bird/proto/ospf/lsupd.c

720 lines
18 KiB
C
Raw Normal View History

2000-03-31 04:00:42 +08:00
/*
* BIRD -- OSPF
*
* (c) 2000--2004 Ondrej Filip <feela@network.cz>
2000-03-31 04:00:42 +08:00
*
* Can be freely distributed and used under the terms of the GNU GPL.
*/
#include "ospf.h"
2009-08-21 15:27:52 +08:00
struct ospf_lsupd_packet
{
struct ospf_packet ospf_packet;
u32 lsano; /* Number of LSA's */
};
/* Beware of unaligned access */
void ospf_dump_lsahdr(struct proto *p, struct ospf_lsa_header *lsa_n)
{
struct ospf_lsa_header lsa;
ntohlsah(lsa_n, &lsa);
log(L_TRACE "%s: LSA Id: %R, Rt: %R, Type: 0x%04x, Age: %u, Seqno: 0x%08x, Sum: 0x%04x",
2009-07-23 22:51:28 +08:00
p->name, lsa.id, lsa.rt, lsa.type, lsa.age, lsa.sn, lsa.checksum);
}
void ospf_dump_common(struct proto *p, struct ospf_packet *op)
{
log(L_TRACE "%s: length %d", p->name, ntohs(op->length));
2009-07-23 22:51:28 +08:00
log(L_TRACE "%s: router %R", p->name, ntohl(op->routerid));
}
static void ospf_dump_lsupd(struct proto *p, struct ospf_lsupd_packet *pkt)
{
struct ospf_packet *op = &pkt->ospf_packet;
ASSERT(op->type == LSUPD_P);
ospf_dump_common(p, op);
/* We know that ntohs(op->length) >= sizeof(struct ospf_lsa_header) */
u8 *pbuf= (u8 *) pkt;
unsigned int offset = sizeof(struct ospf_lsupd_packet);
unsigned int bound = ntohs(op->length) - sizeof(struct ospf_lsa_header);
unsigned int i, j;
j = ntohl(pkt->lsano);
for (i = 0; i < j; i++)
{
if ((offset > bound) || ((offset % 4) != 0))
{
log(L_TRACE "%s: LSA invalid", p->name);
return;
}
struct ospf_lsa_header *lsa = (void *) (pbuf + offset);
ospf_dump_lsahdr(p, lsa);
offset += ntohs(lsa->length);
}
}
2009-08-21 15:27:52 +08:00
#ifdef OSPFv2
int
ospf_lsa_flooding_allowed(struct ospf_lsa_header *lsa, u32 domain, struct ospf_iface *ifa)
{
if (lsa->type == LSA_T_EXT)
{
if (ifa->type == OSPF_IT_VLINK)
return 0;
if (ifa->oa->stub)
return 0;
return 1;
2009-08-21 15:27:52 +08:00
}
else
return ifa->oa->areaid == domain;
}
#else /* OSPFv3 */
2009-08-28 00:25:46 +08:00
static int
unknown_lsa_type(struct ospf_lsa_header *lsa)
{
switch (lsa->type)
{
case LSA_T_RT:
case LSA_T_NET:
case LSA_T_SUM_NET:
case LSA_T_SUM_RT:
case LSA_T_EXT:
case LSA_T_LINK:
case LSA_T_PREFIX:
return 0;
default:
return 1;
}
}
2009-08-21 15:27:52 +08:00
int
ospf_lsa_flooding_allowed(struct ospf_lsa_header *lsa, u32 domain, struct ospf_iface *ifa)
{
u32 scope = LSA_SCOPE(lsa);
/* 4.5.2 (Case 2) */
2009-08-28 00:25:46 +08:00
if (unknown_lsa_type(lsa) && !(lsa->type & LSA_UBIT))
2009-08-21 15:27:52 +08:00
scope = LSA_SCOPE_LINK;
switch (scope)
{
case LSA_SCOPE_LINK:
return ifa->iface->index == domain;
case LSA_SCOPE_AREA:
return ifa->oa->areaid == domain;
case LSA_SCOPE_AS:
if (ifa->type == OSPF_IT_VLINK)
return 0;
if (ifa->oa->stub)
return 0;
return 1;
default:
log(L_ERR "LSA with invalid scope");
return 0;
}
}
#endif
/**
* ospf_lsupd_flood - send received or generated lsa to the neighbors
2009-08-21 15:27:52 +08:00
* @po: OSPF protocol
* @n: neighbor than sent this lsa (or NULL if generated)
2004-06-04 22:03:30 +08:00
* @hn: LSA header followed by lsa body in network endianity (may be NULL)
* @hh: LSA header in host endianity (must be filled)
2009-08-21 15:27:52 +08:00
* @domain: domain of LSA (must be filled)
* @rtl: add this LSA into retransmission list
*
2009-08-21 15:27:52 +08:00
*
2004-06-04 22:03:30 +08:00
* return value - was the LSA flooded back?
