mirror of
				https://gitlab.labs.nic.cz/labs/bird.git
				synced 2024-05-11 16:54:54 +00:00 
			
		
		
		
	New data types net_addr and variants (in lib/net.h) describing network addresses (prefix/pxlen). Modifications of FIB structures to handle these data types and changing everything to use these data types instead of prefix/pxlen pairs where possible. The commit is WiP, some protocols are not yet updated (BGP, Kernel), and the code contains some temporary scaffolding. Comments are welcome.
		
			
				
	
	
		
			716 lines
		
	
	
		
			18 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			716 lines
		
	
	
		
			18 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/*
 | 
						|
 *	BIRD -- OSPF
 | 
						|
 *
 | 
						|
 *	(c) 2000--2004 Ondrej Filip <feela@network.cz>
 | 
						|
 *	(c) 2009--2014 Ondrej Zajicek <santiago@crfreenet.org>
 | 
						|
 *	(c) 2009--2014 CZ.NIC z.s.p.o.
 | 
						|
 *
 | 
						|
 *	Can be freely distributed and used under the terms of the GNU GPL.
 | 
						|
 */
 | 
						|
 | 
						|
#include "ospf.h"
 | 
						|
 | 
						|
 | 
						|
/*
 | 
						|
struct ospf_lsupd_packet
 | 
						|
{
 | 
						|
  struct ospf_packet hdr;
 | 
						|
  // union ospf_auth auth;
 | 
						|
 | 
						|
  u32 lsa_count;
 | 
						|
  void lsas[];
 | 
						|
};
 | 
						|
*/
 | 
						|
 | 
						|
 | 
						|
void
 | 
						|
ospf_dump_lsahdr(struct ospf_proto *p, struct ospf_lsa_header *lsa_n)
 | 
						|
{
 | 
						|
  struct ospf_lsa_header lsa;
 | 
						|
  u32 lsa_etype;
 | 
						|
 | 
						|
  lsa_ntoh_hdr(lsa_n, &lsa);
 | 
						|
  lsa_etype = lsa_get_etype(&lsa, p);
 | 
						|
 | 
						|
  log(L_TRACE "%s:     LSA      Type: %04x, Id: %R, Rt: %R, Seq: %08x, Age: %u, Sum: %04x",
 | 
						|
      p->p.name, lsa_etype, lsa.id, lsa.rt, lsa.sn, lsa.age, lsa.checksum);
 | 
						|
}
 | 
						|
 | 
						|
void
 | 
						|
ospf_dump_common(struct ospf_proto *p, struct ospf_packet *pkt)
 | 
						|
{
 | 
						|
  log(L_TRACE "%s:     length   %d", p->p.name, ntohs(pkt->length));
 | 
						|
  log(L_TRACE "%s:     router   %R", p->p.name, ntohl(pkt->routerid));
 | 
						|
}
 | 
						|
 | 
						|
static inline uint
 | 
						|
ospf_lsupd_hdrlen(struct ospf_proto *p)
 | 
						|
{
 | 
						|
  return ospf_pkt_hdrlen(p) + 4; /* + u32 lsa count field */
 | 
						|
}
 | 
						|
 | 
						|
static inline u32
 | 
						|
ospf_lsupd_get_lsa_count(struct ospf_packet *pkt, uint hdrlen)
 | 
						|
{
 | 
						|
  u32 *c = ((void *) pkt) + hdrlen - 4;
 | 
						|
  return ntohl(*c);
 | 
						|
}
 | 
						|
 | 
						|
static inline void
 | 
						|
ospf_lsupd_set_lsa_count(struct ospf_packet *pkt, uint hdrlen, u32 val)
 | 
						|
{
 | 
						|
  u32 *c = ((void *) pkt) + hdrlen - 4;
 | 
						|
  *c = htonl(val);
 | 
						|
}
 | 
						|
 | 
						|
static inline void
 | 
						|
ospf_lsupd_body(struct ospf_proto *p, struct ospf_packet *pkt,
 | 
						|
		uint *offset, uint *lsa_count)
 | 
						|
{
 | 
						|
  uint hlen = ospf_lsupd_hdrlen(p);
 | 
						|
  *offset = hlen;
 | 
						|
  *lsa_count = ospf_lsupd_get_lsa_count(pkt, hlen);
 | 
						|
}
 | 
						|
 | 
						|
static void
 | 
						|
ospf_dump_lsupd(struct ospf_proto *p, struct ospf_packet *pkt)
 | 
						|
{
 | 
						|
  uint offset, plen, i, lsa_count, lsa_len;
 | 
						|
