diff options
| author | Donald Sharp <sharpd@nvidia.com> | 2021-07-19 10:29:42 -0400 |
|---|---|---|
| committer | Donatas Abraitis <donatas@opensourcerouting.org> | 2024-09-18 18:03:10 +0300 |
| commit | ffa0fd5c43a476010226e47f6aea357e81b43a9f (patch) | |
| tree | 91a6d7a49c7176e6cbba34b0022b577dcc6462c1 | |
| parent | dc4440bdb2455c5350d4db992d196843450fbf7e (diff) | |
bgpd: Fixup crash when leaking from default vrf for mpls vpn's
When we get a update on a route that we already have information on
from another router and that route has been leaked ensure that
we do not crash when trying to releak the code when we may want
to modify the as path.
Signed-off-by: Donald Sharp <sharpd@nvidia.com>
| -rw-r--r-- | bgpd/bgp_mplsvpn.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/bgpd/bgp_mplsvpn.c b/bgpd/bgp_mplsvpn.c index 4e5a4150d1..13da55ffb7 100644 --- a/bgpd/bgp_mplsvpn.c +++ b/bgpd/bgp_mplsvpn.c @@ -2399,6 +2399,7 @@ static void vpn_leak_to_vrf_update_onevrf(struct bgp *to_bgp, /* to */ * detection */ if (path_vpn->extra && path_vpn->extra->vrfleak && + path_vpn->extra->vrfleak->bgp_orig && (to_bgp->as != path_vpn->extra->vrfleak->bgp_orig->as)) { new_aspath = aspath_dup(static_attr.aspath); new_aspath = |
