On Sun, Nov 01, 2020 at 02:36:40PM +0100, Pier Carlo Chiodi wrote: > Hello, was anyone else able to reproduce this issue? > I've been able to reproduce it also using the code from master. > > I paste some more info here, I hope they'll be useful to troubleshoot it. > > Thanks
Hi Sorry for late answer, Here is the patch. -- Elen sila lumenn' omentielvo Ondrej 'Santiago' Zajicek (email: santi...@crfreenet.org) OpenPGP encrypted e-mails preferred (KeyID 0x11DEADC3, wwwkeys.pgp.net) "To err is human -- to blame it on a computer is even more so."
commit b962967e20f186f797c163f69c673b0ee4ef3b2b Author: Ondrej Zajicek (work) <santi...@crfreenet.org> Date: Sun Nov 15 16:01:19 2020 +0100 Nest: Fix crash in receive limit handling in import table Logging as a result of triggered receive limit in import table code accesset rte->net, which was not filed yet. Thanks to Pier Carlo Chiodi for the bugreport. diff --git a/nest/rt-table.c b/nest/rt-table.c index eff25e5c..b78e5896 100644 --- a/nest/rt-table.c +++ b/nest/rt-table.c @@ -2490,6 +2490,9 @@ rte_update_in(struct channel *c, const net_addr *n, rte *new, struct rte_src *sr if (l->state == PLS_BLOCKED) { + /* Required by rte_trace_in() */ + new->net = net; + rte_trace_in(D_FILTERS, c->proto, new, "ignored [limit]"); goto drop_update; }