1: /*
2: * BIRD -- OSPF
3: *
4: * (c) 2000--2004 Ondrej Filip <feela@network.cz>
5: * (c) 2009--2014 Ondrej Zajicek <santiago@crfreenet.org>
6: * (c) 2009--2014 CZ.NIC z.s.p.o.
7: *
8: * Can be freely distributed and used under the terms of the GNU GPL.
9: */
10:
11: #include "ospf.h"
12:
13:
14: /*
15: struct ospf_lsupd_packet
16: {
17: struct ospf_packet hdr;
18: // union ospf_auth auth;
19:
20: u32 lsa_count;
21: void lsas[];
22: };
23: */
24:
25:
26: void
27: ospf_dump_lsahdr(struct ospf_proto *p, struct ospf_lsa_header *lsa_n)
28: {
29: struct ospf_lsa_header lsa;
30: u32 lsa_etype;
31:
32: lsa_ntoh_hdr(lsa_n, &lsa);
33: lsa_etype = lsa_get_etype(&lsa, p);
34:
35: log(L_TRACE "%s: LSA Type: %04x, Id: %R, Rt: %R, Seq: %08x, Age: %u, Sum: %04x",
36: p->p.name, lsa_etype, lsa.id, lsa.rt, lsa.sn, lsa.age, lsa.checksum);
37: }
38:
39: void
40: ospf_dump_common(struct ospf_proto *p, struct ospf_packet *pkt)
41: {
42: log(L_TRACE "%s: length %d", p->p.name, ntohs(pkt->length));
43: log(L_TRACE "%s: router %R", p->p.name, ntohl(pkt->routerid));
44: }
45:
46: static inline uint
47: ospf_lsupd_hdrlen(struct ospf_proto *p)
48: {
49: return ospf_pkt_hdrlen(p) + 4; /* + u32 lsa count field */
50: }
51:
52: static inline u32
53: ospf_lsupd_get_lsa_count(struct ospf_packet *pkt, uint hdrlen)
54: {
55: u32 *c = ((void *) pkt) + hdrlen - 4;
56: return ntohl(*c);
57: }
58:
59: static inline void
60: ospf_lsupd_set_lsa_count(struct ospf_packet *pkt, uint hdrlen, u32 val)
61: {
62: u32 *c = ((void *) pkt) + hdrlen - 4;
63: *c = htonl(val);
64: }
65:
66: static inline void
67: ospf_lsupd_body(struct ospf_proto *p, struct ospf_packet *pkt,
68: uint *offset, uint *lsa_count)
69: {
70: uint hlen = ospf_lsupd_hdrlen(p);
71: *offset = hlen;
72: *lsa_count = ospf_lsupd_get_lsa_count(pkt, hlen);
73: }
74:
75: static void
76: ospf_dump_lsupd(struct ospf_proto *p, struct ospf_packet *pkt)
77: {
78: uint offset, plen, i, lsa_count, lsa_len;
79:
80: ASSERT(pkt->type == LSUPD_P);
81: ospf_dump_common(p, pkt);
82:
83: plen = ntohs(pkt->length);
84: ospf_lsupd_body(p, pkt, &offset, &lsa_count);
85: for (i = 0; i < lsa_count; i++)
86: {
87: if ((offset + sizeof(struct ospf_lsa_header)) > plen)
88: goto invalid;
89:
90: struct ospf_lsa_header *lsa = ((void *) pkt) + offset;
91: lsa_len = ntohs(lsa->length);
92:
93: if (((lsa_len % 4) != 0) || (lsa_len <= sizeof(struct ospf_lsa_header)))
94: goto invalid;
95:
96: ospf_dump_lsahdr(p, lsa);
97: offset += lsa_len;
98: }
99: return;
100:
101: invalid:
102: log(L_TRACE "%s: LSA invalid", p->p.name);
103: return;
104: }
105:
106:
107: static inline void
108: ospf_lsa_lsrq_down(struct top_hash_entry *req, struct ospf_neighbor *n)
109: {
110: if (req == n->lsrqi)
111: n->lsrqi = SNODE_NEXT(req);
112:
113: s_rem_node(SNODE req);
114: ospf_hash_delete(n->lsrqh, req);
115:
116: if (EMPTY_SLIST(n->lsrql))
117: {
118: tm_stop(n->lsrq_timer);
119:
120: if (n->state == NEIGHBOR_LOADING)
121: ospf_neigh_sm(n, INM_LOADDONE);
122: }
123: }
124:
125: static inline void
126: ospf_lsa_lsrt_up(struct top_hash_entry *en, struct ospf_neighbor *n)
127: {
128: struct top_hash_entry *ret = ospf_hash_get_entry(n->lsrth, en);
129:
130: if (!SNODE_VALID(ret))
131: {
132: en->ret_count++;
133: s_add_tail(&n->lsrtl, SNODE ret);
