]> git.proxmox.com Git - mirror_frr.git/blob - ospfd/ospf_flood.c
Merge pull request #5468 from qlyoung/bgpd-remove-bgp-attr-dup
[mirror_frr.git] / ospfd / ospf_flood.c
1 /*
2 * OSPF Flooding -- RFC2328 Section 13.
3 * Copyright (C) 1999, 2000 Toshiaki Takada
4 *
5 * This file is part of GNU Zebra.
6 *
7 * GNU Zebra is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published
9 * by the Free Software Foundation; either version 2, or (at your
10 * option) any later version.
11 *
12 * GNU Zebra is distributed in the hope that it will be useful, but
13 * WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * General Public License for more details.
16 *
17 * You should have received a copy of the GNU General Public License along
18 * with this program; see the file COPYING; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
20 */
21
22 #include <zebra.h>
23
24 #include "monotime.h"
25 #include "linklist.h"
26 #include "prefix.h"
27 #include "if.h"
28 #include "command.h"
29 #include "table.h"
30 #include "thread.h"
31 #include "memory.h"
32 #include "log.h"
33 #include "zclient.h"
34
35 #include "ospfd/ospfd.h"
36 #include "ospfd/ospf_interface.h"
37 #include "ospfd/ospf_ism.h"
38 #include "ospfd/ospf_asbr.h"
39 #include "ospfd/ospf_lsa.h"
40 #include "ospfd/ospf_lsdb.h"
41 #include "ospfd/ospf_neighbor.h"
42 #include "ospfd/ospf_nsm.h"
43 #include "ospfd/ospf_spf.h"
44 #include "ospfd/ospf_flood.h"
45 #include "ospfd/ospf_packet.h"
46 #include "ospfd/ospf_abr.h"
47 #include "ospfd/ospf_route.h"
48 #include "ospfd/ospf_zebra.h"
49 #include "ospfd/ospf_dump.h"
50
51 extern struct zclient *zclient;
52
53 /* Do the LSA acking specified in table 19, Section 13.5, row 2
54 * This get called from ospf_flood_out_interface. Declared inline
55 * for speed. */
56 static void ospf_flood_delayed_lsa_ack(struct ospf_neighbor *inbr,
57 struct ospf_lsa *lsa)
58 {
59 /* LSA is more recent than database copy, but was not
60 flooded back out receiving interface. Delayed
61 acknowledgment sent. If interface is in Backup state
62 delayed acknowledgment sent only if advertisement
63 received from Designated Router, otherwise do nothing See
64 RFC 2328 Section 13.5 */
65
66 /* Whether LSA is more recent or not, and whether this is in
67 response to the LSA being sent out recieving interface has been
68 worked out previously */
69
70 /* Deal with router as BDR */
71 if (inbr->oi->state == ISM_Backup && !NBR_IS_DR(inbr))
72 return;
73
74 /* Schedule a delayed LSA Ack to be sent */
75 listnode_add(inbr->oi->ls_ack,
76 ospf_lsa_lock(lsa)); /* delayed LSA Ack */
77 }
78
79 /* Check LSA is related to external info. */
80 struct external_info *ospf_external_info_check(struct ospf *ospf,
81 struct ospf_lsa *lsa)
82 {
83 struct as_external_lsa *al;
84 struct prefix_ipv4 p;
85 struct route_node *rn;
86 struct list *ext_list;
87 struct listnode *node;
88 struct ospf_external *ext;
89 int type;
90
91 al = (struct as_external_lsa *)lsa->data;
92
93 p.family = AF_INET;
94 p.prefix = lsa->data->id;
95 p.prefixlen = ip_masklen(al->mask);
96
97 for (type = 0; type < ZEBRA_ROUTE_MAX; type++) {
98 int redist_on = 0;
99
100 redist_on =
101 is_prefix_default(&p)
102 ? vrf_bitmap_check(
103 zclient->default_information[AFI_IP],
104 ospf->vrf_id)
105 : (zclient->mi_redist[AFI_IP][type].enabled
106 || vrf_bitmap_check(
107 zclient->redist[AFI_IP][type],
108 ospf->vrf_id));
109 // Pending: check for MI above.
