]> git.puffer.fish Git - mirror/frr.git/log
mirror/frr.git
6 years agoMerge pull request #2465 from qlyoung/fix-build-am-cppflags-warning
Russ White [Tue, 19 Jun 2018 11:31:43 +0000 (07:31 -0400)]
Merge pull request #2465 from qlyoung/fix-build-am-cppflags-warning

tests: fixup minor autotools nit

6 years agoMerge pull request #2468 from qlyoung/docuser
Russ White [Tue, 19 Jun 2018 11:31:10 +0000 (07:31 -0400)]
Merge pull request #2468 from qlyoung/docuser

doc: update workflow.rst

6 years agoMerge pull request #2470 from chiragshah6/mdev
Russ White [Tue, 19 Jun 2018 11:29:13 +0000 (07:29 -0400)]
Merge pull request #2470 from chiragshah6/mdev

zebra: Hide default vrf instance of l3vni cmd

6 years agoMerge pull request #2474 from donaldsharp/vty_thread_cancel_writes
Russ White [Tue, 19 Jun 2018 11:28:18 +0000 (07:28 -0400)]
Merge pull request #2474 from donaldsharp/vty_thread_cancel_writes

Add 'show thread poll'

6 years agoMerge pull request #2478 from pacovn/Coverity_1408766_Dereference_after_null_check
Russ White [Tue, 19 Jun 2018 11:21:42 +0000 (07:21 -0400)]
Merge pull request #2478 from pacovn/Coverity_1408766_Dereference_after_null_check

bgpd: null check (Coverity 1408766)

6 years agoMerge pull request #2479 from dslicenc/zebra-vrf-statics
Russ White [Tue, 19 Jun 2018 11:19:39 +0000 (07:19 -0400)]
Merge pull request #2479 from dslicenc/zebra-vrf-statics

zebra: re-install static routes needed vrf when the vrf intf comes up

6 years agoMerge pull request #2481 from pacovn/security_vpn_null_check
Russ White [Tue, 19 Jun 2018 11:19:00 +0000 (07:19 -0400)]
Merge pull request #2481 from pacovn/security_vpn_null_check

bgpd: vpn null check

6 years agoMerge pull request #2483 from pacovn/clang_scan_bgpd_updgrp_deref
Russ White [Tue, 19 Jun 2018 11:18:13 +0000 (07:18 -0400)]
Merge pull request #2483 from pacovn/clang_scan_bgpd_updgrp_deref

bgpd: null check (Clang scan-build)

6 years agoMerge pull request #2491 from pacovn/cppcheck_no_effect
Russ White [Tue, 19 Jun 2018 11:15:07 +0000 (07:15 -0400)]
Merge pull request #2491 from pacovn/cppcheck_no_effect

eigrpd, isisd, lib, ospfd: no effect (cppcheck)

6 years agoMerge pull request #2492 from pacovn/cppcheck_security1
Russ White [Tue, 19 Jun 2018 11:14:19 +0000 (07:14 -0400)]
Merge pull request #2492 from pacovn/cppcheck_security1

eigrpd, lib, tests, vtysh: security (cppcheck)

6 years agoeigrpd, lib, tests, vtysh: security (cppcheck) 2492/head
paco [Tue, 19 Jun 2018 08:40:56 +0000 (10:40 +0200)]
eigrpd, lib, tests, vtysh: security (cppcheck)

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agoeigrpd, isisd, lib, ospfd: no effect (cppcheck) 2491/head
paco [Tue, 19 Jun 2018 08:17:03 +0000 (10:17 +0200)]
eigrpd, isisd, lib, ospfd: no effect (cppcheck)

Assignment of function parameter has no effect outside the function.

