]>
git.puffer.fish Git - mirror/frr.git/log
Donald Sharp [Fri, 22 Jun 2018 14:45:03 +0000 (10:45 -0400)]
pimd: Remove redistribution request
pim does not pay attention to redistribution events
from zebra so let's not request them.
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
Donald Sharp [Fri, 22 Jun 2018 14:38:53 +0000 (10:38 -0400)]
lib, zebra: Add a bit of code to look at fifo
When in a dev build add a bit of code to track max
depth of a fifo and to allow zebra to report on it.
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
Donald Sharp [Fri, 22 Jun 2018 14:33:42 +0000 (10:33 -0400)]
zebra: Re-add tracking of redistribution events
Somewhere along the way we lost the tracking of
redistribution events. Put them back in.
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
Quentin Young [Wed, 27 Jun 2018 19:15:22 +0000 (15:15 -0400)]
Merge pull request #2563 from pacovn/Coverity_1465494_String_not_null_terminated_2
lib zebra: str-z check (2) (Coverity
1465494 )
Quentin Young [Wed, 27 Jun 2018 19:09:34 +0000 (15:09 -0400)]
Merge pull request #2570 from pacovn/Coverity_1448386_Untrusted_value_as_argument
lib: untrusted argument (Coverity
1448386 )
Jafar Al-Gharaibeh [Wed, 27 Jun 2018 17:51:48 +0000 (13:51 -0400)]
Merge pull request #2569 from pacovn/Coverity_1451361_Dereference_before_null_check_2
lib: null check (2) (Coverity
1451361 )
Jafar Al-Gharaibeh [Wed, 27 Jun 2018 17:49:08 +0000 (13:49 -0400)]
Merge pull request #2566 from pacovn/Coverity_23024_Dereference_null_return
ospf6d: null check (Coverity 23024)
Jafar Al-Gharaibeh [Wed, 27 Jun 2018 17:47:47 +0000 (13:47 -0400)]
Merge pull request #2564 from pacovn/Coverity_23110_Dereference_after_null_check
ospfd: null check (Coverity 23110)
paco [Wed, 27 Jun 2018 13:50:04 +0000 (15:50 +0200)]
lib: untrusted argument (Coverity
1448386 )
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Wed, 27 Jun 2018 12:52:54 +0000 (14:52 +0200)]
ospf6d: null check (Coverity 23024)
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Wed, 27 Jun 2018 13:24:45 +0000 (15:24 +0200)]
lib: null check (2) (Coverity
1451361 )
Additional correction to
fa3016309b33395c02cf10e7e198517c5b81e55a
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Wed, 27 Jun 2018 12:41:50 +0000 (14:41 +0200)]
ospfd: null check (Coverity 23110)
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Wed, 27 Jun 2018 10:43:43 +0000 (12:43 +0200)]
lib zebra: str-z check (2) (Coverity
1465494 )
This is an additional correction after
45981fda0634f7277c27c2a55e30d7f3433ffa16 / PR #2462. I hope
this fixes the Coverity warning (I've added an additional check for ensuring
the string provided by the inotify read is zero-terminated).
Signed-off-by: F. Aragon <paco@voltanet.io>
Donald Sharp [Tue, 26 Jun 2018 23:59:27 +0000 (19:59 -0400)]
Merge pull request #2556 from pacovn/Coverity_1465491_Untrusted_value_as_argument_3
pimd: untrusted argument (3) (Coverity
1465491 )
Quentin Young [Tue, 26 Jun 2018 20:48:54 +0000 (16:48 -0400)]
Merge pull request #2559 from pacovn/Coverity_1302503_Logically_dead_code
lib ospfd: dead code (Coverity
1302503 1302502 )
paco [Tue, 26 Jun 2018 18:16:13 +0000 (20:16 +0200)]
lib ospfd: dead code (Coverity
1302503 1302502 )
Signed-off-by: F. Aragon <paco@voltanet.io>
Quentin Young [Tue, 26 Jun 2018 19:05:53 +0000 (15:05 -0400)]
Merge pull request #2560 from pacovn/Coverity_1302500_Constant_variable_guards_dead_code
ospfd: dead code (Coverity
1302500 )
Quentin Young [Tue, 26 Jun 2018 18:42:30 +0000 (14:42 -0400)]
Merge pull request #2557 from pacovn/Coverity_1465490_Unchecked_return_value
pimd: return check (Coverity
1465490 )
paco [Tue, 26 Jun 2018 18:33:47 +0000 (20:33 +0200)]
ospfd: dead code (Coverity
1302500 )
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Tue, 26 Jun 2018 15:31:00 +0000 (17:31 +0200)]
pimd: return check (Coverity
1465490 )
Unless someone intentionally changes MCAST_ALL_ROUTERS ("224.0.0.2") with a
wrong IP, this should never fail, so the fix is using "(void)" at the left
of the function call, as an explicit way of indicating we discard the
return value on purpose.
