:15:29 +0000566 if (tb[IFA_LOCAL])
hasso206d8052005-04-09 16:38:51 +0000567 zlog_debug (" IFA_LOCAL %s/%d",
568 inet_ntop (ifa->ifa_family, RTA_DATA (tb[IFA_LOCAL]),
569 buf, BUFSIZ), ifa->ifa_prefixlen);
paul718e3742002-12-13 20:15:29 +0000570 if (tb[IFA_ADDRESS])
hasso206d8052005-04-09 16:38:51 +0000571 zlog_debug (" IFA_ADDRESS %s/%d",
572 inet_ntop (ifa->ifa_family, RTA_DATA (tb[IFA_ADDRESS]),
573 buf, BUFSIZ), ifa->ifa_prefixlen);
paul718e3742002-12-13 20:15:29 +0000574 if (tb[IFA_BROADCAST])
hasso206d8052005-04-09 16:38:51 +0000575 zlog_debug (" IFA_BROADCAST %s/%d",
576 inet_ntop (ifa->ifa_family, RTA_DATA (tb[IFA_BROADCAST]),
577 buf, BUFSIZ), ifa->ifa_prefixlen);
paul00df0c12002-12-13 21:07:36 +0000578 if (tb[IFA_LABEL] && strcmp (ifp->name, RTA_DATA (tb[IFA_LABEL])))
ajsb6178002004-12-07 21:12:56 +0000579 zlog_debug (" IFA_LABEL %s", (char *)RTA_DATA (tb[IFA_LABEL]));
pauld34b8992006-01-17 18:03:04 +0000580
581 if (tb[IFA_CACHEINFO])
582 {
583 struct ifa_cacheinfo *ci = RTA_DATA (tb[IFA_CACHEINFO]);
584 zlog_debug (" IFA_CACHEINFO pref %d, valid %d",
585 ci->ifa_prefered, ci->ifa_valid);
586 }
paul718e3742002-12-13 20:15:29 +0000587 }
paul31a476c2003-09-29 19:54:53 +0000588
Andrew J. Schorre4529632006-12-12 19:18:21 +0000589 /* logic copied from iproute2/ip/ipaddress.c:print_addrinfo() */
590 if (tb[IFA_LOCAL] == NULL)
591 tb[IFA_LOCAL] = tb[IFA_ADDRESS];
paul31a476c2003-09-29 19:54:53 +0000592 if (tb[IFA_ADDRESS] == NULL)
593 tb[IFA_ADDRESS] = tb[IFA_LOCAL];
594
Andrew J. Schorre4529632006-12-12 19:18:21 +0000595 /* local interface address */
596 addr = (tb[IFA_LOCAL] ? RTA_DATA(tb[IFA_LOCAL]) : NULL);
597
598 /* is there a peer address? */
Andrew J. Schorre4529632006-12-12 19:18:21 +0000599 if (tb[IFA_ADDRESS] &&
vize068fd772007-08-10 06:25:20 +0000600 memcmp(RTA_DATA(tb[IFA_ADDRESS]), RTA_DATA(tb[IFA_LOCAL]), RTA_PAYLOAD(tb[IFA_ADDRESS])))
paul7021c422003-07-15 12:52:22 +0000601 {
Andrew J. Schorre4529632006-12-12 19:18:21 +0000602 broad = RTA_DATA(tb[IFA_ADDRESS]);
603 SET_FLAG (flags, ZEBRA_IFA_PEER);
paul7021c422003-07-15 12:52:22 +0000604 }
paul31a476c2003-09-29 19:54:53 +0000605 else
Andrew J. Schorre4529632006-12-12 19:18:21 +0000606 /* seeking a broadcast address */
607 broad = (tb[IFA_BROADCAST] ? RTA_DATA(tb[IFA_BROADCAST]) : NULL);
paul00df0c12002-12-13 21:07:36 +0000608
Paul Jakma27b47252006-07-02 16:38:54 +0000609 /* addr is primary key, SOL if we don't have one */
610 if (addr == NULL)
611 {
612 zlog_debug ("%s: NULL address", __func__);
613 return -1;
614 }
615
paul718e3742002-12-13 20:15:29 +0000616 /* Flags. */
617 if (ifa->ifa_flags & IFA_F_SECONDARY)
618 SET_FLAG (flags, ZEBRA_IFA_SECONDARY);
619
620 /* Label */
621 if (tb[IFA_LABEL])
622 label = (char *) RTA_DATA (tb[IFA_LABEL]);
623
624 if (ifp && label && strcmp (ifp->name, label) == 0)
625 label = NULL;
626
627 /* Register interface address to the interface. */
628 if (ifa->ifa_family == AF_INET)
629 {
paul7021c422003-07-15 12:52:22 +0000630 if (h->nlmsg_type == RTM_NEWADDR)
631 connected_add_ipv4 (ifp, flags,
632 (struct in_addr *) addr, ifa->ifa_prefixlen,
633 (struct in_addr *) broad, label);
634 else
635 connected_delete_ipv4 (ifp, flags,
636 (struct in_addr *) addr, ifa->ifa_prefixlen,
paul0752ef02005-11-03 12:35:21 +0000637 (struct in_addr *) broad);
paul718e3742002-12-13 20:15:29 +0000638 }
639#ifdef HAVE_IPV6
640 if (ifa->ifa_family == AF_INET6)
641 {
642 if (h->nlmsg_type == RTM_NEWADDR)
Andrew J. Schorre4529632006-12-12 19:18:21 +0000643 connected_add_ipv6 (ifp, flags,
paul7021c422003-07-15 12:52:22 +0000644 (struct in6_addr *) addr, ifa->ifa_prefixlen,
paul0752ef02005-11-03 12:35:21 +0000645 (struct in6_addr *) broad, label);
paul718e3742002-12-13 20:15:29 +0000646 else
paul7021c422003-07-15 12:52:22 +0000647 connected_delete_ipv6 (ifp,
648 (struct in6_addr *) addr, ifa->ifa_prefixlen,
649 (struct in6_addr *) broad);
paul718e3742002-12-13 20:15:29 +0000650 }
paul7021c422003-07-15 12:52:22 +0000651#endif /* HAVE_IPV6 */
paul718e3742002-12-13 20:15:29 +0000652
653 return 0;
654}
655
656/* Looking up routing table by netlink interface. */
Stephen Hemminger6072b242008-08-14 16:52:26 +0100657static int
Feng Lu758fb8f2014-07-03 18:23:09 +0800658netlink_routing_table (struct sockaddr_nl *snl, struct nlmsghdr *h,
659 vrf_id_t vrf_id)
paul718e3742002-12-13 20:15:29 +0000660{
661 int len;
662 struct rtmsg *rtm;
paul7021c422003-07-15 12:52:22 +0000663 struct rtattr *tb[RTA_MAX + 1];
paul718e3742002-12-13 20:15:29 +0000664 u_char flags = 0;
paul7021c422003-07-15 12:52:22 +0000665
666 char anyaddr[16] = { 0 };
paul718e3742002-12-13 20:15:29 +0000667
668 int index;
669 int table;
hasso34195bf2004-04-06 12:07:06 +0000670 int metric;
671
paul718e3742002-12-13 20:15:29 +0000672 void *dest;
673 void *gate;
Paul Jakma7514fb72007-05-02 16:05:35 +0000674 void *src;
paul718e3742002-12-13 20:15:29 +0000675
676 rtm = NLMSG_DATA (h);
677
678 if (h->nlmsg_type != RTM_NEWROUTE)
679 return 0;
680 if (rtm->rtm_type != RTN_UNICAST)
681 return 0;
682
683 table = rtm->rtm_table;
paul7021c422003-07-15 12:52:22 +0000684#if 0 /* we weed them out later in rib_weed_tables () */
paulb21b19c2003-06-15 01:28:29 +0000685 if (table != RT_TABLE_MAIN && table != zebrad.rtm_table_default)
paul718e3742002-12-13 20:15:29 +0000686 return 0;
687#endif
688
paul7021c422003-07-15 12:52:22 +0000689 len = h->nlmsg_len - NLMSG_LENGTH (sizeof (struct rtmsg));
paul718e3742002-12-13 20:15:29 +0000690 if (len < 0)
691 return -1;
692
693 memset (tb, 0, sizeof tb);
694 netlink_parse_rtattr (tb, RTA_MAX, RTM_RTA (rtm), len);
695
696 if (rtm->rtm_flags & RTM_F_CLONED)
697 return 0;
698 if (rtm->rtm_protocol == RTPROT_REDIRECT)
699 return 0;
700 if (rtm->rtm_protocol == RTPROT_KERNEL)
701 return 0;
702
703 if (rtm->rtm_src_len != 0)
704 return 0;
705
706 /* Route which inserted by Zebra. */
707 if (rtm->rtm_protocol == RTPROT_ZEBRA)
708 flags |= ZEBRA_FLAG_SELFROUTE;
paul7021c422003-07-15 12:52:22 +0000709
paul718e3742002-12-13 20:15:29 +0000710 index = 0;
hasso34195bf2004-04-06 12:07:06 +0000711 metric = 0;
paul718e3742002-12-13 20:15:29 +0000712 dest = NULL;
713 gate = NULL;
Paul Jakma7514fb72007-05-02 16:05:35 +0000714 src = NULL;
paul718e3742002-12-13 20:15:29 +0000715
716 if (tb[RTA_OIF])
717 index = *(int *) RTA_DATA (tb[RTA_OIF]);
718
719 if (tb[RTA_DST])
720 dest = RTA_DATA (tb[RTA_DST]);
721 else
722 dest = anyaddr;
723
Paul Jakma7514fb72007-05-02 16:05:35 +0000724 if (tb[RTA_PREFSRC])
725 src = RTA_DATA (tb[RTA_PREFSRC]);
726
paul718e3742002-12-13 20:15:29 +0000727 if (tb[RTA_GATEWAY])
728 gate = RTA_DATA (tb[RTA_GATEWAY]);
729