110 if (redist_on) {
111 ext_list = ospf->external[type];
112 if (!ext_list)
113 continue;
114
115 for (ALL_LIST_ELEMENTS_RO(ext_list, node, ext)) {
116 rn = NULL;
117 if (ext->external_info)
118 rn = route_node_lookup(
119 ext->external_info,
120 (struct prefix *)&p);
121 if (rn) {
122 route_unlock_node(rn);
123 if (rn->info != NULL)
124 return (struct external_info *)
125 rn->info;
126 }
127 }
128 }
129 }
130
131 if (is_prefix_default(&p) && ospf->external[DEFAULT_ROUTE]) {
132 ext_list = ospf->external[DEFAULT_ROUTE];
133
134 for (ALL_LIST_ELEMENTS_RO(ext_list, node, ext)) {
135 if (!ext->external_info)
136 continue;
137
138 rn = route_node_lookup(ext->external_info,
139 (struct prefix *)&p);
140 if (!rn)
141 continue;
142 route_unlock_node(rn);
143 if (rn->info != NULL)
144 return (struct external_info *)rn->info;
145 }
146 }
147 return NULL;
148 }
149
150 static void ospf_process_self_originated_lsa(struct ospf *ospf,
151 struct ospf_lsa *new,
152 struct ospf_area *area)
153 {
154 struct ospf_interface *oi;
155 struct external_info *ei;
156 struct listnode *node;
157
158 if (IS_DEBUG_OSPF_EVENT)
159 zlog_debug(
160 "%s:LSA[Type%d:%s]: Process self-originated LSA seq 0x%x",
161 ospf_get_name(ospf), new->data->type,
162 inet_ntoa(new->data->id), ntohl(new->data->ls_seqnum));
163
164 /* If we're here, we installed a self-originated LSA that we received
165 from a neighbor, i.e. it's more recent. We must see whether we want
166 to originate it.
167 If yes, we should use this LSA's sequence number and reoriginate
168 a new instance.
169 if not --- we must flush this LSA from the domain. */
170 switch (new->data->type) {
171 case OSPF_ROUTER_LSA:
172 /* Originate a new instance and schedule flooding */
173 if (area->router_lsa_self)
174 area->router_lsa_self->data->ls_seqnum =
175 new->data->ls_seqnum;
176 ospf_router_lsa_update_area(area);
177 return;
178 case OSPF_NETWORK_LSA:
179 case OSPF_OPAQUE_LINK_LSA:
180 /* We must find the interface the LSA could belong to.
181 If the interface is no more a broadcast type or we are no
182 more
183 the DR, we flush the LSA otherwise -- create the new instance
184 and
185 schedule flooding. */
186
187 /* Look through all interfaces, not just area, since interface
188 could be moved from one area to another. */
189 for (ALL_LIST_ELEMENTS_RO(ospf->oiflist, node, oi))
190 /* These are sanity check. */
191 if (IPV4_ADDR_SAME(&oi->address->u.prefix4,
192 &new->data->id)) {
193 if (oi->area != area
194 || oi->type != OSPF_IFTYPE_BROADCAST
195 || !IPV4_ADDR_SAME(&oi->address->u.prefix4,
196 &DR(oi))) {
197 ospf_schedule_lsa_flush_area(area, new);
198 return;
199 }
200
201 if (new->data->type == OSPF_OPAQUE_LINK_LSA) {
202 ospf_opaque_lsa_refresh(new);
203 return;
204 }
205
206 if (oi->network_lsa_self)
207 oi->network_lsa_self->data->ls_seqnum =
208 new->data->ls_seqnum;
209 /* Schedule network-LSA origination. */
210 ospf_network_lsa_update(oi);
211 return;
212 }
213 break;
214 case OSPF_SUMMARY_LSA:
215 case OSPF_ASBR_SUMMARY_LSA:
216 ospf_schedule_abr_task(ospf);
217 break;
218 case OSPF_AS_EXTERNAL_LSA:
219 case OSPF_AS_NSSA_LSA:
220 if ((new->data->type == OSPF_AS_EXTERNAL_LSA)
221 && CHECK_FLAG(new->flags, OSPF_LSA_LOCAL_XLT)) {
222 ospf_translated_nssa_refresh(ospf, NULL, new);
223 return;
224 }
225 ei = ospf_external_info_check(ospf, new);
226 if (ei)
227 ospf_external_lsa_refresh(ospf, new, ei,
228 LSA_REFRESH_FORCE);
229 else
230 ospf_lsa_flush_as(ospf, new);
231 break;
232 case OSPF_OPAQUE_AREA_LSA:
233 ospf_opaque_lsa_refresh(new);
234 break;
235 case OSPF_OPAQUE_AS_LSA:
236 ospf_opaque_lsa_refresh(new);
237 /* Reconsideration may needed. */ /* XXX */
238 break;
239 default:
240 break;
241 }
242 }
243
244 /* OSPF LSA flooding -- RFC2328 Section 13.(5). */
245
246 /* Now Updated for NSSA operation, as follows:
247
248
249 Type-5's have no change. Blocked to STUB or NSSA.
250
251 Type-7's can be received, and if a DR
252 they will also flood the local NSSA Area as Type-7's
253
254 If a Self-Originated LSA (now an ASBR),
255 The LSDB will be updated as Type-5's, (for continual re-fresh)
256
257 If an NSSA-IR it is installed/flooded as Type-7, P-bit on.
258 if an NSSA-ABR it is installed/flooded as Type-7, P-bit off.