Signed-off-by: F. Aragon <paco@voltanet.io>
Quentin Young [Tue, 26 Jun 2018 15:35:58 +0000 (11:35 -0400)]
Merge pull request #2503 from pacovn/Coverity_1469898_Uninitialized_scalar_variable
lib: uninitialized variable (2) (Coverity
1469898 )
Quentin Young [Tue, 26 Jun 2018 15:34:31 +0000 (11:34 -0400)]
Merge pull request #2463 from pacovn/Coverity_1452539_Out-of-bounds_access
lib: out-of-bounds access (Coverity
1452539 )
Russ White [Tue, 26 Jun 2018 15:18:38 +0000 (11:18 -0400)]
Merge pull request #2534 from pacovn/Coverity_1470113_Untrusted_array_index_write
zebra: untrusted array index (2) (Coverity
1470113 )
Russ White [Tue, 26 Jun 2018 15:17:32 +0000 (11:17 -0400)]
Merge pull request #2540 from LabNConsulting/working/master/bgp-twice-leaked-nht
bgpd: don't nexthop-track twice-leaked routes that came from zebra
Russ White [Tue, 26 Jun 2018 15:15:59 +0000 (11:15 -0400)]
Merge pull request #2542 from pacovn/Coverity_1452552_Out-of-bounds_access
isisd: out-of-bounds access (Coverity
1452552 )
Russ White [Tue, 26 Jun 2018 15:14:39 +0000 (11:14 -0400)]
Merge pull request #2545 from pacovn/Coverity_1468413_Explicit_null_dereferenced
bgpd: null check (Coverity
1468413 )
paco [Tue, 26 Jun 2018 15:09:07 +0000 (17:09 +0200)]
pimd: untrusted argument (3) (Coverity
1465491 )
Additional fix over
d94023d85c1682ae14def9d50f2474e8e6290e44 (PR #2546)
Removed all pointer arithmetic used for the checks, while keeping same
coverage. I hope this removes the Coverity warning (If this don't fix it, I'll
make Coverity work with a fork and try there as many times as necessary)
Signed-off-by: F. Aragon <paco@voltanet.io>
Russ White [Tue, 26 Jun 2018 15:14:07 +0000 (11:14 -0400)]
Merge pull request #2547 from pacovn/Coverity_1458168_Dereference_null_return_value
eigrpd ospfd: null check (Coverity
1458168 1455335 )
Renato Westphal [Tue, 26 Jun 2018 15:03:52 +0000 (12:03 -0300)]
Merge pull request #2535 from donaldsharp/netlink_talk_fun
Netlink talk fun
Renato Westphal [Tue, 26 Jun 2018 13:55:08 +0000 (10:55 -0300)]
Merge pull request #2549 from pacovn/Coverity_1452317_Explicit_null_dereferenced
ldpd: null check (Coverity
1452317 )
Renato Westphal [Tue, 26 Jun 2018 13:25:00 +0000 (10:25 -0300)]
Merge pull request #2552 from qlyoung/remove-defun-deprecated
Remove DEFUN_DEPRECATED
Jafar Al-Gharaibeh [Mon, 25 Jun 2018 21:30:31 +0000 (17:30 -0400)]
Merge pull request #2548 from pacovn/Coverity_1453456_Unchecked_return_value_from_library
lib: check return value (Coverity
1453456 )
paco [Mon, 25 Jun 2018 14:10:47 +0000 (16:10 +0200)]
lib: check return value (Coverity
1453456 )
Signed-off-by: F. Aragon <paco@voltanet.io>
Jafar Al-Gharaibeh [Mon, 25 Jun 2018 16:53:26 +0000 (12:53 -0400)]
Merge pull request #2546 from pacovn/Coverity_1465491_Untrusted_value_as_argument_2
pimd: untrusted argument (2) (Coverity
1465491 )
Jafar Al-Gharaibeh [Mon, 25 Jun 2018 16:46:57 +0000 (12:46 -0400)]
Merge pull request #2530 from pacovn/Coverity_1399295_Out-of-bounds_read
Coverity
1399295 out of bounds read
Jafar Al-Gharaibeh [Mon, 25 Jun 2018 16:43:31 +0000 (12:43 -0400)]
Merge pull request #2536 from pacovn/Coverity_1470150_Dereference_null_return_value
