diff options
| author | David Lamparter <equinox@opensourcerouting.org> | 2021-07-26 10:47:21 +0200 |
|---|---|---|
| committer | David Lamparter <equinox@opensourcerouting.org> | 2021-11-17 11:17:44 +0100 |
| commit | caef8f7961016da632c7a58b21bd3cc7a72df624 (patch) | |
| tree | 1922474239dc352a1aa1dcde5fae30fa159b9df2 /pimd/pim_nht.h | |
| parent | b09bd804ac625dea4dee4e2a58c3b167ef39bca7 (diff) | |
pimd: add back blocking RPF for BSM
NHT won't have a result yet when we get the first BSM from a new BSR.
Hence, the first packet(s) are lost, since their RPF validation fails.
Re-add the blocking RPF check that was there before (though in a much
more sensible manner.)
Also nuke the now-unused pim_nexthop_match* functions.
Signed-off-by: David Lamparter <equinox@opensourcerouting.org>
Diffstat (limited to 'pimd/pim_nht.h')
| -rw-r--r-- | pimd/pim_nht.h | 4 |
1 files changed, 0 insertions, 4 deletions
diff --git a/pimd/pim_nht.h b/pimd/pim_nht.h index e7d6825409..568c2eb232 100644 --- a/pimd/pim_nht.h +++ b/pimd/pim_nht.h @@ -70,10 +70,6 @@ void pim_sendmsg_zebra_rnh(struct pim_instance *pim, struct zclient *zclient, int pim_ecmp_fib_lookup_if_vif_index(struct pim_instance *pim, struct prefix *src, struct prefix *grp); void pim_rp_nexthop_del(struct rp_info *rp_info); -bool pim_nexthop_match(struct pim_instance *pim, struct in_addr addr, - struct in_addr ip_src); -bool pim_nexthop_match_nht_cache(struct pim_instance *pim, struct in_addr addr, - struct in_addr ip_src); /* for RPF check on BSM message receipt */ void pim_nht_bsr_add(struct pim_instance *pim, struct in_addr bsr_addr); |
