]> git.proxmox.com Git - mirror_frr.git/blob - ospf6d/ospf6_message.c
tools: improve explanation of 'wrap' options
[mirror_frr.git] / ospf6d / ospf6_message.c
1 /*
2 * Copyright (C) 2003 Yasuhiro Ohara
3 *
4 * This file is part of GNU Zebra.
5 *
6 * GNU Zebra is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License as published by the
8 * Free Software Foundation; either version 2, or (at your option) any
9 * later version.
10 *
11 * GNU Zebra is distributed in the hope that it will be useful, but
12 * WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License along
17 * with this program; see the file COPYING; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
19 */
20
21 #include <zebra.h>
22
23 #include "memory.h"
24 #include "log.h"
25 #include "vty.h"
26 #include "command.h"
27 #include "thread.h"
28 #include "linklist.h"
29 #include "lib_errors.h"
30 #include "checksum.h"
31
32 #include "ospf6_proto.h"
33 #include "ospf6_lsa.h"
34 #include "ospf6_lsdb.h"
35 #include "ospf6_top.h"
36 #include "ospf6_network.h"
37 #include "ospf6_message.h"
38
39 #include "ospf6_area.h"
40 #include "ospf6_neighbor.h"
41 #include "ospf6_interface.h"
42
43 /* for structures and macros ospf6_lsa_examin() needs */
44 #include "ospf6_abr.h"
45 #include "ospf6_asbr.h"
46 #include "ospf6_intra.h"
47
48 #include "ospf6_flood.h"
49 #include "ospf6d.h"
50 #include "ospf6_gr.h"
51 #include <netinet/ip6.h>
52 #include "lib/libospf.h"
53 #include "lib/keychain.h"
54 #include "ospf6_auth_trailer.h"
55
56 DEFINE_MTYPE_STATIC(OSPF6D, OSPF6_MESSAGE, "OSPF6 message");
57 DEFINE_MTYPE_STATIC(OSPF6D, OSPF6_PACKET, "OSPF6 packet");
58 DEFINE_MTYPE_STATIC(OSPF6D, OSPF6_FIFO, "OSPF6 FIFO queue");
59
60 unsigned char conf_debug_ospf6_message[6] = {0x03, 0, 0, 0, 0, 0};
61
62 const char *ospf6_message_type(int type)
63 {
64 switch (type) {
65 case OSPF6_MESSAGE_TYPE_HELLO:
66 return "Hello";
67 case OSPF6_MESSAGE_TYPE_DBDESC:
68 return "DbDesc";
69 case OSPF6_MESSAGE_TYPE_LSREQ:
70 return "LSReq";
71 case OSPF6_MESSAGE_TYPE_LSUPDATE:
72 return "LSUpdate";
73 case OSPF6_MESSAGE_TYPE_LSACK:
74 return "LSAck";
75 case OSPF6_MESSAGE_TYPE_UNKNOWN:
76 default:
77 return "unknown";
78 }
79 }
80
81 /* Minimum (besides the standard OSPF packet header) lengths for OSPF
82 packets of particular types, offset is the "type" field. */
83 const uint16_t ospf6_packet_minlen[OSPF6_MESSAGE_TYPE_ALL] = {
84 0,
85 OSPF6_HELLO_MIN_SIZE,
86 OSPF6_DB_DESC_MIN_SIZE,
87 OSPF6_LS_REQ_MIN_SIZE,
88 OSPF6_LS_UPD_MIN_SIZE,
89 OSPF6_LS_ACK_MIN_SIZE};
90
91 /* Minimum (besides the standard LSA header) lengths for LSAs of particular
92 types, offset is the "LSA function code" portion of "LSA type" field. */
93 const uint16_t ospf6_lsa_minlen[OSPF6_LSTYPE_SIZE] = {
94 0,
95 /* 0x2001 */ OSPF6_ROUTER_LSA_MIN_SIZE,
96 /* 0x2002 */ OSPF6_NETWORK_LSA_MIN_SIZE,
97 /* 0x2003 */ OSPF6_INTER_PREFIX_LSA_MIN_SIZE,
98 /* 0x2004 */ OSPF6_INTER_ROUTER_LSA_FIX_SIZE,
99 /* 0x4005 */ OSPF6_AS_EXTERNAL_LSA_MIN_SIZE,
100 /* 0x2006 */ 0,
101 /* 0x2007 */ OSPF6_AS_EXTERNAL_LSA_MIN_SIZE,
102 /* 0x0008 */ OSPF6_LINK_LSA_MIN_SIZE,
103 /* 0x2009 */ OSPF6_INTRA_PREFIX_LSA_MIN_SIZE,
104 /* 0x200a */ 0,
105 /* 0x000b */ OSPF6_GRACE_LSA_MIN_SIZE};
106
107 /* print functions */
108
109 static void ospf6_header_print(struct ospf6_header *oh)
110 {
111 zlog_debug(" OSPFv%d Type:%d Len:%hu Router-ID:%pI4", oh->version,
112 oh->type, ntohs(oh->length), &oh->router_id);
113 zlog_debug(" Area-ID:%pI4 Cksum:%hx Instance-ID:%d", &oh->area_id,
114 ntohs(oh->checksum), oh->instance_id);
115 }
116
117 void ospf6_hello_print(struct ospf6_header *oh, int action)
118 {
119 struct ospf6_hello *hello;
120 char options[32];
121 char *p;
122
123 ospf6_header_print(oh);
124 assert(oh->type == OSPF6_MESSAGE_TYPE_HELLO);
125
126 hello = (struct ospf6_hello *)((caddr_t)oh
127 + sizeof(struct ospf6_header));
128
129 ospf6_options_printbuf(hello->options, options, sizeof(options));
130
131 zlog_debug(" I/F-Id:%ld Priority:%d Option:%s",
132 (unsigned long)ntohl(hello->interface_id), hello->priority,
133 options);
134 zlog_debug(" HelloInterval:%hu DeadInterval:%hu",
135 ntohs(hello->hello_interval), ntohs(hello->dead_interval));
136 zlog_debug(" DR:%pI4 BDR:%pI4", &hello->drouter, &hello->bdrouter);
137
138 if ((IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV)
139 && action == OSPF6_ACTION_RECV)
140 || (IS_OSPF6_DEBUG_MESSAGE(oh->type, SEND)
141 && action == OSPF6_ACTION_SEND)) {
142
143 for (p = (char *)((caddr_t)hello + sizeof(struct ospf6_hello));
144 p + sizeof(uint32_t) <= OSPF6_MESSAGE_END(oh);
145 p += sizeof(uint32_t))
146 zlog_debug(" Neighbor: %pI4", (in_addr_t *)p);
147
148 assert(p == OSPF6_MESSAGE_END(oh));
149 }
150 }
151
152 void ospf6_dbdesc_print(struct ospf6_header *oh, int action)
153 {
154 struct ospf6_dbdesc *dbdesc;
155 char options[32];
156 char *p;
157
158 ospf6_header_print(oh);
159 assert(oh->type == OSPF6_MESSAGE_TYPE_DBDESC);
160
161 dbdesc = (struct ospf6_dbdesc *)((caddr_t)oh
162 + sizeof(struct ospf6_header));
163
164 ospf6_options_printbuf(dbdesc->options, options, sizeof(options));
165
166 zlog_debug(" MBZ: %#x Option: %s IfMTU: %hu", dbdesc->reserved1,
167 options, ntohs(dbdesc->ifmtu));
168 zlog_debug(" MBZ: %#x Bits: %s%s%s SeqNum: %#lx", dbdesc->reserved2,
169 (CHECK_FLAG(dbdesc->bits, OSPF6_DBDESC_IBIT) ? "I" : "-"),
170 (CHECK_FLAG(dbdesc->bits, OSPF6_DBDESC_MBIT) ? "M" : "-"),
171 (CHECK_FLAG(dbdesc->bits, OSPF6_DBDESC_MSBIT) ? "m" : "s"),
172 (unsigned long)ntohl(dbdesc->seqnum));
173
174 if ((IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV)
175 && action == OSPF6_ACTION_RECV)
176 || (IS_OSPF6_DEBUG_MESSAGE(oh->type, SEND)
177 && action == OSPF6_ACTION_SEND)) {
178
179 for (p = (char *)((caddr_t)dbdesc
180 + sizeof(struct ospf6_dbdesc));
181 p + sizeof(struct ospf6_lsa_header)
182 <= OSPF6_MESSAGE_END(oh);
183 p += sizeof(struct ospf6_lsa_header))
184 ospf6_lsa_header_print_raw(
185 (struct ospf6_lsa_header *)p);
186
187 assert(p == OSPF6_MESSAGE_END(oh));
188 }
189 }
190
191 void ospf6_lsreq_print(struct ospf6_header *oh, int action)
192 {
193 char *p;
194
195 ospf6_header_print(oh);
196 assert(oh->type == OSPF6_MESSAGE_TYPE_LSREQ);
197
198 if ((IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV)
199 && action == OSPF6_ACTION_RECV)
200 || (IS_OSPF6_DEBUG_MESSAGE(oh->type, SEND)
201 && action == OSPF6_ACTION_SEND)) {
202
203 for (p = (char *)((caddr_t)oh + sizeof(struct ospf6_header));
204 p + sizeof(struct ospf6_lsreq_entry)
205 <= OSPF6_MESSAGE_END(oh);
206 p += sizeof(struct ospf6_lsreq_entry)) {
207 struct ospf6_lsreq_entry *e =
208 (struct ospf6_lsreq_entry *)p;
209
210 zlog_debug(" [%s Id:%pI4 Adv:%pI4]",
211 ospf6_lstype_name(e->type), &e->id,
212 &e->adv_router);
213 }
214
215 assert(p == OSPF6_MESSAGE_END(oh));
216 }
217 }
218
219 void ospf6_lsupdate_print(struct ospf6_header *oh, int action)
220 {
221 struct ospf6_lsupdate *lsupdate;
222 unsigned long num;
223 char *p;
224
225 ospf6_header_print(oh);
226 assert(oh->type == OSPF6_MESSAGE_TYPE_LSUPDATE);
227
228 lsupdate = (struct ospf6_lsupdate *)((caddr_t)oh
229 + sizeof(struct ospf6_header));
230
231 num = ntohl(lsupdate->lsa_number);
232 zlog_debug(" Number of LSA: %ld", num);
233
234 if ((IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV)
235 && action == OSPF6_ACTION_RECV)
236 || (IS_OSPF6_DEBUG_MESSAGE(oh->type, SEND)
237 && action == OSPF6_ACTION_SEND)) {
238
239 for (p = (char *)((caddr_t)lsupdate
240 + sizeof(struct ospf6_lsupdate));
241 p < OSPF6_MESSAGE_END(oh)
242 && p + OSPF6_LSA_SIZE(p) <= OSPF6_MESSAGE_END(oh);
243 p += OSPF6_LSA_SIZE(p)) {
244 ospf6_lsa_header_print_raw(
245 (struct ospf6_lsa_header *)p);
246 }
247
248 assert(p == OSPF6_MESSAGE_END(oh));
249 }
250 }
251
252 void ospf6_lsack_print(struct ospf6_header *oh, int action)
253 {
254 char *p;
255
256 ospf6_header_print(oh);
257 assert(oh->type == OSPF6_MESSAGE_TYPE_LSACK);
258
259 if ((IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV)
260 && action == OSPF6_ACTION_RECV)
261 || (IS_OSPF6_DEBUG_MESSAGE(oh->type, SEND)
262 && action == OSPF6_ACTION_SEND)) {
263
264 for (p = (char *)((caddr_t)oh + sizeof(struct ospf6_header));
265 p + sizeof(struct ospf6_lsa_header)
266 <= OSPF6_MESSAGE_END(oh);
267 p += sizeof(struct ospf6_lsa_header))
268 ospf6_lsa_header_print_raw(
269 (struct ospf6_lsa_header *)p);
270
271 assert(p == OSPF6_MESSAGE_END(oh));
272 }
273 }
274
275 static struct ospf6_packet *ospf6_packet_new(size_t size)
276 {
277 struct ospf6_packet *new;
278
279 new = XCALLOC(MTYPE_OSPF6_PACKET, sizeof(struct ospf6_packet));
280 new->s = stream_new(size);
281
282 return new;
283 }
284
285 static void ospf6_packet_free(struct ospf6_packet *op)
286 {
287 if (op->s)
288 stream_free(op->s);
289
290 XFREE(MTYPE_OSPF6_PACKET, op);
291 }
292
293 struct ospf6_fifo *ospf6_fifo_new(void)
294 {
295 struct ospf6_fifo *new;
296
297 new = XCALLOC(MTYPE_OSPF6_FIFO, sizeof(struct ospf6_fifo));
298 return new;
299 }
300
301 /* Add new packet to fifo. */
302 static void ospf6_fifo_push(struct ospf6_fifo *fifo, struct ospf6_packet *op)
303 {
304 if (fifo->tail)
305 fifo->tail->next = op;
306 else
307 fifo->head = op;
308
309 fifo->tail = op;
310
311 fifo->count++;
312 }
313
314 /* Add new packet to head of fifo. */
315 static void ospf6_fifo_push_head(struct ospf6_fifo *fifo,
316 struct ospf6_packet *op)
317 {
318 op->next = fifo->head;
319
320 if (fifo->tail == NULL)
321 fifo->tail = op;
322
323 fifo->head = op;
324
325 fifo->count++;
326 }
327
328 /* Delete first packet from fifo. */
329 static struct ospf6_packet *ospf6_fifo_pop(struct ospf6_fifo *fifo)
330 {
331 struct ospf6_packet *op;
332
333 op = fifo->head;
334
335 if (op) {
336 fifo->head = op->next;
337
338 if (fifo->head == NULL)
339 fifo->tail = NULL;
340
341 fifo->count--;
342 }
343
344 return op;
345 }
346
347 /* Return first fifo entry. */
348 static struct ospf6_packet *ospf6_fifo_head(struct ospf6_fifo *fifo)
349 {
350 return fifo->head;
351 }
352
353 /* Flush ospf packet fifo. */
354 void ospf6_fifo_flush(struct ospf6_fifo *fifo)
355 {
356 struct ospf6_packet *op;
357 struct ospf6_packet *next;
358
359 for (op = fifo->head; op; op = next) {
360 next = op->next;
361 ospf6_packet_free(op);
362 }
363 fifo->head = fifo->tail = NULL;
364 fifo->count = 0;
365 }
366
367 /* Free ospf packet fifo. */
368 void ospf6_fifo_free(struct ospf6_fifo *fifo)
369 {
370 ospf6_fifo_flush(fifo);
371
372 XFREE(MTYPE_OSPF6_FIFO, fifo);
373 }
374
375 static void ospf6_packet_add(struct ospf6_interface *oi,
376 struct ospf6_packet *op)
377 {
378 /* Add packet to end of queue. */
379 ospf6_fifo_push(oi->obuf, op);
380
381 /* Debug of packet fifo*/
382 /* ospf_fifo_debug (oi->obuf); */
383 }
384
385 static void ospf6_packet_add_top(struct ospf6_interface *oi,
386 struct ospf6_packet *op)
387 {
388 /* Add packet to head of queue. */
389 ospf6_fifo_push_head(oi->obuf, op);
390
391 /* Debug of packet fifo*/
392 /* ospf_fifo_debug (oi->obuf); */
393 }
394
395 static void ospf6_packet_delete(struct ospf6_interface *oi)
396 {
397 struct ospf6_packet *op;
398
399 op = ospf6_fifo_pop(oi->obuf);
400
401 if (op)
402 ospf6_packet_free(op);
403 }
404
405
406 static void ospf6_hello_recv(struct in6_addr *src, struct in6_addr *dst,
407 struct ospf6_interface *oi,
408 struct ospf6_header *oh)
409 {
410 struct ospf6_hello *hello;
411 struct ospf6_neighbor *on;
412 char *p;
413 int twoway = 0;
414 int neighborchange = 0;
415 int neighbor_ifindex_change = 0;
416 int backupseen = 0;
417 int64_t latency = 0;
418 struct timeval timestamp;
419
420 monotime(&timestamp);
421 hello = (struct ospf6_hello *)((caddr_t)oh
422 + sizeof(struct ospf6_header));
423
424 /* HelloInterval check */
425 if (ntohs(hello->hello_interval) != oi->hello_interval) {
426 zlog_warn(
427 "VRF %s: I/F %s HelloInterval mismatch: (my %d, rcvd %d)",
428 oi->interface->vrf->name, oi->interface->name,
429 oi->hello_interval, ntohs(hello->hello_interval));
430 return;
431 }
432
433 /* RouterDeadInterval check */
434 if (ntohs(hello->dead_interval) != oi->dead_interval) {
435 zlog_warn(
436 "VRF %s: I/F %s DeadInterval mismatch: (my %d, rcvd %d)",
437 oi->interface->vrf->name, oi->interface->name,
438 oi->dead_interval, ntohs(hello->dead_interval));
439 return;
440 }
441
442 /* E-bit check */
443 if (OSPF6_OPT_ISSET(hello->options, OSPF6_OPT_E)
444 != OSPF6_OPT_ISSET(oi->area->options, OSPF6_OPT_E)) {
445 zlog_warn("VRF %s: IF %s E-bit mismatch",
446 oi->interface->vrf->name, oi->interface->name);
447 return;
448 }
449
450 /* N-bit check */
451 if (OSPF6_OPT_ISSET(hello->options, OSPF6_OPT_N)
452 != OSPF6_OPT_ISSET(oi->area->options, OSPF6_OPT_N)) {
453 zlog_warn("VRF %s: IF %s N-bit mismatch",
454 oi->interface->vrf->name, oi->interface->name);
455 return;
456 }
457
458 if (((OSPF6_OPT_ISSET_EXT(hello->options, OSPF6_OPT_AT) ==
459 OSPF6_OPT_AT) &&
460 (oi->at_data.flags == 0)) ||
461 ((OSPF6_OPT_ISSET_EXT(hello->options, OSPF6_OPT_AT) !=
462 OSPF6_OPT_AT) &&
463 (oi->at_data.flags != 0))) {
464 if (IS_OSPF6_DEBUG_AUTH_RX)
465 zlog_warn(
466 "VRF %s: IF %s AT-bit mismatch in hello packet",
467 oi->interface->vrf->name, oi->interface->name);
468 oi->at_data.rx_drop++;
469 return;
470 }
471
472 /* Find neighbor, create if not exist */
473 on = ospf6_neighbor_lookup(oh->router_id, oi);
474 if (on == NULL) {
475 on = ospf6_neighbor_create(oh->router_id, oi);
476 on->prev_drouter = on->drouter = hello->drouter;
477 on->prev_bdrouter = on->bdrouter = hello->bdrouter;
478 on->priority = hello->priority;
479 }
480
481 /* check latency against hello period */
482 if (on->hello_in)
483 latency = monotime_since(&on->last_hello, NULL)
484 - ((int64_t)oi->hello_interval * 1000000);
485 /* log if latency exceeds the hello period */
486 if (latency > ((int64_t)oi->hello_interval * 1000000))
487 zlog_warn("%s RX %pI4 high latency %" PRId64 "us.", __func__,
488 &on->router_id, latency);
489 on->last_hello = timestamp;
490 on->hello_in++;
491
492 /* Always override neighbor's source address */
493 memcpy(&on->linklocal_addr, src, sizeof(struct in6_addr));
494
495 /* Neighbor ifindex check */
496 if (on->ifindex != (ifindex_t)ntohl(hello->interface_id)) {
497 on->ifindex = ntohl(hello->interface_id);
498 neighbor_ifindex_change++;
499 }
500
501 /* TwoWay check */
502 for (p = (char *)((caddr_t)hello + sizeof(struct ospf6_hello));
503 p + sizeof(uint32_t) <= OSPF6_MESSAGE_END(oh);
504 p += sizeof(uint32_t)) {
505 uint32_t *router_id = (uint32_t *)p;
506
507 if (*router_id == oi->area->ospf6->router_id)
508 twoway++;
509 }
510
511 assert(p == OSPF6_MESSAGE_END(oh));
512
513 /* RouterPriority check */
514 if (on->priority != hello->priority) {
515 on->priority = hello->priority;
516 neighborchange++;
517 }
518
519 /* DR check */
520 if (on->drouter != hello->drouter) {
521 on->prev_drouter = on->drouter;
522 on->drouter = hello->drouter;
523 if (on->prev_drouter == on->router_id
524 || on->drouter == on->router_id)
525 neighborchange++;
526 }
527
528 /* BDR check */
529 if (on->bdrouter != hello->bdrouter) {
530 on->prev_bdrouter = on->bdrouter;
531 on->bdrouter = hello->bdrouter;
532 if (on->prev_bdrouter == on->router_id
533 || on->bdrouter == on->router_id)
534 neighborchange++;
535 }
536
537 /* BackupSeen check */
538 if (oi->state == OSPF6_INTERFACE_WAITING) {
539 if (hello->bdrouter == on->router_id)
540 backupseen++;
541 else if (hello->drouter == on->router_id
542 && hello->bdrouter == htonl(0))
543 backupseen++;
544 }
545
546 oi->hello_in++;
547
548 /* Execute neighbor events */
549 thread_execute(master, hello_received, on, 0);
550 if (twoway)
551 thread_execute(master, twoway_received, on, 0);
552 else {
553 if (OSPF6_GR_IS_ACTIVE_HELPER(on)) {
554 if (IS_DEBUG_OSPF6_GR)
555 zlog_debug(
556 "%s, Received oneway hello from RESTARTER so ignore here.",
557 __PRETTY_FUNCTION__);
558 } else {
559 /* If the router is DR_OTHER, RESTARTER will not wait
560 * until it receives the hello from it if it receives
561 * from DR and BDR.
