1 /* $OpenBSD: ldpd.c,v 1.69 2023/03/08 04:43:13 guenther Exp $ */
2
3 /*
4 * Copyright (c) 2013, 2016 Renato Westphal <renato@openbsd.org>
5 * Copyright (c) 2005 Claudio Jeker <claudio@openbsd.org>
6 * Copyright (c) 2004, 2008 Esben Norby <norby@openbsd.org>
7 * Copyright (c) 2003, 2004 Henning Brauer <henning@openbsd.org>
8 *
9 * Permission to use, copy, modify, and distribute this software for any
10 * purpose with or without fee is hereby granted, provided that the above
11 * copyright notice and this permission notice appear in all copies.
12 *
13 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
14 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
15 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
16 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
17 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
18 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
19 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
20 */
21
22 #include <sys/types.h>
23 #include <sys/wait.h>
24 #include <err.h>
25 #include <errno.h>
26 #include <fcntl.h>
27 #include <pwd.h>
28 #include <stdio.h>
29 #include <stdlib.h>
30 #include <string.h>
31 #include <signal.h>
32 #include <unistd.h>
33
34 #include "ldpd.h"
35 #include "ldpe.h"
36 #include "lde.h"
37 #include "log.h"
38
39 static void main_sig_handler(int, short, void *);
40 static __dead void usage(void);
41 static __dead void ldpd_shutdown(void);
42 static pid_t start_child(enum ldpd_process, char *, int, int, int,
43 char *);
44 static void main_dispatch_ldpe(int, short, void *);
45 static void main_dispatch_lde(int, short, void *);
46 static int main_imsg_compose_both(enum imsg_type, void *,
47 uint16_t);
48 static int main_imsg_send_ipc_sockets(struct imsgbuf *,
49 struct imsgbuf *);
50 static void main_imsg_send_net_sockets(int);
51 static void main_imsg_send_net_socket(int, enum socket_type);
52 static int main_imsg_send_config(struct ldpd_conf *);
53 static int ldp_reload(void);
54 static void merge_global(struct ldpd_conf *, struct ldpd_conf *);
55 static void merge_af(int, struct ldpd_af_conf *,
56 struct ldpd_af_conf *);
57 static void merge_ifaces(struct ldpd_conf *, struct ldpd_conf *);
58 static void merge_iface_af(struct iface_af *, struct iface_af *);
59 static void merge_tnbrs(struct ldpd_conf *, struct ldpd_conf *);
60 static void merge_nbrps(struct ldpd_conf *, struct ldpd_conf *);
61 static void merge_l2vpns(struct ldpd_conf *, struct ldpd_conf *);
62 static void merge_l2vpn(struct ldpd_conf *, struct l2vpn *,
63 struct l2vpn *);
64 static void merge_auths(struct ldpd_conf *, struct ldpd_conf *);
65
66 enum ldpd_process ldpd_process;
67 struct ldpd_global global;
68 struct ldpd_conf *ldpd_conf;
69
70 static char *conffile;
71 static struct imsgev *iev_ldpe;
72 static struct imsgev *iev_lde;
73 static pid_t ldpe_pid;
74 static pid_t lde_pid;
75
76 static void
main_sig_handler(int sig,short event,void * arg)77 main_sig_handler(int sig, short event, void *arg)
78 {
79 /* signal handler rules don't apply, libevent decouples for us */
80 switch (sig) {
81 case SIGTERM:
82 case SIGINT:
83 ldpd_shutdown();
84 /* NOTREACHED */
85 case SIGHUP:
86 if (ldp_reload() == -1)
87 log_warnx("configuration reload failed");
88 else
89 log_debug("configuration reloaded");
90 break;
91 default:
92 fatalx("unexpected signal");
93 /* NOTREACHED */
94 }
95 }
96
97 static __dead void
usage(void)98 usage(void)
99 {
100 extern char *__progname;
101
102 fprintf(stderr, "usage: %s [-dnv] [-D macro=value] [-f file]"
103 " [-s socket]\n", __progname);
104 exit(1);
105 }
106
107 int
main(int argc,char * argv[])108 main(int argc, char *argv[])
109 {
110 struct event ev_sigint, ev_sigterm, ev_sighup;
111 char *saved_argv0;
112 int ch;
113 int debug = 0, lflag = 0, eflag = 0;
114 char *sockname;
115 int pipe_parent2ldpe[2];
116 int pipe_parent2lde[2];
117
118 conffile = CONF_FILE;
119 ldpd_process = PROC_MAIN;
120 log_procname = "parent";
121 sockname = LDPD_SOCKET;
122
123 log_init(1); /* log to stderr until daemonized */
124 log_verbose(1);
125
126 saved_argv0 = argv[0];
127 if (saved_argv0 == NULL)
128 saved_argv0 = "ldpd";
129
130 while ((ch = getopt(argc, argv, "dD:f:ns:vLE")) != -1) {
131 switch (ch) {
132 case 'd':
133 debug = 1;
134 break;
135 case 'D':
136 if (cmdline_symset(optarg) < 0)
137 log_warnx("could not parse macro definition %s",
138 optarg);
139 break;
140 case 'f':
141 conffile = optarg;
142 break;
143 case 'n':
144 global.cmd_opts |= LDPD_OPT_NOACTION;
145 break;
146 case 's':
147 sockname = optarg;
148 break;
149 case 'v':
