]>
Commit | Line | Data |
---|---|---|
1 | /* | |
2 | * OSPF Flooding -- RFC2328 Section 13. | |
3 | * Copyright (C) 1999, 2000 Toshiaki Takada | |
4 | * | |
5 | * This file is part of GNU Zebra. | |
6 | * | |
7 | * GNU Zebra is free software; you can redistribute it and/or modify | |
8 | * it under the terms of the GNU General Public License as published | |
9 | * by the Free Software Foundation; either version 2, or (at your | |
10 | * option) any later version. | |
11 | * | |
12 | * GNU Zebra is distributed in the hope that it will be useful, but | |
13 | * WITHOUT ANY WARRANTY; without even the implied warranty of | |
14 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | |
15 | * General Public License for more details. | |
16 | * | |
17 | * You should have received a copy of the GNU General Public License along | |
18 | * with this program; see the file COPYING; if not, write to the Free Software | |
19 | * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA | |
20 | */ | |
21 | ||
22 | #include <zebra.h> | |
23 | ||
24 | #include "monotime.h" | |
25 | #include "linklist.h" | |
26 | #include "prefix.h" | |
27 | #include "if.h" | |
28 | #include "command.h" | |
29 | #include "table.h" | |
30 | #include "thread.h" | |
31 | #include "memory.h" | |
32 | #include "log.h" | |
33 | #include "zclient.h" | |
34 | ||
35 | #include "ospfd/ospfd.h" | |
36 | #include "ospfd/ospf_interface.h" | |
37 | #include "ospfd/ospf_ism.h" | |
38 | #include "ospfd/ospf_asbr.h" | |
39 | #include "ospfd/ospf_lsa.h" | |
40 | #include "ospfd/ospf_lsdb.h" | |
41 | #include "ospfd/ospf_neighbor.h" | |
42 | #include "ospfd/ospf_nsm.h" | |
43 | #include "ospfd/ospf_spf.h" | |
44 | #include "ospfd/ospf_flood.h" | |
45 | #include "ospfd/ospf_packet.h" | |
46 | #include "ospfd/ospf_abr.h" | |
47 | #include "ospfd/ospf_route.h" | |
48 | #include "ospfd/ospf_zebra.h" | |
49 | #include "ospfd/ospf_dump.h" | |
50 | ||
51 | extern struct zclient *zclient; | |
52 | ||
53 | /* Do the LSA acking specified in table 19, Section 13.5, row 2 | |
54 | * This get called from ospf_flood_out_interface. Declared inline | |
55 | * for speed. */ | |
56 | static void ospf_flood_delayed_lsa_ack(struct ospf_neighbor *inbr, | |
57 | struct ospf_lsa *lsa) | |
58 | { | |
59 | /* LSA is more recent than database copy, but was not | |
60 | flooded back out receiving interface. Delayed | |
61 | acknowledgment sent. If interface is in Backup state | |
62 | delayed acknowledgment sent only if advertisement | |
63 | received from Designated Router, otherwise do nothing See | |
64 | RFC 2328 Section 13.5 */ | |
65 | ||
66 | /* Whether LSA is more recent or not, and whether this is in | |
67 | response to the LSA being sent out recieving interface has been | |
68 | worked out previously */ | |
69 | ||
70 | /* Deal with router as BDR */ | |
71 | if (inbr->oi->state == ISM_Backup && !NBR_IS_DR(inbr)) | |
72 | return; | |
73 | ||
74 | /* Schedule a delayed LSA Ack to be sent */ | |
75 | listnode_add(inbr->oi->ls_ack, | |
76 | ospf_lsa_lock(lsa)); /* delayed LSA Ack */ | |
77 | } | |
78 | ||
79 | /* Check LSA is related to external info. */ | |
80 | struct external_info *ospf_external_info_check(struct ospf *ospf, | |
81 | struct ospf_lsa *lsa) | |
82 | { | |
83 | struct as_external_lsa *al; | |
84 | struct prefix_ipv4 p; | |
85 | struct route_node *rn; | |
86 | int type; | |
87 | ||
88 | al = (struct as_external_lsa *)lsa->data; | |
89 | ||
90 | p.family = AF_INET; | |
91 | p.prefix = lsa->data->id; | |
92 | p.prefixlen = ip_masklen(al->mask); | |
93 | ||
94 | for (type = 0; type <= ZEBRA_ROUTE_MAX; type++) { | |
95 | int redist_on = 0; | |
96 | ||
97 | redist_on = | |
98 | is_prefix_default(&p) | |
99 | ? vrf_bitmap_check(zclient->default_information, | |
100 | ospf->vrf_id) | |
101 | : (zclient->mi_redist[AFI_IP][type].enabled | |
102 | || vrf_bitmap_check( | |
103 | zclient->redist[AFI_IP][type], | |
104 | ospf->vrf_id)); | |
105 | // Pending: check for MI above. | |
106 | if (redist_on) { | |
107 | struct list *ext_list; | |
108 | struct listnode *node; | |
109 | struct ospf_external *ext; | |
110 | ||
111 | ext_list = ospf->external[type]; | |
112 | if (!ext_list) | |
113 | continue; | |
114 | ||
115 | for (ALL_LIST_ELEMENTS_RO(ext_list, node, ext)) { | |
116 | rn = NULL; | |
117 | if (ext->external_info) | |
118 | rn = route_node_lookup( | |
119 | ext->external_info, | |
120 | (struct prefix *)&p); | |
121 | if (rn) { | |
122 | route_unlock_node(rn); | |
123 | if (rn->info != NULL) | |
124 | return (struct external_info *) | |
125 | rn->info; | |
126 | } | |
127 | } | |
128 | } | |
129 | } | |
130 | ||
131 | return NULL; | |
132 | } | |
133 | ||