*/
int
2009-08-21 15:27:52 +08:00
ospf_lsupd_flood(struct proto_ospf *po,
struct ospf_neighbor *n, struct ospf_lsa_header *hn,
struct ospf_lsa_header *hh, u32 domain, int rtl)
2000-04-05 08:51:25 +08:00
{
struct ospf_iface *ifa;
struct ospf_neighbor *nn;
struct top_hash_entry *en;
struct proto *p = &po->proto;
2004-06-04 22:03:30 +08:00
int ret, retval = 0;
2000-04-05 08:51:25 +08:00
/* pg 148 */
WALK_LIST(ifa, po->iface_list)
2000-04-05 08:51:25 +08:00
{
if (ifa->stub)
continue;
2009-08-21 15:27:52 +08:00
if (! ospf_lsa_flooding_allowed(hh, domain, ifa))
continue;
2009-07-23 22:51:28 +08:00
DBG("Wanted to flood LSA: Type: %u, ID: %R, RT: %R, SN: 0x%x, Age %u\n",
hh->type, hh->id, hh->rt, hh->sn, hh->age);
ret = 0;
WALK_LIST(nn, ifa->neigh_list)
2000-04-05 08:51:25 +08:00
{
2009-08-21 15:27:52 +08:00
/* 13.3 (1a) */
if (nn->state < NEIGHBOR_EXCHANGE)
continue;
2009-08-21 15:27:52 +08:00
/* 13.3 (1b) */
if (nn->state < NEIGHBOR_FULL)
2000-04-05 08:51:25 +08:00
{
2009-08-25 22:42:14 +08:00
if ((en = ospf_hash_find_header(nn->lsrqh, domain, hh)) != NULL)
2000-04-05 08:51:25 +08:00
{
2009-07-23 22:51:28 +08:00
DBG("That LSA found in lsreq list for neigh %R\n", nn->rid);
switch (lsa_comp(hh, &en->lsa))
2000-04-05 08:51:25 +08:00
{
case CMP_OLDER:
continue;
break;
case CMP_SAME:
s_rem_node(SNODE en);
if (en->lsa_body != NULL)
mb_free(en->lsa_body);
en->lsa_body = NULL;
2009-07-23 22:51:28 +08:00
DBG("Removing from lsreq list for neigh %R\n", nn->rid);
ospf_hash_delete(nn->lsrqh, en);
if (EMPTY_SLIST(nn->lsrql))
ospf_neigh_sm(nn, INM_LOADDONE);
continue;
break;
case CMP_NEWER:
s_rem_node(SNODE en);
if (en->lsa_body != NULL)
mb_free(en->lsa_body);
en->lsa_body = NULL;
2009-07-23 22:51:28 +08:00
DBG("Removing from lsreq list for neigh %R\n", nn->rid);
ospf_hash_delete(nn->lsrqh, en);
if (EMPTY_SLIST(nn->lsrql))
ospf_neigh_sm(nn, INM_LOADDONE);
break;
default:
bug("Bug in lsa_comp?");
2000-04-05 08:51:25 +08:00
}
}
}
2009-08-21 15:27:52 +08:00
/* 13.3 (1c) */
if (nn == n)
continue;
2009-08-21 15:27:52 +08:00
/* 13.3 (1d) */
if (rtl)
{
2009-08-21 15:27:52 +08:00
/* In OSPFv3, there should be check whether receiving router understand
that type of LSA (for LSA types with U-bit == 0). But as we does not support
any optional LSA types, this is not needed yet */
2009-08-25 22:42:14 +08:00
if ((en = ospf_hash_find_header(nn->lsrth, domain, hh)) == NULL)
{
2009-08-25 22:42:14 +08:00
en = ospf_hash_get_header(nn->lsrth, domain, hh);
}
else
{
s_rem_node(SNODE en);
}
s_add_tail(&nn->lsrtl, SNODE en);
memcpy(&en->lsa, hh, sizeof(struct ospf_lsa_header));
DBG("Adding that LSA for flood to %I\n", nn->ip);
}
else
{
2009-08-25 22:42:14 +08:00
if ((en = ospf_hash_find_header(nn->lsrth, domain, hh)) != NULL)
{
s_rem_node(SNODE en);