562 * So, helper might receives ONE_WAY hello from
563 * RESTARTER. So not allowing to change the state if it
564 * receives one_way hellow when it acts as HELPER for
565 * that specific neighbor.
566 */
567 thread_execute(master, oneway_received, on, 0);
568 }
569 }
570
571 if (OSPF6_GR_IS_ACTIVE_HELPER(on)) {
572 /* As per the GR Conformance Test Case 7.2. Section 3
573 * "Also, if X was the Designated Router on network segment S
574 * when the helping relationship began, Y maintains X as the
575 * Designated Router until the helping relationship is
576 * terminated."
577 * When it is a helper for this neighbor, It should not trigger
578 * the ISM Events. Also Intentionally not setting the priority
579 * and other fields so that when the neighbor exits the Grace
580 * period, it can handle if there is any change before GR and
581 * after GR.
582 */
583 if (IS_DEBUG_OSPF6_GR)
584 zlog_debug(
585 "%s, Neighbor is under GR Restart, hence ignoring the ISM Events",
586 __PRETTY_FUNCTION__);
587
588 return;
589 }
590
591 /*
592 * RFC 3623 - Section 2:
593 * "If the restarting router determines that it was the Designated
594 * Router on a given segment prior to the restart, it elects
595 * itself as the Designated Router again. The restarting router
596 * knows that it was the Designated Router if, while the
597 * associated interface is in Waiting state, a Hello packet is
598 * received from a neighbor listing the router as the Designated
599 * Router".
600 */
601 if (oi->area->ospf6->gr_info.restart_in_progress
602 && oi->state == OSPF6_INTERFACE_WAITING
603 && hello->drouter == oi->area->ospf6->router_id)
604 oi->drouter = hello->drouter;
605
606 /* Schedule interface events */
607 if (backupseen)
608 thread_add_event(master, backup_seen, oi, 0, NULL);
609 if (neighborchange)
610 thread_add_event(master, neighbor_change, oi, 0, NULL);
611
612 if (neighbor_ifindex_change && on->state == OSPF6_NEIGHBOR_FULL)
613 OSPF6_ROUTER_LSA_SCHEDULE(oi->area);
614 }
615
616 static void ospf6_dbdesc_recv_master(struct ospf6_header *oh,
617 struct ospf6_neighbor *on)
618 {
619 struct ospf6_dbdesc *dbdesc;
620 char *p;
621
622 dbdesc = (struct ospf6_dbdesc *)((caddr_t)oh
623 + sizeof(struct ospf6_header));
624
625 if (on->state < OSPF6_NEIGHBOR_INIT) {
626 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV_HDR))
627 zlog_debug("Neighbor state less than Init, ignore");
628 return;
629 }
630
631 switch (on->state) {
632 case OSPF6_NEIGHBOR_TWOWAY:
633 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV_HDR))
634 zlog_debug("Neighbor state is 2-Way, ignore");
635 return;
636
637 case OSPF6_NEIGHBOR_INIT:
638 thread_execute(master, twoway_received, on, 0);
639 if (on->state != OSPF6_NEIGHBOR_EXSTART) {
640 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV_HDR))
641 zlog_debug(
642 "Neighbor state is not ExStart, ignore");
643 return;
644 }
645 /* else fall through to ExStart */
646 /* fallthru */
647 case OSPF6_NEIGHBOR_EXSTART:
648 /* if neighbor obeys us as our slave, schedule negotiation_done
649 and process LSA Headers. Otherwise, ignore this message */
650 if (!CHECK_FLAG(dbdesc->bits, OSPF6_DBDESC_MSBIT)
651 && !CHECK_FLAG(dbdesc->bits, OSPF6_DBDESC_IBIT)
652 && ntohl(dbdesc->seqnum) == on->dbdesc_seqnum) {
653 /* execute NegotiationDone */
654 thread_execute(master, negotiation_done, on, 0);
655
656 /* Record neighbor options */
657 memcpy(on->options, dbdesc->options,
658 sizeof(on->options));
659 } else {
660 zlog_warn("VRF %s: Nbr %s: Negotiation failed",
661 on->ospf6_if->interface->vrf->name, on->name);
662 return;
663 }
664 /* fall through to exchange */
665
666 case OSPF6_NEIGHBOR_EXCHANGE:
667 if (!memcmp(dbdesc, &on->dbdesc_last,
668 sizeof(struct ospf6_dbdesc))) {
669 /* Duplicated DatabaseDescription is dropped by master
670 */
671 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV_HDR))
672 zlog_debug(
673 "Duplicated dbdesc discarded by Master, ignore");
674 return;
675 }
676
677 if (CHECK_FLAG(dbdesc->bits, OSPF6_DBDESC_MSBIT)) {
678 zlog_warn(
679 "DbDesc recv: Master/Slave bit mismatch Nbr %s",
680 on->name);
681 thread_add_event(master, seqnumber_mismatch, on, 0,
682 NULL);
683 return;
684 }
685
686 if (CHECK_FLAG(dbdesc->bits, OSPF6_DBDESC_IBIT)) {
687 zlog_warn("DbDesc recv: Initialize bit mismatch Nbr %s",
688 on->name);
689 thread_add_event(master, seqnumber_mismatch, on, 0,
690 NULL);
691 return;
692 }
693
694 if (memcmp(on->options, dbdesc->options, sizeof(on->options))) {
695 zlog_warn("DbDesc recv: Option field mismatch Nbr %s",
696 on->name);
697 thread_add_event(master, seqnumber_mismatch, on, 0,
698 NULL);
699 return;
700 }
701
702 if (ntohl(dbdesc->seqnum) != on->dbdesc_seqnum) {
703 zlog_warn(
704 "DbDesc recv: Sequence number mismatch Nbr %s (%#lx expected)",
705 on->name, (unsigned long)on->dbdesc_seqnum);
706 thread_add_event(master, seqnumber_mismatch, on, 0,
707 NULL);
708 return;
709 }
710 break;
711
712 case OSPF6_NEIGHBOR_LOADING:
713 case OSPF6_NEIGHBOR_FULL:
714 if (!memcmp(dbdesc, &on->dbdesc_last,
715 sizeof(struct ospf6_dbdesc))) {
716 /* Duplicated DatabaseDescription is dropped by master
717 */
718 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV_HDR))
719 zlog_debug(
720 "Duplicated dbdesc discarded by Master, ignore");
721 return;
722 }
723
724 zlog_warn(
725 "DbDesc recv: Not duplicate dbdesc in state %s Nbr %s",
726 ospf6_neighbor_state_str[on->state], on->name);
727 thread_add_event(master, seqnumber_mismatch, on, 0, NULL);
728 return;
729
730 default:
731 assert(0);
732 break;
733 }
734
735 /* Process LSA headers */
736 for (p = (char *)((caddr_t)dbdesc + sizeof(struct ospf6_dbdesc));
737 p + sizeof(struct ospf6_lsa_header) <= OSPF6_MESSAGE_END(oh);
738 p += sizeof(struct ospf6_lsa_header)) {
739 struct ospf6_lsa *his, *mine;
740 struct ospf6_lsdb *lsdb = NULL;
741
742 his = ospf6_lsa_create_headeronly((struct ospf6_lsa_header *)p);
743
744 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV))
745 zlog_debug("%s", his->name);
746
747 switch (OSPF6_LSA_SCOPE(his->header->type)) {
748 case OSPF6_SCOPE_LINKLOCAL:
749 lsdb = on->ospf6_if->lsdb;
750 break;
751 case OSPF6_SCOPE_AREA:
752 lsdb = on->ospf6_if->area->lsdb;
753 break;
754 case OSPF6_SCOPE_AS:
755 lsdb = on->ospf6_if->area->ospf6->lsdb;
756 break;
757 case OSPF6_SCOPE_RESERVED:
758 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV))
759 zlog_debug("Ignoring LSA of reserved scope");
760 ospf6_lsa_delete(his);
761 continue;
762 }
763
764 if (ntohs(his->header->type) == OSPF6_LSTYPE_AS_EXTERNAL
765 && (IS_AREA_STUB(on->ospf6_if->area)
766 || IS_AREA_NSSA(on->ospf6_if->area))) {
767 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV))
768 zlog_debug(
769 "SeqNumMismatch (E-bit mismatch), discard");
770 ospf6_lsa_delete(his);
771 thread_add_event(master, seqnumber_mismatch, on, 0,
772 NULL);
773 return;
774 }
775
776 mine = ospf6_lsdb_lookup(his->header->type, his->header->id,
777 his->header->adv_router, lsdb);
778 if (mine == NULL) {
779 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV))
780 zlog_debug("Add request (No database copy)");
781 ospf6_lsdb_add(ospf6_lsa_copy(his), on->request_list);
782 } else if (ospf6_lsa_compare(his, mine) < 0) {
783 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV))
784 zlog_debug("Add request (Received MoreRecent)");
785 ospf6_lsdb_add(ospf6_lsa_copy(his), on->request_list);
786 } else {
787 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV))
788 zlog_debug("Discard (Existing MoreRecent)");
789 }
790 ospf6_lsa_delete(his);
791 }
792
793 assert(p == OSPF6_MESSAGE_END(oh));
794
795 /* Increment sequence number */
796 on->dbdesc_seqnum++;
797
798 /* schedule send lsreq */
799 if (on->request_list->count)
800 thread_add_event(master, ospf6_lsreq_send, on, 0,
801 &on->thread_send_lsreq);
802
803 THREAD_OFF(on->thread_send_dbdesc);
804
805 /* More bit check */
806 if (!CHECK_FLAG(dbdesc->bits, OSPF6_DBDESC_MBIT)
807 && !CHECK_FLAG(on->dbdesc_bits, OSPF6_DBDESC_MBIT))
808 thread_add_event(master, exchange_done, on, 0,
809 &on->thread_exchange_done);
810 else {
811 thread_add_event(master, ospf6_dbdesc_send_newone, on, 0,
812 &on->thread_send_dbdesc);
813 }
814
815 /* save last received dbdesc */
816 memcpy(&on->dbdesc_last, dbdesc, sizeof(struct ospf6_dbdesc));
817 }
818
819 static void ospf6_dbdesc_recv_slave(struct ospf6_header *oh,
820 struct ospf6_neighbor *on)
821 {
822 struct ospf6_dbdesc *dbdesc;
823 char *p;
824
825 dbdesc = (struct ospf6_dbdesc *)((caddr_t)oh
826 + sizeof(struct ospf6_header));
827
828 if (on->state < OSPF6_NEIGHBOR_INIT) {
829 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV_HDR))
830 zlog_debug("Neighbor state less than Init, ignore");
831 return;
832 }
833
834 switch (on->state) {
835 case OSPF6_NEIGHBOR_TWOWAY:
836 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV_HDR))
837 zlog_debug("Neighbor state is 2-Way, ignore");
838 return;
839
840 case OSPF6_NEIGHBOR_INIT:
841 thread_execute(master, twoway_received, on, 0);
842 if (on->state != OSPF6_NEIGHBOR_EXSTART) {
843 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV_HDR))
844 zlog_debug(
845 "Neighbor state is not ExStart, ignore");
846 return;
847 }
848 /* else fall through to ExStart */
849 /* fallthru */
850 case OSPF6_NEIGHBOR_EXSTART:
851 /* If the neighbor is Master, act as Slave. Schedule
852 negotiation_done
853 and process LSA Headers. Otherwise, ignore this message */
854 if (CHECK_FLAG(dbdesc->bits, OSPF6_DBDESC_IBIT)
855 && CHECK_FLAG(dbdesc->bits, OSPF6_DBDESC_MBIT)
856 && CHECK_FLAG(dbdesc->bits, OSPF6_DBDESC_MSBIT)
857 && ntohs(oh->length)
858 == sizeof(struct ospf6_header)
859 + sizeof(struct ospf6_dbdesc)) {
860 /* set the master/slave bit to slave */
861 UNSET_FLAG(on->dbdesc_bits, OSPF6_DBDESC_MSBIT);
862
863 /* set the DD sequence number to one specified by master
864 */
865 on->dbdesc_seqnum = ntohl(dbdesc->seqnum);
866
867 /* schedule NegotiationDone */
868 thread_execute(master, negotiation_done, on, 0);
869
870 /* Record neighbor options */
871 memcpy(on->options, dbdesc->options,
872 sizeof(on->options));
873 } else {
874 zlog_warn("VRF %s: Nbr %s Negotiation failed",
875 on->ospf6_if->interface->vrf->name, on->name);
876 return;
877 }
878 break;
879
880 case OSPF6_NEIGHBOR_EXCHANGE:
881 if (!memcmp(dbdesc, &on->dbdesc_last,
882 sizeof(struct ospf6_dbdesc))) {
883 /* Duplicated DatabaseDescription causes slave to
884 * retransmit */
885 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV_HDR))
886 zlog_debug(
887 "Duplicated dbdesc causes retransmit");
888 THREAD_OFF(on->thread_send_dbdesc);
889 thread_add_event(master, ospf6_dbdesc_send, on, 0,
890 &on->thread_send_dbdesc);
891 return;
892 }
893
894 if (!CHECK_FLAG(dbdesc->bits, OSPF6_DBDESC_MSBIT)) {
895 zlog_warn(
896 "DbDesc slave recv: Master/Slave bit mismatch Nbr %s",
897 on->name);
898 thread_add_event(master, seqnumber_mismatch, on, 0,
899 NULL);
900 return;
901 }
902
903 if (CHECK_FLAG(dbdesc->bits, OSPF6_DBDESC_IBIT)) {
904 zlog_warn(
905 "DbDesc slave recv: Initialize bit mismatch Nbr %s",
906 on->name);
907 thread_add_event(master, seqnumber_mismatch, on, 0,
908 NULL);
909 return;
910 }
911
912 if (memcmp(on->options, dbdesc->options, sizeof(on->options))) {
913 zlog_warn(
914 "DbDesc slave recv: Option field mismatch Nbr %s",
915 on->name);
916 thread_add_event(master, seqnumber_mismatch, on, 0,
917 NULL);
918 return;
919 }
920
921 if (ntohl(dbdesc->seqnum) != on->dbdesc_seqnum + 1) {
922 zlog_warn(
923 "DbDesc slave recv: Sequence number mismatch Nbr %s (%#lx expected)",
924 on->name, (unsigned long)on->dbdesc_seqnum + 1);
925 thread_add_event(master, seqnumber_mismatch, on, 0,
926 NULL);
927 return;
928 }
929 break;
930
931 case OSPF6_NEIGHBOR_LOADING:
932 case OSPF6_NEIGHBOR_FULL:
933 if (!memcmp(dbdesc, &on->dbdesc_last,
934 sizeof(struct ospf6_dbdesc))) {
935 /* Duplicated DatabaseDescription causes slave to
936 * retransmit */
937 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV_HDR))
938 zlog_debug(
939 "Duplicated dbdesc causes retransmit");
940 THREAD_OFF(on->thread_send_dbdesc);
941 thread_add_event(master, ospf6_dbdesc_send, on, 0,