134: }
135:
136: ret->lsa = en->lsa;
137: ret->lsa_body = LSA_BODY_DUMMY;
138:
139: if (!tm_active(n->lsrt_timer))
140: tm_start(n->lsrt_timer, n->ifa->rxmtint S);
141: }
142:
143: void
144: ospf_lsa_lsrt_down_(struct top_hash_entry *en, struct ospf_neighbor *n, struct top_hash_entry *ret)
145: {
146: if (en)
147: en->ret_count--;
148:
149: s_rem_node(SNODE ret);
150: ospf_hash_delete(n->lsrth, ret);
151:
152: if (EMPTY_SLIST(n->lsrtl))
153: tm_stop(n->lsrt_timer);
154: }
155:
156: static inline int
157: ospf_lsa_lsrt_down(struct top_hash_entry *en, struct ospf_neighbor *n)
158: {
159: struct top_hash_entry *ret = ospf_hash_find_entry(n->lsrth, en);
160:
161: if (ret)
162: ospf_lsa_lsrt_down_(en, n, ret);
163:
164: return ret != NULL;
165: }
166:
167: void
168: ospf_add_flushed_to_lsrt(struct ospf_proto *p, struct ospf_neighbor *n)
169: {
170: struct top_hash_entry *en;
171:
172: WALK_SLIST(en, p->lsal)
173: if ((en->lsa.age == LSA_MAXAGE) && (en->lsa_body != NULL) &&
174: lsa_flooding_allowed(en->lsa_type, en->domain, n->ifa) &&
175: lsa_is_acceptable(en->lsa_type, n, p))
176: ospf_lsa_lsrt_up(en, n);
177:
178: /* If we found any flushed LSA, we send them ASAP */
179: if (tm_active(n->lsrt_timer))
180: tm_start(n->lsrt_timer, 0);
181: }
182:
183: static int ospf_flood_lsupd(struct ospf_proto *p, struct top_hash_entry **lsa_list, uint lsa_count, uint lsa_min_count, struct ospf_iface *ifa);
184:
185: static void
186: ospf_enqueue_lsa(struct ospf_proto *p, struct top_hash_entry *en, struct ospf_iface *ifa)
187: {
188: /* Exception for local Grace-LSA, they are flooded synchronously */
189: if ((en->lsa_type == LSA_T_GR) && (en->lsa.rt == p->router_id))
190: {
191: ospf_flood_lsupd(p, &en, 1, 1, ifa);
192: return;
193: }
194:
195: if (ifa->flood_queue_used == ifa->flood_queue_size)
196: {
197: /* If we already have full queue, we send some packets */
198: uint sent = ospf_flood_lsupd(p, ifa->flood_queue, ifa->flood_queue_used, ifa->flood_queue_used / 2, ifa);
199: uint i;
200:
201: for (i = 0; i < sent; i++)
202: ifa->flood_queue[i]->ret_count--;
203:
204: ifa->flood_queue_used -= sent;
205: memmove(ifa->flood_queue, ifa->flood_queue + sent, ifa->flood_queue_used * sizeof(void *));
206: bzero(ifa->flood_queue + ifa->flood_queue_used, sent * sizeof(void *));
207: }
208:
209: en->ret_count++;
210: ifa->flood_queue[ifa->flood_queue_used] = en;
211: ifa->flood_queue_used++;
212:
213: if (!ev_active(p->flood_event))
214: ev_schedule(p->flood_event);
215: }
216:
217: void
218: ospf_flood_event(void *ptr)
219: {
220: struct ospf_proto *p = ptr;
221: struct ospf_iface *ifa;
222: int i, count;
223:
224: WALK_LIST(ifa, p->iface_list)
225: {
226: if (ifa->flood_queue_used == 0)
227: continue;
228:
229: count = ifa->flood_queue_used;
230: ospf_flood_lsupd(p, ifa->flood_queue, count, count, ifa);
231:
232: for (i = 0; i < count; i++)
233: ifa->flood_queue[i]->ret_count--;
234:
235: ifa->flood_queue_used = 0;
236: bzero(ifa->flood_queue, count * sizeof(void *));
237: }
238: }
239:
240:
241: /**
242: * ospf_flood_lsa - send LSA to the neighbors
243: * @p: OSPF protocol instance
244: * @en: LSA entry
245: * @from: neighbor than sent this LSA (or NULL if LSA is local)
246: *
247: * return value - was the LSA flooded back?
