FRR Mirror
  1. FRR Mirror

FRR

Public
AuthorCommitMessageCommit dateIssues
Donald SharpGitHubDonald Sharp
6838700da65MMerge pull request #20322 from opensourcerouting/fix/treat-as-withdraw-if-lenghts-are-conflictingbgpd: Treat as withdraw iBGP session when total attr length is path attributes
Mark StappGitHubMark Stapp
2fcb0b28baeMMerge pull request #20232 from raja-rajasekar/rajasekarr/zebra_traceszebra: flood of trace commits
Christian HoppsGitHubChristian Hopps
1e409826f1bMMerge pull request #20275 from donaldsharp/test_rip_del_instance_updatetests: Add a `show ip rip` to test_rip_del_instance
Rajasekar RajaRajasekar Raja
113c882384ezebra: [TP] Traces in Zebra netlink parse error conditionsAdding traces in Zebra netlink parse error conditions co-authored by Nvidia FRR team Signed-off-by: Rajasekar Raja <rajasekarr@nvidia.com>
Rajasekar RajaRajasekar Raja
c0db39e9cc6zebra: [TP] Traces in Zebra EVPN operationsAdding traces in Zebra EVPN operations co-authored by Nvidia FRR team Signed-off-by: Rajasekar Raja <rajasekarr@nvidia.com>
Rajasekar RajaRajasekar Raja
55c3d4f2977zebra: [TP] Traces in Zebra Vxlan operationsAdding traces in Zebra Vxlan operations Signed-off-by: Rajasekar Raja <rajasekarr@nvidia.com>
Rajasekar RajaRajasekar Raja
4642a4133b2zebra: [TP] Traces in Zebra-Netlink operationsAdding traces in Zebra Netlink operations Signed-off-by: Rajasekar Raja <rajasekarr@nvidia.com>
Rajasekar RajaRajasekar Raja
47548875b05zebra: [TP] Traces in SRv6 operationsAdding traces in Zebra SRv6 operations Signed-off-by: Rajasekar Raja <rajasekarr@nvidia.com>
Rajasekar RajaRajasekar Raja
1f362acb6e9zebra: [TP] Traces in VTEP operationAdding traces in Zebra VTEP operation co-authored by Nvidia FRR team Signed-off-by: Rajasekar Raja <rajasekarr@nvidia.com>
Rajasekar RajaRajasekar Raja
4d6991dbe31zebra: [TP] Traces in NHG operationsAdding traces in Zebra NHG operations co-authored by Nvidia FRR team Signed-off-by: Rajasekar Raja <rajasekarr@nvidia.com>
Rajasekar RajaRajasekar Raja
ed948a9a345zebra: [TP] disable clang-format for zebra tracesDisables clang-format for the Zebra tracepoint Signed-off-by: Rajasekar Raja <rajasekarr@nvidia.com>
Rajasekar RajaRajasekar Raja
45ffa620005zebra: [TP] Traces in Route or Rib operationsAdding traces in Zebra Route/Rib operations co-authored by Nvidia FRR team Signed-off-by: Rajasekar Raja <rajasekarr@nvidia.com>
Rajasekar RajaRajasekar Raja
272f8e89106lib: Add Nexthop status in nexthop2str functionAdd Active/Inactive Nexthop status in nexthop2str function Ticket :# 4265339 Signed-off-by: Rajasekar Raja <rajasekarr@nvidia.com>
Rajasekar RajaRajasekar Raja
a09580bc6e3zebra: [TP] Traces in Intf managementAdding traces in Zebra Intf management co-authored by Nvidia FRR team Signed-off-by: Rajasekar Raja <rajasekarr@nvidia.com>
Donatas AbraitisDonatas Abraitis
498cd5c4f72tests: Treat as withdraw if packet/attributes length is not correctSigned-off-by: Donatas Abraitis <donatas@opensourcerouting.org>
Donatas AbraitisGitHubDonatas Abraitis
92042458fecMMerge pull request #20306 from soumyar-roy/soumya/ospf_asbrospf6d: Route-Map parameter forwarding-address functionality not work…
Donatas AbraitisGitHubDonatas Abraitis
ae4d2bfa152MMerge pull request #20315 from donaldsharp/bgp_v6_ll_peeringbgpd: Allow LL peering to update v6 GUA
Donatas AbraitisGitHubDonatas Abraitis
fc33de8c47fMMerge pull request #20320 from soumyar-roy/soumya/nd-ra-fixes2zebra: make nd ra prefix cmd idompotent
Donatas AbraitisDonatas Abraitis
19884d5198ebgpd: Treat as withdraw iBGP session when total attr length is path attributesRFC 7606 says: Attribute Length Fields There are two error cases in which the Total Attribute Length value can be in conflict with the enclosed path attributes, which themselves carry length values: * In the first case, the length of the last encountered path attribute would cause the Total Attribute Length to be exceeded when parsing the enclosed path attributes. ...