if (en->lsa_body != NULL)
mb_free(en->lsa_body);
en->lsa_body = NULL;
ospf_hash_delete(nn->lsrth, en);
}
}
ret = 1;
2000-04-05 08:51:25 +08:00
}
if (ret == 0)
continue; /* pg 150 (2) */
2009-08-21 15:27:52 +08:00
if (n && (n->ifa == ifa))
2000-04-05 08:51:25 +08:00
{
2009-08-21 15:27:52 +08:00
if ((n->rid == ifa->drid) || n->rid == ifa->bdrid)
continue; /* pg 150 (3) */
2009-08-21 15:27:52 +08:00
if (ifa->state == OSPF_IS_BACKUP)
continue; /* pg 150 (4) */
retval = 1;
2000-04-05 08:51:25 +08:00
}
2000-04-05 08:51:25 +08:00
{
2004-06-04 22:03:30 +08:00
u16 len, age;
2000-04-05 08:51:25 +08:00
struct ospf_lsupd_packet *pk;
struct ospf_packet *op;
2004-06-04 22:03:30 +08:00
struct ospf_lsa_header *lh;
2000-04-05 08:51:25 +08:00
pk = (struct ospf_lsupd_packet *) ifa->sk->tbuf;
op = (struct ospf_packet *) ifa->sk->tbuf;
2000-04-05 08:51:25 +08:00
ospf_pkt_fill_hdr(ifa, pk, LSUPD_P);
pk->lsano = htonl(1);
lh = (struct ospf_lsa_header *) (pk + 1);
2004-06-04 22:03:30 +08:00
/* Copy LSA into the packet */
if (hn)
2000-04-18 04:42:42 +08:00
{
memcpy(lh, hn, ntohs(hn->length));
2000-04-18 04:42:42 +08:00
}
else
{
u8 *help;
2000-04-18 04:42:42 +08:00
struct top_hash_entry *en;
2000-05-03 06:31:48 +08:00
htonlsah(hh, lh);
help = (u8 *) (lh + 1);
2009-08-25 22:42:14 +08:00
en = ospf_hash_find_header(po->gr, domain, hh);
htonlsab(en->lsa_body, help, hh->type, hh->length
- sizeof(struct ospf_lsa_header));
2000-04-18 04:42:42 +08:00
}
len = sizeof(struct ospf_lsupd_packet) + ntohs(lh->length);
2004-06-04 22:03:30 +08:00
age = ntohs(lh->age);
age += ifa->inftransdelay;
if (age > LSA_MAXAGE)
age = LSA_MAXAGE;
2004-06-04 22:03:30 +08:00
lh->age = htons(age);
op->length = htons(len);
OSPF_PACKET(ospf_dump_lsupd, (struct ospf_lsupd_packet *) ifa->sk->tbuf,
"LSUPD packet flooded via %s", ifa->iface->name);
2000-04-05 08:51:25 +08:00
switch (ifa->type)
2000-04-05 08:51:25 +08:00
{
case OSPF_IT_NBMA:
if ((ifa->state == OSPF_IS_BACKUP) || (ifa->state == OSPF_IS_DR))
ospf_send_to_agt(ifa, NEIGHBOR_EXCHANGE);
else
ospf_send_to_bdr(ifa);
break;
case OSPF_IT_VLINK:
ospf_send_to(ifa, ifa->vip);
break;
default:
if ((ifa->state == OSPF_IS_BACKUP) || (ifa->state == OSPF_IS_DR) ||
(ifa->type == OSPF_IT_PTP))
ospf_send_to(ifa, AllSPFRouters);
else
ospf_send_to(ifa, AllDRouters);
2000-04-05 08:51:25 +08:00
}
}
}
return retval;
2000-04-05 08:51:25 +08:00
}
void /* I send all I received in LSREQ */
ospf_lsupd_send_list(struct ospf_neighbor *n, list * l)
{
struct l_lsr_head *llsh;
u16 len;
u32 lsano;
struct top_hash_entry *en;
struct ospf_lsupd_packet *pk;
struct ospf_packet *op;
struct ospf_area *oa = n->ifa->oa;
struct proto_ospf *po = oa->po;
struct proto *p = &po->proto;
void *pktpos;
if (EMPTY_LIST(*l))
return;