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agoMerge pull request #2476 from pacovn/Coverity_1433544_Explicit_null_dereferenced
Lou Berger [Mon, 18 Jun 2018 20:59:26 +0000 (16:59 -0400)]
Merge pull request #2476 from pacovn/Coverity_1433544_Explicit_null_dereferenced

bgpd: null check (Coverity 143354414335431433542)

6 years agoMerge pull request #2482 from pacovn/clang_scan_bgpd_bgp_rpki_deref
Donald Sharp [Mon, 18 Jun 2018 20:09:56 +0000 (16:09 -0400)]
Merge pull request #2482 from pacovn/clang_scan_bgpd_bgp_rpki_deref

bgpd: null check (Clang scan-build)

6 years agobgpd: null check (Clang scan-build) 2483/head
paco [Mon, 18 Jun 2018 14:38:23 +0000 (16:38 +0200)]
bgpd: null check (Clang scan-build)

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agoMerge pull request #2484 from pacovn/cppcheck_unused_vars
Donald Sharp [Mon, 18 Jun 2018 19:27:11 +0000 (15:27 -0400)]
Merge pull request #2484 from pacovn/cppcheck_unused_vars

eigrpd, lib: unused vars (cppcheck)

6 years agoMerge pull request #2486 from pacovn/cppcheck_fmt_validation
Donald Sharp [Mon, 18 Jun 2018 19:23:49 +0000 (15:23 -0400)]
Merge pull request #2486 from pacovn/cppcheck_fmt_validation

babeld, lib, ospfd, tests: fmt fixes (cppcheck)

6 years agoMerge pull request #2489 from pacovn/cppcheck_reduntant_pointer_op
Donald Sharp [Mon, 18 Jun 2018 19:16:55 +0000 (15:16 -0400)]
Merge pull request #2489 from pacovn/cppcheck_reduntant_pointer_op

ldpd: redundant pointer operation (cppcheck)

6 years agoMerge pull request #2488 from pacovn/cppcheck_nhrpd_limit_check
Donald Sharp [Mon, 18 Jun 2018 19:16:34 +0000 (15:16 -0400)]
Merge pull request #2488 from pacovn/cppcheck_nhrpd_limit_check

nhrpd: array limit check (cppcheck)

6 years agoMerge pull request #2487 from pacovn/cppcheck_redundant_memset
Donald Sharp [Mon, 18 Jun 2018 19:15:46 +0000 (15:15 -0400)]
Merge pull request #2487 from pacovn/cppcheck_redundant_memset

ospfd, pimd: redundant memset (cppcheck)

6 years agoMerge pull request #2490 from pacovn/cppcheck_unsigned_check
Donald Sharp [Mon, 18 Jun 2018 19:14:07 +0000 (15:14 -0400)]
Merge pull request #2490 from pacovn/cppcheck_unsigned_check

babeld, eigrpd, ospfd: unsigned negative check (cppcheck, grouped)

6 years agoMerge pull request #2417 from pacovn/Coverity_1399373_Structurally_dead_code
Donald Sharp [Mon, 18 Jun 2018 18:29:27 +0000 (14:29 -0400)]
Merge pull request #2417 from pacovn/Coverity_1399373_Structurally_dead_code

bgpd: dead code (Coverity 1399373)

6 years agobabeld, eigrpd, ospfd: unsigned negative check 2490/head
paco [Mon, 18 Jun 2018 17:07:24 +0000 (19:07 +0200)]
babeld, eigrpd, ospfd: unsigned negative check

After Cppcheck 1.72 feedback

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agoldpd: redundant pointer operation (cppcheck) 2489/head
paco [Mon, 18 Jun 2018 16:41:57 +0000 (18:41 +0200)]
ldpd: redundant pointer operation (cppcheck)

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agonhrpd: array limit check (cppcheck) 2488/head
paco [Mon, 18 Jun 2018 16:13:41 +0000 (18:13 +0200)]
nhrpd: array limit check (cppcheck)

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agoospfd, pimd: redundant memset (cppcheck) 2487/head
paco [Mon, 18 Jun 2018 16:01:59 +0000 (18:01 +0200)]
ospfd, pimd: redundant memset (cppcheck)

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agoMerge pull request #2457 from pacovn/Coverity_1465491_Untrusted_value_as_argument
Donald Sharp [Mon, 18 Jun 2018 15:55:53 +0000 (11:55 -0400)]
Merge pull request #2457 from pacovn/Coverity_1465491_Untrusted_value_as_argument

pimd: Untrusted val as argument (Coverity 1465491)