Donald SharpSoumya RoyDonald Sharp
4a8b8eb9ed7tests: Add a test_ospfv3_route_map_forwarding testThe route-map set command `set forwarding-address X::X` in ospf6d has a bug where this was not correctly being honored. Let's write a topotest that shows that this fix works and is correct. Signed-off-by: Donald Sharp <sharpd@nvidia.com>
Utkarsh SrivastavaSoumya RoyUtkarsh Srivastava
850c40f1607ospf6d: Route-Map parameter forwarding-address functionality not working properlyIssue: The forwarding-address parameter set via a route-map is not being reflected in the OSPFv3 LSAs as expected. Specifically, after configuring the following on router L1, the forwarding-address is missing from the OSPFv3 database on the peer router S1: Root Cause: In the function ospf6_asbr_redistribute_add, the forwarding address is initially set from the route-map: if (!IN6_IS_ADDR_UNSPE...
Vijayalaxmi BasavarajSoumya RoyVijayalaxmi Basavaraj
911a1660121zebra: make nd ra prefix cmd idompotentTicket: #4205223 Testing: root@r1:mgmt:~# nv unset interface swp3 ip neighbor-discovery prefix 2001:fffe:01::/64 Tcpdump: 05:45:58.892659 IP6 (flowlabel 0x72074, hlim 255, next-header ICMPv6 (58) payload length: 216) fe80::202:ff:fe00:b > ip6-allnodes: [icmp6 sum ok] ICMP6, router advertisement, length 216 hop limit 64, Flags [none], pref medium, router lifetime 30s, reachable time 0ms, retran...
Mark StappGitHubMark Stapp
0a7b0efd4deMMerge pull request #20196 from raja-rajasekar/rajasekarr/tracesbgpd: flood of trace commits
Donald SharpDonald Sharp
489a69a9bb6bgpd: Allow LL peering to update v6 GUACurrently, when a LL based peer in BGP is created: neighbor fe80:1::1 remote-as external neighbor fe80:1::1 interface r2-eth0 When the interface is updated with a v6 GUA after peering is established. The v6 GUA is never sent to the peer. Current code behavior allows for bgp unnumbered peering: neighbor r2-eth1 remote-as external To update it's GUA address when it comes the address i...
Donald SharpGitHubDonald Sharp
628a463ebb0MMerge pull request #20289 from mjstapp/fix_dplane_netlink_neighzebra: don't access ifp from dplane pthread
Donald SharpGitHubDonald Sharp
33342f8d0a3MMerge pull request #20296 from Max-Mustermann33/ospf6d_default_route_mapospf6d: Fix handling of default-routes
Donald SharpGitHubDonald Sharp
7891c3dd191MMerge pull request #20298 from opensourcerouting/fix/staticd_delete_route_blackhole_typestaticd: Prevent deleting a static route if blackhole type is not the same
Donatas AbraitisGitHubDonatas Abraitis
01331b1a505MMerge pull request #20307 from donaldsharp/rip_timers_in_testsripd: Speed up convergence of rip_default_metric
Donatas AbraitisGitHubDonatas Abraitis
6ceaf32ceeeMMerge pull request #20309 from raja-rajasekar/rajasekar/coverity2bgpd: fix coverity "Dereferencing null pointer"
Donald SharpGitHubDonald Sharp
4f93e4a5cb5MMerge pull request #20313 from hedrok/20310-fix-deleting-link-params-bwzebra: add CLI 'no' versions for max-bw and others
Donald SharpGitHubDonald Sharp
d3c96145ef5MMerge pull request #20312 from LabNConsulting/chopps/small-topo-fixtests: remove incorrect test code
Kyrylo YatsenkoKyrylo Yatsenko
31a0930f89czebra: add CLI 'no' versions for max-bw and othersAdd '[no]' versions for commands: * max-bw * max-rsv-bw * unrsv-bw Without these frr-reload failed after deletion of link-params with these commands. For them to work update: * lib_interface_zebra_link_params_max_bandwidth_destroy * lib_interface_zebra_link_params_max_reservable_bandwidth_destroy * lib_interface_zebra_link_params_unreserved_bandwidths_unreserved_bandwidth_destroy All three...