259
260 Later, during the ABR TASK, if the ABR is the Elected NSSA
261 translator, then All Type-7s (with P-bit ON) are Translated to
262 Type-5's and flooded to all non-NSSA/STUB areas.
263
264 During ASE Calculations,
265 non-ABRs calculate external routes from Type-7's
266 ABRs calculate external routes from Type-5's and non-self Type-7s
267 */
268 int ospf_flood(struct ospf *ospf, struct ospf_neighbor *nbr,
269 struct ospf_lsa *current, struct ospf_lsa *new)
270 {
271 struct ospf_interface *oi;
272 int lsa_ack_flag;
273
274 /* Type-7 LSA's will be flooded throughout their native NSSA area,
275 but will also be flooded as Type-5's into ABR capable links. */
276
277 if (IS_DEBUG_OSPF_EVENT)
278 zlog_debug(
279 "%s:LSA[Flooding]: start, NBR %s (%s), cur(%p), New-LSA[%s]",
280 ospf_get_name(ospf), inet_ntoa(nbr->router_id),
281 lookup_msg(ospf_nsm_state_msg, nbr->state, NULL),
282 (void *)current, dump_lsa_key(new));
283
284 oi = nbr->oi;
285
286 /* If there is already a database copy, and if the
287 database copy was received via flooding and installed less
288 than MinLSArrival seconds ago, discard the new LSA
289 (without acknowledging it). */
290 if (current != NULL) /* -- endo. */
291 {
292 if (IS_LSA_SELF(current)
293 && (ntohs(current->data->ls_age) == 0
294 && ntohl(current->data->ls_seqnum)
295 == OSPF_INITIAL_SEQUENCE_NUMBER)) {
296 if (IS_DEBUG_OSPF_EVENT)
297 zlog_debug(
298 "%s:LSA[Flooding]: Got a self-originated LSA, while local one is initial instance.",
299 ospf_get_name(ospf));
300 ; /* Accept this LSA for quick LSDB resynchronization.
301 */
302 } else if (monotime_since(&current->tv_recv, NULL)
303 < ospf->min_ls_arrival * 1000LL) {
304 if (IS_DEBUG_OSPF_EVENT)
305 zlog_debug(
306 "%s:LSA[Flooding]: LSA is received recently.",
307 ospf_get_name(ospf));
308 return -1;
309 }
310 }
311
312 /* Flood the new LSA out some subset of the router's interfaces.
313 In some cases (e.g., the state of the receiving interface is
314 DR and the LSA was received from a router other than the
315 Backup DR) the LSA will be flooded back out the receiving
316 interface. */
317 lsa_ack_flag = ospf_flood_through(ospf, nbr, new);
318
319 /* Remove the current database copy from all neighbors' Link state
320 retransmission lists. AS_EXTERNAL and AS_EXTERNAL_OPAQUE does
321 ^^^^^^^^^^^^^^^^^^^^^^^
322 not have area ID.
323 All other (even NSSA's) do have area ID. */
324 if (current) {
325 switch (current->data->type) {
326 case OSPF_AS_EXTERNAL_LSA:
327 case OSPF_OPAQUE_AS_LSA:
328 ospf_ls_retransmit_delete_nbr_as(ospf, current);
329 break;
330 default:
331 ospf_ls_retransmit_delete_nbr_area(oi->area, current);
332 break;
333 }
334 }
335
336 /* Do some internal house keeping that is needed here */
337 SET_FLAG(new->flags, OSPF_LSA_RECEIVED);
338 (void)ospf_lsa_is_self_originated(ospf, new); /* Let it set the flag */
339
340 /* Install the new LSA in the link state database
341 (replacing the current database copy). This may cause the
342 routing table calculation to be scheduled. In addition,
343 timestamp the new LSA with the current time. The flooding
344 procedure cannot overwrite the newly installed LSA until
345 MinLSArrival seconds have elapsed. */
346
347 if (!(new = ospf_lsa_install(ospf, oi, new)))
348 return -1; /* unknown LSA type or any other error condition */
349
350 /* Acknowledge the receipt of the LSA by sending a Link State
351 Acknowledgment packet back out the receiving interface. */
352 if (lsa_ack_flag)
353 ospf_flood_delayed_lsa_ack(nbr, new);
354
355 /* If this new LSA indicates that it was originated by the
356 receiving router itself, the router must take special action,
357 either updating the LSA or in some cases flushing it from
358 the routing domain. */
359 if (ospf_lsa_is_self_originated(ospf, new))
360 ospf_process_self_originated_lsa(ospf, new, oi->area);
361 else
362 /* Update statistics value for OSPF-MIB. */
363 ospf->rx_lsa_count++;
364
365 return 0;
366 }
367
368 /* OSPF LSA flooding -- RFC2328 Section 13.3. */
369 static int ospf_flood_through_interface(struct ospf_interface *oi,
370 struct ospf_neighbor *inbr,
371 struct ospf_lsa *lsa)
372 {
373 struct ospf_neighbor *onbr;
374 struct route_node *rn;
375 int retx_flag;
376
377 if (IS_DEBUG_OSPF_EVENT)
378 zlog_debug(
