]> git.proxmox.com Git - mirror_frr.git/blob - ospfd/ospf_flood.c
Merge pull request #2602 from pacovn/PVS-Studio_element_overflow
[mirror_frr.git] / ospfd / ospf_flood.c
1 /*
2 * OSPF Flooding -- RFC2328 Section 13.
3 * Copyright (C) 1999, 2000 Toshiaki Takada
4 *
5 * This file is part of GNU Zebra.
6 *
7 * GNU Zebra is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published
9 * by the Free Software Foundation; either version 2, or (at your
10 * option) any later version.
11 *
12 * GNU Zebra is distributed in the hope that it will be useful, but
13 * WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * General Public License for more details.
16 *
17 * You should have received a copy of the GNU General Public License along
18 * with this program; see the file COPYING; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
20 */
21
22 #include <zebra.h>
23
24 #include "monotime.h"
25 #include "linklist.h"
26 #include "prefix.h"
27 #include "if.h"
28 #include "command.h"
29 #include "table.h"
30 #include "thread.h"
31 #include "memory.h"
32 #include "log.h"
33 #include "zclient.h"
34
35 #include "ospfd/ospfd.h"
36 #include "ospfd/ospf_interface.h"
37 #include "ospfd/ospf_ism.h"
38 #include "ospfd/ospf_asbr.h"
39 #include "ospfd/ospf_lsa.h"
40 #include "ospfd/ospf_lsdb.h"
41 #include "ospfd/ospf_neighbor.h"
42 #include "ospfd/ospf_nsm.h"
43 #include "ospfd/ospf_spf.h"
44 #include "ospfd/ospf_flood.h"
45 #include "ospfd/ospf_packet.h"
46 #include "ospfd/ospf_abr.h"
47 #include "ospfd/ospf_route.h"
48 #include "ospfd/ospf_zebra.h"
49 #include "ospfd/ospf_dump.h"
50
51 extern struct zclient *zclient;
52
53 /* Do the LSA acking specified in table 19, Section 13.5, row 2
54 * This get called from ospf_flood_out_interface. Declared inline
55 * for speed. */
56 static void ospf_flood_delayed_lsa_ack(struct ospf_neighbor *inbr,
57 struct ospf_lsa *lsa)
58 {
59 /* LSA is more recent than database copy, but was not
60 flooded back out receiving interface. Delayed
61 acknowledgment sent. If interface is in Backup state
62 delayed acknowledgment sent only if advertisement
63 received from Designated Router, otherwise do nothing See
64 RFC 2328 Section 13.5 */
65
66 /* Whether LSA is more recent or not, and whether this is in
67 response to the LSA being sent out recieving interface has been
68 worked out previously */
69
70 /* Deal with router as BDR */
71 if (inbr->oi->state == ISM_Backup && !NBR_IS_DR(inbr))
72 return;
73
74 /* Schedule a delayed LSA Ack to be sent */
75 listnode_add(inbr->oi->ls_ack,
76 ospf_lsa_lock(lsa)); /* delayed LSA Ack */
77 }
78
79 /* Check LSA is related to external info. */
80 struct external_info *ospf_external_info_check(struct ospf *ospf,
81 struct ospf_lsa *lsa)
82 {
83 struct as_external_lsa *al;
84 struct prefix_ipv4 p;
85 struct route_node *rn;
86 int type;
87
88 al = (struct as_external_lsa *)lsa->data;
89
90 p.family = AF_INET;
91 p.prefix = lsa->data->id;
92 p.prefixlen = ip_masklen(al->mask);
93
94 for (type = 0; type < ZEBRA_ROUTE_MAX; type++) {
95 int redist_on = 0;
96
97 redist_on =
98 is_prefix_default(&p)
99 ? vrf_bitmap_check(zclient->default_information,
100 ospf->vrf_id)
101 : (zclient->mi_redist[AFI_IP][type].enabled
102 || vrf_bitmap_check(
103 zclient->redist[AFI_IP][type],
104 ospf->vrf_id));
105 // Pending: check for MI above.
106 if (redist_on) {
107 struct list *ext_list;
108 struct listnode *node;
109 struct ospf_external *ext;
110
111 ext_list = ospf->external[type];
112 if (!ext_list)
113 continue;
114
115 for (ALL_LIST_ELEMENTS_RO(ext_list, node, ext)) {
116 rn = NULL;
117 if (ext->external_info)
118 rn = route_node_lookup(
119 ext->external_info,
120 (struct prefix *)&p);
121 if (rn) {
122 route_unlock_node(rn);
123 if (rn->info != NULL)
124 return (struct external_info *)
125 rn->info;
126 }
127 }
128 }
129 }
130
131 return NULL;
132 }
133
134 static void ospf_process_self_originated_lsa(struct ospf *ospf,
135 struct ospf_lsa *new,
136 struct ospf_area *area)
137 {
138 struct ospf_interface *oi;
139 struct external_info *ei;
140 struct listnode *node;
141
142 if (IS_DEBUG_OSPF_EVENT)
143 zlog_debug(
144 "LSA[Type%d:%s]: Process self-originated LSA seq 0x%x",
145 new->data->type, inet_ntoa(new->data->id),
146 ntohl(new->data->ls_seqnum));
147
148 /* If we're here, we installed a self-originated LSA that we received
149 from a neighbor, i.e. it's more recent. We must see whether we want
150 to originate it.