hasso34195bf2004-04-06 12:07:06 +0000730 if (tb[RTA_PRIORITY])
731 metric = *(int *) RTA_DATA(tb[RTA_PRIORITY]);
732
paul718e3742002-12-13 20:15:29 +0000733 if (rtm->rtm_family == AF_INET)
734 {
735 struct prefix_ipv4 p;
736 p.family = AF_INET;
737 memcpy (&p.prefix, dest, 4);
738 p.prefixlen = rtm->rtm_dst_len;
739
Josh Bailey26e2ae32012-03-22 01:09:21 -0700740 if (!tb[RTA_MULTIPATH])
741 rib_add_ipv4 (ZEBRA_ROUTE_KERNEL, flags, &p, gate, src, index,
Feng Lu758fb8f2014-07-03 18:23:09 +0800742 vrf_id, table, metric, 0, SAFI_UNICAST);
Josh Bailey26e2ae32012-03-22 01:09:21 -0700743 else
744 {
745 /* This is a multipath route */
746
747 struct rib *rib;
748 struct rtnexthop *rtnh =
749 (struct rtnexthop *) RTA_DATA (tb[RTA_MULTIPATH]);
750
751 len = RTA_PAYLOAD (tb[RTA_MULTIPATH]);
752
753 rib = XCALLOC (MTYPE_RIB, sizeof (struct rib));
754 rib->type = ZEBRA_ROUTE_KERNEL;
755 rib->distance = 0;
756 rib->flags = flags;
757 rib->metric = metric;
Feng Lu758fb8f2014-07-03 18:23:09 +0800758 rib->vrf_id = vrf_id;
Josh Bailey26e2ae32012-03-22 01:09:21 -0700759 rib->table = table;
760 rib->nexthop_num = 0;
761 rib->uptime = time (NULL);
762
763 for (;;)
764 {
765 if (len < (int) sizeof (*rtnh) || rtnh->rtnh_len > len)
766 break;
767
768 rib->nexthop_num++;
769 index = rtnh->rtnh_ifindex;
770 gate = 0;
771 if (rtnh->rtnh_len > sizeof (*rtnh))
772 {
773 memset (tb, 0, sizeof (tb));
774 netlink_parse_rtattr (tb, RTA_MAX, RTNH_DATA (rtnh),
775 rtnh->rtnh_len - sizeof (*rtnh));
776 if (tb[RTA_GATEWAY])
777 gate = RTA_DATA (tb[RTA_GATEWAY]);
778 }
779
780 if (gate)
781 {
782 if (index)
783 nexthop_ipv4_ifindex_add (rib, gate, src, index);
784 else
785 nexthop_ipv4_add (rib, gate, src);
786 }
787 else
788 nexthop_ifindex_add (rib, index);
789
790 len -= NLMSG_ALIGN(rtnh->rtnh_len);
791 rtnh = RTNH_NEXT(rtnh);
792 }
793
794 if (rib->nexthop_num == 0)
795 XFREE (MTYPE_RIB, rib);
796 else
Avneesh Sachdev14d2bba2012-04-11 23:51:08 -0700797 rib_add_ipv4_multipath (&p, rib, SAFI_UNICAST);
Josh Bailey26e2ae32012-03-22 01:09:21 -0700798 }
paul718e3742002-12-13 20:15:29 +0000799 }
800#ifdef HAVE_IPV6
801 if (rtm->rtm_family == AF_INET6)
802 {
803 struct prefix_ipv6 p;
804 p.family = AF_INET6;
805 memcpy (&p.prefix, dest, 16);
806 p.prefixlen = rtm->rtm_dst_len;
807
Feng Lu758fb8f2014-07-03 18:23:09 +0800808 rib_add_ipv6 (ZEBRA_ROUTE_KERNEL, flags, &p, gate, index, vrf_id,
Feng Lu0d0686f2015-05-22 11:40:02 +0200809 table, metric, 0, SAFI_UNICAST);
paul718e3742002-12-13 20:15:29 +0000810 }
811#endif /* HAVE_IPV6 */
812
813 return 0;
814}
815
Stephen Hemminger1423c802008-08-14 17:59:25 +0100816static const struct message rtproto_str[] = {
paul718e3742002-12-13 20:15:29 +0000817 {RTPROT_REDIRECT, "redirect"},
818 {RTPROT_KERNEL, "kernel"},
819 {RTPROT_BOOT, "boot"},
820 {RTPROT_STATIC, "static"},
821 {RTPROT_GATED, "GateD"},
822 {RTPROT_RA, "router advertisement"},
823 {RTPROT_MRT, "MRT"},
824 {RTPROT_ZEBRA, "Zebra"},
825#ifdef RTPROT_BIRD
826 {RTPROT_BIRD, "BIRD"},
827#endif /* RTPROT_BIRD */
828 {0, NULL}
829};
830
831/* Routing information change from the kernel. */
Stephen Hemminger6072b242008-08-14 16:52:26 +0100832static int
Feng Lu758fb8f2014-07-03 18:23:09 +0800833netlink_route_change (struct sockaddr_nl *snl, struct nlmsghdr *h,
834 vrf_id_t vrf_id)
paul718e3742002-12-13 20:15:29 +0000835{
836 int len;
837 struct rtmsg *rtm;
paul7021c422003-07-15 12:52:22 +0000838 struct rtattr *tb[RTA_MAX + 1];
839
840 char anyaddr[16] = { 0 };
paul718e3742002-12-13 20:15:29 +0000841
842 int index;
843 int table;
Josh Bailey26e2ae32012-03-22 01:09:21 -0700844 int metric;
Dmitry Popov83d16142011-09-11 13:48:25 +0400845
paul718e3742002-12-13 20:15:29 +0000846 void *dest;
847 void *gate;
Paul Jakma7514fb72007-05-02 16:05:35 +0000848 void *src;
paul718e3742002-12-13 20:15:29 +0000849
850 rtm = NLMSG_DATA (h);
851
paul7021c422003-07-15 12:52:22 +0000852 if (!(h->nlmsg_type == RTM_NEWROUTE || h->nlmsg_type == RTM_DELROUTE))
paul718e3742002-12-13 20:15:29 +0000853 {
854 /* If this is not route add/delete message print warning. */
Feng Lu758fb8f2014-07-03 18:23:09 +0800855 zlog_warn ("Kernel message: %d vrf %u\n", h->nlmsg_type, vrf_id);
paul718e3742002-12-13 20:15:29 +0000856 return 0;
857 }
858
859 /* Connected route. */
860 if (IS_ZEBRA_DEBUG_KERNEL)
Feng Lu758fb8f2014-07-03 18:23:09 +0800861 zlog_debug ("%s %s %s proto %s vrf %u",
paul7021c422003-07-15 12:52:22 +0000862 h->nlmsg_type ==
863 RTM_NEWROUTE ? "RTM_NEWROUTE" : "RTM_DELROUTE",
864 rtm->rtm_family == AF_INET ? "ipv4" : "ipv6",
865 rtm->rtm_type == RTN_UNICAST ? "unicast" : "multicast",
Feng Lu758fb8f2014-07-03 18:23:09 +0800866 lookup (rtproto_str, rtm->rtm_protocol),
867 vrf_id);
paul718e3742002-12-13 20:15:29 +0000868
869 if (rtm->rtm_type != RTN_UNICAST)
870 {
871 return 0;
872 }
873
874 table = rtm->rtm_table;
paulb21b19c2003-06-15 01:28:29 +0000875 if (table != RT_TABLE_MAIN && table != zebrad.rtm_table_default)
paul718e3742002-12-13 20:15:29 +0000876 {
877 return 0;
878 }
879
paul7021c422003-07-15 12:52:22 +0000880 len = h->nlmsg_len - NLMSG_LENGTH (sizeof (struct rtmsg));
paul718e3742002-12-13 20:15:29 +0000881 if (len < 0)
882 return -1;
883
884 memset (tb, 0, sizeof tb);
885 netlink_parse_rtattr (tb, RTA_MAX, RTM_RTA (rtm), len);
886
887 if (rtm->rtm_flags & RTM_F_CLONED)
888 return 0;
889 if (rtm->rtm_protocol == RTPROT_REDIRECT)
890 return 0;
891 if (rtm->rtm_protocol == RTPROT_KERNEL)
892 return 0;
893
894 if (rtm->rtm_protocol == RTPROT_ZEBRA && h->nlmsg_type == RTM_NEWROUTE)
895 return 0;
896
897 if (rtm->rtm_src_len != 0)
898 {
Feng Lu758fb8f2014-07-03 18:23:09 +0800899 zlog_warn ("netlink_route_change(): no src len, vrf %u", vrf_id);
paul718e3742002-12-13 20:15:29 +0000900 return 0;
901 }
paul7021c422003-07-15 12:52:22 +0000902
paul718e3742002-12-13 20:15:29 +0000903 index = 0;
Josh Bailey26e2ae32012-03-22 01:09:21 -0700904 metric = 0;
paul718e3742002-12-13 20:15:29 +0000905 dest = NULL;
906 gate = NULL;
Paul Jakma7514fb72007-05-02 16:05:35 +0000907 src = NULL;
paul718e3742002-12-13 20:15:29 +0000908
909 if (tb[RTA_OIF])
910 index = *(int *) RTA_DATA (tb[RTA_OIF]);
911
912 if (tb[RTA_DST])
913 dest = RTA_DATA (tb[RTA_DST]);
914 else
915 dest = anyaddr;
916
917 if (tb[RTA_GATEWAY])
918 gate = RTA_DATA (tb[RTA_GATEWAY]);
919
Paul Jakma7514fb72007-05-02 16:05:35 +0000920 if (tb[RTA_PREFSRC])
921 src = RTA_DATA (tb[RTA_PREFSRC]);
922
Dmitry Popov83d16142011-09-11 13:48:25 +0400923 if (h->nlmsg_type == RTM_NEWROUTE && tb[RTA_PRIORITY])
Josh Bailey26e2ae32012-03-22 01:09:21 -0700924 metric = *(int *) RTA_DATA(tb[RTA_PRIORITY]);
925
