diff options
| author | Rafael Zalamena <rzalamena@opensourcerouting.org> | 2019-10-15 14:56:27 -0300 | 
|---|---|---|
| committer | Rafael Zalamena <rzalamena@opensourcerouting.org> | 2019-11-04 09:50:54 -0300 | 
| commit | 4a9feb66b9cae67b0e360d8a5880ba3395b5fbe9 (patch) | |
| tree | ec47746bc95f447e4d8708f5f4ddbc0adfcc3762 /bfdd/bfd.h | |
| parent | 2bbb98d60f3ea6e01926eb9ddaa075065d7f1a50 (diff) | |
bfdd: bind VRF sockets to devices
Always bind the created sockets to their respective VRF devices. With
this it should be possible to run BFD on VRFs without needing to weaken
the security setting `net.ipv4.udp_l3mdev_accept=1`.
Signed-off-by: Rafael Zalamena <rzalamena@opensourcerouting.org>
Diffstat (limited to 'bfdd/bfd.h')
| -rw-r--r-- | bfdd/bfd.h | 12 | 
1 files changed, 6 insertions, 6 deletions
diff --git a/bfdd/bfd.h b/bfdd/bfd.h index 220dd6e0a8..eddfde62fb 100644 --- a/bfdd/bfd.h +++ b/bfdd/bfd.h @@ -461,14 +461,14 @@ int bp_set_tosv6(int sd, uint8_t value);  int bp_set_tos(int sd, uint8_t value);  int bp_bind_dev(int sd, const char *dev); -int bp_udp_shop(vrf_id_t vrf_id); -int bp_udp_mhop(vrf_id_t vrf_id); -int bp_udp6_shop(vrf_id_t vrf_id); -int bp_udp6_mhop(vrf_id_t vrf_id); +int bp_udp_shop(const struct vrf *vrf); +int bp_udp_mhop(const struct vrf *vrf); +int bp_udp6_shop(const struct vrf *vrf); +int bp_udp6_mhop(const struct vrf *vrf);  int bp_peer_socket(const struct bfd_session *bs);  int bp_peer_socketv6(const struct bfd_session *bs); -int bp_echo_socket(vrf_id_t vrf_id); -int bp_echov6_socket(vrf_id_t vrf_id); +int bp_echo_socket(const struct vrf *vrf); +int bp_echov6_socket(const struct vrf *vrf);  void ptm_bfd_snd(struct bfd_session *bfd, int fbit);  void ptm_bfd_echo_snd(struct bfd_session *bfd);  | 