151 If yes, we should use this LSA's sequence number and reoriginate
152 a new instance.
153 if not --- we must flush this LSA from the domain. */
154 switch (new->data->type) {
155 case OSPF_ROUTER_LSA:
156 /* Originate a new instance and schedule flooding */
157 if (area->router_lsa_self)
158 area->router_lsa_self->data->ls_seqnum =
159 new->data->ls_seqnum;
160 ospf_router_lsa_update_area(area);
161 return;
162 case OSPF_NETWORK_LSA:
163 case OSPF_OPAQUE_LINK_LSA:
164 /* We must find the interface the LSA could belong to.
165 If the interface is no more a broadcast type or we are no
166 more
167 the DR, we flush the LSA otherwise -- create the new instance
168 and
169 schedule flooding. */
170
171 /* Look through all interfaces, not just area, since interface
172 could be moved from one area to another. */
173 for (ALL_LIST_ELEMENTS_RO(ospf->oiflist, node, oi))
174 /* These are sanity check. */
175 if (IPV4_ADDR_SAME(&oi->address->u.prefix4,
176 &new->data->id)) {
177 if (oi->area != area
178 || oi->type != OSPF_IFTYPE_BROADCAST
179 || !IPV4_ADDR_SAME(&oi->address->u.prefix4,
180 &DR(oi))) {
181 ospf_schedule_lsa_flush_area(area, new);
182 return;
183 }
184
185 if (new->data->type == OSPF_OPAQUE_LINK_LSA) {
186 ospf_opaque_lsa_refresh(new);
187 return;
188 }
189
190 if (oi->network_lsa_self)
191 oi->network_lsa_self->data->ls_seqnum =
192 new->data->ls_seqnum;
193 /* Schedule network-LSA origination. */
194 ospf_network_lsa_update(oi);
195 return;
196 }
197 break;
198 case OSPF_SUMMARY_LSA:
199 case OSPF_ASBR_SUMMARY_LSA:
200 ospf_schedule_abr_task(ospf);
201 break;
202 case OSPF_AS_EXTERNAL_LSA:
203 case OSPF_AS_NSSA_LSA:
204 if ((new->data->type == OSPF_AS_EXTERNAL_LSA)
205 && CHECK_FLAG(new->flags, OSPF_LSA_LOCAL_XLT)) {
206 ospf_translated_nssa_refresh(ospf, NULL, new);
207 return;
208 }
209 ei = ospf_external_info_check(ospf, new);
210 if (ei)
211 ospf_external_lsa_refresh(ospf, new, ei,
212 LSA_REFRESH_FORCE);
213 else
214 ospf_lsa_flush_as(ospf, new);
215 break;
216 case OSPF_OPAQUE_AREA_LSA:
217 ospf_opaque_lsa_refresh(new);
218 break;
219 case OSPF_OPAQUE_AS_LSA:
220 ospf_opaque_lsa_refresh(new);
221 /* Reconsideration may needed. */ /* XXX */
222 break;
223 default:
224 break;
225 }
226 }
227
228 /* OSPF LSA flooding -- RFC2328 Section 13.(5). */
229
230 /* Now Updated for NSSA operation, as follows:
231
232
233 Type-5's have no change. Blocked to STUB or NSSA.
234
235 Type-7's can be received, and if a DR
236 they will also flood the local NSSA Area as Type-7's
237
238 If a Self-Originated LSA (now an ASBR),
239 The LSDB will be updated as Type-5's, (for continual re-fresh)
240
241 If an NSSA-IR it is installed/flooded as Type-7, P-bit on.
242 if an NSSA-ABR it is installed/flooded as Type-7, P-bit off.
243
244 Later, during the ABR TASK, if the ABR is the Elected NSSA
245 translator, then All Type-7s (with P-bit ON) are Translated to
246 Type-5's and flooded to all non-NSSA/STUB areas.
247
248 During ASE Calculations,
249 non-ABRs calculate external routes from Type-7's
250 ABRs calculate external routes from Type-5's and non-self Type-7s
251 */
252 int ospf_flood(struct ospf *ospf, struct ospf_neighbor *nbr,
253 struct ospf_lsa *current, struct ospf_lsa *new)
254 {
255 struct ospf_interface *oi;
256 int lsa_ack_flag;
257
258 /* Type-7 LSA's will be flooded throughout their native NSSA area,
259 but will also be flooded as Type-5's into ABR capable links. */
260
261 if (IS_DEBUG_OSPF_EVENT)
262 zlog_debug(
263 "LSA[Flooding]: start, NBR %s (%s), cur(%p), New-LSA[%s]",
264 inet_ntoa(nbr->router_id),
265 lookup_msg(ospf_nsm_state_msg, nbr->state, NULL),
266 (void *)current, dump_lsa_key(new));
267
268 oi = nbr->oi;
269
270 /* If there is already a database copy, and if the
271 database copy was received via flooding and installed less
272 than MinLSArrival seconds ago, discard the new LSA
273 (without acknowledging it). */
274 if (current != NULL) /* -- endo. */
275 {
276 if (IS_LSA_SELF(current)
277 && (ntohs(current->data->ls_age) == 0
278 && ntohl(current->data->ls_seqnum)
279 == OSPF_INITIAL_SEQUENCE_NUMBER)) {
280 if (IS_DEBUG_OSPF_EVENT)
281 zlog_debug(
282 "LSA[Flooding]: Got a self-originated LSA, "
283 "while local one is initial instance.");
284 ; /* Accept this LSA for quick LSDB resynchronization.
