Hi,
> This will only be evaluated on Token Ring devices.
I understood, Thank you.
But, again the same issue. Has Linux not implemented "LOOPBACK
SUPPRESSION"? If the Neighbour Solicitation is just looped-back, will
the DAD will fail? How the NS is differentiated between the loop-back and
the NS from other node?
with regards,
G Suresh
On Thu, 26 Oct 2006 10:18:28 -0400
Vlad Yasevich <[EMAIL PROTECTED]> wrote:
> Suresh wrote:
> > Hi,
> >
> > I have doubt on the Multicast Loopback handling on DAD.
> > Does Linux-IPv6 confirm "9. APPENDIX A: LOOPBACK SUPPRESSION &
> > DUPLICATE ADDRESS DETECTION" of RFC2462 ? According to the following
> > code, DAD will not work where two interfaces are using the same
> > link-layer address, since it simply discards the packet from other node
> > also. Am I right?
> >
> >
> > if (dev->type == ARPHRD_IEEE802_TR) {
> > unsigned char *sadr = skb->mac.raw;
> > if (((sadr[8] ^ dev->dev_addr[0]) &
> > 0x7f) == 0 &&
> > sadr[9] == dev->dev_addr[1] &&
> > sadr[10] == dev->dev_addr[2] &&
> > sadr[11] == dev->dev_addr[3] &&
> > sadr[12] == dev->dev_addr[4] &&
> > sadr[13] == dev->dev_addr[5]) {
> > /* looped-back to us */
> > goto out;
> > }
>
> This will only be evaluated on Token Ring devices.
>
> -vlad
_______________________________________________
Users mailing list
[email protected]
https://lists.ipv6.org/mailman/listinfo/users