379 "%s:ospf_flood_through_interface(): considering int %s, INBR(%s), LSA[%s] AGE %u",
380 ospf_get_name(oi->ospf), IF_NAME(oi), inbr ? inet_ntoa(inbr->router_id) : "NULL",
381 dump_lsa_key(lsa), ntohs(lsa->data->ls_age));
382
383 if (!ospf_if_is_enable(oi))
384 return 0;
385
386 /* Remember if new LSA is aded to a retransmit list. */
387 retx_flag = 0;
388
389 /* Each of the neighbors attached to this interface are examined,
390 to determine whether they must receive the new LSA. The following
391 steps are executed for each neighbor: */
392 for (rn = route_top(oi->nbrs); rn; rn = route_next(rn)) {
393 struct ospf_lsa *ls_req;
394
395 if (rn->info == NULL)
396 continue;
397
398 onbr = rn->info;
399 if (IS_DEBUG_OSPF_EVENT)
400 zlog_debug(
401 "ospf_flood_through_interface(): considering nbr %s(%s) (%s)",
402 inet_ntoa(onbr->router_id),
403 ospf_get_name(oi->ospf),
404 lookup_msg(ospf_nsm_state_msg, onbr->state,
405 NULL));
406
407 /* If the neighbor is in a lesser state than Exchange, it
408 does not participate in flooding, and the next neighbor
409 should be examined. */
410 if (onbr->state < NSM_Exchange)
411 continue;
412
413 /* If the adjacency is not yet full (neighbor state is
414 Exchange or Loading), examine the Link state request
415 list associated with this adjacency. If there is an
416 instance of the new LSA on the list, it indicates that
417 the neighboring router has an instance of the LSA
418 already. Compare the new LSA to the neighbor's copy: */
419 if (onbr->state < NSM_Full) {
420 if (IS_DEBUG_OSPF_EVENT)
421 zlog_debug(
422 "ospf_flood_through_interface(): nbr adj is not Full");
423 ls_req = ospf_ls_request_lookup(onbr, lsa);
424 if (ls_req != NULL) {
425 int ret;
426
427 ret = ospf_lsa_more_recent(ls_req, lsa);
428 /* The new LSA is less recent. */
429 if (ret > 0)
430 continue;
431 /* The two copies are the same instance, then
432 delete
433 the LSA from the Link state request list. */
434 else if (ret == 0) {
435 ospf_ls_request_delete(onbr, ls_req);
436 ospf_check_nbr_loading(onbr);
437 continue;
438 }
439 /* The new LSA is more recent. Delete the LSA
440 from the Link state request list. */
441 else {
442 ospf_ls_request_delete(onbr, ls_req);
443 ospf_check_nbr_loading(onbr);
444 }
445 }
446 }
447
448 if (IS_OPAQUE_LSA(lsa->data->type)) {
449 if (!CHECK_FLAG(onbr->options, OSPF_OPTION_O)) {
450 if (IS_DEBUG_OSPF(lsa, LSA_FLOODING))
451 zlog_debug(
452 "Skip this neighbor: Not Opaque-capable.");
453 continue;
454 }
455 }
456
457 /* If the new LSA was received from this neighbor,
458 examine the next neighbor. */
459 if (inbr) {
460 /*
461 * Triggered by LSUpd message parser "ospf_ls_upd ()".
462 * E.g., all LSAs handling here is received via network.
463 */
464 if (IPV4_ADDR_SAME(&inbr->router_id,
465 &onbr->router_id)) {
466 if (IS_DEBUG_OSPF(lsa, LSA_FLOODING))
467 zlog_debug(
468 "Skip this neighbor: inbr == onbr");
469 continue;
470 }
471 } else {
472 /*
473 * Triggered by MaxAge remover, so far.
474 * NULL "inbr" means flooding starts from this node.
475 */
476 if (IPV4_ADDR_SAME(&lsa->data->adv_router,
477 &onbr->router_id)) {
478 if (IS_DEBUG_OSPF(lsa, LSA_FLOODING))
479 zlog_debug(
480 "Skip this neighbor: lsah->adv_router == onbr");
481 continue;
482 }
483 }
484
485 /* Add the new LSA to the Link state retransmission list
486 for the adjacency. The LSA will be retransmitted
487 at intervals until an acknowledgment is seen from
488 the neighbor. */
489 ospf_ls_retransmit_add(onbr, lsa);
490 retx_flag = 1;
491 }
492
493 /* If in the previous step, the LSA was NOT added to any of
494 the Link state retransmission lists, there is no need to
495 flood the LSA out the interface. */
496 if (retx_flag == 0) {
497 return (inbr && inbr->oi == oi);
498 }
499
500 /* if we've received the lsa on this interface we need to perform
501 additional checking */
502 if (inbr && (inbr->oi == oi)) {
503 /* If the new LSA was received on this interface, and it was
504 received from either the Designated Router or the Backup
505 Designated Router, chances are that all the neighbors have
506 received the LSA already. */
507 if (NBR_IS_DR(inbr) || NBR_IS_BDR(inbr)) {
508 if (IS_DEBUG_OSPF_NSSA)
509 zlog_debug(
510 "ospf_flood_through_interface(): "
511 "DR/BDR NOT SEND to int %s",
512 IF_NAME(oi));
513 return 1;
