FRR Mirror
  1. FRR Mirror

FRR

Public
AuthorCommitMessageCommit dateIssues
Donatas AbraitisGitHubDonatas Abraitis
c6227bbfcfcMMerge pull request #21102 from cscarpitta/fix_bgp_ls_coverity_defectsbgpd: Fix coverity defects in BGP-LS code
Russ WhiteGitHubRuss White
89b87964cb3MMerge pull request #18217 from Shbinging/fix_ip_rip_versionripd: fix ip rip send/receive version command
Russ WhiteGitHubRuss White
9530e0ab16bMMerge pull request #21215 from mjstapp/fix_ripd_pktsripd: fix data-handling in several places
Russ WhiteGitHubRuss White
05cdd4a81bfMMerge pull request #21203 from enkechen-panw/bgp-dup-test2tests: bgp_suppress_duplicates: simplify and split into four tests
Russ WhiteGitHubRuss White
735cdb057b8MMerge pull request #21191 from cscarpitta/fix_rmap_cleanup_orderingbgpd: Fix route-map cleanup ordering in SRv6 unicast SID export
Russ WhiteGitHubRuss White
5d28c9ad6b5MMerge pull request #21187 from Jafaral/nhrp-crash[WIP] nhrpd: guard AFI/table lookups in route resolution
Russ WhiteGitHubRuss White
10498c0e9bbMMerge pull request #21166 from enkechen-panw/network-nexthopbgpd: fix BGP_ATTR_NEXT_HOP flag handling in bgp_attr_default_set()
Russ WhiteGitHubRuss White
4825b5ba563MMerge pull request #21098 from mjstapp/fix_bgp_parse_evpn_vncbgpd: improve packet parsing for EVPN and ENCAP/VNC
Russ WhiteGitHubRuss White
3d09b69d358MMerge pull request #21126 from Manpreet-k0/stale_vtep_mrtests: add EVPN VTEP cleanup and recovery test on uplink flap
Russ WhiteGitHubRuss White
efe5c083dabMMerge pull request #21113 from opensourcerouting/fix/bgp_aspath_count_hopsbgpd: Return original as-path when reconciling AS versus AS4
Russ WhiteGitHubRuss White
3a2c202d925MMerge pull request #21097 from Jafaral/nhrp-scannhrpd: harden against malformed packets
Russ WhiteGitHubRuss White
8eb50e82ebeMMerge pull request #21095 from opensourcerouting/fix/bgp_vulnerabilitiesbgpd: harden attribute parsing and packet handling in a few places
Russ WhiteGitHubRuss White
54574457ce0MMerge pull request #21075 from opensourcerouting/fix/bgp_mp_reach_nlri_0.0.0.0bgpd: Validate MP_REACH_NLRI attribute against incorrect next-hop
Russ WhiteGitHubRuss White
27d7a2b22f8MMerge pull request #20350 from anlancs/zebra/fix-empty-vidzebra: fix missing vlan change
Mark StappMark Stapp
4fe4861af36ripd: ensure simple-auth value is NULL-terminatedEnsure the simple-auth string is in a NULL-terminated buffer before printing it with '%s'. Signed-off-by: Mark Stapp <mjs@cisco.com>
Mark StappMark Stapp
9d0a6bfd808ripd: use rn->info properly in process_response()route_node->info is a list, not a single object; use it correctly, and avoid NULL-deref potential. Signed-off-by: Mark Stapp <mjs@cisco.com>
Donatas AbraitisGitHubDonatas Abraitis
3da324e3678MMerge pull request #21188 from soumyar-roy/soumya/nexthopLLbgpd: fix NHT for explicit link-local BGP peers
Donald SharpGitHubDonald Sharp
13f726016fcMMerge pull request #21210 from opensourcerouting/fix/bgp_route_refresh_borrbgpd: Do not process route-refresh for AFI/SAFI if it's not negotiated
Russ WhiteGitHubRuss White
51f40797ea7MMerge pull request #21043 from opensourcerouting/fix/memory_leak_fqdn_capabilitybgpd: Free hostname for FQDN capability if the parsing goes wrong
Donald SharpGitHubDonald Sharp
69b3aba54d9MMerge pull request #21204 from cscarpitta/fix_isis_link_paramsisisd: Fix missing neighbor address Sub-TLVs after link-params change
Donatas AbraitisDonatas Abraitis
25520d45d15bgpd: Do not process route-refresh for AFI/SAFI if it's not negotiatedWe shouldn't allow processing AFI/SAFI received in route-refresh message if we don't have this AFI/SAFI enabled for this peer. Signed-off-by: Donatas Abraitis <donatas@opensourcerouting.org>
Donatas AbraitisGitHubDonatas Abraitis
a4b2f06ec94MMerge pull request #21099 from enkechen-panw/bgp-ipv6-nexthopbgpd: add config "nexthop prefer-global" for ipv6 address family
Carmine ScarpittaCarmine Scarpitta
b477964e288tests: Verify neighbor addr Sub-TLVs after link-params resetAdd test_step11() to the isis_te_topo1 topotest suite to verify that the IPv4 and IPv6 Neighbor Address Sub-TLVs in the Extended IS Reachability TLV are correctly restored after link-params changes. The test removes link-params from r1-eth0 and then re-adds them, and checks that the neighbor address Sub-TLVs are still present in the TED on all routers after the reconfiguration. Signed-off-by:...
