FRR Mirror
  1. FRR Mirror

FRR

Public
AuthorCommitMessageCommit dateIssues
Mark StappGitHubMark Stapp
6e2bd30b0b7MMerge pull request #19961 from hedrok/19506-bgp-multiple-labelsbgp: Support multiple labels in BGP-LU
Mark StappGitHubMark Stapp
999a15903fbMMerge pull request #20120 from donaldsharp/bgp_dynamic_peering_issuebgpd: Allow proper shutdown of bgp dynamic peers in rare case
Mark StappGitHubMark Stapp
2e06257723cMMerge pull request #20115 from raja-rajasekar/rajasekarr/vrrp_fd_limittools: increase the number of FD in frr.service
Carmine ScarpittaGitHubCarmine Scarpitta
7ed401d8e65MMerge pull request #20093 from fdumontet6WIND/netlink_sid zebra: fix crash due to lack of control of received number of srv6 S…
Donald SharpGitHubDonald Sharp
40d5eb63551MMerge pull request #20112 from arikauppi/ospfd-do-not-age-fixesospfd: Fix DO_NOT_AGE flag handling
Donald SharpDonald Sharp
aadfa2b22eabgpd: Allow proper shutdown of bgp dynamic peers in rare caseThere exists a series of events that causes dynamic peers to accept new connections on a existing connection and leaving everything in a weird state. Series of events: a) Interface down event b) BGP places peering on queue to be cleared in the future *note* that BGP is completely swamped and doesn't get to this in a timely manner c) Interface comes up d) Peer is not loaded and attempts to rec...
Vijayalaxmi BasavarajRajasekar RajaVijayalaxmi Basavaraj
a10e5159e66tools: increase the number of FD in frr.serviceIn scale vrrp setup of 255 sessions, the current number of FD limit is not enough. Hence increasing the FD limit 2048. Each vrrp address family session open 2 socket(tx,rx), 4 socket per ipv4&ipv6 session. vrrpd process without any session have 18 FDs for various functionality including garp and ND. vrrpd 664325 frr 0r CHR 1,3 0t0 ...
Russ WhiteGitHubRuss White
b5919324606MMerge pull request #20077 from opensourcerouting/feature/ospfv2_set_forwarder_addressospfd: Implement forwarding-address-self command
Donald SharpGitHubDonald Sharp
dee39998f24MMerge pull request #20118 from Shbinging/fix_ospf_sr_allocationospfd/isisd: fix sr local block request bug, bitmap should be uint64_t
Donald SharpGitHubDonald Sharp
831e80695fdMMerge pull request #20119 from Shbinging/isis_doc_fixdoc:fix isis narrow metric, the correct range should be 0-63
Bing ShuiBing Shui
41594f4348cospfd/isisd: fix sr local block request bug, bitmap should be uint64_t as SRLB_BLOCK_SIZE=64Signed-off-by: Bing Shui <bingshui@smail.nju.edu.cn>
Bing ShuiBing Shui
ff27c576a40doc:fix isis narrow metric, the correct range should be 0-63Signed-off-by: Bing Shui <bingshui@smail.nju.edu.cn>
Kyrylo YatsenkoKyrylo Yatsenko
a2cdb4671c7tests: add test for multiple labels in BGP-LUAnnounce three routes with label stacks 777/10006, 90, 11/22/33/44/55, check that `show bgp ipv6 PREFIX json` has proper labels in `remoteLabels`. Test for issue #19506 Signed-off-by: Kyrylo Yatsenko <hedrok@gmail.com>
Kyrylo YatsenkoKyrylo Yatsenko
17a082ee3a5bgpd: Support multiple labels in BGP-LUUpdated behaviour for SAFI_LABELED_UNICAST to support multiple labels: * Change BGP_MAX_LABELS 2 -> 10 (maximum possible number of labels for BGP-LU), previously for SAFI_LABELED_UNICAST only one label was supported * Save all labels when receiving an update event in `bgp_nlri_get_labels`, send them all to zebra in `bgp_zebra_announce_parse_nexthop` One of uses of multiple labels is S...
Donald SharpGitHubDonald Sharp
3005868f582MMerge pull request #20111 from hedrok/tools-checkpatch-fix-constant-comparison-checktools: fix checkpatch.pl for 'FOO < BAR && ...'
Francois DumontetFrancois Dumontet
c3c08d48940 zebra: fix crash due to lack of control of received number of srv6 SID from netlinkwe encounter the following crash; (gdb) bt at ./nptl/pthread_kill.c:44 at ./nptl/pthread_kill.c:78 at ./nptl/pthread_kill.c:89 context=0x7fffa2e82b80) at /build/make-pkg/output/_packages/cp-routing/src/lib/sigevent.c:248 at ./nptl/pthread_kill.c:44 at ./nptl/pthread_kill.c:78 at ./nptl/pthread_kill.c:89 at ../sysdeps/posix/raise.c:26 fmt=fmt@entry=0x7a4f...