514 }
515
516 /* If the new LSA was received on this interface, and the
517 interface state is Backup, examine the next interface. The
518 Designated Router will do the flooding on this interface.
519 However, if the Designated Router fails the router will
520 end up retransmitting the updates. */
521
522 if (oi->state == ISM_Backup) {
523 if (IS_DEBUG_OSPF_NSSA)
524 zlog_debug(
525 "ospf_flood_through_interface(): "
526 "ISM_Backup NOT SEND to int %s",
527 IF_NAME(oi));
528 return 1;
529 }
530 }
531
532 /* The LSA must be flooded out the interface. Send a Link State
533 Update packet (including the new LSA as contents) out the
534 interface. The LSA's LS age must be incremented by InfTransDelay
535 (which must be > 0) when it is copied into the outgoing Link
536 State Update packet (until the LS age field reaches the maximum
537 value of MaxAge). */
538 /* XXX HASSO: Is this IS_DEBUG_OSPF_NSSA really correct? */
539 if (IS_DEBUG_OSPF_NSSA)
540 zlog_debug(
541 "ospf_flood_through_interface(): "
542 "DR/BDR sending upd to int %s",
543 IF_NAME(oi));
544
545 /* RFC2328 Section 13.3
546 On non-broadcast networks, separate Link State Update
547 packets must be sent, as unicasts, to each adjacent neighbor
548 (i.e., those in state Exchange or greater). The destination
549 IP addresses for these packets are the neighbors' IP
550 addresses. */
551 if (oi->type == OSPF_IFTYPE_NBMA) {
552 struct ospf_neighbor *nbr;
553
554 for (rn = route_top(oi->nbrs); rn; rn = route_next(rn))
555 if ((nbr = rn->info) != NULL)
556 if (nbr != oi->nbr_self
557 && nbr->state >= NSM_Exchange)
558 ospf_ls_upd_send_lsa(
559 nbr, lsa,
560 OSPF_SEND_PACKET_DIRECT);
561 } else
562 ospf_ls_upd_send_lsa(oi->nbr_self, lsa,
563 OSPF_SEND_PACKET_INDIRECT);
564
565 return 0;
566 }
567
568 int ospf_flood_through_area(struct ospf_area *area, struct ospf_neighbor *inbr,
569 struct ospf_lsa *lsa)
570 {
571 struct listnode *node, *nnode;
572 struct ospf_interface *oi;
573 int lsa_ack_flag = 0;
574
575 assert(area);
576 /* All other types are specific to a single area (Area A). The
577 eligible interfaces are all those interfaces attaching to the
578 Area A. If Area A is the backbone, this includes all the virtual
579 links. */
580 for (ALL_LIST_ELEMENTS(area->oiflist, node, nnode, oi)) {
581 if (area->area_id.s_addr != OSPF_AREA_BACKBONE
582 && oi->type == OSPF_IFTYPE_VIRTUALLINK)
583 continue;
584
585 if ((lsa->data->type == OSPF_OPAQUE_LINK_LSA)
586 && (lsa->oi != oi)) {
587 /*
588 * Link local scoped Opaque-LSA should only be flooded
589 * for the link on which the LSA has received.
590 */
591 if (IS_DEBUG_OSPF(lsa, LSA_FLOODING))
592 zlog_debug(
593 "Type-9 Opaque-LSA: lsa->oi(%p) != oi(%p)",
594 (void *)lsa->oi, (void *)oi);
595 continue;
596 }
597
598 if (ospf_flood_through_interface(oi, inbr, lsa))
599 lsa_ack_flag = 1;
600 }
601
602 return (lsa_ack_flag);
603 }
604
605 int ospf_flood_through_as(struct ospf *ospf, struct ospf_neighbor *inbr,
606 struct ospf_lsa *lsa)
607 {
608 struct listnode *node;
609 struct ospf_area *area;
610 int lsa_ack_flag;
611
612 lsa_ack_flag = 0;
613
614 /* The incoming LSA is type 5 or type 7 (AS-EXTERNAL or AS-NSSA )
615
616 Divert the Type-5 LSA's to all non-NSSA/STUB areas
617
618 Divert the Type-7 LSA's to all NSSA areas
619
620 AS-external-LSAs are flooded throughout the entire AS, with the
621 exception of stub areas (see Section 3.6). The eligible
622 interfaces are all the router's interfaces, excluding virtual
623 links and those interfaces attaching to stub areas. */
624
625 if (CHECK_FLAG(lsa->flags, OSPF_LSA_LOCAL_XLT)) /* Translated from 7 */
626 if (IS_DEBUG_OSPF_NSSA)
627 zlog_debug("Flood/AS: NSSA TRANSLATED LSA");
628