Carmine ScarpittaCarmine Scarpitta
bfa173f319aisisd: Fix missing neighbor address Sub-TLVs after link-params changeWhen link-params are removed from an interface, Zebra notifies IS-IS via the zebra_if_update_link_params hook, triggering isis_mpls_te_update(). That function calls isis_link_params_update(), which resets ext->status to keep only SR-related Sub-TLV flags — clearing EXT_NEIGH_ADDR and EXT_NEIGH_ADDR6, which control advertisement of the IPv4 and IPv6 Neighbor Address Sub-TLVs, so those Sub-TLVs d...
Donatas AbraitisGitHubDonatas Abraitis
df9b9ecf3b5MMerge pull request #20988 from enkechen-panw/cluster-cmpbgpd: include length in cluster_hash_cmp()
Enke ChenEnke Chen
826e380da86bgpd: include length in cluster_hash_cmp()For robustness, the lengths should be compared even when the pointers are equal. Signed-off-by: Enke Chen <enchen@paloaltonetworks.com>
Enke ChenEnke Chen
35044b86010tests: add topotest for bgp "nexthop prefer-global"Add a topotest for bgp "nexthop prefer-global". Signed-off-by: Enke Chen <enchen@paloaltonetworks.com>
Enke ChenEnke Chen
4e9fd325707doc: add documentation for bgp "nexthop prefer-global"Add documentation for bgp "nexthop prefer-global". Signed-off-by: Enke Chen <enchen@paloaltonetworks.com>
Enke ChenEnke Chen
1265922cc0abgpd: add config "nexthop prefer-global" for ipv6 address familyThis command is similar to "set ipv6 next-hop prefer-global" in a route-map, but it's global and is applied to the ipv6 routes from all neighbors. BGP may receive a link-local ipv6 address, and a global IPv6 address as the nexthops from a directly connected peer. The default in FRR is to use the link-local address. This config would override the default and use the global ipv6 address instead...
Enke ChenEnke Chen
d33a1dd19fabgpd: fix BGP_ATTR_NEXT_HOP flag handling in bgp_attr_default_set()bgp_attr_default_set() unconditionally set the BGP_ATTR_NEXT_HOP flag on every call, even though attr.nexthop (the IPv4 address field) is all-zeros and not yet assigned. This flag is used by BGP_ATTR_NEXTHOP_AFI_IP6 to distinguish IPv4 vs IPv6 nexthops, so having it always set caused non-IPv4 routes to be misidentified. Callers were working around this by manually calling UNSET_FLAG for non-IPv...
Enke ChenEnke Chen
2becd7b1ab7tests: bgp_suppress_duplicates: simplify and split into four testsConvert the iBGP session between r1 and r2 to eBGP. This eliminates rmap-to-r2 (which existed solely to normalize local-pref to 100 at r2), next-hop-self, and the now-empty address-family block on r2. Since local-pref is not carried over eBGP, drop the local_pref parameter from _bgp_check_route_attributes(). Add a step to wait for the initial route to appear at r2 before recording the baseline...
Mark StappGitHubMark Stapp
455cb9166b6MMerge pull request #21183 from quentinbaradat/fix/isis-spf-vertex-adj-memleakisisd: fix memory leak in remove_excess_adjs()
Donald SharpGitHubDonald Sharp
41e8ac5fe21MMerge pull request #21105 from Jafaral/bfd-scanbfdd: harden packet validation and reflector handling
Carmine ScarpittaCarmine Scarpitta
f2dcfed83b4bgpd: Fix route-map cleanup ordering in SRv6 unicast SID exportWhen removing SRv6 unicast SID export config, route-map cleanup frees rmap_name before looking up the route-map and decrementing its counter. Reorder cleanup to first call route_map_lookup_by_name() and route_map_counter_decrement(), then free rmap_name. Apply the same ordering fix in the SRv6 unicast delete path for consistency. Signed-off-by: Carmine Scarpitta <cscarpit@cisco.com>
Soumya RoySoumya Roy
1f6eea1f77btests: add NHT validation tests for explicit LL BGP peersSigned-off-by: Soumya Roy <souroy@nvidia.com>
Soumya RoySoumya Roy
92eeefbd64dbgpd: fix NHT for explicit link-local BGP peersWhen a BGP peer is configured with an explicit IPv6 link-local address (neighbor fe80::1 interface swp1), the NHT peer-tracking code skipped deriving the ifindex from the kernel-provided scope_id because peer->conf_if is NULL for this configuration style. This caused peer-tracking to create a BNC keyed with ifindex 0 while path-tracking created a separate BNC keyed with the real ifindex from s...