150 if (global.cmd_opts & LDPD_OPT_VERBOSE)
151 global.cmd_opts |= LDPD_OPT_VERBOSE2;
152 global.cmd_opts |= LDPD_OPT_VERBOSE;
153 break;
154 case 'L':
155 lflag = 1;
156 break;
157 case 'E':
158 eflag = 1;
159 break;
160 default:
161 usage();
162 /* NOTREACHED */
163 }
164 }
165
166 argc -= optind;
167 argv += optind;
168 if (argc > 0 || (lflag && eflag))
169 usage();
170
171 if (lflag)
172 lde(debug, global.cmd_opts & LDPD_OPT_VERBOSE);
173 else if (eflag)
174 ldpe(debug, global.cmd_opts & LDPD_OPT_VERBOSE, sockname);
175
176 /* fetch interfaces early */
177 kif_init();
178
179 /* parse config file */
180 if ((ldpd_conf = parse_config(conffile)) == NULL ) {
181 kif_clear();
182 exit(1);
183 }
184
185 if (global.cmd_opts & LDPD_OPT_NOACTION) {
186 if (global.cmd_opts & LDPD_OPT_VERBOSE)
187 print_config(ldpd_conf);
188 else
189 fprintf(stderr, "configuration OK\n");
190 kif_clear();
191 exit(0);
192 }
193
194 /* check for root privileges */
195 if (geteuid())
196 errx(1, "need root privileges");
197
198 /* check for ldpd user */
199 if (getpwnam(LDPD_USER) == NULL)
200 errx(1, "unknown user %s", LDPD_USER);
201
202 log_init(debug);
203 log_verbose(global.cmd_opts & (LDPD_OPT_VERBOSE | LDPD_OPT_VERBOSE2));
204
205 if (!debug)
206 daemon(1, 0);
207
208 log_info("startup");
209
210 if (socketpair(AF_UNIX, SOCK_STREAM | SOCK_NONBLOCK | SOCK_CLOEXEC,
211 PF_UNSPEC, pipe_parent2ldpe) == -1)
212 fatal("socketpair");
213 if (socketpair(AF_UNIX, SOCK_STREAM | SOCK_NONBLOCK | SOCK_CLOEXEC,
214 PF_UNSPEC, pipe_parent2lde) == -1)
215 fatal("socketpair");
216
217 /* start children */
218 lde_pid = start_child(PROC_LDE_ENGINE, saved_argv0,
219 pipe_parent2lde[1], debug, global.cmd_opts & LDPD_OPT_VERBOSE,
220 NULL);
221 ldpe_pid = start_child(PROC_LDP_ENGINE, saved_argv0,
222 pipe_parent2ldpe[1], debug, global.cmd_opts & LDPD_OPT_VERBOSE,
223 sockname);
224
225 if (unveil("/", "r") == -1)
226 fatal("unveil /");
227 if (unveil(NULL, NULL) == -1)
228 fatal("unveil");
229
230 event_init();
231
232 /* setup signal handler */
233 signal_set(&ev_sigint, SIGINT, main_sig_handler, NULL);
234 signal_set(&ev_sigterm, SIGTERM, main_sig_handler, NULL);
235 signal_set(&ev_sighup, SIGHUP, main_sig_handler, NULL);
236 signal_add(&ev_sigint, NULL);
237 signal_add(&ev_sigterm, NULL);
238 signal_add(&ev_sighup, NULL);
239 signal(SIGPIPE, SIG_IGN);
240
241 /* setup pipes to children */
242 if ((iev_ldpe = malloc(sizeof(struct imsgev))) == NULL ||
243 (iev_lde = malloc(sizeof(struct imsgev))) == NULL)
244 fatal(NULL);
245 imsg_init(&iev_ldpe->ibuf, pipe_parent2ldpe[0]);
246 iev_ldpe->handler = main_dispatch_ldpe;
247 imsg_init(&iev_lde->ibuf, pipe_parent2lde[0]);
248 iev_lde->handler = main_dispatch_lde;
249
250 /* setup event handler */
251 iev_ldpe->events = EV_READ;
252 event_set(&iev_ldpe->ev, iev_ldpe->ibuf.fd, iev_ldpe->events,
253 iev_ldpe->handler, iev_ldpe);
254 event_add(&iev_ldpe->ev, NULL);
255
256 iev_lde->events = EV_READ;
257 event_set(&iev_lde->ev, iev_lde->ibuf.fd, iev_lde->events,
258 iev_lde->handler, iev_lde);
259 event_add(&iev_lde->ev, NULL);
260
261 if (main_imsg_send_ipc_sockets(&iev_ldpe->ibuf, &iev_lde->ibuf))
262 fatal("could not establish imsg links");
263 main_imsg_send_config(ldpd_conf);
264
265 if (kr_init(!(ldpd_conf->flags & F_LDPD_NO_FIB_UPDATE),
266 ldpd_conf->rdomain) == -1)
267 fatalx("kr_init failed");
268
269 /* notify ldpe about existing interfaces and addresses */
270 kif_redistribute(NULL);
271
272 if (ldpd_conf->ipv4.flags & F_LDPD_AF_ENABLED)
273 main_imsg_send_net_sockets(AF_INET);
274 if (ldpd_conf->ipv6.flags & F_LDPD_AF_ENABLED)
275 main_imsg_send_net_sockets(AF_INET6);
276
277 /* remove unneeded stuff from config */
278 /* ... */
279
280 event_dispatch();
281
282 ldpd_shutdown();
283 /* NOTREACHED */
284 return (0);
285 }
286
287 static __dead void
ldpd_shutdown(void)288 ldpd_shutdown(void)
289 {
290 pid_t pid;
291 int status;
292
293 /* close pipes */
294 msgbuf_clear(&iev_ldpe->ibuf.w);
295 close(iev_ldpe->ibuf.fd);
296 msgbuf_clear(&iev_lde->ibuf.w);
297 close(iev_lde->ibuf.fd);
298
299 kr_shutdown();
300 config_clear(ldpd_conf);
301
302 log_debug("waiting for children to terminate");
303 do {
304 pid = wait(&status);
305 if (pid == -1) {
306 if (errno != EINTR && errno != ECHILD)
307 fatal("wait");
308 } else if (WIFSIGNALED(status))
309 log_warnx("%s terminated; signal %d",
310 (pid == lde_pid) ? "label decision engine" :
311 "ldp engine", WTERMSIG(status));
312 } while (pid != -1 || (pid == -1 && errno == EINTR));
313
314 free(iev_ldpe);
315 free(iev_lde);
316