629 for (ALL_LIST_ELEMENTS_RO(ospf->areas, node, area)) {
630 int continue_flag = 0;
631 struct listnode *if_node;
632 struct ospf_interface *oi;
633
634 switch (area->external_routing) {
635 /* Don't send AS externals into stub areas. Various types
636 of support for partial stub areas can be implemented
637 here. NSSA's will receive Type-7's that have areas
638 matching the originl LSA. */
639 case OSPF_AREA_NSSA: /* Sending Type 5 or 7 into NSSA area */
640 /* Type-7, flood NSSA area */
641 if (lsa->data->type == OSPF_AS_NSSA_LSA
642 && area == lsa->area)
643 /* We will send it. */
644 continue_flag = 0;
645 else
646 continue_flag = 1; /* Skip this NSSA area for
647 Type-5's et al */
648 break;
649
650 case OSPF_AREA_TYPE_MAX:
651 case OSPF_AREA_STUB:
652 continue_flag = 1; /* Skip this area. */
653 break;
654
655 case OSPF_AREA_DEFAULT:
656 default:
657 /* No Type-7 into normal area */
658 if (lsa->data->type == OSPF_AS_NSSA_LSA)
659 continue_flag = 1; /* skip Type-7 */
660 else
661 continue_flag = 0; /* Do this area. */
662 break;
663 }
664
665 /* Do continue for above switch. Saves a big if then mess */
666 if (continue_flag)
667 continue; /* main for-loop */
668
669 /* send to every interface in this area */
670
671 for (ALL_LIST_ELEMENTS_RO(area->oiflist, if_node, oi)) {
672 /* Skip virtual links */
673 if (oi->type != OSPF_IFTYPE_VIRTUALLINK)
674 if (ospf_flood_through_interface(oi, inbr,
675 lsa)) /* lsa */
676 lsa_ack_flag = 1;
677 }
678 } /* main area for-loop */
679
680 return (lsa_ack_flag);
681 }
682
683 int ospf_flood_through(struct ospf *ospf, struct ospf_neighbor *inbr,
684 struct ospf_lsa *lsa)
685 {
686 int lsa_ack_flag = 0;
687
688 /* Type-7 LSA's for NSSA are flooded throughout the AS here, and
689 upon return are updated in the LSDB for Type-7's. Later,
690 re-fresh will re-send them (and also, if ABR, packet code will
691 translate to Type-5's)
692
693 As usual, Type-5 LSA's (if not DISCARDED because we are STUB or
694 NSSA) are flooded throughout the AS, and are updated in the
695 global table. */
696 /*
697 * At the common sub-sub-function "ospf_flood_through_interface()",
698 * a parameter "inbr" will be used to distinguish the called context
699 * whether the given LSA was received from the neighbor, or the
700 * flooding for the LSA starts from this node (e.g. the LSA was self-
701 * originated, or the LSA is going to be flushed from routing domain).
702 *
703 * So, for consistency reasons, this function "ospf_flood_through()"
704 * should also allow the usage that the given "inbr" parameter to be
705 * NULL. If we do so, corresponding AREA parameter should be referred
706 * by "lsa->area", instead of "inbr->oi->area".
707 */
708 switch (lsa->data->type) {
709 case OSPF_AS_EXTERNAL_LSA: /* Type-5 */
710 case OSPF_OPAQUE_AS_LSA:
711 lsa_ack_flag = ospf_flood_through_as(ospf, inbr, lsa);
712 break;
713 /* Type-7 Only received within NSSA, then flooded */
714 case OSPF_AS_NSSA_LSA:
715 /* Any P-bit was installed with the Type-7. */
716
717 if (IS_DEBUG_OSPF_NSSA)
718 zlog_debug(
719 "ospf_flood_through: LOCAL NSSA FLOOD of Type-7.");
720 /* Fallthrough */
721 default:
722 lsa_ack_flag = ospf_flood_through_area(lsa->area, inbr, lsa);
723 break;
724 }
725
726 return (lsa_ack_flag);
727 }
728
729
730 /* Management functions for neighbor's Link State Request list. */
731 void ospf_ls_request_add(struct ospf_neighbor *nbr, struct ospf_lsa *lsa)
732 {
733 /*
734 * We cannot make use of the newly introduced callback function
735 * "lsdb->new_lsa_hook" to replace debug output below, just because
736 * it seems no simple and smart way to pass neighbor information to
737 * the common function "ospf_lsdb_add()" -- endo.