285 */
286 } else if (monotime_since(&current->tv_recv, NULL)
287 < ospf->min_ls_arrival * 1000LL) {
288 if (IS_DEBUG_OSPF_EVENT)
289 zlog_debug(
290 "LSA[Flooding]: LSA is received recently.");
291 return -1;
292 }
293 }
294
295 /* Flood the new LSA out some subset of the router's interfaces.
296 In some cases (e.g., the state of the receiving interface is
297 DR and the LSA was received from a router other than the
298 Backup DR) the LSA will be flooded back out the receiving
299 interface. */
300 lsa_ack_flag = ospf_flood_through(ospf, nbr, new);
301
302 /* Remove the current database copy from all neighbors' Link state
303 retransmission lists. AS_EXTERNAL and AS_EXTERNAL_OPAQUE does
304 ^^^^^^^^^^^^^^^^^^^^^^^
305 not have area ID.
306 All other (even NSSA's) do have area ID. */
307 if (current) {
308 switch (current->data->type) {
309 case OSPF_AS_EXTERNAL_LSA:
310 case OSPF_OPAQUE_AS_LSA:
311 ospf_ls_retransmit_delete_nbr_as(ospf, current);
312 break;
313 default:
314 ospf_ls_retransmit_delete_nbr_area(nbr->oi->area,
315 current);
316 break;
317 }
318 }
319
320 /* Do some internal house keeping that is needed here */
321 SET_FLAG(new->flags, OSPF_LSA_RECEIVED);
322 (void)ospf_lsa_is_self_originated(ospf, new); /* Let it set the flag */
323
324 /* Install the new LSA in the link state database
325 (replacing the current database copy). This may cause the
326 routing table calculation to be scheduled. In addition,
327 timestamp the new LSA with the current time. The flooding
328 procedure cannot overwrite the newly installed LSA until
329 MinLSArrival seconds have elapsed. */
330
331 if (!(new = ospf_lsa_install(ospf, nbr->oi, new)))
332 return -1; /* unknown LSA type or any other error condition */
333
334 /* Acknowledge the receipt of the LSA by sending a Link State
335 Acknowledgment packet back out the receiving interface. */
336 if (lsa_ack_flag)
337 ospf_flood_delayed_lsa_ack(nbr, new);
338
339 /* If this new LSA indicates that it was originated by the
340 receiving router itself, the router must take special action,
341 either updating the LSA or in some cases flushing it from
342 the routing domain. */
343 if (ospf_lsa_is_self_originated(ospf, new))
344 ospf_process_self_originated_lsa(ospf, new, oi->area);
345 else
346 /* Update statistics value for OSPF-MIB. */
347 ospf->rx_lsa_count++;
348
349 return 0;
350 }
351
352 /* OSPF LSA flooding -- RFC2328 Section 13.3. */
353 static int ospf_flood_through_interface(struct ospf_interface *oi,
354 struct ospf_neighbor *inbr,
355 struct ospf_lsa *lsa)
356 {
357 struct ospf_neighbor *onbr;
358 struct route_node *rn;
359 int retx_flag;
360
361 if (IS_DEBUG_OSPF_EVENT)
362 zlog_debug(
363 "ospf_flood_through_interface(): "
364 "considering int %s, INBR(%s), LSA[%s] AGE %u",
365 IF_NAME(oi), inbr ? inet_ntoa(inbr->router_id) : "NULL",
366 dump_lsa_key(lsa), ntohs(lsa->data->ls_age));
367
368 if (!ospf_if_is_enable(oi))
369 return 0;
370
371 /* Remember if new LSA is aded to a retransmit list. */
372 retx_flag = 0;
373
374 /* Each of the neighbors attached to this interface are examined,
375 to determine whether they must receive the new LSA. The following
376 steps are executed for each neighbor: */
377 for (rn = route_top(oi->nbrs); rn; rn = route_next(rn)) {
378 struct ospf_lsa *ls_req;
379
380 if (rn->info == NULL)
381 continue;
382
383 onbr = rn->info;
384 if (IS_DEBUG_OSPF_EVENT)
385 zlog_debug(
386 "ospf_flood_through_interface(): considering nbr %s (%s)",
387 inet_ntoa(onbr->router_id),
388 lookup_msg(ospf_nsm_state_msg, onbr->state,
