FRR Mirror
  1. FRR Mirror

FRR

Public
AuthorCommitMessageCommit dateIssues
Donald SharpGitHubDonald Sharp
3005868f582MMerge pull request #20111 from hedrok/tools-checkpatch-fix-constant-comparison-checktools: fix checkpatch.pl for 'FOO < BAR && ...'
Kyrylo YatsenkoKyrylo Yatsenko
fc53f1a6852tools: fix checkpatch.pl for 'FOO < BAR && ...'In the check $to gets value from $LvalOrFunc in regular expression that ends with '\s*', so in case of check for if (FOO < BAR && somethingelse) $to equals 'BAR ' and check that on right side there is also a constant fails. Simple fix: add '\s*' to re that checks whether $to is constant. Signed-off-by: Kyrylo Yatsenko <hedrok@gmail.com>
Carmine ScarpittaGitHubCarmine Scarpitta
67660e09077MMerge pull request #20053 from k-akashi/isis_srv6_mtisisd: use IPv6 MTID for SRv6 locator TLVs when IPv6 MT is enabled
Jafar Al-GharaibehGitHubJafar Al-Gharaibeh
5bd2b31bb6aMMerge pull request #20094 from soumyar-roy/soumya/id_pool_null_checklib: NULL-check idalloc pools
Donatas AbraitisGitHubDonatas Abraitis
974510d1e3dMMerge pull request #20029 from jaredmauch/ospf_snmp_compile_fixesospfd: Fix sign comparison warnings in SNMP code
Donatas AbraitisGitHubDonatas Abraitis
a3fa67126c1MMerge pull request #20082 from krishna-samy/krishnasamyr/coveritylib: Coverity fixes
Donatas AbraitisGitHubDonatas Abraitis
19e7bd335ffMMerge pull request #20062 from mjstapp/fix_bgp_label_nlribgpd: bounds-check when parsing incoming label in nlri
Donatas AbraitisGitHubDonatas Abraitis
c07c237d989MMerge pull request #20097 from soumyar-roy/soumya/pimd_crashpimd: Prevent crash on interface removal
Donatas AbraitisGitHubDonatas Abraitis
494515e29c0MMerge pull request #20095 from soumyar-roy/soumya/evpn_mac_listzebra: ensure zif mac_list exists before unlinking mac
KrishnasamyKrishnasamy
9ea76225cf3lib: Medium coverity fix - Dereference null return valueCID 109379: Dereferencing vrf, which is known to be NULL Signed-off-by: Krishnasamy <krishnasamyr@nvidia.com>
KrishnasamyKrishnasamy
19f89e34bc9lib: Medium coverity fix - Dereference null return valueCID 18907: Dereferencing bit, which is known to be NULL Signed-off-by: Krishnasamy <krishnasamyr@nvidia.com>
KrishnasamyKrishnasamy
866a067e43clib: Medium coverity fix - Dereference null return valueCID 73544: Dereferencing vrf, which is known to be NULL Signed-off-by: Krishnasamy <krishnasamyr@nvidia.com>
KrishnasamyKrishnasamy
f821c2fa98blib: Medium coverity fix - Dereference null return valueCID 20305: dereference: Dereferencing ifp, which is known to be NULL. Signed-off-by: Krishnasamy <krishnasamyr@nvidia.com>
KrishnasamyKrishnasamy
c207f17926dlib: Medium coverity fix - Dereference null return valueCID 19206: Dereferencing ifp, which is known to be NULL. We’re tearing down the tree by repeatedly deleting a node (if_delete(&ifp) removes it from the RB trees and frees it) until it’s empty. Adding safe-check to satisfy coverity. Signed-off-by: Krishnasamy <krishnasamyr@nvidia.com>
Donald SharpSoumya RoyDonald Sharp
e6d5c6160e4pimd: Prevent crash on interface removalPrevent a crash when we remove interfaces from pim configuration at scale. Ticket: CM-32197 Signed-off-by: Donald Sharp <sharpd@nvidia.com>CM-32197
Mark StappSoumya RoyMark Stapp
e58f41b1e4azebra: ensure zif mac_list exists before unlinking macEnsure that an ifp's evpn mac_list still exists before trying to reference it, when unlinking a mac object. Signed-off-by: Mark Stapp <mstapp@nvidia.com>
Mark StappSoumya RoyMark Stapp
e19604704f8lib: NULL-check idalloc poolsAllow freeing temporary ids even if their pools are already NULL. Signed-off-by: Mark Stapp <mstapp@nvidia.com>
Mark StappGitHubMark Stapp
3e47001446aMMerge pull request #20059 from opensourcerouting/fix/crash_zebra_ns_terminationzebra: Check if the netlink socket is _active_ before doing batch ops
Donatas AbraitisGitHubDonatas Abraitis
e46d1fb5315MMerge pull request #20046 from soumyar-roy/soumya/cl_to_frr_batch1evpn vxlan fixes batch1
Mark StappGitHubMark Stapp