134 | static void ospf_process_self_originated_lsa(struct ospf *ospf, | |
135 | struct ospf_lsa *new, | |
136 | struct ospf_area *area) | |
137 | { | |
138 | struct ospf_interface *oi; | |
139 | struct external_info *ei; | |
140 | struct listnode *node; | |
141 | ||
142 | if (IS_DEBUG_OSPF_EVENT) | |
143 | zlog_debug( | |
144 | "LSA[Type%d:%s]: Process self-originated LSA seq 0x%x", | |
145 | new->data->type, inet_ntoa(new->data->id), | |
146 | ntohl(new->data->ls_seqnum)); | |
147 | ||
148 | /* If we're here, we installed a self-originated LSA that we received | |
149 | from a neighbor, i.e. it's more recent. We must see whether we want | |
150 | to originate it. | |
151 | If yes, we should use this LSA's sequence number and reoriginate | |
152 | a new instance. | |
153 | if not --- we must flush this LSA from the domain. */ | |
154 | switch (new->data->type) { | |
155 | case OSPF_ROUTER_LSA: | |
156 | /* Originate a new instance and schedule flooding */ | |
157 | if (area->router_lsa_self) | |
158 | area->router_lsa_self->data->ls_seqnum = | |
159 | new->data->ls_seqnum; | |
160 | ospf_router_lsa_update_area(area); | |
161 | return; | |
162 | case OSPF_NETWORK_LSA: | |
163 | case OSPF_OPAQUE_LINK_LSA: | |
164 | /* We must find the interface the LSA could belong to. | |
165 | If the interface is no more a broadcast type or we are no | |
166 | more | |
167 | the DR, we flush the LSA otherwise -- create the new instance | |
168 | and | |
169 | schedule flooding. */ | |
170 | ||
171 | /* Look through all interfaces, not just area, since interface | |
172 | could be moved from one area to another. */ | |
173 | for (ALL_LIST_ELEMENTS_RO(ospf->oiflist, node, oi)) | |
174 | /* These are sanity check. */ | |
175 | if (IPV4_ADDR_SAME(&oi->address->u.prefix4, | |
176 | &new->data->id)) { | |
177 | if (oi->area != area | |
178 | || oi->type != OSPF_IFTYPE_BROADCAST | |
179 | || !IPV4_ADDR_SAME(&oi->address->u.prefix4, | |
180 | &DR(oi))) { | |
181 | ospf_schedule_lsa_flush_area(area, new); | |
182 | return; | |
183 | } | |
184 | ||
185 | if (new->data->type == OSPF_OPAQUE_LINK_LSA) { | |
186 | ospf_opaque_lsa_refresh(new); | |
187 | return; | |
188 | } | |
189 | ||
190 | if (oi->network_lsa_self) | |
191 | oi->network_lsa_self->data->ls_seqnum = | |
192 | new->data->ls_seqnum; | |
193 | /* Schedule network-LSA origination. */ | |
194 | ospf_network_lsa_update(oi); | |
195 | return; | |
196 | } | |
197 | break; | |
198 | case OSPF_SUMMARY_LSA: | |
199 | case OSPF_ASBR_SUMMARY_LSA: | |
200 | ospf_schedule_abr_task(ospf); | |
201 | break; | |
202 | case OSPF_AS_EXTERNAL_LSA: | |
203 | case OSPF_AS_NSSA_LSA: | |
204 | if ((new->data->type == OSPF_AS_EXTERNAL_LSA) | |
205 | && CHECK_FLAG(new->flags, OSPF_LSA_LOCAL_XLT)) { | |
206 | ospf_translated_nssa_refresh(ospf, NULL, new); | |
207 | return; | |
208 | } | |
209 | ei = ospf_external_info_check(ospf, new); | |
210 | if (ei) | |
211 | ospf_external_lsa_refresh(ospf, new, ei, | |
212 | LSA_REFRESH_FORCE); | |
213 | else | |
214 | ospf_lsa_flush_as(ospf, new); | |
215 | break; | |
216 | case OSPF_OPAQUE_AREA_LSA: | |
217 | ospf_opaque_lsa_refresh(new); | |
218 | break; | |
219 | case OSPF_OPAQUE_AS_LSA: | |
220 | ospf_opaque_lsa_refresh(new); | |
221 | /* Reconsideration may needed. */ /* XXX */ | |
222 | break; | |
223 | default: | |
224 | break; | |
225 | } | |
226 | } | |
227 | ||
228 | /* OSPF LSA flooding -- RFC2328 Section 13.(5). */ | |
229 | ||
230 | /* Now Updated for NSSA operation, as follows: | |
231 | ||
232 | ||
233 | Type-5's have no change. Blocked to STUB or NSSA. | |
234 | ||
235 | Type-7's can be received, and if a DR | |
236 | they will also flood the local NSSA Area as Type-7's | |
237 | ||
238 | If a Self-Originated LSA (now an ASBR), | |
239 | The LSDB will be updated as Type-5's, (for continual re-fresh) | |
240 | ||
241 | If an NSSA-IR it is installed/flooded as Type-7, P-bit on. | |
242 | if an NSSA-ABR it is installed/flooded as Type-7, P-bit off. | |
243 | ||
244 | Later, during the ABR TASK, if the ABR is the Elected NSSA | |
245 | translator, then All Type-7s (with P-bit ON) are Translated to | |
246 | Type-5's and flooded to all non-NSSA/STUB areas. | |
247 | ||
248 | During ASE Calculations, | |
249 | non-ABRs calculate external routes from Type-7's | |
250 | ABRs calculate external routes from Type-5's and non-self Type-7s | |
251 | */ | |
252 | int ospf_flood(struct ospf *ospf, struct ospf_neighbor *nbr, | |
253 | struct ospf_lsa *current, struct ospf_lsa *new) | |
254 | { | |
255 | struct ospf_interface *oi; | |
256 | int lsa_ack_flag; | |
257 | ||
258 | /* Type-7 LSA's will be flooded throughout their native NSSA area, | |