6 years agoMerge pull request #2464 from pacovn/Coverity_1399309_Out-of-bounds_access
Donald Sharp [Mon, 18 Jun 2018 15:55:16 +0000 (11:55 -0400)]
Merge pull request #2464 from pacovn/Coverity_1399309_Out-of-bounds_access

isisd: out-of-bounds access (Coverity 1399309)

6 years agobabeld, lib, ospfd, tests: fmt fixes (cppcheck) 2486/head
paco [Mon, 18 Jun 2018 15:49:58 +0000 (17:49 +0200)]
babeld, lib, ospfd, tests: fmt fixes (cppcheck)

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agoeigrpd, lib, vtysh: unused vars (cppcheck) 2484/head
paco [Mon, 18 Jun 2018 15:12:27 +0000 (17:12 +0200)]
eigrpd, lib, vtysh: unused vars (cppcheck)

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agobgpd: null check (Clang scan-build) 2482/head
paco [Mon, 18 Jun 2018 14:27:02 +0000 (16:27 +0200)]
bgpd: null check (Clang scan-build)

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agobgpd: null chk (Coverity 1433544 1433543 1433542) 2476/head
paco [Mon, 18 Jun 2018 10:23:28 +0000 (12:23 +0200)]
bgpd: null chk (Coverity 1433544 1433543 1433542)

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agobgpd: vpn null check 2481/head
paco [Mon, 18 Jun 2018 13:52:57 +0000 (15:52 +0200)]
bgpd: vpn null check

Can be reproduced with following vtysh sequence (an intentionaly wrong
sequence):

['configure terminal\n router bgp 255 vrf l3vrf-6\n',
 'configure terminal\n router bgp 255 vrf l3vrf-6\nbgp router-id 10.255.255.1\n',
 'configure terminal\n router bgp 255 vrf l3vrf-6\n address-family ipv4\nlabel vpn export 45000\n',
 'configure terminal\n router bgp 255 vrf l3vrf-6\n address-family ipv4\nrd vpn export 255:5\n',
 'configure terminal\n router bgp 255 vrf l3vrf-6\n address-family ipv4\nredistribute isis\n', 'configure terminal\n router bgp 255 vrf l3vrf-6\n address-family ipv4\nredistribute ospf\n', 'configure terminal\n router bgp 255 vrf l3vrf-6\n address-family ipv4\nredistribute connected\n', 'configure terminal\n router bgp 255 vrf l3vrf-6\n address-family ipv4\nimport vpn\n', 'configure terminal\n router bgp 255 vrf l3vrf-6\n address-family ipv4\nexport vpn\n', 'configure terminal\n router bgp 255 vrf l3vrf-6\n address-family ipv4\nrt vpn import 255:1\n', 'configure terminal\n router bgp 255 vrf l3vrf-6\n address-family ipv4\nrt vpn export 255:1\n'
]

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agoMerge pull request #2466 from pacovn/clang_scan_bgpd_dereference1
Lou Berger [Mon, 18 Jun 2018 12:16:01 +0000 (08:16 -0400)]
Merge pull request #2466 from pacovn/clang_scan_bgpd_dereference1

bgpd: null check (Clang scan-build)

6 years agoMerge pull request #2456 from pacovn/Coverity_1399306_Out-of-bounds_access
Lou Berger [Mon, 18 Jun 2018 12:12:04 +0000 (08:12 -0400)]
Merge pull request #2456 from pacovn/Coverity_1399306_Out-of-bounds_access

bgpd: out-of-bounds access (Coverity 1399306)

6 years agozebra: re-install static routes needed vrf when the vrf intf comes up 2479/head
Don Slice [Mon, 18 Jun 2018 11:38:45 +0000 (11:38 +0000)]
zebra: re-install static routes needed vrf when the vrf intf comes up

Problem reported that if the vrf device is taken down and then brought
back up, any static route referencing that vrf device was not
re-installed.  This fix runs back thru the static routes that
reference the vrf device coming up and re-install them.

