2 * BIRD -- BGP Attributes
4 * (c) 2000 Martin Mares <mj@ucw.cz>
6 * Can be freely distributed and used under the terms of the GNU GPL.
13 #include "nest/bird.h"
14 #include "nest/iface.h"
15 #include "nest/protocol.h"
16 #include "nest/route.h"
17 #include "nest/attrs.h"
18 #include "conf/conf.h"
19 #include "lib/resource.h"
20 #include "lib/string.h"
21 #include "lib/unaligned.h"
26 * UPDATE message error handling
28 * All checks from RFC 4271 6.3 are done as specified with these exceptions:
29 * - The semantic check of an IP address from NEXT_HOP attribute is missing.
30 * - Checks of some optional attribute values are missing.
31 * - Syntactic and semantic checks of NLRIs (done in DECODE_PREFIX())
32 * are probably inadequate.
34 * Loop detection based on AS_PATH causes updates to be withdrawn. RFC
35 * 4271 does not explicitly specifiy the behavior in that case.
37 * Loop detection related to route reflection (based on ORIGINATOR_ID
38 * and CLUSTER_LIST) causes updates to be withdrawn. RFC 4456 8
39 * specifies that such updates should be ignored, but that is generally
42 * Error checking of optional transitive attributes is done according to
43 * draft-ietf-idr-optional-transitive-03, but errors are handled always
46 * Unexpected AS_CONFED_* segments in AS_PATH are logged and removed,
47 * but unknown segments cause a session drop with Malformed AS_PATH
48 * error (see validate_path()). The behavior in such case is not
49 * explicitly specified by RFC 4271. RFC 5065 specifies that
50 * inconsistent AS_CONFED_* segments should cause a session drop, but
51 * implementations that pass invalid AS_CONFED_* segments are
54 * Error handling of AS4_* attributes is done as specified by
55 * draft-ietf-idr-rfc4893bis-03. There are several possible
56 * inconsistencies between AGGREGATOR and AS4_AGGREGATOR that are not
57 * handled by that draft, these are logged and ignored (see
58 * bgp_reconstruct_4b_attrs()).
61 static byte bgp_mandatory_attrs
[] = { BA_ORIGIN
, BA_AS_PATH
73 int (*validate
)(struct bgp_proto
*p
, byte
*attr
, int len
);
74 void (*format
)(eattr
*ea
, byte
*buf
, int buflen
);
81 bgp_check_origin(struct bgp_proto
*p UNUSED
, byte
*a
, int len UNUSED
)
89 bgp_format_origin(eattr
*a
, byte
*buf
, int buflen UNUSED
)
91 static char *bgp_origin_names
[] = { "IGP", "EGP", "Incomplete" };
93 bsprintf(buf
, bgp_origin_names
[a
->u
.data
]);
97 path_segment_contains(byte
*p
, int bs
, u32 asn
)
105 u32 asn2
= (bs
== 4) ? get_u32(p
) : get_u16(p
);
114 /* Validates path attribute, removes AS_CONFED_* segments, and also returns path length */
116 validate_path(struct bgp_proto
*p
, int as_path
, int bs
, byte
*idata
, unsigned int *ilength
)
130 plen
= 2 + bs
* a
[1];
141 case AS_PATH_SEQUENCE
:
146 case AS_PATH_CONFED_SEQUENCE
:
147 case AS_PATH_CONFED_SET
:
148 if (as_path
&& path_segment_contains(a
, bs
, p
->remote_as
))
150 log(L_WARN
"%s: AS_CONFED_* segment with peer ASN found, misconfigured confederation?", p
->p
.name
);
154 log(L_WARN
"%s: %s_PATH attribute contains AS_CONFED_* segment, skipping segment",
155 p
->p
.name
, as_path
? "AS" : "AS4");
166 memmove(dst
, a
, plen
);
174 *ilength
= dst
- idata
;
179 validate_as_path(struct bgp_proto
*p
, byte
*a
, int *len
)
181 return validate_path(p
, 1, p
->as4_session
? 4 : 2, a
, len
);
185 validate_as4_path(struct bgp_proto
*p
, struct adata
*path
)
187 return validate_path(p
, 0, 4, path
->data
, &path
->length
);
191 bgp_check_next_hop(struct bgp_proto
*p UNUSED
, byte
*a
, int len
)
198 memcpy(&addr
, a
, len
);
200 if (ipa_classify(addr
) & IADDR_HOST
)
208 bgp_format_next_hop(eattr
*a
, byte
*buf
, int buflen UNUSED
)
210 ip_addr
*ipp
= (ip_addr
*) a
->u
.ptr
->data
;
212 /* in IPv6, we might have two addresses in NEXT HOP */
213 if ((a
->u
.ptr
->length
== NEXT_HOP_LENGTH
) && ipa_nonzero(ipp
[1]))
215 bsprintf(buf
, "%I %I", ipp
[0], ipp
[1]);
220 bsprintf(buf
, "%I", ipp
[0]);
224 bgp_check_aggregator(struct bgp_proto
*p
, byte
*a UNUSED
, int len
)
226 int exp_len
= p
->as4_session
? 8 : 6;
228 return (len
== exp_len
) ? 0 : WITHDRAW
;
232 bgp_format_aggregator(eattr
*a
, byte
*buf
, int buflen UNUSED
)
234 struct adata
*ad
= a
->u
.ptr
;
235 byte
*data
= ad
->data
;
241 bsprintf(buf
, "%d.%d.%d.%d AS%d", data
[0], data
[1], data
[2], data
[3], as
);
245 bgp_check_community(struct bgp_proto
*p UNUSED
, byte
*a UNUSED
, int len
)
247 return ((len
% 4) == 0) ? 0 : WITHDRAW
;
252 bgp_check_cluster_list(struct bgp_proto
*p UNUSED
, byte
*a UNUSED
, int len
)
254 return ((len
% 4) == 0) ? 0 : 5;
258 bgp_format_cluster_list(eattr
*a
, byte
*buf
, int buflen UNUSED
)
260 int_set_format(a
->u
.ptr
, 0, buf
, buflen
);
264 bgp_check_reach_nlri(struct bgp_proto
*p UNUSED
, byte
*a UNUSED
, int len UNUSED