259 | but will also be flooded as Type-5's into ABR capable links. */ | |
260 | ||
261 | if (IS_DEBUG_OSPF_EVENT) | |
262 | zlog_debug( | |
263 | "LSA[Flooding]: start, NBR %s (%s), cur(%p), New-LSA[%s]", | |
264 | inet_ntoa(nbr->router_id), | |
265 | lookup_msg(ospf_nsm_state_msg, nbr->state, NULL), | |
266 | (void *)current, dump_lsa_key(new)); | |
267 | ||
268 | oi = nbr->oi; | |
269 | ||
270 | /* If there is already a database copy, and if the | |
271 | database copy was received via flooding and installed less | |
272 | than MinLSArrival seconds ago, discard the new LSA | |
273 | (without acknowledging it). */ | |
274 | if (current != NULL) /* -- endo. */ | |
275 | { | |
276 | if (IS_LSA_SELF(current) | |
277 | && (ntohs(current->data->ls_age) == 0 | |
278 | && ntohl(current->data->ls_seqnum) | |
279 | == OSPF_INITIAL_SEQUENCE_NUMBER)) { | |
280 | if (IS_DEBUG_OSPF_EVENT) | |
281 | zlog_debug( | |
282 | "LSA[Flooding]: Got a self-originated LSA, " | |
283 | "while local one is initial instance."); | |
284 | ; /* Accept this LSA for quick LSDB resynchronization. | |
285 | */ | |
286 | } else if (monotime_since(¤t->tv_recv, NULL) | |
287 | < ospf->min_ls_arrival * 1000LL) { | |
288 | if (IS_DEBUG_OSPF_EVENT) | |
289 | zlog_debug( | |
290 | "LSA[Flooding]: LSA is received recently."); | |
291 | return -1; | |
292 | } | |
293 | } | |
294 | ||
295 | /* Flood the new LSA out some subset of the router's interfaces. | |
296 | In some cases (e.g., the state of the receiving interface is | |
297 | DR and the LSA was received from a router other than the | |
298 | Backup DR) the LSA will be flooded back out the receiving | |
299 | interface. */ | |
300 | lsa_ack_flag = ospf_flood_through(ospf, nbr, new); | |
301 | ||
302 | /* Remove the current database copy from all neighbors' Link state | |
303 | retransmission lists. AS_EXTERNAL and AS_EXTERNAL_OPAQUE does | |
304 | ^^^^^^^^^^^^^^^^^^^^^^^ | |
305 | not have area ID. | |
306 | All other (even NSSA's) do have area ID. */ | |
307 | if (current) { | |
308 | switch (current->data->type) { | |
309 | case OSPF_AS_EXTERNAL_LSA: | |
310 | case OSPF_OPAQUE_AS_LSA: | |
311 | ospf_ls_retransmit_delete_nbr_as(ospf, current); | |
312 | break; | |
313 | default: | |
314 | ospf_ls_retransmit_delete_nbr_area(nbr->oi->area, | |
315 | current); | |
316 | break; | |
317 | } | |
318 | } | |
319 | ||
320 | /* Do some internal house keeping that is needed here */ | |
321 | SET_FLAG(new->flags, OSPF_LSA_RECEIVED); | |
322 | (void)ospf_lsa_is_self_originated(ospf, new); /* Let it set the flag */ | |
323 | ||
324 | /* Install the new LSA in the link state database | |
325 | (replacing the current database copy). This may cause the | |
326 | routing table calculation to be scheduled. In addition, | |
327 | timestamp the new LSA with the current time. The flooding | |
328 | procedure cannot overwrite the newly installed LSA until | |
329 | MinLSArrival seconds have elapsed. */ | |
330 | ||
331 | if (!(new = ospf_lsa_install(ospf, nbr->oi, new))) | |
332 | return -1; /* unknown LSA type or any other error condition */ | |
333 | ||
334 | /* Acknowledge the receipt of the LSA by sending a Link State | |
335 | Acknowledgment packet back out the receiving interface. */ | |
336 | if (lsa_ack_flag) | |
337 | ospf_flood_delayed_lsa_ack(nbr, new); | |
338 | ||
339 | /* If this new LSA indicates that it was originated by the | |
340 | receiving router itself, the router must take special action, | |
341 | either updating the LSA or in some cases flushing it from | |
342 | the routing domain. */ | |
343 | if (ospf_lsa_is_self_originated(ospf, new)) | |
344 | ospf_process_self_originated_lsa(ospf, new, oi->area); | |
345 | else | |
346 | /* Update statistics value for OSPF-MIB. */ | |
347 | ospf->rx_lsa_count++; | |
348 | ||
349 | return 0; | |
350 | } | |
351 | ||
352 | /* OSPF LSA flooding -- RFC2328 Section 13.3. */ | |
353 | static int ospf_flood_through_interface(struct ospf_interface *oi, | |
354 | struct ospf_neighbor *inbr, | |
355 | struct ospf_lsa *lsa) | |
356 | { | |
357 | struct ospf_neighbor *onbr; | |
358 | struct route_node *rn; | |
359 | int retx_flag; | |
360 | ||
361 | if (IS_DEBUG_OSPF_EVENT) | |
362 | zlog_debug( | |
363 | "ospf_flood_through_interface(): " | |
364 | "considering int %s, INBR(%s), LSA[%s] AGE %u", | |
365 | IF_NAME(oi), inbr ? inet_ntoa(inbr->router_id) : "NULL", | |
366 | dump_lsa_key(lsa), ntohs(lsa->data->ls_age)); | |
367 | ||
368 | if (!ospf_if_is_enable(oi)) | |
369 | return 0; | |
370 | ||
371 | /* Remember if new LSA is aded to a retransmit list. */ | |
372 | retx_flag = 0; | |
373 | ||
374 | /* Each of the neighbors attached to this interface are examined, | |
