FRR Mirror
  1. FRR Mirror

FRR

Public
AuthorCommitMessageCommit dateIssues
Mark StappGitHubMark Stapp
c5eda3d30dfMMerge pull request #20308 from donaldsharp/rnh_per_clientRnh per client
Mark StappGitHubMark Stapp
a0ccacedc99MMerge pull request #20264 from donaldsharp/some_test_fixes_2Some test fixes 2
Nathan BahrGitHubNathan Bahr
5a7d8151564MMerge pull request #20423 from donaldsharp/gdb_macros_cleanup_and_addGdb macros cleanup and add
Donald SharpGitHubDonald Sharp
7e8a0d74edaMMerge pull request #20424 from opensourcerouting/fix/doc_allow_reserved_rangesdoc: Exclude 240.0.0.0/4 from allow-reserved-ranges
Russ WhiteGitHubRuss White
9d85eac33f2MMerge pull request #20406 from donaldsharp/pim_broken_behaviortests: show some broken pim behavior
Donald SharpDonald Sharp
85ed11f9a7czebra: Clean up possible memory leaks on shutdown of clientWhen cleaninmg up a client and at the same time the decision was made to shutdown, ensure that streams are not leaked. Signed-off-by: Donald Sharp <sharpd@nvidia.com>
Donald SharpDonald Sharp
f7f087cea66tests: Add a specific test to show that nht resolution changesWhen two different clients are both tracking the same nexthop let's ensure that they can resolve to different nexthops and at reconverge when the different routes change. Signed-off-by: Donald Sharp <sharpd@nvidia.com>
Donald SharpDonald Sharp
b79aca38350tests: Fix all_protocol_startup for nht changesThe nht output has changed and is being updated to reflect the reality of how it actually works now. Signed-off-by: Donald Sharp <sharpd@nvidia.com>
Donald SharpDonald Sharp
8e1f9898a6ezebra: Change rnh data structure to be per clientCurrently when a client protocol does nexthop tracking the created rnh is shared for each client that wants to watch a particular prefix. This had the bad behavior of causing problems when two clients are trying to track the same prefix/address but have different flags. The last watcher will win and change the flags. This can/will cause upper level protocols to match to the wrong prefix, thu...
Donatas AbraitisGitHubDonatas Abraitis
c87f0fb8be0MMerge pull request #20422 from kaffarell/push-pyotkznyywmsdoc: fix bgp unnumbered neighbor interface command syntax
Russ WhiteGitHubRuss White
87d33a03ab7MMerge pull request #20331 from krishna-samy/krishna/bgp-path-lookupbgpd: Optimize BGP path lookup using typesafe hash for efficient lookup
Donatas AbraitisDonatas Abraitis
98a3d047863doc: Exclude 240.0.0.0/4 from allow-reserved-rangesIt's already included (whitelisted) by default. Signed-off-by: Donatas Abraitis <donatas@opensourcerouting.org>
Donald SharpDonald Sharp
9eb855ff6b3gdb: Move the bgp macros to their own fileNot everyone wants to load the bgp macros when debugging a different daemon Signed-off-by: Donald Sharp <sharpd@nvidia.com>
Donald SharpDonald Sharp
d6a266deeb6gdb: Separate out the pim macros to their own fileMove the pim macros to their own spot. Signed-off-by: Donald Sharp <sharpd@nvidia.com>
Donald SharpDonald Sharp
0571af7dd1agdb: Add dump_pim_upstream and dump_jp_agg_list macrosAdd a bit of macro magic to allow the dump of these data structures from pim. Signed-off-by: Donald Sharp <sharpd@nvidia.com>
Donatas AbraitisGitHubDonatas Abraitis
987eaab16e4MMerge pull request #20421 from LabNConsulting/chopps/fix-vrf-queryfix show `frr-vrf:lib/vrf/state` query
Gabriel GollerGabriel Goller
5a58f77ecdcdoc: fix bgp unnumbered neighbor interface command syntaxThe `neighbor PEER interface` command documentation incorrectly showed an `IFNAME` parameter. Corrected and added the optional `peer-group NAME` parameter. Signed-off-by: Gabriel Goller <g.goller@proxmox.com>
Christian HoppsChristian Hopps
3f31476a2c6tests: add missed show coverage- drill query down into generic vrf state that would exclude zebra specific state. Signed-off-by: Christian Hopps <chopps@labn.net>