942 &on->thread_send_dbdesc);
943 return;
944 }
945
946 zlog_warn(
947 "DbDesc slave recv: Not duplicate dbdesc in state %s Nbr %s",
948 ospf6_neighbor_state_str[on->state], on->name);
949 thread_add_event(master, seqnumber_mismatch, on, 0, NULL);
950 return;
951
952 default:
953 assert(0);
954 break;
955 }
956
957 /* Process LSA headers */
958 for (p = (char *)((caddr_t)dbdesc + sizeof(struct ospf6_dbdesc));
959 p + sizeof(struct ospf6_lsa_header) <= OSPF6_MESSAGE_END(oh);
960 p += sizeof(struct ospf6_lsa_header)) {
961 struct ospf6_lsa *his, *mine;
962 struct ospf6_lsdb *lsdb = NULL;
963
964 his = ospf6_lsa_create_headeronly((struct ospf6_lsa_header *)p);
965
966 switch (OSPF6_LSA_SCOPE(his->header->type)) {
967 case OSPF6_SCOPE_LINKLOCAL:
968 lsdb = on->ospf6_if->lsdb;
969 break;
970 case OSPF6_SCOPE_AREA:
971 lsdb = on->ospf6_if->area->lsdb;
972 break;
973 case OSPF6_SCOPE_AS:
974 lsdb = on->ospf6_if->area->ospf6->lsdb;
975 break;
976 case OSPF6_SCOPE_RESERVED:
977 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV))
978 zlog_debug("Ignoring LSA of reserved scope");
979 ospf6_lsa_delete(his);
980 continue;
981 }
982
983 if (OSPF6_LSA_SCOPE(his->header->type) == OSPF6_SCOPE_AS
984 && (IS_AREA_STUB(on->ospf6_if->area)
985 || IS_AREA_NSSA(on->ospf6_if->area))) {
986 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV))
987 zlog_debug("E-bit mismatch with LSA Headers");
988 ospf6_lsa_delete(his);
989 thread_add_event(master, seqnumber_mismatch, on, 0,
990 NULL);
991 return;
992 }
993
994 mine = ospf6_lsdb_lookup(his->header->type, his->header->id,
995 his->header->adv_router, lsdb);
996 if (mine == NULL || ospf6_lsa_compare(his, mine) < 0) {
997 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV))
998 zlog_debug("Add request-list: %s", his->name);
999 ospf6_lsdb_add(ospf6_lsa_copy(his), on->request_list);
1000 }
1001 ospf6_lsa_delete(his);
1002 }
1003
1004 assert(p == OSPF6_MESSAGE_END(oh));
1005
1006 /* Set sequence number to Master's */
1007 on->dbdesc_seqnum = ntohl(dbdesc->seqnum);
1008
1009 /* schedule send lsreq */
1010 if (on->request_list->count)
1011 thread_add_event(master, ospf6_lsreq_send, on, 0,
1012 &on->thread_send_lsreq);
1013
1014 THREAD_OFF(on->thread_send_dbdesc);
1015 thread_add_event(master, ospf6_dbdesc_send_newone, on, 0,
1016 &on->thread_send_dbdesc);
1017
1018 /* save last received dbdesc */
1019 memcpy(&on->dbdesc_last, dbdesc, sizeof(struct ospf6_dbdesc));
1020 }
1021
1022 static void ospf6_dbdesc_recv(struct in6_addr *src, struct in6_addr *dst,
1023 struct ospf6_interface *oi,
1024 struct ospf6_header *oh)
1025 {
1026 struct ospf6_neighbor *on;
1027 struct ospf6_dbdesc *dbdesc;
1028
1029 on = ospf6_neighbor_lookup(oh->router_id, oi);
1030 if (on == NULL) {
1031 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV_HDR))
1032 zlog_debug("Neighbor not found, ignore");
1033 return;
1034 }
1035
1036 dbdesc = (struct ospf6_dbdesc *)((caddr_t)oh
1037 + sizeof(struct ospf6_header));
1038
1039 if (((OSPF6_OPT_ISSET_EXT(dbdesc->options, OSPF6_OPT_AT) ==
1040 OSPF6_OPT_AT) &&
1041 (oi->at_data.flags == 0)) ||
1042 ((OSPF6_OPT_ISSET_EXT(dbdesc->options, OSPF6_OPT_AT) !=
1043 OSPF6_OPT_AT) &&
1044 (oi->at_data.flags != 0))) {
1045 if (IS_OSPF6_DEBUG_AUTH_RX)
1046 zlog_warn(
1047 "VRF %s: IF %s AT-bit mismatch in dbdesc packet",
1048 oi->interface->vrf->name, oi->interface->name);
1049 oi->at_data.rx_drop++;
1050 return;
1051 }
1052
1053 /* Interface MTU check */
1054 if (!oi->mtu_ignore && ntohs(dbdesc->ifmtu) != oi->ifmtu) {
1055 zlog_warn("VRF %s: I/F %s MTU mismatch (my %d rcvd %d)",
1056 oi->interface->vrf->name, oi->interface->name,
1057 oi->ifmtu, ntohs(dbdesc->ifmtu));
1058 return;
1059 }
1060
1061 if (dbdesc->reserved1 || dbdesc->reserved2) {
1062 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV_HDR))
1063 zlog_debug(
1064 "Non-0 reserved field in %s's DbDesc, correct",
1065 on->name);
1066 dbdesc->reserved1 = 0;
1067 dbdesc->reserved2 = 0;
1068 }
1069
1070 oi->db_desc_in++;
1071
1072 if (ntohl(oh->router_id) < ntohl(oi->area->ospf6->router_id))
1073 ospf6_dbdesc_recv_master(oh, on);
1074 else if (ntohl(oi->area->ospf6->router_id) < ntohl(oh->router_id))
1075 ospf6_dbdesc_recv_slave(oh, on);
1076 else {
1077 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV_HDR))
1078 zlog_debug("Can't decide which is master, ignore");
1079 }
1080 }
1081
1082 static void ospf6_lsreq_recv(struct in6_addr *src, struct in6_addr *dst,
1083 struct ospf6_interface *oi,
1084 struct ospf6_header *oh)
1085 {
1086 struct ospf6_neighbor *on;
1087 char *p;
1088 struct ospf6_lsreq_entry *e;
1089 struct ospf6_lsdb *lsdb = NULL;
1090 struct ospf6_lsa *lsa;
1091
1092 on = ospf6_neighbor_lookup(oh->router_id, oi);
1093 if (on == NULL) {
1094 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV_HDR))
1095 zlog_debug("Neighbor not found, ignore");
1096 return;
1097 }
1098
1099 if (on->state != OSPF6_NEIGHBOR_EXCHANGE
1100 && on->state != OSPF6_NEIGHBOR_LOADING
1101 && on->state != OSPF6_NEIGHBOR_FULL) {
1102 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV_HDR))
1103 zlog_debug("Neighbor state less than Exchange, ignore");
1104 return;
1105 }
1106
1107 oi->ls_req_in++;
1108
1109 /* Process each request */
1110 for (p = (char *)((caddr_t)oh + sizeof(struct ospf6_header));
1111 p + sizeof(struct ospf6_lsreq_entry) <= OSPF6_MESSAGE_END(oh);
1112 p += sizeof(struct ospf6_lsreq_entry)) {
1113 e = (struct ospf6_lsreq_entry *)p;
1114
1115 switch (OSPF6_LSA_SCOPE(e->type)) {
1116 case OSPF6_SCOPE_LINKLOCAL:
1117 lsdb = on->ospf6_if->lsdb;
1118 break;
1119 case OSPF6_SCOPE_AREA:
1120 lsdb = on->ospf6_if->area->lsdb;
1121 break;
1122 case OSPF6_SCOPE_AS:
1123 lsdb = on->ospf6_if->area->ospf6->lsdb;
1124 break;
1125 default:
1126 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV))
1127 zlog_debug("Ignoring LSA of reserved scope");
1128 continue;
1129 }
1130
1131 /* Find database copy */
1132 lsa = ospf6_lsdb_lookup(e->type, e->id, e->adv_router, lsdb);
1133 if (lsa == NULL) {
1134 zlog_warn(
1135 "Can't find requested lsa [%s Id:%pI4 Adv:%pI4] send badLSReq",
1136 ospf6_lstype_name(e->type), &e->id,
1137 &e->adv_router);
1138 thread_add_event(master, bad_lsreq, on, 0, NULL);
1139 return;
1140 }
1141
1142 ospf6_lsdb_add(ospf6_lsa_copy(lsa), on->lsupdate_list);
1143 }
1144
1145 assert(p == OSPF6_MESSAGE_END(oh));
1146
1147 /* schedule send lsupdate */
1148 THREAD_OFF(on->thread_send_lsupdate);
1149 thread_add_event(master, ospf6_lsupdate_send_neighbor, on, 0,
1150 &on->thread_send_lsupdate);
1151 }
1152
1153 /* Verify, that the specified memory area contains exactly N valid IPv6
1154 prefixes as specified by RFC5340, A.4.1. */
1155 static unsigned ospf6_prefixes_examin(
1156 struct ospf6_prefix *current, /* start of buffer */
1157 unsigned length,
1158 const uint32_t req_num_pfxs /* always compared with the actual number
1159 of prefixes */
1160 )
1161 {
1162 uint8_t requested_pfx_bytes;
1163 uint32_t real_num_pfxs = 0;
1164
1165 while (length) {
1166 if (length < OSPF6_PREFIX_MIN_SIZE) {
1167 zlog_warn("%s: undersized IPv6 prefix header",
1168 __func__);
1169 return MSG_NG;
1170 }
1171 /* safe to look deeper */
1172 if (current->prefix_length > IPV6_MAX_BITLEN) {
1173 zlog_warn("%s: invalid PrefixLength (%u bits)",
1174 __func__, current->prefix_length);
1175 return MSG_NG;
1176 }
1177 /* covers both fixed- and variable-sized fields */
1178 requested_pfx_bytes =
1179 OSPF6_PREFIX_MIN_SIZE
1180 + OSPF6_PREFIX_SPACE(current->prefix_length);
1181 if (requested_pfx_bytes > length) {
1182 zlog_warn("%s: undersized IPv6 prefix", __func__);
1183 return MSG_NG;
1184 }
1185 /* next prefix */
1186 length -= requested_pfx_bytes;
1187 current = (struct ospf6_prefix *)((caddr_t)current
1188 + requested_pfx_bytes);
1189 real_num_pfxs++;
1190 }
1191 if (real_num_pfxs != req_num_pfxs) {
1192 zlog_warn(
1193 "%s: IPv6 prefix number mismatch (%u required, %u real)",
1194 __func__, req_num_pfxs, real_num_pfxs);
1195 return MSG_NG;
1196 }
1197 return MSG_OK;
1198 }
1199
1200 /* Verify an LSA to have a valid length and dispatch further (where
1201 appropriate) to check if the contents, including nested IPv6 prefixes,
1202 is properly sized/aligned within the LSA. Note that this function gets
1203 LSA type in network byte order, uses in host byte order and passes to
1204 ospf6_lstype_name() in network byte order again. */
1205 static unsigned ospf6_lsa_examin(struct ospf6_lsa_header *lsah,
1206 const uint16_t lsalen,
1207 const uint8_t headeronly)
1208 {
1209 struct ospf6_intra_prefix_lsa *intra_prefix_lsa;
1210 struct ospf6_as_external_lsa *as_external_lsa;
1211 struct ospf6_link_lsa *link_lsa;
1212 unsigned exp_length;
1213 uint8_t ltindex;
1214 uint16_t lsatype;
1215
1216 /* In case an additional minimum length constraint is defined for
1217 current
1218 LSA type, make sure that this constraint is met. */
1219 lsatype = ntohs(lsah->type);
1220 ltindex = lsatype & OSPF6_LSTYPE_FCODE_MASK;
1221 if (ltindex < OSPF6_LSTYPE_SIZE && ospf6_lsa_minlen[ltindex]
1222 && lsalen < ospf6_lsa_minlen[ltindex] + OSPF6_LSA_HEADER_SIZE) {
1223 zlog_warn("%s: undersized (%u B) LSA", __func__, lsalen);
1224 return MSG_NG;
1225 }
1226 switch (lsatype) {
1227 case OSPF6_LSTYPE_ROUTER:
1228 /* RFC5340 A.4.3, LSA header + OSPF6_ROUTER_LSA_MIN_SIZE bytes
1229 followed
1230 by N>=0 interface descriptions. */
1231 if ((lsalen - OSPF6_LSA_HEADER_SIZE - OSPF6_ROUTER_LSA_MIN_SIZE)
1232 % OSPF6_ROUTER_LSDESC_FIX_SIZE) {
1233 zlog_warn(
1234 "%s: Router LSA interface description alignment error",
1235 __func__);
1236 return MSG_NG;
1237 }
1238 break;
1239 case OSPF6_LSTYPE_NETWORK:
1240 /* RFC5340 A.4.4, LSA header + OSPF6_NETWORK_LSA_MIN_SIZE bytes
1241 followed by N>=0 attached router descriptions. */
1242 if ((lsalen - OSPF6_LSA_HEADER_SIZE
1243 - OSPF6_NETWORK_LSA_MIN_SIZE)
1244 % OSPF6_NETWORK_LSDESC_FIX_SIZE) {
1245 zlog_warn(
1246 "%s: Network LSA router description alignment error",
1247 __func__);
1248 return MSG_NG;
1249 }
1250 break;
1251 case OSPF6_LSTYPE_INTER_PREFIX:
1252 /* RFC5340 A.4.5, LSA header + OSPF6_INTER_PREFIX_LSA_MIN_SIZE
1253 bytes
1254 followed by 3-4 fields of a single IPv6 prefix. */
1255 if (headeronly)
1256 break;
1257 return ospf6_prefixes_examin(
1258 (struct ospf6_prefix
1259 *)((caddr_t)lsah + OSPF6_LSA_HEADER_SIZE
1260 + OSPF6_INTER_PREFIX_LSA_MIN_SIZE),
1261 lsalen - OSPF6_LSA_HEADER_SIZE
1262 - OSPF6_INTER_PREFIX_LSA_MIN_SIZE,
1263 1);
1264 case OSPF6_LSTYPE_INTER_ROUTER:
1265 /* RFC5340 A.4.6, fixed-size LSA. */
1266 if (lsalen
1267 > OSPF6_LSA_HEADER_SIZE + OSPF6_INTER_ROUTER_LSA_FIX_SIZE) {
1268 zlog_warn("%s: Inter Router LSA oversized (%u B) LSA",
1269 __func__, lsalen);
1270 return MSG_NG;
1271 }
1272 break;
1273 case OSPF6_LSTYPE_AS_EXTERNAL: /* RFC5340 A.4.7, same as A.4.8. */
1274 case OSPF6_LSTYPE_TYPE_7:
1275 /* RFC5340 A.4.8, LSA header + OSPF6_AS_EXTERNAL_LSA_MIN_SIZE
1276 bytes
1277 followed by 3-4 fields of IPv6 prefix and 3 conditional LSA
1278 fields:
1279 16 bytes of forwarding address, 4 bytes of external route
1280 tag,
1281 4 bytes of referenced link state ID. */
1282 if (headeronly)
1283 break;
1284 as_external_lsa =
1285 (struct ospf6_as_external_lsa
1286 *)((caddr_t)lsah + OSPF6_LSA_HEADER_SIZE);
1287 exp_length =
1288 OSPF6_LSA_HEADER_SIZE + OSPF6_AS_EXTERNAL_LSA_MIN_SIZE;
1289 /* To find out if the last optional field (Referenced Link State
1290 ID) is
1291 assumed in this LSA, we need to access fixed fields of the
1292 IPv6
1293 prefix before ospf6_prefix_examin() confirms its sizing. */
1294 if (exp_length + OSPF6_PREFIX_MIN_SIZE > lsalen) {
1295 zlog_warn(
1296 "%s: AS External undersized (%u B) LSA header",
1297 __func__, lsalen);
1298 return MSG_NG;
1299 }
1300 /* forwarding address */
1301 if (CHECK_FLAG(as_external_lsa->bits_metric, OSPF6_ASBR_BIT_F))
1302 exp_length += 16;
1303 /* external route tag */
1304 if (CHECK_FLAG(as_external_lsa->bits_metric, OSPF6_ASBR_BIT_T))
1305 exp_length += 4;
1306 /* referenced link state ID */
1307 if (as_external_lsa->prefix.u._prefix_referenced_lstype)
1308 exp_length += 4;
1309 /* All the fixed-size fields (mandatory and optional) must fit.
