On Sun, Nov 01, 2020 at 02:36:40PM +0100, Pier Carlo Chiodi wrote:
> Hello, was anyone else able to reproduce this issue?
> I've been able to reproduce it also using the code from master.
> 
> I paste some more info here, I hope they'll be useful to troubleshoot it.
> 
> Thanks

Hi

Sorry for late answer, Here is the patch.

-- 
Elen sila lumenn' omentielvo

Ondrej 'Santiago' Zajicek (email: santi...@crfreenet.org)
OpenPGP encrypted e-mails preferred (KeyID 0x11DEADC3, wwwkeys.pgp.net)
"To err is human -- to blame it on a computer is even more so."
commit b962967e20f186f797c163f69c673b0ee4ef3b2b
Author: Ondrej Zajicek (work) <santi...@crfreenet.org>
Date:   Sun Nov 15 16:01:19 2020 +0100

    Nest: Fix crash in receive limit handling in import table
    
    Logging as a result of triggered receive limit in import table code
    accesset rte->net, which was not filed yet.
    
    Thanks to Pier Carlo Chiodi for the bugreport.

diff --git a/nest/rt-table.c b/nest/rt-table.c
index eff25e5c..b78e5896 100644
--- a/nest/rt-table.c
+++ b/nest/rt-table.c
@@ -2490,6 +2490,9 @@ rte_update_in(struct channel *c, const net_addr *n, rte *new, struct rte_src *sr
 
     if (l->state == PLS_BLOCKED)
     {
+      /* Required by rte_trace_in() */
+      new->net = net;
+
       rte_trace_in(D_FILTERS, c->proto, new, "ignored [limit]");
       goto drop_update;
     }

Reply via email to