738 */
739 if (IS_DEBUG_OSPF(lsa, LSA_FLOODING))
740 zlog_debug("RqstL(%lu)++, NBR(%s(%s)), LSA[%s]",
741 ospf_ls_request_count(nbr),
742 inet_ntoa(nbr->router_id),
743 ospf_get_name(nbr->oi->ospf), dump_lsa_key(lsa));
744
745 ospf_lsdb_add(&nbr->ls_req, lsa);
746 }
747
748 unsigned long ospf_ls_request_count(struct ospf_neighbor *nbr)
749 {
750 return ospf_lsdb_count_all(&nbr->ls_req);
751 }
752
753 int ospf_ls_request_isempty(struct ospf_neighbor *nbr)
754 {
755 return ospf_lsdb_isempty(&nbr->ls_req);
756 }
757
758 /* Remove LSA from neighbor's ls-request list. */
759 void ospf_ls_request_delete(struct ospf_neighbor *nbr, struct ospf_lsa *lsa)
760 {
761 if (nbr->ls_req_last == lsa) {
762 ospf_lsa_unlock(&nbr->ls_req_last);
763 nbr->ls_req_last = NULL;
764 }
765
766 if (IS_DEBUG_OSPF(lsa, LSA_FLOODING)) /* -- endo. */
767 zlog_debug("RqstL(%lu)--, NBR(%s(%s)), LSA[%s]",
768 ospf_ls_request_count(nbr),
769 inet_ntoa(nbr->router_id),
770 ospf_get_name(nbr->oi->ospf), dump_lsa_key(lsa));
771
772 ospf_lsdb_delete(&nbr->ls_req, lsa);
773 }
774
775 /* Remove all LSA from neighbor's ls-requenst list. */
776 void ospf_ls_request_delete_all(struct ospf_neighbor *nbr)
777 {
778 ospf_lsa_unlock(&nbr->ls_req_last);
779 nbr->ls_req_last = NULL;
780 ospf_lsdb_delete_all(&nbr->ls_req);
781 }
782
783 /* Lookup LSA from neighbor's ls-request list. */
784 struct ospf_lsa *ospf_ls_request_lookup(struct ospf_neighbor *nbr,
785 struct ospf_lsa *lsa)
786 {
787 return ospf_lsdb_lookup(&nbr->ls_req, lsa);
788 }
789
790 struct ospf_lsa *ospf_ls_request_new(struct lsa_header *lsah)
791 {
792 struct ospf_lsa *new;
793
794 new = ospf_lsa_new_and_data(OSPF_LSA_HEADER_SIZE);
795 memcpy(new->data, lsah, OSPF_LSA_HEADER_SIZE);
796
797 return new;
798 }
799
800
801 /* Management functions for neighbor's ls-retransmit list. */
802 unsigned long ospf_ls_retransmit_count(struct ospf_neighbor *nbr)
803 {
804 return ospf_lsdb_count_all(&nbr->ls_rxmt);
805 }
806
807 unsigned long ospf_ls_retransmit_count_self(struct ospf_neighbor *nbr,
808 int lsa_type)
809 {
810 return ospf_lsdb_count_self(&nbr->ls_rxmt, lsa_type);
811 }
812
813 int ospf_ls_retransmit_isempty(struct ospf_neighbor *nbr)
814 {
815 return ospf_lsdb_isempty(&nbr->ls_rxmt);
816 }
817
818 /* Add LSA to be retransmitted to neighbor's ls-retransmit list. */
819 void ospf_ls_retransmit_add(struct ospf_neighbor *nbr, struct ospf_lsa *lsa)
820 {
821 struct ospf_lsa *old;
822
823 old = ospf_ls_retransmit_lookup(nbr, lsa);
824
825 if (ospf_lsa_more_recent(old, lsa) < 0) {
826 if (old) {
827 old->retransmit_counter--;
828 if (IS_DEBUG_OSPF(lsa, LSA_FLOODING))
829 zlog_debug("RXmtL(%lu)--, NBR(%s(%s)), LSA[%s]",
830 ospf_ls_retransmit_count(nbr),
831 inet_ntoa(nbr->router_id),
832 ospf_get_name(nbr->oi->ospf),
833 dump_lsa_key(old));
834 ospf_lsdb_delete(&nbr->ls_rxmt, old);
835 }
836 lsa->retransmit_counter++;
837 /*
838 * We cannot make use of the newly introduced callback function
839 * "lsdb->new_lsa_hook" to replace debug output below, just
840 * because
841 * it seems no simple and smart way to pass neighbor information
842 * to
843 * the common function "ospf_lsdb_add()" -- endo.
844 */
845 if (IS_DEBUG_OSPF(lsa, LSA_FLOODING))
846 zlog_debug("RXmtL(%lu)++, NBR(%s(%s)), LSA[%s]",
847 ospf_ls_retransmit_count(nbr),
848 inet_ntoa(nbr->router_id),
849 ospf_get_name(nbr->oi->ospf),
850 dump_lsa_key(lsa));
851 ospf_lsdb_add(&nbr->ls_rxmt, lsa);
852 }
853 }
854
855 /* Remove LSA from neibghbor's ls-retransmit list. */
856 void ospf_ls_retransmit_delete(struct ospf_neighbor *nbr, struct ospf_lsa *lsa)
857 {
858 if (ospf_ls_retransmit_lookup(nbr, lsa)) {
859 lsa->retransmit_counter--;
860 if (IS_DEBUG_OSPF(lsa, LSA_FLOODING)) /* -- endo. */
861 zlog_debug("RXmtL(%lu)--, NBR(%s(%s)), LSA[%s]",
862 ospf_ls_retransmit_count(nbr),
863 inet_ntoa(nbr->router_id),