375 | to determine whether they must receive the new LSA. The following | |
376 | steps are executed for each neighbor: */ | |
377 | for (rn = route_top(oi->nbrs); rn; rn = route_next(rn)) { | |
378 | struct ospf_lsa *ls_req; | |
379 | ||
380 | if (rn->info == NULL) | |
381 | continue; | |
382 | ||
383 | onbr = rn->info; | |
384 | if (IS_DEBUG_OSPF_EVENT) | |
385 | zlog_debug( | |
386 | "ospf_flood_through_interface(): considering nbr %s (%s)", | |
387 | inet_ntoa(onbr->router_id), | |
388 | lookup_msg(ospf_nsm_state_msg, onbr->state, | |
389 | NULL)); | |
390 | ||
391 | /* If the neighbor is in a lesser state than Exchange, it | |
392 | does not participate in flooding, and the next neighbor | |
393 | should be examined. */ | |
394 | if (onbr->state < NSM_Exchange) | |
395 | continue; | |
396 | ||
397 | /* If the adjacency is not yet full (neighbor state is | |
398 | Exchange or Loading), examine the Link state request | |
399 | list associated with this adjacency. If there is an | |
400 | instance of the new LSA on the list, it indicates that | |
401 | the neighboring router has an instance of the LSA | |
402 | already. Compare the new LSA to the neighbor's copy: */ | |
403 | if (onbr->state < NSM_Full) { | |
404 | if (IS_DEBUG_OSPF_EVENT) | |
405 | zlog_debug( | |
406 | "ospf_flood_through_interface(): nbr adj is not Full"); | |
407 | ls_req = ospf_ls_request_lookup(onbr, lsa); | |
408 | if (ls_req != NULL) { | |
409 | int ret; | |
410 | ||
411 | ret = ospf_lsa_more_recent(ls_req, lsa); | |
412 | /* The new LSA is less recent. */ | |
413 | if (ret > 0) | |
414 | continue; | |
415 | /* The two copies are the same instance, then | |
416 | delete | |
417 | the LSA from the Link state request list. */ | |
418 | else if (ret == 0) { | |
419 | ospf_ls_request_delete(onbr, ls_req); | |
420 | ospf_check_nbr_loading(onbr); | |
421 | continue; | |
422 | } | |
423 | /* The new LSA is more recent. Delete the LSA | |
424 | from the Link state request list. */ | |
425 | else { | |
426 | ospf_ls_request_delete(onbr, ls_req); | |
427 | ospf_check_nbr_loading(onbr); | |
428 | } | |
429 | } | |
430 | } | |
431 | ||
432 | if (IS_OPAQUE_LSA(lsa->data->type)) { | |
433 | if (!CHECK_FLAG(onbr->options, OSPF_OPTION_O)) { | |
434 | if (IS_DEBUG_OSPF(lsa, LSA_FLOODING)) | |
435 | zlog_debug( | |
436 | "Skip this neighbor: Not Opaque-capable."); | |
437 | continue; | |
438 | } | |
439 | } | |
440 | ||
441 | /* If the new LSA was received from this neighbor, | |
442 | examine the next neighbor. */ | |
443 | #ifdef ORIGINAL_CODING | |
444 | if (inbr) | |
445 | if (IPV4_ADDR_SAME(&inbr->router_id, &onbr->router_id)) | |
446 | continue; | |
447 | #else /* ORIGINAL_CODING */ | |
448 | if (inbr) { | |
449 | /* | |
450 | * Triggered by LSUpd message parser "ospf_ls_upd ()". | |
451 | * E.g., all LSAs handling here is received via network. | |
452 | */ | |
453 | if (IPV4_ADDR_SAME(&inbr->router_id, | |
454 | &onbr->router_id)) { | |
455 | if (IS_DEBUG_OSPF(lsa, LSA_FLOODING)) | |
456 | zlog_debug( | |
457 | "Skip this neighbor: inbr == onbr"); | |
458 | continue; | |
459 | } | |
460 | } else { | |
461 | /* | |
462 | * Triggered by MaxAge remover, so far. | |
463 | * NULL "inbr" means flooding starts from this node. | |
464 | */ | |
465 | if (IPV4_ADDR_SAME(&lsa->data->adv_router, | |
466 | &onbr->router_id)) { | |
467 | if (IS_DEBUG_OSPF(lsa, LSA_FLOODING)) | |
468 | zlog_debug( | |
469 | "Skip this neighbor: lsah->adv_router == onbr"); | |
470 | continue; | |
471 | } | |
472 | } | |
473 | #endif /* ORIGINAL_CODING */ | |
474 | ||
475 | /* Add the new LSA to the Link state retransmission list | |
476 | for the adjacency. The LSA will be retransmitted | |
477 | at intervals until an acknowledgment is seen from | |
478 | the neighbor. */ | |
479 | ospf_ls_retransmit_add(onbr, lsa); | |
480 | retx_flag = 1; | |
481 | } | |
482 | ||
483 | /* If in the previous step, the LSA was NOT added to any of | |
484 | the Link state retransmission lists, there is no need to | |
485 | flood the LSA out the interface. */ | |
486 | if (retx_flag == 0) { | |
487 | return (inbr && inbr->oi == oi); | |
488 | } | |
489 | ||
490 | /* if we've received the lsa on this interface we need to perform | |
491 | additional checking */ | |
492 | if (inbr && (inbr->oi == oi)) { | |
493 | /* If the new LSA was received on this interface, and it was | |
494 | received from either the Designated Router or the Backup | |
495 | Designated Router, chances are that all the neighbors have | |
496 | received the LSA already. */ | |
497 | if (NBR_IS_DR(inbr) || NBR_IS_BDR(inbr)) { | |
498 | if (IS_DEBUG_OSPF_NSSA) | |
499 | zlog_debug( | |