pk = (struct ospf_lsupd_packet *) n->ifa->sk->tbuf;
op = (struct ospf_packet *) n->ifa->sk->tbuf;
DBG("LSupd: 1st packet\n");
ospf_pkt_fill_hdr(n->ifa, pk, LSUPD_P);
len = sizeof(struct ospf_lsupd_packet);
lsano = 0;
pktpos = (pk + 1);
WALK_LIST(llsh, *l)
{
2009-08-21 15:27:52 +08:00
u32 domain = ospf_lsa_domain(llsh->lsh.type, n->ifa);
2009-08-25 22:42:14 +08:00
if ((en = ospf_hash_find(po->gr, domain, llsh->lsh.id,
2009-08-21 15:27:52 +08:00
llsh->lsh.rt, llsh->lsh.type)) == NULL)
continue; /* Probably flushed LSA */
/* FIXME This is a bug! I cannot flush LSA that is in lsrt */
2000-05-10 02:20:39 +08:00
2009-07-23 22:51:28 +08:00
DBG("Sending LSA: Type=%u, ID=%R, RT=%R, SN: 0x%x, Age: %u\n",
llsh->lsh.type, llsh->lsh.id, llsh->lsh.rt, en->lsa.sn, en->lsa.age);
if (((u32) (len + en->lsa.length)) > ospf_pkt_maxsize(n->ifa))
{
pk->lsano = htonl(lsano);
op->length = htons(len);
OSPF_PACKET(ospf_dump_lsupd, (struct ospf_lsupd_packet *) n->ifa->sk->tbuf,
"LSUPD packet sent to %I via %s", n->ip, n->ifa->iface->name);
ospf_send_to(n->ifa, n->ip);
DBG("LSupd: next packet\n");
ospf_pkt_fill_hdr(n->ifa, pk, LSUPD_P);
len = sizeof(struct ospf_lsupd_packet);
lsano = 0;
pktpos = (pk + 1);
}
htonlsah(&(en->lsa), pktpos);
pktpos = pktpos + sizeof(struct ospf_lsa_header);
htonlsab(en->lsa_body, pktpos, en->lsa.type, en->lsa.length
- sizeof(struct ospf_lsa_header));
pktpos = pktpos + en->lsa.length - sizeof(struct ospf_lsa_header);
len += en->lsa.length;
lsano++;
}
if (lsano > 0)
{
pk->lsano = htonl(lsano);
op->length = htons(len);
OSPF_PACKET(ospf_dump_lsupd, (struct ospf_lsupd_packet *) n->ifa->sk->tbuf,
"LSUPD packet sent to %I via %s", n->ip, n->ifa->iface->name);
ospf_send_to(n->ifa, n->ip);
}
}
2000-03-31 04:00:42 +08:00
void
2009-08-21 15:27:52 +08:00
ospf_lsupd_receive(struct ospf_packet *ps_i, struct ospf_iface *ifa,
struct ospf_neighbor *n)
2000-03-31 04:00:42 +08:00
{
struct ospf_neighbor *ntmp;
struct proto_ospf *po = ifa->oa->po;
struct proto *p = &po->proto;
unsigned int i, max, sendreq = 1;
unsigned int size = ntohs(ps_i->length);
if (size < (sizeof(struct ospf_lsupd_packet) + sizeof(struct ospf_lsa_header)))
{
log(L_ERR "Bad OSPF LSUPD packet from %I - too short (%u B)", n->ip, size);
return;
}
struct ospf_lsupd_packet *ps = (void *) ps_i;
OSPF_PACKET(ospf_dump_lsupd, ps, "LSUPD packet received from %I via %s", n->ip, ifa->iface->name);
if (n->state < NEIGHBOR_EXCHANGE)
{
OSPF_TRACE(D_PACKETS, "Received lsupd in lesser state than EXCHANGE from (%I)", n->ip);
return;
}
ospf_neigh_sm(n, INM_HELLOREC); /* Questionable */
unsigned int offset = sizeof(struct ospf_lsupd_packet);
unsigned int bound = size - sizeof(struct ospf_lsa_header);
max = ntohl(ps->lsano);
for (i = 0; i < max; i++)
{
2000-04-04 08:32:17 +08:00
