diff options
author | Daniel Walter <sahne@0x90.at> | 2011-04-13 21:09:25 +0000 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2011-04-15 15:43:55 -0700 |
commit | bd015928bb1713691068c4d0d159afccbaf0f8c0 (patch) | |
tree | 816468bfbd16ba883175039853ced9a95d1f230f | |
parent | eb8aa72d4e8756bde74d5f22bdd968ee6131069a (diff) | |
download | linux-bd015928bb1713691068c4d0d159afccbaf0f8c0.tar.bz2 |
ipv6: ignore looped-back NA while dad is running
[ipv6] Ignore looped-back NAs while in Duplicate Address Detection
If we send an unsolicited NA shortly after bringing up an
IPv6 address, the duplicate address detection algorithm
fails and the ip stays in tentative mode forever.
This is due a missing check if the NA is looped-back to us.
Signed-off-by: Daniel Walter <dwalter@barracuda.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
-rw-r--r-- | net/ipv6/ndisc.c | 7 |
1 files changed, 4 insertions, 3 deletions
diff --git a/net/ipv6/ndisc.c b/net/ipv6/ndisc.c index 92f952d093db..f057ff312840 100644 --- a/net/ipv6/ndisc.c +++ b/net/ipv6/ndisc.c @@ -945,9 +945,10 @@ static void ndisc_recv_na(struct sk_buff *skb) } ifp = ipv6_get_ifaddr(dev_net(dev), &msg->target, dev, 1); if (ifp) { - if (ifp->flags & IFA_F_TENTATIVE) { - addrconf_dad_failure(ifp); - return; + if (skb->pkt_type != PACKET_LOOPBACK + && (ifp->flags & IFA_F_TENTATIVE)) { + addrconf_dad_failure(ifp); + return; } /* What should we make now? The advertisement is invalid, but ndisc specs say nothing |