317 log_info("terminating");
318 exit(0);
319 }
320
321 static pid_t
start_child(enum ldpd_process p,char * argv0,int fd,int debug,int verbose,char * sockname)322 start_child(enum ldpd_process p, char *argv0, int fd, int debug, int verbose,
323 char *sockname)
324 {
325 char *argv[7];
326 int argc = 0;
327 pid_t pid;
328
329 switch (pid = fork()) {
330 case -1:
331 fatal("cannot fork");
332 case 0:
333 break;
334 default:
335 close(fd);
336 return (pid);
337 }
338
339 if (fd != 3) {
340 if (dup2(fd, 3) == -1)
341 fatal("cannot setup imsg fd");
342 } else if (fcntl(fd, F_SETFD, 0) == -1)
343 fatal("cannot setup imsg fd");
344
345 argv[argc++] = argv0;
346 switch (p) {
347 case PROC_MAIN:
348 fatalx("Can not start main process");
349 case PROC_LDE_ENGINE:
350 argv[argc++] = "-L";
351 break;
352 case PROC_LDP_ENGINE:
353 argv[argc++] = "-E";
354 break;
355 }
356 if (debug)
357 argv[argc++] = "-d";
358 if (verbose)
359 argv[argc++] = "-v";
360 if (sockname) {
361 argv[argc++] = "-s";
362 argv[argc++] = sockname;
363 }
364 argv[argc++] = NULL;
365
366 execvp(argv0, argv);
367 fatal("execvp");
368 }
369
370 /* imsg handling */
371 static void
main_dispatch_ldpe(int fd,short event,void * bula)372 main_dispatch_ldpe(int fd, short event, void *bula)
373 {
374 struct imsgev *iev = bula;
375 struct imsgbuf *ibuf = &iev->ibuf;
376 struct imsg imsg;
377 int af;
378 ssize_t n;
379 int shut = 0, verbose;
380
381 if (event & EV_READ) {
382 if ((n = imsg_read(ibuf)) == -1 && errno != EAGAIN)
383 fatal("imsg_read error");
384 if (n == 0) /* connection closed */
385 shut = 1;
386 }
387 if (event & EV_WRITE) {
388 if ((n = msgbuf_write(&ibuf->w)) == -1 && errno != EAGAIN)
389 fatal("msgbuf_write");
390 if (n == 0)
391 shut = 1;
392 }
393
394 for (;;) {
395 if ((n = imsg_get(ibuf, &imsg)) == -1)
396 fatal("imsg_get");
397
398 if (n == 0)
399 break;
400
401 switch (imsg.hdr.type) {
402 case IMSG_REQUEST_SOCKETS:
403 af = imsg.hdr.pid;
404 main_imsg_send_net_sockets(af);
405 break;
406 case IMSG_CTL_RELOAD:
407 if (ldp_reload() == -1)
408 log_warnx("configuration reload failed");
409 else
410 log_debug("configuration reloaded");
411 break;
412 case IMSG_CTL_FIB_COUPLE:
413 kr_fib_couple();
414 break;
415 case IMSG_CTL_FIB_DECOUPLE:
416 kr_fib_decouple();
417 break;
418 case IMSG_CTL_KROUTE:
419 case IMSG_CTL_KROUTE_ADDR:
420 kr_show_route(&imsg);
421 break;
422 case IMSG_CTL_IFINFO:
423 if (imsg.hdr.len == IMSG_HEADER_SIZE)
424 kr_ifinfo(NULL, imsg.hdr.pid);
425 else if (imsg.hdr.len == IMSG_HEADER_SIZE + IFNAMSIZ)
426 kr_ifinfo(imsg.data, imsg.hdr.pid);
427 else
428 log_warnx("IFINFO request with wrong len");
429 break;
430 case IMSG_CTL_LOG_VERBOSE:
431 /* already checked by ldpe */
432 memcpy(&verbose, imsg.data, sizeof(verbose));
433 log_verbose(verbose);
434 break;
435 default:
436 log_debug("%s: error handling imsg %d", __func__,
437 imsg.hdr.type);
438 break;
439 }
440 imsg_free(&imsg);
441 }
442 if (!shut)
443 imsg_event_add(iev);
444 else {
445 /* this pipe is dead, so remove the event handler */
446 event_del(&iev->ev);
447 event_loopexit(NULL);
448 }
449 }
450
451 static void
main_dispatch_lde(int fd,short event,void * bula)452 main_dispatch_lde(int fd, short event, void *bula)
453 {
454 struct imsgev *iev = bula;
455 struct imsgbuf *ibuf = &iev->ibuf;
456 struct imsg imsg;
457 ssize_t n;
458 int shut = 0;
459
460 if (event & EV_READ) {
461 if ((n = imsg_read(ibuf)) == -1 && errno != EAGAIN)
462 fatal("imsg_read error");
463 if (n == 0) /* connection closed */
464 shut = 1;
465 }
466 if (event & EV_WRITE) {
467 if ((n = msgbuf_write(&ibuf->w)) == -1 && errno != EAGAIN)
468 fatal("msgbuf_write");
469 if (n == 0)
470 shut = 1;
471 }
472
473 for (;;) {
474 if ((n = imsg_get(ibuf, &imsg)) == -1)
475 fatal("imsg_get");
476
477 if (n == 0)
478 break;
479
480 switch (imsg.hdr.type) {
481 case IMSG_KLABEL_CHANGE:
482 if (imsg.hdr.len - IMSG_HEADER_SIZE !=
483 sizeof(struct kroute))
484 fatalx("invalid size of IMSG_KLABEL_CHANGE");
485 if (kr_change(imsg.data))
486 log_warnx("%s: error changing route", __func__);
487 break;
488 case IMSG_KLABEL_DELETE:
489 if (imsg.hdr.len - IMSG_HEADER_SIZE !=
490 sizeof(struct kroute))
491 fatalx("invalid size of IMSG_KLABEL_DELETE");
492 if (kr_delete(imsg.data))
493 log_warnx("%s: error deleting route", __func__);
494 break;
495 case IMSG_KPWLABEL_CHANGE:
496 if (imsg.hdr.len - IMSG_HEADER_SIZE !=
497 sizeof(struct kpw))
498 fatalx("invalid size of IMSG_KPWLABEL_CHANGE");
499 if (kmpw_set(imsg.data))
500 log_warnx("%s: error changing pseudowire",
501 __func__);
502 break;
