-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
zebra: trigger remove all access vlans info for access port #9091
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for your contribution to FRR!
- One of your commits has a missing or badly formatted
Signed-off-by
line; we can't accept your contribution until all of your commits have one
Click for style suggestions
To apply these suggestions:
curl -s https://gist.githubusercontent.com/polychaeta/4b9d02d2d9233a1b29e575101c2d6190/raw/be1596d14d388f8f15d9f63bf80931a07e91ea61/cr_9091_1626773421.diff | git apply
diff --git a/zebra/if_netlink.c b/zebra/if_netlink.c
index 08ebe14e8..a51e0b82c 100644
--- a/zebra/if_netlink.c
+++ b/zebra/if_netlink.c
@@ -747,7 +747,7 @@ static void netlink_bridge_vlan_update(struct interface *ifp,
if (af_spec) {
for (i = RTA_DATA(af_spec), rem = RTA_PAYLOAD(af_spec);
- RTA_OK(i, rem); i = RTA_NEXT(i, rem)) {
+ RTA_OK(i, rem); i = RTA_NEXT(i, rem)) {
if (i->rta_type != IFLA_BRIDGE_VLAN_INFO)
continue;
@@ -762,7 +762,8 @@ static void netlink_bridge_vlan_update(struct interface *ifp,
if (!(vinfo->flags & BRIDGE_VLAN_INFO_RANGE_END))
vid_range_start = vinfo->vid;
- zebra_vlan_bitmap_compute(ifp, vid_range_start, vinfo->vid);
+ zebra_vlan_bitmap_compute(ifp, vid_range_start,
+ vinfo->vid);
}
}
If you are a new contributor to FRR, please see our contributing guidelines.
After making changes, you do not need to create a new PR. You should perform an amend or interactive rebase followed by a force push.
151c278
to
95098e9
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for your contribution to FRR!
Click for style suggestions
To apply these suggestions:
curl -s https://gist.githubusercontent.com/polychaeta/b79e3b7541b3da59d6859a5f578bcdf1/raw/be1596d14d388f8f15d9f63bf80931a07e91ea61/cr_9091_1626773691.diff | git apply
diff --git a/zebra/if_netlink.c b/zebra/if_netlink.c
index 08ebe14e8..a51e0b82c 100644
--- a/zebra/if_netlink.c
+++ b/zebra/if_netlink.c
@@ -747,7 +747,7 @@ static void netlink_bridge_vlan_update(struct interface *ifp,
if (af_spec) {
for (i = RTA_DATA(af_spec), rem = RTA_PAYLOAD(af_spec);
- RTA_OK(i, rem); i = RTA_NEXT(i, rem)) {
+ RTA_OK(i, rem); i = RTA_NEXT(i, rem)) {
if (i->rta_type != IFLA_BRIDGE_VLAN_INFO)
continue;
@@ -762,7 +762,8 @@ static void netlink_bridge_vlan_update(struct interface *ifp,
if (!(vinfo->flags & BRIDGE_VLAN_INFO_RANGE_END))
vid_range_start = vinfo->vid;
- zebra_vlan_bitmap_compute(ifp, vid_range_start, vinfo->vid);
+ zebra_vlan_bitmap_compute(ifp, vid_range_start,
+ vinfo->vid);
}
}
If you are a new contributor to FRR, please see our contributing guidelines.
After making changes, you do not need to create a new PR. You should perform an amend or interactive rebase followed by a force push.
When port was removed from last access vlan, the linux kernel won't send any vlan info in the netlink message, it might affact the evpn mh not withdraw EAD-EVI routes. Signed-off-by: Gord Chen <[email protected]>
95098e9
to
ec89775
Compare
💚 Basic BGPD CI results: SUCCESS, 0 tests failedResults table
For details, please contact louberger |
Continuous Integration Result: SUCCESSFULContinuous Integration Result: SUCCESSFULCongratulations, this patch passed basic tests Tested-by: NetDEF / OpenSourceRouting.org CI System CI System Testrun URL: https://ci1.netdef.org/browse/FRR-FRRPULLREQ-20376/ This is a comment from an automated CI system. Warnings Generated during build:Checkout code: Successful with additional warnings
|
Continuous Integration Result: SUCCESSFULContinuous Integration Result: SUCCESSFULCongratulations, this patch passed basic tests Tested-by: NetDEF / OpenSourceRouting.org CI System CI System Testrun URL: https://ci1.netdef.org/browse/FRR-FRRPULLREQ-20375/ This is a comment from an automated CI system. Warnings Generated during build:Checkout code: Successful with additional warnings
|
Continuous Integration Result: FAILEDContinuous Integration Result: FAILEDSee below for issues. This is a comment from an automated CI system. Get source / Pull Request: SuccessfulBuilding Stage: SuccessfulBasic Tests: FailedTopotests Ubuntu 18.04 arm8 part 8: Failed (click for details)Topotests Ubuntu 18.04 arm8 part 8: No useful log foundSuccessful on other platforms/tests
|
CI:rerun |
looks like an arm problem - rerunning |
Continuous Integration Result: SUCCESSFULCongratulations, this patch passed basic tests Tested-by: NetDEF / OpenSourceRouting.org CI System CI System Testrun URL: https://ci1.netdef.org/browse/FRR-FRRPULLREQ-20392/ This is a comment from an automated CI system. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good, thx for the fix.
@Mergifyio backport stable/8.0 |
Command
|
zebra: trigger remove all access vlans info for access port (backport #9091)
When port was removed from last access vlan, the linux kernel won't send any vlan info in the netlink message, it might affect that the evpn mh not withdraw EAD-EVI routes.