Hi,
I just find out this IFA_F_NODAD was not in the kernel used in my test
bed which is 2.6.17. So I tried to modify the code in ipv6/addrconf.c by
myself to remove the DAD:
if (!max_addresses ||
ipv6_count_addresses(in6_dev) max_addresses)
ifp = ipv6_add_addr(in6_dev, addr,
pinfo-prefix_len,
addr_typeIPV6_ADDR_SCOPE_MASK, 0);
if (!ifp || IS_ERR(ifp)) {
in6_dev_put(in6_dev);
return;
}
// New code
if (!IS_ERR(ifp)) {
spin_lock_bh(ifp-lock);
ifp-flags = ~IFA_F_TENTATIVE;
spin_unlock_bh(ifp-lock);
addrconf_join_solict(ifp-idev-dev, ifp-addr);
ipv6_ifa_notify(RTM_NEWADDR, ifp);
//in6_ifa_put(ifp);
printk(New address configured.\n);
}
// --end ---
update_lft = create = 1;
ifp-cstamp = jiffies;
// addrconf_dad_start(ifp, RTF_ADDRCONF|RTF_PREFIX_RT);
However, even the new address is generated and assigned to the
interface, and I can read the address from the /proc interface, my first
few packets are eaten by the kernel. Only until after about 1 second,
then my packet can make its way out. Is kernel doing anything that
blocks the sending and receiving of packets during the time of DAD?
Thanks a lot!
Best Regards,
Xia Yang
On Mon, 2007-10-01 at 20:44 +0900, YOSHIFUJI Hideaki / 吉藤英明 wrote:
In article [EMAIL PROTECTED] (at Mon, 01 Oct 2007 11:53:27 +0800), Xia Yang
[EMAIL PROTECTED] says:
I would like to ask for help on how to remove or disable the DAD process
properly, as long as the node can send, receive and forward packets
immediately after a new IPv6 address is generated. Any pointer is
appreciated. Thanks a lot in advance!
IFA_F_NODAD address flag might help this.
--yoshfuji
-
To unsubscribe from this list: send the line unsubscribe netdev in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html