 | 
						|
  ASSERT(pkt->type == LSUPD_P);
 | 
						|
  ospf_dump_common(p, pkt);
 | 
						|
 | 
						|
  plen = ntohs(pkt->length);
 | 
						|
  ospf_lsupd_body(p, pkt, &offset, &lsa_count);
 | 
						|
  for (i = 0; i < lsa_count; i++)
 | 
						|
  {
 | 
						|
    if ((offset + sizeof(struct ospf_lsa_header)) > plen)
 | 
						|
      goto invalid;
 | 
						|
 | 
						|
    struct ospf_lsa_header *lsa = ((void *) pkt) + offset;
 | 
						|
    lsa_len = ntohs(lsa->length);
 | 
						|
 | 
						|
    if (((lsa_len % 4) != 0) || (lsa_len <= sizeof(struct ospf_lsa_header)))
 | 
						|
      goto invalid;
 | 
						|
 | 
						|
    ospf_dump_lsahdr(p, lsa);
 | 
						|
    offset += lsa_len;
 | 
						|
  }
 | 
						|
  return;
 | 
						|
 | 
						|
invalid:
 | 
						|
  log(L_TRACE "%s:     LSA      invalid", p->p.name);
 | 
						|
  return;
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
static inline void
 | 
						|
ospf_lsa_lsrq_down(struct top_hash_entry *req, struct ospf_neighbor *n, struct ospf_neighbor *from)
 | 
						|
{
 | 
						|
  if (req == n->lsrqi)
 | 
						|
    n->lsrqi = SNODE_NEXT(req);
 | 
						|
 | 
						|
  s_rem_node(SNODE req);
 | 
						|
  ospf_hash_delete(n->lsrqh, req);
 | 
						|
 | 
						|
  if (EMPTY_SLIST(n->lsrql))
 | 
						|
  {
 | 
						|
    tm_stop(n->lsrq_timer);
 | 
						|
 | 
						|
    if (n->state == NEIGHBOR_LOADING)
 | 
						|
      ospf_neigh_sm(n, INM_LOADDONE);
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
static inline void
 | 
						|
ospf_lsa_lsrt_up(struct top_hash_entry *en, struct ospf_neighbor *n)
 | 
						|
{
 | 
						|
  struct top_hash_entry *ret = ospf_hash_get_entry(n->lsrth, en);
 | 
						|
 | 
						|
  if (!SNODE_VALID(ret))
 | 
						|
  {
 | 
						|
    en->ret_count++;
 | 
						|
    s_add_tail(&n->lsrtl, SNODE ret);
 | 
						|
  }
 | 
						|
 | 
						|
  ret->lsa = en->lsa;
 | 
						|
  ret->lsa_body = LSA_BODY_DUMMY;
 | 
						|
 | 
						|
  if (!tm_active(n->lsrt_timer))
 | 
						|
    tm_start(n->lsrt_timer, n->ifa->rxmtint);
 | 
						|
}
 | 
						|
 | 
						|
void
 | 
						|
ospf_lsa_lsrt_down_(struct top_hash_entry *en, struct ospf_neighbor *n, struct top_hash_entry *ret)
 | 
						|
{
 | 
						|
  if (en)
 | 
						|
    en->ret_count--;
 | 
						|
 | 
						|
  s_rem_node(SNODE ret);
 | 
						|
  ospf_hash_delete(n->lsrth, ret);
 | 
						|
 | 
						|
  if (EMPTY_SLIST(n->lsrtl))
 | 
						|
    tm_stop(n->lsrt_timer);
 | 
						|
}
 | 
						|
 | 
						|
static inline int
 | 
						|
ospf_lsa_lsrt_down(struct top_hash_entry *en, struct ospf_neighbor *n)
 | 
						|
{
 | 
						|
  struct top_hash_entry *ret = ospf_hash_find_entry(n->lsrth, en);
 | 
						|
 | 
						|
  if (ret)
 | 
						|
    ospf_lsa_lsrt_down_(en, n, ret);
 | 
						|
 | 
						|
  return ret != NULL;
 | 
						|
}
 | 
						|
 | 
						|
void
 | 
						|
ospf_add_flushed_to_lsrt(struct ospf_proto *p, struct ospf_neighbor *n)
 | 
						|
{
 | 
						|
  struct top_hash_entry *en;
 | 
						|
 | 
						|
  WALK_SLIST(en, p->lsal)
 | 
						|
    if ((en->lsa.age == LSA_MAXAGE) && (en->lsa_body != NULL) &&
 | 
						|
	lsa_flooding_allowed(en->lsa_type, en->domain, n->ifa))
 | 
						|
      ospf_lsa_lsrt_up(en, n);
 | 
						|
 | 
						|
  /* If we found any flushed LSA, we send them ASAP */