paul718e3742002-12-13 20:15:29 +0000926 if (rtm->rtm_family == AF_INET)
927 {
928 struct prefix_ipv4 p;
929 p.family = AF_INET;
930 memcpy (&p.prefix, dest, 4);
931 p.prefixlen = rtm->rtm_dst_len;
932
933 if (IS_ZEBRA_DEBUG_KERNEL)
paul7021c422003-07-15 12:52:22 +0000934 {
Timo Teräsbe6335d2015-05-23 11:08:41 +0300935 char buf[PREFIX_STRLEN];
Feng Lu758fb8f2014-07-03 18:23:09 +0800936 zlog_debug ("%s %s vrf %u",
Timo Teräsbe6335d2015-05-23 11:08:41 +0300937 h->nlmsg_type == RTM_NEWROUTE ? "RTM_NEWROUTE" : "RTM_DELROUTE",
Feng Lu758fb8f2014-07-03 18:23:09 +0800938 prefix2str (&p, buf, sizeof(buf)), vrf_id);
paul7021c422003-07-15 12:52:22 +0000939 }
paul718e3742002-12-13 20:15:29 +0000940
941 if (h->nlmsg_type == RTM_NEWROUTE)
Josh Bailey26e2ae32012-03-22 01:09:21 -0700942 {
943 if (!tb[RTA_MULTIPATH])
Feng Lu758fb8f2014-07-03 18:23:09 +0800944 rib_add_ipv4 (ZEBRA_ROUTE_KERNEL, 0, &p, gate, src, index, vrf_id,
Feng Lu0d0686f2015-05-22 11:40:02 +0200945 table, metric, 0, SAFI_UNICAST);
Josh Bailey26e2ae32012-03-22 01:09:21 -0700946 else
947 {
948 /* This is a multipath route */
949
950 struct rib *rib;
951 struct rtnexthop *rtnh =
952 (struct rtnexthop *) RTA_DATA (tb[RTA_MULTIPATH]);
953
954 len = RTA_PAYLOAD (tb[RTA_MULTIPATH]);
955
956 rib = XCALLOC (MTYPE_RIB, sizeof (struct rib));
957 rib->type = ZEBRA_ROUTE_KERNEL;
958 rib->distance = 0;
959 rib->flags = 0;
960 rib->metric = metric;
Feng Lu758fb8f2014-07-03 18:23:09 +0800961 rib->vrf_id = vrf_id;
Josh Bailey26e2ae32012-03-22 01:09:21 -0700962 rib->table = table;
963 rib->nexthop_num = 0;
964 rib->uptime = time (NULL);
965
966 for (;;)
967 {
968 if (len < (int) sizeof (*rtnh) || rtnh->rtnh_len > len)
969 break;
970
971 rib->nexthop_num++;
972 index = rtnh->rtnh_ifindex;
973 gate = 0;
974 if (rtnh->rtnh_len > sizeof (*rtnh))
975 {
976 memset (tb, 0, sizeof (tb));
977 netlink_parse_rtattr (tb, RTA_MAX, RTNH_DATA (rtnh),
978 rtnh->rtnh_len - sizeof (*rtnh));
979 if (tb[RTA_GATEWAY])
980 gate = RTA_DATA (tb[RTA_GATEWAY]);
981 }
982
983 if (gate)
984 {
985 if (index)
986 nexthop_ipv4_ifindex_add (rib, gate, src, index);
987 else
988 nexthop_ipv4_add (rib, gate, src);
989 }
990 else
991 nexthop_ifindex_add (rib, index);
992
993 len -= NLMSG_ALIGN(rtnh->rtnh_len);
994 rtnh = RTNH_NEXT(rtnh);
995 }
996
997 if (rib->nexthop_num == 0)
998 XFREE (MTYPE_RIB, rib);
999 else
Avneesh Sachdev14d2bba2012-04-11 23:51:08 -07001000 rib_add_ipv4_multipath (&p, rib, SAFI_UNICAST);
Josh Bailey26e2ae32012-03-22 01:09:21 -07001001 }
1002 }
paul718e3742002-12-13 20:15:29 +00001003 else
Feng Lu758fb8f2014-07-03 18:23:09 +08001004 rib_delete_ipv4 (ZEBRA_ROUTE_KERNEL, 0, &p, gate, index, vrf_id,
Feng Lu0d0686f2015-05-22 11:40:02 +02001005 SAFI_UNICAST);
paul718e3742002-12-13 20:15:29 +00001006 }
1007
1008#ifdef HAVE_IPV6
1009 if (rtm->rtm_family == AF_INET6)
1010 {
1011 struct prefix_ipv6 p;
paul718e3742002-12-13 20:15:29 +00001012
1013 p.family = AF_INET6;
1014 memcpy (&p.prefix, dest, 16);
1015 p.prefixlen = rtm->rtm_dst_len;
1016
1017 if (IS_ZEBRA_DEBUG_KERNEL)
paul7021c422003-07-15 12:52:22 +00001018 {
Timo Teräsbe6335d2015-05-23 11:08:41 +03001019 char buf[PREFIX_STRLEN];
Feng Lu758fb8f2014-07-03 18:23:09 +08001020 zlog_debug ("%s %s vrf %u",
Timo Teräsbe6335d2015-05-23 11:08:41 +03001021 h->nlmsg_type == RTM_NEWROUTE ? "RTM_NEWROUTE" : "RTM_DELROUTE",
Feng Lu758fb8f2014-07-03 18:23:09 +08001022 prefix2str (&p, buf, sizeof(buf)), vrf_id);
paul7021c422003-07-15 12:52:22 +00001023 }
paul718e3742002-12-13 20:15:29 +00001024
1025 if (h->nlmsg_type == RTM_NEWROUTE)
Feng Lu758fb8f2014-07-03 18:23:09 +08001026 rib_add_ipv6 (ZEBRA_ROUTE_KERNEL, 0, &p, gate, index, vrf_id, table,
Feng Lu0d0686f2015-05-22 11:40:02 +02001027 metric, 0, SAFI_UNICAST);
paul718e3742002-12-13 20:15:29 +00001028 else
Feng Lu758fb8f2014-07-03 18:23:09 +08001029 rib_delete_ipv6 (ZEBRA_ROUTE_KERNEL, 0, &p, gate, index, vrf_id,
Feng Lu0d0686f2015-05-22 11:40:02 +02001030 SAFI_UNICAST);
paul718e3742002-12-13 20:15:29 +00001031 }
1032#endif /* HAVE_IPV6 */
1033
1034 return 0;
1035}
1036
Stephen Hemminger6072b242008-08-14 16:52:26 +01001037static int
Feng Lu758fb8f2014-07-03 18:23:09 +08001038netlink_link_change (struct sockaddr_nl *snl, struct nlmsghdr *h,
1039 vrf_id_t vrf_id)
paul718e3742002-12-13 20:15:29 +00001040{
1041 int len;
1042 struct ifinfomsg *ifi;
paul7021c422003-07-15 12:52:22 +00001043 struct rtattr *tb[IFLA_MAX + 1];
paul718e3742002-12-13 20:15:29 +00001044 struct interface *ifp;
1045 char *name;
1046
1047 ifi = NLMSG_DATA (h);
1048
paul7021c422003-07-15 12:52:22 +00001049 if (!(h->nlmsg_type == RTM_NEWLINK || h->nlmsg_type == RTM_DELLINK))
paul718e3742002-12-13 20:15:29 +00001050 {
1051 /* If this is not link add/delete message so print warning. */
Feng Lu758fb8f2014-07-03 18:23:09 +08001052 zlog_warn ("netlink_link_change: wrong kernel message %d vrf %u\n",
1053 h->nlmsg_type, vrf_id);
paul718e3742002-12-13 20:15:29 +00001054 return 0;
1055 }
1056
1057 len = h->nlmsg_len - NLMSG_LENGTH (sizeof (struct ifinfomsg));
1058 if (len < 0)
1059 return -1;
1060
1061 /* Looking up interface name. */
1062 memset (tb, 0, sizeof tb);
1063 netlink_parse_rtattr (tb, IFLA_MAX, IFLA_RTA (ifi), len);
paulc15cb242005-01-24 09:05:27 +00001064
paul1e193152005-02-14 23:53:05 +00001065#ifdef IFLA_WIRELESS
paulc15cb242005-01-24 09:05:27 +00001066 /* check for wireless messages to ignore */
1067 if ((tb[IFLA_WIRELESS] != NULL) && (ifi->ifi_change == 0))
1068 {
1069 if (IS_ZEBRA_DEBUG_KERNEL)
Feng Lu758fb8f2014-07-03 18:23:09 +08001070 zlog_debug ("%s: ignoring IFLA_WIRELESS message, vrf %u", __func__,
1071 vrf_id);
paulc15cb242005-01-24 09:05:27 +00001072 return 0;
1073 }
paul1e193152005-02-14 23:53:05 +00001074#endif /* IFLA_WIRELESS */
paulc15cb242005-01-24 09:05:27 +00001075
paul718e3742002-12-13 20:15:29 +00001076 if (tb[IFLA_IFNAME] == NULL)
1077 return -1;
paul7021c422003-07-15 12:52:22 +00001078 name = (char *) RTA_DATA (tb[IFLA_IFNAME]);
paul718e3742002-12-13 20:15:29 +00001079
1080 /* Add interface. */
1081 if (h->nlmsg_type == RTM_NEWLINK)
1082 {
Feng Lu758fb8f2014-07-03 18:23:09 +08001083 ifp = if_lookup_by_name_vrf (name, vrf_id);
paul718e3742002-12-13 20:15:29 +00001084
paul7021c422003-07-15 12:52:22 +00001085 if (ifp == NULL || !CHECK_FLAG (ifp->status, ZEBRA_INTERFACE_ACTIVE))
1086 {
1087 if (ifp == NULL)
Feng Lu758fb8f2014-07-03 18:23:09 +08001088 ifp = if_get_by_name_vrf (name, vrf_id);
paul718e3742002-12-13 20:15:29 +00001089
ajsd2fc8892005-04-02 18:38:43 +00001090 set_ifindex(ifp, ifi->ifi_index);
paul7021c422003-07-15 12:52:22 +00001091 ifp->flags = ifi->ifi_flags & 0x0000fffff;