07f5b0fe926MMerge pull request #20057 from Jafaral/10.5-housekeepingdebian, redhat: update changelog with 10.5.0 release
Mark StappMark Stapp
1b0f89069f7bgpd: be careful parsing incoming label in nlriOnly look at octets we think are valid when parsing a label stack in an NLRI Signed-off-by: Mark Stapp <mjs@cisco.com>
Donald SharpGitHubDonald Sharp
082fa1eee23MMerge pull request #20073 from opensourcerouting/fix/bgp_as_confed_set_issue_20060bgpd: Do not put confederation ASNs into AS-SET, leave them as alone
Donatas AbraitisDonatas Abraitis
e49d89b8f4ebgpd: Fix some CI warnings< WARNING: Prefer 'unsigned int' to bare use of 'unsigned' < #895: FILE: /tmp/f1-3241746/bgp_aspath.c:895: < WARNING: Prefer 'unsigned int' to bare use of 'unsigned' < #898: FILE: /tmp/f1-3241746/bgp_aspath.c:898: < WARNING: Missing a blank line after declarations < #927: FILE: /tmp/f1-3241746/bgp_aspath.c:927: Signed-off-by: Donatas Abraitis <donatas@opensourcerouting.org>
Donatas AbraitisDonatas Abraitis
d2cdc20e309bgpd: Do not put confederation ASNs into AS-SET, leave them as aloneWhen we have something like: ``` *> 10.0.8.0/25 10.113.78.2 0 100 0 (65506 65507) 800 ? * i 10.113.78.2 0 100 0 (65506 65507) 800 ? * 10.113.19.2 0 900 800 ? *> 10.0.8.128/25 10.113.78.2 0 100 0 (65506 65507) 800 ? * i 10.113.78.2 ...
Donatas AbraitisGitHubDonatas Abraitis
39e1bcea842MMerge pull request #20068 from raja-rajasekar/rajasekarr/ses_estbgpd: Fix maximum-prefix session recovery for peers and peer-groups
Donatas AbraitisDonatas Abraitis
2208fd5fd5dtests: Check if confederation ASNs are treated correctly when aggregating with as-setSigned-off-by: Donatas Abraitis <donatas@opensourcerouting.org>
Rajasekar RajaRajasekar Raja
27fc07bbb5dtests: Add BGP maximum-prefix session recovery topotestTest BGP session recovery after maximum-prefix overflow when limit is increased or unset for regular neighbors and peer-groups. Signed-off-by: Rajasekar Raja <rajasekarr@nvidia.com>
jared mauchJared Mauchjared mauch
bc1836d40c4ospfd: fix sign comparison warnings in SNMP codeFix compiler warnings about comparing signed and unsigned integers by casting arithmetic expressions to size_t to match the type of *length parameter. Fixed in functions: - ospfAreaRangeLookup - ospfHostLookup - ospfIfLookup - ospfIfMetricLookup - ospfVirtIfLookup - ospfNbrLookup - ospfExtLsdbLookup Signed-off-by: jared mauch <jared@puck.nether.net>
Rajasekar RajaRajasekar Raja
90105e5dd27bgpd: Fix maximum-prefix session recovery for peers and peer-groupsWhen a BGP session goes down due to maximum-prefix overflow, modifying the configuration should allow the session to recover. However, the session remains in Idle state because PEER_STATUS_PREFIX_OVERFLOW is not cleared. Fix three scenarios: 1. Increasing maximum-prefix limit on regular neighbor 2. Increasing maximum-prefix limit on peer-group member 3. Unsetting maximum-prefix on peer-group m...
Mark StappGitHubMark Stapp
ecda7e23e24MMerge pull request #20058 from raja-rajasekar/rajasekarr/vrrp_memleakvrrpd: [Mem leak] Vrrp interface delete fails to free connected route
Mark StappGitHubMark Stapp
4f91376a64cMMerge pull request #19833 from raja-rajasekar/rajasekarr/new_nhg_cmdsExtend show ip route nexthop-group commands (Summary view and ECMP filtering)
Soumya Roysoumyar-roySoumya Roy
c336a6b47cazebra: Fix build warning zlog_warn and string splitSigned-off-by: Soumya Roy <souroy@nvidia.com>
Donatas AbraitisGitHubDonatas Abraitis
50de2d636d1MMerge pull request #19832 from ashred-lnx/fix-bgp-aslist-policybgpd: trigger inbound policy re-evaluation on AS-path list changes
Kunio AKASHIKunio AKASHI
51558b5f48fisisd: use IPv6 MTID for SRv6 locator TLVs when IPv6 MT is enabledWhen IS-IS is configured with IPv6 Multi-Topology (topology ipv6-unicast), SRv6 locator TLVs are still advertised with MTID 0 (ISIS_MT_STANDARD). This patch makes SRv6 locator TLVs use the IPv6 MTID returned by isis_area_ipv6_topology(area), so that they are consistent with IPv6 reachability TLVs and interoperable with implementations that expect locators in the IPv6-unicast MT. Signed-off-by:...