389 NULL));
390
391 /* If the neighbor is in a lesser state than Exchange, it
392 does not participate in flooding, and the next neighbor
393 should be examined. */
394 if (onbr->state < NSM_Exchange)
395 continue;
396
397 /* If the adjacency is not yet full (neighbor state is
398 Exchange or Loading), examine the Link state request
399 list associated with this adjacency. If there is an
400 instance of the new LSA on the list, it indicates that
401 the neighboring router has an instance of the LSA
402 already. Compare the new LSA to the neighbor's copy: */
403 if (onbr->state < NSM_Full) {
404 if (IS_DEBUG_OSPF_EVENT)
405 zlog_debug(
406 "ospf_flood_through_interface(): nbr adj is not Full");
407 ls_req = ospf_ls_request_lookup(onbr, lsa);
408 if (ls_req != NULL) {
409 int ret;
410
411 ret = ospf_lsa_more_recent(ls_req, lsa);
412 /* The new LSA is less recent. */
413 if (ret > 0)
414 continue;
415 /* The two copies are the same instance, then
416 delete
417 the LSA from the Link state request list. */
418 else if (ret == 0) {
419 ospf_ls_request_delete(onbr, ls_req);
420 ospf_check_nbr_loading(onbr);
421 continue;
422 }
423 /* The new LSA is more recent. Delete the LSA
424 from the Link state request list. */
425 else {
426 ospf_ls_request_delete(onbr, ls_req);
427 ospf_check_nbr_loading(onbr);
428 }
429 }
430 }
431
432 if (IS_OPAQUE_LSA(lsa->data->type)) {
433 if (!CHECK_FLAG(onbr->options, OSPF_OPTION_O)) {
434 if (IS_DEBUG_OSPF(lsa, LSA_FLOODING))
435 zlog_debug(
436 "Skip this neighbor: Not Opaque-capable.");
437 continue;
438 }
439 }
440
441 /* If the new LSA was received from this neighbor,
442 examine the next neighbor. */
443 #ifdef ORIGINAL_CODING
444 if (inbr)
445 if (IPV4_ADDR_SAME(&inbr->router_id, &onbr->router_id))
446 continue;
447 #else /* ORIGINAL_CODING */
448 if (inbr) {
449 /*
450 * Triggered by LSUpd message parser "ospf_ls_upd ()".
451 * E.g., all LSAs handling here is received via network.
452 */
453 if (IPV4_ADDR_SAME(&inbr->router_id,
454 &onbr->router_id)) {
455 if (IS_DEBUG_OSPF(lsa, LSA_FLOODING))
456 zlog_debug(
457 "Skip this neighbor: inbr == onbr");
458 continue;
459 }
460 } else {
461 /*
462 * Triggered by MaxAge remover, so far.
463 * NULL "inbr" means flooding starts from this node.
464 */
465 if (IPV4_ADDR_SAME(&lsa->data->adv_router,
466 &onbr->router_id)) {
467 if (IS_DEBUG_OSPF(lsa, LSA_FLOODING))
468 zlog_debug(
469 "Skip this neighbor: lsah->adv_router == onbr");
470 continue;
471 }
472 }
473 #endif /* ORIGINAL_CODING */
474
475 /* Add the new LSA to the Link state retransmission list
476 for the adjacency. The LSA will be retransmitted
477 at intervals until an acknowledgment is seen from
478 the neighbor. */
479 ospf_ls_retransmit_add(onbr, lsa);
480 retx_flag = 1;
481 }
482
483 /* If in the previous step, the LSA was NOT added to any of
484 the Link state retransmission lists, there is no need to
485 flood the LSA out the interface. */
486 if (retx_flag == 0) {
487 return (inbr && inbr->oi == oi);
488 }
489
490 /* if we've received the lsa on this interface we need to perform
491 additional checking */
492 if (inbr && (inbr->oi == oi)) {
493 /* If the new LSA was received on this interface, and it was
494 received from either the Designated Router or the Backup
495 Designated Router, chances are that all the neighbors have
496 received the LSA already. */
497 if (NBR_IS_DR(inbr) || NBR_IS_BDR(inbr)) {
498 if (IS_DEBUG_OSPF_NSSA)
499 zlog_debug(
500 "ospf_flood_through_interface(): "
501 "DR/BDR NOT SEND to int %s",
502 IF_NAME(oi));
503 return 1;