248: */
249: int
250: ospf_flood_lsa(struct ospf_proto *p, struct top_hash_entry *en, struct ospf_neighbor *from)
251: {
252: struct ospf_iface *ifa;
253: struct ospf_neighbor *n;
254:
255: /* RFC 2328 13.3 */
256:
257: int back = 0;
258: WALK_LIST(ifa, p->iface_list)
259: {
260: if (ifa->stub)
261: continue;
262:
263: if (! lsa_flooding_allowed(en->lsa_type, en->domain, ifa))
264: continue;
265:
266: DBG("Wanted to flood LSA: Type: %u, ID: %R, RT: %R, SN: 0x%x, Age %u\n",
267: hh->type, hh->id, hh->rt, hh->sn, hh->age);
268:
269: int used = 0;
270: WALK_LIST(n, ifa->neigh_list)
271: {
272: /* 13.3 (1a) */
273: if (n->state < NEIGHBOR_EXCHANGE)
274: continue;
275:
276: /* 13.3 (1b) */
277: if (n->state < NEIGHBOR_FULL)
278: {
279: struct top_hash_entry *req = ospf_hash_find_entry(n->lsrqh, en);
280: if (req != NULL)
281: {
282: int cmp = lsa_comp(&en->lsa, &req->lsa);
283:
284: /* If same or newer, remove LSA from the link state request list */
285: if (cmp > CMP_OLDER)
286: ospf_lsa_lsrq_down(req, n);
287:
288: /* If older or same, skip processing of this neighbor */
289: if (cmp < CMP_NEWER)
290: continue;
291: }
292: }
293:
294: /* 13.3 (1c) */
295: if (n == from)
296: continue;
297:
298: /* Check whether optional LSAs are supported by neighbor */
299: if (!lsa_is_acceptable(en->lsa_type, n, p))
300: continue;
301:
302: /* 13.3 (1d) - add LSA to the link state retransmission list */
303: ospf_lsa_lsrt_up(en, n);
304:
305: used = 1;
306: }
307:
308: /* 13.3 (2) */
309: if (!used)
310: continue;
311:
312: if (from && (from->ifa == ifa))
313: {
314: /* 13.3 (3) */
315: if ((from->rid == ifa->drid) || (from->rid == ifa->bdrid))
316: continue;
317:
318: /* 13.3 (4) */
319: if (ifa->state == OSPF_IS_BACKUP)
320: continue;
321:
322: back = 1;
323: }
324:
325: /* 13.3 (5) - finally flood the packet */
326: ospf_enqueue_lsa(p, en, ifa);
327: }
328:
329: return back;
330: }
331:
332: static uint
333: ospf_prepare_lsupd(struct ospf_proto *p, struct ospf_iface *ifa,
334: struct top_hash_entry **lsa_list, uint lsa_count)
335: {
336: struct ospf_packet *pkt;
337: uint hlen, pos, i, maxsize;
338:
339: pkt = ospf_tx_buffer(ifa);
340: hlen = ospf_lsupd_hdrlen(p);
341: maxsize = ospf_pkt_maxsize(ifa);
342:
343: ospf_pkt_fill_hdr(ifa, pkt, LSUPD_P);
344: pos = hlen;
345:
346: for (i = 0; i < lsa_count; i++)
347: {
348: struct top_hash_entry *en = lsa_list[i];
349: uint len = en->lsa.length;
350:
351: if ((pos + len) > maxsize)
352: {
353: /* The packet if full, stop adding LSAs and sent it */
354: if (i > 0)
355: break;
356:
357: /* LSA is larger than MTU, check buffer size */
358: if (ospf_iface_assure_bufsize(ifa, pos + len) < 0)