paul44145db2004-05-09 11:00:23 +00001092 ifp->mtu6 = ifp->mtu = *(int *) RTA_DATA (tb[IFLA_MTU]);
Brett Cipherydb19c852013-10-03 13:48:54 +00001093 ifp->metric = 0;
paul718e3742002-12-13 20:15:29 +00001094
Josh Bailey26e2ae32012-03-22 01:09:21 -07001095 netlink_interface_update_hw_addr (tb, ifp);
1096
paul7021c422003-07-15 12:52:22 +00001097 /* If new link is added. */
1098 if_add_update (ifp);
1099 }
paul718e3742002-12-13 20:15:29 +00001100 else
paul7021c422003-07-15 12:52:22 +00001101 {
1102 /* Interface status change. */
ajsd2fc8892005-04-02 18:38:43 +00001103 set_ifindex(ifp, ifi->ifi_index);
paul44145db2004-05-09 11:00:23 +00001104 ifp->mtu6 = ifp->mtu = *(int *) RTA_DATA (tb[IFLA_MTU]);
Brett Cipherydb19c852013-10-03 13:48:54 +00001105 ifp->metric = 0;
paul718e3742002-12-13 20:15:29 +00001106
Josh Bailey26e2ae32012-03-22 01:09:21 -07001107 netlink_interface_update_hw_addr (tb, ifp);
1108
paul7021c422003-07-15 12:52:22 +00001109 if (if_is_operative (ifp))
1110 {
1111 ifp->flags = ifi->ifi_flags & 0x0000fffff;
1112 if (!if_is_operative (ifp))
1113 if_down (ifp);
ajsa608bbf2005-03-29 17:03:49 +00001114 else
1115 /* Must notify client daemons of new interface status. */
1116 zebra_interface_up_update (ifp);
paul7021c422003-07-15 12:52:22 +00001117 }
1118 else
1119 {
1120 ifp->flags = ifi->ifi_flags & 0x0000fffff;
1121 if (if_is_operative (ifp))
1122 if_up (ifp);
1123 }
1124 }
paul718e3742002-12-13 20:15:29 +00001125 }
1126 else
1127 {
1128 /* RTM_DELLINK. */
Feng Lu758fb8f2014-07-03 18:23:09 +08001129 ifp = if_lookup_by_name_vrf (name, vrf_id);
paul718e3742002-12-13 20:15:29 +00001130
1131 if (ifp == NULL)
paul7021c422003-07-15 12:52:22 +00001132 {
Feng Lu758fb8f2014-07-03 18:23:09 +08001133 zlog_warn ("interface %s vrf %u is deleted but can't find",
1134 name, vrf_id);
paul7021c422003-07-15 12:52:22 +00001135 return 0;
1136 }
1137
paul718e3742002-12-13 20:15:29 +00001138 if_delete_update (ifp);
1139 }
1140
1141 return 0;
1142}
1143
Stephen Hemminger6072b242008-08-14 16:52:26 +01001144static int
Feng Lu758fb8f2014-07-03 18:23:09 +08001145netlink_information_fetch (struct sockaddr_nl *snl, struct nlmsghdr *h,
1146 vrf_id_t vrf_id)
paul718e3742002-12-13 20:15:29 +00001147{
Stephen Hemminger3d265b42008-08-16 17:30:39 +01001148 /* JF: Ignore messages that aren't from the kernel */
1149 if ( snl->nl_pid != 0 )
1150 {
1151 zlog ( NULL, LOG_ERR, "Ignoring message from pid %u", snl->nl_pid );
1152 return 0;
1153 }
1154
paul718e3742002-12-13 20:15:29 +00001155 switch (h->nlmsg_type)
1156 {
1157 case RTM_NEWROUTE:
Feng Lu758fb8f2014-07-03 18:23:09 +08001158 return netlink_route_change (snl, h, vrf_id);
paul718e3742002-12-13 20:15:29 +00001159 break;
1160 case RTM_DELROUTE:
Feng Lu758fb8f2014-07-03 18:23:09 +08001161 return netlink_route_change (snl, h, vrf_id);
paul718e3742002-12-13 20:15:29 +00001162 break;
1163 case RTM_NEWLINK:
Feng Lu758fb8f2014-07-03 18:23:09 +08001164 return netlink_link_change (snl, h, vrf_id);
paul718e3742002-12-13 20:15:29 +00001165 break;
1166 case RTM_DELLINK:
Feng Lu758fb8f2014-07-03 18:23:09 +08001167 return netlink_link_change (snl, h, vrf_id);
paul718e3742002-12-13 20:15:29 +00001168 break;
1169 case RTM_NEWADDR:
Feng Lu758fb8f2014-07-03 18:23:09 +08001170 return netlink_interface_addr (snl, h, vrf_id);
paul718e3742002-12-13 20:15:29 +00001171 break;
1172 case RTM_DELADDR:
Feng Lu758fb8f2014-07-03 18:23:09 +08001173 return netlink_interface_addr (snl, h, vrf_id);
paul718e3742002-12-13 20:15:29 +00001174 break;
1175 default:
Feng Lu758fb8f2014-07-03 18:23:09 +08001176 zlog_warn ("Unknown netlink nlmsg_type %d vrf %u\n", h->nlmsg_type,
1177 vrf_id);
paul718e3742002-12-13 20:15:29 +00001178 break;
1179 }
1180 return 0;
1181}
1182
1183/* Interface lookup by netlink socket. */
1184int
Feng Lu758fb8f2014-07-03 18:23:09 +08001185interface_lookup_netlink (struct zebra_vrf *zvrf)
paul718e3742002-12-13 20:15:29 +00001186{
1187 int ret;
paul7021c422003-07-15 12:52:22 +00001188
paul718e3742002-12-13 20:15:29 +00001189 /* Get interface information. */
Feng Lu758fb8f2014-07-03 18:23:09 +08001190 ret = netlink_request (AF_PACKET, RTM_GETLINK, &zvrf->netlink_cmd);
paul718e3742002-12-13 20:15:29 +00001191 if (ret < 0)
1192 return ret;
Feng Lu758fb8f2014-07-03 18:23:09 +08001193 ret = netlink_parse_info (netlink_interface, &zvrf->netlink_cmd, zvrf);
paul718e3742002-12-13 20:15:29 +00001194 if (ret < 0)
1195 return ret;
1196
1197 /* Get IPv4 address of the interfaces. */
Feng Lu758fb8f2014-07-03 18:23:09 +08001198 ret = netlink_request (AF_INET, RTM_GETADDR, &zvrf->netlink_cmd);
paul718e3742002-12-13 20:15:29 +00001199 if (ret < 0)
1200 return ret;
Feng Lu758fb8f2014-07-03 18:23:09 +08001201 ret = netlink_parse_info (netlink_interface_addr, &zvrf->netlink_cmd, zvrf);
paul718e3742002-12-13 20:15:29 +00001202 if (ret < 0)
1203 return ret;
1204
1205#ifdef HAVE_IPV6
1206 /* Get IPv6 address of the interfaces. */
Feng Lu758fb8f2014-07-03 18:23:09 +08001207 ret = netlink_request (AF_INET6, RTM_GETADDR, &zvrf->netlink_cmd);
paul718e3742002-12-13 20:15:29 +00001208 if (ret < 0)
1209 return ret;
Feng Lu758fb8f2014-07-03 18:23:09 +08001210 ret = netlink_parse_info (netlink_interface_addr, &zvrf->netlink_cmd, zvrf);
paul718e3742002-12-13 20:15:29 +00001211 if (ret < 0)
1212 return ret;
1213#endif /* HAVE_IPV6 */
1214
1215 return 0;
1216}
1217
1218/* Routing table read function using netlink interface. Only called
1219 bootstrap time. */
1220int
Feng Lu758fb8f2014-07-03 18:23:09 +08001221netlink_route_read (struct zebra_vrf *zvrf)
paul718e3742002-12-13 20:15:29 +00001222{
1223 int ret;
paul7021c422003-07-15 12:52:22 +00001224
paul718e3742002-12-13 20:15:29 +00001225 /* Get IPv4 routing table. */
Feng Lu758fb8f2014-07-03 18:23:09 +08001226 ret = netlink_request (AF_INET, RTM_GETROUTE, &zvrf->netlink_cmd);
paul718e3742002-12-13 20:15:29 +00001227 if (ret < 0)
1228 return ret;
Feng Lu758fb8f2014-07-03 18:23:09 +08001229 ret = netlink_parse_info (netlink_routing_table, &zvrf->netlink_cmd, zvrf);
paul718e3742002-12-13 20:15:29 +00001230 if (ret < 0)
1231 return ret;
1232
1233#ifdef HAVE_IPV6
1234 /* Get IPv6 routing table. */
Feng Lu758fb8f2014-07-03 18:23:09 +08001235 ret = netlink_request (AF_INET6, RTM_GETROUTE, &zvrf->netlink_cmd);
paul718e3742002-12-13 20:15:29 +00001236 if (ret < 0)
1237 return ret;
Feng Lu758fb8f2014-07-03 18:23:09 +08001238 ret = netlink_parse_info (netlink_routing_table, &zvrf->netlink_cmd, zvrf);
paul718e3742002-12-13 20:15:29 +00001239 if (ret < 0)
1240 return ret;
1241#endif /* HAVE_IPV6 */
1242
1243 return 0;
1244}
1245
1246/* Utility function comes from iproute2.