504 }
505
506 /* If the new LSA was received on this interface, and the
507 interface state is Backup, examine the next interface. The
508 Designated Router will do the flooding on this interface.
509 However, if the Designated Router fails the router will
510 end up retransmitting the updates. */
511
512 if (oi->state == ISM_Backup) {
513 if (IS_DEBUG_OSPF_NSSA)
514 zlog_debug(
515 "ospf_flood_through_interface(): "
516 "ISM_Backup NOT SEND to int %s",
517 IF_NAME(oi));
518 return 1;
519 }
520 }
521
522 /* The LSA must be flooded out the interface. Send a Link State
523 Update packet (including the new LSA as contents) out the
524 interface. The LSA's LS age must be incremented by InfTransDelay
525 (which must be > 0) when it is copied into the outgoing Link
526 State Update packet (until the LS age field reaches the maximum
527 value of MaxAge). */
528 /* XXX HASSO: Is this IS_DEBUG_OSPF_NSSA really correct? */
529 if (IS_DEBUG_OSPF_NSSA)
530 zlog_debug(
531 "ospf_flood_through_interface(): "
532 "DR/BDR sending upd to int %s",
533 IF_NAME(oi));
534
535 /* RFC2328 Section 13.3
536 On non-broadcast networks, separate Link State Update
537 packets must be sent, as unicasts, to each adjacent neighbor
538 (i.e., those in state Exchange or greater). The destination
539 IP addresses for these packets are the neighbors' IP
540 addresses. */
541 if (oi->type == OSPF_IFTYPE_NBMA) {
542 struct route_node *rn;
543 struct ospf_neighbor *nbr;
544
545 for (rn = route_top(oi->nbrs); rn; rn = route_next(rn))
546 if ((nbr = rn->info) != NULL)
547 if (nbr != oi->nbr_self
548 && nbr->state >= NSM_Exchange)
549 ospf_ls_upd_send_lsa(
550 nbr, lsa,
551 OSPF_SEND_PACKET_DIRECT);
552 } else
553 ospf_ls_upd_send_lsa(oi->nbr_self, lsa,
554 OSPF_SEND_PACKET_INDIRECT);
555
556 return 0;
557 }
558
559 int ospf_flood_through_area(struct ospf_area *area, struct ospf_neighbor *inbr,
560 struct ospf_lsa *lsa)
561 {
562 struct listnode *node, *nnode;
563 struct ospf_interface *oi;
564 int lsa_ack_flag = 0;
565
566 assert(area);
567 /* All other types are specific to a single area (Area A). The
568 eligible interfaces are all those interfaces attaching to the
569 Area A. If Area A is the backbone, this includes all the virtual
570 links. */
571 for (ALL_LIST_ELEMENTS(area->oiflist, node, nnode, oi)) {
572 if (area->area_id.s_addr != OSPF_AREA_BACKBONE
573 && oi->type == OSPF_IFTYPE_VIRTUALLINK)
574 continue;
575
576 if ((lsa->data->type == OSPF_OPAQUE_LINK_LSA)
577 && (lsa->oi != oi)) {
578 /*
579 * Link local scoped Opaque-LSA should only be flooded
580 * for the link on which the LSA has received.
581 */
582 if (IS_DEBUG_OSPF(lsa, LSA_FLOODING))
583 zlog_debug(
584 "Type-9 Opaque-LSA: lsa->oi(%p) != oi(%p)",
585 (void *)lsa->oi, (void *)oi);
586 continue;
587 }
588
589 if (ospf_flood_through_interface(oi, inbr, lsa))
590 lsa_ack_flag = 1;
591 }
592
593 return (lsa_ack_flag);
594 }
595
596 int ospf_flood_through_as(struct ospf *ospf, struct ospf_neighbor *inbr,
597 struct ospf_lsa *lsa)
598 {
599 struct listnode *node;
600 struct ospf_area *area;
601 int lsa_ack_flag;
602
603 lsa_ack_flag = 0;
604
605 /* The incoming LSA is type 5 or type 7 (AS-EXTERNAL or AS-NSSA )
606
607 Divert the Type-5 LSA's to all non-NSSA/STUB areas
608
609 Divert the Type-7 LSA's to all NSSA areas
610
611 AS-external-LSAs are flooded throughout the entire AS, with the
612 exception of stub areas (see Section 3.6). The eligible
613 interfaces are all the router's interfaces, excluding virtual
614 links and those interfaces attaching to stub areas. */
615
616 if (CHECK_FLAG(lsa->flags, OSPF_LSA_LOCAL_XLT)) /* Translated from 7 */
617 if (IS_DEBUG_OSPF_NSSA)
618 zlog_debug("Flood/AS: NSSA TRANSLATED LSA");
619
620 for (ALL_LIST_ELEMENTS_RO(ospf->areas, node, area)) {
621 int continue_flag = 0;
622 struct listnode *if_node;
623 struct ospf_interface *oi;
624
625 switch (area->external_routing) {
626 /* Don't send AS externals into stub areas. Various types
627 of support for partial stub areas can be implemented
628 here. NSSA's will receive Type-7's that have areas
629 matching the originl LSA. */
630 case OSPF_AREA_NSSA: /* Sending Type 5 or 7 into NSSA area */
