Commit Graph

7939 Commits

Author SHA1 Message Date
mssonicbld
b16e2da1be
[installer] Create a blank grubenv if doesn't exist. (#17414) (#17525) 2023-12-16 01:40:44 +08:00
mssonicbld
6dba9f8305
Change leaf value of used_cnt of sonic-events-swss:chk_crm_threshold (#17430) (#17527) 2023-12-16 01:36:36 +08:00
mssonicbld
c49d7c5417
[Nokia-7215][armhf] Enable Watchdog service (#16612) (#17522) 2023-12-16 01:35:16 +08:00
mssonicbld
c63a4c6a4a
[Mellanox][SKU] Adding Mellanox-SN4700-O8V48 SKU (#17425) (#17526) 2023-12-16 01:32:50 +08:00
zitingguo-ms
1a0268c224
Fix ecmp hash polarization by enable hash seed/offset config on T1 and upgrade xgs SAI to 8.4.35.0 (#17505)
Why I did it
To fix ecmp hash polarization issue.

Work item tracking
Microsoft ADO (number only): 26085143
How I did it
Add sai_hash_seed_config_hash_offset_enable=1 in all config.bcm that Broadcom T1 uses.

HardwareSku
Force10-S6100-T1
Force10-S6100-ITPAC-T1
Force10-S6100
Celestica-DX010-C32
Arista-7260CX3-C64
Arista-7060CX-32S-Q32
Arista-7060CX-32S-C32-T1
Arista-7060CX-32S-C32
Arista-7050QX32S-Q32
Arista-7050QX-32S-S4Q31
Arista-7050-QX32
Arista-7050-QX-32SInclude Broadcom's fix by upgrading xgs SAI version to 8.4.35.0.
8.4.35.0: [CSP 00012324019] back-porting SONIC-75006 to SAI8.4
8.4.34.0:
[CSP 00012318293] back-porting SONIC-81534 to SAI8.4;
ECMP LB traffic polarization, configure hash_offset along with hash_seed attr
Run qual with only xgs SAI version upgraded to 8.4.35.0:
on TH2: https://elastictest.org/scheduler/testplan/6579b36ccfacd86e78e3e885?leftSideViewMode=detail&prop=status&order=ascending
on TH: https://elastictest.org/scheduler/testplan/657a75f8c1d3b51fc1d585b4?leftSideViewMode=detail&prop=status&order=ascending

How to verify it
use tests/ecmp/test_ecmp_sai_value.py to verify.
2023-12-15 19:33:47 +08:00
mssonicbld
571efc2f3a
[submodule] Update submodule sonic-swss to the latest HEAD automatically (#17515) 2023-12-15 15:18:42 +08:00
mssonicbld
b09e7d1b6b
[gbsyncd]: Set SYSLOG_CONFIG_FEATURE for gbsyncd (#17325) (#17513) 2023-12-15 14:54:26 +08:00
Sudharsan Dhamal Gopalarathnam
8297800a5e [FRR] Fix zebra memory leak when bgp fib suppress pending is enabled (#17484)
Fix zebra leaking memory with fib suppress enabled. Porting the fix from
FRRouting/frr#14983

While running test_stress_route.py, systems with lower memory started to throw low memory logs. On further investigation, a memory leak has been found in zebra which was fixed in the FRR community.
2023-12-15 14:34:37 +08:00
Sudharsan Dhamal Gopalarathnam
bed8d24a4a
[202305][Mellanox] Update SAI to SAIBuild2305.26.0.16, SDK/FW to 4.6.2134/2012.2134 (#17474)
Why I did it
Update SAI version to SAIBuild2305.26.0.16
Update SDK/FW to 4.6.2134/2012.2134

Fixed issues:

Updated SN3700C to enable limit to 100G speed.
Recovering from Low power mode might ends with port down.
Work item tracking
Microsoft ADO (number only):
How I did it
Updating the versions in makefile

How to verify it
Confirm issues fixed and run sonic-mgmt tests
2023-12-14 17:29:37 +08:00
arista-nwolfe
dd294f3883
Disable SA_EQUALS_DA trap on DNX LC SKUs (#17488)
This is a 202305 cast of this PR #17206
2023-12-14 08:44:44 +08:00
wenyiz2021
7fb7722959
[202305 branch] Upgrade dnx SAI version to 9.2.x (#17432)
202305 image does not come up on chassis with SAI 7.1.111.1.
SAI 9.2.0.0 on 202305 image is verified to come up on Arista chassis. Initial testing is also done, no new failures compare to 202205 image, SAI 7.1.111.1.