Signed-off-by: Don Slice <dslice@cumulusnetworks.com>
6 years agobgpd: null check (Coverity 1408766) 2478/head
paco [Mon, 18 Jun 2018 10:51:33 +0000 (12:51 +0200)]
bgpd: null check (Coverity 1408766)

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agolib: A small optimization for the hash iterate and walk functions 2474/head
Donald Sharp [Sat, 16 Jun 2018 23:27:41 +0000 (19:27 -0400)]
lib: A small optimization for the hash iterate and walk functions

When we are iterating through the hash, keep count of how many
we've called and if we have finished calling the hash->size
iterator times, then short-circuit and stop looping over
the entire array.

Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
6 years agolib, vtysh: Add 'show thread poll' command
Donald Sharp [Sat, 16 Jun 2018 22:12:54 +0000 (18:12 -0400)]
lib, vtysh: Add 'show thread poll' command

Add a 'show thread poll' command that displays the
poll information and fd's setup.

Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
6 years agoMerge pull request #2467 from pacovn/Coverity_1399274_Dereference_after_null_check
Lou Berger [Sat, 16 Jun 2018 12:26:26 +0000 (08:26 -0400)]
Merge pull request #2467 from pacovn/Coverity_1399274_Dereference_after_null_check

bgpd: null check (Coverity 1399274)

6 years agobgpd: fix default RD value in running-cfg 2470/head
Chirag Shah [Sat, 16 Jun 2018 04:11:16 +0000 (21:11 -0700)]
bgpd: fix default RD value in running-cfg

When bgp vrf is configured with non-default
RD value, config flag is set.
Upon removing non-default RD value the flag was not reset,
thus displayed default RD value in running-config.

router bgp 5550 vrf vrf1
 rd 45.0.2.2:5

Unset the RD configuration flag under bgp_vrf instance.

Ticket:CM-20206

Signed-off-by: Chirag Shah <chirag@cumulusnetworks.com>
6 years agozebra: Hide default vrf instance of l3vni cmd
Chirag Shah [Fri, 15 Jun 2018 22:23:27 +0000 (15:23 -0700)]
zebra: Hide default vrf instance of l3vni cmd

Hide following l3vni config from DEFAULT_VRF instance
until it is fully supported.

TORS1(config)# vni 2222456 prefix-routes-only

Ticket:CM-20572

Signed-off-by: Chirag Shah <chirag@cumulusnetworks.com>
6 years agodoc: update workflow.rst 2468/head
Quentin Young [Fri, 15 Jun 2018 18:34:25 +0000 (18:34 +0000)]
doc: update workflow.rst

* Rewrap lines to 80 characters
* Update some portions to reflect current practices
* Clean up some formatting (indent, markup, etc)
* Reorganize sections on patch submission
* Remove link to nonexistent github wiki page

Signed-off-by: Quentin Young <qlyoung@cumulusnetworks.com>
6 years agolib: ignore user CFLAGS when building Clippy 2465/head
Quentin Young [Fri, 15 Jun 2018 18:35:53 +0000 (18:35 +0000)]
lib: ignore user CFLAGS when building Clippy

Unfortunately user CFLAGS causes #define conflicts with #defines in
Python development headers, which causes build failures under certain
platforms when using -Werror.

Signed-off-by: Quentin Young <qlyoung@cumulusnetworks.com>
6 years agobgpd: null check (Coverity 1399274) 2467/head
paco [Fri, 15 Jun 2018 18:09:55 +0000 (20:09 +0200)]
bgpd: null check (Coverity 1399274)

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agobgpd: null check (Clang scan-build) 2466/head
paco [Fri, 15 Jun 2018 18:02:23 +0000 (20:02 +0200)]
bgpd: null check (Clang scan-build)

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agotests: fixup minor autotools nit
Quentin Young [Fri, 15 Jun 2018 17:17:42 +0000 (17:17 +0000)]
tests: fixup minor autotools nit

Makes super strict builds fail due to a warning.