Christian HoppsChristian Hopps
0029da58c94tests: remove incorrect test code- Remove broken code in error path, and fix lint warn. Signed-off-by: Christian Hopps <chopps@labn.net>
Krishnasamy RRajasekar RajaKrishnasamy R
8d2d9c6f4e8bgpd: fix coverity "Dereferencing null pointer"CID 111549 - Dereferencing null pointer "labels" Signed-off-by: Krishnasamy R <krishnasamyr@nvidia.com>
Donald SharpDonald Sharp
cb766c34549ripd: Speed up convergence of rip_default_metricThis test is changing the default metric and then waiting 30 seconds to ensure that the value is passed. This is a bit problematic in that rip operates on a 30 second window before updates are sent. Let's change the basic update operation in rip to 5 seconds and see if the test will not occassionally fail now. Signed-off-by: Donald Sharp <sharpd@nvidia.com>
Philippe GuibertGitHubPhilippe Guibert
89ac8e491cbMMerge pull request #19981 from cscarpitta/fix/fix_srv6_ua_nexthop_resolutionstaticd: Fix SRv6 uA SID installation
Alexander RoseAlexander Rose
026f24989fdospf6d: Fix handling of default-routesWhen using ZEBRA_ROUTE_MAX as upper limit for loops, we have to remember that DEFAULT_ROUTE == ZEBRA_ROUTE_MAX and we must therefore also include this last type. Signed-off-by: Alexander Rose <alexander.rose@secunet.com>
Rajasekar RajaRajasekar Raja
6d0dffddf1ebgpd: [TP] Traces in the BGP Update processingAdding new tracepoints in the BGP Update processing co-authored by Nvidia FRR team Signed-off-by: Rajasekar Raja <rajasekarr@nvidia.com>
Rajasekar RajaRajasekar Raja
b5b052deaf3bgpd: [TP] Traces in the BGP UpdgrpAdding new tracepoints in the BGP Updgrp co-authored by Nvidia FRR team Signed-off-by: Rajasekar Raja <rajasekarr@nvidia.com>
Rajasekar RajaRajasekar Raja
504a853afe5bgpd: [TP] Traces in the BGP-Zebra interactionAdding new tracepoints in the BGP-Zebra interactions co-authored by Nvidia FRR team Signed-off-by: Rajasekar Raja <rajasekarr@nvidia.com>
Donatas AbraitisDonatas Abraitis
7ddcda14857tests: Check if static routes can be deleted with a correct blackhole typeSigned-off-by: Donatas Abraitis <donatas@opensourcerouting.org>
Donatas AbraitisDonatas Abraitis
b254e8091a1staticd: Prevent deleting a static route if blackhole type is not the sameTesting done: ``` Add blackhole route $ vtysh -c 'conf t' -c 'ip route 100.252.0.0/24 blackhole' -c 'end' Verify $ vtysh -c 'show ip route' | grep 100.252 S>* 100.252.0.0/24 [1/0] unreachable (blackhole) Delete reject (doesn't exist) $ vtysh -c 'conf t' -c 'no ip route 100.252.0.0/24 reject' -c 'end' Route stays (which is good) $ vtysh -c 'show ip route' | grep 100.252 S>* 100.252.0.0/24 [1...
Donatas AbraitisGitHubDonatas Abraitis
2232e2b41eeMMerge pull request #17117 from enkechen-panw/zfix-1zebra: notify nht client about protocol type change
Donatas AbraitisGitHubDonatas Abraitis
0020ebd66bfMMerge pull request #19786 from pguibert6WIND/rmap_encapsulation_gretaproute-map encapsulation gretap
Donatas AbraitisGitHubDonatas Abraitis
344da7b0d6cMMerge pull request #20263 from donaldsharp/bgp_peer_connection_changesBgp peer connection changes
Donatas AbraitisGitHubDonatas Abraitis
0c82961c58bMMerge pull request #20269 from drosarius/tests/rip-default-metrictests: add topotest for setting RIP default-metric
Donatas AbraitisGitHubDonatas Abraitis
42bc1f2ef02MMerge pull request #20293 from raja-rajasekar/rajasekarr/coverity1bgpd: Fix Coverity analysis
Soumya RoyRajasekar RajaSoumya Roy
0a5271b870ebgpd: Fix Coverity analysisThis fixes coverity warning: Assigning value "NULL" to "pfx" here, but that stored value is overwritten before it can be used Removed unnessary NULL assignement to const struct prefix *pfx - The line pfx = NULL; assigns NULL to the variable - Immediately after, the very next statement checks a condition and overwrites pfx with a different value - The NULL value is never actually used - ...
Mark StappMark Stapp
2f446a80390zebra: don't access ifp from dplane pthreadThe function that handles incoming IPNEIGH netlink messages runs in the dplane pthread - it can't look up vrfs or ifps. Signed-off-by: Mark Stapp <mjs@cisco.com>
Donatas AbraitisGitHubDonatas Abraitis
a172cee1123MMerge pull request #20051 from remram44/doc-evpndoc: Expand some of the acronyms in EVPN page