)
267 p
->mp_reach_start
= a
;
268 p
->mp_reach_len
= len
;
274 bgp_check_unreach_nlri(struct bgp_proto
*p UNUSED
, byte
*a UNUSED
, int len UNUSED
)
277 p
->mp_unreach_start
= a
;
278 p
->mp_unreach_len
= len
;
283 static struct attr_desc bgp_attr_table
[] = {
284 { NULL
, -1, 0, 0, 0, /* Undefined */
286 { "origin", 1, BAF_TRANSITIVE
, EAF_TYPE_INT
, 1, /* BA_ORIGIN */
287 bgp_check_origin
, bgp_format_origin
},
288 { "as_path", -1, BAF_TRANSITIVE
, EAF_TYPE_AS_PATH
, 1, /* BA_AS_PATH */
289 NULL
, NULL
}, /* is checked by validate_as_path() as a special case */
290 { "next_hop", 4, BAF_TRANSITIVE
, EAF_TYPE_IP_ADDRESS
, 1, /* BA_NEXT_HOP */
291 bgp_check_next_hop
, bgp_format_next_hop
},
292 { "med", 4, BAF_OPTIONAL
, EAF_TYPE_INT
, 1, /* BA_MULTI_EXIT_DISC */
294 { "local_pref", 4, BAF_TRANSITIVE
, EAF_TYPE_INT
, 0, /* BA_LOCAL_PREF */
296 { "atomic_aggr", 0, BAF_TRANSITIVE
, EAF_TYPE_OPAQUE
, 1, /* BA_ATOMIC_AGGR */
298 { "aggregator", -1, BAF_OPTIONAL
| BAF_TRANSITIVE
, EAF_TYPE_OPAQUE
, 1, /* BA_AGGREGATOR */
299 bgp_check_aggregator
, bgp_format_aggregator
},
300 { "community", -1, BAF_OPTIONAL
| BAF_TRANSITIVE
, EAF_TYPE_INT_SET
, 1, /* BA_COMMUNITY */
301 bgp_check_community
, NULL
},
302 { "originator_id", 4, BAF_OPTIONAL
, EAF_TYPE_ROUTER_ID
, 0, /* BA_ORIGINATOR_ID */
304 { "cluster_list", -1, BAF_OPTIONAL
, EAF_TYPE_INT_SET
, 0, /* BA_CLUSTER_LIST */
305 bgp_check_cluster_list
, bgp_format_cluster_list
},
306 { .name
= NULL
}, /* BA_DPA */
307 { .name
= NULL
}, /* BA_ADVERTISER */
308 { .name
= NULL
}, /* BA_RCID_PATH */
309 { "mp_reach_nlri", -1, BAF_OPTIONAL
, EAF_TYPE_OPAQUE
, 1, /* BA_MP_REACH_NLRI */
310 bgp_check_reach_nlri
, NULL
},
311 { "mp_unreach_nlri", -1, BAF_OPTIONAL
, EAF_TYPE_OPAQUE
, 1, /* BA_MP_UNREACH_NLRI */
312 bgp_check_unreach_nlri
, NULL
},
313 { .name
= NULL
}, /* BA_EXTENDED_COMM */
314 { "as4_path", -1, BAF_OPTIONAL
| BAF_TRANSITIVE
, EAF_TYPE_OPAQUE
, 1, /* BA_AS4_PATH */
316 { "as4_aggregator", -1, BAF_OPTIONAL
| BAF_TRANSITIVE
, EAF_TYPE_OPAQUE
, 1, /* BA_AS4_PATH */
320 /* BA_AS4_PATH is type EAF_TYPE_OPAQUE and not type EAF_TYPE_AS_PATH.
321 * It does not matter as this attribute does not appear on routes in the routing table.
324 #define ATTR_KNOWN(code) ((code) < ARRAY_SIZE(bgp_attr_table) && bgp_attr_table[code].name)
326 static inline struct adata
*
327 bgp_alloc_adata(struct linpool
*pool
, unsigned len
)
329 struct adata
*ad
= lp_alloc(pool
, sizeof(struct adata
) + len
);
335 bgp_set_attr(eattr
*e
, unsigned attr
, uintptr_t val
)
337 ASSERT(ATTR_KNOWN(attr
));
338 e
->id
= EA_CODE(EAP_BGP
, attr
);
339 e
->type
= bgp_attr_table
[attr
].type
;
340 e
->flags
= bgp_attr_table
[attr
].expected_flags
;
341 if (e
->type
& EAF_EMBEDDED
)
344 e
->u
.ptr
= (struct adata
*) val
;
348 bgp_set_attr_wa(eattr
*e
, struct linpool
*pool
, unsigned attr
, unsigned len
)
350 struct adata
*ad
= bgp_alloc_adata(pool
, len
);
351 bgp_set_attr(e
, attr
, (uintptr_t) ad
);
356 bgp_attach_attr(ea_list
**to
, struct linpool
*pool
, unsigned attr
, uintptr_t val
)
358 ea_list
*a
= lp_alloc(pool
, sizeof(ea_list
) + sizeof(eattr
));
361 a
->flags
= EALF_SORTED
;
363 bgp_set_attr(a
->attrs
, attr
, val
);
367 bgp_attach_attr_wa(ea_list
**to
, struct linpool
*pool
, unsigned attr
, unsigned len
)
369 struct adata
*ad
= bgp_alloc_adata(pool
, len
);
370 bgp_attach_attr(to
, pool
, attr
, (uintptr_t) ad
);
375 bgp_encode_attr_hdr(byte
*dst
, unsigned int flags
, unsigned code
, int len
)
379 DBG("\tAttribute %02x (%d bytes, flags %02x)\n", code
, len
, flags
);
390 *dst
++ = flags
| BAF_EXT_LEN
;
400 aggregator_convert_to_old(struct adata
*aggr
, byte
*dst
, int *new_used
)
402 byte
*src
= aggr
->data
;
405 u32 as
= get_u32(src
);
413 /* Copy IPv4 address */
414 memcpy(dst
+ 2, src
+ 4, 4);
418 aggregator_convert_to_new(struct adata
*aggr
, byte
*dst
)
420 byte
*src
= aggr
->data
;
422 u32 as
= get_u16(src
);
425 /* Copy IPv4 address */
426 memcpy(dst
+ 4, src
+ 2, 4);
430 bgp_get_attr_len(eattr
*a
)
433 if (ATTR_KNOWN(EA_ID(a
->id
)))
435 int code
= EA_ID(a
->id
);
436 struct attr_desc
*desc
= &bgp_attr_table
[code
];
437 len
= desc
->expected_length
;
440 ASSERT(!(a
->type
& EAF_EMBEDDED
));
441 len
= a
->u
.ptr
->length
;
446 ASSERT((a
->type
& EAF_TYPE_MASK
) == EAF_TYPE_OPAQUE
);
447 len
= a
->u
.ptr
->length
;
453 #define ADVANCE(w, r, l) do { r -= l; w += l; } while (0)
456 * bgp_encode_attrs - encode BGP attributes
459 * @attrs: a list of extended attributes
460 * @remains: remaining space in the buffer
462 * The bgp_encode_attrs() function takes a list of extended attributes
463 * and converts it to its BGP representation (a part of an Update message).
465 * Result: Length of the attribute block generated or -1 if not enough space.
