Commit Graph

19809 Commits

Author SHA1 Message Date
Donald Sharp
75e43de7a6
Merge pull request #6048 from sarav511/joinsup
pimd: In join suppression period, join is being sent
2020-06-01 07:36:24 -04:00
Donatas Abraitis
1f0628c7d8
Merge pull request #6467 from qlyoung/fix-bgp-logrotation
bgpd: avoid spamming bgp_accept() on bad vrf sock
2020-06-01 08:46:26 +03:00
Donatas Abraitis
a6796c4141
Merge pull request #6490 from qlyoung/fix-alpine-python3-build
alpine: update packages
2020-06-01 07:57:26 +03:00
Quentin Young
2f9db11bd8 bgpd: avoid spamming bgp_accept() on bad vrf sock
bgp_accept() gets called over and over again when a VRF device is
deleted out from under a bgp listener socket that is bound to it.
Prevent this by noting the error and cancelling ourselves, allowing the
vrf status code to clean up the mess when it receives word about the
change from Zebra.

Signed-off-by: Quentin Young <qlyoung@cumulusnetworks.com>
2020-05-31 04:28:30 -04:00
Quentin Young
582f35c88c alpine: update packages
Alpine builds have been failing for some time as a consequence of only
installing python 2 development packages when we have build scripts that
require python 3.

Signed-off-by: Quentin Young <qlyoung@cumulusnetworks.com>
2020-05-31 04:10:33 -04:00
Donatas Abraitis
e0281c9f2f
Merge pull request #6484 from kaloom/master
bgpd: Fix "malformed communities" for accept-own-nexthop
2020-05-31 10:33:57 +03:00
Donatas Abraitis
c6d47a7f02
Merge pull request #6488 from donaldsharp/more_useful_debug
More useful debug
2020-05-31 10:31:54 +03:00
Donald Sharp
450696226d bgpd: Improve connection rejection messages
Try to give a bit more useful data about where we
think the connection is trying to come in from.
Hopefully this will let us debug connection issues
a bit faster in cases where there are config issues.

Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
2020-05-30 15:44:54 -04:00
Donald Sharp
1eaa9fc0e5 doc: Fix warning about incorrect underline length
The recent change for more snmp doc gave us a sphinx error.
Let's clean it up.

Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
2020-05-30 15:43:30 -04:00
Renato Westphal
a3c669b9e1
Merge pull request #6482 from donaldsharp/update_snmp_rst
doc: Update snmp.rst
2020-05-30 00:17:11 -03:00
Renato Westphal
ca850f0094
Merge pull request #6479 from volta-networks/fix_isis_if_addr_te
isisd: fix issue with local address TE TLV
2020-05-29 23:59:33 -03:00
Appu Joseph
68f36a94da bgpd: Fix "malformed communities" for accept-own-nexthop
"set community accept-own-nexthop" returns "malformed communities"
error. This is because the token matching hits an earlier "accept-own"
and leaves "-nexthop" as a separate token to be processed.
Reorder the switch cases so that both are processed correctly.

Signed-off-by: Appu Joseph <apjo@kaloom.com>
2020-05-29 14:36:07 -04:00
Emanuele Di Pascale
d80e23f8d3 isisd: fix local address TE TLV
we were not correctly checking the MPLS-TE status of the area when
adding an IP address to a circuit, and this was preventing the local
address TLV to be populated after an interfaced flap.

Signed-off-by: Emanuele Di Pascale <emanuele@voltanet.io>
2020-05-29 16:41:16 +02:00
Bart Vrancken
6f6d86069b doc: Update snmp.rst
Updated documentation for routers with a large route table, which breaks
SNMP/AgentX and in some conditions even crashes FRR. The documentation
proposal amends the SNMP configuration to exclude certain OID's that
are not needed in normal cases.

Format-fixed-by: Donald Sharp <sharpd@cumulusnetworks.com>
Signed-off-by: Bart Vrancken <bart@abuse.io>
2020-05-29 08:06:33 -04:00
Renato Westphal
276b698a43
Merge pull request #6481 from donaldsharp/bgp_thread_cancel
bgpd: Use THREAD_CANCEL instead of thread_cancel
2020-05-28 20:28:31 -03:00
Renato Westphal
ca4f4a3660
Merge pull request #6416 from Orange-OpenSource/master
ospfd: Solve crash after removing and adding conf.
2020-05-28 20:03:43 -03:00
Donald Sharp
e2d409a88b bgpd: Use THREAD_CANCEL instead of thread_cancel
We are crashing in thread_cancel on shutdown because
the thread pointer is NULL.  Use the more appropriate
THREAD_CANCEL macro

Ticket: CM-29873
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
2020-05-28 16:51:11 -04:00
Stephen Worley
c6a9c60f97
Merge pull request #6478 from mjstapp/dev_doc_more_const
doc: encourage const in the developer doc
2020-05-28 15:02:00 -04:00
Mark Stapp
6b2210021c
Merge pull request #6476 from wesleycoakley/zebra-debuglogfix
zebra, lib: bugfix for zebra packet debugging messages
2020-05-28 13:40:39 -04:00
Mark Stapp
7d68dd44ff doc: encourage const in the developer doc
Add a little text about using 'const' in the dev doc.