359: {
360: /* Cannot fit in a tx buffer, skip that */
361: log(L_ERR "%s: LSA too large to send on %s (Type: %04x, Id: %R, Rt: %R)",
362: p->p.name, ifa->ifname, en->lsa_type, en->lsa.id, en->lsa.rt);
363: break;
364: }
365:
366: /* TX buffer could be reallocated */
367: pkt = ospf_tx_buffer(ifa);
368: }
369:
370: struct ospf_lsa_header *buf = ((void *) pkt) + pos;
371: lsa_hton_hdr(&en->lsa, buf);
372: lsa_hton_body(en->lsa_body, ((void *) buf) + sizeof(struct ospf_lsa_header),
373: len - sizeof(struct ospf_lsa_header));
374: buf->age = htons(MIN(en->lsa.age + ifa->inftransdelay, LSA_MAXAGE));
375:
376: pos += len;
377: }
378:
379: ospf_lsupd_set_lsa_count(pkt, hlen, i);
380: pkt->length = htons(pos);
381:
382: return i;
383: }
384:
385:
386: static int
387: ospf_flood_lsupd(struct ospf_proto *p, struct top_hash_entry **lsa_list, uint lsa_count, uint lsa_min_count, struct ospf_iface *ifa)
388: {
389: uint i, c;
390:
391: for (i = 0; i < lsa_min_count; i += c)
392: {
393: c = ospf_prepare_lsupd(p, ifa, lsa_list + i, lsa_count - i);
394:
395: if (!c) /* Too large LSA */
396: { i++; continue; }
397:
398: OSPF_PACKET(ospf_dump_lsupd, ospf_tx_buffer(ifa),
399: "LSUPD packet flooded via %s", ifa->ifname);
400:
401: if (ifa->type == OSPF_IT_BCAST)
402: {
403: if ((ifa->state == OSPF_IS_DR) || (ifa->state == OSPF_IS_BACKUP))
404: ospf_send_to_all(ifa);
405: else
406: ospf_send_to_des(ifa);
407: }
408: else
409: ospf_send_to_agt(ifa, NEIGHBOR_EXCHANGE);
410: }
411:
412: return i;
413: }
414:
415: int
416: ospf_send_lsupd(struct ospf_proto *p, struct top_hash_entry **lsa_list, uint lsa_count, struct ospf_neighbor *n)
417: {
418: struct ospf_iface *ifa = n->ifa;
419: uint i, c;
420:
421: for (i = 0; i < lsa_count; i += c)
422: {
423: c = ospf_prepare_lsupd(p, ifa, lsa_list + i, lsa_count - i);
424:
425: if (!c) /* Too large LSA */
426: { i++; continue; }
427:
428: OSPF_PACKET(ospf_dump_lsupd, ospf_tx_buffer(ifa),
429: "LSUPD packet sent to nbr %R on %s", n->rid, ifa->ifname);
430:
431: ospf_send_to(ifa, n->ip);
432: }
433:
434: return i;
435: }
436:
437: void
438: ospf_rxmt_lsupd(struct ospf_proto *p, struct ospf_neighbor *n)
439: {
440: uint max = 2 * n->ifa->flood_queue_size;
441: struct top_hash_entry *entries[max];
442: struct top_hash_entry *ret, *nxt, *en;
443: uint i = 0;
444:
445: /* ASSERT((n->state >= NEIGHBOR_EXCHANGE) && !EMPTY_SLIST(n->lsrtl)); */
446:
447: WALK_SLIST_DELSAFE(ret, nxt, n->lsrtl)
448: {
449: if (i == max)
450: break;
451:
452: en = ospf_hash_find_entry(p->gr, ret);
453: if (!en)
454: {
455: /* Probably flushed LSA, this should not happen */