864 ospf_get_name(nbr->oi->ospf),
865 dump_lsa_key(lsa));
866 ospf_lsdb_delete(&nbr->ls_rxmt, lsa);
867 }
868 }
869
870 /* Clear neighbor's ls-retransmit list. */
871 void ospf_ls_retransmit_clear(struct ospf_neighbor *nbr)
872 {
873 struct ospf_lsdb *lsdb;
874 int i;
875
876 lsdb = &nbr->ls_rxmt;
877
878 for (i = OSPF_MIN_LSA; i < OSPF_MAX_LSA; i++) {
879 struct route_table *table = lsdb->type[i].db;
880 struct route_node *rn;
881 struct ospf_lsa *lsa;
882
883 for (rn = route_top(table); rn; rn = route_next(rn))
884 if ((lsa = rn->info) != NULL)
885 ospf_ls_retransmit_delete(nbr, lsa);
886 }
887
888 ospf_lsa_unlock(&nbr->ls_req_last);
889 nbr->ls_req_last = NULL;
890 }
891
892 /* Lookup LSA from neighbor's ls-retransmit list. */
893 struct ospf_lsa *ospf_ls_retransmit_lookup(struct ospf_neighbor *nbr,
894 struct ospf_lsa *lsa)
895 {
896 return ospf_lsdb_lookup(&nbr->ls_rxmt, lsa);
897 }
898
899 static void ospf_ls_retransmit_delete_nbr_if(struct ospf_interface *oi,
900 struct ospf_lsa *lsa)
901 {
902 struct route_node *rn;
903 struct ospf_neighbor *nbr;
904 struct ospf_lsa *lsr;
905
906 if (ospf_if_is_enable(oi))
907 for (rn = route_top(oi->nbrs); rn; rn = route_next(rn))
908 /* If LSA find in LS-retransmit list, then remove it. */
909 if ((nbr = rn->info) != NULL) {
910 lsr = ospf_ls_retransmit_lookup(nbr, lsa);
911
912 /* If LSA find in ls-retransmit list, remove it.
913 */
914 if (lsr != NULL
915 && lsr->data->ls_seqnum
916 == lsa->data->ls_seqnum)
917 ospf_ls_retransmit_delete(nbr, lsr);
918 }
919 }
920
921 void ospf_ls_retransmit_delete_nbr_area(struct ospf_area *area,
922 struct ospf_lsa *lsa)
923 {
924 struct listnode *node, *nnode;
925 struct ospf_interface *oi;
926
927 for (ALL_LIST_ELEMENTS(area->oiflist, node, nnode, oi))
928 ospf_ls_retransmit_delete_nbr_if(oi, lsa);
929 }
930
931 void ospf_ls_retransmit_delete_nbr_as(struct ospf *ospf, struct ospf_lsa *lsa)
932 {
933 struct listnode *node, *nnode;
934 struct ospf_interface *oi;
935
936 for (ALL_LIST_ELEMENTS(ospf->oiflist, node, nnode, oi))
937 ospf_ls_retransmit_delete_nbr_if(oi, lsa);
938 }
939
940
941 /* Sets ls_age to MaxAge and floods throu the area.
942 When we implement ASE routing, there will be anothe function
943 flushing an LSA from the whole domain. */
944 void ospf_lsa_flush_area(struct ospf_lsa *lsa, struct ospf_area *area)
945 {
946 /* Reset the lsa origination time such that it gives
947 more time for the ACK to be received and avoid
948 retransmissions */
949 lsa->data->ls_age = htons(OSPF_LSA_MAXAGE);
950 if (IS_DEBUG_OSPF_EVENT)
951 zlog_debug("%s: MAXAGE set to LSA %s", __PRETTY_FUNCTION__,
952 inet_ntoa(lsa->data->id));
953 monotime(&lsa->tv_recv);
954 lsa->tv_orig = lsa->tv_recv;
955 ospf_flood_through_area(area, NULL, lsa);
956 ospf_lsa_maxage(area->ospf, lsa);
957 }
958
959 void ospf_lsa_flush_as(struct ospf *ospf, struct ospf_lsa *lsa)
960 {
961 /* Reset the lsa origination time such that it gives
962 more time for the ACK to be received and avoid
963 retransmissions */
964 lsa->data->ls_age = htons(OSPF_LSA_MAXAGE);
965 monotime(&lsa->tv_recv);
966 lsa->tv_orig = lsa->tv_recv;
967 ospf_flood_through_as(ospf, NULL, lsa);
968 ospf_lsa_maxage(ospf, lsa);
969 }
970
971 void ospf_lsa_flush(struct ospf *ospf, struct ospf_lsa *lsa)
972 {
973 lsa->data->ls_age = htons(OSPF_LSA_MAXAGE);
974
975 switch (lsa->data->type) {
976 case OSPF_ROUTER_LSA:
977 case OSPF_NETWORK_LSA:
978 case OSPF_SUMMARY_LSA:
979 case OSPF_ASBR_SUMMARY_LSA:
980 case OSPF_AS_NSSA_LSA:
981 case OSPF_OPAQUE_LINK_LSA:
982 case OSPF_OPAQUE_AREA_LSA:
983 ospf_lsa_flush_area(lsa, lsa->area);
984 break;
985 case OSPF_AS_EXTERNAL_LSA:
986 case OSPF_OPAQUE_AS_LSA:
987 ospf_lsa_flush_as(ospf, lsa);
988 break;
989 default:
990 zlog_info("%s: Unknown LSA type %u", __func__, lsa->data->type);
991 break;
992 }
993 }