1247 Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru> */
Avneesh Sachdev78deec42012-11-13 22:48:56 +00001248int
Paul Jakma7aa9dce2014-09-19 14:42:23 +01001249addattr_l (struct nlmsghdr *n, size_t maxlen, int type, void *data, int alen)
paul718e3742002-12-13 20:15:29 +00001250{
Paul Jakma7aa9dce2014-09-19 14:42:23 +01001251 size_t len;
paul718e3742002-12-13 20:15:29 +00001252 struct rtattr *rta;
1253
paul7021c422003-07-15 12:52:22 +00001254 len = RTA_LENGTH (alen);
paul718e3742002-12-13 20:15:29 +00001255
paul7021c422003-07-15 12:52:22 +00001256 if (NLMSG_ALIGN (n->nlmsg_len) + len > maxlen)
paul718e3742002-12-13 20:15:29 +00001257 return -1;
1258
paul7021c422003-07-15 12:52:22 +00001259 rta = (struct rtattr *) (((char *) n) + NLMSG_ALIGN (n->nlmsg_len));
paul718e3742002-12-13 20:15:29 +00001260 rta->rta_type = type;
1261 rta->rta_len = len;
paul7021c422003-07-15 12:52:22 +00001262 memcpy (RTA_DATA (rta), data, alen);
paul718e3742002-12-13 20:15:29 +00001263 n->nlmsg_len = NLMSG_ALIGN (n->nlmsg_len) + len;
1264
1265 return 0;
1266}
1267
Avneesh Sachdev78deec42012-11-13 22:48:56 +00001268int
paul718e3742002-12-13 20:15:29 +00001269rta_addattr_l (struct rtattr *rta, int maxlen, int type, void *data, int alen)
1270{
1271 int len;
1272 struct rtattr *subrta;
1273
paul7021c422003-07-15 12:52:22 +00001274 len = RTA_LENGTH (alen);
paul718e3742002-12-13 20:15:29 +00001275
paul7021c422003-07-15 12:52:22 +00001276 if (RTA_ALIGN (rta->rta_len) + len > maxlen)
paul718e3742002-12-13 20:15:29 +00001277 return -1;
1278
paul7021c422003-07-15 12:52:22 +00001279 subrta = (struct rtattr *) (((char *) rta) + RTA_ALIGN (rta->rta_len));
paul718e3742002-12-13 20:15:29 +00001280 subrta->rta_type = type;
1281 subrta->rta_len = len;
paul7021c422003-07-15 12:52:22 +00001282 memcpy (RTA_DATA (subrta), data, alen);
paul718e3742002-12-13 20:15:29 +00001283 rta->rta_len = NLMSG_ALIGN (rta->rta_len) + len;
1284
1285 return 0;
1286}
1287
1288/* Utility function comes from iproute2.
1289 Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru> */
Avneesh Sachdev78deec42012-11-13 22:48:56 +00001290int
Paul Jakma7aa9dce2014-09-19 14:42:23 +01001291addattr32 (struct nlmsghdr *n, size_t maxlen, int type, int data)
paul718e3742002-12-13 20:15:29 +00001292{
Paul Jakma7aa9dce2014-09-19 14:42:23 +01001293 size_t len;
paul718e3742002-12-13 20:15:29 +00001294 struct rtattr *rta;
paul7021c422003-07-15 12:52:22 +00001295
1296 len = RTA_LENGTH (4);
1297
paul718e3742002-12-13 20:15:29 +00001298 if (NLMSG_ALIGN (n->nlmsg_len) + len > maxlen)
1299 return -1;
1300
paul7021c422003-07-15 12:52:22 +00001301 rta = (struct rtattr *) (((char *) n) + NLMSG_ALIGN (n->nlmsg_len));
paul718e3742002-12-13 20:15:29 +00001302 rta->rta_type = type;
1303 rta->rta_len = len;
paul7021c422003-07-15 12:52:22 +00001304 memcpy (RTA_DATA (rta), &data, 4);
paul718e3742002-12-13 20:15:29 +00001305 n->nlmsg_len = NLMSG_ALIGN (n->nlmsg_len) + len;
1306
1307 return 0;
1308}
1309
1310static int
Feng Lu758fb8f2014-07-03 18:23:09 +08001311netlink_talk_filter (struct sockaddr_nl *snl, struct nlmsghdr *h,
1312 vrf_id_t vrf_id)
paul718e3742002-12-13 20:15:29 +00001313{
Feng Lu758fb8f2014-07-03 18:23:09 +08001314 zlog_warn ("netlink_talk: ignoring message type 0x%04x vrf %u", h->nlmsg_type,
1315 vrf_id);
paul718e3742002-12-13 20:15:29 +00001316 return 0;
1317}
1318
1319/* sendmsg() to netlink socket then recvmsg(). */
Stephen Hemminger6072b242008-08-14 16:52:26 +01001320static int
Feng Lu758fb8f2014-07-03 18:23:09 +08001321netlink_talk (struct nlmsghdr *n, struct nlsock *nl, struct zebra_vrf *zvrf)
paul718e3742002-12-13 20:15:29 +00001322{
1323 int status;
1324 struct sockaddr_nl snl;
Timo Teräsc299ed72014-07-29 09:41:55 +00001325 struct iovec iov = {
1326 .iov_base = (void *) n,
1327 .iov_len = n->nlmsg_len
1328 };
1329 struct msghdr msg = {
1330 .msg_name = (void *) &snl,
1331 .msg_namelen = sizeof snl,
1332 .msg_iov = &iov,
1333 .msg_iovlen = 1,
1334 };
ajs4be019d2005-01-29 16:12:41 +00001335 int save_errno;
paul7021c422003-07-15 12:52:22 +00001336
paul718e3742002-12-13 20:15:29 +00001337 memset (&snl, 0, sizeof snl);
1338 snl.nl_family = AF_NETLINK;
paul7021c422003-07-15 12:52:22 +00001339
hassob7ed1ec2005-03-31 20:13:49 +00001340 n->nlmsg_seq = ++nl->seq;
paul718e3742002-12-13 20:15:29 +00001341
1342 /* Request an acknowledgement by setting NLM_F_ACK */
1343 n->nlmsg_flags |= NLM_F_ACK;
paul7021c422003-07-15 12:52:22 +00001344
1345 if (IS_ZEBRA_DEBUG_KERNEL)
hassob7ed1ec2005-03-31 20:13:49 +00001346 zlog_debug ("netlink_talk: %s type %s(%u), seq=%u", nl->name,
paul7021c422003-07-15 12:52:22 +00001347 lookup (nlmsg_str, n->nlmsg_type), n->nlmsg_type,
1348 n->nlmsg_seq);
paul718e3742002-12-13 20:15:29 +00001349
1350 /* Send message to netlink interface. */
paul7021c422003-07-15 12:52:22 +00001351 if (zserv_privs.change (ZPRIVS_RAISE))
1352 zlog (NULL, LOG_ERR, "Can't raise privileges");
paul718e3742002-12-13 20:15:29 +00001353 status = sendmsg (nl->sock, &msg, 0);
ajs4be019d2005-01-29 16:12:41 +00001354 save_errno = errno;
paul7021c422003-07-15 12:52:22 +00001355 if (zserv_privs.change (ZPRIVS_LOWER))
1356 zlog (NULL, LOG_ERR, "Can't lower privileges");
1357
paul718e3742002-12-13 20:15:29 +00001358 if (status < 0)
1359 {
1360 zlog (NULL, LOG_ERR, "netlink_talk sendmsg() error: %s",
ajs4be019d2005-01-29 16:12:41 +00001361 safe_strerror (save_errno));
paul718e3742002-12-13 20:15:29 +00001362 return -1;
1363 }
paul7021c422003-07-15 12:52:22 +00001364
paul718e3742002-12-13 20:15:29 +00001365
1366 /*
1367 * Get reply from netlink socket.
1368 * The reply should either be an acknowlegement or an error.
1369 */
Feng Lu758fb8f2014-07-03 18:23:09 +08001370 return netlink_parse_info (netlink_talk_filter, nl, zvrf);
paul718e3742002-12-13 20:15:29 +00001371}
1372
Christian Frankefa713d92013-07-05 15:35:37 +00001373/* This function takes a nexthop as argument and adds
1374 * the appropriate netlink attributes to an existing
1375 * netlink message.
1376 *
1377 * @param routedesc: Human readable description of route type
1378 * (direct/recursive, single-/multipath)
1379 * @param bytelen: Length of addresses in bytes.
1380 * @param nexthop: Nexthop information
1381 * @param nlmsg: nlmsghdr structure to fill in.
1382 * @param req_size: The size allocated for the message.
1383 */
1384static void
1385_netlink_route_build_singlepath(
1386 const char *routedesc,
1387 int bytelen,
1388 struct nexthop *nexthop,
1389 struct nlmsghdr *nlmsg,
Christian Frankee8d3d292013-07-05 15:35:39 +00001390 struct rtmsg *rtmsg,
Christian Frankefa713d92013-07-05 15:35:37 +00001391 size_t req_size)
1392{
Christian Frankee8d3d292013-07-05 15:35:39 +00001393 if (CHECK_FLAG (nexthop->flags, NEXTHOP_FLAG_ONLINK))
1394 rtmsg->rtm_flags |= RTNH_F_ONLINK;
Christian Frankefa713d92013-07-05 15:35:37 +00001395 if (nexthop->type == NEXTHOP_TYPE_IPV4
1396 || nexthop->type == NEXTHOP_TYPE_IPV4_IFINDEX)
1397 {
1398 addattr_l (nlmsg, req_size, RTA_GATEWAY,
1399 &nexthop->gate.ipv4, bytelen);
1400 if (nexthop->src.ipv4.s_addr)
1401 addattr_l (nlmsg, req_size, RTA_PREFSRC,
1402 &nexthop->src.ipv4, bytelen);
1403
1404 if (IS_ZEBRA_DEBUG_KERNEL)
1405 zlog_debug("netlink_route_multipath() (%s): "
1406 "nexthop via %s if %u",
1407 routedesc,
1408 inet_ntoa (nexthop->gate.ipv4),
1409 nexthop->ifindex);
1410 }
1411#ifdef HAVE_IPV6
1412 if (nexthop->type == NEXTHOP_TYPE_IPV6
1413 || nexthop->type == NEXTHOP_TYPE_IPV6_IFNAME
1414 || nexthop->type == NEXTHOP_TYPE_IPV6_IFINDEX)
1415 {
1416 addattr_l (nlmsg, req_size, RTA_GATEWAY,
1417 &nexthop->gate.ipv6, bytelen);
1418
1419 if (IS_ZEBRA_DEBUG_KERNEL)
1420 zlog_debug("netlink_route_multipath() (%s): "
1421 "nexthop via %s if %u",
1422 routedesc,
1423 inet6_ntoa (nexthop->gate.ipv6),
1424 nexthop->ifindex);
1425 }
1426#endif /* HAVE_IPV6 */
1427 if (nexthop->type == NEXTHOP_TYPE_IFINDEX
1428 || nexthop->type == NEXTHOP_TYPE_IFNAME
1429 || nexthop->type == NEXTHOP_TYPE_IPV4_IFINDEX)
1430 {
1431 addattr32 (nlmsg, req_size, RTA_OIF, nexthop->ifindex);
1432
1433 if (nexthop->src.ipv4.s_addr)
1434 addattr_l (nlmsg, req_size, RTA_PREFSRC,
1435 &nexthop->src.ipv4, bytelen);
1436
1437 if (IS_ZEBRA_DEBUG_KERNEL)
1438 zlog_debug("netlink_route_multipath() (%s): "
1439 "nexthop via if %u", routedesc, nexthop->ifindex);
1440 }
1441
1442 if (nexthop->type == NEXTHOP_TYPE_IPV6_IFINDEX
1443 || nexthop->type == NEXTHOP_TYPE_IPV6_IFNAME)
1444 {
1445 addattr32 (nlmsg, req_size, RTA_OIF, nexthop->ifindex);
1446
1447 if (IS_ZEBRA_DEBUG_KERNEL)
1448 zlog_debug("netlink_route_multipath() (%s): "
1449 "nexthop via if %u", routedesc, nexthop->ifindex);
1450 }
1451}
1452
1453/* This function takes a nexthop as argument and
1454 * appends to the given rtattr/rtnexthop pair the
1455 * representation of the nexthop. If the nexthop
1456 * defines a preferred source, the src parameter
1457 * will be modified to point to that src, otherwise
1458 * it will be kept unmodified.