 | 
						|
  if (tm_active(n->lsrt_timer))
 | 
						|
    tm_start(n->lsrt_timer, 0);
 | 
						|
}
 | 
						|
 | 
						|
static int ospf_flood_lsupd(struct ospf_proto *p, struct top_hash_entry **lsa_list, uint lsa_count, uint lsa_min_count, struct ospf_iface *ifa);
 | 
						|
 | 
						|
static void
 | 
						|
ospf_enqueue_lsa(struct ospf_proto *p, struct top_hash_entry *en, struct ospf_iface *ifa)
 | 
						|
{
 | 
						|
  if (ifa->flood_queue_used == ifa->flood_queue_size)
 | 
						|
  {
 | 
						|
    /* If we already have full queue, we send some packets */
 | 
						|
    uint sent = ospf_flood_lsupd(p, ifa->flood_queue, ifa->flood_queue_used, ifa->flood_queue_used / 2, ifa);
 | 
						|
    int i;
 | 
						|
 | 
						|
    for (i = 0; i < sent; i++)
 | 
						|
      ifa->flood_queue[i]->ret_count--;
 | 
						|
 | 
						|
    ifa->flood_queue_used -= sent;
 | 
						|
    memmove(ifa->flood_queue, ifa->flood_queue + sent, ifa->flood_queue_used * sizeof(void *));
 | 
						|
    bzero(ifa->flood_queue + ifa->flood_queue_used, sent * sizeof(void *));
 | 
						|
  }
 | 
						|
 | 
						|
  en->ret_count++;
 | 
						|
  ifa->flood_queue[ifa->flood_queue_used] = en;
 | 
						|
  ifa->flood_queue_used++;
 | 
						|
 | 
						|
  if (!ev_active(p->flood_event))
 | 
						|
    ev_schedule(p->flood_event);
 | 
						|
}
 | 
						|
 | 
						|
void
 | 
						|
ospf_flood_event(void *ptr)
 | 
						|
{
 | 
						|
  struct ospf_proto *p = ptr;
 | 
						|
  struct ospf_iface *ifa;
 | 
						|
  int i, count;
 | 
						|
 | 
						|
  WALK_LIST(ifa, p->iface_list)
 | 
						|
  {
 | 
						|
    if (ifa->flood_queue_used == 0)
 | 
						|
      continue;
 | 
						|
 | 
						|
    count = ifa->flood_queue_used;
 | 
						|
    ospf_flood_lsupd(p, ifa->flood_queue, count, count, ifa);
 | 
						|
 | 
						|
    for (i = 0; i < count; i++)
 | 
						|
      ifa->flood_queue[i]->ret_count--;
 | 
						|
 | 
						|
    ifa->flood_queue_used = 0;
 | 
						|
    bzero(ifa->flood_queue, count * sizeof(void *));
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
/**
 | 
						|
 * ospf_flood_lsa - send LSA to the neighbors
 | 
						|
 * @p: OSPF protocol instance
 | 
						|
 * @en: LSA entry
 | 
						|
 * @from: neighbor than sent this LSA (or NULL if LSA is local)
 | 
						|
 *
 | 
						|
 * return value - was the LSA flooded back?
 | 
						|
 */
 | 
						|
int
 | 
						|
ospf_flood_lsa(struct ospf_proto *p, struct top_hash_entry *en, struct ospf_neighbor *from)
 | 
						|
{
 | 
						|
  struct ospf_iface *ifa;
 | 
						|
  struct ospf_neighbor *n;
 | 
						|
 | 
						|
  /* RFC 2328 13.3 */
 | 
						|
 | 
						|
  int back = 0;
 | 
						|
  WALK_LIST(ifa, p->iface_list)
 | 
						|
  {
 | 
						|
    if (ifa->stub)
 | 
						|
      continue;
 | 
						|
 | 
						|
    if (! lsa_flooding_allowed(en->lsa_type, en->domain, ifa))
 | 
						|
      continue;
 | 
						|
 | 
						|
    DBG("Wanted to flood LSA: Type: %u, ID: %R, RT: %R, SN: 0x%x, Age %u\n",
 | 
						|
	hh->type, hh->id, hh->rt, hh->sn, hh->age);
 | 
						|
 | 
						|
    int used = 0;
 | 
						|
    WALK_LIST(n, ifa->neigh_list)
 | 
						|
    {
 | 
						|
      /* 13.3 (1a) */
 | 
						|
      if (n->state < NEIGHBOR_EXCHANGE)
 | 
						|
	continue;
 | 
						|