lib: null check (Coverity
1470150 )
Jafar Al-Gharaibeh [Mon, 25 Jun 2018 16:40:02 +0000 (12:40 -0400)]
Merge pull request #2550 from pacovn/Coverity_1399284_Dereference_null_return_value
ospfd: null check (Coverity
1399284 )
Jafar Al-Gharaibeh [Mon, 25 Jun 2018 16:39:17 +0000 (12:39 -0400)]
Merge pull request #2544 from pacovn/Coverity_1468510_Dereference_null_return_value
ospf6d: null check (Coverity
1468510 )
Quentin Young [Fri, 1 Jun 2018 20:31:52 +0000 (20:31 +0000)]
lib: remove DEFUN_DEPRECATED
Signed-off-by: Quentin Young <qlyoung@cumulusnetworks.com>
Quentin Young [Mon, 4 Jun 2018 16:05:56 +0000 (16:05 +0000)]
bgpd: remove DEFUN_DEPRECATED usage
Signed-off-by: Quentin Young <qlyoung@cumulusnetworks.com>
Jafar Al-Gharaibeh [Mon, 25 Jun 2018 16:38:44 +0000 (12:38 -0400)]
Merge pull request #2543 from pacovn/Coverity_1399304_Out-of-bounds_access
ospfd: out-of-bounds access (Coverity
1399304 1399286 )
Jafar Al-Gharaibeh [Mon, 25 Jun 2018 16:37:57 +0000 (12:37 -0400)]
Merge pull request #2541 from pacovn/Coverity_1221445_1221448_Out-of-bounds_access
ospfd: OoB access (Coverity
1221445 1221448 )
Quentin Young [Fri, 1 Jun 2018 20:31:48 +0000 (20:31 +0000)]
*: remove deprecated 'log trap' commands
Signed-off-by: Quentin Young <qlyoung@cumulusnetworks.com>
paco [Mon, 25 Jun 2018 13:25:26 +0000 (15:25 +0200)]
pimd: untrusted argument (2) (Coverity
1465491 )
Additional fix over
18e994a0437cfba9f4c09bd62293e13e49ea774b (PR #2457)
Previous correction was not enough for fixing the Coverity warning. Now we
ensure we don't overflow the buffer.
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Mon, 25 Jun 2018 15:18:17 +0000 (17:18 +0200)]
ospfd: null check (Coverity
1399284 )
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Mon, 25 Jun 2018 10:55:53 +0000 (12:55 +0200)]
ospfd: OoB access (Coverity
1399304 1399286 )
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Mon, 25 Jun 2018 14:47:15 +0000 (16:47 +0200)]
ldpd: null check (Coverity
1452317 )
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Mon, 25 Jun 2018 13:43:04 +0000 (15:43 +0200)]
eigrpd ospfd: null chk (Coverity
1458168 1455335 )
Signed-off-by: F. Aragon <paco@voltanet.io>
Donald Sharp [Fri, 22 Jun 2018 18:26:56 +0000 (14:26 -0400)]
zebra: Log how we got to this failure.
When a filter function fails to work correctly, we get an
error message that something has gone wrong. Unfortunately
we may not have any clues as to where the decode failure
happened. Add a backtrace to give us a clue.
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
Donald Sharp [Fri, 22 Jun 2018 18:22:02 +0000 (14:22 -0400)]
zebra: Add error messages in places where we have a decode problem
When we receive a netlink message from the kernel we have
handler functions for when we send a netlink command, if these
return a failure ( < 0 ) then we output that we had a parse
issue. But if all we get is:
2018-06-21T23:47:45.298156+00:00 qct-ix1-08 zebra[1484]: netlink-cmd (NS 0) filter function error
Then it is not very useful to figure out *where* the error happened.
Add more error code when in a decode path to hopefully allow us
to figure out where this message is coming from.