Signed-off-by: Quentin Young <qlyoung@cumulusnetworks.com>
6 years agoMerge pull request #2447 from ajones-rvbd/ajones-issue-2391
Quentin Young [Fri, 15 Jun 2018 16:40:19 +0000 (12:40 -0400)]
Merge pull request #2447 from ajones-rvbd/ajones-issue-2391

alpine: add unit tests to build

6 years agoisisd: out-of-bounds access (Coverity 1399309) 2464/head
paco [Fri, 15 Jun 2018 16:36:20 +0000 (18:36 +0200)]
isisd: out-of-bounds access (Coverity 1399309)

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agoMerge pull request #2409 from LabNConsulting/working/master/vtysh-2400
Quentin Young [Fri, 15 Jun 2018 16:33:44 +0000 (12:33 -0400)]
Merge pull request #2409 from LabNConsulting/working/master/vtysh-2400

vtysh: -u fixes

6 years agoMerge pull request #2458 from pacovn/Coverity_1221437_Unchecked_return_value
Donald Sharp [Fri, 15 Jun 2018 14:53:58 +0000 (10:53 -0400)]
Merge pull request #2458 from pacovn/Coverity_1221437_Unchecked_return_value

ospf6d: unchecked return value (Coverity 1221437)

6 years agopimd: Untrusted val as argument (Coverity 1465491) 2457/head
paco [Fri, 15 Jun 2018 10:57:47 +0000 (12:57 +0200)]
pimd: Untrusted val as argument (Coverity 1465491)

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agoospf6d: unchecked return value (Coverity 1221437) 2458/head
paco [Fri, 15 Jun 2018 11:08:37 +0000 (13:08 +0200)]
ospf6d: unchecked return value (Coverity 1221437)

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agobgpd: out-of-bounds access (Coverity 1399306) 2456/head
paco [Fri, 15 Jun 2018 10:39:10 +0000 (12:39 +0200)]
bgpd: out-of-bounds access (Coverity 1399306)

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agobgpd: dead code (Coverity 1399373) 2417/head
paco [Wed, 13 Jun 2018 09:35:01 +0000 (11:35 +0200)]
bgpd: dead code (Coverity 1399373)

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agoMerge pull request #2426 from pacovn/Coverity_23089_Buffer_not_null_terminated
Rafael Zalamena [Thu, 14 Jun 2018 21:02:34 +0000 (18:02 -0300)]
Merge pull request #2426 from pacovn/Coverity_23089_Buffer_not_null_terminated

ospfd: buffer termination (Coverity 23089)

6 years agoMerge pull request #2438 from pacovn/Coverity_1457300_Dereference_after_null_check
Rafael Zalamena [Thu, 14 Jun 2018 20:58:10 +0000 (17:58 -0300)]
Merge pull request #2438 from pacovn/Coverity_1457300_Dereference_after_null_check

ospfd: null check (Coverity 1457300)

6 years agoalpine: add unit tests to build 2447/head
Arthur Jones [Fri, 8 Jun 2018 16:47:28 +0000 (09:47 -0700)]
alpine: add unit tests to build

Now that make check works on alpine, add it to the build

Testing done: alpine linux build -- check works

Issue: https://github.com/FRRouting/frr/issues/2391

Signed-off-by: Arthur Jones <arthur.jones@riverbed.com>
6 years agoMerge pull request #2422 from pacovn/Coverity_23201_Dereference_before_null_check
Donald Sharp [Thu, 14 Jun 2018 17:03:50 +0000 (13:03 -0400)]
Merge pull request #2422 from pacovn/Coverity_23201_Dereference_before_null_check

bgpd: null check (Coverity 23201)

6 years agoMerge pull request #2435 from pacovn/Coverity_1464993_Buffer_not_null_terminated
Renato Westphal [Thu, 14 Jun 2018 16:44:10 +0000 (13:44 -0300)]
Merge pull request #2435 from pacovn/Coverity_1464993_Buffer_not_null_terminated

ospfd: buffer termination (Coverity 1464993)

6 years agoospfd: buffer termination (Coverity 23089) 2426/head
paco [Wed, 13 Jun 2018 12:43:18 +0000 (14:43 +0200)]
ospfd: buffer termination (Coverity 23089)

Details:
- INET_ADDRSTRLEN is 16, for xxx.xxx.xxx\0, so 15 is now passed
 to the strncpy call instead of 16, ensuring ASCII-z output

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agobgpd: null check (Coverity 23201) 2422/head
paco [Wed, 13 Jun 2018 10:45:44 +0000 (12:45 +0200)]
bgpd: null check (Coverity 23201)