struct ospf_lsa_header lsatmp;
struct top_hash_entry *lsadb;
2000-05-10 23:04:21 +08:00
if (offset > bound)
{
log(L_WARN "Received lsupd from %I is too short!", n->ip);
ospf_neigh_sm(n, INM_BADLSREQ);
return;
}
2000-05-10 23:04:21 +08:00
struct ospf_lsa_header *lsa = (void *) (((u8 *) ps) + offset);
unsigned int lsalen = ntohs(lsa->length);
if (((offset + lsalen) > size) || ((lsalen % 4) != 0) ||
(lsalen <= sizeof(struct ospf_lsa_header)))
2000-05-10 23:04:21 +08:00
{
log(L_WARN "Received LSA from %I with bad length", n->ip);
ospf_neigh_sm(n, INM_BADLSREQ);
2000-05-10 23:04:21 +08:00
break;
}
2000-04-05 08:51:25 +08:00
/* pg 143 (1) */
u16 chsum = lsa->checksum;
2004-06-07 02:45:08 +08:00
if (chsum != lsasum_check(lsa, NULL))
{
2009-08-28 00:25:46 +08:00
log(L_WARN "Received bad lsa checksum from %I: %x %x", n->ip, chsum, lsa->checksum);
continue;
}
2009-08-21 15:27:52 +08:00
#ifdef OSPFv2
2000-04-05 08:51:25 +08:00
/* pg 143 (2) */
if ((lsa->type < LSA_T_RT) || (lsa->type > LSA_T_EXT))
{
log(L_WARN "Unknown LSA type from %I", n->ip);
continue;
}
2000-04-05 08:51:25 +08:00
/* pg 143 (3) */
2009-08-21 15:27:52 +08:00
if ((lsa->type == LSA_T_EXT) && ifa->oa->stub)
{
log(L_WARN "Received External LSA in stub area from %I", n->ip);
continue;
}
2009-08-21 15:27:52 +08:00
#else /* OSPFv3 */
/* 4.5.1 (2) */
if ((LSA_SCOPE(lsa) == LSA_SCOPE_AS) && ifa->oa->stub)
{
log(L_WARN "Received LSA with AS scope in stub area from %I", n->ip);
continue;
}
/* 4.5.1 (3) */
if ((LSA_SCOPE(lsa) == LSA_SCOPE_RES))
{
log(L_WARN "Received LSA with invalid scope from %I", n->ip);
continue;
}
#endif
ntohlsah(lsa, &lsatmp);
2009-07-23 22:51:28 +08:00
DBG("Update Type: %u ID: %R RT: %R, Sn: 0x%08x Age: %u, Sum: %u\n",
lsatmp.type, lsatmp.id, lsatmp.rt, lsatmp.sn, lsatmp.age, lsatmp.checksum);
2009-11-17 17:31:33 +08:00
/* FIXME domain should be link id for unknown LSA types with zero Ubit */
2009-08-21 15:27:52 +08:00
u32 domain = ospf_lsa_domain(lsatmp.type, ifa);
2009-08-25 22:42:14 +08:00
lsadb = ospf_hash_find_header(po->gr, domain, &lsatmp);
#ifdef LOCAL_DEBUG
if (lsadb)
2009-07-23 22:51:28 +08:00
DBG("I have Type: %u ID: %R RT: %R, Sn: 0x%08x Age: %u, Sum: %u\n",
lsadb->lsa.type, lsadb->lsa.id, lsadb->lsa.rt,
2009-07-06 03:18:55 +08:00
lsadb->lsa.sn, lsadb->lsa.age, lsadb->lsa.checksum);
#endif
2000-04-05 08:51:25 +08:00
/* pg 143 (4) */
if ((lsatmp.age == LSA_MAXAGE) && (lsadb == NULL) && can_flush_lsa(po))
2000-04-04 08:32:17 +08:00
{
2004-06-05 01:05:24 +08:00
ospf_lsack_enqueue(n, lsa, ACKL_DIRECT);
continue;
2000-04-04 08:32:17 +08:00
}
2000-04-05 08:51:25 +08:00
/* pg 144 (5) */
if ((lsadb == NULL) || (lsa_comp(&lsatmp, &lsadb->lsa) == CMP_NEWER))
2000-04-04 08:32:17 +08:00
{
struct ospf_iface *ift = NULL;
