diff options
author | Stefano Brivio <sbrivio@redhat.com> | 2023-05-14 18:44:53 +0200 |
---|---|---|
committer | Stefano Brivio <sbrivio@redhat.com> | 2023-05-23 16:13:28 +0200 |
commit | e89da3cf03b2e301504f0d9c45db8e6056e66beb (patch) | |
tree | 2aae72a0f7c8641ac72d93709659798cbbb8e1c7 /test/nstool.c | |
parent | a7359f09489803e501c85c7158b9462c6b3df465 (diff) | |
download | passt-e89da3cf03b2e301504f0d9c45db8e6056e66beb.tar passt-e89da3cf03b2e301504f0d9c45db8e6056e66beb.tar.gz passt-e89da3cf03b2e301504f0d9c45db8e6056e66beb.tar.bz2 passt-e89da3cf03b2e301504f0d9c45db8e6056e66beb.tar.lz passt-e89da3cf03b2e301504f0d9c45db8e6056e66beb.tar.xz passt-e89da3cf03b2e301504f0d9c45db8e6056e66beb.tar.zst passt-e89da3cf03b2e301504f0d9c45db8e6056e66beb.zip |
netlink: Add functionality to copy addresses from outer namespace
Similarly to what we've just done with routes, support NL_DUP for
addresses (currently not exposed): nl_addr() can optionally copy
mulitple addresses to the target namespace, by fixing up data from
the dump with appropriate flags and interface index, and repeating
it back to the kernel on the socket opened in the target namespace.
Link-local addresses are not copied: the family is set to AF_UNSPEC,
which means the kernel will ignore them. Same for addresses from a
mismatching address (pre-4.19 kernels without support for
NETLINK_GET_STRICT_CHK).
Ignore IFA_LABEL attributes by changing their type to IFA_UNSPEC,
because in general they will report mismatching names, and we don't
really need to use labels as we already know the interface index.
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
Reviewed-by: David Gibson <david@gibson.dropbear.id.au>
Diffstat (limited to 'test/nstool.c')
0 files changed, 0 insertions, 0 deletions