1310 I.e.,
1311 this check does not include any IPv6 prefix fields. */
1312 if (exp_length > lsalen) {
1313 zlog_warn(
1314 "%s: AS External undersized (%u B) LSA header",
1315 __func__, lsalen);
1316 return MSG_NG;
1317 }
1318 /* The last call completely covers the remainder (IPv6 prefix).
1319 */
1320 return ospf6_prefixes_examin(
1321 (struct ospf6_prefix
1322 *)((caddr_t)as_external_lsa
1323 + OSPF6_AS_EXTERNAL_LSA_MIN_SIZE),
1324 lsalen - exp_length, 1);
1325 case OSPF6_LSTYPE_LINK:
1326 /* RFC5340 A.4.9, LSA header + OSPF6_LINK_LSA_MIN_SIZE bytes
1327 followed
1328 by N>=0 IPv6 prefix blocks (with N declared beforehand). */
1329 if (headeronly)
1330 break;
1331 link_lsa = (struct ospf6_link_lsa *)((caddr_t)lsah
1332 + OSPF6_LSA_HEADER_SIZE);
1333 return ospf6_prefixes_examin(
1334 (struct ospf6_prefix *)((caddr_t)link_lsa
1335 + OSPF6_LINK_LSA_MIN_SIZE),
1336 lsalen - OSPF6_LSA_HEADER_SIZE
1337 - OSPF6_LINK_LSA_MIN_SIZE,
1338 ntohl(link_lsa->prefix_num) /* 32 bits */
1339 );
1340 case OSPF6_LSTYPE_INTRA_PREFIX:
1341 /* RFC5340 A.4.10, LSA header + OSPF6_INTRA_PREFIX_LSA_MIN_SIZE
1342 bytes
1343 followed by N>=0 IPv6 prefixes (with N declared beforehand).
1344 */
1345 if (headeronly)
1346 break;
1347 intra_prefix_lsa =
1348 (struct ospf6_intra_prefix_lsa
1349 *)((caddr_t)lsah + OSPF6_LSA_HEADER_SIZE);
1350 return ospf6_prefixes_examin(
1351 (struct ospf6_prefix
1352 *)((caddr_t)intra_prefix_lsa
1353 + OSPF6_INTRA_PREFIX_LSA_MIN_SIZE),
1354 lsalen - OSPF6_LSA_HEADER_SIZE
1355 - OSPF6_INTRA_PREFIX_LSA_MIN_SIZE,
1356 ntohs(intra_prefix_lsa->prefix_num) /* 16 bits */
1357 );
1358 case OSPF6_LSTYPE_GRACE_LSA:
1359 if (lsalen < OSPF6_LSA_HEADER_SIZE + GRACE_PERIOD_TLV_SIZE
1360 + GRACE_RESTART_REASON_TLV_SIZE) {
1361 if (IS_DEBUG_OSPF6_GR)
1362 zlog_debug("%s: Undersized GraceLSA.",
1363 __func__);
1364 return MSG_NG;
1365 }
1366 }
1367 /* No additional validation is possible for unknown LSA types, which are
1368 themselves valid in OPSFv3, hence the default decision is to accept.
1369 */
1370 return MSG_OK;
1371 }
1372
1373 /* Verify if the provided input buffer is a valid sequence of LSAs. This
1374 includes verification of LSA blocks length/alignment and dispatching
1375 of deeper-level checks. */
1376 static unsigned
1377 ospf6_lsaseq_examin(struct ospf6_lsa_header *lsah, /* start of buffered data */
1378 size_t length, const uint8_t headeronly,
1379 /* When declared_num_lsas is not 0, compare it to the real
1380 number of LSAs
1381 and treat the difference as an error. */
1382 const uint32_t declared_num_lsas)
1383 {
1384 uint32_t counted_lsas = 0;
1385
1386 while (length) {
1387 uint16_t lsalen;
1388 if (length < OSPF6_LSA_HEADER_SIZE) {
1389 zlog_warn(
1390 "%s: undersized (%zu B) trailing (#%u) LSA header",
1391 __func__, length, counted_lsas);
1392 return MSG_NG;
1393 }
1394 /* save on ntohs() calls here and in the LSA validator */
1395 lsalen = OSPF6_LSA_SIZE(lsah);
1396 if (lsalen < OSPF6_LSA_HEADER_SIZE) {
1397 zlog_warn(
1398 "%s: malformed LSA header #%u, declared length is %u B",
1399 __func__, counted_lsas, lsalen);
1400 return MSG_NG;
1401 }
1402 if (headeronly) {
1403 /* less checks here and in ospf6_lsa_examin() */
1404 if (MSG_OK != ospf6_lsa_examin(lsah, lsalen, 1)) {
1405 zlog_warn(
1406 "%s: anomaly in header-only %s LSA #%u",
1407 __func__, ospf6_lstype_name(lsah->type),
1408 counted_lsas);
1409 return MSG_NG;
1410 }
1411 lsah = (struct ospf6_lsa_header
1412 *)((caddr_t)lsah
1413 + OSPF6_LSA_HEADER_SIZE);
1414 length -= OSPF6_LSA_HEADER_SIZE;
1415 } else {
1416 /* make sure the input buffer is deep enough before
1417 * further checks */
1418 if (lsalen > length) {
1419 zlog_warn(
1420 "%s: anomaly in %s LSA #%u: declared length is %u B, buffered length is %zu B",
1421 __func__, ospf6_lstype_name(lsah->type),
1422 counted_lsas, lsalen, length);
1423 return MSG_NG;
1424 }
1425 if (MSG_OK != ospf6_lsa_examin(lsah, lsalen, 0)) {
1426 zlog_warn("%s: anomaly in %s LSA #%u", __func__,
1427 ospf6_lstype_name(lsah->type),
1428 counted_lsas);
1429 return MSG_NG;
1430 }
1431 lsah = (struct ospf6_lsa_header *)((caddr_t)lsah
1432 + lsalen);
1433 length -= lsalen;
1434 }
1435 counted_lsas++;
1436 }
1437
1438 if (declared_num_lsas && counted_lsas != declared_num_lsas) {
1439 zlog_warn("%s: #LSAs declared (%u) does not match actual (%u)",
1440 __func__, declared_num_lsas, counted_lsas);
1441 return MSG_NG;
1442 }
1443 return MSG_OK;
1444 }
1445
1446 /* Verify a complete OSPF packet for proper sizing/alignment. */
1447 static unsigned ospf6_packet_examin(struct ospf6_header *oh,
1448 const unsigned bytesonwire)
1449 {
1450 struct ospf6_lsupdate *lsupd;
1451 unsigned test;
1452
1453 /* length, 1st approximation */
1454 if (bytesonwire < OSPF6_HEADER_SIZE) {
1455 zlog_warn("%s: undersized (%u B) packet", __func__,
1456 bytesonwire);
1457 return MSG_NG;
1458 }
1459
1460 /* Now it is safe to access header fields. */
1461 if (bytesonwire != ntohs(oh->length)) {
1462 zlog_warn("%s: %s packet length error (%u real, %u declared)",
1463 __func__, ospf6_message_type(oh->type), bytesonwire,
1464 ntohs(oh->length));
1465 return MSG_NG;
1466 }
1467
1468 /* version check */
1469 if (oh->version != OSPFV3_VERSION) {
1470 zlog_warn("%s: invalid (%u) protocol version", __func__,
1471 oh->version);
1472 return MSG_NG;
1473 }
1474 /* length, 2nd approximation */
1475 if (oh->type < OSPF6_MESSAGE_TYPE_ALL && ospf6_packet_minlen[oh->type]
1476 && bytesonwire
1477 < OSPF6_HEADER_SIZE + ospf6_packet_minlen[oh->type]) {
1478 zlog_warn("%s: undersized (%u B) %s packet", __func__,
1479 bytesonwire, ospf6_message_type(oh->type));
1480 return MSG_NG;
1481 }
1482 /* type-specific deeper validation */
1483 switch (oh->type) {
1484 case OSPF6_MESSAGE_TYPE_HELLO:
1485 /* RFC5340 A.3.2, packet header + OSPF6_HELLO_MIN_SIZE bytes
1486 followed
1487 by N>=0 router-IDs. */
1488 if (0
1489 == (bytesonwire - OSPF6_HEADER_SIZE - OSPF6_HELLO_MIN_SIZE)
1490 % 4)
1491 return MSG_OK;
1492 zlog_warn("%s: alignment error in %s packet", __func__,
1493 ospf6_message_type(oh->type));
1494 return MSG_NG;
1495 case OSPF6_MESSAGE_TYPE_DBDESC:
1496 /* RFC5340 A.3.3, packet header + OSPF6_DB_DESC_MIN_SIZE bytes
1497 followed
1498 by N>=0 header-only LSAs. */
1499 test = ospf6_lsaseq_examin(
1500 (struct ospf6_lsa_header *)((caddr_t)oh
1501 + OSPF6_HEADER_SIZE
1502 + OSPF6_DB_DESC_MIN_SIZE),
1503 bytesonwire - OSPF6_HEADER_SIZE
1504 - OSPF6_DB_DESC_MIN_SIZE,
1505 1, 0);
1506 break;
1507 case OSPF6_MESSAGE_TYPE_LSREQ:
1508 /* RFC5340 A.3.4, packet header + N>=0 LS description blocks. */
1509 if (0
1510 == (bytesonwire - OSPF6_HEADER_SIZE - OSPF6_LS_REQ_MIN_SIZE)
1511 % OSPF6_LSREQ_LSDESC_FIX_SIZE)
1512 return MSG_OK;
1513 zlog_warn("%s: alignment error in %s packet", __func__,
1514 ospf6_message_type(oh->type));
1515 return MSG_NG;
1516 case OSPF6_MESSAGE_TYPE_LSUPDATE:
1517 /* RFC5340 A.3.5, packet header + OSPF6_LS_UPD_MIN_SIZE bytes
1518 followed
1519 by N>=0 full LSAs (with N declared beforehand). */
1520 lsupd = (struct ospf6_lsupdate *)((caddr_t)oh
1521 + OSPF6_HEADER_SIZE);
1522 test = ospf6_lsaseq_examin(
1523 (struct ospf6_lsa_header *)((caddr_t)lsupd
1524 + OSPF6_LS_UPD_MIN_SIZE),
1525 bytesonwire - OSPF6_HEADER_SIZE - OSPF6_LS_UPD_MIN_SIZE,
1526 0, ntohl(lsupd->lsa_number) /* 32 bits */
1527 );
1528 break;
1529 case OSPF6_MESSAGE_TYPE_LSACK:
1530 /* RFC5340 A.3.6, packet header + N>=0 header-only LSAs. */
1531 test = ospf6_lsaseq_examin(
1532 (struct ospf6_lsa_header *)((caddr_t)oh
1533 + OSPF6_HEADER_SIZE
1534 + OSPF6_LS_ACK_MIN_SIZE),
1535 bytesonwire - OSPF6_HEADER_SIZE - OSPF6_LS_ACK_MIN_SIZE,
1536 1, 0);
1537 break;
1538 default:
1539 zlog_warn("%s: invalid (%u) message type", __func__, oh->type);
1540 return MSG_NG;
1541 }
1542 if (test != MSG_OK)
1543 zlog_warn("%s: anomaly in %s packet", __func__,
1544 ospf6_message_type(oh->type));
1545 return test;
1546 }
1547
1548 /* Verify particular fields of otherwise correct received OSPF packet to
1549 meet the requirements of RFC. */
1550 static int ospf6_rxpacket_examin(struct ospf6_interface *oi,
1551 struct ospf6_header *oh,
1552 const unsigned bytesonwire)
1553 {
1554
1555 if (MSG_OK != ospf6_packet_examin(oh, bytesonwire))
1556 return MSG_NG;
1557
1558 /* Area-ID check */
1559 if (oh->area_id != oi->area->area_id) {
1560 if (oh->area_id == OSPF_AREA_BACKBONE)
1561 zlog_warn(
1562 "VRF %s: I/F %s Message may be via Virtual Link: not supported",
1563 oi->interface->vrf->name, oi->interface->name);
1564 else
1565 zlog_warn(
1566 "VRF %s: I/F %s Area-ID mismatch (my %pI4, rcvd %pI4)",
1567 oi->interface->vrf->name, oi->interface->name,
1568 &oi->area->area_id, &oh->area_id);
1569 return MSG_NG;
1570 }
1571
1572 /* Instance-ID check */
1573 if (oh->instance_id != oi->instance_id) {
1574 zlog_warn(
1575 "VRF %s: I/F %s Instance-ID mismatch (my %u, rcvd %u)",
1576 oi->interface->vrf->name, oi->interface->name,
1577 oi->instance_id, oh->instance_id);
1578 return MSG_NG;
1579 }
1580
1581 /* Router-ID check */
1582 if (oh->router_id == oi->area->ospf6->router_id) {
1583 zlog_warn("VRF %s: I/F %s Duplicate Router-ID (%pI4)",
1584 oi->interface->vrf->name, oi->interface->name,
1585 &oh->router_id);
1586 return MSG_NG;
1587 }
1588 return MSG_OK;
1589 }
1590
1591 static void ospf6_lsupdate_recv(struct in6_addr *src, struct in6_addr *dst,
1592 struct ospf6_interface *oi,
1593 struct ospf6_header *oh)
1594 {
1595 struct ospf6_neighbor *on;
1596 struct ospf6_lsupdate *lsupdate;
1597 char *p;
1598
1599 on = ospf6_neighbor_lookup(oh->router_id, oi);
1600 if (on == NULL) {
1601 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV_HDR))
1602 zlog_debug("Neighbor not found, ignore");
1603 return;
1604 }
1605
1606 if (on->state != OSPF6_NEIGHBOR_EXCHANGE
1607 && on->state != OSPF6_NEIGHBOR_LOADING
1608 && on->state != OSPF6_NEIGHBOR_FULL) {
1609 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV_HDR))
1610 zlog_debug("Neighbor state less than Exchange, ignore");
1611 return;
1612 }
1613
1614 lsupdate = (struct ospf6_lsupdate *)((caddr_t)oh
1615 + sizeof(struct ospf6_header));
1616
1617 oi->ls_upd_in++;
1618
1619 /* Process LSAs */
1620 for (p = (char *)((caddr_t)lsupdate + sizeof(struct ospf6_lsupdate));
1621 p < OSPF6_MESSAGE_END(oh)
1622 && p + OSPF6_LSA_SIZE(p) <= OSPF6_MESSAGE_END(oh);
1623 p += OSPF6_LSA_SIZE(p)) {
1624 ospf6_receive_lsa(on, (struct ospf6_lsa_header *)p);
1625 }
1626
1627 assert(p == OSPF6_MESSAGE_END(oh));
1628 }
1629
1630 static void ospf6_lsack_recv(struct in6_addr *src, struct in6_addr *dst,
1631 struct ospf6_interface *oi,
1632 struct ospf6_header *oh)
1633 {
1634 struct ospf6_neighbor *on;
1635 char *p;
1636 struct ospf6_lsa *his, *mine;
1637 struct ospf6_lsdb *lsdb = NULL;
1638
1639 assert(oh->type == OSPF6_MESSAGE_TYPE_LSACK);
1640
1641 on = ospf6_neighbor_lookup(oh->router_id, oi);
1642 if (on == NULL) {
1643 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV_HDR))
1644 zlog_debug("Neighbor not found, ignore");
1645 return;
1646 }
1647
1648 if (on->state != OSPF6_NEIGHBOR_EXCHANGE
1649 && on->state != OSPF6_NEIGHBOR_LOADING
1650 && on->state != OSPF6_NEIGHBOR_FULL) {
1651 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV_HDR))
1652 zlog_debug("Neighbor state less than Exchange, ignore");
1653 return;
1654 }
1655
1656 oi->ls_ack_in++;
1657
1658 for (p = (char *)((caddr_t)oh + sizeof(struct ospf6_header));
1659 p + sizeof(struct ospf6_lsa_header) <= OSPF6_MESSAGE_END(oh);
1660 p += sizeof(struct ospf6_lsa_header)) {
1661 his = ospf6_lsa_create_headeronly((struct ospf6_lsa_header *)p);
1662
1663 switch (OSPF6_LSA_SCOPE(his->header->type)) {
1664 case OSPF6_SCOPE_LINKLOCAL:
1665 lsdb = on->ospf6_if->lsdb;
1666 break;
1667 case OSPF6_SCOPE_AREA:
1668 lsdb = on->ospf6_if->area->lsdb;
1669 break;
1670 case OSPF6_SCOPE_AS:
1671 lsdb = on->ospf6_if->area->ospf6->lsdb;
1672 break;
1673 case OSPF6_SCOPE_RESERVED:
1674 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV))
1675 zlog_debug("Ignoring LSA of reserved scope");
1676 ospf6_lsa_delete(his);
1677 continue;
1678 }
1679
1680 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV))
1681 zlog_debug("%s acknowledged by %s", his->name,
1682 on->name);
1683
1684 /* Find database copy */
1685 mine = ospf6_lsdb_lookup(his->header->type, his->header->id,
1686 his->header->adv_router, lsdb);
1687 if (mine == NULL) {
1688 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV))
1689 zlog_debug("No database copy");
1690 ospf6_lsa_delete(his);
1691 continue;
1692 }
1693
1694 /* Check if the LSA is on his retrans-list */
1695 mine = ospf6_lsdb_lookup(his->header->type, his->header->id,
1696 his->header->adv_router,
1697 on->retrans_list);
1698 if (mine == NULL) {
1699 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV))
1700 zlog_debug("Not on %s's retrans-list",
1701 on->name);
1702 ospf6_lsa_delete(his);
1703 continue;
1704 }
1705
1706 if (ospf6_lsa_compare(his, mine) != 0) {
1707 /* Log this questionable acknowledgement,
1708 and examine the next one. */
1709 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV))
1710 zlog_debug("Questionable acknowledgement");
1711 ospf6_lsa_delete(his);
1712 continue;
1713 }
1714
1715 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV))
1716 zlog_debug(
1717 "Acknowledged, remove from %s's retrans-list",
1718 on->name);
1719
1720 ospf6_decrement_retrans_count(mine);
1721 if (OSPF6_LSA_IS_MAXAGE(mine))
1722 ospf6_maxage_remove(on->ospf6_if->area->ospf6);
1723 ospf6_lsdb_remove(mine, on->retrans_list);
1724 ospf6_lsa_delete(his);
1725 }
1726
1727 assert(p == OSPF6_MESSAGE_END(oh));
1728 }
1729
1730 static uint8_t *recvbuf = NULL;
1731 static uint8_t *sendbuf = NULL;
1732 static unsigned int iobuflen = 0;
1733
1734 int ospf6_iobuf_size(unsigned int size)
1735 {
1736 /* NB: there was previously code here that tried to dynamically size
1737 * the buffer for whatever we see in MTU on interfaces. Which is
1738 * _unconditionally wrong_ - we can always receive fragmented IPv6
1739 * up to the regular 64k length limit. (No jumbograms, thankfully.)