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agoospfd: buffer termination (Coverity 1464993) 2435/head
paco [Wed, 13 Jun 2018 15:24:51 +0000 (17:24 +0200)]
ospfd: buffer termination (Coverity 1464993)

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agoMerge pull request #2430 from pacovn/clang_scan_ospf_dereference
Rafael Zalamena [Thu, 14 Jun 2018 14:14:52 +0000 (11:14 -0300)]
Merge pull request #2430 from pacovn/clang_scan_ospf_dereference

ospfd: dereference check (Clang scan-build)

6 years agoMerge pull request #2434 from pacovn/Coverity_1457145_Out-of-bounds_access
Rafael Zalamena [Thu, 14 Jun 2018 14:09:05 +0000 (11:09 -0300)]
Merge pull request #2434 from pacovn/Coverity_1457145_Out-of-bounds_access

lib: out-of-bounds access (Coverity 1457145)

6 years agoMerge pull request #2436 from pacovn/Coverity_1143220_Argument_cannot_be_negative
Donald Sharp [Thu, 14 Jun 2018 14:02:25 +0000 (10:02 -0400)]
Merge pull request #2436 from pacovn/Coverity_1143220_Argument_cannot_be_negative

tools: return check (Coverity 1143220)

6 years agoMerge pull request #2437 from pacovn/Coverity_1436343_Dereference_after_null_check
Rafael Zalamena [Thu, 14 Jun 2018 14:00:57 +0000 (11:00 -0300)]
Merge pull request #2437 from pacovn/Coverity_1436343_Dereference_after_null_check

lib: null check (Coverity 1436343)

6 years agoMerge pull request #2428 from donaldsharp/zserv_debug
Renato Westphal [Thu, 14 Jun 2018 13:43:40 +0000 (10:43 -0300)]
Merge pull request #2428 from donaldsharp/zserv_debug

zebra: Cleanup code to test for failure once

6 years agoMerge pull request #2410 from pacovn/Coverity_1448806_Out-of-bounds_access
Rafael Zalamena [Thu, 14 Jun 2018 13:29:35 +0000 (10:29 -0300)]
Merge pull request #2410 from pacovn/Coverity_1448806_Out-of-bounds_access

lib: Out-of-bounds access (Coverity 14488061448810)

6 years agoMerge pull request #2439 from chiragshah6/evpn_dev
Lou Berger [Thu, 14 Jun 2018 13:21:14 +0000 (09:21 -0400)]
Merge pull request #2439 from chiragshah6/evpn_dev

bgpd: Fix bgpd crash in evpn vni route-map apply

6 years agoMerge pull request #2441 from MasterofJOKers/workflow_pr_info_url
Donald Sharp [Thu, 14 Jun 2018 10:27:15 +0000 (06:27 -0400)]
Merge pull request #2441 from MasterofJOKers/workflow_pr_info_url

doc: Correct wiki URL in workflow-documentation

6 years agodoc: Correct wiki URL in workflow-documentation 2441/head
MasterofJOKers [Thu, 14 Jun 2018 07:31:14 +0000 (09:31 +0200)]
doc: Correct wiki URL in workflow-documentation

The organization on github is called "FRRouting".

Signed-off-by: MasterofJOKers <joker@someserver.de>
6 years agolib: null check (Coverity 1436343) 2437/head
paco [Wed, 13 Jun 2018 16:38:46 +0000 (18:38 +0200)]
lib: null check (Coverity 1436343)

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agoMerge pull request #2431 from pacovn/Coverity_1399290_Out-of-bounds_access
Renato Westphal [Wed, 13 Jun 2018 17:49:52 +0000 (14:49 -0300)]
Merge pull request #2431 from pacovn/Coverity_1399290_Out-of-bounds_access

tools: out-of-bounds access (Coverity 1399290)

6 years agoMerge pull request #2416 from pacovn/Coverity_1399389_Structurally_dead_code
Donald Sharp [Wed, 13 Jun 2018 17:38:03 +0000 (13:38 -0400)]
Merge pull request #2416 from pacovn/Coverity_1399389_Structurally_dead_code

bgpd: dead code (Coverity 1399389)

6 years agobgpd: Fix bgpd crash in evpn vni route-map 2439/head
Chirag Shah [Wed, 13 Jun 2018 05:13:05 +0000 (22:13 -0700)]
bgpd: Fix bgpd crash in evpn vni route-map

When evpn configured wiht route-map with vni which is not
configured. Upon receiving evpn routes (i.e Type-2, Type-3),
route-map match will be triggered. Since there is no l2vni
exists in db, some of the member fields in bgp_info (i.e.
dummy_info_extra) are passed uninitialized to evpn filter match cb.
This results in inaccessible memory causes crash.