456: log(L_WARN "%s: LSA disappeared (Type: %04x, Id: %R, Rt: %R)",
457: p->p.name, ret->lsa_type, ret->lsa.id, ret->lsa.rt);
458:
459: s_rem_node(SNODE ret);
460: ospf_hash_delete(n->lsrth, ret);
461:
462: continue;
463: }
464:
465: entries[i] = en;
466: i++;
467: }
468:
469: ospf_send_lsupd(p, entries, i, n);
470: }
471:
472:
473: static inline int
474: ospf_addr_is_local(struct ospf_proto *p, struct ospf_area *oa, ip_addr ip)
475: {
476: struct ospf_iface *ifa;
477: WALK_LIST(ifa, p->iface_list)
478: if ((ifa->oa == oa) && ifa->addr && ipa_equal(ifa->addr->ip, ip))
479: return 1;
480:
481: return 0;
482: }
483:
484: void
485: ospf_receive_lsupd(struct ospf_packet *pkt, struct ospf_iface *ifa,
486: struct ospf_neighbor *n)
487: {
488: struct ospf_proto *p = ifa->oa->po;
489: const char *err_dsc = NULL;
490: uint plen, err_val = 0;
491:
492: /* RFC 2328 13. */
493:
494: plen = ntohs(pkt->length);
495: if (plen < ospf_lsupd_hdrlen(p))
496: {
497: LOG_PKT("Bad LSUPD packet from nbr %R on %s - %s (%u)", n->rid, ifa->ifname, "too short", plen);
498: return;
499: }
500:
501: OSPF_PACKET(ospf_dump_lsupd, pkt, "LSUPD packet received from nbr %R on %s", n->rid, ifa->ifname);
502:
503: if (n->state < NEIGHBOR_EXCHANGE)
504: {
505: OSPF_TRACE(D_PACKETS, "LSUPD packet ignored - lesser state than Exchange");
506: return;
507: }
508:
509: ospf_neigh_sm(n, INM_HELLOREC); /* Questionable */
510:
511: uint offset, i, lsa_count;
512: ospf_lsupd_body(p, pkt, &offset, &lsa_count);
513:
514: for (i = 0; i < lsa_count; i++)
515: {
516: struct ospf_lsa_header lsa, *lsa_n;
517: struct top_hash_entry *en;
518: u32 lsa_len, lsa_type, lsa_domain;
519:
520: if ((offset + sizeof(struct ospf_lsa_header)) > plen)
521: DROP("too short", plen);
522:
523: /* LSA header in network order */
524: lsa_n = ((void *) pkt) + offset;
525: lsa_len = ntohs(lsa_n->length);
526: offset += lsa_len;
527:
528: if (offset > plen)
529: DROP("too short", plen);
530:
531: if (((lsa_len % 4) != 0) || (lsa_len <= sizeof(struct ospf_lsa_header)))
532: DROP("invalid LSA length", lsa_len);
533:
534: /* LSA header in host order */
535: lsa_ntoh_hdr(lsa_n, &lsa);
536: lsa_get_type_domain(&lsa, ifa, &lsa_type, &lsa_domain);
537:
538: DBG("Update Type: %04x, Id: %R, Rt: %R, Sn: 0x%08x, Age: %u, Sum: %u\n",
539: lsa_type, lsa.id, lsa.rt, lsa.sn, lsa.age, lsa.checksum);
540:
541: /* RFC 2328 13. (1) - verify LSA checksum */
542: if ((lsa_n->checksum == 0) || !lsa_verify_checksum(lsa_n, lsa_len))
543: SKIP("invalid checksum");
544:
545: /* RFC 2328 13. (2) */
546: if (!lsa_type)
547: SKIP("unknown type");
548:
549: /* RFC 5340 4.5.1 (2) and RFC 2328 13. (3) */
