From: Alexis Bauvin <abau...@scaleway.com> Date: Mon, 3 Dec 2018 10:54:37 +0100
> We are trying to isolate the VXLAN traffic from different VMs with VRF as > shown > in the schemas below: ...a > We faced some issue in the datapath, here are the details: > > * Egress traffic: > The vxlan packets are sent directly to the default VRF because it's where the > socket is bound, therefore the traffic has a default route via eth0. the > workarount is to force this traffic to VRF green with ip rules. > > * Ingress traffic: > When receiving the traffic on eth0.2030 the vxlan socket is unreachable from > VRF green. The workaround is to enable *udp_l3mdev_accept* sysctl, but > this breaks isolation between overlay and underlay: packets sent from > blue or red by e.g. a guest VM will be accepted by the socket, allowing > injection of VXLAN packets from the overlay. > > This patch serie fixes the issues describe above by allowing VXLAN socket to > be > bound to a specific VRF device therefore looking up in the correct table. Series applied to net-next, thanks.