FRR Mirror
  1. FRR Mirror

FRR

Public
AuthorCommitMessageCommit dateIssues
Russ WhiteGitHubRuss White
99dd2b1f9ccMMerge pull request #21004 from donaldsharp/bfd_countersBfd QoL improvements
Mark StappGitHubMark Stapp
d974b8bfb3eMMerge pull request #20977 from Manpreet-k0/stale_vtepzebra: fix stale remote vtep entries
Manpreet KaurManpreet Kaur
b3583b34157zebra: EVPN fix stale remote vtep entriesThe EVPN route delete paths in process_subq_early_route_add (route replace) and process_subq_early_route_delete used ere->afi (route address family) to determine the VTEP IP type. For IPv4 routes with IPv6 VTEP endpoints, this incorrectly created an IPv4 vtep_ip when the nexthop is actually IPv6. The add path already correctly uses tmp_nh->type (nexthop type). The mismatch meant delete never m...
Donald SharpGitHubDonald Sharp
4a7efd0fb68MMerge pull request #21030 from y-bharath14/srib-yang-V13yang: Correct pyang errors in frr-pim-candidate.yang
Y BharathY Bharath
2f5ff33e312yang: Correct pyang errors in frr-pim-candidate.yangCorrect pyang errors in frr-pim-candidate.yang Signed-off-by: y-bharath14 <y.bharath@samsung.com>
Mark StappGitHubMark Stapp
7c43071a982MMerge pull request #20934 from donaldsharp/neigh_namespace_fixesMore Neighbor Fixes
Jafar Al-GharaibehGitHubJafar Al-Gharaibeh
dab7ac78b54MMerge pull request #21020 from donaldsharp/bfdd_wrong_mtypebfdd: Fix wrong memory free when using ttable code
Mark StappGitHubMark Stapp
83918e762a8MMerge pull request #21003 from Jafaral/github-ci-improvementsGitHub ci improvements
Donald SharpDonald Sharp
25a4369fef7bfdd: Allow for command completions to work with peersAdd the ability for bfdd to tell you more about the bfd peers when you ask for command completion help: eva# show bfd peer 1::2 2603:6080:602:509e:f6d2:e774:dfce:4b99 eva# show bfd peer 2603:6080:602:509e:f6d2:e774:dfce:4b99 BFD Peer: peer 2603:6080:602:509e:f6d2:e774:dfce:4b99 local-address 2603:6080:602:509e:f6d2:e774:dfce:4b08 vrf default interface enp13s...
Donald SharpDonald Sharp
47ce1ec534bbfdd: Fix `show bfd peers brief` to display local address in some casesWhen the bfdd peering has not been established if you have a local peer when you do a `show bfd peers brief` the local address is listed as unknown. Which is poppycock: bfd peer 2603:6080:602:509e:f6d2:e774:dfce:4b99 local-address 2603:6080:602:509e:f6d2:e774:dfce:4b08 interface enp13s0 exit ! exit ! end eva# show bfd peers brief Session count: 1 SessionId LocalAddress ...
Donald SharpDonald Sharp
16bdfbfe732bfdd: Look up the bfdd peer a bit earlier on packet receptionThe bfdd code looks up the bfdd peer very late in the packet reception path. Move the peer lookup to much earlier, mainly so that the bad packets received can be associated with the correct peer. Signed-off-by: Donald Sharp <sharpd@nvidia.com>
Donald SharpDonald Sharp
ee0f683ef9cbfdd: Remove unnecessary NULL checkbfdd is finding the bfd session and if we do not find one, the function returns. The very next if statement is checking to see if the bfd pointer is NULL. We know it is not NULL there. Signed-off-by: Donald Sharp <sharpd@nvidia.com>
Donald SharpDonald Sharp
bf13e4aab80tests: Test the new bfd counter existsShow that the new counter exists and is retrievable. Signed-off-by: Donald Sharp <sharpd@nvidia.com>
Donald SharpDonald Sharp
9ae600cf328bfdd, yang: Add a bad packet counter for bfd peersCurrently bfdd completely ignores bad packets received and there is no way to know that a bad packet has been coming in unless you infer it through other means. This is not easy for a operator to do. Signed-off-by: Donald Sharp <sharpd@nvidia.com>
Donald SharpDonald Sharp
6346f293caebfdd: Fix wrong memory free when using ttable codettable_dump expects MTYPE_TMP_TTABLE for the XFREE. Signed-off-by: Donald Sharp <sharpd@nvidia.com>
Mark StappGitHubMark Stapp
f098decf029MMerge pull request #21002 from Jafaral/ospf-fixospfd: harden TE/SR TLV iteration against malformed lengths
Jafar Al-GharaibehJafar Al-Gharaibeh
e43e05a4907ci: harden MIB downloads and add shared workflow cacheAdd a dedicated CI cache preparation flow for MIB files and restore that cache in build jobs so Docker builds reuse cached MIB assets instead of repeatedly downloading from external links. Signed-off-by: Jafar Al-Gharaibeh <jafar@atcorp.com>
Jafar Al-GharaibehJafar Al-Gharaibeh
d72486f708eci: set artifact retention and upload strictnessSet explicit retention periods for build and test artifacts and define if-no-files-found behavior to improve CI storage hygiene and upload diagnostics. Signed-off-by: Jafar Al-Gharaibeh <jafar@atcorp.com>
Jafar Al-GharaibehJafar Al-Gharaibeh
f48eae6ec80ci: harden github workflow execution defaultsAdd concurrency cancellation, read-only token permissions, matrix fail-fast controls, and job timeouts to improve CI reliability and resource usage. Signed-off-by: Jafar Al-Gharaibeh <jafar@atcorp.com>
Jafar Al-GharaibehJafar Al-Gharaibeh
d3e8aedb876ospfd: harden TE/SR TLV iteration against malformed lengthsUse 32-bit counters and per-iteration TLV size bounds checks in OSPF TE/SR TLV parsers so malformed opaque LSAs cannot wrap loop accounting and advance pointers beyond the LSA buffer. - Change loop accumulators from 16-bit to 32-bit (uint32_t) to prevent wraparound - Rework TLV iteration so pointer advancement is controlled in-loop - Add per-iteration guard before advancing: - `tlv_size <=...