1740 */
1741
1742 if (!iobuflen) {
1743 /* the + 128 is to have some runway at the end */
1744 size_t alloc_size = 65536 + 128;
1745
1746 assert(!recvbuf && !sendbuf);
1747
1748 recvbuf = XMALLOC(MTYPE_OSPF6_MESSAGE, alloc_size);
1749 sendbuf = XMALLOC(MTYPE_OSPF6_MESSAGE, alloc_size);
1750 iobuflen = alloc_size;
1751 }
1752
1753 return iobuflen;
1754 }
1755
1756 void ospf6_message_terminate(void)
1757 {
1758 XFREE(MTYPE_OSPF6_MESSAGE, recvbuf);
1759 XFREE(MTYPE_OSPF6_MESSAGE, sendbuf);
1760
1761 iobuflen = 0;
1762 }
1763
1764 enum ospf6_read_return_enum {
1765 OSPF6_READ_ERROR,
1766 OSPF6_READ_CONTINUE,
1767 };
1768
1769 static int ospf6_read_helper(int sockfd, struct ospf6 *ospf6)
1770 {
1771 int len;
1772 struct in6_addr src, dst;
1773 ifindex_t ifindex;
1774 struct iovec iovector[2];
1775 struct ospf6_interface *oi;
1776 struct ospf6_header *oh;
1777 enum ospf6_auth_err ret = OSPF6_AUTH_PROCESS_NORMAL;
1778 uint32_t at_len = 0;
1779 uint32_t lls_len = 0;
1780
1781 /* initialize */
1782 memset(&src, 0, sizeof(src));
1783 memset(&dst, 0, sizeof(dst));
1784 ifindex = 0;
1785 iovector[0].iov_base = recvbuf;
1786 iovector[0].iov_len = iobuflen;
1787 iovector[1].iov_base = NULL;
1788 iovector[1].iov_len = 0;
1789
1790 /* receive message */
1791 len = ospf6_recvmsg(&src, &dst, &ifindex, iovector, sockfd);
1792 if (len < 0)
1793 return OSPF6_READ_ERROR;
1794
1795 if ((uint)len > iobuflen) {
1796 flog_err(EC_LIB_DEVELOPMENT, "Excess message read");
1797 return OSPF6_READ_ERROR;
1798 }
1799
1800 /* ensure some zeroes past the end, just as a security precaution */
1801 memset(recvbuf + len, 0, MIN(128, iobuflen - len));
1802
1803 oi = ospf6_interface_lookup_by_ifindex(ifindex, ospf6->vrf_id);
1804 if (oi == NULL || oi->area == NULL
1805 || CHECK_FLAG(oi->flag, OSPF6_INTERFACE_DISABLE)) {
1806 if (IS_OSPF6_DEBUG_MESSAGE(OSPF6_MESSAGE_TYPE_UNKNOWN,
1807 RECV_HDR))
1808 zlog_debug("Message received on disabled interface");
1809 return OSPF6_READ_CONTINUE;
1810 }
1811 if (CHECK_FLAG(oi->flag, OSPF6_INTERFACE_PASSIVE)) {
1812 if (IS_OSPF6_DEBUG_MESSAGE(OSPF6_MESSAGE_TYPE_UNKNOWN,
1813 RECV_HDR))
1814 zlog_debug("%s: Ignore message on passive interface %s",
1815 __func__, oi->interface->name);
1816 return OSPF6_READ_CONTINUE;
1817 }
1818
1819 /*
1820 * Drop packet destined to another VRF.
1821 * This happens when raw_l3mdev_accept is set to 1.
1822 */
1823 if (ospf6->vrf_id != oi->interface->vrf->vrf_id)
1824 return OSPF6_READ_CONTINUE;
1825
1826 oh = (struct ospf6_header *)recvbuf;
1827 ret = ospf6_auth_validate_pkt(oi, (uint32_t *)&len, oh, &at_len,
1828 &lls_len);
1829 if (ret == OSPF6_AUTH_VALIDATE_SUCCESS) {
1830 ret = ospf6_auth_check_digest(oh, oi, &src, lls_len);
1831 if (ret == OSPF6_AUTH_VALIDATE_FAILURE) {
1832 if (IS_OSPF6_DEBUG_AUTH_RX)
1833 zlog_err(
1834 "RECV[%s]: OSPF packet auth digest miss-match on %s",
1835 oi->interface->name,
1836 ospf6_message_type(oh->type));
1837 oi->at_data.rx_drop++;
1838 return OSPF6_READ_CONTINUE;
1839 }
1840 } else if (ret == OSPF6_AUTH_VALIDATE_FAILURE) {
1841 oi->at_data.rx_drop++;
1842 return OSPF6_READ_CONTINUE;
1843 }
1844
1845 if (ospf6_rxpacket_examin(oi, oh, len) != MSG_OK)
1846 return OSPF6_READ_CONTINUE;
1847
1848 /* Being here means, that no sizing/alignment issues were detected in
1849 the input packet. This renders the additional checks performed below
1850 and also in the type-specific dispatching functions a dead code,
1851 which can be dismissed in a cleanup-focused review round later. */
1852
1853 /* Log */
1854 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, RECV_HDR)) {
1855 zlog_debug("%s received on %s", ospf6_message_type(oh->type),
1856 oi->interface->name);
1857 zlog_debug(" src: %pI6", &src);
1858 zlog_debug(" dst: %pI6", &dst);
1859
1860 switch (oh->type) {
1861 case OSPF6_MESSAGE_TYPE_HELLO:
1862 ospf6_hello_print(oh, OSPF6_ACTION_RECV);
1863 break;
1864 case OSPF6_MESSAGE_TYPE_DBDESC:
1865 ospf6_dbdesc_print(oh, OSPF6_ACTION_RECV);
1866 break;
1867 case OSPF6_MESSAGE_TYPE_LSREQ:
1868 ospf6_lsreq_print(oh, OSPF6_ACTION_RECV);
1869 break;
1870 case OSPF6_MESSAGE_TYPE_LSUPDATE:
1871 ospf6_lsupdate_print(oh, OSPF6_ACTION_RECV);
1872 break;
1873 case OSPF6_MESSAGE_TYPE_LSACK:
1874 ospf6_lsack_print(oh, OSPF6_ACTION_RECV);
1875 break;
1876 default:
1877 assert(0);
1878 }
1879
1880 if ((at_len != 0) && IS_OSPF6_DEBUG_AUTH_RX)
1881 ospf6_auth_hdr_dump_recv(oh, (len + at_len + lls_len),
1882 lls_len);
1883 }
1884
1885 switch (oh->type) {
1886 case OSPF6_MESSAGE_TYPE_HELLO:
1887 ospf6_hello_recv(&src, &dst, oi, oh);
1888 break;
1889
1890 case OSPF6_MESSAGE_TYPE_DBDESC:
1891 ospf6_dbdesc_recv(&src, &dst, oi, oh);
1892 break;
1893
1894 case OSPF6_MESSAGE_TYPE_LSREQ:
1895 ospf6_lsreq_recv(&src, &dst, oi, oh);
1896 break;
1897
1898 case OSPF6_MESSAGE_TYPE_LSUPDATE:
1899 ospf6_lsupdate_recv(&src, &dst, oi, oh);
1900 break;
1901
1902 case OSPF6_MESSAGE_TYPE_LSACK:
1903 ospf6_lsack_recv(&src, &dst, oi, oh);
1904 break;
1905
1906 default:
1907 assert(0);
1908 }
1909
1910 return OSPF6_READ_CONTINUE;
1911 }
1912
1913 void ospf6_receive(struct thread *thread)
1914 {
1915 int sockfd;
1916 struct ospf6 *ospf6;
1917 int count = 0;
1918
1919 /* add next read thread */
1920 ospf6 = THREAD_ARG(thread);
1921 sockfd = THREAD_FD(thread);
1922
1923 thread_add_read(master, ospf6_receive, ospf6, ospf6->fd,
1924 &ospf6->t_ospf6_receive);
1925
1926 while (count < ospf6->write_oi_count) {
1927 count++;
1928 switch (ospf6_read_helper(sockfd, ospf6)) {
1929 case OSPF6_READ_ERROR:
1930 return;
1931 case OSPF6_READ_CONTINUE:
1932 break;
1933 }
1934 }
1935 }
1936
1937 static void ospf6_fill_hdr_checksum(struct ospf6_interface *oi,
1938 struct ospf6_packet *op)
1939 {
1940 struct ipv6_ph ph = {};
1941 struct ospf6_header *oh;
1942 void *offset = NULL;
1943
1944 if (oi->at_data.flags != 0)
1945 return;
1946
1947 memcpy(&ph.src, oi->linklocal_addr, sizeof(struct in6_addr));
1948 memcpy(&ph.dst, &op->dst, sizeof(struct in6_addr));
1949 ph.ulpl = htonl(op->length);
1950 ph.next_hdr = IPPROTO_OSPFIGP;
1951
1952 /* Suppress static analysis warnings about accessing icmp6 oob */
1953 oh = (struct ospf6_header *)STREAM_DATA(op->s);
1954 offset = oh;
1955 oh->checksum = in_cksum_with_ph6(&ph, offset, op->length);
1956 }
1957
1958 static void ospf6_make_header(uint8_t type, struct ospf6_interface *oi,
1959 struct stream *s)
1960 {
1961 struct ospf6_header *oh;
1962
1963 oh = (struct ospf6_header *)STREAM_DATA(s);
1964
1965 oh->version = (uint8_t)OSPFV3_VERSION;
1966 oh->type = type;
1967 oh->length = 0;
1968
1969 oh->router_id = oi->area->ospf6->router_id;
1970 oh->area_id = oi->area->area_id;
1971 oh->checksum = 0;
1972 oh->instance_id = oi->instance_id;
1973 oh->reserved = 0;
1974
1975 stream_forward_endp(s, OSPF6_HEADER_SIZE);
1976 }
1977
1978 static void ospf6_fill_header(struct ospf6_interface *oi, struct stream *s,
1979 uint16_t length)
1980 {
1981 struct ospf6_header *oh;
1982
1983 oh = (struct ospf6_header *)STREAM_DATA(s);
1984
1985 oh->length = htons(length);
1986 }
1987
1988 static void ospf6_fill_lsupdate_header(struct stream *s, uint32_t lsa_num)
1989 {
1990 struct ospf6_header *oh;
1991 struct ospf6_lsupdate *lsu;
1992
1993 oh = (struct ospf6_header *)STREAM_DATA(s);
1994
1995 lsu = (struct ospf6_lsupdate *)((caddr_t)oh
1996 + sizeof(struct ospf6_header));
1997 lsu->lsa_number = htonl(lsa_num);
1998 }
1999
2000 static void ospf6_auth_trailer_copy_keychain_key(struct ospf6_interface *oi)
2001 {
2002 char *keychain_name = NULL;
2003 struct keychain *keychain = NULL;
2004 struct key *key = NULL;
2005
2006 keychain_name = oi->at_data.keychain;
2007 keychain = keychain_lookup(keychain_name);
2008 if (keychain) {
2009 key = key_lookup_for_send(keychain);
2010 if (key && key->string &&
2011 key->hash_algo != KEYCHAIN_ALGO_NULL) {
2012 /* storing the values so that further
2013 * lookup can be avoided. after
2014 * processing the digest need to reset
2015 * these values
2016 */
2017 oi->at_data.hash_algo = key->hash_algo;
2018 oi->at_data.auth_key = XSTRDUP(
2019 MTYPE_OSPF6_AUTH_MANUAL_KEY, key->string);
2020 oi->at_data.key_id = key->index;
2021 SET_FLAG(oi->at_data.flags,
2022 OSPF6_AUTH_TRAILER_KEYCHAIN_VALID);
2023 }
2024 }
2025 }
2026
2027 static uint16_t ospf6_packet_max(struct ospf6_interface *oi)
2028 {
2029 uint16_t at_len = 0;
2030
2031 assert(oi->ifmtu > sizeof(struct ip6_hdr));
2032
2033 if (oi->at_data.flags != 0) {
2034 if (CHECK_FLAG(oi->at_data.flags, OSPF6_AUTH_TRAILER_KEYCHAIN))
2035 ospf6_auth_trailer_copy_keychain_key(oi);
2036
2037 at_len += OSPF6_AUTH_HDR_MIN_SIZE;
2038 at_len += keychain_get_hash_len(oi->at_data.hash_algo);
2039 return oi->ifmtu - (sizeof(struct ip6_hdr)) - at_len;
2040 }
2041
2042 return oi->ifmtu - (sizeof(struct ip6_hdr));
2043 }
2044
2045 static uint16_t ospf6_make_hello(struct ospf6_interface *oi, struct stream *s)
2046 {
2047 struct listnode *node, *nnode;
2048 struct ospf6_neighbor *on;
2049 uint16_t length = OSPF6_HELLO_MIN_SIZE;
2050 uint8_t options1 = oi->area->options[1];
2051
2052 if (oi->at_data.flags != 0)
2053 options1 |= OSPF6_OPT_AT;
2054
2055 stream_putl(s, oi->interface->ifindex);
2056 stream_putc(s, oi->priority);
2057 stream_putc(s, oi->area->options[0]);
2058 stream_putc(s, options1);
2059 stream_putc(s, oi->area->options[2]);
2060 stream_putw(s, oi->hello_interval);
2061 stream_putw(s, oi->dead_interval);
2062 stream_put_ipv4(s, oi->drouter);
2063 stream_put_ipv4(s, oi->bdrouter);
2064
2065 for (ALL_LIST_ELEMENTS(oi->neighbor_list, node, nnode, on)) {
2066 if (on->state < OSPF6_NEIGHBOR_INIT)
2067 continue;
2068
2069 if ((length + sizeof(uint32_t) + OSPF6_HEADER_SIZE)
2070 > ospf6_packet_max(oi)) {
2071 if (IS_OSPF6_DEBUG_MESSAGE(OSPF6_MESSAGE_TYPE_HELLO,
2072 SEND))
2073 zlog_debug(
2074 "sending Hello message: exceeds I/F MTU");
2075 break;
2076 }
2077
2078 stream_put_ipv4(s, on->router_id);
2079 length += sizeof(uint32_t);
2080 }
2081
2082 return length;
2083 }
2084
2085 static void ospf6_write(struct thread *thread)
2086 {
2087 struct ospf6 *ospf6 = THREAD_ARG(thread);
2088 struct ospf6_interface *oi;
2089 struct ospf6_interface *last_serviced_oi = NULL;
2090 struct ospf6_header *oh;
2091 struct ospf6_packet *op;
2092 struct listnode *node;
2093 struct iovec iovector[2];
2094 int pkt_count = 0;
2095 int len;
2096 int64_t latency = 0;
2097 struct timeval timestamp;
2098 uint16_t at_len = 0;
2099
2100 if (ospf6->fd < 0) {
2101 zlog_warn("ospf6_write failed to send, fd %d", ospf6->fd);
2102 return;
2103 }
2104
2105 node = listhead(ospf6->oi_write_q);
2106 assert(node);
2107 oi = listgetdata(node);
2108
2109 while ((pkt_count < ospf6->write_oi_count) && oi
2110 && (last_serviced_oi != oi)) {
2111
2112 op = ospf6_fifo_head(oi->obuf);
2113 assert(op);
2114 assert(op->length >= OSPF6_HEADER_SIZE);
2115
2116 iovector[0].iov_base = (caddr_t)stream_pnt(op->s);
2117 iovector[0].iov_len = op->length;
2118 iovector[1].iov_base = NULL;
2119 iovector[1].iov_len = 0;
2120
2121 oh = (struct ospf6_header *)STREAM_DATA(op->s);
2122
2123 if (oi->at_data.flags != 0) {
2124 at_len = ospf6_auth_len_get(oi);
2125 if (at_len) {
2126 iovector[0].iov_len =
2127 ntohs(oh->length) + at_len;
2128 ospf6_auth_digest_send(oi->linklocal_addr, oi,
2129 oh, at_len,
2130 iovector[0].iov_len);