550: if (!oa_is_ext(ifa->oa) && (LSA_SCOPE(lsa_type) == LSA_SCOPE_AS))
551: SKIP("AS scope in stub area");
552:
553: /* Errata 3746 to RFC 2328 - rt-summary-LSAs forbidden in stub areas */
554: if (!oa_is_ext(ifa->oa) && (lsa_type == LSA_T_SUM_RT))
555: SKIP("rt-summary-LSA in stub area");
556:
557: /* RFC 5340 4.5.1 (3) */
558: if (LSA_SCOPE(lsa_type) == LSA_SCOPE_RES)
559: SKIP("invalid scope");
560:
561: /* Find local copy of LSA in link state database */
562: en = ospf_hash_find(p->gr, lsa_domain, lsa.id, lsa.rt, lsa_type);
563:
564: #ifdef LOCAL_DEBUG
565: if (en)
566: DBG("I have Type: %04x, Id: %R, Rt: %R, Sn: 0x%08x, Age: %u, Sum: %u\n",
567: en->lsa_type, en->lsa.id, en->lsa.rt, en->lsa.sn, en->lsa.age, en->lsa.checksum);
568: #endif
569:
570: /* 13. (4) - ignore maxage LSA if i have no local copy */
571: if ((lsa.age == LSA_MAXAGE) && !en && (p->padj == 0))
572: {
573: /* 13.5. - schedule ACKs (tbl 19, case 5) */
574: ospf_enqueue_lsack(n, lsa_n, ACKL_DIRECT);
575: continue;
576: }
577:
578: /* 13. (5) - received LSA is newer (or no local copy) */
579: if (!en || (lsa_comp(&lsa, &en->lsa) == CMP_NEWER))
580: {
581: /* 13. (5a) - enforce minimum time between updates for received LSAs */
582: /* We also use this to ratelimit reactions to received self-originated LSAs */
583: if (en && (lsa_inst_age(en) < MINLSARRIVAL))
584: {
585: OSPF_TRACE(D_EVENTS, "Skipping LSA received in less that MinLSArrival");
586: continue;
587: }
588:
589: /* Copy and validate LSA body */
590: int blen = lsa.length - sizeof(struct ospf_lsa_header);
591: void *body = mb_alloc(p->p.pool, blen);
592: lsa_ntoh_body(lsa_n + 1, body, blen);
593:
594: if (lsa_validate(&lsa, lsa_type, ospf_is_v2(p), body) == 0)
595: {
596: mb_free(body);
597: SKIP("invalid body");
598: }
599:
600: /* 13. (5f) - handle self-originated LSAs, see also 13.4. */
601: if (!p->gr_recovery &&
602: ((lsa.rt == p->router_id) ||
603: (ospf_is_v2(p) && (lsa_type == LSA_T_NET) && ospf_addr_is_local(p, ifa->oa, ipa_from_u32(lsa.id)))))
604: {
605: OSPF_TRACE(D_EVENTS, "Received unexpected self-originated LSA");
606: ospf_advance_lsa(p, en, &lsa, lsa_type, lsa_domain, body);
607: continue;
608: }
609:
610: /* 13. (5c) - remove old LSA from all retransmission lists
611: *
612: * We only need to remove it from the retransmission list of the neighbor
613: * that send us the new LSA. The old LSA is automatically replaced in
614: * retransmission lists by the new LSA.
615: */
616: if (en)
617: ospf_lsa_lsrt_down(en, n);
618:
619: #if 0
620: /*
621: * Old code for removing LSA from all retransmission lists. Must be done
622: * before (5b), otherwise it also removes the new entries from (5b).
