summaryrefslogtreecommitdiffstats
path: root/ospfd
Commit message (Collapse)AuthorAgeFilesLines
...
* Addition of OSPF-API - Amir Guindehi <nospam.amir@datacore.ch>paul2003-03-174-0/+3852
|
* doh! small fix for previous fix to allow ospfd to compile.paul2003-02-191-2/+2
|
* 1. ospf_opaque_type10_lsa_term (area) - was being called afterpaul2003-02-181-4/+5
| | | | | | | | | | | | | | ospf_lsdb_free had been called. (efence caught this one). This bug is present in zebra.org CVS 2. It fixes my previous ospf_network_match_iface patch ([zebra 17352]) - i lost a couple of checks in ospf_network_run() by mistake. this patch isnt in zebra.org CVS, but it would be nice to have it once it works. This hopefully fixes the 'assert rn->info' problems people had with zebra-pj yesterday.
* fixes an assert which doesnt seem to take into account that route_node_getpaul2003-02-181-1/+4
| | | | | | | | may return an existing node. (if the code wants a /new/ node why not use route_node_set? if it doesnt mind - then the assert is wrong). this bug is in zebra.org CVS. (must be an extremely rare/unlikely bug though).
* Fix debug statement in ospf_packet.c and merge error in ospf_lsa.cpaul2003-02-132-3/+1
|
* Merge to zebra.org CVS 20030203 16:30GMTpaul2003-02-032-7/+6
|
* Initial revisionpaul2003-02-031-0/+221
|
* Revert comment out of:patch.revert.debug.nssa.patchpaul2003-01-271-4/+3
| | | | | | if (ospf_debug_packet & OSPF_DEBUG_RECV) which was causing unconditional ospf_ip_header_dump (ibuf). (introduced with kevin millers patch)
* revert unchecked debug info generated by Kevin Miller's patchpaul2003-01-271-6/+0
|
* Paul Jakma:patch.z17352.ptp.network.matchpaul2003-01-252-12/+24
| | | | | [zebra 17352] ospf network matching (aka need for peer /32 for PtP) change behaviour of network <prefix> area N statement wrt to PtP.
* Matthew Grant <grantma@anathoth.gen.nz>patch.z17290.portfixpaul2003-01-221-5/+12
| | | | | | [zebra 17290] [PATCHES] - Fixes for problems in 0.93b portfix patch
* Date: Fri, 20 Dec 2002 17:28:45 +0900patch.z16823paul2003-01-183-8/+128
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | From: Masahiko Endo <endo@suri.co.jp> Reply-To: zebra@zebra.org To: zebra@zebra.org Cc: kunihiro@zebra.org, yokota@kddlabs.co.jp Subject: [zebra 16823] [PATCH] Bugfix and new feature in Opaque-LSA handling. ----- * ----- * ----- * ----- * ----- * ----- * ----- * ----- * ----- * ----- Changes 2002.12.20 1. Bug fixes 1.1 When an opaque LSA is being removed from (or added to) the LSDB, it does not mean a change in network topology. Therefore, SPF recalculation should not be triggered in that case. There was an assertion failure problem "assert (rn && rn->info)" inside the function "ospf_ase_incremental_update()", because the upper function "ospf_lsa_maxage_walker_remover()" called it when a type-11 opaque LSA is removed due to MaxAge. 1.2 Type-9 LSA is defined to have "link-local" flooding scope. In the Database exchange procedure with a new neighbor, a type-9 LSA was added in the database summary of a DD message, even if the link is different from the one that have bound to. 2. Feature enhancements 2.1 Though a "wildcard" concept to handle type-9/10/11 LSAs altogether has introduced about a year ago, it was only a symbol definition and actual handling mechanism was not implemented. Now it works.
* From endo@suri.co.jp Fri Jan 17 23:36:30 2003patch.z16824.nsm.kill.neighbourpaul2003-01-173-0/+1866
| | | | | | | | | | | | | | | | | | | | | | | | | | | Date: Fri, 20 Dec 2002 17:58:43 +0900 From: Masahiko Endo <endo@suri.co.jp> Reply-To: zebra@zebra.org To: zebra@zebra.org Cc: kunihiro@zebra.org Subject: [zebra 16824] [PATCH] nsm_kill_neighbor [ The following text is in the "ISO-2022-JP" character set. ] [ Your display is set for the "ISO-8859-1" character set. ] [ Some characters may be displayed incorrectly. ] Hi Ishiguro-san, Here is my problem analysis against the case that the ospfd crashes when an interface is brought down. When the ospfd receives a ZEBRA message "ZEBRA_INTERFACE_DOWN" from zebra daemon, the ospfd performs bunch of ospf-interface cleanup for the notified zebra-interface. There are cases that neighbor instance "nbr", which will be removed afterward, may scheduled in the NSM thread event queue. And when the NSM event thread is fired, dereference for this already freed "nbr" pointer causes SIGSEGV. Please take a look at following timeline of processing sequences.
* Kevin C Miller <kevinm@andrew.cmu.edu>patch.z16681.ospfd.nssapaul2002-12-137-59/+140
| | | | [zebra 16681] OSPF NSSA Patches
* [zebra 14631] Generic PtP and RFC3021 interface addressing supportpatch.z14631.ptp.rfc3021paul2002-12-132-4/+4
|
* zebra link state detection supportpatch.z12269.linkstatepaul2002-12-135-13/+13
|
* ospfd Point-to-Multipoint supportpatch.z14800.ospfd.ptmppaul2002-12-133-11/+72
|
* Greg Troxel <gdt@ir.bbn.com>patch.z15715.ospf.md5paul2002-12-131-2/+13
| | | | | | [zebra 15715] FIX for ospf md5 authentication problem, finally! fix copy of ospf packet buffer
* zebra-ospfd-md5auth-seqnum.patch - paulj - change OSPF md5 sequence numberpatch.z15646.ospfd.seqnum.timepaul2002-12-131-1/+4
| | | | to be derived from time() to speed up synching after restart of ospfd
* Initial revisionpaul2002-12-1350-0/+44393