503 case IMSG_KPWLABEL_DELETE:
504 if (imsg.hdr.len - IMSG_HEADER_SIZE !=
505 sizeof(struct kpw))
506 fatalx("invalid size of IMSG_KPWLABEL_DELETE");
507 if (kmpw_unset(imsg.data))
508 log_warnx("%s: error unsetting pseudowire",
509 __func__);
510 break;
511 default:
512 log_debug("%s: error handling imsg %d", __func__,
513 imsg.hdr.type);
514 break;
515 }
516 imsg_free(&imsg);
517 }
518 if (!shut)
519 imsg_event_add(iev);
520 else {
521 /* this pipe is dead, so remove the event handler */
522 event_del(&iev->ev);
523 event_loopexit(NULL);
524 }
525 }
526
527 void
main_imsg_compose_ldpe(int type,pid_t pid,void * data,uint16_t datalen)528 main_imsg_compose_ldpe(int type, pid_t pid, void *data, uint16_t datalen)
529 {
530 if (iev_ldpe == NULL)
531 return;
532 imsg_compose_event(iev_ldpe, type, 0, pid, -1, data, datalen);
533 }
534
535 void
main_imsg_compose_lde(int type,pid_t pid,void * data,uint16_t datalen)536 main_imsg_compose_lde(int type, pid_t pid, void *data, uint16_t datalen)
537 {
538 imsg_compose_event(iev_lde, type, 0, pid, -1, data, datalen);
539 }
540
541 static int
main_imsg_compose_both(enum imsg_type type,void * buf,uint16_t len)542 main_imsg_compose_both(enum imsg_type type, void *buf, uint16_t len)
543 {
544 if (imsg_compose_event(iev_ldpe, type, 0, 0, -1, buf, len) == -1)
545 return (-1);
546 if (imsg_compose_event(iev_lde, type, 0, 0, -1, buf, len) == -1)
547 return (-1);
548 return (0);
549 }
550
551 void
imsg_event_add(struct imsgev * iev)552 imsg_event_add(struct imsgev *iev)
553 {
554 iev->events = EV_READ;
555 if (iev->ibuf.w.queued)
556 iev->events |= EV_WRITE;
557
558 event_del(&iev->ev);
559 event_set(&iev->ev, iev->ibuf.fd, iev->events, iev->handler, iev);
560 event_add(&iev->ev, NULL);
561 }
562
563 int
imsg_compose_event(struct imsgev * iev,uint16_t type,uint32_t peerid,pid_t pid,int fd,void * data,uint16_t datalen)564 imsg_compose_event(struct imsgev *iev, uint16_t type, uint32_t peerid,
565 pid_t pid, int fd, void *data, uint16_t datalen)
566 {
567 int ret;
568
569 if ((ret = imsg_compose(&iev->ibuf, type, peerid,
570 pid, fd, data, datalen)) != -1)
571 imsg_event_add(iev);
572 return (ret);
573 }
574
575 void
evbuf_enqueue(struct evbuf * eb,struct ibuf * buf)576 evbuf_enqueue(struct evbuf *eb, struct ibuf *buf)
577 {
578 ibuf_close(&eb->wbuf, buf);
579 evbuf_event_add(eb);
580 }
581
582 void
evbuf_event_add(struct evbuf * eb)583 evbuf_event_add(struct evbuf *eb)
584 {
585 if (eb->wbuf.queued)
586 event_add(&eb->ev, NULL);
587 }
588
589 void
evbuf_init(struct evbuf * eb,int fd,void (* handler)(int,short,void *),void * arg)590 evbuf_init(struct evbuf *eb, int fd, void (*handler)(int, short, void *),
591 void *arg)
592 {
593 msgbuf_init(&eb->wbuf);
594 eb->wbuf.fd = fd;
595 event_set(&eb->ev, eb->wbuf.fd, EV_WRITE, handler, arg);
596 }
597
598 void
evbuf_clear(struct evbuf * eb)599 evbuf_clear(struct evbuf *eb)
600 {
601 event_del(&eb->ev);
602 msgbuf_clear(&eb->wbuf);
603 eb->wbuf.fd = -1;
604 }
605
606 static int
main_imsg_send_ipc_sockets(struct imsgbuf * ldpe_buf,struct imsgbuf * lde_buf)607 main_imsg_send_ipc_sockets(struct imsgbuf *ldpe_buf, struct imsgbuf *lde_buf)
608 {
609 int pipe_ldpe2lde[2];
610
611 if (socketpair(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC | SOCK_NONBLOCK,
612 PF_UNSPEC, pipe_ldpe2lde) == -1)
613 return (-1);
614
615 if (imsg_compose(ldpe_buf, IMSG_SOCKET_IPC, 0, 0, pipe_ldpe2lde[0],
616 NULL, 0) == -1)
617 return (-1);
618 if (imsg_compose(lde_buf, IMSG_SOCKET_IPC, 0, 0, pipe_ldpe2lde[1],
619 NULL, 0) == -1)
620 return (-1);
621
622 return (0);
623 }
624
625 static void
main_imsg_send_net_sockets(int af)626 main_imsg_send_net_sockets(int af)
627 {
628 main_imsg_send_net_socket(af, LDP_SOCKET_DISC);
629 main_imsg_send_net_socket(af, LDP_SOCKET_EDISC);
630 main_imsg_send_net_socket(af, LDP_SOCKET_SESSION);
631 imsg_compose_event(iev_ldpe, IMSG_SETUP_SOCKETS, af, 0, -1, NULL, 0);
632 }
633
634 static void
main_imsg_send_net_socket(int af,enum socket_type type)635 main_imsg_send_net_socket(int af, enum socket_type type)
636 {
637 int fd;
638
639 fd = ldp_create_socket(af, type);
640 if (fd == -1) {
641 log_warnx("%s: failed to create %s socket for address-family "
642 "%s", __func__, socket_name(type), af_name(af));
643 return;
644 }
645
646 imsg_compose_event(iev_ldpe, IMSG_SOCKET_NET, af, 0, fd, &type,
647 sizeof(type));
648 }
649
650 struct ldpd_af_conf *
ldp_af_conf_get(struct ldpd_conf * xconf,int af)651 ldp_af_conf_get(struct ldpd_conf *xconf, int af)
652 {
653 switch (af) {
654 case AF_INET:
655 return (&xconf->ipv4);