623: */
624: struct ospf_iface *ifi;
625: struct ospf_neighbor *ni;
626:
627: WALK_LIST(ifi, p->iface_list)
628: WALK_LIST(ni, ifi->neigh_list)
629: if (ni->state > NEIGHBOR_EXSTART)
630: ospf_lsa_lsrt_down(en, ni);
631: #endif
632:
633: /* 13. (5d) - install new LSA into database */
634: en = ospf_install_lsa(p, &lsa, lsa_type, lsa_domain, body);
635:
636: /* RFC 5340 4.4.3 Events 6+7 - new Link LSA received */
637: if (lsa_type == LSA_T_LINK)
638: ospf_notify_net_lsa(ifa);
639:
640: /* RFC 3623 3.1 - entering graceful restart helper mode */
641: if (lsa_type == LSA_T_GR)
642: ospf_neigh_notify_grace_lsa(n, en);
643:
644: /* Link received pre-restart router LSA */
645: if (p->gr_recovery && (lsa_type == LSA_T_RT) && (lsa.rt == p->router_id))
646: ifa->oa->rt = en;
647:
648: /* 13. (5b) - flood new LSA */
649: int flood_back = ospf_flood_lsa(p, en, n);
650:
651: /* 13.5. - schedule ACKs (tbl 19, cases 1+2) */
652: if (! flood_back)
653: if ((ifa->state != OSPF_IS_BACKUP) || (n->rid == ifa->drid))
654: ospf_enqueue_lsack(n, lsa_n, ACKL_DELAY);
655:
656: /* FIXME: remove LSA entry if it is LSA_MAXAGE and it is possible? */
657:
658: continue;
659: }
660:
661: /* 13. (6) - received LSA is in Link state request list (but not newer) */
662: if (ospf_hash_find_entry(n->lsrqh, en) != NULL)
663: DROP1("error in LSA database exchange");
664:
665: /* 13. (7) - received LSA is same */
666: if (lsa_comp(&lsa, &en->lsa) == CMP_SAME)
667: {
668: /* Duplicate LSA, treat as implicit ACK */
669: int implicit_ack = ospf_lsa_lsrt_down(en, n);
670:
671: /* 13.5. - schedule ACKs (tbl 19, cases 3+4) */
672: if (implicit_ack)
673: {
674: if ((ifa->state == OSPF_IS_BACKUP) && (n->rid == ifa->drid))
675: ospf_enqueue_lsack(n, lsa_n, ACKL_DELAY);
676: }
677: else
678: ospf_enqueue_lsack(n, lsa_n, ACKL_DIRECT);
679:
680: continue;
681: }
682:
683: /* 13. (8) - received LSA is older */
684: {
685: /* Seqnum is wrapping, wait until it is flushed */
686: if ((en->lsa.age == LSA_MAXAGE) && (en->lsa.sn == LSA_MAXSEQNO))
687: continue;
688:
689: /* Send newer local copy back to neighbor */
690: /* FIXME - check for MinLSArrival ? */
691: ospf_send_lsupd(p, &en, 1, n);
692:
693: continue;
694: }
695:
696: skip:
697: LOG_LSA1("Bad LSA (Type: %04x, Id: %R, Rt: %R) in LSUPD", lsa_type, lsa.id, lsa.rt);
698: LOG_LSA2(" received from nbr %R on %s - %s", n->rid, ifa->ifname, err_dsc);
699: }
700:
701: /* Send direct LSACKs */
702: ospf_send_lsack(p, n, ACKL_DIRECT);
703:
704: /* Send enqueued LSAs immediately, do not wait for flood_event */
705: if (ev_active(p->flood_event))
706: {
707: ev_postpone(p->flood_event);
708: ospf_flood_event(p);
709: }
710:
711: /*
712: * During loading, we should ask for another batch of LSAs. This is only
713: * vaguely mentioned in RFC 2328. We send a new LSREQ if all requests sent in
714: * the last packet were already answered and/or removed from the LS request
715: * list and therefore lsrqi is pointing to the first node of the list.
716: */
717: if (!EMPTY_SLIST(n->lsrql) && (n->lsrqi == SHEAD(n->lsrql)))
718: {
719: ospf_send_lsreq(p, n);
720: tm_start(n->lsrq_timer, n->ifa->rxmtint S);
721: }
722:
723: return;
724:
725: drop:
726: LOG_PKT("Bad LSUPD packet from nbr %R on %s - %s (%u)",
727: n->rid, ifa->ifname, err_dsc, err_val);
728:
729: /* Malformed LSUPD - there is no defined error event, we abuse BadLSReq */
730: ospf_neigh_sm(n, INM_BADLSREQ);
731: return;
732: }
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>