Donatas AbraitisGitHubDonatas Abraitis
3299015409bMMerge pull request #20980 from lsang6WIND/updatebgpd: update on l2attr ecommunity
Loïc SangLoïc Sang
cbfe8272e17bgpd: change L2 attr displayL2attr display is too long: > L2: P flag:Y, B Flag Y, C word Y, MTU 1500 change to > L2: Cflags CPB, MTU 1500 Signed-off-by: Loïc Sang <loic.sang@6wind.com>
Loïc SangLoïc Sang
a5949c8d78cbgpd: update on l2attr ecommunityFix ntohs ecommunity l2attr Signed-off-by: Loïc Sang <loic.sang@6wind.com>
Donatas AbraitisGitHubDonatas Abraitis
16f8eb909bfMMerge pull request #20949 from donaldsharp/bgp_nhc_bugtests: bgp_nhc add test to expose NHC update race on peer changes
Russ WhiteGitHubRuss White
f7210cc3b4dMMerge pull request #20994 from iurmanj6WIND/fix-pcep-heap-buf-overflowpcep: fix heap buffer overflow
Donatas AbraitisGitHubDonatas Abraitis
e07063dd690MMerge pull request #20710 from krishna-samy/krishna/evpn-mh-stale-route-fixbgpd: Fix EVPN-MH route cleanup race condition during interfaces flap
Jafar Al-GharaibehGitHubJafar Al-Gharaibeh
379d62c71ddMMerge pull request #20944 from donaldsharp/more_dataZebra MetaQ and dplane provider fixes
Russ WhiteGitHubRuss White
fc2002364abMMerge pull request #20986 from donaldsharp/bgp_nhc_problems_in_evpnbgpd: Fix nht to properly notice a change
Russ WhiteGitHubRuss White
f27b2f1efc1MMerge pull request #20948 from ashred-lnx/ashred/coverity-fixes-upstreambgpd, isisd, ospfd: coverity fixes
Russ WhiteGitHubRuss White
12436f19abaMMerge pull request #20917 from nishant111/nishant/bgp_fib_suppress_stale_fixbgpd: Fix routes to be removed from rib when suppress fib pending is configed
Donald SharpGitHubDonald Sharp
3b43f1575ceMMerge pull request #20975 from opensourcerouting/fix/bgp_nht_nexthop_numbgpd: Fix condition when evaluating paths
Donald SharpDonald Sharp
ecfa77f11b2tests: Add a topotest that shows that metaQ deduplication works for NHGTest that the MetaQ deduplipication is working as expected. Signed-off-by: Donald Sharp <sharpd@nvidia.com>
Donald SharpDonald Sharp
4f42372ab02zebra: Add a hidden command `[no] zebra test metaq disable`Add the ability to plug the zebra metaQ to allow for testing of deduplication. Signed-off-by: Donald Sharp <sharpd@nvidia.com>
Donald SharpDonald Sharp
7a41987fcf3zebra: Limit NHG metaQ to only 1 item per NHG IDCurrently if there is a large number of changes going on via received NHG's and Zebra is extremely busy doing other work as well, It is possible that the received NHG list for processing in the metaQ is quite large. This is especially problematic at scale. Modify the code such that the MetaQ looks to see if the NHG being modified is already in the list. If so just remove the old one and keep ...