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
paco [Mon, 25 Jun 2018 13:03:17 +0000 (15:03 +0200)]
bgpd: null check (Coverity
1468413 )
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Mon, 25 Jun 2018 11:09:34 +0000 (13:09 +0200)]
ospf6d: null check (Coverity
1468510 )
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Mon, 25 Jun 2018 10:16:32 +0000 (12:16 +0200)]
isisd: out-of-bounds access (Coverity
1452552 )
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Mon, 25 Jun 2018 09:19:55 +0000 (11:19 +0200)]
ospfd: OoB access (Coverity
1221445 1221448 )
Signed-off-by: F. Aragon <paco@voltanet.io>
G. Paul Ziemba [Sun, 24 Jun 2018 19:39:03 +0000 (12:39 -0700)]
bgpd: don't nexthop-track twice-leaked routes that came from zebra
Issue 2381: interface based routes not marked "up" when they originate
in zebra, redistributed to bgp vrf, then imported to vpn and then
imported by another vrf.
Routes that are redistributed into BGP from zebra should not get
nexthop tracking (the assumption is that the originating protocol
is responsible to export or withdraw the route according to its own
notion of nexthop status).
The vpn-vrf route-leaking code checks the source route sub_type to
decide whether to use nexthop tracking on the resulting leaked route.
A route that is redistributed from zebra into bgp will have
sub_type==BGP_ROUTE_REDISTRIBUTE. If it is leaked to the vpn RIB,
the resulting vpn RIB route will have sub_type==BGP_ROUTE_IMPORTED.
If THAT vpn route is leaked to another vrf, the original code will
examine only the leak-source route sub_type and, since it is
not BGP_ROUTE_REDISTRIBUTE, will wrongly try to use nexthop tracking
on the new route in the final vrf.
This change modifies the leak function to track back up the
parent links to the ultimate parent of the leak source route
and look at that route's sub_type instead.
Signed-off-by: G. Paul Ziemba <paulz@labn.net>
paco [Fri, 22 Jun 2018 19:35:01 +0000 (21:35 +0200)]
lib: null check (Coverity
1470150 )
Signed-off-by: F. Aragon <paco@voltanet.io>
Jafar Al-Gharaibeh [Fri, 22 Jun 2018 19:19:13 +0000 (14:19 -0500)]
Merge pull request #2520 from donaldsharp/privs_smivs
lib: Fix privs when using HAVE_CAPABILITIES
paco [Wed, 20 Jun 2018 16:25:28 +0000 (18:25 +0200)]
lib: uninitialized variable (2) (Coverity
1469898 )
Previous correction (
2c2d5cb397c140c05ad81e8c79273bd3af13b595 ) was not enough,
so now it is ensured that the argument shift is not negative nor zero.
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Fri, 22 Jun 2018 15:14:57 +0000 (17:14 +0200)]
zebra: untrusted array index (2) (Coverity
1470113 )
This is a correction over
7f61ea7bd47bfd86a2c873870507281b1837dcdd in order
to avoid the TAINTED_SCALAR Coverity warning (ending in "Untrusted array
index read"). This is equivalent to the previous commit, but avoiding
pointer arithmetic with tainted variables.
Signed-off-by: F. Aragon <paco@voltanet.io>
Quentin Young [Fri, 22 Jun 2018 18:11:09 +0000 (14:11 -0400)]
Merge pull request #2512 from pacovn/Coverity_1399200_Unchecked_return_value_from_library
vtysh: return value check (Coverity
1399200 )
paco [Fri, 22 Jun 2018 13:41:35 +0000 (15:41 +0200)]
ripd: out-of-bounds read (Coverity
1399295 )
Signed-off-by: F. Aragon <paco@voltanet.io>
Lou Berger [Fri, 22 Jun 2018 17:13:05 +0000 (13:13 -0400)]
Merge pull request #2449 from donaldsharp/lib_delayed_read
Lib delayed read
paco [Fri, 15 Jun 2018 14:54:09 +0000 (16:54 +0200)]
lib: out-of-bounds access (Coverity
1452539 )
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Thu, 21 Jun 2018 10:09:44 +0000 (12:09 +0200)]
vtysh: return value check (Coverity
1399200 )
Signed-off-by: F. Aragon <paco@voltanet.io>
Quentin Young [Thu, 21 Jun 2018 19:12:33 +0000 (15:12 -0400)]
Merge pull request #2501 from pacovn/infer_unused1
bgpd isisd ldpd lib ospfd pimd: redundancy (infer, grouped)
Quentin Young [Thu, 21 Jun 2018 19:02:31 +0000 (15:02 -0400)]