2131 } else {
2132 iovector[0].iov_len = ntohs(oh->length);
2133 }
2134 } else {
2135 iovector[0].iov_len = ntohs(oh->length);
2136 }
2137
2138 len = ospf6_sendmsg(oi->linklocal_addr, &op->dst,
2139 oi->interface->ifindex, iovector,
2140 ospf6->fd);
2141
2142 if (len != (op->length + (int)at_len))
2143 flog_err(EC_LIB_DEVELOPMENT,
2144 "Could not send entire message");
2145
2146 if (IS_OSPF6_DEBUG_MESSAGE(oh->type, SEND_HDR)) {
2147 zlog_debug("%s send on %s",
2148 ospf6_message_type(oh->type),
2149 oi->interface->name);
2150 zlog_debug(" src: %pI6", oi->linklocal_addr);
2151 zlog_debug(" dst: %pI6", &op->dst);
2152 switch (oh->type) {
2153 case OSPF6_MESSAGE_TYPE_HELLO:
2154 ospf6_hello_print(oh, OSPF6_ACTION_SEND);
2155 break;
2156 case OSPF6_MESSAGE_TYPE_DBDESC:
2157 ospf6_dbdesc_print(oh, OSPF6_ACTION_SEND);
2158 break;
2159 case OSPF6_MESSAGE_TYPE_LSREQ:
2160 ospf6_lsreq_print(oh, OSPF6_ACTION_SEND);
2161 break;
2162 case OSPF6_MESSAGE_TYPE_LSUPDATE:
2163 ospf6_lsupdate_print(oh, OSPF6_ACTION_SEND);
2164 break;
2165 case OSPF6_MESSAGE_TYPE_LSACK:
2166 ospf6_lsack_print(oh, OSPF6_ACTION_SEND);
2167 break;
2168 default:
2169 zlog_debug("Unknown message");
2170 assert(0);
2171 break;
2172 }
2173 }
2174 switch (oh->type) {
2175 case OSPF6_MESSAGE_TYPE_HELLO:
2176 monotime(&timestamp);
2177 if (oi->hello_out)
2178 latency = monotime_since(&oi->last_hello, NULL)
2179 - ((int64_t)oi->hello_interval
2180 * 1000000);
2181
2182 /* log if latency exceeds the hello period */
2183 if (latency > ((int64_t)oi->hello_interval * 1000000))
2184 zlog_warn("%s hello TX high latency %" PRId64
2185 "us.",
2186 __func__, latency);
2187 oi->last_hello = timestamp;
2188 oi->hello_out++;
2189 break;
2190 case OSPF6_MESSAGE_TYPE_DBDESC:
2191 oi->db_desc_out++;
2192 break;
2193 case OSPF6_MESSAGE_TYPE_LSREQ:
2194 oi->ls_req_out++;
2195 break;
2196 case OSPF6_MESSAGE_TYPE_LSUPDATE:
2197 oi->ls_upd_out++;
2198 break;
2199 case OSPF6_MESSAGE_TYPE_LSACK:
2200 oi->ls_ack_out++;
2201 break;
2202 default:
2203 zlog_debug("Unknown message");
2204 assert(0);
2205 break;
2206 }
2207
2208 if ((oi->at_data.flags != 0) &&
2209 (IS_OSPF6_DEBUG_MESSAGE(oh->type, SEND_HDR)) &&
2210 (IS_OSPF6_DEBUG_AUTH_TX))
2211 ospf6_auth_hdr_dump_send(oh, iovector[0].iov_len);
2212
2213 /* initialize at_len to 0 for next packet */
2214 at_len = 0;
2215
2216 /* Now delete packet from queue. */
2217 ospf6_packet_delete(oi);
2218
2219 /* Move this interface to the tail of write_q to
2220 serve everyone in a round robin fashion */
2221 list_delete_node(ospf6->oi_write_q, node);
2222 if (ospf6_fifo_head(oi->obuf) == NULL) {
2223 oi->on_write_q = 0;
2224 last_serviced_oi = NULL;
2225 oi = NULL;
2226 } else {
2227 listnode_add(ospf6->oi_write_q, oi);
2228 }
2229
2230 /* Setup to service from the head of the queue again */
2231 if (!list_isempty(ospf6->oi_write_q)) {
2232 node = listhead(ospf6->oi_write_q);
2233 oi = listgetdata(node);
2234 }
2235 }
2236
2237 /* If packets still remain in queue, call write thread. */
2238 if (!list_isempty(ospf6->oi_write_q))
2239 thread_add_write(master, ospf6_write, ospf6, ospf6->fd,
2240 &ospf6->t_write);
2241 }
2242
2243 void ospf6_hello_send(struct thread *thread)
2244 {
2245 struct ospf6_interface *oi;
2246 struct ospf6_packet *op;
2247 uint16_t length = OSPF6_HEADER_SIZE;
2248
2249 oi = (struct ospf6_interface *)THREAD_ARG(thread);
2250
2251 if (oi->state <= OSPF6_INTERFACE_DOWN) {
2252 if (IS_OSPF6_DEBUG_MESSAGE(OSPF6_MESSAGE_TYPE_HELLO, SEND_HDR))
2253 zlog_debug("Unable to send Hello on down interface %s",
2254 oi->interface->name);
2255 return;
2256 }
2257
2258 op = ospf6_packet_new(oi->ifmtu);
2259
2260 ospf6_make_header(OSPF6_MESSAGE_TYPE_HELLO, oi, op->s);
2261
2262 /* Prepare OSPF Hello body */
2263 length += ospf6_make_hello(oi, op->s);
2264 if (length == OSPF6_HEADER_SIZE) {
2265 /* Hello overshooting MTU */
2266 ospf6_packet_free(op);
2267 return;
2268 }
2269
2270 /* Fill OSPF header. */
2271 ospf6_fill_header(oi, op->s, length);
2272
2273 /* Set packet length. */
2274 op->length = length;
2275
2276 op->dst = allspfrouters6;
2277
2278 ospf6_fill_hdr_checksum(oi, op);
2279
2280 /* Add packet to the top of the interface output queue, so that they
2281 * can't get delayed by things like long queues of LS Update packets
2282 */
2283 ospf6_packet_add_top(oi, op);
2284
2285 /* set next thread */
2286 thread_add_timer(master, ospf6_hello_send, oi, oi->hello_interval,
2287 &oi->thread_send_hello);
2288
2289 OSPF6_MESSAGE_WRITE_ON(oi);
2290 }
2291
2292 static uint16_t ospf6_make_dbdesc(struct ospf6_neighbor *on, struct stream *s)
2293 {
2294 uint16_t length = OSPF6_DB_DESC_MIN_SIZE;
2295 struct ospf6_lsa *lsa, *lsanext;
2296 uint8_t options1 = on->ospf6_if->area->options[1];
2297
2298 if (on->ospf6_if->at_data.flags != 0)
2299 options1 |= OSPF6_OPT_AT;
2300
2301 /* if this is initial one, initialize sequence number for DbDesc */
2302 if (CHECK_FLAG(on->dbdesc_bits, OSPF6_DBDESC_IBIT)
2303 && (on->dbdesc_seqnum == 0)) {
2304 on->dbdesc_seqnum = monotime(NULL);
2305 }
2306
2307 /* reserved */
2308 stream_putc(s, 0); /* reserved 1 */
2309 stream_putc(s, on->ospf6_if->area->options[0]);
2310 stream_putc(s, options1);
2311 stream_putc(s, on->ospf6_if->area->options[2]);
2312 stream_putw(s, on->ospf6_if->ifmtu);
2313 stream_putc(s, 0); /* reserved 2 */
2314 stream_putc(s, on->dbdesc_bits);
2315 stream_putl(s, on->dbdesc_seqnum);
2316
2317 /* if this is not initial one, set LSA headers in dbdesc */
2318 if (!CHECK_FLAG(on->dbdesc_bits, OSPF6_DBDESC_IBIT)) {
2319 for (ALL_LSDB(on->dbdesc_list, lsa, lsanext)) {
2320 ospf6_lsa_age_update_to_send(lsa,
2321 on->ospf6_if->transdelay);
2322
2323 /* MTU check */
2324 if ((length + sizeof(struct ospf6_lsa_header)
2325 + OSPF6_HEADER_SIZE)
2326 > ospf6_packet_max(on->ospf6_if)) {
2327 ospf6_lsa_unlock(lsa);
2328 if (lsanext)
2329 ospf6_lsa_unlock(lsanext);
2330 break;
2331 }
2332 stream_put(s, lsa->header,
2333 sizeof(struct ospf6_lsa_header));
2334 length += sizeof(struct ospf6_lsa_header);
2335 }
2336 }
2337 return length;
2338 }
2339
2340 void ospf6_dbdesc_send(struct thread *thread)
2341 {
2342 struct ospf6_neighbor *on;
2343 uint16_t length = OSPF6_HEADER_SIZE;
2344 struct ospf6_packet *op;
2345
2346 on = (struct ospf6_neighbor *)THREAD_ARG(thread);
2347
2348 if (on->state < OSPF6_NEIGHBOR_EXSTART) {
2349 if (IS_OSPF6_DEBUG_MESSAGE(OSPF6_MESSAGE_TYPE_DBDESC, SEND))
2350 zlog_debug(
2351 "Quit to send DbDesc to neighbor %s state %s",
2352 on->name, ospf6_neighbor_state_str[on->state]);
2353 return;
2354 }
2355
2356 /* set next thread if master */
2357 if (CHECK_FLAG(on->dbdesc_bits, OSPF6_DBDESC_MSBIT))
2358 thread_add_timer(master, ospf6_dbdesc_send, on,
2359 on->ospf6_if->rxmt_interval,
2360 &on->thread_send_dbdesc);
2361
2362 op = ospf6_packet_new(on->ospf6_if->ifmtu);
2363 ospf6_make_header(OSPF6_MESSAGE_TYPE_DBDESC, on->ospf6_if, op->s);
2364
2365 length += ospf6_make_dbdesc(on, op->s);
2366 ospf6_fill_header(on->ospf6_if, op->s, length);
2367
2368 /* Set packet length. */
2369 op->length = length;
2370
2371 if (on->ospf6_if->state == OSPF6_INTERFACE_POINTTOPOINT)
2372 op->dst = allspfrouters6;
2373 else
2374 op->dst = on->linklocal_addr;
2375
2376 ospf6_fill_hdr_checksum(on->ospf6_if, op);
2377
2378 ospf6_packet_add(on->ospf6_if, op);
2379
2380 OSPF6_MESSAGE_WRITE_ON(on->ospf6_if);
2381 }
2382
2383 void ospf6_dbdesc_send_newone(struct thread *thread)
2384 {
2385 struct ospf6_neighbor *on;
2386 struct ospf6_lsa *lsa, *lsanext;
2387 unsigned int size = 0;
2388
2389 on = (struct ospf6_neighbor *)THREAD_ARG(thread);
2390 ospf6_lsdb_remove_all(on->dbdesc_list);
2391
2392 /* move LSAs from summary_list to dbdesc_list (within neighbor
2393 structure)
2394 so that ospf6_send_dbdesc () can send those LSAs */
2395 size = sizeof(struct ospf6_lsa_header) + sizeof(struct ospf6_dbdesc);
2396 for (ALL_LSDB(on->summary_list, lsa, lsanext)) {
2397 /* if stub area then don't advertise AS-External LSAs */
2398 if ((IS_AREA_STUB(on->ospf6_if->area)
2399 || IS_AREA_NSSA(on->ospf6_if->area))
2400 && ntohs(lsa->header->type) == OSPF6_LSTYPE_AS_EXTERNAL) {
2401 ospf6_lsdb_remove(lsa, on->summary_list);
2402 continue;
2403 }
2404
2405 if (size + sizeof(struct ospf6_lsa_header)
2406 > ospf6_packet_max(on->ospf6_if)) {
2407 ospf6_lsa_unlock(lsa);
2408 if (lsanext)
2409 ospf6_lsa_unlock(lsanext);
2410 break;
2411 }
2412
2413 ospf6_lsdb_add(ospf6_lsa_copy(lsa), on->dbdesc_list);
2414 ospf6_lsdb_remove(lsa, on->summary_list);
2415 size += sizeof(struct ospf6_lsa_header);
2416 }
2417
2418 if (on->summary_list->count == 0)
2419 UNSET_FLAG(on->dbdesc_bits, OSPF6_DBDESC_MBIT);
2420
2421 /* If slave, More bit check must be done here */
2422 if (!CHECK_FLAG(on->dbdesc_bits, OSPF6_DBDESC_MSBIT) && /* Slave */
2423 !CHECK_FLAG(on->dbdesc_last.bits, OSPF6_DBDESC_MBIT)
2424 && !CHECK_FLAG(on->dbdesc_bits, OSPF6_DBDESC_MBIT))
2425 thread_add_event(master, exchange_done, on, 0,
2426 &on->thread_exchange_done);
2427
2428 thread_execute(master, ospf6_dbdesc_send, on, 0);
2429 }
2430
2431 static uint16_t ospf6_make_lsreq(struct ospf6_neighbor *on, struct stream *s)
2432 {
2433 uint16_t length = 0;
2434 struct ospf6_lsa *lsa, *lsanext, *last_req = NULL;
2435
2436 for (ALL_LSDB(on->request_list, lsa, lsanext)) {
2437 if ((length + OSPF6_HEADER_SIZE)
2438 > ospf6_packet_max(on->ospf6_if)) {
2439 ospf6_lsa_unlock(lsa);
2440 if (lsanext)
2441 ospf6_lsa_unlock(lsanext);
2442 break;
2443 }
2444 stream_putw(s, 0); /* reserved */
2445 stream_putw(s, ntohs(lsa->header->type));
2446 stream_putl(s, ntohl(lsa->header->id));
2447 stream_putl(s, ntohl(lsa->header->adv_router));
2448 length += sizeof(struct ospf6_lsreq_entry);
2449 last_req = lsa;
2450 }
2451
2452 if (last_req != NULL) {
2453 if (on->last_ls_req != NULL)
2454 on->last_ls_req = ospf6_lsa_unlock(on->last_ls_req);
2455
2456 ospf6_lsa_lock(last_req);
2457 on->last_ls_req = last_req;
2458 }
2459
2460 return length;
2461 }
2462
2463 static uint16_t ospf6_make_lsack_neighbor(struct ospf6_neighbor *on,
2464 struct ospf6_packet **op)
2465 {
2466 uint16_t length = 0;
2467 struct ospf6_lsa *lsa, *lsanext;
2468 int lsa_cnt = 0;
2469
2470 for (ALL_LSDB(on->lsack_list, lsa, lsanext)) {
2471 if ((length + sizeof(struct ospf6_lsa_header)
2472 + OSPF6_HEADER_SIZE)
2473 > ospf6_packet_max(on->ospf6_if)) {
2474 /* if we run out of packet size/space here,
2475 better to try again soon. */
2476 if (lsa_cnt) {
2477 ospf6_fill_header(on->ospf6_if, (*op)->s,
2478 length + OSPF6_HEADER_SIZE);
2479
2480 (*op)->length = length + OSPF6_HEADER_SIZE;
2481 (*op)->dst = on->linklocal_addr;
2482 ospf6_fill_hdr_checksum(on->ospf6_if, *op);
2483 ospf6_packet_add(on->ospf6_if, *op);
2484 OSPF6_MESSAGE_WRITE_ON(on->ospf6_if);
2485 /* new packet */
2486 *op = ospf6_packet_new(on->ospf6_if->ifmtu);
2487 ospf6_make_header(OSPF6_MESSAGE_TYPE_LSACK,
2488 on->ospf6_if, (*op)->s);
2489 length = 0;
2490 lsa_cnt = 0;
2491 }
2492 }
2493 ospf6_lsa_age_update_to_send(lsa, on->ospf6_if->transdelay);
2494 stream_put((*op)->s, lsa->header,
2495 sizeof(struct ospf6_lsa_header));
2496 length += sizeof(struct ospf6_lsa_header);
2497
2498 assert(lsa->lock == 2);
2499 ospf6_lsdb_remove(lsa, on->lsack_list);
2500 lsa_cnt++;
2501 }
2502 return length;
2503 }
2504