Why I did it
Bring up 202305 image on chassis.

Work item tracking
Microsoft ADO (number only): 18189434
How I did it
How to verify it
Brought up SAI 9.2.0.0 on Arista chassis.
Ran pipeline on acl, bgp, arp, acms, cacl, copp, decap, fib, iface_namingmode.
2023-12-13 11:42:24 +08:00
mssonicbld
5b1d18898f
[submodule] Update submodule sonic-platform-common to the latest HEAD automatically (#17477)
#### Why I did it
src/sonic-platform-common
```
* 57f63e6 - (HEAD -> 202305, origin/202305) Adding supported vendor PNs for remote CDB FW upgrade (#418) (4 hours ago) [mihirpat1]
```
#### How I did it
#### How to verify it
#### Description for the changelog
2023-12-12 16:34:31 +08:00
mssonicbld
d297c4fd34
[submodule] Update submodule sonic-utilities to the latest HEAD automatically (#17467)
#### Why I did it
src/sonic-utilities
```
* 7cf32a9f - (HEAD -> 202305, origin/202305) Reduce generate_dump mem usage for cores (#3052) (16 hours ago) [davidm-arista]
```
#### How I did it
#### How to verify it
#### Description for the changelog
2023-12-09 18:32:14 +08:00
Stepan Blyshchak
2cea4bcbdf [config-chassisdb] use cached variables (#17342)
- Why I did it
Improve boot performance mostly needed for fast and warmboot

- How I did it
Use cached variable.

- How to verify it
Boot the system. Simply do "systemd-analyze blame" and look at service start time.

Signed-off-by: Stepan Blyschak <stepanb@nvidia.com>
2023-12-09 14:32:43 +08:00
Stepan Blyshchak
bc4bc03239 [config-topology] use cached variables (#17343)
- Why I did it
Improve  boot performance mostly needed for fast and warmboot

- How I did it
Use cached variable.

- How to verify it
Boot the system. Simply do "systemd-analyze blame" and look at service start time.

Signed-off-by: Stepan Blyschak <stepanb@nvidia.com>
2023-12-09 14:32:39 +08:00
mssonicbld
688245a724
Revert "[swss/syncd] remove dependency on interfaces-config.service (#13084) (#14341)" (#15094) (#17367) (#17461) 2023-12-08 19:45:49 +08:00
Nazarii Hnydyn
06ed67dfa6
[mellanox]: Disable MFT bash autocompletion. (#17359)
A W/A to overcome delay of about 20 sec on login due to MFT bash autocompletion bug.
Should be reverted once a formal solution will be available in future MFT release.

Why I did it
To overcome SN2700 20 sec delay on login
Work item tracking
N/A
How I did it
Removed MFT bash autocompletion part
How to verify it
make configure PLATFORM=mellanox
make target/sonic-mellanox.bin
2023-12-08 14:35:28 +08:00
mssonicbld
f445416ec5
[submodule] Update submodule sonic-platform-daemons to the latest HEAD automatically (#17420)
#### Why I did it
src/sonic-platform-daemons
```
* f23e342 - (HEAD -> 202305, origin/202305) Add dynamic sensor logic for fixed and psu presence/state checking in thermalctld (#401) (18 hours ago) [Gregory Boudreau]
```
#### How I did it
#### How to verify it
#### Description for the changelog
2023-12-07 10:39:51 +08:00
wadoodkhan
2b8efdbb11
[Marvell] Update armhf sai debian (#17301)
Why I did it
Fixed the issue - Some special IPv6 packets cannot be dropped by dataplane ACL rule