468 bgp_encode_attrs(struct bgp_proto
*p
, byte
*w
, ea_list
*attrs
, int remains
)
470 unsigned int i
, code
, flags
;
474 for(i
=0; i
<attrs
->count
; i
++)
476 eattr
*a
= &attrs
->attrs
[i
];
477 ASSERT(EA_PROTO(a
->id
) == EAP_BGP
);
480 /* When talking multiprotocol BGP, the NEXT_HOP attributes are used only temporarily. */
481 if (code
== BA_NEXT_HOP
)
485 /* When AS4-aware BGP speaker is talking to non-AS4-aware BGP speaker,
486 * we have to convert our 4B AS_PATH to 2B AS_PATH and send our AS_PATH
487 * as optional AS4_PATH attribute.
489 if ((code
== BA_AS_PATH
) && (! p
->as4_session
))
491 len
= a
->u
.ptr
->length
;
493 if (remains
< (len
+ 4))
496 /* Using temporary buffer because don't know a length of created attr
497 * and therefore a length of a header. Perhaps i should better always
498 * use BAF_EXT_LEN. */
502 int nl
= as_path_convert_to_old(a
->u
.ptr
, buf
, &new_used
);
504 DBG("BGP: Encoding old AS_PATH\n");
505 rv
= bgp_encode_attr_hdr(w
, BAF_TRANSITIVE
, BA_AS_PATH
, nl
);
506 ADVANCE(w
, remains
, rv
);
508 ADVANCE(w
, remains
, nl
);
513 if (remains
< (len
+ 4))
516 /* We should discard AS_CONFED_SEQUENCE or AS_CONFED_SET path segments
517 * here but we don't support confederations and such paths we already
518 * discarded in bgp_check_as_path().
521 DBG("BGP: Encoding AS4_PATH\n");
522 rv
= bgp_encode_attr_hdr(w
, BAF_OPTIONAL
| BAF_TRANSITIVE
, BA_AS4_PATH
, len
);
523 ADVANCE(w
, remains
, rv
);
524 memcpy(w
, a
->u
.ptr
->data
, len
);
525 ADVANCE(w
, remains
, len
);
530 /* The same issue with AGGREGATOR attribute */
531 if ((code
== BA_AGGREGATOR
) && (! p
->as4_session
))
536 if (remains
< (len
+ 3))
539 rv
= bgp_encode_attr_hdr(w
, BAF_OPTIONAL
| BAF_TRANSITIVE
, BA_AGGREGATOR
, len
);
540 ADVANCE(w
, remains
, rv
);
541 aggregator_convert_to_old(a
->u
.ptr
, w
, &new_used
);
542 ADVANCE(w
, remains
, len
);
548 if (remains
< (len
+ 3))
551 rv
= bgp_encode_attr_hdr(w
, BAF_OPTIONAL
| BAF_TRANSITIVE
, BA_AS4_AGGREGATOR
, len
);
552 ADVANCE(w
, remains
, rv
);
553 memcpy(w
, a
->u
.ptr
->data
, len
);
554 ADVANCE(w
, remains
, len
);
559 /* Standard path continues here ... */
561 flags
= a
->flags
& (BAF_OPTIONAL
| BAF_TRANSITIVE
| BAF_PARTIAL
);
562 len
= bgp_get_attr_len(a
);
564 /* Skip empty int sets */
565 if (((a
->type
& EAF_TYPE_MASK
) == EAF_TYPE_INT_SET
) && (len
== 0))
568 if (remains
< len
+ 4)
571 rv
= bgp_encode_attr_hdr(w
, flags
, code
, len
);
572 ADVANCE(w
, remains
, rv
);
574 switch (a
->type
& EAF_TYPE_MASK
)
577 case EAF_TYPE_ROUTER_ID
:
579 put_u32(w
, a
->u
.data
);
583 case EAF_TYPE_IP_ADDRESS
:
585 ip_addr ip
= *(ip_addr
*)a
->u
.ptr
->data
;
590 case EAF_TYPE_INT_SET
:
592 u32
*z
= (u32
*)a
->u
.ptr
->data
;
594 for(i
=0; i
<len
; i
+=4)
598 case EAF_TYPE_OPAQUE
:
599 case EAF_TYPE_AS_PATH
:
600 memcpy(w
, a
->u
.ptr
->data
, len
);
603 bug("bgp_encode_attrs: unknown attribute type %02x", a
->type
);
605 ADVANCE(w
, remains
, len
);
614 bgp_init_prefix(struct fib_node
*N
)
616 struct bgp_prefix
*p
= (struct bgp_prefix
*) N
;
617 p
->bucket_node
.next
= NULL
;
621 bgp_compare_u32(const u32
*x
, const u32
*y
)
623 return (*x
< *y
) ? -1 : (*x
> *y
) ? 1 : 0;
627 bgp_normalize_set(u32
*dest
, u32
*src
, unsigned cnt
)
629 memcpy(dest
, src
, sizeof(u32
) * cnt
);
630 qsort(dest
, cnt
, sizeof(u32
), (int(*)(const void *, const void *)) bgp_compare_u32
);
634 bgp_rehash_buckets(struct bgp_proto
*p
)
636 struct bgp_bucket
**old
= p
->bucket_hash
;
637 struct bgp_bucket
**new;
638 unsigned oldn
= p
->hash_size
;
640 struct bgp_bucket
*b
;
642 p
->hash_size
= p
->hash_limit
;
643 DBG("BGP: Rehashing bucket table from %d to %d\n", oldn
, p
->hash_size
);
645 if (p
->hash_limit
>= 65536)
647 new = p
->bucket_hash
= mb_allocz(p
->p
.pool
, p
->hash_size
* sizeof(struct bgp_bucket
*));
648 mask
= p
->hash_size
- 1;
649 for (i
=0; i
<oldn
; i
++)
652 old
[i
] = b
->hash_next
;
654 b
->hash_next
= new[e
];
656 b
->hash_next
->hash_prev
= b
;
663 static struct bgp_bucket
*
664 bgp_new_bucket(struct bgp_proto
*p
, ea_list
*new, unsigned hash
)
666 struct bgp_bucket
*b
;
667 unsigned ea_size
= sizeof(ea_list
) + new->count
* sizeof(eattr
);
668 unsigned ea_size_aligned
= BIRD_ALIGN(ea_size
, CPU_STRUCT_ALIGN
);
669 unsigned size
= sizeof(struct bgp_bucket
) + ea_size
;
672 unsigned index
= hash
& (p
->hash_size
- 1);
674 /* Gather total size of non-inline attributes */
675 for (i
=0; i
<new->count
; i
++)
677 eattr
*a
= &new->attrs
[i
];
678 if (!(a
->type
& EAF_EMBEDDED
))
679 size
+= BIRD_ALIGN(sizeof(struct adata
) + a
->u
.ptr
->length
, CPU_STRUCT_ALIGN
);
682 /* Create the bucket and hash it */
683 b