Signed-off-by: Mark Stapp <mjs@voltanet.io>
2020-05-28 12:37:51 -04:00
Wesley Coakley
f1bc75dac6 lib: stream_hexdump takes const struct
Signed-off-by: Wesley Coakley <wcoakley@cumulusnetworks.com>
2020-05-28 11:18:11 -04:00
Mark Stapp
5e5e7a6cde
Merge pull request #6466 from opensourcerouting/frr-reload-cleanup
tools/frr-reload: cleanup + `--vty_socket`
2020-05-28 11:06:20 -04:00
Mark Stapp
ef5c9dd6be
Merge pull request #6475 from donaldsharp/pim_thread_cancel
pimd: Fix crash on restart from thread_cancel
2020-05-28 11:02:57 -04:00
Wesley Coakley
9d72660d67 zebra, lib: bugfix on zebra packet debugging
`debug zebra packet detail` dumps the full message whereas
it had been dropping exactly 10 bytes, the size of the zebra header

Signed-off-by: Wesley Coakley <wcoakley@cumulusnetworks.com>
2020-05-28 10:48:56 -04:00
Donald Sharp
5308f26738
Merge pull request #6474 from ton31337/fix/doc_bgp_community
doc: Update BGP show bgp (ext|large-)community-list commands
2020-05-28 08:55:16 -04:00
Donald Sharp
c58a47ea2e pimd: Fix crash on restart from thread_cancel
We were using thread_cancel() directly instead of
THREAD_OFF which correctly ensures the pointer is not NULL.

Ticket:CM-29866
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
2020-05-28 08:53:13 -04:00
Donatas Abraitis
36dc43aae3 doc: Update BGP show bgp (ext|large-)community-list commands
Signed-off-by: Donatas Abraitis <donatas.abraitis@gmail.com>
2020-05-28 12:34:24 +03:00
Donald Sharp
c0b664a187
Merge pull request #6469 from mjstapp/add_ubu_20_doc
doc: add dev doc for ubuntu 20.04
2020-05-27 10:43:05 -04:00
Donald Sharp
2011994ee6
Merge pull request #6447 from opensourcerouting/rename-bgp-vrf-leak
topotest: refactory BGP VRF leak basic test
2020-05-27 10:34:13 -04:00
Mark Stapp
252ca75b61 doc: add dev doc for ubuntu 20.04
Add a doc for ubuntu 20 LTS; it's mainly the same as the 18 LTS
doc, with a couple of extra notes.

Signed-off-by: Mark Stapp <mjs@voltanet.io>
2020-05-27 08:49:36 -04:00
Emanuele Di Pascale
c01f5f2145 doc: add docs for frr-reload.py options
Signed-off-by: Emanuele Di Pascale <emanuele@voltanet.io>
2020-05-26 19:14:12 +02:00
David Lamparter
fa18c6bbda tools/frr-reload: --vty_socket arg
After the cleanup, adding this doesn't require updating a zillion
locations in the code anymore, just one :)

Partially derived from 6a00e91d99f7f98d857c2056d0dcfeba48966581

Originally-by: Emanuele Di Pascale <emanuele@voltanet.io>
Signed-off-by: David Lamparter <equinox@opensourcerouting.org>
2020-05-26 19:14:00 +02:00
David Lamparter
663ece2f6d tools/frr-reload: cleanup pass
- throw vtysh into a wrapper class
- ignore "username" commands
- use mark output on stdout
- some other random cleanups

Signed-off-by: David Lamparter <equinox@diac24.net>
2020-05-26 19:09:32 +02:00
David Lamparter
309414434b vtysh: add "no-header" to show running-config
... to skip the "Building configuration..." header that gets in the way
of automated processing.

Signed-off-by: David Lamparter <equinox@opensourcerouting.org>
2020-05-26 19:09:32 +02:00
David Lamparter
812f088032 vtysh: throw mark output on stdout, not stderr
Why is this on stderr...