500 | "ospf_flood_through_interface(): " | |
501 | "DR/BDR NOT SEND to int %s", | |
502 | IF_NAME(oi)); | |
503 | return 1; | |
504 | } | |
505 | ||
506 | /* If the new LSA was received on this interface, and the | |
507 | interface state is Backup, examine the next interface. The | |
508 | Designated Router will do the flooding on this interface. | |
509 | However, if the Designated Router fails the router will | |
510 | end up retransmitting the updates. */ | |
511 | ||
512 | if (oi->state == ISM_Backup) { | |
513 | if (IS_DEBUG_OSPF_NSSA) | |
514 | zlog_debug( | |
515 | "ospf_flood_through_interface(): " | |
516 | "ISM_Backup NOT SEND to int %s", | |
517 | IF_NAME(oi)); | |
518 | return 1; | |
519 | } | |
520 | } | |
521 | ||
522 | /* The LSA must be flooded out the interface. Send a Link State | |
523 | Update packet (including the new LSA as contents) out the | |
524 | interface. The LSA's LS age must be incremented by InfTransDelay | |
525 | (which must be > 0) when it is copied into the outgoing Link | |
526 | State Update packet (until the LS age field reaches the maximum | |
527 | value of MaxAge). */ | |
528 | /* XXX HASSO: Is this IS_DEBUG_OSPF_NSSA really correct? */ | |
529 | if (IS_DEBUG_OSPF_NSSA) | |
530 | zlog_debug( | |
531 | "ospf_flood_through_interface(): " | |
532 | "DR/BDR sending upd to int %s", | |
533 | IF_NAME(oi)); | |
534 | ||
535 | /* RFC2328 Section 13.3 | |
536 | On non-broadcast networks, separate Link State Update | |
537 | packets must be sent, as unicasts, to each adjacent neighbor | |
538 | (i.e., those in state Exchange or greater). The destination | |
539 | IP addresses for these packets are the neighbors' IP | |
540 | addresses. */ | |
541 | if (oi->type == OSPF_IFTYPE_NBMA) { | |
542 | struct route_node *rn; | |
543 | struct ospf_neighbor *nbr; | |
544 | ||
545 | for (rn = route_top(oi->nbrs); rn; rn = route_next(rn)) | |
546 | if ((nbr = rn->info) != NULL) | |
547 | if (nbr != oi->nbr_self | |
548 | && nbr->state >= NSM_Exchange) | |
549 | ospf_ls_upd_send_lsa( | |
550 | nbr, lsa, | |
551 | OSPF_SEND_PACKET_DIRECT); | |
552 | } else | |
553 | ospf_ls_upd_send_lsa(oi->nbr_self, lsa, | |
554 | OSPF_SEND_PACKET_INDIRECT); | |
555 | ||
556 | return 0; | |
557 | } | |
558 | ||
559 | int ospf_flood_through_area(struct ospf_area *area, struct ospf_neighbor *inbr, | |
560 | struct ospf_lsa *lsa) | |
561 | { | |
562 | struct listnode *node, *nnode; | |
563 | struct ospf_interface *oi; | |
564 | int lsa_ack_flag = 0; | |
565 | ||
566 | assert(area); | |
567 | /* All other types are specific to a single area (Area A). The | |
568 | eligible interfaces are all those interfaces attaching to the | |
569 | Area A. If Area A is the backbone, this includes all the virtual | |
570 | links. */ | |
571 | for (ALL_LIST_ELEMENTS(area->oiflist, node, nnode, oi)) { | |
572 | if (area->area_id.s_addr != OSPF_AREA_BACKBONE | |
573 | && oi->type == OSPF_IFTYPE_VIRTUALLINK) | |
574 | continue; | |
575 | ||
576 | if ((lsa->data->type == OSPF_OPAQUE_LINK_LSA) | |
577 | && (lsa->oi != oi)) { | |
578 | /* | |
579 | * Link local scoped Opaque-LSA should only be flooded | |
580 | * for the link on which the LSA has received. | |
581 | */ | |
582 | if (IS_DEBUG_OSPF(lsa, LSA_FLOODING)) | |
583 | zlog_debug( | |
584 | "Type-9 Opaque-LSA: lsa->oi(%p) != oi(%p)", | |
585 | (void *)lsa->oi, (void *)oi); | |
586 | continue; | |
587 | } | |
588 | ||
589 | if (ospf_flood_through_interface(oi, inbr, lsa)) | |
590 | lsa_ack_flag = 1; | |
591 | } | |
592 | ||
593 | return (lsa_ack_flag); | |
594 | } | |
595 | ||
596 | int ospf_flood_through_as(struct ospf *ospf, struct ospf_neighbor *inbr, | |
597 | struct ospf_lsa *lsa) | |
598 | { | |
599 | struct listnode *node; | |
600 | struct ospf_area *area; | |
601 | int lsa_ack_flag; | |
602 | ||
603 | lsa_ack_flag = 0; | |
604 | ||
605 | /* The incoming LSA is type 5 or type 7 (AS-EXTERNAL or AS-NSSA ) | |
606 | ||
607 | Divert the Type-5 LSA's to all non-NSSA/STUB areas | |
608 | ||
609 | Divert the Type-7 LSA's to all NSSA areas | |
610 | ||
611 | AS-external-LSAs are flooded throughout the entire AS, with the | |
612 | exception of stub areas (see Section 3.6). The eligible | |
613 | interfaces are all the router's interfaces, excluding virtual | |
614 | links and those interfaces attaching to stub areas. */ | |
615 | ||
616 | if (CHECK_FLAG(lsa->flags, OSPF_LSA_LOCAL_XLT)) /* Translated from 7 */ | |
617 | if (IS_DEBUG_OSPF_NSSA) | |
618 | zlog_debug("Flood/AS: NSSA TRANSLATED LSA"); | |
619 | ||
620 | for (ALL_LIST_ELEMENTS_RO(ospf->areas, node, area)) { | |
621 | int continue_flag = 0; | |
622 | struct listnode *if_node; | |
623 | struct ospf_interface *oi; | |