1459 *
1460 * @param routedesc: Human readable description of route type
1461 * (direct/recursive, single-/multipath)
1462 * @param bytelen: Length of addresses in bytes.
1463 * @param nexthop: Nexthop information
1464 * @param rta: rtnetlink attribute structure
1465 * @param rtnh: pointer to an rtnetlink nexthop structure
1466 * @param src: pointer pointing to a location where
1467 * the prefsrc should be stored.
1468 */
1469static void
1470_netlink_route_build_multipath(
1471 const char *routedesc,
1472 int bytelen,
1473 struct nexthop *nexthop,
1474 struct rtattr *rta,
1475 struct rtnexthop *rtnh,
1476 union g_addr **src
1477 )
1478{
1479 rtnh->rtnh_len = sizeof (*rtnh);
1480 rtnh->rtnh_flags = 0;
1481 rtnh->rtnh_hops = 0;
1482 rta->rta_len += rtnh->rtnh_len;
1483
Christian Frankee8d3d292013-07-05 15:35:39 +00001484 if (CHECK_FLAG (nexthop->flags, NEXTHOP_FLAG_ONLINK))
1485 rtnh->rtnh_flags |= RTNH_F_ONLINK;
1486
Christian Frankefa713d92013-07-05 15:35:37 +00001487 if (nexthop->type == NEXTHOP_TYPE_IPV4
1488 || nexthop->type == NEXTHOP_TYPE_IPV4_IFINDEX)
1489 {
1490 rta_addattr_l (rta, NL_PKT_BUF_SIZE, RTA_GATEWAY,
1491 &nexthop->gate.ipv4, bytelen);
Lu Feng621e2aa2014-07-11 07:52:15 +00001492 rtnh->rtnh_len += sizeof (struct rtattr) + bytelen;
Christian Frankefa713d92013-07-05 15:35:37 +00001493
1494 if (nexthop->src.ipv4.s_addr)
1495 *src = &nexthop->src;
1496
1497 if (IS_ZEBRA_DEBUG_KERNEL)
1498 zlog_debug("netlink_route_multipath() (%s): "
1499 "nexthop via %s if %u",
1500 routedesc,
1501 inet_ntoa (nexthop->gate.ipv4),
1502 nexthop->ifindex);
1503 }
1504#ifdef HAVE_IPV6
1505 if (nexthop->type == NEXTHOP_TYPE_IPV6
1506 || nexthop->type == NEXTHOP_TYPE_IPV6_IFNAME
1507 || nexthop->type == NEXTHOP_TYPE_IPV6_IFINDEX)
1508 {
1509 rta_addattr_l (rta, NL_PKT_BUF_SIZE, RTA_GATEWAY,
1510 &nexthop->gate.ipv6, bytelen);
Lu Feng621e2aa2014-07-11 07:52:15 +00001511 rtnh->rtnh_len += sizeof (struct rtattr) + bytelen;
Christian Frankefa713d92013-07-05 15:35:37 +00001512
1513 if (IS_ZEBRA_DEBUG_KERNEL)
1514 zlog_debug("netlink_route_multipath() (%s): "
1515 "nexthop via %s if %u",
1516 routedesc,
1517 inet6_ntoa (nexthop->gate.ipv6),
1518 nexthop->ifindex);
1519 }
1520#endif /* HAVE_IPV6 */
1521 /* ifindex */
1522 if (nexthop->type == NEXTHOP_TYPE_IPV4_IFINDEX
1523 || nexthop->type == NEXTHOP_TYPE_IFINDEX
1524 || nexthop->type == NEXTHOP_TYPE_IFNAME)
1525 {
1526 rtnh->rtnh_ifindex = nexthop->ifindex;
1527 if (nexthop->src.ipv4.s_addr)
1528 *src = &nexthop->src;
1529 if (IS_ZEBRA_DEBUG_KERNEL)
1530 zlog_debug("netlink_route_multipath() (%s): "
1531 "nexthop via if %u", routedesc, nexthop->ifindex);
1532 }
1533 else if (nexthop->type == NEXTHOP_TYPE_IPV6_IFNAME
1534 || nexthop->type == NEXTHOP_TYPE_IPV6_IFINDEX)
1535 {
1536 rtnh->rtnh_ifindex = nexthop->ifindex;
1537
1538 if (IS_ZEBRA_DEBUG_KERNEL)
1539 zlog_debug("netlink_route_multipath() (%s): "
1540 "nexthop via if %u", routedesc, nexthop->ifindex);
1541 }
1542 else
1543 {
1544 rtnh->rtnh_ifindex = 0;
1545 }
1546}
1547
1548/* Log debug information for netlink_route_multipath
1549 * if debug logging is enabled.
1550 *
1551 * @param cmd: Netlink command which is to be processed
1552 * @param p: Prefix for which the change is due
1553 * @param nexthop: Nexthop which is currently processed
1554 * @param routedesc: Semantic annotation for nexthop
1555 * (recursive, multipath, etc.)
1556 * @param family: Address family which the change concerns
1557 */
1558static void
1559_netlink_route_debug(
1560 int cmd,
1561 struct prefix *p,
1562 struct nexthop *nexthop,
1563 const char *routedesc,
Feng Lu758fb8f2014-07-03 18:23:09 +08001564 int family,
1565 struct zebra_vrf *zvrf)
Christian Frankefa713d92013-07-05 15:35:37 +00001566{
1567 if (IS_ZEBRA_DEBUG_KERNEL)
1568 {
Timo Teräsbe6335d2015-05-23 11:08:41 +03001569 char buf[PREFIX_STRLEN];
Feng Lu758fb8f2014-07-03 18:23:09 +08001570 zlog_debug ("netlink_route_multipath() (%s): %s %s vrf %u type %s",
Christian Frankefa713d92013-07-05 15:35:37 +00001571 routedesc,
1572 lookup (nlmsg_str, cmd),
Timo Teräsbe6335d2015-05-23 11:08:41 +03001573 prefix2str (p, buf, sizeof(buf)),
1574 nexthop_type_to_str (nexthop->type));
Christian Frankefa713d92013-07-05 15:35:37 +00001575 }
1576}
1577
paul718e3742002-12-13 20:15:29 +00001578/* Routing table change via netlink interface. */
Stephen Hemminger6072b242008-08-14 16:52:26 +01001579static int
paul718e3742002-12-13 20:15:29 +00001580netlink_route_multipath (int cmd, struct prefix *p, struct rib *rib,
paul7021c422003-07-15 12:52:22 +00001581 int family)
paul718e3742002-12-13 20:15:29 +00001582{
1583 int bytelen;
1584 struct sockaddr_nl snl;
Christian Frankefa713d92013-07-05 15:35:37 +00001585 struct nexthop *nexthop = NULL, *tnexthop;
1586 int recursing;
1587 int nexthop_num;
paul718e3742002-12-13 20:15:29 +00001588 int discard;
Christian Frankefa713d92013-07-05 15:35:37 +00001589 const char *routedesc;
paul718e3742002-12-13 20:15:29 +00001590
paul7021c422003-07-15 12:52:22 +00001591 struct
paul718e3742002-12-13 20:15:29 +00001592 {
1593 struct nlmsghdr n;
1594 struct rtmsg r;
JR Rivers3cadc0c2012-04-01 12:16:31 -07001595 char buf[NL_PKT_BUF_SIZE];
paul718e3742002-12-13 20:15:29 +00001596 } req;
1597
Feng Lu758fb8f2014-07-03 18:23:09 +08001598 struct zebra_vrf *zvrf = vrf_info_lookup (rib->vrf_id);
1599
Jorge Boncompte [DTI2]a4c06de2012-04-20 14:28:40 +02001600 memset (&req, 0, sizeof req - NL_PKT_BUF_SIZE);
paul718e3742002-12-13 20:15:29 +00001601
1602 bytelen = (family == AF_INET ? 4 : 16);
1603
1604 req.n.nlmsg_len = NLMSG_LENGTH (sizeof (struct rtmsg));
1605 req.n.nlmsg_flags = NLM_F_CREATE | NLM_F_REQUEST;
1606 req.n.nlmsg_type = cmd;
1607 req.r.rtm_family = family;
1608 req.r.rtm_table = rib->table;
1609 req.r.rtm_dst_len = p->prefixlen;
Timo Teräs40da2212008-08-13 17:37:14 +01001610 req.r.rtm_protocol = RTPROT_ZEBRA;
1611 req.r.rtm_scope = RT_SCOPE_UNIVERSE;
paul718e3742002-12-13 20:15:29 +00001612
paul7021c422003-07-15 12:52:22 +00001613 if ((rib->flags & ZEBRA_FLAG_BLACKHOLE) || (rib->flags & ZEBRA_FLAG_REJECT))
paul718e3742002-12-13 20:15:29 +00001614 discard = 1;
1615 else
1616 discard = 0;
1617
paul7021c422003-07-15 12:52:22 +00001618 if (cmd == RTM_NEWROUTE)
paul718e3742002-12-13 20:15:29 +00001619 {
paul7021c422003-07-15 12:52:22 +00001620 if (discard)
paul595db7f2003-05-25 21:35:06 +00001621 {
1622 if (rib->flags & ZEBRA_FLAG_BLACKHOLE)
1623 req.r.rtm_type = RTN_BLACKHOLE;
1624 else if (rib->flags & ZEBRA_FLAG_REJECT)
1625 req.r.rtm_type = RTN_UNREACHABLE;
paul7021c422003-07-15 12:52:22 +00001626 else
1627 assert (RTN_BLACKHOLE != RTN_UNREACHABLE); /* false */
1628 }
paul595db7f2003-05-25 21:35:06 +00001629 else
paul7021c422003-07-15 12:52:22 +00001630 req.r.rtm_type = RTN_UNICAST;
paul718e3742002-12-13 20:15:29 +00001631 }
1632
1633 addattr_l (&req.n, sizeof req, RTA_DST, &p->u.prefix, bytelen);
1634
1635 /* Metric. */
1636 addattr32 (&req.n, sizeof req, RTA_PRIORITY, rib->metric);
1637
1638 if (discard)
1639 {
1640 if (cmd == RTM_NEWROUTE)
Christian Frankefa713d92013-07-05 15:35:37 +00001641 for (ALL_NEXTHOPS_RO(rib->nexthop, nexthop, tnexthop, recursing))
1642 {
1643 /* We shouldn't encounter recursive nexthops on discard routes,
1644 * but it is probably better to handle that case correctly anyway.