= mb_alloc(p
->p
.pool
, size
);
684 b
->hash_next
= p
->bucket_hash
[index
];
686 b
->hash_next
->hash_prev
= b
;
687 p
->bucket_hash
[index
] = b
;
690 add_tail(&p
->bucket_queue
, &b
->send_node
);
691 init_list(&b
->prefixes
);
692 memcpy(b
->eattrs
, new, ea_size
);
693 dest
= ((byte
*)b
->eattrs
) + ea_size_aligned
;
695 /* Copy values of non-inline attributes */
696 for (i
=0; i
<new->count
; i
++)
698 eattr
*a
= &b
->eattrs
->attrs
[i
];
699 if (!(a
->type
& EAF_EMBEDDED
))
701 struct adata
*oa
= a
->u
.ptr
;
702 struct adata
*na
= (struct adata
*) dest
;
703 memcpy(na
, oa
, sizeof(struct adata
) + oa
->length
);
705 dest
+= BIRD_ALIGN(sizeof(struct adata
) + na
->length
, CPU_STRUCT_ALIGN
);
709 /* If needed, rehash */
711 if (p
->hash_count
> p
->hash_limit
)
712 bgp_rehash_buckets(p
);
717 static struct bgp_bucket
*
718 bgp_get_bucket(struct bgp_proto
*p
, net
*n
, ea_list
*attrs
, int originate
)
721 unsigned i
, cnt
, hash
, code
;
724 struct bgp_bucket
*b
;
726 /* Merge the attribute list */
727 new = alloca(ea_scan(attrs
));
728 ea_merge(attrs
, new);
731 /* Normalize attributes */
740 byte buf
[EA_FORMAT_BUF_SIZE
];
745 if (EA_PROTO(a
->id
) != EAP_BGP
)
748 if (ATTR_KNOWN(code
))
750 if (!bgp_attr_table
[code
].allow_in_ebgp
&& !p
->is_internal
)
752 /* The flags might have been zero if the attr was added by filters */
753 a
->flags
= (a
->flags
& BAF_PARTIAL
) | bgp_attr_table
[code
].expected_flags
;
759 /* Don't re-export unknown non-transitive attributes */
760 if (!(a
->flags
& BAF_TRANSITIVE
))
764 if ((d
->type
& EAF_ORIGINATED
) && !originate
&& (d
->flags
& BAF_TRANSITIVE
) && (d
->flags
& BAF_OPTIONAL
))
765 d
->flags
|= BAF_PARTIAL
;
766 switch (d
->type
& EAF_TYPE_MASK
)
768 case EAF_TYPE_INT_SET
:
770 struct adata
*z
= alloca(sizeof(struct adata
) + d
->u
.ptr
->length
);
771 z
->length
= d
->u
.ptr
->length
;
772 bgp_normalize_set((u32
*) z
->data
, (u32
*) d
->u
.ptr
->data
, z
->length
/ 4);
784 for(b
=p
->bucket_hash
[hash
& (p
->hash_size
- 1)]; b
; b
=b
->hash_next
)
785 if (b
->hash
== hash
&& ea_same(b
->eattrs
, new))
787 DBG("Found bucket.\n");
791 /* Ensure that there are all mandatory attributes */
792 for(i
=0; i
<ARRAY_SIZE(bgp_mandatory_attrs
); i
++)
793 if (!(seen
& (1 << bgp_mandatory_attrs
[i
])))
795 log(L_ERR
"%s: Mandatory attribute %s missing in route %I/%d", p
->p
.name
, bgp_attr_table
[bgp_mandatory_attrs
[i
]].name
, n
->n
.prefix
, n
->n
.pxlen
);
799 /* Check if next hop is valid */
800 a
= ea_find(new, EA_CODE(EAP_BGP
, BA_NEXT_HOP
));
801 if (!a
|| ipa_equal(p
->cf
->remote_ip
, *(ip_addr
*)a
->u
.ptr
->data
))
803 log(L_ERR
"%s: Invalid NEXT_HOP attribute in route %I/%d", p
->p
.name
, n
->n
.prefix
, n
->n
.pxlen
);
807 /* Create new bucket */
808 DBG("Creating bucket.\n");
809 return bgp_new_bucket(p
, new, hash
);
813 bgp_free_bucket(struct bgp_proto
*p
, struct bgp_bucket
*buck
)
816 buck
->hash_next
->hash_prev
= buck
->hash_prev
;
818 buck
->hash_prev
->hash_next
= buck
->hash_next
;
820 p
->bucket_hash
[buck
->hash
& (p
->hash_size
-1)] = buck
->hash_next
;
825 bgp_rt_notify(struct proto
*P
, rtable
*tbl UNUSED
, net
*n
, rte
*new, rte
*old UNUSED
, ea_list
*attrs
)
827 struct bgp_proto
*p
= (struct bgp_proto
*) P
;
828 struct bgp_bucket
*buck
;
829 struct bgp_prefix
*px
;
831 DBG("BGP: Got route %I/%d %s\n", n
->n
.prefix
, n
->n
.pxlen
, new ? "up" : "down");
835 buck
= bgp_get_bucket(p
, n
, attrs
, new->attrs
->source
!= RTS_BGP
);
836 if (!buck
) /* Inconsistent attribute list */
841 if (!(buck
= p
->withdraw_bucket
))
843 buck
= p
->withdraw_bucket
= mb_alloc(P
->pool
, sizeof(struct bgp_bucket
));
844 init_list(&buck
->prefixes
);
847 px
= fib_get(&p
->prefix_fib
, &n
->n
.prefix
, n
->n
.pxlen
);
848 if (px
->bucket_node
.next
)
850 DBG("\tRemoving old entry.\n");
851 rem_node(&px
->bucket_node
);
853 add_tail(&buck
->prefixes
, &px
->bucket_node
);
854 bgp_schedule_packet(p
->conn
, PKT_UPDATE
);
858 bgp_create_attrs(struct bgp_proto
*p
, rte
*e
, ea_list
**attrs
, struct linpool
*pool
)
860 ea_list
*ea
= lp_alloc(pool
, sizeof(ea_list
) + 4*sizeof(eattr
));
866 ea
->flags
= EALF_SORTED
;
869 bgp_set_attr(ea
->attrs
, BA_ORIGIN
,
870 ((rta
->source
== RTS_OSPF_EXT1
) || (rta
->source
== RTS_OSPF_EXT2
)) ? ORIGIN_INCOMPLETE
: ORIGIN_IGP
);
873 bgp_set_attr_wa(ea
->attrs
+1, pool
, BA_AS_PATH
, 0);
876 z
= bgp_set_attr_wa(ea
->attrs
+1, pool
, BA_AS_PATH
, 6);
877 z
[0] = AS_PATH_SEQUENCE
;
879 put_u32(z
+2, p
->local_as
);
882 /* iBGP -> use gw, eBGP multi-hop -> use source_addr,
883 eBGP single-hop -> use gw if on the same iface */
884 z
= bgp_set_attr_wa(ea
->attrs
+2, pool