Fix is to memset the bgp_info prior to passing to evpn filter cb.
In evpn vni filter cb, ensure to have NULL check for member filed
of the bgp_info.

memset bgp_info at few places where it is passed to route_match.

Ticket:CM-21335
Reviewed By:
Testing Done:

Configure route-map with not configured l2vni
Simulate to learn l2vpn type-2, 3 route

Restart frr.service with below config
address-family l2vpn evpn
  neighbor fear route-map EVPN_VNI out

route-map EVPN_VNI deny 10
 match evpn vni 140010

Signed-off-by: Chirag Shah <chirag@cumulusnetworks.com>
6 years agoospfd: null check (Coverity 1457300) 2438/head
paco [Wed, 13 Jun 2018 17:04:43 +0000 (19:04 +0200)]
ospfd: null check (Coverity 1457300)

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agobgpd: dead code removal (Coverity 1399389) 2416/head
paco [Wed, 13 Jun 2018 09:09:17 +0000 (11:09 +0200)]
bgpd: dead code removal (Coverity 1399389)

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agoMerge pull request #2424 from pacovn/Coverity_1399270_Dereference_after_null_check
Donald Sharp [Wed, 13 Jun 2018 16:13:57 +0000 (12:13 -0400)]
Merge pull request #2424 from pacovn/Coverity_1399270_Dereference_after_null_check

bgpd: null check (Coverity 1399270)

6 years agotools: return check (Coverity 1143220) 2436/head
paco [Wed, 13 Jun 2018 16:07:36 +0000 (18:07 +0200)]
tools: return check (Coverity 1143220)

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agobgpd: null check (Coverity 1399270) 2424/head
paco [Wed, 13 Jun 2018 11:08:58 +0000 (13:08 +0200)]
bgpd: null check (Coverity 1399270)

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agolib: out-of-bounds access (Coverity 1457145) 2434/head
paco [Wed, 13 Jun 2018 15:08:38 +0000 (17:08 +0200)]
lib: out-of-bounds access (Coverity 1457145)

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agoMerge pull request #2421 from pacovn/Coverity_1399232_Logically_dead_code
Donald Sharp [Wed, 13 Jun 2018 14:45:48 +0000 (10:45 -0400)]
Merge pull request #2421 from pacovn/Coverity_1399232_Logically_dead_code

ospfd: dead code (Coverity 1399232)

6 years agotools: out-of-bounds access (Coverity 1399290) 2431/head
paco [Wed, 13 Jun 2018 14:33:51 +0000 (16:33 +0200)]
tools: out-of-bounds access (Coverity 1399290)

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agoospfd: dereference check (Clang scan-build) 2430/head
paco [Wed, 13 Jun 2018 13:49:36 +0000 (15:49 +0200)]
ospfd: dereference check (Clang scan-build)

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agozebra: Cleanup code to test for failure once 2428/head
Donald Sharp [Wed, 13 Jun 2018 13:19:37 +0000 (09:19 -0400)]
zebra: Cleanup code to test for failure once

Cleanup the zebra code to test for failure for reading
from stream once instead of once to see if we should
debug and once for the actual failure.

Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
6 years agoospfd: dead code (Coverity 1399232) 2421/head
paco [Wed, 13 Jun 2018 10:34:23 +0000 (12:34 +0200)]
ospfd: dead code (Coverity 1399232)

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agoMerge pull request #2420 from pacovn/Coverity_1399246_Logically_dead_code
Donald Sharp [Wed, 13 Jun 2018 12:08:45 +0000 (08:08 -0400)]
Merge pull request #2420 from pacovn/Coverity_1399246_Logically_dead_code

bgpd: dead code (Coverity 1399246)

6 years agobgpd: dead code (Coverity 1399246) 2420/head
paco [Wed, 13 Jun 2018 10:25:45 +0000 (12:25 +0200)]
bgpd: dead code (Coverity 1399246)

Signed-off-by: F. Aragon <paco@voltanet.io>
6 years agoMerge pull request #2414 from donaldsharp/bsd_failure
Rafael Zalamena [Tue, 12 Jun 2018 20:51:03 +0000 (17:51 -0300)]
Merge pull request #2414 from donaldsharp/bsd_failure

zebra: Fix compilation of bsd

6 years agoMerge pull request #2412 from opensourcerouting/lintian-warn-fix
Quentin Young [Tue, 12 Jun 2018 20:22:38 +0000 (16:22 -0400)]
Merge pull request #2412 from opensourcerouting/lintian-warn-fix

debianpkg: Add additional lintian override for Ubuntu 18.04

6 years agoMerge pull request #2407 from donaldsharp/bgp_spelunk
Rafael Zalamena [Tue, 12 Jun 2018 20:11:15 +0000 (17:11 -0300)]
Merge pull request #2407 from donaldsharp/bgp_spelunk

Bgp crash fix for topotests

6 years agoMerge pull request #2411 from qlyoung/fix-vtysh-config-write
Rafael Zalamena [Tue, 12 Jun 2018 19:59:35 +0000 (16:59 -0300)]
Merge pull request #2411 from qlyoung/fix-vtysh-config-write

vtysh: fix config write

6 years agozebra: Fix compilation of bsd 2414/head
Donald Sharp [Tue, 12 Jun 2018 19:50:39 +0000 (15:50 -0400)]
zebra: Fix compilation of bsd

Actually return a value.

Fixes: #2413
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
6 years agobgpd: Ensure that bgp_delete bgp pointer is non-null 2407/head
Donald Sharp [Tue, 12 Jun 2018 19:10:01 +0000 (15:10 -0400)]
bgpd: Ensure that bgp_delete bgp pointer is non-null

Crash w/ an assert if someone calls bgp_delete with a
NULL parameter as opposed to crashing when we dereference
the pointer a bit later.

Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
6 years agobgpd: bgp_default may be null
Donald Sharp [Wed, 23 May 2018 18:54:30 +0000 (14:54 -0400)]
bgpd: bgp_default may be null

The bgp_default variable when saved to the side might actually
be NULL.

Ticket: CM-21119
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
6 years agobgpd: Fix crash when shutdown
Donald Sharp [Tue, 22 May 2018 00:13:27 +0000 (20:13 -0400)]
bgpd: Fix crash when shutdown

The process of BGP shutdown hard free's memory irrelevant to
the fact that another process may be using that memory still
in route leaking scenario's.

As a temporary fix find the default instance and free it
last.

Ticket: CM-21068
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
6 years agobgpd: Move extra free code and fix a bug.
Donald Sharp [Tue, 12 Jun 2018 14:38:37 +0000 (10:38 -0400)]
bgpd: Move extra free code and fix a bug.

The bgp_info_extra_free code was the correct place to free
up data associated with the bgp_info pointer when we are
deleting the bgp_info node.

Additionally, if we have a parent pointer, we may not have a net
pointer.  So make sure we do.

Finally clean up the bgp_info_extra_free code so it is a bit
easier to read.  Use variables instead of multiple level
of casting.

Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
6 years agodebianpkg: Add additional lintian override for Ubuntu 18.04 2412/head
Martin Winter [Tue, 12 Jun 2018 19:06:00 +0000 (12:06 -0700)]
debianpkg: Add additional lintian override for Ubuntu 18.04

Signed-off-by: Martin Winter <mwinter@opensourcerouting.org>
6 years agovtysh: fix config write 2411/head
Quentin Young [Tue, 12 Jun 2018 18:14:52 +0000 (18:14 +0000)]
vtysh: fix config write

Changing vtysh to use vty_out() for everything broke writing to config
files.

Signed-off-by: Quentin Young <qlyoung@cumulusnetworks.com>