 | 
						|
      /* 13.3 (1b) */
 | 
						|
      if (n->state < NEIGHBOR_FULL)
 | 
						|
      {
 | 
						|
	struct top_hash_entry *req = ospf_hash_find_entry(n->lsrqh, en);
 | 
						|
	if (req != NULL)
 | 
						|
	{
 | 
						|
	  int cmp = lsa_comp(&en->lsa, &req->lsa);
 | 
						|
 | 
						|
	  /* If same or newer, remove LSA from the link state request list */
 | 
						|
	  if (cmp > CMP_OLDER)
 | 
						|
	    ospf_lsa_lsrq_down(req, n, from);
 | 
						|
 | 
						|
	  /* If older or same, skip processing of this neighbor */
 | 
						|
	  if (cmp < CMP_NEWER)
 | 
						|
	    continue;
 | 
						|
	}
 | 
						|
      }
 | 
						|
 | 
						|
      /* 13.3 (1c) */
 | 
						|
      if (n == from)
 | 
						|
	continue;
 | 
						|
 | 
						|
      /* In OSPFv3, there should be check whether receiving router understand
 | 
						|
	 that type of LSA (for LSA types with U-bit == 0). But as we do not support
 | 
						|
	 any optional LSA types, this is not needed yet */
 | 
						|
 | 
						|
      /* 13.3 (1d) - add LSA to the link state retransmission list */
 | 
						|
      ospf_lsa_lsrt_up(en, n);
 | 
						|
 | 
						|
      used = 1;
 | 
						|
    }
 | 
						|
 | 
						|
    /* 13.3 (2) */
 | 
						|
    if (!used)
 | 
						|
      continue;
 | 
						|
 | 
						|
    if (from && (from->ifa == ifa))
 | 
						|
    {
 | 
						|
      /* 13.3 (3) */
 | 
						|
      if ((from->rid == ifa->drid) || (from->rid == ifa->bdrid))
 | 
						|
	continue;
 | 
						|
 | 
						|
      /* 13.3 (4) */
 | 
						|
      if (ifa->state == OSPF_IS_BACKUP)
 | 
						|
	continue;
 | 
						|
 | 
						|
      back = 1;
 | 
						|
    }
 | 
						|
 | 
						|
    /* 13.3 (5) - finally flood the packet */
 | 
						|
    ospf_enqueue_lsa(p, en, ifa);
 | 
						|
  }
 | 
						|
 | 
						|
  return back;
 | 
						|
}
 | 
						|
 | 
						|
static uint
 | 
						|
ospf_prepare_lsupd(struct ospf_proto *p, struct ospf_iface *ifa,
 | 
						|
		   struct top_hash_entry **lsa_list, uint lsa_count)
 | 
						|
{
 | 
						|
  struct ospf_packet *pkt;
 | 
						|
  uint hlen, pos, i, maxsize;
 | 
						|
 | 
						|
  pkt = ospf_tx_buffer(ifa);
 | 
						|
  hlen = ospf_lsupd_hdrlen(p);
 | 
						|
  maxsize = ospf_pkt_maxsize(p, ifa);
 | 
						|
 | 
						|
  ospf_pkt_fill_hdr(ifa, pkt, LSUPD_P);
 | 
						|
  pos = hlen;
 | 
						|
 | 
						|
  for (i = 0; i < lsa_count; i++)
 | 
						|
  {
 | 
						|
    struct top_hash_entry *en = lsa_list[i];
 | 
						|
    uint len = en->lsa.length;
 | 
						|
 | 
						|
    if ((pos + len) > maxsize)
 | 
						|
    {
 | 
						|
      /* The packet if full, stop adding LSAs and sent it */
 | 
						|
      if (i > 0)
 | 
						|
	break;
 | 
						|
 | 
						|
      /* LSA is larger than MTU, check buffer size */
 | 
						|
      if (ospf_iface_assure_bufsize(ifa, pos + len) < 0)
 | 
						|
      {
 | 
						|
	/* Cannot fit in a tx buffer, skip that */
 | 
						|
	log(L_ERR "%s: LSA too large to send on %s (Type: %04x, Id: %R, Rt: %R)",
 | 
						|
	    p->p.name, ifa->ifname, en->lsa_type, en->lsa.id, en->lsa.rt);
 | 
						|
	break;
 | 
						|
      }
 | 
						|
 | 
						|
      /* TX buffer could be reallocated */
 | 
						|
      pkt = ospf_tx_buffer(ifa);
 | 
						|
    }
 | 
						|
 | 
						|