, BA_NEXT_HOP
, NEXT_HOP_LENGTH
);
885 if (p
->cf
->next_hop_self
||
886 rta
->dest
!= RTD_ROUTER
||
887 ipa_equal(rta
->gw
, IPA_NONE
) ||
888 ipa_has_link_scope(rta
->gw
) ||
889 (!p
->is_internal
&& (!p
->neigh
|| (rta
->iface
!= p
->neigh
->iface
))))
890 set_next_hop(z
, p
->source_addr
);
892 set_next_hop(z
, rta
->gw
);
894 bgp_set_attr(ea
->attrs
+3, BA_LOCAL_PREF
, p
->cf
->default_local_pref
);
896 return 0; /* Leave decision to the filters */
901 bgp_as_path_loopy(struct bgp_proto
*p
, rta
*a
)
903 eattr
*e
= ea_find(a
->eattrs
, EA_CODE(EAP_BGP
, BA_AS_PATH
));
904 return (e
&& as_path_is_member(e
->u
.ptr
, p
->local_as
));
908 bgp_originator_id_loopy(struct bgp_proto
*p
, rta
*a
)
910 eattr
*e
= ea_find(a
->eattrs
, EA_CODE(EAP_BGP
, BA_ORIGINATOR_ID
));
911 return (e
&& (e
->u
.data
== p
->local_id
));
915 bgp_cluster_list_loopy(struct bgp_proto
*p
, rta
*a
)
917 eattr
*e
= ea_find(a
->eattrs
, EA_CODE(EAP_BGP
, BA_CLUSTER_LIST
));
918 return (e
&& p
->rr_client
&& int_set_contains(e
->u
.ptr
, p
->rr_cluster_id
));
923 bgp_path_prepend(rte
*e
, ea_list
**attrs
, struct linpool
*pool
, u32 as
)
925 eattr
*a
= ea_find(e
->attrs
->eattrs
, EA_CODE(EAP_BGP
, BA_AS_PATH
));
926 bgp_attach_attr(attrs
, pool
, BA_AS_PATH
, (uintptr_t) as_path_prepend(pool
, a
->u
.ptr
, as
));
930 bgp_cluster_list_prepend(rte
*e
, ea_list
**attrs
, struct linpool
*pool
, u32 cid
)
932 eattr
*a
= ea_find(e
->attrs
->eattrs
, EA_CODE(EAP_BGP
, BA_CLUSTER_LIST
));
933 bgp_attach_attr(attrs
, pool
, BA_CLUSTER_LIST
, (uintptr_t) int_set_add(pool
, a
? a
->u
.ptr
: NULL
, cid
));
937 bgp_update_attrs(struct bgp_proto
*p
, rte
*e
, ea_list
**attrs
, struct linpool
*pool
, int rr
)
941 if (!p
->is_internal
&& !p
->rs_client
)
943 bgp_path_prepend(e
, attrs
, pool
, p
->local_as
);
945 /* The MULTI_EXIT_DISC attribute received from a neighboring AS MUST NOT be
946 * propagated to other neighboring ASes.
947 * Perhaps it would be better to undefine it.
949 a
= ea_find(e
->attrs
->eattrs
, EA_CODE(EAP_BGP
, BA_MULTI_EXIT_DISC
));
951 bgp_attach_attr(attrs
, pool
, BA_MULTI_EXIT_DISC
, 0);
954 /* iBGP -> keep next_hop, eBGP multi-hop -> use source_addr,
955 eBGP single-hop -> keep next_hop if on the same iface */
956 a
= ea_find(e
->attrs
->eattrs
, EA_CODE(EAP_BGP
, BA_NEXT_HOP
));
957 if (a
&& !p
->cf
->next_hop_self
&&
958 (p
->is_internal
|| (p
->neigh
&& (e
->attrs
->iface
== p
->neigh
->iface
))))
960 /* Leave the original next hop attribute, will check later where does it point */
964 /* Need to create new one */
965 byte
*b
= bgp_attach_attr_wa(attrs
, pool
, BA_NEXT_HOP
, NEXT_HOP_LENGTH
);
966 set_next_hop(b
, p
->source_addr
);
971 /* Handling route reflection, RFC 4456 */
972 struct bgp_proto
*src
= (struct bgp_proto
*) e
->attrs
->proto
;
974 a
= ea_find(e
->attrs
->eattrs
, EA_CODE(EAP_BGP
, BA_ORIGINATOR_ID
));
976 bgp_attach_attr(attrs
, pool
, BA_ORIGINATOR_ID
, src
->remote_id
);
978 /* We attach proper cluster ID according to whether the route is entering or leaving the cluster */
979 bgp_cluster_list_prepend(e
, attrs
, pool
, src
->rr_client
? src
->rr_cluster_id
: p
->rr_cluster_id
);
981 /* Two RR clients with different cluster ID, hmmm */
982 if (src
->rr_client
&& p
->rr_client
&& (src
->rr_cluster_id
!= p
->rr_cluster_id
))
983 bgp_cluster_list_prepend(e
, attrs
, pool
, p
->rr_cluster_id
);
986 return 0; /* Leave decision to the filters */
990 bgp_community_filter(struct bgp_proto
*p
, rte
*e
)
995 /* Check if we aren't forbidden to export the route by communities */
996 a
= ea_find(e
->attrs
->eattrs
, EA_CODE(EAP_BGP
, BA_COMMUNITY
));
1000 if (int_set_contains(d
, BGP_COMM_NO_ADVERTISE
))
1002 DBG("\tNO_ADVERTISE\n");
1005 if (!p
->is_internal
&&
1006 (int_set_contains(d
, BGP_COMM_NO_EXPORT
) ||
1007 int_set_contains(d
, BGP_COMM_NO_EXPORT_SUBCONFED
)))
1009 DBG("\tNO_EXPORT\n");
1018 bgp_import_control(struct proto
*P
, rte
**new, ea_list
**attrs
, struct linpool
*pool
)
1021 struct bgp_proto
*p
= (struct bgp_proto
*) P
;
1022 struct bgp_proto
*new_bgp
= (e
->attrs
->proto
->proto
== &proto_bgp
) ? (struct bgp_proto
*) e
->attrs
->proto
: NULL
;
1024 if (p
== new_bgp
) /* Poison reverse updates */
1028 /* We should check here for cluster list loop, because the receiving BGP instance
1029 might have different cluster ID */
1030 if (bgp_cluster_list_loopy(p
, e
->attrs
))
1033 if (p
->cf
->interpret_communities
&& bgp_community_filter(p
, e
))
1036 if (p
->local_as
== new_bgp
->local_as
&& p
->is_internal
&& new_bgp
->is_internal
)
1038 /* Redistribution of internal routes with IBGP */
1039 if (p
->rr_client
|| new_bgp
->rr_client
)