Christian HoppsChristian Hopps
1006904d7adzebra: zebra also owns the generic vrf stateSigned-off-by: Christian Hopps <chopps@labn.net>
Donald SharpGitHubDonald Sharp
80dbba38ab8MMerge pull request #20411 from drosarius/tests/rip_no_neighbortests: add topotest for disabling rip neighbor
Mark StappGitHubMark Stapp
3981b3f31e0MMerge pull request #20377 from donaldsharp/asic_notification_removalzebra: Remove zrouter.zav.asic_notification_nexthop_control
Mark StappGitHubMark Stapp
f288619c3eaMMerge pull request #20410 from donaldsharp/eigrp_crasheigrpd: Prevent crash in packet handling
drosariusdrosarius
ce28ff3f593tests: add topotest for disabling rip neighborSigned-off-by: drosarius <dustin.rosarius@gmail.com>
Donald SharpDonald Sharp
146fa6a822ceigrpd: Prevent crash in packet handlingeigrp will crash on a lan segment with more than one neighbor on shutdown in some situations. Let's just fix it. Signed-off-by: Donald Sharp <sharpd@nvidia.com>
Donald SharpGitHubDonald Sharp
4e4bbd62db7MMerge pull request #20405 from cscarpitta/fix/fix_cid_1668073staticd: Fix CID 1668073 (NULL pointer dereference in SRv6 code)
Donald SharpGitHubDonald Sharp
23e72abe616MMerge pull request #20351 from vjardin/isis_cleanupisisd clean up: migrate lists to typesafe DLIST and fix minor memory leaks
Donald SharpDonald Sharp
726bdffe2dazebra: Remove zrouter.zav.asic_notification_nexthop_controlThis value has been in deprecation for over a year. Let's remove it now. No-one has come forth and told us that they were using this code at all. Safe to assume it's dead. Signed-off-by: Donald Sharp <sharpd@nvidia.com>
Donald SharpGitHubDonald Sharp
c6c30a2d2d4MMerge pull request #20384 from y-bharath14/srib-yang-V1yang: Reorderd must constraints in frr-eigrpd module
Donald SharpGitHubDonald Sharp
738ad285fb6MMerge pull request #20400 from opensourcerouting/fix/local_pref_add_substractbgpd: Use the default local-preference value and not 0 when adjusting
Donald SharpGitHubDonald Sharp
b1a567b7aadMMerge pull request #20403 from vjardin/vj_ci-harderningci: add retry logic for apt and curl to handle transient failures - default 3 times
Donald SharpDonald Sharp
1c8566a008btests: show some broken pim behaviorThere exists a topology, where we can show that pim has some broken behavior. Create a test that shows this but do not turn it on to be run for every run. Signed-off-by: Donald Sharp <sharpd@nvidia.com>
KrishnasamyKrishnasamy
b45c53b4f59bgpd: Optimize BGP path lookup using typesafe hash for efficient lookupProblem: -------- BGP path lookup currently uses O(N) linear search through the list (dest->info) for every incoming route update. In high-ECMP scenarios, each update requires iterating through the entire path list to check if a path from that peer already exists. This becomes a severe performance bottleneck in data center environments with high ECMP during large-scale route updates churn. So...
Carmine ScarpittaCarmine Scarpitta
68e8eb0bd53staticd: Fix CID 1668073 (NULL pointer dereference)``` *** CID 1668073: Null pointer dereferences (FORWARD_NULL) /staticd/static_srv6.c: 812 in static_srv6_neigh_register_if_needed() 806 { 807 if (!neigh_cache) { 808 DEBUGD(&static_dbg_srv6, "%s: Initializing neighbor cache", __func__); 809 static_srv6_neigh_cache_init(); 810 } 811 >>> CID 1668073: Null pointer dereferences (FORWARD_NU...
Vincent JardinVincent Jardin
8c981394718ci: add retry logic for apt and curl to handle transient failuresUbuntu package mirrors can experience transient failures during CI runs, causing builds to fail with 404 errors even though the packages exist. Similarly, fetching GPG keys from external servers may fail due to temporary network issues. This patch introduces an APT_RETRIES build argument (defaulting to 3) that controls the number of retry attempts for network operations. The apt configuration ...