int self = (lsatmp.rt == p->cf->global->router_id);
DBG("PG143(5): Received LSA is newer\n");
2009-08-21 15:27:52 +08:00
#ifdef OSPFv2
/* 13.4 - check self-originated LSAs of NET type */
if ((!self) && (lsatmp.type == LSA_T_NET))
{
2009-08-25 22:42:14 +08:00
struct ospf_iface *nifa;
WALK_LIST(nifa, po->iface_list)
{
if (!nifa->iface)
continue;
if (ipa_equal(nifa->iface->addr->ip, ipa_from_u32(lsatmp.id)))
{
self = 1;
break;
}
}
}
2009-08-21 15:27:52 +08:00
#endif
2009-08-21 15:27:52 +08:00
/* pg 145 (5f) - premature aging of self originated lsa */
if (self)
{
struct top_hash_entry *en;
if ((lsatmp.age == LSA_MAXAGE) && (lsatmp.sn == LSA_MAXSEQNO))
{
ospf_lsack_enqueue(n, lsa, ACKL_DIRECT);
continue;
}
lsatmp.age = LSA_MAXAGE;
lsatmp.sn = LSA_MAXSEQNO;
lsa->age = htons(LSA_MAXAGE);
lsa->sn = htonl(LSA_MAXSEQNO);
OSPF_TRACE(D_EVENTS, "Premature aging self originated lsa.");
2009-07-23 22:51:28 +08:00
OSPF_TRACE(D_EVENTS, "Type: %d, Id: %R, Rt: %R",
lsatmp.type, lsatmp.id, lsatmp.rt);
2004-06-07 02:45:08 +08:00
lsasum_check(lsa, (lsa + 1)); /* It also calculates chsum! */
lsatmp.checksum = ntohs(lsa->checksum);
2009-08-21 15:27:52 +08:00
ospf_lsupd_flood(po, NULL, lsa, &lsatmp, domain, 0);
2009-08-25 22:42:14 +08:00
if (en = ospf_hash_find_header(po->gr, domain, &lsatmp))
2009-08-21 15:27:52 +08:00
{ /* FIXME verify hacks */
ospf_lsupd_flood(po, NULL, NULL, &en->lsa, domain, 1);
}
continue;
}
2000-04-05 08:51:25 +08:00
/* pg 144 (5a) */
if (lsadb && ((now - lsadb->inst_t) <= MINLSARRIVAL)) /* FIXME: test for flooding? */
2000-04-19 06:11:05 +08:00
{
DBG("I got it in less that MINLSARRIVAL\n");
sendreq = 0;
2000-04-19 06:11:05 +08:00
continue;
}
2009-08-21 15:27:52 +08:00
if (ospf_lsupd_flood(po, n, lsa, &lsatmp, domain, 1) == 0)
{
DBG("Wasn't flooded back\n"); /* ps 144(5e), pg 153 */
if (ifa->state == OSPF_IS_BACKUP)
{
if (ifa->drid == n->rid)
ospf_lsack_enqueue(n, lsa, ACKL_DELAY);
}
else
ospf_lsack_enqueue(n, lsa, ACKL_DELAY);
}
2000-04-05 08:51:25 +08:00
2000-04-04 08:32:17 +08:00
/* Remove old from all ret lists */
2000-04-05 08:51:25 +08:00
/* pg 144 (5c) */
if (lsadb)
WALK_LIST(ift, po->iface_list)
WALK_LIST(ntmp, ift->neigh_list)
2000-06-02 21:52:50 +08:00
{
struct top_hash_entry *en;
if (ntmp->state > NEIGHBOR_EXSTART)
2009-08-25 22:42:14 +08:00
if ((en = ospf_hash_find_header(ntmp->lsrth, domain, &lsadb->lsa)) != NULL)
{
s_rem_node(SNODE en);
if (en->lsa_body != NULL)
mb_free(en->lsa_body);
en->lsa_body = NULL;
ospf_hash_delete(ntmp->lsrth, en);
}
}
if ((lsatmp.age == LSA_MAXAGE) && (lsatmp.sn == LSA_MAXSEQNO)
&& lsadb && can_flush_lsa(po))
{
flush_lsa(lsadb, po);
schedule_rtcalc(po);
continue;
} /* FIXME lsack? */
2000-04-04 08:32:17 +08:00
2000-04-05 08:51:25 +08:00
/* pg 144 (5d) */