1040 /* Route reflection, RFC 4456 */
1041 return bgp_update_attrs(p
, e
, attrs
, pool
, 1);
1046 return bgp_update_attrs(p
, e
, attrs
, pool
, 0);
1049 return bgp_create_attrs(p
, e
, attrs
, pool
);
1053 bgp_get_neighbor(rte
*r
)
1055 eattr
*e
= ea_find(r
->attrs
->eattrs
, EA_CODE(EAP_BGP
, BA_AS_PATH
));
1058 if (e
&& as_path_get_first(e
->u
.ptr
, &as
))
1061 return ((struct bgp_proto
*) r
->attrs
->proto
)->remote_as
;
1065 rte_resolvable(rte
*rt
)
1067 int rd
= rt
->attrs
->dest
;
1068 return (rd
== RTD_ROUTER
) || (rd
== RTD_DEVICE
) || (rd
== RTD_MULTIPATH
);
1072 bgp_rte_better(rte
*new, rte
*old
)
1074 struct bgp_proto
*new_bgp
= (struct bgp_proto
*) new->attrs
->proto
;
1075 struct bgp_proto
*old_bgp
= (struct bgp_proto
*) old
->attrs
->proto
;
1079 /* RFC 4271 9.1.2.1. Route resolvability test */
1080 n
= rte_resolvable(new);
1081 o
= rte_resolvable(old
);
1087 /* Start with local preferences */
1088 x
= ea_find(new->attrs
->eattrs
, EA_CODE(EAP_BGP
, BA_LOCAL_PREF
));
1089 y
= ea_find(old
->attrs
->eattrs
, EA_CODE(EAP_BGP
, BA_LOCAL_PREF
));
1090 n
= x
? x
->u
.data
: new_bgp
->cf
->default_local_pref
;
1091 o
= y
? y
->u
.data
: old_bgp
->cf
->default_local_pref
;
1097 /* RFC 4271 9.1.2.2. a) Use AS path lengths */
1098 if (new_bgp
->cf
->compare_path_lengths
|| old_bgp
->cf
->compare_path_lengths
)
1100 x
= ea_find(new->attrs
->eattrs
, EA_CODE(EAP_BGP
, BA_AS_PATH
));
1101 y
= ea_find(old
->attrs
->eattrs
, EA_CODE(EAP_BGP
, BA_AS_PATH
));
1102 n
= x
? as_path_getlen(x
->u
.ptr
) : AS_PATH_MAXLEN
;
1103 o
= y
? as_path_getlen(y
->u
.ptr
) : AS_PATH_MAXLEN
;
1110 /* RFC 4271 9.1.2.2. b) Use origins */
1111 x
= ea_find(new->attrs
->eattrs
, EA_CODE(EAP_BGP
, BA_ORIGIN
));
1112 y
= ea_find(old
->attrs
->eattrs
, EA_CODE(EAP_BGP
, BA_ORIGIN
));
1113 n
= x
? x
->u
.data
: ORIGIN_INCOMPLETE
;
1114 o
= y
? y
->u
.data
: ORIGIN_INCOMPLETE
;
1120 /* RFC 4271 9.1.2.2. c) Compare MED's */
1121 /* This is noncompliant. Proper RFC 4271 path selection cannot be
1122 * interpreted as finding the best path in some ordering.
1123 * Therefore, it cannot be implemented in BIRD without some ugly
1124 * hacks. This is just an approximation, which in specific
1125 * situations may lead to persistent routing loops, because it is
1126 * nondeterministic - it depends on the order in which routes
1127 * appeared. But it is also the same behavior as used by default in
1128 * Cisco routers, so it is probably not a big issue.
1130 if (new_bgp
->cf
->med_metric
|| old_bgp
->cf
->med_metric
||
1131 (bgp_get_neighbor(new) == bgp_get_neighbor(old
)))
1133 x
= ea_find(new->attrs
->eattrs
, EA_CODE(EAP_BGP
, BA_MULTI_EXIT_DISC
));
1134 y
= ea_find(old
->attrs
->eattrs
, EA_CODE(EAP_BGP
, BA_MULTI_EXIT_DISC
));
1135 n
= x
? x
->u
.data
: new_bgp
->cf
->default_med
;
1136 o
= y
? y
->u
.data
: old_bgp
->cf
->default_med
;
1143 /* RFC 4271 9.1.2.2. d) Prefer external peers */
1144 if (new_bgp
->is_internal
> old_bgp
->is_internal
)
1146 if (new_bgp
->is_internal
< old_bgp
->is_internal
)
1149 /* RFC 4271 9.1.2.2. e) Compare IGP metrics */
1150 n
= new_bgp
->cf
->igp_metric
? new->attrs
->igp_metric
: 0;
1151 o
= old_bgp
->cf
->igp_metric
? old
->attrs
->igp_metric
: 0;
1157 /* RFC 4271 9.1.2.2. f) Compare BGP identifiers */
1158 /* RFC 4456 9. a) Use ORIGINATOR_ID instead of local neighor ID */
1159 x
= ea_find(new->attrs
->eattrs
, EA_CODE(EAP_BGP
, BA_ORIGINATOR_ID
));
1160 y
= ea_find(old
->attrs
->eattrs
, EA_CODE(EAP_BGP
, BA_ORIGINATOR_ID
));
1161 n
= x
? x
->u
.data
: new_bgp
->remote_id
;
1162 o
= y
? y
->u
.data
: old_bgp
->remote_id
;
1164 /* RFC 5004 - prefer older routes */
1165 /* (if both are external and from different peer) */
1166 if ((new_bgp
->cf
->prefer_older
|| old_bgp
->cf
->prefer_older
) &&
1167 !new_bgp
->is_internal
&& n
!= o
)
1170 /* rest of RFC 4271 9.1.2.2. f) */
1176 /* RFC 4456 9. b) Compare cluster list lengths */
1177 x
= ea_find(new->attrs
->eattrs
, EA_CODE(EAP_BGP
, BA_CLUSTER_LIST
));
1178 y
= ea_find(old
->attrs
->eattrs
, EA_CODE(EAP_BGP
, BA_CLUSTER_LIST
));
1179 n
= x
? int_set_get_size(x
->u
.ptr
) : 0;
1180 o
= y
? int_set_get_size(y
->u
.ptr
) : 0;
1186 /* RFC 4271 9.1.2.2. g) Compare peer IP adresses */
1187 return (ipa_compare(new_bgp
->cf
->remote_ip
, old_bgp
->cf
->remote_ip
) < 0);
1190 static struct adata
*
1191 bgp_aggregator_convert_to_new(struct adata
*old
, struct linpool
*pool
)
1193 struct adata
*newa
= lp_alloc(pool
, sizeof(struct adata
) + 8);
1195 aggregator_convert_to_new(old
, newa
->data
);
1200 /* Take last req_as ASNs from path old2 (in 2B format), convert to 4B format
1201 * and append path old4 (in 4B format).