Jafar Al-GharaibehJafar Al-Gharaibeh
f0cf5cffa7anhrpd: guard AFI/table lookups in route resolutionValidate AFI and zebra_rib table availability before route lookups in NHRP route resolution paths, so IPv6-disabled or otherwise unready contexts fail safely instead of dereferencing invalid route tables. Signed-off-by: Jafar Al-Gharaibeh <jafar@atcorp.com>
Quentin BaradatQuentin Baradat
d7c0d46f06bisisd: add unit test for remove_excess_adjs() memory leak fixAdd a test that verifies remove_excess_adjs() properly frees the isis_vertex_adj it removes from the list. The test uses FRR's per-MTYPE allocation counter (n_alloc) to assert that: - After remove_excess_adjs(): exactly one MTYPE_ISIS_VERTEX_ADJ allocation is freed (not just unlinked) - After full list cleanup: all allocations return to baseline Without the fix in the preceding commit, the ...
Donald SharpGitHubDonald Sharp
bf2a8cf4700MMerge pull request #21158 from Jafaral/fix-grpc-testtests: fix grpc_basic xdist collection mismatch
Donald SharpGitHubDonald Sharp
20d6c02f3c7MMerge pull request #21175 from Jafaral/ci-updateCI: fix node js deprecation warning, limit mergify backports github ci runs
Quentin BaradatQuentin Baradat
9aab8804be9isisd: fix memory leak in remove_excess_adjs()When the number of adjacencies for a vertex exceeds ISIS_MAX_PATH_SPLITS, remove_excess_adjs() calls list_delete_node() which frees the listnode but does NOT free the isis_vertex_adj data payload. This leaks one MTYPE_ISIS_VERTEX_ADJ allocation per call. In large-scale deployments, each SPF run triggers this path accumulating leaked memory. Valgrind trace: definitely lost: 3,332,608 bytes i...
Jafar Al-GharaibehJafar Al-Gharaibeh
567daf12404bfdd: cap IPv6 echo reflection to declared lengthValidate IPv6 echo payload length and reflect only bep->len bytes instead of raw receive length to avoid oversized reflection payloads. Signed-off-by: Jafar Al-Gharaibeh <jafar@atcorp.com>
Jafar Al-GharaibehJafar Al-Gharaibeh
3a702f06b32bfdd: account for FP offset in echo length checksValidate echo packet length using bfd_offset + sizeof(*bep) so forwarding-plane packets are not parsed past received data. Signed-off-by: Jafar Al-Gharaibeh <jafar@atcorp.com>
Jafar Al-GharaibehJafar Al-Gharaibeh
60429aa4659bfdd: fix recv errno filter logic in a few placesUse logical AND when filtering EAGAIN/EWOULDBLOCK/EINTR in bfd_recv_ipv4_fp(), bfd_recv_ipv4(), and bfd_recv_ipv6() so only real socket errors are logged. Signed-off-by: Jafar Al-Gharaibeh <jafar@atcorp.com>
Jafar Al-GharaibehJafar Al-Gharaibeh
7312fb7086abfdd: tighten SBFD reflector packet sanity checksValidate TTL, version, and declared packet length before reflecting SBFD init packets, and only reflect cp->len bytes. Add debug logs for early packet drops. Signed-off-by: Jafar Al-Gharaibeh <jafar@atcorp.com>
Jafar Al-GharaibehJafar Al-Gharaibeh
7786df14677bfdd: gate IPv6 echo reflection on known sessionsOnly reflect IPv6 echo packets when the source/local tuple maps to an existing BFD session, preventing unauthenticated reflection of arbitrary on-link packets. Signed-off-by: Jafar Al-Gharaibeh <jafar@atcorp.com>
Jafar Al-GharaibehJafar Al-Gharaibeh
ef88ba31275bfdd: tighten auth header parsing skeletonRestructure bfd_check_auth() so A-bit packets are length-validated before reading auth fields, and keep explicit RFC 5880 auth-type switch branches for future implementation. Signed-off-by: Jafar Al-Gharaibeh <jafar@atcorp.com>
Jafar Al-GharaibehJafar Al-Gharaibeh
d6f779ebbc0bfdd: validate control packet length before session lookupCheck recv length before casting/parsing the control packet so short or error reads cannot drive discriminator/session lookup with uninitialized data. Keep debug visibility for short and non-positive reads while dropping early. Signed-off-by: Jafar Al-Gharaibeh <jafar@atcorp.com>
Jafar Al-GharaibehGitHubJafar Al-Gharaibeh
8653c6638a4MMerge pull request #21176 from opensourcerouting/fix/bgp_attr_encap_length_boundariesbgpd: Prevent heap use-after-free for tunnel encapsulation attribute
Jafar Al-GharaibehJafar Al-Gharaibeh
d213baa2e0fci: skip github ci for mergify PRsSkip this workflow when the PR actor is mergify[bot] to reduce load. We still run NeDEF CI, so if there are issues they would still be caught. Signed-off-by: Jafar Al-Gharaibeh <jafar@atcorp.com>