    struct ospf_lsa_header *buf = ((void *) pkt) + pos;
 | 
						|
    lsa_hton_hdr(&en->lsa, buf);
 | 
						|
    lsa_hton_body(en->lsa_body, ((void *) buf) + sizeof(struct ospf_lsa_header),
 | 
						|
		  len - sizeof(struct ospf_lsa_header));
 | 
						|
    buf->age = htons(MIN(en->lsa.age + ifa->inftransdelay, LSA_MAXAGE));
 | 
						|
 | 
						|
    pos += len;
 | 
						|
  }
 | 
						|
 | 
						|
  ospf_lsupd_set_lsa_count(pkt, hlen, i);
 | 
						|
  pkt->length = htons(pos);
 | 
						|
 | 
						|
  return i;
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
static int
 | 
						|
ospf_flood_lsupd(struct ospf_proto *p, struct top_hash_entry **lsa_list, uint lsa_count, uint lsa_min_count, struct ospf_iface *ifa)
 | 
						|
{
 | 
						|
  uint i, c;
 | 
						|
 | 
						|
  for (i = 0; i < lsa_min_count; i += c)
 | 
						|
  {
 | 
						|
    c = ospf_prepare_lsupd(p, ifa, lsa_list + i, lsa_count - i);
 | 
						|
 | 
						|
    if (!c)	/* Too large LSA */
 | 
						|
      { i++; continue; }
 | 
						|
 | 
						|
    OSPF_PACKET(ospf_dump_lsupd, ospf_tx_buffer(ifa),
 | 
						|
		"LSUPD packet flooded via %s", ifa->ifname);
 | 
						|
 | 
						|
    if (ifa->type == OSPF_IT_BCAST)
 | 
						|
    {
 | 
						|
      if ((ifa->state == OSPF_IS_DR) || (ifa->state == OSPF_IS_BACKUP))
 | 
						|
	ospf_send_to_all(ifa);
 | 
						|
      else
 | 
						|
	ospf_send_to_des(ifa);
 | 
						|
    }
 | 
						|
    else
 | 
						|
      ospf_send_to_agt(ifa, NEIGHBOR_EXCHANGE);
 | 
						|
  }
 | 
						|
 | 
						|
  return i;
 | 
						|
}
 | 
						|
 | 
						|
int
 | 
						|
ospf_send_lsupd(struct ospf_proto *p, struct top_hash_entry **lsa_list, uint lsa_count, struct ospf_neighbor *n)
 | 
						|
{
 | 
						|
  struct ospf_iface *ifa = n->ifa;
 | 
						|
  uint i, c;
 | 
						|
 | 
						|
  for (i = 0; i < lsa_count; i += c)
 | 
						|
  {
 | 
						|
    c = ospf_prepare_lsupd(p, ifa, lsa_list + i, lsa_count - i);
 | 
						|
 | 
						|
    if (!c)	/* Too large LSA */
 | 
						|
      { i++; continue; }
 | 
						|
 | 
						|
    OSPF_PACKET(ospf_dump_lsupd, ospf_tx_buffer(ifa),
 | 
						|
		"LSUPD packet sent to nbr %R on %s", n->rid, ifa->ifname);
 | 
						|
 | 
						|
    ospf_send_to(ifa, n->ip);
 | 
						|
  }
 | 
						|
 | 
						|
  return i;
 | 
						|
}
 | 
						|
 | 
						|
void
 | 
						|
ospf_rxmt_lsupd(struct ospf_proto *p, struct ospf_neighbor *n)
 | 
						|
{
 | 
						|
  uint max = 2 * n->ifa->flood_queue_size;
 | 
						|
  struct top_hash_entry *entries[max];
 | 
						|
  struct top_hash_entry *ret, *nxt, *en;
 | 
						|
  uint i = 0;
 | 
						|
 | 
						|
  /* ASSERT((n->state >= NEIGHBOR_EXCHANGE) && !EMPTY_SLIST(n->lsrtl)); */
 | 
						|
 | 
						|
  WALK_SLIST_DELSAFE(ret, nxt, n->lsrtl)
 | 
						|
  {
 | 
						|
    if (i == max)
 | 
						|
      break;
 | 
						|
 | 
						|
    en = ospf_hash_find_entry(p->gr, ret);
 | 
						|
    if (!en)
 | 
						|
    {
 | 
						|
      /* Probably flushed LSA, this should not happen */
 | 
						|
      log(L_WARN "%s: LSA disappeared (Type: %04x, Id: %R, Rt: %R)",
 | 
						|
	  p->p.name, ret->lsa_type, ret->lsa.id, ret->lsa.rt);
 | 
						|
 | 
						|
      s_rem_node(SNODE ret);
 | 
						|
      ospf_hash_delete(n->lsrth, ret);
 | 
						|
 | 
						|
      continue;
