summaryrefslogtreecommitdiffstats
path: root/zebra/rule_netlink.c
diff options
context:
space:
mode:
authorDonald Sharp <sharpd@cumulusnetworks.com>2020-07-17 02:57:14 +0200
committerDonald Sharp <sharpd@cumulusnetworks.com>2020-07-17 02:59:33 +0200
commitdfbe3a2bd3756add95e67737adade22200f5668e (patch)
treecaa63b670bc7cd67b32a358150b6d59868309a87 /zebra/rule_netlink.c
parentMerge pull request #6752 from xThaid/evpn_neigh_fix (diff)
downloadfrr-dfbe3a2bd3756add95e67737adade22200f5668e.tar.xz
frr-dfbe3a2bd3756add95e67737adade22200f5668e.zip
zebra: Silently ignore afi 128/129 for rules
We do not need to know anything about rules in afi 128/129 at this point in time. Just note it with a zebra kernel debug and move on. This is not something that a operator can do anything with and at this point in time FRR does not care. Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
Diffstat (limited to 'zebra/rule_netlink.c')
-rw-r--r--zebra/rule_netlink.c9
1 files changed, 9 insertions, 0 deletions
diff --git a/zebra/rule_netlink.c b/zebra/rule_netlink.c
index b7be39850..d5686ad88 100644
--- a/zebra/rule_netlink.c
+++ b/zebra/rule_netlink.c
@@ -247,7 +247,16 @@ int netlink_rule_change(struct nlmsghdr *h, ns_id_t ns_id, int startup)
}
frh = NLMSG_DATA(h);
+
if (frh->family != AF_INET && frh->family != AF_INET6) {
+ if (frh->family == RTNL_FAMILY_IPMR
+ || frh->family == RTNL_FAMILY_IP6MR) {
+ if (IS_ZEBRA_DEBUG_KERNEL)
+ zlog_debug(
+ "Received rule netlink that we are ignoring for family %u, rule change: %u",
+ frh->family, h->nlmsg_type);
+ return 0;
+ }
flog_warn(
EC_ZEBRA_NETLINK_INVALID_AF,
"Invalid address family: %u received from kernel rule change: %u",