Donald SharpDonald Sharp
781cfb376bezebra: Keep high water mark for some queuesThe dplane provider incoming and outgoing queues back to zebra were not keeping the high water marks for them. Add them eva# show zebra dplane providers dataplane Incoming Queue from Zebra: 0, q_max: 5 Zebra dataplane providers: Kernel (1): in: 77, q: 0, q_max: 5, out: 77, q: 0, q_max: 5 dataplane Outgoing Queue to Zebra: 0, q_max: 30 eva# Signed-off-by: Donald Sharp <sharpd@nvidia.com>
Russ WhiteGitHubRuss White
7ec9d45b876MMerge pull request #20638 from hedrok/18910-sr-te-no-cmdspathd: add 'no traffic-eng' command, add test, don't output 'segment-routing/traffic-eng' in configuration always
Donald SharpDonald Sharp
99e4fe18b86tests: Show a ordering bug in test_bgp_nhc.pyWhen r6 intentionally brings up bgp peering towards r7 and r8 first and then brings up the r1 peering the bgp_nhc feature is not working correctly. Signed-off-by: Donald Sharp <sharpd@nvidia.com>
Russ WhiteGitHubRuss White
8f97a2b7223MMerge pull request #20339 from SpadeMomo/babel-fixbabeld: fix RFC violations in babel message parser
Donatas AbraitisGitHubDonatas Abraitis
0a17a43d07cMMerge pull request #20989 from enkechen-panw/advertise-attrbgpd: make code more robust in bgp_advertise_attr_unintern()
Russ WhiteGitHubRuss White
ad66f2ae16fMMerge pull request #20270 from hnattamaisub/revertvrrpd: Notification from zebra is not sent to vrrp
Justin IurmanJustin Iurman
45074e3cfc6pcep: fix heap buffer overflowASAN reported a heap buffer overflow when printing path->name in path_pcep_config_update_path(): snprintf(segment_list_name_buff, sizeof(segment_list_name_buff), "%s-%u", path->name, path->plsp_id); The symbolic name is allocated in pcep_lib_parse_lsp_symbolic_name() using the following: path->name = XCALLOC(MTYPE_PCEP, size); strlcpy((char *)path->name, tlv->symbolic_path_n...
Enke ChenEnke Chen
7c5ab2f5ce6bgpd: make code more robust in bgp_advertise_attr_unintern()As hash_release() uses the attribute data, it would be more robust to call hash_release() before bgp_attr_unintern(). Signed-off-by: Enke Chen <enchen@paloaltonetworks.com>
Donald SharpGitHubDonald Sharp
1c891671ae4MMerge pull request #20984 from rbgarga/fix-clangisisd: Fix remaining buffer size calculation in lsp_bits2string
Donald SharpDonald Sharp
ae614f4871bbgpd: Fix nht to properly notice a changecommit: 8dcd0a6b9cdbfac47eea2cf2100badf7744dbf98 broke path handling in some rare cases. This can be especially seen in bgp evpn processing when a path transitions from !valid to valid. The bgp_evpn_rt5_addpath code is failing occassionally because of this change. Modify the code to intentionally also call bgp_process when the old_path_valid is not the same as the new path being valid. Sign...
Donald SharpGitHubDonald Sharp
24ed1bd753bMMerge pull request #20900 from lpchambers/dev-msdp-segfaultpimd: fix msdp mesh group SA crash
Renato Botelho do CoutoRenato Botelho do Couto
d0dbbda19adisisd: Fix fortify abort by simplifying lsp_bits2stringThe lsp_bits2string function was incorrectly passing the total buf_size to subsequent snprintf calls instead of the remaining buffer space. This caused the compiler's _FORTIFY_SOURCE security checks to trigger a SIGABRT, as the requested write size exceeded the bounds of the buffer. This issue was exposed after switching the compiler from GCC to Clang on Ubuntu 24.04. Instead of fixing the po...
NishantNishant
96e8fba0e55bgpd: Fix routes to be removed from rib when suppress fib pending is configedIf GR N bit is set and fib suppress pending is configured then routes will not be advertised to GR peer. This is because the routes are marked as stale during the peer reset due to GR config. When peers reconnect bgp does not attempt a route install as the routes were never removed from rib. Fix by unsetting the PEER_STATUS_NSF_WAIT flag explicitely in the fib suppress config path. Signed-off-...
Donatas AbraitisDonatas Abraitis
5de395fc8acbgpd: Fix condition when evaluating pathsOriginal commit said: Let's broaden this scope a tiny bit to allow for matches where the number of nexthops is 1 and the nexthop->ifindex is the same as the interfaces ifindex for the up/down event. But the condition was incorrect according to the definition. That leads to routes being flushed incorrectly. When nexthop_num > 1, the first clause is false, so the whole continue is skipped, an...
Ashwini ReddyAshwini Reddy
2b84aa61cbdbgpd: address Coverity warning in bgp processing pathSigned-off-by: Ashwini Reddy <ashred@nvidia.com>
Ashwini ReddyAshwini Reddy
da245009ed1isisd: validate minimum frame size before LLC removalMove and consolidate the minimum frame-size validation alongside recvmsg() result handling so short frames are rejected before LLC removal. Signed-off-by: Ashwini Reddy <ashred@nvidia.com>