Work item tracking
Microsoft ADO (number only):
No
How I did it
How to verify it
Loaded SAI debian (in syncd docker) and re-run the failed cases.
2023-12-06 20:07:07 +08:00
mssonicbld
a0d2968273
[submodule] Update submodule sonic-dbsyncd to the latest HEAD automatically (#17418)
#### Why I did it
src/sonic-dbsyncd
```
* 68baf40 - (HEAD -> 202305, origin/202305) [lldp-syncd] Fix unexpected exception in snmp-subagent (#64) (18 hours ago) [Zhaohui Sun]
```
#### How I did it
#### How to verify it
#### Description for the changelog
2023-12-06 16:34:22 +08:00
mssonicbld
3cb68edac5
[submodule] Update submodule sonic-utilities to the latest HEAD automatically (#17421)
#### Why I did it
src/sonic-utilities
```
* cebac831 - (HEAD -> 202305, origin/202305) [ci] Use correct bullseye docker image according to source branch. (17 hours ago) [Liu Shilong]
```
#### How I did it
#### How to verify it
#### Description for the changelog
2023-12-06 16:34:13 +08:00
mssonicbld
337f925058
[frr]: Force disable next hop group support. (#17344) (#17423) 2023-12-06 15:53:52 +08:00
mssonicbld
26250f4e4f
[Mellanox] remove log in RAM kernel option for 2700 A1 platform (#17254) (#17422) 2023-12-06 15:39:46 +08:00
Aravind-Subbaroyan
b6a8443487
Update cisco-8000.ini to 202305.1.0.3 (#17417)
Why I did it
FCS/CRC Errors will only be reported as RX_ERR.
Fix to avoid the mac port related errors.
Fix for sharedResSize testcase failure in QoS-SAI
Fix the issue related to voltage in 'show platform psustatus'.
Support WRED drop for lossy queues.
Fixed an issue where lossy traffic was getting dropped.
Enhancement of SAI logging for errors and interrupts
Work item tracking
Microsoft ADO (number only):
How I did it
Update Cisco platform to 202305.1.0.3

How to verify it
2023-12-06 14:22:56 +08:00
StormLiangMS
fa7be88599
Revert "[pmon] update gRPC version to 1.57.0 (#16257) (#17219)" (#17391)
This reverts commit 066065f1cd.
2023-12-05 10:38:51 +08:00
mssonicbld
2804987be0 [submodule] Update submodule sonic-restapi to the latest HEAD automatically (#17386) 2023-12-04 18:36:35 +08:00
mssonicbld
7d73cf09f5
Upgrade xgs SAI version to 8.4.31.0 (#17059) (#17392) 2023-12-04 14:36:29 +08:00
mssonicbld
3c0c0aa399
[submodule] Update submodule sonic-host-services to the latest HEAD automatically (#17380) 2023-12-02 16:00:16 +08:00
mssonicbld
a225a29ecf
[FRR]zebra: Fix fpm multipath encap addition (#17247) (#17375) 2023-12-01 20:42:12 +08:00
mssonicbld
56eeb471da
[submodule] Update submodule sonic-swss to the latest HEAD automatically (#17373)
#### Why I did it
src/sonic-swss
```
* 04fab921 - (HEAD -> 202305, origin/202305) [coppmgrd] Fix Copp processing logic by using Producer del instead of del from Table (14 hours ago) [Vivek]
```
#### How I did it
#### How to verify it
#### Description for the changelog
2023-12-01 16:34:19 +08:00
mssonicbld
8a14bbfe35
[submodule] Update submodule sonic-utilities to the latest HEAD automatically (#17374) 2023-12-01 16:13:48 +08:00
mssonicbld
53bcdcde60
[Mellanox] Revert LPM implementation to the old way (#17096) (#17366) 2023-12-01 01:45:37 +08:00
Volodymyr Samotiy
b1aede651f
[202305] [Mellanox] Update SAI to SAIBuild2305.26.0.9 (#17341)
Why I did it
Update SAI to SAIBuild2305.26.0.9 for Mellanox platforms.

Fixed issues:

When working with SAI_DEFAULT_SWITCHING_MODE_STORE_FORWARD key/value enabled, trying to add a LAG member to a LAG which is created after warm boot initial configuration phase ended, will fail.
Creating BFD session for non default VRF fails (SAI_BFD_SESSION_ATTR_VIRTUAL_ROUTER != SAI_SWITCH_ATTR_DEFAULT_VIRTUAL_ROUTER_ID).
Work item tracking
Microsoft ADO (number only):
How I did it
Updated SAI version in "mlnx-sai.mk" Makefile.