2505 void ospf6_lsreq_send(struct thread *thread)
2506 {
2507 struct ospf6_neighbor *on;
2508 struct ospf6_packet *op;
2509 uint16_t length = OSPF6_HEADER_SIZE;
2510
2511 on = (struct ospf6_neighbor *)THREAD_ARG(thread);
2512
2513 /* LSReq will be sent only in ExStart or Loading */
2514 if (on->state != OSPF6_NEIGHBOR_EXCHANGE
2515 && on->state != OSPF6_NEIGHBOR_LOADING) {
2516 if (IS_OSPF6_DEBUG_MESSAGE(OSPF6_MESSAGE_TYPE_LSREQ, SEND_HDR))
2517 zlog_debug("Quit to send LSReq to neighbor %s state %s",
2518 on->name,
2519 ospf6_neighbor_state_str[on->state]);
2520 return;
2521 }
2522
2523 /* schedule loading_done if request list is empty */
2524 if (on->request_list->count == 0) {
2525 thread_add_event(master, loading_done, on, 0, NULL);
2526 return;
2527 }
2528
2529 op = ospf6_packet_new(on->ospf6_if->ifmtu);
2530 ospf6_make_header(OSPF6_MESSAGE_TYPE_LSREQ, on->ospf6_if, op->s);
2531
2532 length += ospf6_make_lsreq(on, op->s);
2533
2534 if (length == OSPF6_HEADER_SIZE) {
2535 /* Hello overshooting MTU */
2536 ospf6_packet_free(op);
2537 return;
2538 }
2539
2540 /* Fill OSPF header. */
2541 ospf6_fill_header(on->ospf6_if, op->s, length);
2542
2543 /* Set packet length */
2544 op->length = length;
2545
2546 if (on->ospf6_if->state == OSPF6_INTERFACE_POINTTOPOINT)
2547 op->dst = allspfrouters6;
2548 else
2549 op->dst = on->linklocal_addr;
2550
2551 ospf6_fill_hdr_checksum(on->ospf6_if, op);
2552 ospf6_packet_add(on->ospf6_if, op);
2553
2554 OSPF6_MESSAGE_WRITE_ON(on->ospf6_if);
2555
2556 /* set next thread */
2557 if (on->request_list->count != 0) {
2558 thread_add_timer(master, ospf6_lsreq_send, on,
2559 on->ospf6_if->rxmt_interval,
2560 &on->thread_send_lsreq);
2561 }
2562 }
2563
2564 static void ospf6_send_lsupdate(struct ospf6_neighbor *on,
2565 struct ospf6_interface *oi,
2566 struct ospf6_packet *op)
2567 {
2568
2569 if (on) {
2570
2571 if ((on->ospf6_if->state == OSPF6_INTERFACE_POINTTOPOINT)
2572 || (on->ospf6_if->state == OSPF6_INTERFACE_DR)
2573 || (on->ospf6_if->state == OSPF6_INTERFACE_BDR))
2574 op->dst = allspfrouters6;
2575 else
2576 op->dst = on->linklocal_addr;
2577 oi = on->ospf6_if;
2578 } else if (oi) {
2579 if ((oi->state == OSPF6_INTERFACE_POINTTOPOINT)
2580 || (oi->state == OSPF6_INTERFACE_DR)
2581 || (oi->state == OSPF6_INTERFACE_BDR))
2582 op->dst = allspfrouters6;
2583 else
2584 op->dst = alldrouters6;
2585 }
2586 if (oi) {
2587 ospf6_fill_hdr_checksum(oi, op);
2588 ospf6_packet_add(oi, op);
2589 /* If ospf instance is being deleted, send the packet
2590 * immediately
2591 */
2592 if ((oi->area == NULL) || (oi->area->ospf6 == NULL))
2593 return;
2594 if (oi->area->ospf6->inst_shutdown) {
2595 if (oi->on_write_q == 0) {
2596 listnode_add(oi->area->ospf6->oi_write_q, oi);
2597 oi->on_write_q = 1;
2598 }
2599 thread_execute(master, ospf6_write, oi->area->ospf6, 0);
2600 } else
2601 OSPF6_MESSAGE_WRITE_ON(oi);
2602 }
2603 }
2604
2605 static uint16_t ospf6_make_lsupdate_list(struct ospf6_neighbor *on,
2606 struct ospf6_packet **op, int *lsa_cnt)
2607 {
2608 uint16_t length = OSPF6_LS_UPD_MIN_SIZE;
2609 struct ospf6_lsa *lsa, *lsanext;
2610
2611 /* skip over fixed header */
2612 stream_forward_endp((*op)->s, OSPF6_LS_UPD_MIN_SIZE);
2613
2614 for (ALL_LSDB(on->lsupdate_list, lsa, lsanext)) {
2615 if ((length + OSPF6_LSA_SIZE(lsa->header) + OSPF6_HEADER_SIZE) >
2616 ospf6_packet_max(on->ospf6_if)) {
2617 ospf6_fill_header(on->ospf6_if, (*op)->s,
2618 length + OSPF6_HEADER_SIZE);
2619 (*op)->length = length + OSPF6_HEADER_SIZE;
2620 ospf6_fill_lsupdate_header((*op)->s, *lsa_cnt);
2621 ospf6_send_lsupdate(on, NULL, *op);
2622
2623 /* refresh packet */
2624 *op = ospf6_packet_new(on->ospf6_if->ifmtu);
2625 length = OSPF6_LS_UPD_MIN_SIZE;
2626 *lsa_cnt = 0;
2627 ospf6_make_header(OSPF6_MESSAGE_TYPE_LSUPDATE,
2628 on->ospf6_if, (*op)->s);
2629 stream_forward_endp((*op)->s, OSPF6_LS_UPD_MIN_SIZE);
2630 }
2631 ospf6_lsa_age_update_to_send(lsa, on->ospf6_if->transdelay);
2632 stream_put((*op)->s, lsa->header, OSPF6_LSA_SIZE(lsa->header));
2633 (*lsa_cnt)++;
2634 length += OSPF6_LSA_SIZE(lsa->header);
2635 assert(lsa->lock == 2);
2636 ospf6_lsdb_remove(lsa, on->lsupdate_list);
2637 }
2638 return length;
2639 }
2640
2641 static uint16_t ospf6_make_ls_retrans_list(struct ospf6_neighbor *on,
2642 struct ospf6_packet **op,
2643 int *lsa_cnt)
2644 {
2645 uint16_t length = OSPF6_LS_UPD_MIN_SIZE;
2646 struct ospf6_lsa *lsa, *lsanext;
2647
2648 /* skip over fixed header */
2649 stream_forward_endp((*op)->s, OSPF6_LS_UPD_MIN_SIZE);
2650
2651 for (ALL_LSDB(on->retrans_list, lsa, lsanext)) {
2652 if ((length + OSPF6_LSA_SIZE(lsa->header) + OSPF6_HEADER_SIZE) >
2653 ospf6_packet_max(on->ospf6_if)) {
2654 ospf6_fill_header(on->ospf6_if, (*op)->s,
2655 length + OSPF6_HEADER_SIZE);
2656 (*op)->length = length + OSPF6_HEADER_SIZE;
2657 ospf6_fill_lsupdate_header((*op)->s, *lsa_cnt);
2658 if (on->ospf6_if->state == OSPF6_INTERFACE_POINTTOPOINT)
2659 (*op)->dst = allspfrouters6;
2660 else
2661 (*op)->dst = on->linklocal_addr;
2662
2663 ospf6_fill_hdr_checksum(on->ospf6_if, *op);
2664 ospf6_packet_add(on->ospf6_if, *op);
2665 OSPF6_MESSAGE_WRITE_ON(on->ospf6_if);
2666
2667 /* refresh packet */
2668 *op = ospf6_packet_new(on->ospf6_if->ifmtu);
2669 length = OSPF6_LS_UPD_MIN_SIZE;
2670 *lsa_cnt = 0;
2671 ospf6_make_header(OSPF6_MESSAGE_TYPE_LSUPDATE,
2672 on->ospf6_if, (*op)->s);
2673 stream_forward_endp((*op)->s, OSPF6_LS_UPD_MIN_SIZE);
2674 }
2675 ospf6_lsa_age_update_to_send(lsa, on->ospf6_if->transdelay);
2676 stream_put((*op)->s, lsa->header, OSPF6_LSA_SIZE(lsa->header));
2677 (*lsa_cnt)++;
2678 length += OSPF6_LSA_SIZE(lsa->header);
2679 }
2680 return length;
2681 }
2682
2683 void ospf6_lsupdate_send_neighbor(struct thread *thread)
2684 {
2685 struct ospf6_neighbor *on;
2686 struct ospf6_packet *op;
2687 uint16_t length = OSPF6_HEADER_SIZE;
2688 int lsa_cnt = 0;
2689
2690 on = (struct ospf6_neighbor *)THREAD_ARG(thread);
2691
2692 if (IS_OSPF6_DEBUG_MESSAGE(OSPF6_MESSAGE_TYPE_LSUPDATE, SEND_HDR))
2693 zlog_debug("LSUpdate to neighbor %s", on->name);
2694
2695 if (on->state < OSPF6_NEIGHBOR_EXCHANGE) {
2696 if (IS_OSPF6_DEBUG_MESSAGE(OSPF6_MESSAGE_TYPE_LSUPDATE,
2697 SEND_HDR))
2698 zlog_debug("Quit to send (neighbor state %s)",
2699 ospf6_neighbor_state_str[on->state]);
2700 return;
2701 }
2702
2703 /* first do lsupdate_list */
2704 op = ospf6_packet_new(on->ospf6_if->ifmtu);
2705 ospf6_make_header(OSPF6_MESSAGE_TYPE_LSUPDATE, on->ospf6_if, op->s);
2706 length += ospf6_make_lsupdate_list(on, &op, &lsa_cnt);
2707 if (lsa_cnt) {
2708 /* Fill OSPF header. */
2709 ospf6_fill_header(on->ospf6_if, op->s, length);
2710 ospf6_fill_lsupdate_header(op->s, lsa_cnt);
2711 op->length = length;
2712 ospf6_send_lsupdate(on, NULL, op);
2713
2714 /* prepare new packet */
2715 op = ospf6_packet_new(on->ospf6_if->ifmtu);
2716 length = OSPF6_HEADER_SIZE;
2717 lsa_cnt = 0;
2718 } else {
2719 stream_reset(op->s);
2720 length = OSPF6_HEADER_SIZE;
2721 }
2722
2723 ospf6_make_header(OSPF6_MESSAGE_TYPE_LSUPDATE, on->ospf6_if, op->s);
2724 /* now do retransmit list */
2725 length += ospf6_make_ls_retrans_list(on, &op, &lsa_cnt);
2726 if (lsa_cnt) {
2727 ospf6_fill_header(on->ospf6_if, op->s, length);
2728 ospf6_fill_lsupdate_header(op->s, lsa_cnt);
2729 op->length = length;
2730 if (on->ospf6_if->state == OSPF6_INTERFACE_POINTTOPOINT)
2731 op->dst = allspfrouters6;
2732 else
2733 op->dst = on->linklocal_addr;
2734 ospf6_fill_hdr_checksum(on->ospf6_if, op);
2735 ospf6_packet_add(on->ospf6_if, op);
2736 OSPF6_MESSAGE_WRITE_ON(on->ospf6_if);
2737 } else
2738 ospf6_packet_free(op);
2739
2740 if (on->lsupdate_list->count != 0) {
2741 thread_add_event(master, ospf6_lsupdate_send_neighbor, on, 0,
2742 &on->thread_send_lsupdate);
2743 } else if (on->retrans_list->count != 0) {
2744 thread_add_timer(master, ospf6_lsupdate_send_neighbor, on,
2745 on->ospf6_if->rxmt_interval,
2746 &on->thread_send_lsupdate);
2747 }
2748 }
2749
2750 int ospf6_lsupdate_send_neighbor_now(struct ospf6_neighbor *on,
2751 struct ospf6_lsa *lsa)
2752 {
2753 struct ospf6_packet *op;
2754 uint16_t length = OSPF6_HEADER_SIZE;
2755
2756 op = ospf6_packet_new(on->ospf6_if->ifmtu);
2757 ospf6_make_header(OSPF6_MESSAGE_TYPE_LSUPDATE, on->ospf6_if, op->s);
2758
2759 /* skip over fixed header */
2760 stream_forward_endp(op->s, OSPF6_LS_UPD_MIN_SIZE);
2761 ospf6_lsa_age_update_to_send(lsa, on->ospf6_if->transdelay);
2762 stream_put(op->s, lsa->header, OSPF6_LSA_SIZE(lsa->header));
2763 length = OSPF6_HEADER_SIZE + OSPF6_LS_UPD_MIN_SIZE
2764 + OSPF6_LSA_SIZE(lsa->header);
2765 ospf6_fill_header(on->ospf6_if, op->s, length);
2766 ospf6_fill_lsupdate_header(op->s, 1);
2767 op->length = length;
2768
2769 if (IS_OSPF6_DEBUG_FLOODING
2770 || IS_OSPF6_DEBUG_MESSAGE(OSPF6_MESSAGE_TYPE_LSUPDATE, SEND_HDR))
2771 zlog_debug("%s: Send lsupdate with lsa %s (age %u)", __func__,
2772 lsa->name, ntohs(lsa->header->age));
2773
2774 ospf6_send_lsupdate(on, NULL, op);
2775
2776 return 0;
2777 }
2778
2779 static uint16_t ospf6_make_lsupdate_interface(struct ospf6_interface *oi,
2780 struct ospf6_packet **op,
2781 int *lsa_cnt)
2782 {
2783 uint16_t length = OSPF6_LS_UPD_MIN_SIZE;
2784 struct ospf6_lsa *lsa, *lsanext;
2785
2786 /* skip over fixed header */
2787 stream_forward_endp((*op)->s, OSPF6_LS_UPD_MIN_SIZE);
2788
2789 for (ALL_LSDB(oi->lsupdate_list, lsa, lsanext)) {
2790 if (length + OSPF6_LSA_SIZE(lsa->header) + OSPF6_HEADER_SIZE >
2791 ospf6_packet_max(oi)) {
2792 ospf6_fill_header(oi, (*op)->s,
2793 length + OSPF6_HEADER_SIZE);
2794 (*op)->length = length + OSPF6_HEADER_SIZE;
2795 ospf6_fill_lsupdate_header((*op)->s, *lsa_cnt);
2796 ospf6_send_lsupdate(NULL, oi, *op);
2797
2798 /* refresh packet */
2799 *op = ospf6_packet_new(oi->ifmtu);
2800 length = OSPF6_LS_UPD_MIN_SIZE;
2801 *lsa_cnt = 0;
2802 ospf6_make_header(OSPF6_MESSAGE_TYPE_LSUPDATE, oi,
2803 (*op)->s);
2804 stream_forward_endp((*op)->s, OSPF6_LS_UPD_MIN_SIZE);
2805 }
2806
2807 ospf6_lsa_age_update_to_send(lsa, oi->transdelay);
2808 stream_put((*op)->s, lsa->header, OSPF6_LSA_SIZE(lsa->header));
2809 (*lsa_cnt)++;
2810 length += OSPF6_LSA_SIZE(lsa->header);
2811
2812 assert(lsa->lock == 2);
2813 ospf6_lsdb_remove(lsa, oi->lsupdate_list);
2814 }
2815 return length;
2816 }
2817
2818 void ospf6_lsupdate_send_interface(struct thread *thread)
2819 {
2820 struct ospf6_interface *oi;
2821 struct ospf6_packet *op;
2822 uint16_t length = OSPF6_HEADER_SIZE;
2823 int lsa_cnt = 0;
2824
2825 oi = (struct ospf6_interface *)THREAD_ARG(thread);
2826
2827 if (oi->state <= OSPF6_INTERFACE_WAITING) {
2828 if (IS_OSPF6_DEBUG_MESSAGE(OSPF6_MESSAGE_TYPE_LSUPDATE,
2829 SEND_HDR))
2830 zlog_debug(
2831 "Quit to send LSUpdate to interface %s state %s",
2832 oi->interface->name,
2833 ospf6_interface_state_str[oi->state]);
2834 return;
2835 }
2836
2837 /* if we have nothing to send, return */
2838 if (oi->lsupdate_list->count == 0)
2839 return;
2840
2841 op = ospf6_packet_new(oi->ifmtu);
2842 ospf6_make_header(OSPF6_MESSAGE_TYPE_LSUPDATE, oi, op->s);
2843 length += ospf6_make_lsupdate_interface(oi, &op, &lsa_cnt);
2844 if (lsa_cnt) {
2845 /* Fill OSPF header. */
2846 ospf6_fill_header(oi, op->s, length);
2847 ospf6_fill_lsupdate_header(op->s, lsa_cnt);
2848 op->length = length;
2849 ospf6_send_lsupdate(NULL, oi, op);