1203 static struct adata
*
1204 bgp_merge_as_paths(struct adata
*old2
, struct adata
*old4
, int req_as
, struct linpool
*pool
)
1206 byte buf
[old2
->length
* 2];
1208 int ol
= as_path_convert_to_new(old2
, buf
, req_as
);
1209 int nl
= ol
+ (old4
? old4
->length
: 0);
1211 struct adata
*newa
= lp_alloc(pool
, sizeof(struct adata
) + nl
);
1213 memcpy(newa
->data
, buf
, ol
);
1214 if (old4
) memcpy(newa
->data
+ ol
, old4
->data
, old4
->length
);
1220 as4_aggregator_valid(struct adata
*aggr
)
1222 return aggr
->length
== 8;
1226 /* Reconstruct 4B AS_PATH and AGGREGATOR according to RFC 4893 4.2.3 */
1228 bgp_reconstruct_4b_atts(struct bgp_proto
*p
, rta
*a
, struct linpool
*pool
)
1230 eattr
*p2
=ea_find(a
->eattrs
, EA_CODE(EAP_BGP
, BA_AS_PATH
));
1231 eattr
*p4
=ea_find(a
->eattrs
, EA_CODE(EAP_BGP
, BA_AS4_PATH
));
1232 eattr
*a2
=ea_find(a
->eattrs
, EA_CODE(EAP_BGP
, BA_AGGREGATOR
));
1233 eattr
*a4
=ea_find(a
->eattrs
, EA_CODE(EAP_BGP
, BA_AS4_AGGREGATOR
));
1236 if (a4
&& !as4_aggregator_valid(a4
->u
.ptr
))
1238 log(L_WARN
"%s: AS4_AGGREGATOR attribute is invalid, skipping attribute", p
->p
.name
);
1245 u32 a2_as
= get_u16(a2
->u
.ptr
->data
);
1249 if (a2_as
!= AS_TRANS
)
1251 /* Routes were aggregated by old router and therefore AS4_PATH
1252 * and AS4_AGGREGATOR is invalid
1254 * Convert AS_PATH and AGGREGATOR to 4B format and finish.
1257 a2
->u
.ptr
= bgp_aggregator_convert_to_new(a2
->u
.ptr
, pool
);
1258 p2
->u
.ptr
= bgp_merge_as_paths(p2
->u
.ptr
, NULL
, AS_PATH_MAXLEN
, pool
);
1264 /* Common case, use AS4_AGGREGATOR attribute */
1265 a2
->u
.ptr
= a4
->u
.ptr
;
1270 /* Common case, use old AGGREGATOR attribute */
1271 a2
->u
.ptr
= bgp_aggregator_convert_to_new(a2
->u
.ptr
, pool
);
1273 if ((a2_as
== AS_TRANS
) && !a4_removed
)
1274 log(L_WARN
"%s: AGGREGATOR attribute contain AS_TRANS, but AS4_AGGREGATOR is missing", p
->p
.name
);
1279 log(L_WARN
"%s: AS4_AGGREGATOR attribute received, but AGGREGATOR attribute is missing", p
->p
.name
);
1281 int p2_len
= as_path_getlen_int(p2
->u
.ptr
, 2);
1282 int p4_len
= p4
? validate_as4_path(p
, p4
->u
.ptr
) : -1;
1284 if (p4
&& (p4_len
< 0))
1285 log(L_WARN
"%s: AS4_PATH attribute is malformed, skipping attribute", p
->p
.name
);
1287 if ((p4_len
<= 0) || (p2_len
< p4_len
))
1288 p2
->u
.ptr
= bgp_merge_as_paths(p2
->u
.ptr
, NULL
, AS_PATH_MAXLEN
, pool
);
1290 p2
->u
.ptr
= bgp_merge_as_paths(p2
->u
.ptr
, p4
->u
.ptr
, p2_len
- p4_len
, pool
);
1294 bgp_remove_as4_attrs(struct bgp_proto
*p
, rta
*a
)
1296 unsigned id1
= EA_CODE(EAP_BGP
, BA_AS4_PATH
);
1297 unsigned id2
= EA_CODE(EAP_BGP
, BA_AS4_AGGREGATOR
);
1298 ea_list
**el
= &(a
->eattrs
);
1300 /* We know that ea_lists constructed in bgp_decode attrs have one attribute per ea_list struct */
1303 unsigned fid
= (*el
)->attrs
[0].id
;
1305 if ((fid
== id1
) || (fid
== id2
))
1309 log(L_WARN
"%s: Unexpected AS4_* attributes received", p
->p
.name
);
1312 el
= &((*el
)->next
);
1317 * bgp_decode_attrs - check and decode BGP attributes
1319 * @attr: start of attribute block
1320 * @len: length of attribute block
1321 * @pool: linear pool to make all the allocations in
1322 * @mandatory: 1 iff presence of mandatory attributes has to be checked
1324 * This function takes a BGP attribute block (a part of an Update message), checks
1325 * its consistency and converts it to a list of BIRD route attributes represented
1329 bgp_decode_attrs(struct bgp_conn
*conn
, byte
*attr
, unsigned int len
, struct linpool
*pool
, int mandatory
)
1331 struct bgp_proto
*bgp
= conn
->bgp
;
1332 rta
*a
= lp_alloc(pool
, sizeof(struct rta
));
1333 unsigned int flags
, code
, l
, i
, type
;
1335 byte
*z
, *attr_start
;
1341 bzero(a
, sizeof(rta
));
1343 a
->source
= RTS_BGP
;
1344 a
->scope
= SCOPE_UNIVERSE
;
1345 a
->cast
= RTC_UNICAST
;
1346 /* a->dest = RTD_ROUTER; -- set in bgp_set_next_hop() */
1347 a
->from
= bgp
->cf
->remote_ip
;
1349 /* Parse the attributes */
1350 bzero(seen
, sizeof(seen
));
1351 DBG("BGP: Parsing attributes\n");
1360 if (flags
& BAF_EXT_LEN
)
1380 DBG("Attr %02x %02x %d\n", code
, flags
, l
);
1381 if (seen
[code
/8] & (1 << (code
%8)))
1383 if (ATTR_KNOWN(code
))
1385 struct attr_desc
*desc
= &bgp_attr_table
[code
];
1386 if (desc