Ari KauppiAri Kauppi
9ceb338f0f7ospfd: Fix DO_NOT_AGE flag handlinglsa->data->ls_age is in network byte order, not in host order. Ensure that endianness is taken properly into account in flag ops. Ensure that DO_NOT_AGE bit is not lost on LS Age increment or when maxaging. DO_NOT_AGE flag must also be masked out when time in seconds is needed. Signed-off-by: Ari Kauppi <kauppi@papupata.org>
Kyrylo YatsenkoKyrylo Yatsenko
fc53f1a6852tools: fix checkpatch.pl for 'FOO < BAR && ...'In the check $to gets value from $LvalOrFunc in regular expression that ends with '\s*', so in case of check for if (FOO < BAR && somethingelse) $to equals 'BAR ' and check that on right side there is also a constant fails. Simple fix: add '\s*' to re that checks whether $to is constant. Signed-off-by: Kyrylo Yatsenko <hedrok@gmail.com>
Carmine ScarpittaGitHubCarmine Scarpitta
67660e09077MMerge pull request #20053 from k-akashi/isis_srv6_mtisisd: use IPv6 MTID for SRv6 locator TLVs when IPv6 MT is enabled
Jafar Al-GharaibehGitHubJafar Al-Gharaibeh
5bd2b31bb6aMMerge pull request #20094 from soumyar-roy/soumya/id_pool_null_checklib: NULL-check idalloc pools
Donatas AbraitisGitHubDonatas Abraitis
974510d1e3dMMerge pull request #20029 from jaredmauch/ospf_snmp_compile_fixesospfd: Fix sign comparison warnings in SNMP code
Donatas AbraitisGitHubDonatas Abraitis
a3fa67126c1MMerge pull request #20082 from krishna-samy/krishnasamyr/coveritylib: Coverity fixes
Donatas AbraitisGitHubDonatas Abraitis
19e7bd335ffMMerge pull request #20062 from mjstapp/fix_bgp_label_nlribgpd: bounds-check when parsing incoming label in nlri
Donatas AbraitisGitHubDonatas Abraitis
c07c237d989MMerge pull request #20097 from soumyar-roy/soumya/pimd_crashpimd: Prevent crash on interface removal
Donatas AbraitisGitHubDonatas Abraitis
494515e29c0MMerge pull request #20095 from soumyar-roy/soumya/evpn_mac_listzebra: ensure zif mac_list exists before unlinking mac
KrishnasamyKrishnasamy
9ea76225cf3lib: Medium coverity fix - Dereference null return valueCID 109379: Dereferencing vrf, which is known to be NULL Signed-off-by: Krishnasamy <krishnasamyr@nvidia.com>
KrishnasamyKrishnasamy
19f89e34bc9lib: Medium coverity fix - Dereference null return valueCID 18907: Dereferencing bit, which is known to be NULL Signed-off-by: Krishnasamy <krishnasamyr@nvidia.com>
KrishnasamyKrishnasamy
866a067e43clib: Medium coverity fix - Dereference null return valueCID 73544: Dereferencing vrf, which is known to be NULL Signed-off-by: Krishnasamy <krishnasamyr@nvidia.com>
KrishnasamyKrishnasamy
f821c2fa98blib: Medium coverity fix - Dereference null return valueCID 20305: dereference: Dereferencing ifp, which is known to be NULL. Signed-off-by: Krishnasamy <krishnasamyr@nvidia.com>
KrishnasamyKrishnasamy
c207f17926dlib: Medium coverity fix - Dereference null return valueCID 19206: Dereferencing ifp, which is known to be NULL. We’re tearing down the tree by repeatedly deleting a node (if_delete(&ifp) removes it from the RB trees and frees it) until it’s empty. Adding safe-check to satisfy coverity. Signed-off-by: Krishnasamy <krishnasamyr@nvidia.com>
Donald SharpSoumya RoyDonald Sharp
e6d5c6160e4pimd: Prevent crash on interface removalPrevent a crash when we remove interfaces from pim configuration at scale. Ticket: CM-32197 Signed-off-by: Donald Sharp <sharpd@nvidia.com>CM-32197
Mark StappSoumya RoyMark Stapp
e58f41b1e4azebra: ensure zif mac_list exists before unlinking macEnsure that an ifp's evpn mac_list still exists before trying to reference it, when unlinking a mac object. Signed-off-by: Mark Stapp <mstapp@nvidia.com>
Mark StappSoumya RoyMark Stapp
e19604704f8lib: NULL-check idalloc poolsAllow freeing temporary ids even if their pools are already NULL. Signed-off-by: Mark Stapp <mstapp@nvidia.com>
Mark StappGitHubMark Stapp
3e47001446aMMerge pull request #20059 from opensourcerouting/fix/crash_zebra_ns_terminationzebra: Check if the netlink socket is _active_ before doing batch ops
Donatas AbraitisDonatas Abraitis
0ffa86c7b4eospfd: Reflect forwarding-address-self parameter in `show ip ospf`r1# show ip ospf json { ... "forwardingAddressSelf":true, ... } or r1# show ip ospf OSPF Routing Process, Router ID: 240.0.0.100 ... Forwarding address is set to self for external LSAs <<<<<< ... Signed-off-by: Donatas Abraitis <donatas@opensourcerouting.org>
Donatas AbraitisDonatas Abraitis
33f5bfb6236doc: Add forwarding-address-self for OSPFv2Signed-off-by: Donatas Abraitis <donatas@opensourcerouting.org>
Donatas AbraitisDonatas Abraitis
6361ead934cospfd: Implement `forwarding-address-self` commandThis command will be used to force external LSAs to be generated with the Forwarding Address to be set to self to allow receiving routers sending the traffic directly to the ASBR router instead of relying on the FD. The use case is for ECMP if we receive an external LSA with the identical FD. So in this case only a single entry will be installed into the RIB. r3# show ip ospf database externa...