2850 } else
2851 ospf6_packet_free(op);
2852
2853 if (oi->lsupdate_list->count > 0) {
2854 thread_add_event(master, ospf6_lsupdate_send_interface, oi, 0,
2855 &oi->thread_send_lsupdate);
2856 }
2857 }
2858
2859 void ospf6_lsack_send_neighbor(struct thread *thread)
2860 {
2861 struct ospf6_neighbor *on;
2862 struct ospf6_packet *op;
2863 uint16_t length = OSPF6_HEADER_SIZE;
2864
2865 on = (struct ospf6_neighbor *)THREAD_ARG(thread);
2866
2867 if (on->state < OSPF6_NEIGHBOR_EXCHANGE) {
2868 if (IS_OSPF6_DEBUG_MESSAGE(OSPF6_MESSAGE_TYPE_LSACK, SEND_HDR))
2869 zlog_debug("Quit to send LSAck to neighbor %s state %s",
2870 on->name,
2871 ospf6_neighbor_state_str[on->state]);
2872 return;
2873 }
2874
2875 /* if we have nothing to send, return */
2876 if (on->lsack_list->count == 0)
2877 return;
2878
2879 op = ospf6_packet_new(on->ospf6_if->ifmtu);
2880 ospf6_make_header(OSPF6_MESSAGE_TYPE_LSACK, on->ospf6_if, op->s);
2881
2882 length += ospf6_make_lsack_neighbor(on, &op);
2883
2884 if (length == OSPF6_HEADER_SIZE) {
2885 ospf6_packet_free(op);
2886 return;
2887 }
2888
2889 /* Fill OSPF header. */
2890 ospf6_fill_header(on->ospf6_if, op->s, length);
2891
2892 /* Set packet length, dst and queue to FIFO. */
2893 op->length = length;
2894 op->dst = on->linklocal_addr;
2895 ospf6_fill_hdr_checksum(on->ospf6_if, op);
2896 ospf6_packet_add(on->ospf6_if, op);
2897 OSPF6_MESSAGE_WRITE_ON(on->ospf6_if);
2898
2899 if (on->lsack_list->count > 0)
2900 thread_add_event(master, ospf6_lsack_send_neighbor, on, 0,
2901 &on->thread_send_lsack);
2902 }
2903
2904 static uint16_t ospf6_make_lsack_interface(struct ospf6_interface *oi,
2905 struct ospf6_packet *op)
2906 {
2907 uint16_t length = 0;
2908 struct ospf6_lsa *lsa, *lsanext;
2909
2910 for (ALL_LSDB(oi->lsack_list, lsa, lsanext)) {
2911 if ((length + sizeof(struct ospf6_lsa_header)
2912 + OSPF6_HEADER_SIZE)
2913 > ospf6_packet_max(oi)) {
2914 /* if we run out of packet size/space here,
2915 better to try again soon. */
2916 THREAD_OFF(oi->thread_send_lsack);
2917 thread_add_event(master, ospf6_lsack_send_interface, oi,
2918 0, &oi->thread_send_lsack);
2919
2920 ospf6_lsa_unlock(lsa);
2921 if (lsanext)
2922 ospf6_lsa_unlock(lsanext);
2923 break;
2924 }
2925 ospf6_lsa_age_update_to_send(lsa, oi->transdelay);
2926 stream_put(op->s, lsa->header, sizeof(struct ospf6_lsa_header));
2927 length += sizeof(struct ospf6_lsa_header);
2928
2929 assert(lsa->lock == 2);
2930 ospf6_lsdb_remove(lsa, oi->lsack_list);
2931 }
2932 return length;
2933 }
2934
2935 void ospf6_lsack_send_interface(struct thread *thread)
2936 {
2937 struct ospf6_interface *oi;
2938 struct ospf6_packet *op;
2939 uint16_t length = OSPF6_HEADER_SIZE;
2940
2941 oi = (struct ospf6_interface *)THREAD_ARG(thread);
2942
2943 if (oi->state <= OSPF6_INTERFACE_WAITING) {
2944 if (IS_OSPF6_DEBUG_MESSAGE(OSPF6_MESSAGE_TYPE_LSACK, SEND_HDR))
2945 zlog_debug(
2946 "Quit to send LSAck to interface %s state %s",
2947 oi->interface->name,
2948 ospf6_interface_state_str[oi->state]);
2949 return;
2950 }
2951
2952 /* if we have nothing to send, return */
2953 if (oi->lsack_list->count == 0)
2954 return;
2955
2956 op = ospf6_packet_new(oi->ifmtu);
2957 ospf6_make_header(OSPF6_MESSAGE_TYPE_LSACK, oi, op->s);
2958
2959 length += ospf6_make_lsack_interface(oi, op);
2960
2961 if (length == OSPF6_HEADER_SIZE) {
2962 ospf6_packet_free(op);
2963 return;
2964 }
2965 /* Fill OSPF header. */
2966 ospf6_fill_header(oi, op->s, length);
2967
2968 /* Set packet length, dst and queue to FIFO. */
2969 op->length = length;
2970 if ((oi->state == OSPF6_INTERFACE_POINTTOPOINT)
2971 || (oi->state == OSPF6_INTERFACE_DR)
2972 || (oi->state == OSPF6_INTERFACE_BDR))
2973 op->dst = allspfrouters6;
2974 else
2975 op->dst = alldrouters6;
2976
2977 ospf6_fill_hdr_checksum(oi, op);
2978 ospf6_packet_add(oi, op);
2979 OSPF6_MESSAGE_WRITE_ON(oi);
2980
2981 if (oi->lsack_list->count > 0)
2982 thread_add_event(master, ospf6_lsack_send_interface, oi, 0,
2983 &oi->thread_send_lsack);
2984 }
2985
2986 /* Commands */
2987 DEFUN(debug_ospf6_message, debug_ospf6_message_cmd,
2988 "debug ospf6 message <unknown|hello|dbdesc|lsreq|lsupdate|lsack|all> [<send|recv|send-hdr|recv-hdr>]",
2989 DEBUG_STR OSPF6_STR
2990 "Debug OSPFv3 message\n"
2991 "Debug Unknown message\n"
2992 "Debug Hello message\n"
2993 "Debug Database Description message\n"
2994 "Debug Link State Request message\n"
2995 "Debug Link State Update message\n"
2996 "Debug Link State Acknowledgement message\n"
2997 "Debug All message\n"
2998 "Debug only sending message, entire packet\n"
2999 "Debug only receiving message, entire packet\n"
3000 "Debug only sending message, header only\n"
3001 "Debug only receiving message, header only\n")
3002 {
3003 int idx_packet = 3;
3004 int idx_send_recv = 4;
3005 unsigned char level = 0;
3006 int type = 0;
3007 int i;
3008
3009 /* check type */
3010 if (!strncmp(argv[idx_packet]->arg, "u", 1))
3011 type = OSPF6_MESSAGE_TYPE_UNKNOWN;
3012 else if (!strncmp(argv[idx_packet]->arg, "h", 1))
3013 type = OSPF6_MESSAGE_TYPE_HELLO;
3014 else if (!strncmp(argv[idx_packet]->arg, "d", 1))
3015 type = OSPF6_MESSAGE_TYPE_DBDESC;
3016 else if (!strncmp(argv[idx_packet]->arg, "lsr", 3))
3017 type = OSPF6_MESSAGE_TYPE_LSREQ;
3018 else if (!strncmp(argv[idx_packet]->arg, "lsu", 3))
3019 type = OSPF6_MESSAGE_TYPE_LSUPDATE;
3020 else if (!strncmp(argv[idx_packet]->arg, "lsa", 3))
3021 type = OSPF6_MESSAGE_TYPE_LSACK;
3022 else if (!strncmp(argv[idx_packet]->arg, "a", 1))
3023 type = OSPF6_MESSAGE_TYPE_ALL;
3024
3025 if (argc == 4)
3026 level = OSPF6_DEBUG_MESSAGE_SEND | OSPF6_DEBUG_MESSAGE_RECV;
3027 else if (!strncmp(argv[idx_send_recv]->arg, "send-h", 6))
3028 level = OSPF6_DEBUG_MESSAGE_SEND_HDR;
3029 else if (!strncmp(argv[idx_send_recv]->arg, "s", 1))
3030 level = OSPF6_DEBUG_MESSAGE_SEND;
3031 else if (!strncmp(argv[idx_send_recv]->arg, "recv-h", 6))
3032 level = OSPF6_DEBUG_MESSAGE_RECV_HDR;
3033 else if (!strncmp(argv[idx_send_recv]->arg, "r", 1))
3034 level = OSPF6_DEBUG_MESSAGE_RECV;
3035
3036 if (type == OSPF6_MESSAGE_TYPE_ALL) {
3037 for (i = 0; i < 6; i++)
3038 OSPF6_DEBUG_MESSAGE_ON(i, level);
3039 } else
3040 OSPF6_DEBUG_MESSAGE_ON(type, level);
3041
3042 return CMD_SUCCESS;
3043 }
3044
3045 DEFUN(no_debug_ospf6_message, no_debug_ospf6_message_cmd,
3046 "no debug ospf6 message <unknown|hello|dbdesc|lsreq|lsupdate|lsack|all> [<send|recv|send-hdr|recv-hdr>]",
3047 NO_STR DEBUG_STR OSPF6_STR
3048 "Debug OSPFv3 message\n"
3049 "Debug Unknown message\n"
3050 "Debug Hello message\n"
3051 "Debug Database Description message\n"
3052 "Debug Link State Request message\n"
3053 "Debug Link State Update message\n"
3054 "Debug Link State Acknowledgement message\n"
3055 "Debug All message\n"
3056 "Debug only sending message, entire pkt\n"
3057 "Debug only receiving message, entire pkt\n"
3058 "Debug only sending message, header only\n"
3059 "Debug only receiving message, header only\n")
3060 {
3061 int idx_packet = 4;
3062 int idx_send_recv = 5;
3063 unsigned char level = 0;
3064 int type = 0;
3065 int i;
3066
3067 /* check type */
3068 if (!strncmp(argv[idx_packet]->arg, "u", 1))
3069 type = OSPF6_MESSAGE_TYPE_UNKNOWN;
3070 else if (!strncmp(argv[idx_packet]->arg, "h", 1))
3071 type = OSPF6_MESSAGE_TYPE_HELLO;
3072 else if (!strncmp(argv[idx_packet]->arg, "d", 1))
3073 type = OSPF6_MESSAGE_TYPE_DBDESC;
3074 else if (!strncmp(argv[idx_packet]->arg, "lsr", 3))
3075 type = OSPF6_MESSAGE_TYPE_LSREQ;
3076 else if (!strncmp(argv[idx_packet]->arg, "lsu", 3))
3077 type = OSPF6_MESSAGE_TYPE_LSUPDATE;
3078 else if (!strncmp(argv[idx_packet]->arg, "lsa", 3))
3079 type = OSPF6_MESSAGE_TYPE_LSACK;
3080 else if (!strncmp(argv[idx_packet]->arg, "a", 1))
3081 type = OSPF6_MESSAGE_TYPE_ALL;
3082
3083 if (argc == 5)
3084 level = OSPF6_DEBUG_MESSAGE_SEND | OSPF6_DEBUG_MESSAGE_RECV
3085 | OSPF6_DEBUG_MESSAGE_SEND_HDR
3086 | OSPF6_DEBUG_MESSAGE_RECV_HDR;
3087 else if (!strncmp(argv[idx_send_recv]->arg, "send-h", 6))
3088 level = OSPF6_DEBUG_MESSAGE_SEND_HDR;
3089 else if (!strncmp(argv[idx_send_recv]->arg, "s", 1))
3090 level = OSPF6_DEBUG_MESSAGE_SEND;
3091 else if (!strncmp(argv[idx_send_recv]->arg, "recv-h", 6))
3092 level = OSPF6_DEBUG_MESSAGE_RECV_HDR;
3093 else if (!strncmp(argv[idx_send_recv]->arg, "r", 1))
3094 level = OSPF6_DEBUG_MESSAGE_RECV;
3095
3096 if (type == OSPF6_MESSAGE_TYPE_ALL) {
3097 for (i = 0; i < 6; i++)
3098 OSPF6_DEBUG_MESSAGE_OFF(i, level);
3099 } else
3100 OSPF6_DEBUG_MESSAGE_OFF(type, level);
3101
3102 return CMD_SUCCESS;
3103 }
3104
3105
3106 int config_write_ospf6_debug_message(struct vty *vty)
3107 {
3108 const char *type_str[] = {"unknown", "hello", "dbdesc",
3109 "lsreq", "lsupdate", "lsack"};
3110 unsigned char s = 0, r = 0, sh = 0, rh = 0;
3111 int i;
3112
3113 for (i = 0; i < 6; i++) {
3114 if (IS_OSPF6_DEBUG_MESSAGE_ENABLED(i, SEND))
3115 s |= 1 << i;
3116 if (IS_OSPF6_DEBUG_MESSAGE_ENABLED(i, RECV))
3117 r |= 1 << i;
3118 }
3119
3120 for (i = 0; i < 6; i++) {
3121 if (IS_OSPF6_DEBUG_MESSAGE_ENABLED(i, SEND_HDR))
3122 sh |= 1 << i;
3123 if (IS_OSPF6_DEBUG_MESSAGE_ENABLED(i, RECV_HDR))
3124 rh |= 1 << i;
3125 }
3126
3127 if (s == 0x3f && r == 0x3f) {
3128 vty_out(vty, "debug ospf6 message all\n");
3129 return 0;
3130 }
3131
3132 if (s == 0x3f && r == 0) {
3133 vty_out(vty, "debug ospf6 message all send\n");
3134 return 0;
3135 } else if (s == 0 && r == 0x3f) {
3136 vty_out(vty, "debug ospf6 message all recv\n");
3137 return 0;
3138 }
3139
3140 if (sh == 0x3f && rh == 0) {
3141 vty_out(vty, "debug ospf6 message all send-hdr\n");
3142 return 0;
3143 } else if (sh == 0 && rh == 0x3f) {
3144 vty_out(vty, "debug ospf6 message all recv-hdr\n");
3145 return 0;
3146 }
3147
3148 /* Unknown message is logged by default */
3149 if (!IS_OSPF6_DEBUG_MESSAGE(OSPF6_MESSAGE_TYPE_UNKNOWN, SEND)
3150 && !IS_OSPF6_DEBUG_MESSAGE(OSPF6_MESSAGE_TYPE_UNKNOWN, RECV))
3151 vty_out(vty, "no debug ospf6 message unknown\n");
3152 else if (!IS_OSPF6_DEBUG_MESSAGE(OSPF6_MESSAGE_TYPE_UNKNOWN, SEND))
3153 vty_out(vty, "no debug ospf6 message unknown send\n");
3154 else if (!IS_OSPF6_DEBUG_MESSAGE(OSPF6_MESSAGE_TYPE_UNKNOWN, RECV))
3155 vty_out(vty, "no debug ospf6 message unknown recv\n");
3156
3157 for (i = 1; i < 6; i++) {
3158 if (IS_OSPF6_DEBUG_MESSAGE_ENABLED(i, SEND)
3159 && IS_OSPF6_DEBUG_MESSAGE_ENABLED(i, RECV)) {
3160 vty_out(vty, "debug ospf6 message %s\n", type_str[i]);
3161 continue;
3162 }
3163
3164 if (IS_OSPF6_DEBUG_MESSAGE_ENABLED(i, SEND))
3165 vty_out(vty, "debug ospf6 message %s send\n",
3166 type_str[i]);
3167 else if (IS_OSPF6_DEBUG_MESSAGE_ENABLED(i, SEND_HDR))
3168 vty_out(vty, "debug ospf6 message %s send-hdr\n",
3169 type_str[i]);
3170
3171 if (IS_OSPF6_DEBUG_MESSAGE_ENABLED(i, RECV))
3172 vty_out(vty, "debug ospf6 message %s recv\n",
3173 type_str[i]);
3174 else if (IS_OSPF6_DEBUG_MESSAGE_ENABLED(i, RECV_HDR))
3175 vty_out(vty, "debug ospf6 message %s recv-hdr\n",
3176 type_str[i]);
3177 }
3178
3179 return 0;
3180 }
3181
3182 void install_element_ospf6_debug_message(void)
3183 {
3184 install_element(ENABLE_NODE, &debug_ospf6_message_cmd);
3185 install_element(ENABLE_NODE, &no_debug_ospf6_message_cmd);
3186 install_element(CONFIG_NODE, &debug_ospf6_message_cmd);
3187 install_element(CONFIG_NODE, &no_debug_ospf6_message_cmd);
3188 }