1645 */
1646 if (CHECK_FLAG(nexthop->flags, NEXTHOP_FLAG_RECURSIVE))
1647 continue;
1648 SET_FLAG (nexthop->flags, NEXTHOP_FLAG_FIB);
1649 }
paul718e3742002-12-13 20:15:29 +00001650 goto skip;
1651 }
1652
Christian Frankefa713d92013-07-05 15:35:37 +00001653 /* Count overall nexthops so we can decide whether to use singlepath
1654 * or multipath case. */
1655 nexthop_num = 0;
1656 for (ALL_NEXTHOPS_RO(rib->nexthop, nexthop, tnexthop, recursing))
paul718e3742002-12-13 20:15:29 +00001657 {
Christian Frankefa713d92013-07-05 15:35:37 +00001658 if (CHECK_FLAG (nexthop->flags, NEXTHOP_FLAG_RECURSIVE))
1659 continue;
1660 if (cmd == RTM_NEWROUTE && !CHECK_FLAG(nexthop->flags, NEXTHOP_FLAG_ACTIVE))
1661 continue;
1662 if (cmd == RTM_DELROUTE && !CHECK_FLAG (nexthop->flags, NEXTHOP_FLAG_FIB))
1663 continue;
1664
1665 nexthop_num++;
1666 }
1667
1668 /* Singlepath case. */
1669 if (nexthop_num == 1 || MULTIPATH_NUM == 1)
1670 {
1671 nexthop_num = 0;
1672 for (ALL_NEXTHOPS_RO(rib->nexthop, nexthop, tnexthop, recursing))
paul7021c422003-07-15 12:52:22 +00001673 {
Christian Frankefa713d92013-07-05 15:35:37 +00001674 if (CHECK_FLAG (nexthop->flags, NEXTHOP_FLAG_RECURSIVE))
1675 continue;
paul5ec90d22003-06-19 01:41:37 +00001676
paul7021c422003-07-15 12:52:22 +00001677 if ((cmd == RTM_NEWROUTE
1678 && CHECK_FLAG (nexthop->flags, NEXTHOP_FLAG_ACTIVE))
1679 || (cmd == RTM_DELROUTE
1680 && CHECK_FLAG (nexthop->flags, NEXTHOP_FLAG_FIB)))
1681 {
Christian Frankefa713d92013-07-05 15:35:37 +00001682 routedesc = recursing ? "recursive, 1 hop" : "single hop";
paul5ec90d22003-06-19 01:41:37 +00001683
Feng Lu758fb8f2014-07-03 18:23:09 +08001684 _netlink_route_debug(cmd, p, nexthop, routedesc, family, zvrf);
Christian Frankefa713d92013-07-05 15:35:37 +00001685 _netlink_route_build_singlepath(routedesc, bytelen,
Christian Frankee8d3d292013-07-05 15:35:39 +00001686 nexthop, &req.n, &req.r,
1687 sizeof req);
paul718e3742002-12-13 20:15:29 +00001688
paul7021c422003-07-15 12:52:22 +00001689 if (cmd == RTM_NEWROUTE)
1690 SET_FLAG (nexthop->flags, NEXTHOP_FLAG_FIB);
paul718e3742002-12-13 20:15:29 +00001691
paul7021c422003-07-15 12:52:22 +00001692 nexthop_num++;
1693 break;
1694 }
1695 }
paul718e3742002-12-13 20:15:29 +00001696 }
1697 else
1698 {
JR Rivers3cadc0c2012-04-01 12:16:31 -07001699 char buf[NL_PKT_BUF_SIZE];
paul718e3742002-12-13 20:15:29 +00001700 struct rtattr *rta = (void *) buf;
1701 struct rtnexthop *rtnh;
Paul Jakma7514fb72007-05-02 16:05:35 +00001702 union g_addr *src = NULL;
paul718e3742002-12-13 20:15:29 +00001703
1704 rta->rta_type = RTA_MULTIPATH;
paul7021c422003-07-15 12:52:22 +00001705 rta->rta_len = RTA_LENGTH (0);
1706 rtnh = RTA_DATA (rta);
paul718e3742002-12-13 20:15:29 +00001707
1708 nexthop_num = 0;
Christian Frankefa713d92013-07-05 15:35:37 +00001709 for (ALL_NEXTHOPS_RO(rib->nexthop, nexthop, tnexthop, recursing))
paul7021c422003-07-15 12:52:22 +00001710 {
Christian Frankefa713d92013-07-05 15:35:37 +00001711 if (MULTIPATH_NUM != 0 && nexthop_num >= MULTIPATH_NUM)
1712 break;
1713
1714 if (CHECK_FLAG(nexthop->flags, NEXTHOP_FLAG_RECURSIVE))
1715 continue;
1716
paul7021c422003-07-15 12:52:22 +00001717 if ((cmd == RTM_NEWROUTE
1718 && CHECK_FLAG (nexthop->flags, NEXTHOP_FLAG_ACTIVE))
1719 || (cmd == RTM_DELROUTE
1720 && CHECK_FLAG (nexthop->flags, NEXTHOP_FLAG_FIB)))
1721 {
Christian Frankefa713d92013-07-05 15:35:37 +00001722 routedesc = recursing ? "recursive, multihop" : "multihop";
paul7021c422003-07-15 12:52:22 +00001723 nexthop_num++;
paul718e3742002-12-13 20:15:29 +00001724
Christian Frankefa713d92013-07-05 15:35:37 +00001725 _netlink_route_debug(cmd, p, nexthop,
Feng Lu758fb8f2014-07-03 18:23:09 +08001726 routedesc, family, zvrf);
Christian Frankefa713d92013-07-05 15:35:37 +00001727 _netlink_route_build_multipath(routedesc, bytelen,
1728 nexthop, rta, rtnh, &src);
paul7021c422003-07-15 12:52:22 +00001729 rtnh = RTNH_NEXT (rtnh);
paul718e3742002-12-13 20:15:29 +00001730
paul7021c422003-07-15 12:52:22 +00001731 if (cmd == RTM_NEWROUTE)
1732 SET_FLAG (nexthop->flags, NEXTHOP_FLAG_FIB);
1733 }
1734 }
Paul Jakma7514fb72007-05-02 16:05:35 +00001735 if (src)
1736 addattr_l (&req.n, sizeof req, RTA_PREFSRC, &src->ipv4, bytelen);
paul718e3742002-12-13 20:15:29 +00001737
1738 if (rta->rta_len > RTA_LENGTH (0))
JR Rivers3cadc0c2012-04-01 12:16:31 -07001739 addattr_l (&req.n, NL_PKT_BUF_SIZE, RTA_MULTIPATH, RTA_DATA (rta),
paul7021c422003-07-15 12:52:22 +00001740 RTA_PAYLOAD (rta));
paul718e3742002-12-13 20:15:29 +00001741 }
1742
1743 /* If there is no useful nexthop then return. */
1744 if (nexthop_num == 0)
1745 {
1746 if (IS_ZEBRA_DEBUG_KERNEL)
ajsb6178002004-12-07 21:12:56 +00001747 zlog_debug ("netlink_route_multipath(): No useful nexthop.");
paul718e3742002-12-13 20:15:29 +00001748 return 0;
1749 }
1750
paul7021c422003-07-15 12:52:22 +00001751skip:
paul718e3742002-12-13 20:15:29 +00001752
1753 /* Destination netlink address. */
1754 memset (&snl, 0, sizeof snl);
1755 snl.nl_family = AF_NETLINK;
1756
paul718e3742002-12-13 20:15:29 +00001757 /* Talk to netlink socket. */
Feng Lu758fb8f2014-07-03 18:23:09 +08001758 return netlink_talk (&req.n, &zvrf->netlink_cmd, zvrf);
paul718e3742002-12-13 20:15:29 +00001759}
1760
1761int
1762kernel_add_ipv4 (struct prefix *p, struct rib *rib)
1763{
1764 return netlink_route_multipath (RTM_NEWROUTE, p, rib, AF_INET);
1765}
1766
1767int
1768kernel_delete_ipv4 (struct prefix *p, struct rib *rib)
1769{
1770 return netlink_route_multipath (RTM_DELROUTE, p, rib, AF_INET);
1771}
1772
1773#ifdef HAVE_IPV6
1774int
1775kernel_add_ipv6 (struct prefix *p, struct rib *rib)
1776{
1777 return netlink_route_multipath (RTM_NEWROUTE, p, rib, AF_INET6);
1778}
1779
1780int
1781kernel_delete_ipv6 (struct prefix *p, struct rib *rib)
1782{
1783 return netlink_route_multipath (RTM_DELROUTE, p, rib, AF_INET6);
1784}
paul718e3742002-12-13 20:15:29 +00001785#endif /* HAVE_IPV6 */
David Lamparter6b0655a2014-06-04 06:53:35 +02001786
paul718e3742002-12-13 20:15:29 +00001787/* Interface address modification. */
Stephen Hemminger6072b242008-08-14 16:52:26 +01001788static int
paul718e3742002-12-13 20:15:29 +00001789netlink_address (int cmd, int family, struct interface *ifp,
paul7021c422003-07-15 12:52:22 +00001790 struct connected *ifc)
paul718e3742002-12-13 20:15:29 +00001791{
1792 int bytelen;
1793 struct prefix *p;
1794
paul7021c422003-07-15 12:52:22 +00001795 struct
paul718e3742002-12-13 20:15:29 +00001796 {
1797 struct nlmsghdr n;
1798 struct ifaddrmsg ifa;
JR Rivers3cadc0c2012-04-01 12:16:31 -07001799 char buf[NL_PKT_BUF_SIZE];
paul718e3742002-12-13 20:15:29 +00001800 } req;
1801
Feng Lu758fb8f2014-07-03 18:23:09 +08001802 struct zebra_vrf *zvrf = vrf_info_lookup (ifp->vrf_id);