631 /* Type-7, flood NSSA area */
632 if (lsa->data->type == OSPF_AS_NSSA_LSA
633 && area == lsa->area)
634 /* We will send it. */
635 continue_flag = 0;
636 else
637 continue_flag = 1; /* Skip this NSSA area for
638 Type-5's et al */
639 break;
640
641 case OSPF_AREA_TYPE_MAX:
642 case OSPF_AREA_STUB:
643 continue_flag = 1; /* Skip this area. */
644 break;
645
646 case OSPF_AREA_DEFAULT:
647 default:
648 /* No Type-7 into normal area */
649 if (lsa->data->type == OSPF_AS_NSSA_LSA)
650 continue_flag = 1; /* skip Type-7 */
651 else
652 continue_flag = 0; /* Do this area. */
653 break;
654 }
655
656 /* Do continue for above switch. Saves a big if then mess */
657 if (continue_flag)
658 continue; /* main for-loop */
659
660 /* send to every interface in this area */
661
662 for (ALL_LIST_ELEMENTS_RO(area->oiflist, if_node, oi)) {
663 /* Skip virtual links */
664 if (oi->type != OSPF_IFTYPE_VIRTUALLINK)
665 if (ospf_flood_through_interface(oi, inbr,
666 lsa)) /* lsa */
667 lsa_ack_flag = 1;
668 }
669 } /* main area for-loop */
670
671 return (lsa_ack_flag);
672 }
673
674 int ospf_flood_through(struct ospf *ospf, struct ospf_neighbor *inbr,
675 struct ospf_lsa *lsa)
676 {
677 int lsa_ack_flag = 0;
678
679 /* Type-7 LSA's for NSSA are flooded throughout the AS here, and
680 upon return are updated in the LSDB for Type-7's. Later,
681 re-fresh will re-send them (and also, if ABR, packet code will
682 translate to Type-5's)
683
684 As usual, Type-5 LSA's (if not DISCARDED because we are STUB or
685 NSSA) are flooded throughout the AS, and are updated in the
686 global table. */
687 #ifdef ORIGINAL_CODING
688 switch (lsa->data->type) {
689 case OSPF_ROUTER_LSA:
690 case OSPF_NETWORK_LSA:
691 case OSPF_SUMMARY_LSA:
692 case OSPF_ASBR_SUMMARY_LSA:
693 case OSPF_OPAQUE_LINK_LSA: /* ospf_flood_through_interface ? */
694 case OSPF_OPAQUE_AREA_LSA:
695 lsa_ack_flag =
696 ospf_flood_through_area(inbr->oi->area, inbr, lsa);
697 break;
698 case OSPF_AS_EXTERNAL_LSA: /* Type-5 */
699 case OSPF_OPAQUE_AS_LSA:
700 lsa_ack_flag = ospf_flood_through_as(ospf, inbr, lsa);
701 break;
702 /* Type-7 Only received within NSSA, then flooded */
703 case OSPF_AS_NSSA_LSA:
704 /* Any P-bit was installed with the Type-7. */
705 lsa_ack_flag =
706 ospf_flood_through_area(inbr->oi->area, inbr, lsa);
707
708 if (IS_DEBUG_OSPF_NSSA)
709 zlog_debug(
710 "ospf_flood_through: LOCAL NSSA FLOOD of Type-7.");
711 break;
712 default:
713 break;
714 }
715 #else /* ORIGINAL_CODING */
716 /*
717 * At the common sub-sub-function "ospf_flood_through_interface()",
718 * a parameter "inbr" will be used to distinguish the called context
719 * whether the given LSA was received from the neighbor, or the
720 * flooding for the LSA starts from this node (e.g. the LSA was self-
721 * originated, or the LSA is going to be flushed from routing domain).
722 *
723 * So, for consistency reasons, this function "ospf_flood_through()"
724 * should also allow the usage that the given "inbr" parameter to be
725 * NULL. If we do so, corresponding AREA parameter should be referred
726 * by "lsa->area", instead of "inbr->oi->area".
727 */
728 switch (lsa->data->type) {
729 case OSPF_AS_EXTERNAL_LSA: /* Type-5 */
730 case OSPF_OPAQUE_AS_LSA:
731 lsa_ack_flag = ospf_flood_through_as(ospf, inbr, lsa);
732 break;
733 /* Type-7 Only received within NSSA, then flooded */
734 case OSPF_AS_NSSA_LSA:
735 /* Any P-bit was installed with the Type-7. */
736
737 if (IS_DEBUG_OSPF_NSSA)
738 zlog_debug(
739 "ospf_flood_through: LOCAL NSSA FLOOD of Type-7.");
740 /* Fallthrough */
741 default:
742 lsa_ack_flag = ospf_flood_through_area(lsa->area, inbr, lsa);
743 break;
744 }
745 #endif /* ORIGINAL_CODING */
746
747 return (lsa_ack_flag);
748 }
749
750
751 /* Management functions for neighbor's Link State Request list. */
752 void ospf_ls_request_add(struct ospf_neighbor *nbr, struct ospf_lsa *lsa)
753 {
754 /*
755 * We cannot make use of the newly introduced callback function
756 * "lsdb->new_lsa_hook" to replace debug output below, just because
757 * it seems no simple and smart way to pass neighbor information to
758 * the common function "ospf_lsdb_add()" -- endo.