Signed-off-by: David Lamparter <equinox@diac24.net>
2020-05-26 19:09:32 +02:00
Russ White
eeec40ba69
Merge pull request #6375 from adharkar/frr-master-l3vni_label
bgpd: EVPN RT-2 advertised with 2 labels for prefix-routes-only config
2020-05-26 12:14:16 -04:00
Sri Mohana Singamsetty
06fba5cb4c
Merge pull request #6463 from vivek-cumulus/evpn_extend_nht
bgpd: Extend EVPN next hop tracking for additional EVPN routes
2020-05-26 08:18:29 -07:00
Donald Sharp
310885bdd8
Merge pull request #5881 from patrasar/2386420
pimd: add show ip multicast count [json] command
2020-05-26 09:21:10 -04:00
Russ White
88890f1ba9
Merge pull request #6441 from opensourcerouting/ospf-doc
ospfd: small doc and cli changes
2020-05-26 07:45:30 -04:00
Russ White
827ac53ed2
Merge pull request #6445 from donaldsharp/really_start_all_daemons
tests: Turn on nhrpd and babeld as part of all-protocol-startup
2020-05-26 07:44:48 -04:00
Russ White
e3d230af81
Merge pull request #6458 from vivek-cumulus/bgp_nht_command_enhance
bgpd: Enhance BGP NHT show commands
2020-05-26 07:32:12 -04:00
Russ White
a5e845f314
Merge pull request #6459 from vivek-cumulus/bgp_nht_fix
Fix BGP NHT to skip inappropriate paths & only act upon change
2020-05-26 07:29:25 -04:00
Russ White
de176cecdb
Merge pull request #6462 from vivek-cumulus/lib_evpn_prefix_fix
lib: Minor update to EVPN type-5 prefix display
2020-05-26 07:28:26 -04:00
Olivier Dugeon
731271b0bd ospfd: Solve crash after removing and adding conf.
Issue number #6291 describes how OSPFd crashes after being deleted and then
added again with configuration when segment routing is used.

The problem occurs in ospf_ri.c because the OspfRI structures retains
the reference to the old area pointer which is mofified when ospfd is
reactivated by configuration. When segment routing is activated, the LSA Router
Information is sent with reference to the old area pointer, instead the new one,
which causes the crash. The same problem is also present in ospf_ext.c with
OspfEXT structure and Extended Link/Prefix structure.

This commit introduces Extended Link/Prefix and Router Information LSAs flusing
when OSPFd is stopped when configuration is removed and adds the correct
initialization to the area pointer in OspfRI and Extended Link/Prefix structure
when OSPFd is re-enabled with the configuration. Area pointer has been removed
from the OspfEXT structure as it is never used with this commit.

Signed-off-by: Olivier Dugeon <olivier.dugeon@orange.com>
2020-05-26 11:57:04 +02:00
vivek
e11329ca4c bgpd: Extend EVPN next hop tracking for additional EVPN routes
Extend the next hop tracking for type-2 and type-3 EVPN routes also.

Updates: "bgpd: Add nexthop of received EVPN RT-5 for nexthop tracking"
Signed-off-by: Vivek Venkatraman <vivek@cumulusnetworks.com>
2020-05-25 23:00:49 -07:00
vivek
9be782ff9f lib: Minor update to EVPN type-5 prefix display
Signed-off-by: Vivek Venkatraman <vivek@cumulusnetworks.com>
2020-05-25 22:40:44 -07:00
vivek
0139efe084 bgpd: During NHT change evaluation, skip inappropriate paths
When there is a NHT change and the paths dependent on that NHT are being
evaluated, skip those that are marked for removal or as history.

When a route gets withdrawn, its valid flag is cleared and it is flagged
for removal; in the case of an EVPN route, it is also unimported from
VRFs (L2 and/or L3). bgp_process is then scheduled. Under rare timing
conditions, an NHT update for the route's next hop may arrive right after,
and if routes flagged for removal are not skipped, they may not only be
incorrectly marked as valid but also re-imported in the case of EVPN,
which will be a serious error.

Signed-off-by: Vivek Venkatraman <vivek@cumulusnetworks.com>
2020-05-25 14:17:12 -07:00
vivek
34ea39b65a bgpd: Check NHT change for triggering EVPN import or unimport
Ensure that only if there is a change to the path's validity based
on the NHT update, EVPN import or unimport is invoked.

Signed-off-by: Vivek Venkatraman <vivek@cumulusnetworks.com>
2020-05-25 14:15:37 -07:00
vivek
9e15d76adf bgpd: Enhance NHT path evaluation debugs
Signed-off-by: Vivek Venkatraman <vivek@cumulusnetworks.com>
2020-05-25 14:10:12 -07:00
vivek
5f0c5ec85d bgpd: Minor tweaks to EVPN route-import debugs
Signed-off-by: Vivek Venkatraman <vivek@cumulusnetworks.com>
2020-05-25 14:06:10 -07:00