 | 
						|
    }
 | 
						|
 | 
						|
    entries[i] = en;
 | 
						|
    i++;
 | 
						|
  }
 | 
						|
 | 
						|
  ospf_send_lsupd(p, entries, i, n);
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
static inline int
 | 
						|
ospf_addr_is_local(struct ospf_proto *p, struct ospf_area *oa, ip_addr ip)
 | 
						|
{
 | 
						|
  struct ospf_iface *ifa;
 | 
						|
  WALK_LIST(ifa, p->iface_list)
 | 
						|
    if ((ifa->oa == oa) && ifa->addr && ipa_equal(ifa->addr->ip, ip))
 | 
						|
      return 1;
 | 
						|
 | 
						|
  return 0;
 | 
						|
}
 | 
						|
 | 
						|
void
 | 
						|
ospf_receive_lsupd(struct ospf_packet *pkt, struct ospf_iface *ifa,
 | 
						|
		   struct ospf_neighbor *n)
 | 
						|
{
 | 
						|
  struct ospf_proto *p = ifa->oa->po;
 | 
						|
  const char *err_dsc = NULL;
 | 
						|
  uint plen, err_val = 0;
 | 
						|
 | 
						|
  /* RFC 2328 13. */
 | 
						|
 | 
						|
  plen = ntohs(pkt->length);
 | 
						|
  if (plen < ospf_lsupd_hdrlen(p))
 | 
						|
  {
 | 
						|
    LOG_PKT("Bad LSUPD packet from nbr %R on %s - %s (%u)", n->rid, ifa->ifname, "too short", plen);
 | 
						|
    return;
 | 
						|
  }
 | 
						|
 | 
						|
  OSPF_PACKET(ospf_dump_lsupd, pkt, "LSUPD packet received from nbr %R on %s", n->rid, ifa->ifname);
 | 
						|
 | 
						|
  if (n->state < NEIGHBOR_EXCHANGE)
 | 
						|
  {
 | 
						|
    OSPF_TRACE(D_PACKETS, "LSUPD packet ignored - lesser state than Exchange");
 | 
						|
    return;
 | 
						|
  }
 | 
						|
 | 
						|
  ospf_neigh_sm(n, INM_HELLOREC);	/* Questionable */
 | 
						|
 | 
						|
  uint offset, i, lsa_count;
 | 
						|
  ospf_lsupd_body(p, pkt, &offset, &lsa_count);
 | 
						|
 | 
						|
  for (i = 0; i < lsa_count; i++)
 | 
						|
  {
 | 
						|
    struct ospf_lsa_header lsa, *lsa_n;
 | 
						|
    struct top_hash_entry *en;
 | 
						|
    u32 lsa_len, lsa_type, lsa_domain;
 | 
						|
 | 
						|
    if ((offset + sizeof(struct ospf_lsa_header)) > plen)
 | 
						|
      DROP("too short", plen);
 | 
						|
 | 
						|
    /* LSA header in network order */
 | 
						|
    lsa_n = ((void *) pkt) + offset;
 | 
						|
    lsa_len = ntohs(lsa_n->length);
 | 
						|
    offset += lsa_len;
 | 
						|
 | 
						|
    if (offset > plen)
 | 
						|
      DROP("too short", plen);
 | 
						|
 | 
						|
    if (((lsa_len % 4) != 0) || (lsa_len <= sizeof(struct ospf_lsa_header)))
 | 
						|
      DROP("invalid LSA length", lsa_len);
 | 
						|
 | 
						|
    /* LSA header in host order */
 | 
						|
    lsa_ntoh_hdr(lsa_n, &lsa);
 | 
						|
    lsa_get_type_domain(&lsa, ifa, &lsa_type, &lsa_domain);
 | 
						|
 | 
						|
    DBG("Update Type: %04x, Id: %R, Rt: %R, Sn: 0x%08x, Age: %u, Sum: %u\n",
 | 
						|
	lsa_type, lsa.id, lsa.rt, lsa.sn, lsa.age, lsa.checksum);
 | 
						|
 | 
						|
    /* RFC 2328 13. (1) - verify LSA checksum */
 | 
						|
    if ((lsa_n->checksum == 0) || !lsa_verify_checksum(lsa_n, lsa_len))
 | 
						|
      SKIP("invalid checksum");
 | 
						|
 | 
						|
    /* RFC 2328 13. (2) */
 | 
						|
    if (!lsa_type)
 | 
						|
      SKIP("unknown type");
 | 
						|
 | 
						|
    /* RFC 5340 4.5.1 (2) and RFC 2328 13. (3) */
 | 
						|
    if (!oa_is_ext(ifa->oa) && (LSA_SCOPE(lsa_type) == LSA_SCOPE_AS))
 | 
						|