759 */
760 if (IS_DEBUG_OSPF(lsa, LSA_FLOODING))
761 zlog_debug("RqstL(%lu)++, NBR(%s), LSA[%s]",
762 ospf_ls_request_count(nbr),
763 inet_ntoa(nbr->router_id), dump_lsa_key(lsa));
764
765 ospf_lsdb_add(&nbr->ls_req, lsa);
766 }
767
768 unsigned long ospf_ls_request_count(struct ospf_neighbor *nbr)
769 {
770 return ospf_lsdb_count_all(&nbr->ls_req);
771 }
772
773 int ospf_ls_request_isempty(struct ospf_neighbor *nbr)
774 {
775 return ospf_lsdb_isempty(&nbr->ls_req);
776 }
777
778 /* Remove LSA from neighbor's ls-request list. */
779 void ospf_ls_request_delete(struct ospf_neighbor *nbr, struct ospf_lsa *lsa)
780 {
781 if (nbr->ls_req_last == lsa) {
782 ospf_lsa_unlock(&nbr->ls_req_last);
783 nbr->ls_req_last = NULL;
784 }
785
786 if (IS_DEBUG_OSPF(lsa, LSA_FLOODING)) /* -- endo. */
787 zlog_debug("RqstL(%lu)--, NBR(%s), LSA[%s]",
788 ospf_ls_request_count(nbr),
789 inet_ntoa(nbr->router_id), dump_lsa_key(lsa));
790
791 ospf_lsdb_delete(&nbr->ls_req, lsa);
792 }
793
794 /* Remove all LSA from neighbor's ls-requenst list. */
795 void ospf_ls_request_delete_all(struct ospf_neighbor *nbr)
796 {
797 ospf_lsa_unlock(&nbr->ls_req_last);
798 nbr->ls_req_last = NULL;
799 ospf_lsdb_delete_all(&nbr->ls_req);
800 }
801
802 /* Lookup LSA from neighbor's ls-request list. */
803 struct ospf_lsa *ospf_ls_request_lookup(struct ospf_neighbor *nbr,
804 struct ospf_lsa *lsa)
805 {
806 return ospf_lsdb_lookup(&nbr->ls_req, lsa);
807 }
808
809 struct ospf_lsa *ospf_ls_request_new(struct lsa_header *lsah)
810 {
811 struct ospf_lsa *new;
812
813 new = ospf_lsa_new();
814 new->data = ospf_lsa_data_new(OSPF_LSA_HEADER_SIZE);
815 memcpy(new->data, lsah, OSPF_LSA_HEADER_SIZE);
816
817 return new;
818 }
819
820
821 /* Management functions for neighbor's ls-retransmit list. */
822 unsigned long ospf_ls_retransmit_count(struct ospf_neighbor *nbr)
823 {
824 return ospf_lsdb_count_all(&nbr->ls_rxmt);
825 }
826
827 unsigned long ospf_ls_retransmit_count_self(struct ospf_neighbor *nbr,
828 int lsa_type)
829 {
830 return ospf_lsdb_count_self(&nbr->ls_rxmt, lsa_type);
831 }
832
833 int ospf_ls_retransmit_isempty(struct ospf_neighbor *nbr)
834 {
835 return ospf_lsdb_isempty(&nbr->ls_rxmt);
836 }
837
838 /* Add LSA to be retransmitted to neighbor's ls-retransmit list. */
839 void ospf_ls_retransmit_add(struct ospf_neighbor *nbr, struct ospf_lsa *lsa)
840 {
841 struct ospf_lsa *old;
842
843 old = ospf_ls_retransmit_lookup(nbr, lsa);
844
845 if (ospf_lsa_more_recent(old, lsa) < 0) {
846 if (old) {
847 old->retransmit_counter--;
848 ospf_lsdb_delete(&nbr->ls_rxmt, old);
849 }
850 lsa->retransmit_counter++;
851 /*
852 * We cannot make use of the newly introduced callback function
853 * "lsdb->new_lsa_hook" to replace debug output below, just
854 * because
855 * it seems no simple and smart way to pass neighbor information
856 * to
857 * the common function "ospf_lsdb_add()" -- endo.