void *body = mb_alloc(p->pool, lsatmp.length - sizeof(struct ospf_lsa_header));
ntohlsab(lsa + 1, body, lsatmp.type,
lsatmp.length - sizeof(struct ospf_lsa_header));
/* We will do validation check after flooding and
acknowledging given LSA to minimize problems
when communicating with non-validating peer */
if (lsa_validate(&lsatmp, body) == 0)
{
log(L_WARN "Received invalid LSA from %I", n->ip);
mb_free(body);
continue;
}
2009-08-21 15:27:52 +08:00
lsadb = lsa_install_new(po, &lsatmp, domain, body);
2000-04-05 06:27:19 +08:00
DBG("New LSA installed in DB\n");
#ifdef OSPFv3
/* Events 6,7 from 4.4.3. */
if ((lsatmp.type == LSA_T_LINK) &&
(ifa->state == OSPF_IS_DR))
schedule_net_lsa(ifa);
#endif
2000-04-04 08:32:17 +08:00
continue;
}
2004-06-04 22:03:30 +08:00
/* FIXME pg145 (6) */
2000-04-04 08:32:17 +08:00
2000-04-05 08:51:25 +08:00
/* pg145 (7) */
if (lsa_comp(&lsatmp, &lsadb->lsa) == CMP_SAME)
2000-04-04 08:32:17 +08:00
{
struct top_hash_entry *en;
2004-06-04 22:03:30 +08:00
DBG("PG145(7) Got the same LSA\n");
2009-08-25 22:42:14 +08:00
if ((en = ospf_hash_find_header(n->lsrth, lsadb->domain, &lsadb->lsa)) != NULL)
{
/* pg145 (7a) */
s_rem_node(SNODE en);
if (en->lsa_body != NULL)
mb_free(en->lsa_body);
en->lsa_body = NULL;
ospf_hash_delete(n->lsrth, en);
if (ifa->state == OSPF_IS_BACKUP)
{
if (n->rid == ifa->drid)
ospf_lsack_enqueue(n, lsa, ACKL_DELAY);
}
}
else
{
/* pg145 (7b) */
ospf_lsack_enqueue(n, lsa, ACKL_DIRECT);
}
sendreq = 0;
continue;
2000-04-04 08:32:17 +08:00
}
2000-04-05 08:51:25 +08:00
/* pg145 (8) */
if ((lsadb->lsa.age == LSA_MAXAGE) && (lsadb->lsa.sn == LSA_MAXSEQNO))
{
continue;
}
2000-04-04 08:32:17 +08:00
2000-04-05 08:51:25 +08:00
{
list l;
2000-05-30 23:05:47 +08:00
struct l_lsr_head ll;
2000-04-05 08:51:25 +08:00
init_list(&l);
ll.lsh.id = lsadb->lsa.id;
ll.lsh.rt = lsadb->lsa.rt;
ll.lsh.type = lsadb->lsa.type;
add_tail(&l, NODE & ll);
ospf_lsupd_send_list(n, &l);
2000-04-05 08:51:25 +08:00
}
}
/* Send direct LSAs */
ospf_lsack_send(n, ACKL_DIRECT);
if (sendreq && (n->state == NEIGHBOR_LOADING))
2000-06-02 17:53:26 +08:00
{
ospf_lsreq_send(n); /* Ask for another part of neighbor's database */
2000-06-02 17:53:26 +08:00
}
2000-03-31 04:00:42 +08:00
}
void
2009-08-21 15:27:52 +08:00
ospf_lsupd_flush_nlsa(struct proto_ospf *po, struct top_hash_entry *en)
{
struct ospf_lsa_header *lsa = &en->lsa;
struct proto *p = &po->proto;
lsa->age = LSA_MAXAGE;
lsa->sn = LSA_MAXSEQNO;
2004-06-07 02:45:08 +08:00
lsasum_calculate(lsa, en->lsa_body);
2000-06-06 10:16:39 +08:00
OSPF_TRACE(D_EVENTS, "Premature aging self originated lsa!");
2009-07-23 22:51:28 +08:00
OSPF_TRACE(D_EVENTS, "Type: %d, Id: %R, Rt: %R", lsa->type, lsa->id, lsa->rt);
2009-08-21 15:27:52 +08:00
ospf_lsupd_flood(po, NULL, NULL, lsa, en->domain, 0);
}