      SKIP("AS scope in stub area");
 | 
						|
 | 
						|
    /* Errata 3746 to RFC 2328 - rt-summary-LSAs forbidden in stub areas */
 | 
						|
    if (!oa_is_ext(ifa->oa) && (lsa_type == LSA_T_SUM_RT))
 | 
						|
      SKIP("rt-summary-LSA in stub area");
 | 
						|
 | 
						|
    /* RFC 5340 4.5.1 (3) */
 | 
						|
    if (LSA_SCOPE(lsa_type) == LSA_SCOPE_RES)
 | 
						|
      SKIP("invalid scope");
 | 
						|
 | 
						|
    /* Find local copy of LSA in link state database */
 | 
						|
    en = ospf_hash_find(p->gr, lsa_domain, lsa.id, lsa.rt, lsa_type);
 | 
						|
 | 
						|
#ifdef LOCAL_DEBUG
 | 
						|
    if (en)
 | 
						|
      DBG("I have Type: %04x, Id: %R, Rt: %R, Sn: 0x%08x, Age: %u, Sum: %u\n",
 | 
						|
	  en->lsa_type, en->lsa.id, en->lsa.rt, en->lsa.sn, en->lsa.age, en->lsa.checksum);
 | 
						|
#endif
 | 
						|
 | 
						|
    /* 13. (4) - ignore maxage LSA if i have no local copy */
 | 
						|
    if ((lsa.age == LSA_MAXAGE) && !en && (p->padj == 0))
 | 
						|
    {
 | 
						|
      /* 13.5. - schedule ACKs (tbl 19, case 5) */
 | 
						|
      ospf_enqueue_lsack(n, lsa_n, ACKL_DIRECT);
 | 
						|
      continue;
 | 
						|
    }
 | 
						|
 | 
						|
    /* 13. (5) - received LSA is newer (or no local copy) */
 | 
						|
    if (!en || (lsa_comp(&lsa, &en->lsa) == CMP_NEWER))
 | 
						|
    {
 | 
						|
      /* 13. (5a) - enforce minimum time between updates for received LSAs */
 | 
						|
      /* We also use this to ratelimit reactions to received self-originated LSAs */
 | 
						|
      if (en && ((now - en->inst_time) < MINLSARRIVAL))
 | 
						|
      {
 | 
						|
	OSPF_TRACE(D_EVENTS, "Skipping LSA received in less that MinLSArrival");
 | 
						|
	continue;
 | 
						|
      }
 | 
						|
 | 
						|
      /* Copy and validate LSA body */
 | 
						|
      int blen = lsa.length - sizeof(struct ospf_lsa_header);
 | 
						|
      void *body = mb_alloc(p->p.pool, blen);
 | 
						|
      lsa_ntoh_body(lsa_n + 1, body, blen);
 | 
						|
 | 
						|
      if (lsa_validate(&lsa, lsa_type, ospf_is_v2(p), body) == 0)
 | 
						|
      {
 | 
						|
	mb_free(body);
 | 
						|
	SKIP("invalid body");
 | 
						|
      }
 | 
						|
 | 
						|
      /* 13. (5f) - handle self-originated LSAs, see also 13.4. */
 | 
						|
      if ((lsa.rt == p->router_id) ||
 | 
						|
	  (ospf_is_v2(p) && (lsa_type == LSA_T_NET) && ospf_addr_is_local(p, ifa->oa, ipa_from_u32(lsa.id))))
 | 
						|
      {
 | 
						|
	OSPF_TRACE(D_EVENTS, "Received unexpected self-originated LSA");
 | 
						|
	ospf_advance_lsa(p, en, &lsa, lsa_type, lsa_domain, body);
 | 
						|
	continue;
 | 
						|
      }
 | 
						|
 | 
						|
      /* 13. (5c) - remove old LSA from all retransmission lists
 | 
						|
       *
 | 
						|
       * We only need to remove it from the retransmission list of the neighbor
 | 
						|
       * that send us the new LSA. The old LSA is automatically replaced in
 | 
						|
       * retransmission lists by the new LSA.
 | 
						|
       */
 | 
						|
      if (en)
 | 
						|
	ospf_lsa_lsrt_down(en, n);
 | 
						|
 | 
						|
#if 0
 | 
						|
      /*
 | 
						|
       * Old code for removing LSA from all retransmission lists. Must be done
 | 
						|
       * before (5b), otherwise it also removes the new entries from (5b).