->expected_length
>= 0 && desc
->expected_length
!= (int) l
)
1387 { errcode
= 5; goto err
; }
1388 if ((desc
->expected_flags
^ flags
) & (BAF_OPTIONAL
| BAF_TRANSITIVE
))
1389 { errcode
= 4; goto err
; }
1390 if (!desc
->allow_in_ebgp
&& !bgp
->is_internal
)
1394 errcode
= desc
->validate(bgp
, z
, l
);
1397 if (errcode
== IGNORE
)
1399 if (errcode
<= WITHDRAW
)
1401 log(L_WARN
"%s: Attribute %s is malformed, withdrawing update",
1402 bgp
->p
.name
, desc
->name
);
1406 else if (code
== BA_AS_PATH
)
1408 /* Special case as it might also trim the attribute */
1409 if (validate_as_path(bgp
, z
, &l
) < 0)
1410 { errcode
= 11; goto err
; }
1414 else /* Unknown attribute */
1416 if (!(flags
& BAF_OPTIONAL
))
1417 { errcode
= 2; goto err
; }
1418 type
= EAF_TYPE_OPAQUE
;
1421 // Only OPTIONAL and TRANSITIVE attributes may have non-zero PARTIAL flag
1422 // if (!((flags & BAF_OPTIONAL) && (flags & BAF_TRANSITIVE)) && (flags & BAF_PARTIAL))
1423 // { errcode = 4; goto err; }
1425 seen
[code
/8] |= (1 << (code
%8));
1426 ea
= lp_alloc(pool
, sizeof(ea_list
) + sizeof(eattr
));
1427 ea
->next
= a
->eattrs
;
1431 ea
->attrs
[0].id
= EA_CODE(EAP_BGP
, code
);
1432 ea
->attrs
[0].flags
= flags
;
1433 ea
->attrs
[0].type
= type
;
1434 if (type
& EAF_EMBEDDED
)
1438 ad
= lp_alloc(pool
, sizeof(struct adata
) + l
);
1439 ea
->attrs
[0].u
.ptr
= ad
;
1441 memcpy(ad
->data
, z
, l
);
1445 case EAF_TYPE_ROUTER_ID
:
1448 ea
->attrs
[0].u
.data
= *z
;
1450 ea
->attrs
[0].u
.data
= get_u32(z
);
1452 case EAF_TYPE_IP_ADDRESS
:
1453 ipa_ntoh(*(ip_addr
*)ad
->data
);
1455 case EAF_TYPE_INT_SET
:
1457 u32
*z
= (u32
*) ad
->data
;
1458 for(i
=0; i
<ad
->length
/4; i
++)
1469 /* If we received MP_REACH_NLRI we should check mandatory attributes */
1470 if (bgp
->mp_reach_len
!= 0)
1474 /* If there is no (reachability) NLRI, we should exit now */
1478 /* Check if all mandatory attributes are present */
1479 for(i
=0; i
< ARRAY_SIZE(bgp_mandatory_attrs
); i
++)
1481 code
= bgp_mandatory_attrs
[i
];
1482 if (!(seen
[code
/8] & (1 << (code
%8))))
1484 bgp_error(conn
, 3, 3, &bgp_mandatory_attrs
[i
], 1);
1489 /* When receiving attributes from non-AS4-aware BGP speaker,
1490 * we have to reconstruct 4B AS_PATH and AGGREGATOR attributes
1492 if (! bgp
->as4_session
)
1493 bgp_reconstruct_4b_atts(bgp
, a
, pool
);
1495 bgp_remove_as4_attrs(bgp
, a
);
1497 /* If the AS path attribute contains our AS, reject the routes */
1498 if (bgp_as_path_loopy(bgp
, a
))
1501 /* Two checks for IBGP loops caused by route reflection, RFC 4456 */
1502 if (bgp_originator_id_loopy(bgp
, a
) ||
1503 bgp_cluster_list_loopy(bgp
, a
))
1506 /* If there's no local preference, define one */
1507 if (!(seen
[0] & (1 << BA_LOCAL_PREF
)))
1508 bgp_attach_attr(&a
->eattrs
, pool
, BA_LOCAL_PREF
, bgp
->cf
->default_local_pref
);
1516 bgp_error(conn
, 3, 1, NULL
, 0);
1520 bgp_error(conn
, 3, errcode
, attr_start
, z
+l
-attr_start
);
1525 bgp_get_attr(eattr
*a
, byte
*buf
, int buflen
)
1527 unsigned int i
= EA_ID(a
->id
);
1528 struct attr_desc
*d
;
1532 d
= &bgp_attr_table
[i
];
1533 buf
+= bsprintf(buf
, "%s", d
->name
);
1538 d
->format(a
, buf
, buflen
);
1543 bsprintf(buf
, "%02x%s", i
, (a
->flags
& BAF_TRANSITIVE
) ? " [t]" : "");
1548 bgp_attr_init(struct bgp_proto
*p
)
1551 p
->hash_limit
= p
->hash_size
* 4;
1552 p
->bucket_hash
= mb_allocz(p
->p
.pool
, p
->hash_size
* sizeof(struct bgp_bucket
*));
1553 init_list(&p
->bucket_queue
);
1554 p
->withdraw_bucket
= NULL
;
1555 fib_init(&p
->prefix_fib
, p
->p
.pool
, sizeof(struct bgp_prefix
), 0, bgp_init_prefix
);
1559 bgp_get_route_info(rte
*e
, byte
*buf
, ea_list
*attrs
)
1561 eattr
*p
= ea_find(attrs
, EA_CODE(EAP_BGP
, BA_AS_PATH
));
1562 eattr
*o
= ea_find(attrs
, EA_CODE(EAP_BGP
, BA_ORIGIN
));
1565 buf
+= bsprintf(buf
, " (%d", e
->pref
);
1566 if (e
->attrs
->hostentry
)
1568 if (!rte_resolvable(e
))
1569 buf
+= bsprintf(buf
, "/-");
1570 else if (e
->attrs
->igp_metric
>= IGP_METRIC_UNKNOWN
)
1571 buf
+= bsprintf(buf
, "/?");
1573 buf
+= bsprintf(buf
, "/%d", e
->attrs
->igp_metric
);
1575 buf
+= bsprintf(buf
, ") [");
1577 if (p
&& as_path_get_last(p
->u
.ptr
, &origas
))
1578 buf
+= bsprintf(buf
, "AS%u", origas
);
1580 buf
+= bsprintf(buf
, "%c", "ie?"[o
->u
.data
]);