656 case AF_INET6:
657 return (&xconf->ipv6);
658 default:
659 fatalx("ldp_af_conf_get: unknown af");
660 }
661 }
662
663 struct ldpd_af_global *
ldp_af_global_get(struct ldpd_global * xglobal,int af)664 ldp_af_global_get(struct ldpd_global *xglobal, int af)
665 {
666 switch (af) {
667 case AF_INET:
668 return (&xglobal->ipv4);
669 case AF_INET6:
670 return (&xglobal->ipv6);
671 default:
672 fatalx("ldp_af_global_get: unknown af");
673 }
674 }
675
676 int
ldp_is_dual_stack(struct ldpd_conf * xconf)677 ldp_is_dual_stack(struct ldpd_conf *xconf)
678 {
679 return ((xconf->ipv4.flags & F_LDPD_AF_ENABLED) &&
680 (xconf->ipv6.flags & F_LDPD_AF_ENABLED));
681 }
682
683 static int
main_imsg_send_config(struct ldpd_conf * xconf)684 main_imsg_send_config(struct ldpd_conf *xconf)
685 {
686 struct iface *iface;
687 struct tnbr *tnbr;
688 struct nbr_params *nbrp;
689 struct l2vpn *l2vpn;
690 struct l2vpn_if *lif;
691 struct l2vpn_pw *pw;
692 struct ldp_auth *auth;
693
694 if (main_imsg_compose_both(IMSG_RECONF_CONF, xconf,
695 sizeof(*xconf)) == -1)
696 return (-1);
697
698 LIST_FOREACH(auth, &xconf->auth_list, entry) {
699 if (main_imsg_compose_both(IMSG_RECONF_CONF_AUTH,
700 auth, sizeof(*auth)) == -1)
701 return (-1);
702 }
703
704 LIST_FOREACH(iface, &xconf->iface_list, entry) {
705 if (main_imsg_compose_both(IMSG_RECONF_IFACE, iface,
706 sizeof(*iface)) == -1)
707 return (-1);
708 }
709
710 LIST_FOREACH(tnbr, &xconf->tnbr_list, entry) {
711 if (main_imsg_compose_both(IMSG_RECONF_TNBR, tnbr,
712 sizeof(*tnbr)) == -1)
713 return (-1);
714 }
715
716 LIST_FOREACH(nbrp, &xconf->nbrp_list, entry) {
717 if (main_imsg_compose_both(IMSG_RECONF_NBRP, nbrp,
718 sizeof(*nbrp)) == -1)
719 return (-1);
720 }
721
722 LIST_FOREACH(l2vpn, &xconf->l2vpn_list, entry) {
723 if (main_imsg_compose_both(IMSG_RECONF_L2VPN, l2vpn,
724 sizeof(*l2vpn)) == -1)
725 return (-1);
726
727 LIST_FOREACH(lif, &l2vpn->if_list, entry) {
728 if (main_imsg_compose_both(IMSG_RECONF_L2VPN_IF, lif,
729 sizeof(*lif)) == -1)
730 return (-1);
731 }
732 LIST_FOREACH(pw, &l2vpn->pw_list, entry) {
733 if (main_imsg_compose_both(IMSG_RECONF_L2VPN_PW, pw,
734 sizeof(*pw)) == -1)
735 return (-1);
736 }
737 }
738
739 if (main_imsg_compose_both(IMSG_RECONF_END, NULL, 0) == -1)
740 return (-1);
741
742 return (0);
743 }
744
745 static int
ldp_reload(void)746 ldp_reload(void)
747 {
748 struct ldpd_conf *xconf;
749
750 if ((xconf = parse_config(conffile)) == NULL)
751 return (-1);
752
753 if (main_imsg_send_config(xconf) == -1)
754 return (-1);
755
756 merge_config(ldpd_conf, xconf);
757
758 return (0);
759 }
760
761 void
merge_config(struct ldpd_conf * conf,struct ldpd_conf * xconf)762 merge_config(struct ldpd_conf *conf, struct ldpd_conf *xconf)
763 {
764 merge_global(conf, xconf);
765 merge_auths(conf, xconf);
766 merge_af(AF_INET, &conf->ipv4, &xconf->ipv4);
767 merge_af(AF_INET6, &conf->ipv6, &xconf->ipv6);
768 merge_ifaces(conf, xconf);
769 merge_tnbrs(conf, xconf);
770 merge_nbrps(conf, xconf);
771 merge_l2vpns(conf, xconf);
772 free(xconf);
773 }
774
775 static void
merge_global(struct ldpd_conf * conf,struct ldpd_conf * xconf)776 merge_global(struct ldpd_conf *conf, struct ldpd_conf *xconf)
777 {
778 /* change of router-id requires resetting all neighborships */
779 if (conf->rtr_id.s_addr != xconf->rtr_id.s_addr) {
780 if (ldpd_process == PROC_LDP_ENGINE) {
781 ldpe_reset_nbrs(AF_INET);
782 ldpe_reset_nbrs(AF_INET6);
783 if (conf->rtr_id.s_addr == INADDR_ANY ||
784 xconf->rtr_id.s_addr == INADDR_ANY) {
785 if_update_all(AF_UNSPEC);
786 tnbr_update_all(AF_UNSPEC);
787 }
788 }
789 conf->rtr_id = xconf->rtr_id;
790 }
791
792 conf->rdomain= xconf->rdomain;
793
794 if (conf->trans_pref != xconf->trans_pref) {
795 if (ldpd_process == PROC_LDP_ENGINE)
796 ldpe_reset_ds_nbrs();
797 conf->trans_pref = xconf->trans_pref;
798 }
799
800 if ((conf->flags & F_LDPD_DS_CISCO_INTEROP) !=
801 (xconf->flags & F_LDPD_DS_CISCO_INTEROP)) {
802 if (ldpd_process == PROC_LDP_ENGINE)
803 ldpe_reset_ds_nbrs();
804 }
805
806 conf->flags = xconf->flags;
807 }
808
809 static void
merge_af(int af,struct ldpd_af_conf * af_conf,struct ldpd_af_conf * xa)810 merge_af(int af, struct ldpd_af_conf *af_conf, struct ldpd_af_conf *xa)
811 {
812 int egress_label_changed = 0;
813 int update_sockets = 0;
814
815 if (af_conf->keepalive != xa->keepalive) {
816 af_conf->keepalive = xa->keepalive;
817 if (ldpd_process == PROC_LDP_ENGINE)
818 ldpe_stop_init_backoff(af);
819 }
820 af_conf->thello_holdtime = xa->thello_holdtime;
821 af_conf->thello_interval = xa->thello_interval;
822