1803
paul718e3742002-12-13 20:15:29 +00001804 p = ifc->address;
Jorge Boncompte [DTI2]a4c06de2012-04-20 14:28:40 +02001805 memset (&req, 0, sizeof req - NL_PKT_BUF_SIZE);
paul718e3742002-12-13 20:15:29 +00001806
1807 bytelen = (family == AF_INET ? 4 : 16);
1808
paul7021c422003-07-15 12:52:22 +00001809 req.n.nlmsg_len = NLMSG_LENGTH (sizeof (struct ifaddrmsg));
paul718e3742002-12-13 20:15:29 +00001810 req.n.nlmsg_flags = NLM_F_REQUEST;
1811 req.n.nlmsg_type = cmd;
1812 req.ifa.ifa_family = family;
1813
1814 req.ifa.ifa_index = ifp->ifindex;
1815 req.ifa.ifa_prefixlen = p->prefixlen;
1816
1817 addattr_l (&req.n, sizeof req, IFA_LOCAL, &p->u.prefix, bytelen);
1818
1819 if (family == AF_INET && cmd == RTM_NEWADDR)
1820 {
Andrew J. Schorre4529632006-12-12 19:18:21 +00001821 if (!CONNECTED_PEER(ifc) && ifc->destination)
paul7021c422003-07-15 12:52:22 +00001822 {
1823 p = ifc->destination;
1824 addattr_l (&req.n, sizeof req, IFA_BROADCAST, &p->u.prefix,
1825 bytelen);
1826 }
paul718e3742002-12-13 20:15:29 +00001827 }
1828
1829 if (CHECK_FLAG (ifc->flags, ZEBRA_IFA_SECONDARY))
1830 SET_FLAG (req.ifa.ifa_flags, IFA_F_SECONDARY);
paul7021c422003-07-15 12:52:22 +00001831
paul718e3742002-12-13 20:15:29 +00001832 if (ifc->label)
1833 addattr_l (&req.n, sizeof req, IFA_LABEL, ifc->label,
paul7021c422003-07-15 12:52:22 +00001834 strlen (ifc->label) + 1);
paul718e3742002-12-13 20:15:29 +00001835
Feng Lu758fb8f2014-07-03 18:23:09 +08001836 return netlink_talk (&req.n, &zvrf->netlink_cmd, zvrf);
paul718e3742002-12-13 20:15:29 +00001837}
1838
1839int
1840kernel_address_add_ipv4 (struct interface *ifp, struct connected *ifc)
1841{
1842 return netlink_address (RTM_NEWADDR, AF_INET, ifp, ifc);
1843}
1844
1845int
1846kernel_address_delete_ipv4 (struct interface *ifp, struct connected *ifc)
1847{
1848 return netlink_address (RTM_DELADDR, AF_INET, ifp, ifc);
1849}
1850
paul718e3742002-12-13 20:15:29 +00001851
1852extern struct thread_master *master;
1853
1854/* Kernel route reflection. */
Stephen Hemminger6072b242008-08-14 16:52:26 +01001855static int
paul718e3742002-12-13 20:15:29 +00001856kernel_read (struct thread *thread)
1857{
Feng Lu758fb8f2014-07-03 18:23:09 +08001858 struct zebra_vrf *zvrf = (struct zebra_vrf *)THREAD_ARG (thread);
1859 netlink_parse_info (netlink_information_fetch, &zvrf->netlink, zvrf);
1860 zvrf->t_netlink = thread_add_read (zebrad.master, kernel_read, zvrf,
1861 zvrf->netlink.sock);
paul718e3742002-12-13 20:15:29 +00001862
1863 return 0;
1864}
1865
Stephen Hemminger3d265b42008-08-16 17:30:39 +01001866/* Filter out messages from self that occur on listener socket,
1867 caused by our actions on the command socket
1868 */
1869static void netlink_install_filter (int sock, __u32 pid)
Paul Jakma768a27e2008-05-29 18:23:08 +00001870{
Paul Jakma768a27e2008-05-29 18:23:08 +00001871 struct sock_filter filter[] = {
Stephen Hemminger3d265b42008-08-16 17:30:39 +01001872 /* 0: ldh [4] */
1873 BPF_STMT(BPF_LD|BPF_ABS|BPF_H, offsetof(struct nlmsghdr, nlmsg_type)),
1874 /* 1: jeq 0x18 jt 3 jf 6 */
1875 BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, htons(RTM_NEWROUTE), 1, 0),
1876 /* 2: jeq 0x19 jt 3 jf 6 */
1877 BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, htons(RTM_DELROUTE), 0, 3),
1878 /* 3: ldw [12] */
1879 BPF_STMT(BPF_LD|BPF_ABS|BPF_W, offsetof(struct nlmsghdr, nlmsg_pid)),
1880 /* 4: jeq XX jt 5 jf 6 */
1881 BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, htonl(pid), 0, 1),
1882 /* 5: ret 0 (skip) */
1883 BPF_STMT(BPF_RET|BPF_K, 0),
1884 /* 6: ret 0xffff (keep) */
1885 BPF_STMT(BPF_RET|BPF_K, 0xffff),
Paul Jakma768a27e2008-05-29 18:23:08 +00001886 };
1887
1888 struct sock_fprog prog = {
Balaji.G837d16c2012-09-26 14:09:10 +05301889 .len = array_size(filter),
Paul Jakma768a27e2008-05-29 18:23:08 +00001890 .filter = filter,
1891 };
1892
1893 if (setsockopt(sock, SOL_SOCKET, SO_ATTACH_FILTER, &prog, sizeof(prog)) < 0)
1894 zlog_warn ("Can't install socket filter: %s\n", safe_strerror(errno));
1895}
1896
paul718e3742002-12-13 20:15:29 +00001897/* Exported interface function. This function simply calls
1898 netlink_socket (). */
1899void
Feng Lu758fb8f2014-07-03 18:23:09 +08001900kernel_init (struct zebra_vrf *zvrf)
paul718e3742002-12-13 20:15:29 +00001901{
1902 unsigned long groups;
1903
paul7021c422003-07-15 12:52:22 +00001904 groups = RTMGRP_LINK | RTMGRP_IPV4_ROUTE | RTMGRP_IPV4_IFADDR;
paul718e3742002-12-13 20:15:29 +00001905#ifdef HAVE_IPV6
paul7021c422003-07-15 12:52:22 +00001906 groups |= RTMGRP_IPV6_ROUTE | RTMGRP_IPV6_IFADDR;
paul718e3742002-12-13 20:15:29 +00001907#endif /* HAVE_IPV6 */
Feng Lu758fb8f2014-07-03 18:23:09 +08001908 netlink_socket (&zvrf->netlink, groups, zvrf->vrf_id);
1909 netlink_socket (&zvrf->netlink_cmd, 0, zvrf->vrf_id);
paul718e3742002-12-13 20:15:29 +00001910
1911 /* Register kernel socket. */
Feng Lu758fb8f2014-07-03 18:23:09 +08001912 if (zvrf->netlink.sock > 0)
Paul Jakma768a27e2008-05-29 18:23:08 +00001913 {
Stephen Hemminger4cde9312008-08-16 17:51:27 +01001914 /* Only want non-blocking on the netlink event socket */
Feng Lu758fb8f2014-07-03 18:23:09 +08001915 if (fcntl (zvrf->netlink.sock, F_SETFL, O_NONBLOCK) < 0)
1916 zlog_err ("Can't set %s socket flags: %s", zvrf->netlink.name,
1917 safe_strerror (errno));
Stephen Hemminger4cde9312008-08-16 17:51:27 +01001918
Stephen Hemminger30afea32008-08-16 18:25:47 +01001919 /* Set receive buffer size if it's set from command line */
1920 if (nl_rcvbufsize)
Feng Lu758fb8f2014-07-03 18:23:09 +08001921 netlink_recvbuf (&zvrf->netlink, nl_rcvbufsize);
Stephen Hemminger30afea32008-08-16 18:25:47 +01001922
Feng Lu758fb8f2014-07-03 18:23:09 +08001923 netlink_install_filter (zvrf->netlink.sock, zvrf->netlink_cmd.snl.nl_pid);
1924 zvrf->t_netlink = thread_add_read (zebrad.master, kernel_read, zvrf,
1925 zvrf->netlink.sock);
1926 }
1927}
1928
1929void
1930kernel_terminate (struct zebra_vrf *zvrf)
1931{
1932 THREAD_READ_OFF (zvrf->t_netlink);
1933
1934 if (zvrf->netlink.sock >= 0)
1935 {
1936 close (zvrf->netlink.sock);
1937 zvrf->netlink.sock = -1;
1938 }
1939
1940 if (zvrf->netlink_cmd.sock >= 0)
1941 {
1942 close (zvrf->netlink_cmd.sock);
1943 zvrf->netlink_cmd.sock = -1;
Paul Jakma768a27e2008-05-29 18:23:08 +00001944 }
paul718e3742002-12-13 20:15:29 +00001945}
Avneesh Sachdev78deec42012-11-13 22:48:56 +00001946
1947/*
1948 * nl_msg_type_to_str
1949 */
1950const char *
1951nl_msg_type_to_str (uint16_t msg_type)
1952{
1953 return lookup (nlmsg_str, msg_type);
1954}
1955
1956/*
1957 * nl_rtproto_to_str
1958 */
1959const char *
1960nl_rtproto_to_str (u_char rtproto)
1961{
1962 return lookup (rtproto_str, rtproto);
1963}