Donatas AbraitisGitHubDonatas Abraitis
e46d1fb5315MMerge pull request #20046 from soumyar-roy/soumya/cl_to_frr_batch1evpn vxlan fixes batch1
Mark StappGitHubMark Stapp
07f5b0fe926MMerge pull request #20057 from Jafaral/10.5-housekeepingdebian, redhat: update changelog with 10.5.0 release
Mark StappMark Stapp
1b0f89069f7bgpd: be careful parsing incoming label in nlriOnly look at octets we think are valid when parsing a label stack in an NLRI Signed-off-by: Mark Stapp <mjs@cisco.com>
Donatas AbraitisDonatas Abraitis
8492e459b91tests: Check if `set forwarder-address` for OSPFv2Signed-off-by: Donatas Abraitis <donatas@opensourcerouting.org>
Donald SharpGitHubDonald Sharp
082fa1eee23MMerge pull request #20073 from opensourcerouting/fix/bgp_as_confed_set_issue_20060bgpd: Do not put confederation ASNs into AS-SET, leave them as alone
Donatas AbraitisDonatas Abraitis
e49d89b8f4ebgpd: Fix some CI warnings< WARNING: Prefer 'unsigned int' to bare use of 'unsigned' < #895: FILE: /tmp/f1-3241746/bgp_aspath.c:895: < WARNING: Prefer 'unsigned int' to bare use of 'unsigned' < #898: FILE: /tmp/f1-3241746/bgp_aspath.c:898: < WARNING: Missing a blank line after declarations < #927: FILE: /tmp/f1-3241746/bgp_aspath.c:927: Signed-off-by: Donatas Abraitis <donatas@opensourcerouting.org>
Donatas AbraitisDonatas Abraitis
d2cdc20e309bgpd: Do not put confederation ASNs into AS-SET, leave them as aloneWhen we have something like: ``` *> 10.0.8.0/25 10.113.78.2 0 100 0 (65506 65507) 800 ? * i 10.113.78.2 0 100 0 (65506 65507) 800 ? * 10.113.19.2 0 900 800 ? *> 10.0.8.128/25 10.113.78.2 0 100 0 (65506 65507) 800 ? * i 10.113.78.2 ...
Donatas AbraitisGitHubDonatas Abraitis
39e1bcea842MMerge pull request #20068 from raja-rajasekar/rajasekarr/ses_estbgpd: Fix maximum-prefix session recovery for peers and peer-groups
Donatas AbraitisDonatas Abraitis
2208fd5fd5dtests: Check if confederation ASNs are treated correctly when aggregating with as-setSigned-off-by: Donatas Abraitis <donatas@opensourcerouting.org>
Rajasekar RajaRajasekar Raja
27fc07bbb5dtests: Add BGP maximum-prefix session recovery topotestTest BGP session recovery after maximum-prefix overflow when limit is increased or unset for regular neighbors and peer-groups. Signed-off-by: Rajasekar Raja <rajasekarr@nvidia.com>
jared mauchJared Mauchjared mauch
bc1836d40c4ospfd: fix sign comparison warnings in SNMP codeFix compiler warnings about comparing signed and unsigned integers by casting arithmetic expressions to size_t to match the type of *length parameter. Fixed in functions: - ospfAreaRangeLookup - ospfHostLookup - ospfIfLookup - ospfIfMetricLookup - ospfVirtIfLookup - ospfNbrLookup - ospfExtLsdbLookup Signed-off-by: jared mauch <jared@puck.nether.net>
Rajasekar RajaRajasekar Raja
90105e5dd27bgpd: Fix maximum-prefix session recovery for peers and peer-groupsWhen a BGP session goes down due to maximum-prefix overflow, modifying the configuration should allow the session to recover. However, the session remains in Idle state because PEER_STATUS_PREFIX_OVERFLOW is not cleared. Fix three scenarios: 1. Increasing maximum-prefix limit on regular neighbor 2. Increasing maximum-prefix limit on peer-group member 3. Unsetting maximum-prefix on peer-group m...
Mark StappGitHubMark Stapp
ecda7e23e24MMerge pull request #20058 from raja-rajasekar/rajasekarr/vrrp_memleakvrrpd: [Mem leak] Vrrp interface delete fails to free connected route