Donatas AbraitisDonatas Abraitis
3aabc0d41c3zebra: Check if the netlink socket is _active_ before doing batch opskernel_terminate() might be called earlier before kernel_update_multi(), where kernel_terminate() frees netlink socket buffers, closes the socket, etc. Signed-off-by: Donatas Abraitis <donatas@opensourcerouting.org>
Donatas AbraitisGitHubDonatas Abraitis
ba9773b09bcMMerge pull request #19915 from chiragshah6/evpnv6_1_topotesttests: topotest for EVPNv6 L3 functionality -- single homed
Donatas AbraitisGitHubDonatas Abraitis
b5a57510651MMerge pull request #20044 from raja-rajasekar/rajasekarr/rd_evpn_showbgpd: print rd in evpn route output
Ashwini ReddyRajasekar RajaAshwini Reddy
79ac4b779d4vrrpd: [Mem leak] Vrrp interface delete fails to free connected routeChanges: - free the connected route on intf_del Ticket: #4559287 Signed-off-by: Ashwini Reddy <ashred@nvidia.com> Signed-off-by: Aprathi K <aprathik@nvidia.com>
Jafar Al-GharaibehJafar Al-Gharaibeh
16e293f42e8debian, redhat: update changelog with 10.5.0 releaseSigned-off-by: Jafar Al-Gharaibeh <jafar@atcorp.com>
soumyar-roySoumya Roysoumyar-roy
5f23716f4d0zebra: Rename vni_count to vni_refcntRename vni_count to vni_refcnt to reflect what it is being used for Signed-off-by: Soumya Roy <souroy@nvidia.com>
Krishnasamy RSoumya RoyKrishnasamy R
11e3c7cacf6zebra: Add log during local sticy mac to remote sticky mac changeLet's assume the DUT receives sticky mac of a remote host, but it already learnt the same mac as local sticky mac. Currently, Zebra reprograms the local sticky to remote sticky MAC. When this happens, we don't log any message about the mac movement. So adding a log. UT after the fix: Leaf1 ------- Leaf2(DUT) To recreate this scenario, we need to configure route-map filter on Leaf1 to deny MACI...
Stephen WorleySoumya RoyStephen Worley
6d402f7a188zebra: add missing rmac FPM hooksWe are missing some fpm hooks for rmac installation. Add them. Signed-off-by: Stephen Worley <sworley@nvidia.com>
Soumya RoySoumya Roy
524a79da125tests: add test for L3 VNI vlan/bridge fieldsAdd test case to verify that L3 VNI displays correct VLAN and bridge information instead of showing "Vlan: 0" and "Bridge: -". The test adds L3 VNI 999 with VLAN 999 on bridge br999 to the existing bgp_evpn_vxlan_topo1 topology and verifies that "show evpn vni 999" displays: - "Vlan: 999" (not 0) - "Bridge: br999" (not "-") This validates the fix from commit 3ad2a782e6 ("zebra: set vlan_id/br...
Chirag ShahChirag Shah
046b67766a5tests: EVPNv6 add test static route inject as type5Signed-off-by: Chirag Shah <chirag@nvidia.com>
Chirag ShahChirag Shah
49da7bb059etests: EVPN verify route before checking rmacSigned-off-by: Chirag Shah <chirag@nvidia.com>
Chirag ShahChirag Shah
77008266fbdtests: EVPNv6 3-tier enable log level debug at vtepsSigned-off-by: Chirag Shah <chirag@nvidia.com>
Chirag ShahChirag Shah
bc74a350509tests: EVPNv6 verify ping test incrase expect countAs per review comment increase the verify_expect count from 10 to 15 for host to host ping validation. Signed-off-by: Chirag Shah <chirag@nvidia.com>
Chirag ShahChirag Shah
baced9608fdtests: EVPNv6 use private addr schemeSigned-off-by: Chirag Shah <chirag@nvidia.com>
Chirag ShahChirag Shah
3ce95046b80tests: Add a pytest marker for the evpnSigned-off-by: Chirag Shah <chirag@nvidia.com>
Chirag ShahChirag Shah
64f871210cftests: EVPNv6 check proper json for ip -j link showOn Ubuntu24.04 seeing additional line which can be filter out before parsing the output. ip -d -j link show vxlan48 info: Using default fan map value (33) <<<<<< [{"ifindex":7,"ifname":"vxlan48", "flags":["BROADCAST","MULTICAST","UP","LOWER_UP"],"mtu":1500,"qdisc":"noqueue",}] Signed-off-by: Chirag Shah <chirag@nvidia.com>