How to verify it
Run "sonic-mgmt" regression testing.
2023-11-30 20:55:39 +08:00
StormLiangMS
2c28502ddd
Revert "Share docker image and use telemetry container for 202305 (#17255)" (#17356)
This reverts commit 2c7d53e5fb.
2023-11-30 20:41:38 +08:00
mssonicbld
c875062177
[submodule] Update submodule sonic-linux-kernel to the latest HEAD automatically (#17315)
#### Why I did it
src/sonic-linux-kernel
```
* 35f39af - (HEAD -> 202305, origin/202305) [202305] [kconfig] Set default SATA Link Power Management policy (#365) (9 hours ago) [Volodymyr Samotiy]
```
#### How I did it
#### How to verify it
#### Description for the changelog
2023-11-28 16:34:23 +08:00
mssonicbld
8fc5a3ad2d
[submodule] Update submodule sonic-platform-common to the latest HEAD automatically (#17317)
#### Why I did it
src/sonic-platform-common
```
* a07a03b - (HEAD -> 202305, origin/202305) Fix issue: QSFP module with id 0x0d can be parsed using 8636 (#412) (79 minutes ago) [Stephen Sun]
```
#### How I did it
#### How to verify it
#### Description for the changelog
2023-11-28 16:34:18 +08:00
mssonicbld
4b810c903e
[FRR]Fixing CVEs CVE-2023-46752 CVE-2023-46753 CVE-2023-47234 CVE-2023-47235 (#17259) (#17305) 2023-11-28 02:35:37 +08:00
mssonicbld
a9a413db50
[submodule] Update submodule sonic-sairedis to the latest HEAD automatically (#17232) 2023-11-25 15:43:01 +08:00
qiwang4
b965a37c74
Update cisco-8000.ini (#17272)
Why I did it
Release Notes for Cisco 8111-32EH-O and 8102-64H

Fix for "Failed to get port by bridge port ID" error (MIGSMSFT-354)
Added CLI to enable trap events (MIGSMSFT-166)
Support to add critical message upon replace device SAI notification
Added support for input voltage/current/power info for PSUs
Added support for sff_mgr for deterministic bringup of SFF compliant modules
IOFPGA fix to support optics port in low power mode on 8101-32FH-O
Enable CMIS Manager for 8111-32EH-O
Added dump option to “show plat npu mac-state” CLI to dump MAC state info
Added media-based NPU serdes attributes for Credo 800G AEC Y-cables from media_settings.json
Auto FPD support for power CPLD on 8101 and 8111 platforms
Caveats:

Validation on 8101-32FH-O still pending. Will update release notes once completed.
Below 8800 platform specific fixes included but 8800 support not claimed in this code drop
Interop fix for BFD and Fair VOQ
Fix to update voq cgm profile during port speed change event
Create ECN profiles based on port speeds dynamically
Work item tracking
Microsoft ADO (number only):
How I did it
How to verify it
2023-11-24 14:04:15 +08:00
Kamil Cudnik
4a05b74b49
Add nlohmann-json3-dev package into the slave container (#16308) (#17282)
### Why I did it

The json.hpp header file from that package is used in the sonic-swss-common build. An old version of that header file (from 2016) has been checked into the sonic-swss-common repo. However, since then, there have been changes to that header file, and starting with GCC 12 in Bookworm, generates some errors about variables being possibly uninitialized before use.

##### Work item tracking
- Microsoft ADO **(number only)**: 25027439

#### How I did it

To fix this, install the nlohmann-json3-dev package, and allow using the header file from the Debian package instead of a static checked-in version. The version in Debian Bullseye is much newer than this version.

#### How to verify it

With this change alone, sonic-swss-common will still be using the json.hpp file in its own codebase. The change to actually use the system header file instead of the local header file will happen in a separate PR in the necessary repoes.

Co-authored-by: Saikrishna Arcot <sarcot@microsoft.com>
2023-11-24 11:26:00 +08:00
ganglv
2c7d53e5fb
Share docker image and use telemetry container for 202305 (#17255)
Why I did it
Need to share docker image for telemetry and gnmi, and only use telemetry container for 202305 branch

Work item tracking
Microsoft ADO (number only):
How I did it
Add a new docker image, base-gnmi, build sonic-gnmi and sonic-telemetry on this docker image.
Enable telemetry container.