823 /* update flags */
824 if (ldpd_process == PROC_LDP_ENGINE &&
825 (af_conf->flags & F_LDPD_AF_THELLO_ACCEPT) &&
826 !(xa->flags & F_LDPD_AF_THELLO_ACCEPT))
827 ldpe_remove_dynamic_tnbrs(af);
828
829 if ((af_conf->flags & F_LDPD_AF_NO_GTSM) !=
830 (xa->flags & F_LDPD_AF_NO_GTSM)) {
831 if (af == AF_INET6)
832 /* need to set/unset IPV6_MINHOPCOUNT */
833 update_sockets = 1;
834 else if (ldpd_process == PROC_LDP_ENGINE)
835 /* for LDPv4 just resetting the neighbors is enough */
836 ldpe_reset_nbrs(af);
837 }
838
839 if ((af_conf->flags & F_LDPD_AF_EXPNULL) !=
840 (xa->flags & F_LDPD_AF_EXPNULL))
841 egress_label_changed = 1;
842
843 af_conf->flags = xa->flags;
844
845 if (egress_label_changed) {
846 switch (ldpd_process) {
847 case PROC_LDE_ENGINE:
848 lde_change_egress_label(af, af_conf->flags &
849 F_LDPD_AF_EXPNULL);
850 break;
851 case PROC_MAIN:
852 kr_change_egress_label(af, af_conf->flags &
853 F_LDPD_AF_EXPNULL);
854 break;
855 default:
856 break;
857 }
858 }
859
860 if (ldp_addrcmp(af, &af_conf->trans_addr, &xa->trans_addr)) {
861 af_conf->trans_addr = xa->trans_addr;
862 update_sockets = 1;
863 }
864
865 if (ldpd_process == PROC_MAIN && update_sockets)
866 imsg_compose_event(iev_ldpe, IMSG_CLOSE_SOCKETS, af, 0, -1,
867 NULL, 0);
868 }
869
870 static void
merge_ifaces(struct ldpd_conf * conf,struct ldpd_conf * xconf)871 merge_ifaces(struct ldpd_conf *conf, struct ldpd_conf *xconf)
872 {
873 struct iface *iface, *itmp, *xi;
874
875 LIST_FOREACH_SAFE(iface, &conf->iface_list, entry, itmp) {
876 /* find deleted interfaces */
877 if ((xi = if_lookup(xconf, iface->ifindex)) == NULL) {
878 LIST_REMOVE(iface, entry);
879 if (ldpd_process == PROC_LDP_ENGINE)
880 if_exit(iface);
881 free(iface);
882 }
883 }
884 LIST_FOREACH_SAFE(xi, &xconf->iface_list, entry, itmp) {
885 /* find new interfaces */
886 if ((iface = if_lookup(conf, xi->ifindex)) == NULL) {
887 LIST_REMOVE(xi, entry);
888 LIST_INSERT_HEAD(&conf->iface_list, xi, entry);
889
890 /* resend addresses to activate new interfaces */
891 if (ldpd_process == PROC_MAIN)
892 kif_redistribute(xi->name);
893 continue;
894 }
895
896 /* update existing interfaces */
897 merge_iface_af(&iface->ipv4, &xi->ipv4);
898 merge_iface_af(&iface->ipv6, &xi->ipv6);
899 LIST_REMOVE(xi, entry);
900 free(xi);
901 }
902 }
903
904 static void
merge_iface_af(struct iface_af * ia,struct iface_af * xi)905 merge_iface_af(struct iface_af *ia, struct iface_af *xi)
906 {
907 if (ia->enabled != xi->enabled) {
908 ia->enabled = xi->enabled;
909 if (ldpd_process == PROC_LDP_ENGINE)
910 if_update(ia->iface, ia->af);
911 }
912 ia->hello_holdtime = xi->hello_holdtime;
913 ia->hello_interval = xi->hello_interval;
914 }
915
916 static void
merge_tnbrs(struct ldpd_conf * conf,struct ldpd_conf * xconf)917 merge_tnbrs(struct ldpd_conf *conf, struct ldpd_conf *xconf)
918 {
919 struct tnbr *tnbr, *ttmp, *xt;
920
921 LIST_FOREACH_SAFE(tnbr, &conf->tnbr_list, entry, ttmp) {
922 if (!(tnbr->flags & F_TNBR_CONFIGURED))
923 continue;
924
925 /* find deleted tnbrs */
926 if ((xt = tnbr_find(xconf, tnbr->af, &tnbr->addr)) == NULL) {
927 if (ldpd_process == PROC_LDP_ENGINE) {
928 tnbr->flags &= ~F_TNBR_CONFIGURED;
929 tnbr_check(tnbr);
930 } else {
931 LIST_REMOVE(tnbr, entry);
932 free(tnbr);
933 }
934 }
935 }
936 LIST_FOREACH_SAFE(xt, &xconf->tnbr_list, entry, ttmp) {
937 /* find new tnbrs */
938 if ((tnbr = tnbr_find(conf, xt->af, &xt->addr)) == NULL) {
939 LIST_REMOVE(xt, entry);
940 LIST_INSERT_HEAD(&conf->tnbr_list, xt, entry);
941
942 if (ldpd_process == PROC_LDP_ENGINE)
943 tnbr_update(xt);
944 continue;
945 }
946
947 /* update existing tnbrs */
948 if (!(tnbr->flags & F_TNBR_CONFIGURED))
949 tnbr->flags |= F_TNBR_CONFIGURED;
950 tnbr->hello_holdtime = xt->hello_holdtime;
951 tnbr->hello_interval = xt->hello_interval;
952 LIST_REMOVE(xt, entry);
953 free(xt);
954 }
955 }
956
957 static void
merge_nbrps(struct ldpd_conf * conf,struct ldpd_conf * xconf)958 merge_nbrps(struct ldpd_conf *conf, struct ldpd_conf *xconf)
959 {
960 struct nbr_params *nbrp, *ntmp, *xn;
961 struct nbr *nbr;
962 int nbrp_changed;
963
964 LIST_FOREACH_SAFE(nbrp, &conf->nbrp_list, entry, ntmp) {
965 /* find deleted nbrps */
966 if ((xn = nbr_params_find(xconf, nbrp->lsr_id)) == NULL) {
967 if (ldpd_process == PROC_LDP_ENGINE) {
968 nbr = nbr_find_ldpid(nbrp->lsr_id.s_addr);
969 if (nbr) {
970 session_shutdown(nbr, S_SHUTDOWN, 0, 0);
971 pfkey_remove(nbr);
972 if (nbr_session_active_role(nbr))
973 nbr_establish_connection(nbr);
974 }
975 }
976 LIST_REMOVE(nbrp, entry);
977 free(nbrp);
978 }
979 }