624 | ||
625 | switch (area->external_routing) { | |
626 | /* Don't send AS externals into stub areas. Various types | |
627 | of support for partial stub areas can be implemented | |
628 | here. NSSA's will receive Type-7's that have areas | |
629 | matching the originl LSA. */ | |
630 | case OSPF_AREA_NSSA: /* Sending Type 5 or 7 into NSSA area */ | |
631 | /* Type-7, flood NSSA area */ | |
632 | if (lsa->data->type == OSPF_AS_NSSA_LSA | |
633 | && area == lsa->area) | |
634 | /* We will send it. */ | |
635 | continue_flag = 0; | |
636 | else | |
637 | continue_flag = 1; /* Skip this NSSA area for | |
638 | Type-5's et al */ | |
639 | break; | |
640 | ||
641 | case OSPF_AREA_TYPE_MAX: | |
642 | case OSPF_AREA_STUB: | |
643 | continue_flag = 1; /* Skip this area. */ | |
644 | break; | |
645 | ||
646 | case OSPF_AREA_DEFAULT: | |
647 | default: | |
648 | /* No Type-7 into normal area */ | |
649 | if (lsa->data->type == OSPF_AS_NSSA_LSA) | |
650 | continue_flag = 1; /* skip Type-7 */ | |
651 | else | |
652 | continue_flag = 0; /* Do this area. */ | |
653 | break; | |
654 | } | |
655 | ||
656 | /* Do continue for above switch. Saves a big if then mess */ | |
657 | if (continue_flag) | |
658 | continue; /* main for-loop */ | |
659 | ||
660 | /* send to every interface in this area */ | |
661 | ||
662 | for (ALL_LIST_ELEMENTS_RO(area->oiflist, if_node, oi)) { | |
663 | /* Skip virtual links */ | |
664 | if (oi->type != OSPF_IFTYPE_VIRTUALLINK) | |
665 | if (ospf_flood_through_interface(oi, inbr, | |
666 | lsa)) /* lsa */ | |
667 | lsa_ack_flag = 1; | |
668 | } | |
669 | } /* main area for-loop */ | |
670 | ||
671 | return (lsa_ack_flag); | |
672 | } | |
673 | ||
674 | int ospf_flood_through(struct ospf *ospf, struct ospf_neighbor *inbr, | |
675 | struct ospf_lsa *lsa) | |
676 | { | |
677 | int lsa_ack_flag = 0; | |
678 | ||
679 | /* Type-7 LSA's for NSSA are flooded throughout the AS here, and | |
680 | upon return are updated in the LSDB for Type-7's. Later, | |
681 | re-fresh will re-send them (and also, if ABR, packet code will | |
682 | translate to Type-5's) | |
683 | ||
684 | As usual, Type-5 LSA's (if not DISCARDED because we are STUB or | |
685 | NSSA) are flooded throughout the AS, and are updated in the | |
686 | global table. */ | |
687 | #ifdef ORIGINAL_CODING | |
688 | switch (lsa->data->type) { | |
689 | case OSPF_ROUTER_LSA: | |
690 | case OSPF_NETWORK_LSA: | |
691 | case OSPF_SUMMARY_LSA: | |
692 | case OSPF_ASBR_SUMMARY_LSA: | |
693 | case OSPF_OPAQUE_LINK_LSA: /* ospf_flood_through_interface ? */ | |
694 | case OSPF_OPAQUE_AREA_LSA: | |
695 | lsa_ack_flag = | |
696 | ospf_flood_through_area(inbr->oi->area, inbr, lsa); | |
697 | break; | |
698 | case OSPF_AS_EXTERNAL_LSA: /* Type-5 */ | |
699 | case OSPF_OPAQUE_AS_LSA: | |
700 | lsa_ack_flag = ospf_flood_through_as(ospf, inbr, lsa); | |
701 | break; | |
702 | /* Type-7 Only received within NSSA, then flooded */ | |
703 | case OSPF_AS_NSSA_LSA: | |
704 | /* Any P-bit was installed with the Type-7. */ | |
705 | lsa_ack_flag = | |
706 | ospf_flood_through_area(inbr->oi->area, inbr, lsa); | |
707 | ||
708 | if (IS_DEBUG_OSPF_NSSA) | |
709 | zlog_debug( | |
710 | "ospf_flood_through: LOCAL NSSA FLOOD of Type-7."); | |
711 | break; | |
712 | default: | |
713 | break; | |
714 | } | |
715 | #else /* ORIGINAL_CODING */ | |
716 | /* | |
717 | * At the common sub-sub-function "ospf_flood_through_interface()", | |
718 | * a parameter "inbr" will be used to distinguish the called context | |
719 | * whether the given LSA was received from the neighbor, or the | |
720 | * flooding for the LSA starts from this node (e.g. the LSA was self- | |
721 | * originated, or the LSA is going to be flushed from routing domain). | |
722 | * | |
723 | * So, for consistency reasons, this function "ospf_flood_through()" | |
724 | * should also allow the usage that the given "inbr" parameter to be | |
725 | * NULL. If we do so, corresponding AREA parameter should be referred | |
726 | * by "lsa->area", instead of "inbr->oi->area". | |
727 | */ | |
728 | switch (lsa->data->type) { | |
729 | case OSPF_AS_EXTERNAL_LSA: /* Type-5 */ | |
730 | case OSPF_OPAQUE_AS_LSA: | |
731 | lsa_ack_flag = ospf_flood_through_as(ospf, inbr, lsa); | |
732 | break; | |
733 | /* Type-7 Only received within NSSA, then flooded */ | |
734 | case OSPF_AS_NSSA_LSA: | |
735 | /* Any P-bit was installed with the Type-7. */ | |
736 | ||
737 | if (IS_DEBUG_OSPF_NSSA) | |
738 | zlog_debug( | |
739 | "ospf_flood_through: LOCAL NSSA FLOOD of Type-7."); | |
740 | /* Fallthrough */ | |
741 | default: | |
742 | lsa_ack_flag = ospf_flood_through_area(lsa->area, inbr, lsa); | |
743 | break; | |