 | 
						|
       */
 | 
						|
      struct ospf_iface *ifi;
 | 
						|
      struct ospf_neighbor *ni;
 | 
						|
 | 
						|
      WALK_LIST(ifi, p->iface_list)
 | 
						|
	WALK_LIST(ni, ifi->neigh_list)
 | 
						|
	  if (ni->state > NEIGHBOR_EXSTART)
 | 
						|
	    ospf_lsa_lsrt_down(en, ni);
 | 
						|
#endif
 | 
						|
 | 
						|
      /* 13. (5d) - install new LSA into database */
 | 
						|
      en = ospf_install_lsa(p, &lsa, lsa_type, lsa_domain, body);
 | 
						|
 | 
						|
      /* RFC 5340 4.4.3 Events 6+7 - new Link LSA received */
 | 
						|
      if (lsa_type == LSA_T_LINK)
 | 
						|
	ospf_notify_net_lsa(ifa);
 | 
						|
 | 
						|
      /* 13. (5b) - flood new LSA */
 | 
						|
      int flood_back = ospf_flood_lsa(p, en, n);
 | 
						|
 | 
						|
      /* 13.5. - schedule ACKs (tbl 19, cases 1+2) */
 | 
						|
      if (! flood_back)
 | 
						|
	if ((ifa->state != OSPF_IS_BACKUP) || (n->rid == ifa->drid))
 | 
						|
	  ospf_enqueue_lsack(n, lsa_n, ACKL_DELAY);
 | 
						|
 | 
						|
      /* FIXME: remove LSA entry if it is LSA_MAXAGE and it is possible? */
 | 
						|
 | 
						|
      continue;
 | 
						|
    }
 | 
						|
 | 
						|
    /* 13. (6) - received LSA is in Link state request list (but not newer) */
 | 
						|
    if (ospf_hash_find_entry(n->lsrqh, en) != NULL)
 | 
						|
      DROP1("error in LSA database exchange");
 | 
						|
 | 
						|
    /* 13. (7) - received LSA is same */
 | 
						|
    if (lsa_comp(&lsa, &en->lsa) == CMP_SAME)
 | 
						|
    {
 | 
						|
      /* Duplicate LSA, treat as implicit ACK */
 | 
						|
      int implicit_ack = ospf_lsa_lsrt_down(en, n);
 | 
						|
 | 
						|
      /* 13.5. - schedule ACKs (tbl 19, cases 3+4) */
 | 
						|
      if (implicit_ack)
 | 
						|
      {
 | 
						|
	if ((ifa->state == OSPF_IS_BACKUP) && (n->rid == ifa->drid))
 | 
						|
	  ospf_enqueue_lsack(n, lsa_n, ACKL_DELAY);
 | 
						|
      }
 | 
						|
      else
 | 
						|
	ospf_enqueue_lsack(n, lsa_n, ACKL_DIRECT);
 | 
						|
 | 
						|
      continue;
 | 
						|
    }
 | 
						|
 | 
						|
    /* 13. (8) - received LSA is older */
 | 
						|
    {
 | 
						|
      /* Seqnum is wrapping, wait until it is flushed */
 | 
						|
      if ((en->lsa.age == LSA_MAXAGE) && (en->lsa.sn == LSA_MAXSEQNO))
 | 
						|
	continue;
 | 
						|
 | 
						|
      /* Send newer local copy back to neighbor */
 | 
						|
      /* FIXME - check for MinLSArrival ? */
 | 
						|
      ospf_send_lsupd(p, &en, 1, n);
 | 
						|
 | 
						|
      continue;
 | 
						|
    }
 | 
						|
 | 
						|
  skip:
 | 
						|
    LOG_LSA1("Bad LSA (Type: %04x, Id: %R, Rt: %R) in LSUPD", lsa_type, lsa.id, lsa.rt);
 | 
						|
    LOG_LSA2("  received from nbr %R on %s - %s", n->rid, ifa->ifname, err_dsc);
 | 
						|
  }
 | 
						|
 | 
						|
  /* Send direct LSACKs */
 | 
						|
  ospf_send_lsack(p, n, ACKL_DIRECT);
 | 
						|
 | 
						|
  /* Send enqueued LSAs immediately, do not wait for flood_event */
 | 
						|
  if (ev_active(p->flood_event))
 | 
						|
  {
 | 
						|
    ev_postpone(p->flood_event);
 | 
						|
    ospf_flood_event(p);
 | 
						|
  }
 | 
						|
 | 
						|
  /*
 | 
						|
   * During loading, we should ask for another batch of LSAs. This is only
 | 
						|
   * vaguely mentioned in RFC 2328. We send a new LSREQ if all requests sent in
 | 
						|
   * the last packet were already answered and/or removed from the LS request
 | 
						|
   * list and therefore lsrqi is pointing to the first node of the list.
 | 
						|
   */
 | 
						|
  if (!EMPTY_SLIST(n->lsrql) && (n->lsrqi == SHEAD(n->lsrql)))
 | 
						|
  {
 | 
						|
    ospf_send_lsreq(p, n);
 | 
						|
    tm_start(n->lsrq_timer, n->ifa->rxmtint);
 | 
						|
  }
 | 
						|
 | 
						|
  return;
 | 
						|
 | 
						|
drop:
 | 
						|
  LOG_PKT("Bad LSUPD packet from nbr %R on %s - %s (%u)",
 | 
						|
	  n->rid, ifa->ifname, err_dsc, err_val);
 | 
						|
 | 
						|
  /* Malformed LSUPD - there is no defined error event, we abuse BadLSReq */
 | 
						|
  ospf_neigh_sm(n, INM_BADLSREQ);
 | 
						|
  return;
 | 
						|
}
 |