980 LIST_FOREACH_SAFE(xn, &xconf->nbrp_list, entry, ntmp) {
981 /* find new nbrps */
982 if ((nbrp = nbr_params_find(conf, xn->lsr_id)) == NULL) {
983 LIST_REMOVE(xn, entry);
984 LIST_INSERT_HEAD(&conf->nbrp_list, xn, entry);
985
986 if (ldpd_process == PROC_LDP_ENGINE) {
987 nbr = nbr_find_ldpid(xn->lsr_id.s_addr);
988 if (nbr) {
989 session_shutdown(nbr, S_SHUTDOWN, 0, 0);
990 if (pfkey_establish(conf, nbr) == -1)
991 fatalx("pfkey setup failed");
992 if (nbr_session_active_role(nbr))
993 nbr_establish_connection(nbr);
994 }
995 }
996 continue;
997 }
998
999 /* update existing nbrps */
1000 if (nbrp->flags != xn->flags ||
1001 nbrp->keepalive != xn->keepalive ||
1002 nbrp->gtsm_enabled != xn->gtsm_enabled ||
1003 nbrp->gtsm_hops != xn->gtsm_hops)
1004 nbrp_changed = 1;
1005 else
1006 nbrp_changed = 0;
1007
1008 nbrp->keepalive = xn->keepalive;
1009 nbrp->gtsm_enabled = xn->gtsm_enabled;
1010 nbrp->gtsm_hops = xn->gtsm_hops;
1011 nbrp->flags = xn->flags;
1012
1013 if (ldpd_process == PROC_LDP_ENGINE) {
1014 nbr = nbr_find_ldpid(nbrp->lsr_id.s_addr);
1015 if (nbr && nbrp_changed) {
1016 session_shutdown(nbr, S_SHUTDOWN, 0, 0);
1017 pfkey_remove(nbr);
1018 if (pfkey_establish(conf, nbr) == -1)
1019 fatalx("pfkey setup failed");
1020 if (nbr_session_active_role(nbr))
1021 nbr_establish_connection(nbr);
1022 }
1023 }
1024 LIST_REMOVE(xn, entry);
1025 free(xn);
1026 }
1027 }
1028
1029 static void
merge_l2vpns(struct ldpd_conf * conf,struct ldpd_conf * xconf)1030 merge_l2vpns(struct ldpd_conf *conf, struct ldpd_conf *xconf)
1031 {
1032 struct l2vpn *l2vpn, *ltmp, *xl;
1033
1034 LIST_FOREACH_SAFE(l2vpn, &conf->l2vpn_list, entry, ltmp) {
1035 /* find deleted l2vpns */
1036 if ((xl = l2vpn_find(xconf, l2vpn->name)) == NULL) {
1037 LIST_REMOVE(l2vpn, entry);
1038
1039 switch (ldpd_process) {
1040 case PROC_LDE_ENGINE:
1041 l2vpn_exit(l2vpn);
1042 break;
1043 case PROC_LDP_ENGINE:
1044 ldpe_l2vpn_exit(l2vpn);
1045 break;
1046 case PROC_MAIN:
1047 break;
1048 }
1049 l2vpn_del(l2vpn);
1050 }
1051 }
1052 LIST_FOREACH_SAFE(xl, &xconf->l2vpn_list, entry, ltmp) {
1053 /* find new l2vpns */
1054 if ((l2vpn = l2vpn_find(conf, xl->name)) == NULL) {
1055 LIST_REMOVE(xl, entry);
1056 LIST_INSERT_HEAD(&conf->l2vpn_list, xl, entry);
1057
1058 switch (ldpd_process) {
1059 case PROC_LDE_ENGINE:
1060 l2vpn_init(xl);
1061 break;
1062 case PROC_LDP_ENGINE:
1063 ldpe_l2vpn_init(xl);
1064 break;
1065 case PROC_MAIN:
1066 break;
1067 }
1068 continue;
1069 }
1070
1071 /* update existing l2vpns */
1072 merge_l2vpn(conf, l2vpn, xl);
1073 LIST_REMOVE(xl, entry);
1074 free(xl);
1075 }
1076 }
1077
1078 static void
merge_l2vpn(struct ldpd_conf * xconf,struct l2vpn * l2vpn,struct l2vpn * xl)1079 merge_l2vpn(struct ldpd_conf *xconf, struct l2vpn *l2vpn, struct l2vpn *xl)
1080 {
1081 struct l2vpn_if *lif, *ftmp, *xf;
1082 struct l2vpn_pw *pw, *ptmp, *xp;
1083 struct nbr *nbr;
1084 int reset_nbr, reinstall_pwfec, reinstall_tnbr;
1085 int previous_pw_type, previous_mtu;
1086
1087 previous_pw_type = l2vpn->pw_type;
1088 previous_mtu = l2vpn->mtu;
1089
1090 /* merge intefaces */
1091 LIST_FOREACH_SAFE(lif, &l2vpn->if_list, entry, ftmp) {
1092 /* find deleted interfaces */
1093 if ((xf = l2vpn_if_find(xl, lif->ifindex)) == NULL) {
1094 LIST_REMOVE(lif, entry);
1095 free(lif);
1096 }
1097 }
1098 LIST_FOREACH_SAFE(xf, &xl->if_list, entry, ftmp) {
1099 /* find new interfaces */
1100 if ((lif = l2vpn_if_find(l2vpn, xf->ifindex)) == NULL) {
1101 LIST_REMOVE(xf, entry);
1102 LIST_INSERT_HEAD(&l2vpn->if_list, xf, entry);
1103 xf->l2vpn = l2vpn;
1104 continue;
1105 }
1106
1107 LIST_REMOVE(xf, entry);
1108 free(xf);
1109 }
1110
1111 /* merge pseudowires */
1112 LIST_FOREACH_SAFE(pw, &l2vpn->pw_list, entry, ptmp) {
1113 /* find deleted pseudowires */
1114 if ((xp = l2vpn_pw_find(xl, pw->ifindex)) == NULL) {
1115 switch (ldpd_process) {
1116 case PROC_LDE_ENGINE:
1117 l2vpn_pw_exit(pw);
1118 break;
1119 case PROC_LDP_ENGINE:
1120 ldpe_l2vpn_pw_exit(pw);
1121 break;
1122 case PROC_MAIN:
1123 break;
1124 }
1125
1126 LIST_REMOVE(pw, entry);
1127 free(pw);
1128 }
1129 }
1130 LIST_FOREACH_SAFE(xp, &xl->pw_list, entry, ptmp) {
1131 /* find new pseudowires */
1132 if ((pw = l2vpn_pw_find(l2vpn, xp->ifindex)) == NULL) {
1133 LIST_REMOVE(xp, entry);
1134 LIST_INSERT_HEAD(&l2vpn->pw_list, xp, entry);
1135 xp->l2vpn = l2vpn;
1136
1137 switch (ldpd_process) {
1138 case PROC_LDE_ENGINE:
1139 l2vpn_pw_init(xp);
1140 break;
1141 case PROC_LDP_ENGINE:
1142 ldpe_l2vpn_pw_init(xp);
1143 break;
1144 case PROC_MAIN:
1145 break;
1146 }
1147 continue;
1148 }
1149
1150 /* update existing pseudowire */