744 | } | |
745 | #endif /* ORIGINAL_CODING */ | |
746 | ||
747 | return (lsa_ack_flag); | |
748 | } | |
749 | ||
750 | ||
751 | /* Management functions for neighbor's Link State Request list. */ | |
752 | void ospf_ls_request_add(struct ospf_neighbor *nbr, struct ospf_lsa *lsa) | |
753 | { | |
754 | /* | |
755 | * We cannot make use of the newly introduced callback function | |
756 | * "lsdb->new_lsa_hook" to replace debug output below, just because | |
757 | * it seems no simple and smart way to pass neighbor information to | |
758 | * the common function "ospf_lsdb_add()" -- endo. | |
759 | */ | |
760 | if (IS_DEBUG_OSPF(lsa, LSA_FLOODING)) | |
761 | zlog_debug("RqstL(%lu)++, NBR(%s), LSA[%s]", | |
762 | ospf_ls_request_count(nbr), | |
763 | inet_ntoa(nbr->router_id), dump_lsa_key(lsa)); | |
764 | ||
765 | ospf_lsdb_add(&nbr->ls_req, lsa); | |
766 | } | |
767 | ||
768 | unsigned long ospf_ls_request_count(struct ospf_neighbor *nbr) | |
769 | { | |
770 | return ospf_lsdb_count_all(&nbr->ls_req); | |
771 | } | |
772 | ||
773 | int ospf_ls_request_isempty(struct ospf_neighbor *nbr) | |
774 | { | |
775 | return ospf_lsdb_isempty(&nbr->ls_req); | |
776 | } | |
777 | ||
778 | /* Remove LSA from neighbor's ls-request list. */ | |
779 | void ospf_ls_request_delete(struct ospf_neighbor *nbr, struct ospf_lsa *lsa) | |
780 | { | |
781 | if (nbr->ls_req_last == lsa) { | |
782 | ospf_lsa_unlock(&nbr->ls_req_last); | |
783 | nbr->ls_req_last = NULL; | |
784 | } | |
785 | ||
786 | if (IS_DEBUG_OSPF(lsa, LSA_FLOODING)) /* -- endo. */ | |
787 | zlog_debug("RqstL(%lu)--, NBR(%s), LSA[%s]", | |
788 | ospf_ls_request_count(nbr), | |
789 | inet_ntoa(nbr->router_id), dump_lsa_key(lsa)); | |
790 | ||
791 | ospf_lsdb_delete(&nbr->ls_req, lsa); | |
792 | } | |
793 | ||
794 | /* Remove all LSA from neighbor's ls-requenst list. */ | |
795 | void ospf_ls_request_delete_all(struct ospf_neighbor *nbr) | |
796 | { | |
797 | ospf_lsa_unlock(&nbr->ls_req_last); | |
798 | nbr->ls_req_last = NULL; | |
799 | ospf_lsdb_delete_all(&nbr->ls_req); | |
800 | } | |
801 | ||
802 | /* Lookup LSA from neighbor's ls-request list. */ | |
803 | struct ospf_lsa *ospf_ls_request_lookup(struct ospf_neighbor *nbr, | |
804 | struct ospf_lsa *lsa) | |
805 | { | |
806 | return ospf_lsdb_lookup(&nbr->ls_req, lsa); | |
807 | } | |
808 | ||
809 | struct ospf_lsa *ospf_ls_request_new(struct lsa_header *lsah) | |
810 | { | |
811 | struct ospf_lsa *new; | |
812 | ||
813 | new = ospf_lsa_new(); | |
814 | new->data = ospf_lsa_data_new(OSPF_LSA_HEADER_SIZE); | |
815 | memcpy(new->data, lsah, OSPF_LSA_HEADER_SIZE); | |
816 | ||
817 | return new; | |
818 | } | |
819 | ||
820 | ||
821 | /* Management functions for neighbor's ls-retransmit list. */ | |
822 | unsigned long ospf_ls_retransmit_count(struct ospf_neighbor *nbr) | |
823 | { | |
824 | return ospf_lsdb_count_all(&nbr->ls_rxmt); | |
825 | } | |
826 | ||
827 | unsigned long ospf_ls_retransmit_count_self(struct ospf_neighbor *nbr, | |
828 | int lsa_type) | |
829 | { | |
830 | return ospf_lsdb_count_self(&nbr->ls_rxmt, lsa_type); | |
831 | } | |
832 | ||
833 | int ospf_ls_retransmit_isempty(struct ospf_neighbor *nbr) | |
834 | { | |
835 | return ospf_lsdb_isempty(&nbr->ls_rxmt); | |
836 | } | |
837 | ||
838 | /* Add LSA to be retransmitted to neighbor's ls-retransmit list. */ | |
839 | void ospf_ls_retransmit_add(struct ospf_neighbor *nbr, struct ospf_lsa *lsa) | |
840 | { | |
841 | struct ospf_lsa *old; | |
842 | ||
843 | old = ospf_ls_retransmit_lookup(nbr, lsa); | |
844 | ||
845 | if (ospf_lsa_more_recent(old, lsa) < 0) { | |
846 | if (old) { | |
847 | old->retransmit_counter--; | |
848 | ospf_lsdb_delete(&nbr->ls_rxmt, old); | |
849 | } | |
850 | lsa->retransmit_counter++; | |
851 | /* | |
852 | * We cannot make use of the newly introduced callback function | |
853 | * "lsdb->new_lsa_hook" to replace debug output below, just | |
854 | * because | |
855 | * it seems no simple and smart way to pass neighbor information | |
856 | * to | |
857 | * the common function "ospf_lsdb_add()" -- endo. | |
858 | */ | |
859 | if (IS_DEBUG_OSPF(lsa, LSA_FLOODING)) | |
860 | zlog_debug("RXmtL(%lu)++, NBR(%s), LSA[%s]", | |
861 | ospf_ls_retransmit_count(nbr), | |
862 | inet_ntoa(nbr->router_id), | |
863 | dump_lsa_key(lsa)); | |
864 | ospf_lsdb_add(&nbr->ls_rxmt, lsa); | |
865 | } | |
866 | } | |
867 | ||
868 | /* Remove LSA from neibghbor's ls-retransmit list. */ | |
869 | void ospf_ls_retransmit_delete(struct ospf_neighbor *nbr, struct ospf_lsa *lsa) | |
870 | { | |
871 | if (ospf_ls_retransmit_lookup(nbr, lsa)) { | |
872 | lsa->retransmit_counter--; | |
873 | if (IS_DEBUG_OSPF(lsa, LSA_FLOODING)) /* -- endo. */ | |