858 */
859 if (IS_DEBUG_OSPF(lsa, LSA_FLOODING))
860 zlog_debug("RXmtL(%lu)++, NBR(%s), LSA[%s]",
861 ospf_ls_retransmit_count(nbr),
862 inet_ntoa(nbr->router_id),
863 dump_lsa_key(lsa));
864 ospf_lsdb_add(&nbr->ls_rxmt, lsa);
865 }
866 }
867
868 /* Remove LSA from neibghbor's ls-retransmit list. */
869 void ospf_ls_retransmit_delete(struct ospf_neighbor *nbr, struct ospf_lsa *lsa)
870 {
871 if (ospf_ls_retransmit_lookup(nbr, lsa)) {
872 lsa->retransmit_counter--;
873 if (IS_DEBUG_OSPF(lsa, LSA_FLOODING)) /* -- endo. */
874 zlog_debug("RXmtL(%lu)--, NBR(%s), LSA[%s]",
875 ospf_ls_retransmit_count(nbr),
876 inet_ntoa(nbr->router_id),
877 dump_lsa_key(lsa));
878 ospf_lsdb_delete(&nbr->ls_rxmt, lsa);
879 }
880 }
881
882 /* Clear neighbor's ls-retransmit list. */
883 void ospf_ls_retransmit_clear(struct ospf_neighbor *nbr)
884 {
885 struct ospf_lsdb *lsdb;
886 int i;
887
888 lsdb = &nbr->ls_rxmt;
889
890 for (i = OSPF_MIN_LSA; i < OSPF_MAX_LSA; i++) {
891 struct route_table *table = lsdb->type[i].db;
892 struct route_node *rn;
893 struct ospf_lsa *lsa;
894
895 for (rn = route_top(table); rn; rn = route_next(rn))
896 if ((lsa = rn->info) != NULL)
897 ospf_ls_retransmit_delete(nbr, lsa);
898 }
899
900 ospf_lsa_unlock(&nbr->ls_req_last);
901 nbr->ls_req_last = NULL;
902 }
903
904 /* Lookup LSA from neighbor's ls-retransmit list. */
905 struct ospf_lsa *ospf_ls_retransmit_lookup(struct ospf_neighbor *nbr,
906 struct ospf_lsa *lsa)
907 {
908 return ospf_lsdb_lookup(&nbr->ls_rxmt, lsa);
909 }
910
911 static void ospf_ls_retransmit_delete_nbr_if(struct ospf_interface *oi,
912 struct ospf_lsa *lsa)
913 {
914 struct route_node *rn;
915 struct ospf_neighbor *nbr;
916 struct ospf_lsa *lsr;
917
918 if (ospf_if_is_enable(oi))
919 for (rn = route_top(oi->nbrs); rn; rn = route_next(rn))
920 /* If LSA find in LS-retransmit list, then remove it. */
921 if ((nbr = rn->info) != NULL) {
922 lsr = ospf_ls_retransmit_lookup(nbr, lsa);
923
924 /* If LSA find in ls-retransmit list, remove it.
925 */
926 if (lsr != NULL
927 && lsr->data->ls_seqnum
928 == lsa->data->ls_seqnum)
929 ospf_ls_retransmit_delete(nbr, lsr);
930 }
931 }
932
933 void ospf_ls_retransmit_delete_nbr_area(struct ospf_area *area,
934 struct ospf_lsa *lsa)
935 {
936 struct listnode *node, *nnode;
937 struct ospf_interface *oi;
938
939 for (ALL_LIST_ELEMENTS(area->oiflist, node, nnode, oi))
940 ospf_ls_retransmit_delete_nbr_if(oi, lsa);
941 }
942
943 void ospf_ls_retransmit_delete_nbr_as(struct ospf *ospf, struct ospf_lsa *lsa)
944 {
945 struct listnode *node, *nnode;
946 struct ospf_interface *oi;
947
948 for (ALL_LIST_ELEMENTS(ospf->oiflist, node, nnode, oi))
949 ospf_ls_retransmit_delete_nbr_if(oi, lsa);
950 }
951
952
953 /* Sets ls_age to MaxAge and floods throu the area.
954 When we implement ASE routing, there will be anothe function
955 flushing an LSA from the whole domain. */
956 void ospf_lsa_flush_area(struct ospf_lsa *lsa, struct ospf_area *area)
957 {
958 /* Reset the lsa origination time such that it gives
959 more time for the ACK to be received and avoid
960 retransmissions */
961 lsa->data->ls_age = htons(OSPF_LSA_MAXAGE);
962 if (IS_DEBUG_OSPF_EVENT)
963 zlog_debug("%s: MAXAGE set to LSA %s", __PRETTY_FUNCTION__,
964 inet_ntoa(lsa->data->id));
965 monotime(&lsa->tv_recv);
966 lsa->tv_orig = lsa->tv_recv;
967 ospf_flood_through_area(area, NULL, lsa);
968 ospf_lsa_maxage(area->ospf, lsa);
969 }
970
971 void ospf_lsa_flush_as(struct ospf *ospf, struct ospf_lsa *lsa)
972 {
973 /* Reset the lsa origination time such that it gives
974 more time for the ACK to be received and avoid
975 retransmissions */
976 lsa->data->ls_age = htons(OSPF_LSA_MAXAGE);
977 monotime(&lsa->tv_recv);
978 lsa->tv_orig = lsa->tv_recv;
979 ospf_flood_through_as(ospf, NULL, lsa);
980 ospf_lsa_maxage(ospf, lsa);
981 }
982
983 void ospf_lsa_flush(struct ospf *ospf, struct ospf_lsa *lsa)
984 {
985 lsa->data->ls_age = htons(OSPF_LSA_MAXAGE);
986
987 switch (lsa->data->type) {
988 case OSPF_ROUTER_LSA:
989 case OSPF_NETWORK_LSA:
990 case OSPF_SUMMARY_LSA:
991 case OSPF_ASBR_SUMMARY_LSA:
992 case OSPF_AS_NSSA_LSA:
993 case OSPF_OPAQUE_LINK_LSA:
994 case OSPF_OPAQUE_AREA_LSA:
995 ospf_lsa_flush_area(lsa, lsa->area);
996 break;
997 case OSPF_AS_EXTERNAL_LSA:
998 case OSPF_OPAQUE_AS_LSA:
999 ospf_lsa_flush_as(ospf, lsa);
1000 break;
1001 default:
1002 zlog_info("%s: Unknown LSA type %u", __func__, lsa->data->type);
1003 break;
1004 }
1005 }