Skip to content
Snippets Groups Projects
  1. Jan 01, 2023
    • Ondřej Zajíček's avatar
      Nest: Fix several issues with pflags · 6d1ae197
      Ondřej Zajíček authored
      There were some confusion about validity and usage of pflags, which
      caused incorrect usage after some flags from (now removed) protocol-
      specific area were moved to pflags.
      
      We state that pflags:
      
       - Are secondary data used by protocol-specific hooks
       - Can be changed on an existing route (in contrast to copy-on-write
         for primary data)
       - Are irrelevant for propagation (not propagated when changed)
       - Are specific to a routing table (not propagated by pipe)
      
      The patch did these fixes:
      
       - Do not compare pflags in rte_same(), as they may keep cached values
         like BGP_REF_STALE, causing spurious propagation.
      
       - Initialize pflags to zero in rte_get_temp(), avoid initialization in
         protocol code, fixing at least two forgotten initializations (krt
         and one case in babel).
      
       - Improve documentation about pflags
      6d1ae197
  2. Dec 24, 2022
    • Toke Høiland-Jørgensen's avatar
      Babel: Rework seqno request handling · 8b06a4d8
      Toke Høiland-Jørgensen authored and Ondřej Zajíček's avatar Ondřej Zajíček committed
      The seqno request retransmission handling was tracking the destination
      that a forwarded request was being sent to and always retransmitting to
      that same destination. This is unnecessary because we only need to
      retransmit requests we originate ourselves, not those we forward on
      behalf of others; in fact retransmitting on behalf of others can lead to
      exponential multiplication of requests, which would be bad.
      
      So rework the seqno request tracking so that instead of storing the
      destination of a request, we just track whether it was a request that we
      forwarded on behalf of another node, or if it was a request we originated
      ourselves. Forwarded requests are not retransmitted, they are only used
      for duplicate suppression, and for triggering an update when satisfied.
      If we end up originating a request that we previously forwarded, we
      "upgrade" the old request and restart the retransmit counter.
      
      One complication with this is that requests sent in response to unfeasible
      updates (section 3.8.2.2 of the RFC) have to be sent as unicast to a
      particular peer. However, we don't really need to retransmit those as
      there's no starvation when sending such a request; so we just change
      such requests to be one-off unicast requests that are not subject to
      retransmission or duplicate suppression. This is the same behaviour as
      babeld has for such requests.
      
      Minor changes from committer.
      8b06a4d8
  3. Dec 18, 2022
  4. Dec 16, 2022
  5. Dec 11, 2022
  6. Dec 10, 2022
  7. Dec 09, 2022
    • Ondřej Zajíček's avatar
      Doc: Document issue with import tables · e48f898f
      Ondřej Zajíček authored
      The import table does not work reliably together with re-evaluation of
      routes due to recursive next hops or flowspec validation. We will at
      least document that here, as import tables are completely redesigned and
      this issue is fixed in BIRD 3.x branch.
      e48f898f
    • Alexander V. Chernikov's avatar
      Netlink on FreeBSD support · a80cd470
      Alexander V. Chernikov authored and Ondřej Zajíček's avatar Ondřej Zajíček committed
      Netlink support was added to FreeBSD recently. It is not as full-featured
      as its Linux counterpart yet, however the added subset is enough to make
      a routing daemon work. Specifically, it supports multiple tables,
      multipath, nexthops and nexthops groups. No MPLS support yet.
      
      The attached change adds 'bsd-netlink’ sysconf target, allowing to build
      both netlink & rtsock versions on FreeBSD.
      a80cd470
    • Ondřej Zajíček's avatar
      BGP: Improve handling of hold and keepalive timers · 3859e4ef
      Ondřej Zajíček authored
      The effective keepalive time now scales relative to the negotiated
      hold time, to maintain proportion between the keepalive time and the
      hold time. This avoids issues when both keepalive and hold times
      were configured, the hold time was negotiated to a smaller value,
      but the keepalive time stayed the same.
      
      Add new options 'min hold time' and 'min keepalive time', which reject
      session attempts with too small hold time.
      