1151 if (pw->af != xp->af ||
1152 ldp_addrcmp(pw->af, &pw->addr, &xp->addr))
1153 reinstall_tnbr = 1;
1154 else
1155 reinstall_tnbr = 0;
1156
1157 /* changes that require a session restart */
1158 if ((pw->flags & (F_PW_STATUSTLV_CONF|F_PW_CWORD_CONF)) !=
1159 (xp->flags & (F_PW_STATUSTLV_CONF|F_PW_CWORD_CONF)))
1160 reset_nbr = 1;
1161 else
1162 reset_nbr = 0;
1163
1164 if (l2vpn->pw_type != xl->pw_type || l2vpn->mtu != xl->mtu ||
1165 pw->pwid != xp->pwid || reinstall_tnbr || reset_nbr ||
1166 pw->lsr_id.s_addr != xp->lsr_id.s_addr)
1167 reinstall_pwfec = 1;
1168 else
1169 reinstall_pwfec = 0;
1170
1171 if (ldpd_process == PROC_LDP_ENGINE) {
1172 if (reinstall_tnbr)
1173 ldpe_l2vpn_pw_exit(pw);
1174 if (reset_nbr) {
1175 nbr = nbr_find_ldpid(pw->lsr_id.s_addr);
1176 if (nbr && nbr->state == NBR_STA_OPER)
1177 session_shutdown(nbr, S_SHUTDOWN, 0, 0);
1178 }
1179 }
1180 if (ldpd_process == PROC_LDE_ENGINE &&
1181 !reset_nbr && reinstall_pwfec)
1182 l2vpn_pw_exit(pw);
1183 pw->lsr_id = xp->lsr_id;
1184 pw->af = xp->af;
1185 pw->addr = xp->addr;
1186 pw->pwid = xp->pwid;
1187 strlcpy(pw->ifname, xp->ifname, sizeof(pw->ifname));
1188 pw->ifindex = xp->ifindex;
1189 if (xp->flags & F_PW_CWORD_CONF)
1190 pw->flags |= F_PW_CWORD_CONF;
1191 else
1192 pw->flags &= ~F_PW_CWORD_CONF;
1193 if (xp->flags & F_PW_STATUSTLV_CONF)
1194 pw->flags |= F_PW_STATUSTLV_CONF;
1195 else
1196 pw->flags &= ~F_PW_STATUSTLV_CONF;
1197 if (ldpd_process == PROC_LDP_ENGINE && reinstall_tnbr)
1198 ldpe_l2vpn_pw_init(pw);
1199 if (ldpd_process == PROC_LDE_ENGINE &&
1200 !reset_nbr && reinstall_pwfec) {
1201 l2vpn->pw_type = xl->pw_type;
1202 l2vpn->mtu = xl->mtu;
1203 l2vpn_pw_init(pw);
1204 l2vpn->pw_type = previous_pw_type;
1205 l2vpn->mtu = previous_mtu;
1206 }
1207
1208 LIST_REMOVE(xp, entry);
1209 free(xp);
1210 }
1211
1212 l2vpn->pw_type = xl->pw_type;
1213 l2vpn->mtu = xl->mtu;
1214 strlcpy(l2vpn->br_ifname, xl->br_ifname, sizeof(l2vpn->br_ifname));
1215 l2vpn->br_ifindex = xl->br_ifindex;
1216 }
1217
1218 static struct ldp_auth *
auth_find(struct ldpd_conf * conf,const struct ldp_auth * needle)1219 auth_find(struct ldpd_conf *conf, const struct ldp_auth *needle)
1220 {
1221 struct ldp_auth *auth;
1222
1223 LIST_FOREACH(auth, &conf->auth_list, entry) {
1224 in_addr_t mask;
1225 if (needle->md5key_len != auth->md5key_len)
1226 continue;
1227 if (needle->idlen != auth->idlen)
1228 continue;
1229
1230 if (memcmp(needle->md5key, auth->md5key,
1231 needle->md5key_len) != 0)
1232 continue;
1233
1234 mask = prefixlen2mask(auth->idlen);
1235 if ((needle->id.s_addr & mask) != (auth->id.s_addr & mask))
1236 continue;
1237
1238 return (auth);
1239 }
1240
1241 return (NULL);
1242 }
1243
1244 static void
merge_auths(struct ldpd_conf * conf,struct ldpd_conf * xconf)1245 merge_auths(struct ldpd_conf *conf, struct ldpd_conf *xconf)
1246 {
1247 struct ldp_auth *auth, *nauth, *xauth;
1248
1249 /* find deleted auths */
1250 LIST_FOREACH_SAFE(auth, &conf->auth_list, entry, nauth) {
1251 xauth = auth_find(xconf, auth);
1252 if (xauth == NULL)
1253 continue;
1254
1255 LIST_REMOVE(auth, entry);
1256
1257 free(auth);
1258 }
1259
1260 /* find new auths */
1261 LIST_FOREACH_SAFE(xauth, &xconf->auth_list, entry, nauth) {
1262 LIST_REMOVE(xauth, entry);
1263
1264 auth = auth_find(conf, xauth);
1265 if (auth == NULL) {
1266 LIST_INSERT_HEAD(&conf->auth_list, xauth, entry);
1267 continue;
1268 }
1269
1270 free(xauth);
1271 }
1272 }
1273
1274 struct ldpd_conf *
config_new_empty(void)1275 config_new_empty(void)
1276 {
1277 struct ldpd_conf *xconf;
1278
1279 xconf = calloc(1, sizeof(*xconf));
1280 if (xconf == NULL)
1281 fatal(NULL);
1282
1283 LIST_INIT(&xconf->iface_list);
1284 LIST_INIT(&xconf->tnbr_list);
1285 LIST_INIT(&xconf->nbrp_list);
1286 LIST_INIT(&xconf->l2vpn_list);
1287 LIST_INIT(&xconf->auth_list);
1288
1289 return (xconf);
1290 }
1291
1292 void
config_clear(struct ldpd_conf * conf)1293 config_clear(struct ldpd_conf *conf)
1294 {
1295 struct ldpd_conf *xconf;
1296
1297 /*
1298 * Merge current config with an empty config, this will deactivate
1299 * and deallocate all the interfaces, pseudowires and so on. Before
1300 * merging, copy the router-id and other variables to avoid some
1301 * unnecessary operations, like trying to reset the neighborships.
1302 */
1303 xconf = config_new_empty();
1304 xconf->ipv4 = conf->ipv4;
1305 xconf->ipv6 = conf->ipv6;
1306 xconf->rtr_id = conf->rtr_id;
1307 xconf->trans_pref = conf->trans_pref;
1308 xconf->flags = conf->flags;
1309 merge_config(conf, xconf);
1310 free(conf);
1311 }
1312