Donatas AbraitisDonatas Abraitis
c73011dd898tests: Check if local-preference can be added/substracted from an existing oneSigned-off-by: Donatas Abraitis <donatas@opensourcerouting.org>
Donatas AbraitisDonatas Abraitis
32379b932c8bgpd: Use the default local-preference value and not 0 when adjustingIf we use something like: route-map x permit 10 set local-preference +10 We treat that a default is 0, but it's not. We MUST respect the default BGP local preference value that is set. Signed-off-by: Donatas Abraitis <donatas@opensourcerouting.org>
Donatas AbraitisGitHubDonatas Abraitis
b2cc85bdc1eMMerge pull request #20399 from raja-rajasekar/rajasekarr/coverity_fixzebra: Fix coverity reported issue - 1668074
Rajasekar RajaRajasekar Raja
3f2b5962a31zebra: Fix coverity reported issue - 1668074*** CID 1668074: Null pointer dereferences (REVERSE_INULL) /zebra/rt_netlink.c: 3370 in netlink_nexthop_msg_encode() 3364 nexthop_done: Signed-off-by: Rajasekar Raja <rajasekarr@nvidia.com>
Vincent JardinVincent Jardin
5d14c051848isisd: fix terminate() destruction order for DLIST callbacksMove vrf_terminate() and prefix_list_reset() before isis_master_terminate(). Their callbacks (isis_vrf_disable, isis_prefix_list_update) iterate over im->isis list which is finalized by isis_master_terminate(). With typesafe DLIST, iterating a finalized list causes a SEGV crash. Signed-off-by: Vincent Jardin <vjardin@free.fr>
Vincent JardinVincent Jardin
64a62e4c032isisd: fix isis_area_destroy destruction order for DLISTFix destruction order in isis_area_destroy() to prevent crashes when terminating areas with typesafe DLIST. Two issues were addressed: 1. Move isis_mpls_te_term() before circuit list cleanup because it iterates over circuit_list to delete extended sub-TLVs. 2. Move isis_sr_area_term() and isis_srv6_area_term() before isis_mpls_te_term() because SR adj_sids reference structures inside ...
Vincent JardinVincent Jardin
e62419b8940isisd: convert area_addrs from linked list to typesafe DLISTConvert the isis_area->area_addrs field from the legacy struct list * to the FRR typesafe DLIST container. This change is part of the ongoing effort to migrate IS-IS data structures to typesafe containers for improved type safety and code clarity. Signed-off-by: Vincent Jardin <vjardin@free.fr>
Vincent JardinVincent Jardin
53bda3f1739tests: fix minor memory leak in test_isis_lspdbAddressSanitizer detected the isis structure allocated in main() was never freed. This is a minor test code issue with no impact on isisd itself. Signed-off-by: Vincent Jardin <vjardin@free.fr>
Vincent JardinVincent Jardin
b4494ffab8fisisd: fix memory leak for MT settings static buffersThe multi-topology code in isis_mt.c uses three static buffers to avoid repeated memory allocations during MT settings lookups. These buffers are allocated using XREALLOC in area_mt_settings(), circuit_mt_settings(), and circuit_bcast_mt_set(), growing as needed but never freed during daemon shutdown. This causes the memory leak checker to report three "ISIS MT Area Setting" allocations per ro...
Vincent JardinVincent Jardin
32af31867d2isisd: fix crash in isis_area_destroy destruction orderMove lsp_db_fini() before circuit list cleanup in isis_area_destroy(). The lsp_destroy() function iterates over circuit_list to remove LSPs from tx queues. With typesafe lists, a finalized list is invalid (not NULL), so accessing it causes a crash. Signed-off-by: Vincent Jardin <vjardin@free.fr>
Vincent JardinVincent Jardin
0fb3b7a53cdisisd: migrate lists to typesafe DLISTMigrate IS-IS lists from the legacy list API to FRR's typesafe.h DLIST macros: - isis_instance_list (im->isis) - isis_area_list (isis->area_list) - isis_circuit_list (area->circuit_list) - isis_area_adj_list (area->adjacency_list) Update iteration patterns from ALL_LIST_ELEMENTS_RO/ALL_LIST_ELEMENTS to frr_each/frr_each_safe, and replace listnode_add/listnode_delete with typesafe list operatio...
Vincent JardinVincent Jardin
2becde02810isisd: fix code formatting in files to be modifiedApply clang-format to source files that will be modified by subsequent commits in this branch. This ensures consistent code style before introducing new functionality. Signed-off-by: Vincent Jardin <vjardin@free.fr>
Vincent JardinVincent Jardin
2c9115af922lib: fix static analyzer false positive in DLIST _pop macroAdd an explicit NULL check in the DLIST _pop function to satisfy static analyzers that cannot track the DLIST invariant. The DLIST implementation guarantees that hitem.next is never NULL - it either points to the first element or back to the sentinel for an empty list. However, static analyzers see a pointer loaded from a struct field and assume it could be NULL. The added NULL check: - Satis...
Mark StappGitHubMark Stapp
ea41dc5be92MMerge pull request #20181 from raja-rajasekar/rajasekarr/promiscuity zebra: Update promiscuity flag silently without route resets
Donald SharpGitHubDonald Sharp
c158f11455cMMerge pull request #20387 from LabNConsulting/chopps/triage-latestatemgmtd fix init config retry
Mark StappGitHubMark Stapp
de663dfbcfdMMerge pull request #20300 from donaldsharp/zebra_freebsd_dplane_for_routeszebra: Transform FreeBSD to use the dplane for route changes.