      Improve validation of config options an their documentation.
      
      Thanks to Alexander Zubkov and Sergei Goriunov for suggestions.
      3859e4ef
  8. Dec 06, 2022
    • Ondřej Zajíček's avatar
      Nest: Avoid spurious announcements triggered by filtered routes · e80156d9
      Ondřej Zajíček authored
      When filtered routes (enabled by 'import keep filtered' option) are
      updated, they trigger announcements by rte_announce(). For regular
      channels (e.g. type RA_OPTIMAL or RA_ANY) such announcement is just
      ignored, but in case of RA_ACCEPTED (BGP peer with 'secondary' option)
      it just reannounces the old (and still valid) best route.
      
      The patch ensures that such no-change is ignored even for these channels.
      e80156d9
  9. Nov 30, 2022
  10. Nov 29, 2022
  11. Nov 09, 2022
    • Ondřej Zajíček's avatar
      Conf: Make 'configure check' command restricted · bbac9ca9
      Ondřej Zajíček authored
      While it does not directly change BIRD state, it can trigger reading
      arbitrary files and eating significant memory.
      bbac9ca9
    • Ondřej Zajíček's avatar
      Conf: Free stored old config before parsing new one · 371eb490
      Ondřej Zajíček authored
      BIRD keeps a previous (old) configuration for the purpose of undo. The
      existing code frees it after a new configuration is successfully parsed
      during reconfiguration. That causes memory usage spikes as there are
      temporarily three configurations (old, current, and new). The patch
      changes it to free the old one before parsing the new one (as user
      already requested a new config). The disadvantage is that undo is
      not available after failed reconfiguration.
      371eb490
  12. Nov 08, 2022
  13. Nov 03, 2022
  14. Nov 02, 2022
    • Maria Matejka's avatar
      Memory pages are not munmapped, instead we just madvise() · 9d03c3f5
      Maria Matejka authored
      Memory unmapping causes slow address space fragmentation, leading in
      extreme cases to failing to allocate pages at all. Removing this problem
      by keeping all the pages allocated to us, yet calling madvise() to let
      kernel dispose of them.
      
      This adds a little complexity and overhead as we have to keep the
      pointers to the free pages, therefore to hold e.g. 1 GB of 4K pages with
      8B pointers, we have to store 2 MB of data.
      9d03c3f5
  15. Nov 01, 2022
  16. Oct 18, 2022
  17. Oct 12, 2022
  18. Oct 10, 2022
    • Ondřej Zajíček's avatar
      BGP: Add option 'next hop prefer global' · 8f79e6b9
      Ondřej Zajíček authored
      Add BGP channel option 'next hop prefer global' that modifies BGP
      recursive next hop resolution to use global next hop IPv6 address instead
      of link-local next hop IPv6 address for immediate next hop of received
      routes.
      8f79e6b9
  19. Oct 03, 2022
  20. Sep 27, 2022
    • Alexander Zubkov's avatar
      KRT: Fix setting default preference · 0f2be469
      Alexander Zubkov authored
      Changes in commit eb937358 broke setting of channel preference for alien
      routes learned during scan. The preference was set only for async routes.
      Move common attribute processing part of functions krt_learn_async() and
      krt_learn_async() to a separate function to have only one place for such
      changes.
      0f2be469
  21. Sep 16, 2022
  22. Sep 06, 2022
    • Maria Matejka's avatar
      Better profylaction recursive route loops · 71b3456e
      Maria Matejka authored
      In some specific configurations, it was possible to send BIRD into an
      infinite loop of recursive next hop resolution. This was caused by route
      priority inversion.
      
      To prevent priority inversions affecting other next hops, we simply
      refuse to resolve any next hop if the best route for the matching prefix
      is recursive or any other route with the same preference is recursive.
      
      Next hop resolution doesn't change route priority, therefore it is
      perfectly OK to resolve BGP next hops e.g. by an OSPF route, yet if the
      same (or covering) prefix is also announced by iBGP, by retraction of
      the OSPF route we would get a possible priority inversion.
      71b3456e
  23. Aug 18, 2022
Loading