aboutgitcodebugslistschat
diff options
context:
space:
mode:
authorStefano Brivio <sbrivio@redhat.com>2024-08-15 00:40:43 +0200
committerStefano Brivio <sbrivio@redhat.com>2024-08-18 01:29:52 +0200
commitf4e9f26480ef56ec09a871abf552cd2baac6cb10 (patch)
tree8b33e2144c9f92810e520b171843e3a405bb4f6b
parentd6f022073124edd7a46fb849a8496d6ea6ce136f (diff)
downloadpasst-f4e9f26480ef56ec09a871abf552cd2baac6cb10.tar
passt-f4e9f26480ef56ec09a871abf552cd2baac6cb10.tar.gz
passt-f4e9f26480ef56ec09a871abf552cd2baac6cb10.tar.bz2
passt-f4e9f26480ef56ec09a871abf552cd2baac6cb10.tar.lz
passt-f4e9f26480ef56ec09a871abf552cd2baac6cb10.tar.xz
passt-f4e9f26480ef56ec09a871abf552cd2baac6cb10.tar.zst
passt-f4e9f26480ef56ec09a871abf552cd2baac6cb10.zip
pasta: Disable neighbour solicitations on device up to prevent DAD
As soon as we the kernel notifier for IPv6 address configuration (addrconf_notify()) sees that we bring the target interface up (NETDEV_UP), it will schedule duplicate address detection, so, by itself, setting the nodad flag later is useless, because that won't stop a detection that's already in progress. However, if we disable neighbour solicitations with IFF_NOARP (which is a misnomer for IPv6 interfaces, but there's no possibility of mixing things up), the notifier will not trigger DAD, because it can't be done, of course, without neighbour solicitations. Set IFF_NOARP as we bring up the device, and drop it after we had a chance to set the nodad attribute on the link. Signed-off-by: Stefano Brivio <sbrivio@redhat.com> Reviewed-by: David Gibson <david@gibson.dropbear.id.au>
-rw-r--r--pasta.c11
1 files changed, 10 insertions, 1 deletions
diff --git a/pasta.c b/pasta.c
index e8883bd..1142f03 100644
--- a/pasta.c
+++ b/pasta.c
@@ -303,10 +303,15 @@ void pasta_ns_conf(struct ctx *c)
strerror(-rc));
if (c->pasta_conf_ns) {
+ unsigned int flags = IFF_UP;
+
if (c->mtu != -1)
nl_link_set_mtu(nl_sock_ns, c->pasta_ifi, c->mtu);
- nl_link_set_flags(nl_sock_ns, c->pasta_ifi, IFF_UP, IFF_UP);
+ if (c->ifi6) /* Avoid duplicate address detection on link up */
+ flags |= IFF_NOARP;
+
+ nl_link_set_flags(nl_sock_ns, c->pasta_ifi, flags, flags);
if (c->ifi4) {
if (c->ip4.no_copy_addrs) {
@@ -353,6 +358,10 @@ void pasta_ns_conf(struct ctx *c)
strerror(-rc));
}
+ /* We dodged DAD: re-enable neighbour solicitations */
+ nl_link_set_flags(nl_sock_ns, c->pasta_ifi,
+ 0, IFF_NOARP);
+
if (c->ip6.no_copy_addrs) {
rc = nl_addr_set(nl_sock_ns, c->pasta_ifi,
AF_INET6, &c->ip6.addr, 64);