summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDonald Sharp <sharpd@nvidia.com>2021-07-19 10:29:42 -0400
committerDonatas Abraitis <donatas@opensourcerouting.org>2024-09-18 18:03:10 +0300
commitffa0fd5c43a476010226e47f6aea357e81b43a9f (patch)
tree91a6d7a49c7176e6cbba34b0022b577dcc6462c1
parentdc4440bdb2455c5350d4db992d196843450fbf7e (diff)
bgpd: Fixup crash when leaking from default vrf for mpls vpn's
When we get a update on a route that we already have information on from another router and that route has been leaked ensure that we do not crash when trying to releak the code when we may want to modify the as path. Signed-off-by: Donald Sharp <sharpd@nvidia.com>
-rw-r--r--bgpd/bgp_mplsvpn.c1
1 files changed, 1 insertions, 0 deletions
diff --git a/bgpd/bgp_mplsvpn.c b/bgpd/bgp_mplsvpn.c
index 4e5a4150d1..13da55ffb7 100644
--- a/bgpd/bgp_mplsvpn.c
+++ b/bgpd/bgp_mplsvpn.c
@@ -2399,6 +2399,7 @@ static void vpn_leak_to_vrf_update_onevrf(struct bgp *to_bgp, /* to */
* detection
*/
if (path_vpn->extra && path_vpn->extra->vrfleak &&
+ path_vpn->extra->vrfleak->bgp_orig &&
(to_bgp->as != path_vpn->extra->vrfleak->bgp_orig->as)) {
new_aspath = aspath_dup(static_attr.aspath);
new_aspath =