Merge pull request #2505 from pacovn/Coverity_1143220_Argument_cannot_be_negative
tools: return check (2) (Coverity
1143220 )
Quentin Young [Thu, 21 Jun 2018 19:00:12 +0000 (15:00 -0400)]
Merge pull request #2511 from pacovn/Coverity_1452287_et_al_Explicit_null_dereferenced
ldpd, lib: null check (Coverity
1452287 and 20 alike)
Quentin Young [Thu, 21 Jun 2018 18:43:16 +0000 (14:43 -0400)]
Merge pull request #2408 from ajones-rvbd/ajones-issue-2403
tests: use BUILT_SOURCES in tests/Makefile.am for automake 1.16.1
Quentin Young [Thu, 21 Jun 2018 18:38:47 +0000 (14:38 -0400)]
Merge pull request #2502 from pacovn/Coverity_1221459_Use_after_free
ospf6d: fix use after free (2) (Coverity
1221459 )
Quentin Young [Thu, 21 Jun 2018 18:34:56 +0000 (14:34 -0400)]
Merge pull request #2513 from pacovn/Coverity_1455334_et_al_Dereference_null_return_value
eigrpd: null check (Coverity
1455334 and 4 alike)
Quentin Young [Thu, 21 Jun 2018 18:24:11 +0000 (14:24 -0400)]
Merge pull request #2518 from pacovn/Coverity_23106_Explicit_null_dereferenced
bgpd: null check (Coverity 23106)
Quentin Young [Thu, 21 Jun 2018 18:20:48 +0000 (14:20 -0400)]
Merge pull request #2519 from pacovn/Coverity_1399238_Logically_dead_code
bgpd: dead code (Coverity
1399238 )
Quentin Young [Thu, 21 Jun 2018 18:18:47 +0000 (14:18 -0400)]
Merge pull request #2522 from pacovn/Coverity_1399277_Explicit_null_dereferenced
lib: null check (Coverity
1399277 )
Quentin Young [Thu, 21 Jun 2018 18:17:58 +0000 (14:17 -0400)]
Merge pull request #2523 from pacovn/Coverity_1455380_Dereference_null_return_value
bgpd: null check (Coverity
1455380 )
paco [Thu, 21 Jun 2018 15:49:13 +0000 (17:49 +0200)]
bgpd: null check (Coverity
1455380 )
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Thu, 21 Jun 2018 15:34:16 +0000 (17:34 +0200)]
lib: null check (Coverity
1399277 )
Signed-off-by: F. Aragon <paco@voltanet.io>
Donald Sharp [Thu, 21 Jun 2018 15:28:16 +0000 (11:28 -0400)]
sharpd: Does not need any special priv's
Remove the unnecessary privs that we were requesting
for the sharp daemon.
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
paco [Thu, 21 Jun 2018 15:22:55 +0000 (17:22 +0200)]
bgpd: dead code (Coverity
1399238 )
Signed-off-by: F. Aragon <paco@voltanet.io>
Donald Sharp [Thu, 21 Jun 2018 15:22:51 +0000 (11:22 -0400)]
lib: Fix privs when using HAVE_CAPABILITIES
If your daemon does not need any special privileges
and you are compiling with HAVE_CAPABILIES, the
zprivs->change pointer will end up NULL due
to the way zprivs_caps_init. So as a check
let's add a NULL check for zprivs->change
and set it to a function that will do nothing.
This change prevents a crash if you raise privileges
when your daemon needs no special privileges.
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
Renato Westphal [Thu, 21 Jun 2018 15:16:53 +0000 (12:16 -0300)]
Merge pull request #2510 from donaldsharp/extended_ack
zebra: Add extended Ack error parsing to FRR
paco [Thu, 21 Jun 2018 13:58:51 +0000 (15:58 +0200)]
bgpd: null check (Coverity 23106)
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Wed, 20 Jun 2018 16:09:35 +0000 (18:09 +0200)]
spf6d: fix use after free (2) (Coverity
1221459 )
Previous fix was incomplete, as calling ospf6_lsa_unlock() frees 'req' but
it does not put it to zero, so it was called ospf6_lsdb_remove() afterwards
even being 'req' already freed.
Signed-off-by: F. Aragon <paco@voltanet.io>
Donald Sharp [Thu, 21 Jun 2018 10:13:20 +0000 (06:13 -0400)]
include: add netlink.h to our build system
For compilation on platforms that do not have the
linux headers installed.
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
Donald Sharp [Thu, 21 Jun 2018 01:20:31 +0000 (21:20 -0400)]
zebra: Add extended Ack error parsing to FRR
Add code to request and read in extended ack information
to provide a bit more context of what went wrong when
a failure is detected in the kernel.
