Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge the following commits from R2.1 branch (final).
Perf improvements for Logical Interface delete handling Follow up on commit b4af4d6 for delete handling When a link delete is notified to config listener, the IFMapNode in link can be NULL. We used to ignore links with left/right node deleted. Modified the link handler to pass the node-type when left/right node is deleted. This way, the IFLinkToReq handler can take action based on the type of node being deleted (cherry picked from commit f1d7816) Conflicts: src/vnsw/agent/test-xml/test_xml_oper.cc Holding the UUID from ID_PERMS in config DBState in DB Add and using it for Config Delete closes-bug: #1420209 (cherry picked from commit 6a9b4be) * Send ARP request packet on VMI interface instead of parent interface such that vlan gets added, based on transmit vlan id * If vlan-id is 0, then its treated as untagged interface, in agent while framing the packet we were setting the tag in packet 0 avoiding the same same setting vlan id as invalid and programming it as vlan-id 0 only in vrouter Closes-bug:#1423122 (cherry picked from commit 38f1405) * If arp route is deleted twice, then we arp nexthop was not getting deleted, since upon each arp route delete we enqueue a request to modify nexthop to invalid and this might result in arp entry creation, hence use operation RESYNC instead of add/change * Check for vrf while parsing on subnet address change, since we might modify next vrf subnet routes if prefixx matches Test case for same Closes-bug:#1423502 (cherry picked from commit a65d557) Conflicts: src/vnsw/agent/test/test_route.cc reverting the unwated checkin of modifying the notify_count_ to bool (cherry picked from commit 975f507) * Whenever ICMP error packet is trapped for flow setup, parse the inner payload and frame the flow key Closes-bug:#1423848 (cherry picked from commit 81ee647) * ARP route behind gateway should have proxy flag set such that arp request on VM would be proxied by vrouter Closes-bug:#1423122 (cherry picked from commit e72443e) Remove unused UVEs Remove UVE generated on add/delete of a link Remove UVE generated on change of physical-device-vn entry. Added a UT for physical-device-vn to validate add/delete of VMI to VN link (cherry picked from commit 452b934) Holding the metadata of link while storing it in defer list. While adding the link to Graph from defer list, the metadata also added back to graph which makes the dependency tracker to work correctly (cherry picked from commit 43d7a71) Optimize config handling for SG and ACL Follow up to commit b4af4d6 On any change or link add/delete to a SG, we are invoking IFNodeToReq for all connected VMI. Fix this by registering link handler for SG and invoke IFNodeToReq only for peer VMI On any change or link add/delete to a ACL, we are invoking IFNodeToReq for all connected SG and VN. Fix this by registering link handler for ACL and invoke IFNodeToReq only for peer SG / VN (cherry picked from commit 0d33ec1) * In a scenario where there are 2 vgw exporting same subnet route, and traffic session gets initiated from external domain to VM, then for setting reverse flow agent was trying to get policy enabled interface nexthop for vgw, and for vgw we would only create policy disabled nh. Fixing the same to pick policy disabled nexthop for vgw destination Closes-bug:#1425856 (cherry picked from commit f000a7f) Fix Tor-Agent assert for KSyncEntry GetReference Issue: ------ On connection close delete is triggered for all the KSync Objects, creation of entry after this deletion in not allowed. Here Logical Switch Object is deleted and Unicast Remote Entry Table is yet to receive a delete, in the meanwhile a route table entry get notified and tries to take create a temp entry for reference in Logical Switch Entry which is already deleted Fix: ---- Since delete trigger for Unicast Remote Entry Table happens in context of VRF table walk, which will have a yeild in between. during this time if a notification for route table happens, it needs to be ignored. Also fixing a memory leak in idl deletion path Closes-Bug: 1424531 (cherry picked from commit d4ba989) DHCP enable/disable bug fixes 1) Fix bug where dhcp enable flag toggling was not reflected in route - Toggling of DHCP enable in interface results in route rebake. Also flag for handle_dhcp is now moved from path to route. 2) Remove mac VM binding, instead add a route with DHCP peer path which can be used to get binding. This path is having discard NH. Closes-bug: #1417131 Conflicts: src/vnsw/agent/oper/operdb_init.h src/vnsw/agent/test-xml/test_xml_oper.cc src/vnsw/agent/test/test_route.cc Rename Dhcp path/peer to MacVmBinding. Change-Id: I0643612ca907b85c548d4132502e00ca1498fdc1
- Loading branch information
Showing
90 changed files
with
2,022 additions
and
660 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.