874 | zlog_debug("RXmtL(%lu)--, NBR(%s), LSA[%s]", | |
875 | ospf_ls_retransmit_count(nbr), | |
876 | inet_ntoa(nbr->router_id), | |
877 | dump_lsa_key(lsa)); | |
878 | ospf_lsdb_delete(&nbr->ls_rxmt, lsa); | |
879 | } | |
880 | } | |
881 | ||
882 | /* Clear neighbor's ls-retransmit list. */ | |
883 | void ospf_ls_retransmit_clear(struct ospf_neighbor *nbr) | |
884 | { | |
885 | struct ospf_lsdb *lsdb; | |
886 | int i; | |
887 | ||
888 | lsdb = &nbr->ls_rxmt; | |
889 | ||
890 | for (i = OSPF_MIN_LSA; i < OSPF_MAX_LSA; i++) { | |
891 | struct route_table *table = lsdb->type[i].db; | |
892 | struct route_node *rn; | |
893 | struct ospf_lsa *lsa; | |
894 | ||
895 | for (rn = route_top(table); rn; rn = route_next(rn)) | |
896 | if ((lsa = rn->info) != NULL) | |
897 | ospf_ls_retransmit_delete(nbr, lsa); | |
898 | } | |
899 | ||
900 | ospf_lsa_unlock(&nbr->ls_req_last); | |
901 | nbr->ls_req_last = NULL; | |
902 | } | |
903 | ||
904 | /* Lookup LSA from neighbor's ls-retransmit list. */ | |
905 | struct ospf_lsa *ospf_ls_retransmit_lookup(struct ospf_neighbor *nbr, | |
906 | struct ospf_lsa *lsa) | |
907 | { | |
908 | return ospf_lsdb_lookup(&nbr->ls_rxmt, lsa); | |
909 | } | |
910 | ||
911 | static void ospf_ls_retransmit_delete_nbr_if(struct ospf_interface *oi, | |
912 | struct ospf_lsa *lsa) | |
913 | { | |
914 | struct route_node *rn; | |
915 | struct ospf_neighbor *nbr; | |
916 | struct ospf_lsa *lsr; | |
917 | ||
918 | if (ospf_if_is_enable(oi)) | |
919 | for (rn = route_top(oi->nbrs); rn; rn = route_next(rn)) | |
920 | /* If LSA find in LS-retransmit list, then remove it. */ | |
921 | if ((nbr = rn->info) != NULL) { | |
922 | lsr = ospf_ls_retransmit_lookup(nbr, lsa); | |
923 | ||
924 | /* If LSA find in ls-retransmit list, remove it. | |
925 | */ | |
926 | if (lsr != NULL | |
927 | && lsr->data->ls_seqnum | |
928 | == lsa->data->ls_seqnum) | |
929 | ospf_ls_retransmit_delete(nbr, lsr); | |
930 | } | |
931 | } | |
932 | ||
933 | void ospf_ls_retransmit_delete_nbr_area(struct ospf_area *area, | |
934 | struct ospf_lsa *lsa) | |
935 | { | |
936 | struct listnode *node, *nnode; | |
937 | struct ospf_interface *oi; | |
938 | ||
939 | for (ALL_LIST_ELEMENTS(area->oiflist, node, nnode, oi)) | |
940 | ospf_ls_retransmit_delete_nbr_if(oi, lsa); | |
941 | } | |
942 | ||
943 | void ospf_ls_retransmit_delete_nbr_as(struct ospf *ospf, struct ospf_lsa *lsa) | |
944 | { | |
945 | struct listnode *node, *nnode; | |
946 | struct ospf_interface *oi; | |
947 | ||
948 | for (ALL_LIST_ELEMENTS(ospf->oiflist, node, nnode, oi)) | |
949 | ospf_ls_retransmit_delete_nbr_if(oi, lsa); | |
950 | } | |
951 | ||
952 | ||
953 | /* Sets ls_age to MaxAge and floods throu the area. | |
954 | When we implement ASE routing, there will be anothe function | |
955 | flushing an LSA from the whole domain. */ | |
956 | void ospf_lsa_flush_area(struct ospf_lsa *lsa, struct ospf_area *area) | |
957 | { | |
958 | /* Reset the lsa origination time such that it gives | |
959 | more time for the ACK to be received and avoid | |
960 | retransmissions */ | |
961 | lsa->data->ls_age = htons(OSPF_LSA_MAXAGE); | |
962 | if (IS_DEBUG_OSPF_EVENT) | |
963 | zlog_debug("%s: MAXAGE set to LSA %s", __PRETTY_FUNCTION__, | |
964 | inet_ntoa(lsa->data->id)); | |
965 | monotime(&lsa->tv_recv); | |
966 | lsa->tv_orig = lsa->tv_recv; | |
967 | ospf_flood_through_area(area, NULL, lsa); | |
968 | ospf_lsa_maxage(area->ospf, lsa); | |
969 | } | |
970 | ||
971 | void ospf_lsa_flush_as(struct ospf *ospf, struct ospf_lsa *lsa) | |
972 | { | |
973 | /* Reset the lsa origination time such that it gives | |
974 | more time for the ACK to be received and avoid | |
975 | retransmissions */ | |
976 | lsa->data->ls_age = htons(OSPF_LSA_MAXAGE); | |
977 | monotime(&lsa->tv_recv); | |
978 | lsa->tv_orig = lsa->tv_recv; | |
979 | ospf_flood_through_as(ospf, NULL, lsa); | |
980 | ospf_lsa_maxage(ospf, lsa); | |
981 | } | |
982 | ||
983 | void ospf_lsa_flush(struct ospf *ospf, struct ospf_lsa *lsa) | |
984 | { | |
985 | lsa->data->ls_age = htons(OSPF_LSA_MAXAGE); | |
986 | ||
987 | switch (lsa->data->type) { | |
988 | case OSPF_ROUTER_LSA: | |
989 | case OSPF_NETWORK_LSA: | |
990 | case OSPF_SUMMARY_LSA: | |
991 | case OSPF_ASBR_SUMMARY_LSA: | |
992 | case OSPF_AS_NSSA_LSA: | |
993 | case OSPF_OPAQUE_LINK_LSA: | |
994 | case OSPF_OPAQUE_AREA_LSA: | |
995 | ospf_lsa_flush_area(lsa, lsa->area); | |
996 | break; | |
997 | case OSPF_AS_EXTERNAL_LSA: | |
998 | case OSPF_OPAQUE_AS_LSA: | |
999 | ospf_lsa_flush_as(ospf, lsa); | |
1000 | break; | |
1001 | default: | |
1002 | zlog_info("%s: Unknown LSA type %u", __func__, lsa->data->type); | |
1003 | break; | |
1004 | } | |
1005 | } |