Example of a failed delete:
Jun 20 21:19:25 robot zebra[11878]: Extended Error: Invalid prefix for given prefix length
Jun 20 21:19:25 robot zebra[11878]: netlink-cmd (NS 0) error: Invalid argument, type=RTM_DELROUTE(25), seq=8, pid=
4078403400
Jun 20 21:19:25 robot zebra[11878]: 0:4.3.2.0/24: Route Deletion failure
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
paco [Thu, 21 Jun 2018 10:24:53 +0000 (12:24 +0200)]
eigrpd: null check (Coverity
1455334 and 4 alike)
Coverity issues fixed with this commit:
1455334 1455335 1455336 1455337 1455339
Signed-off-by: F. Aragon <paco@voltanet.io>
Donald Sharp [Thu, 21 Jun 2018 11:30:21 +0000 (07:30 -0400)]
Merge pull request #2504 from pacovn/Coverity_23110_Dereference_after_null_check
ospfd: null check (Coverity 23110)
Donald Sharp [Thu, 21 Jun 2018 11:29:51 +0000 (07:29 -0400)]
Merge pull request #2507 from pacovn/Coverity_1436344_1451361_Dereference_after_null_check
bgpd, lib: null check (Coverity
1436344 ,
1451361 )
Donald Sharp [Thu, 21 Jun 2018 11:27:54 +0000 (07:27 -0400)]
Merge pull request #2508 from pacovn/Coverity_1470113_Untrusted_array_index_write
zebra: untrusted array index (Coverity
1470113 )
Donald Sharp [Thu, 21 Jun 2018 11:26:47 +0000 (07:26 -0400)]
Merge pull request #2506 from pacovn/Coverity_1221453_1461297_Dereference_after_null_check
bgpd ospf6d: null check (Coverity
1221453 1461297 )
paco [Thu, 21 Jun 2018 09:18:05 +0000 (11:18 +0200)]
ldpd lib: null check (Coverity
1452287 + 20 alike)
Coverity issues fixed with this commit:
1452287 1452291 1452307 1452310 1452317 1452321 1452327 1452330 1452331 1452336
1452337 1452340 1452352 1452354 1452358
(originated at ldpd/ldpd_vty_cmds_clippy.c)
1448388 1448390 1448392 1448397 1448404 1448408
(originated at lib/plist_clippy.c)
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Wed, 20 Jun 2018 15:15:37 +0000 (17:15 +0200)]
bgpd isisd ldpd lib ospfd pimd: redundancy (infer)
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Wed, 20 Jun 2018 16:41:48 +0000 (18:41 +0200)]
tools: return check (2) (Coverity
1143220 )
Previous correction (
657f9948ed593387d29d391832c18dc04326a5a9 ) was incomplete.
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Wed, 20 Jun 2018 17:25:06 +0000 (19:25 +0200)]
zebra: untrusted array index (Coverity
1470113 )
This is a correction over
32ac96b2ba9693696d2f1156af1b80985d4e55bb , so
removing the forced string null termination doesn't involve a worse situation
than before (the underflow check should protect for the case of receiving
an incomplete buffer, which would be the cause of non-zero terminated string)
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Wed, 20 Jun 2018 17:11:18 +0000 (19:11 +0200)]
bgpd, lib: null check (Coverity
1436344 ,
1451361 )
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Wed, 20 Jun 2018 16:57:16 +0000 (18:57 +0200)]
bgpd ospf6d: null check (Coverity
1221453 1461297 )
paco [Wed, 20 Jun 2018 16:35:20 +0000 (18:35 +0200)]
ospfd: null check (Coverity 23110)
Signed-off-by: F. Aragon <paco@voltanet.io>
Donald Sharp [Wed, 20 Jun 2018 15:39:07 +0000 (11:39 -0400)]
Merge pull request #2498 from pacovn/Coverity_1470098_Logically_dead_code
bgpd: json output fix (Coverity
1470098 )
paco [Tue, 19 Jun 2018 17:12:36 +0000 (19:12 +0200)]
bgpd: json output fix (Coverity
1470098 )
Signed-off-by: F. Aragon <paco@voltanet.io>
Russ White [Wed, 20 Jun 2018 11:55:56 +0000 (07:55 -0400)]
Merge pull request #2415 from qlyoung/pbr-table-range
PBR table range configuration + misc cleanups
Russ White [Wed, 20 Jun 2018 11:55:08 +0000 (07:55 -0400)]
Merge pull request #2462 from pacovn/Coverity_1465494_String_not_null_terminated
zebra: string null termination (Coverity
1465494 )