How to verify it
Run end to end test for telemetry and gnmi.
2023-11-24 11:22:48 +08:00
mssonicbld
2b54221976
[yang]Fixing sonic-cfg-help to handle nested container (#17260) (#17289) 2023-11-24 03:17:25 +08:00
mssonicbld
0ea0855213
[installer] Create a blank grubenv if doesn't exist. (#17216) (#17288) 2023-11-24 01:01:19 +08:00
mssonicbld
a32c370b83
[mlnx-fw-upgrade] Add FW reactivation in case 2 FW upgrades were done without reboot (#17092) (#17286) 2023-11-24 00:55:34 +08:00
mssonicbld
afe382a5f9
[Arista]: Set SYNCD_SHM_SIZE for Arista DNX Devices (#17205) (#17287) 2023-11-24 00:54:55 +08:00
vdahiya12
066065f1cd
[pmon] update gRPC version to 1.57.0 (#16257) (#17219)
* [pmon] update gRPC version to 1.57.0 (#16257)

Signed-off-by: vaibhav-dahiya <vdahiya@microsoft.com>

* fix conflict

Signed-off-by: vaibhav-dahiya <vdahiya@microsoft.com>

---------

Signed-off-by: vaibhav-dahiya <vdahiya@microsoft.com>
2023-11-23 21:03:07 +08:00
Sudharsan Dhamal Gopalarathnam
35993c96e8 [FRR] Fixing zebra to handle non notification of better admin won (#17184)
* [FRR]Fixing zebra to handle non notification of better admin won

* Updating the patch with latest changes from FRR
2023-11-23 20:48:16 +08:00
prabhataravind
aa8a5403b8 [image_config]: Update DHCP rate-limit (#17132)
Change DHCP rate limit in SONiC copp configuration to 100 PPS as this is
necessary to ensure that DHCP flood does not cause LACP/BGP flaps in all
scenarios

This is an extension to the change in image_config: copp: Enable rate limiting 
for bgp, lacp, dhcp, lldp, macsec and udld #14859 and sonic-mgmt change in 
[tests/copp]: Update copp mgmt tests to support new rate-limits sonic-mgmt#8199

Why I did it
300 PPS is not sufficient to prevent LACP/BGP flaps in all cases. 100 PPS seems to
provide better resiliency against DHCP traffic flood to CPU.

Microsoft ADO 25776614:

Send DHCP broadcast packets to DUT and verify that they are trapped to CPU at 100 PPS.

Signed-off-by: Prabhat Aravind <paravind@microsoft.com>
2023-11-23 12:33:56 +08:00
ganglv
733a902a70
Revert "[202305] Share image for gnmi and telemetry (#17137)" (#17261)
This reverts commit f2a495f7e5.
2023-11-22 23:51:34 +08:00
abdosi
785ab1f51f
[202305] PR to make BGP GTSM feature for packet-chassis (#17237)
* [chassis/multi-asic] Make sure iBGP session established as directly connected  (#16777)

What I did:
Make Sure for internal iBGP we are one-hop away (directly connected) by using Generic TTL security mechanism.

Why I did:
Without this change it's possible on packet chassis i-BGP can be established even if there no direct connection. Below is the example

- Let's say we have 3 LC's LC1/LC2/LC3 each having i-BGP session session with each other over Loopback4096
- Each LC's have static route towards other LC's Loopback4096 to establish i-BGP session
- LC1 learn default route 0.0.0.0/0 from it's e-BGP peers and send it over to LC2 and LC3 over i-BGP
- Now for some reason on LC2 static route towards LC3 is removed/not-present/some-issue we expect i-BGP session should go down between LC2 and LC3
- However i-BGP between LC2 and LC3 does not go down because of feature ip nht-resolve-via-default  where LC2 will use default route to reach Loopback4096 of LC3. As it's using default route BGP packets from LC2 towards LC3 will first route to LC1 and then go to LC3 from there.

Above scenario can result in packet mis-forwarding on data plane

How I fixed it:-

To make sure BGP packets between i-BGP peers are not going with extra routing hop enable using GTSM feature

neighbor PEER ttl-security hops NUMBER

This command enforces Generalized TTL Security Mechanism (GTSM), as specified in RFC 5082. With this command, only neighbors that are the specified number of hops away will be allowed to become neighbors. This command is mutually exclusive with ebgp-multihop.

We set hop count as 1 which makes FRR to reject BGP connection if we receive BGP packets if it's TTL < 255. Also setting this attribute make sure i-BGP frames are originated with IP TTL of 255.

How I verify:

Manual Verification of above scenario. See blow BGP packets receive with IP TTL 254 (additional routing hop) we are seeing FIN TCP flags as BGP is rejecting the connection

Signed-off-by: Abhishek Dosi <abdosi@microsoft.com>

* Update peer-group.conf.j2

* Update result_all.conf

* Update result_base.conf

---------

Signed-off-by: Abhishek Dosi <abdosi@microsoft.com>
2023-11-22 15:37:19 +08:00