Hi, > This will only be evaluated on Token Ring devices.
I understood, Thank you. But, again the same issue. Has Linux not implemented "LOOPBACK SUPPRESSION"? If the Neighbour Solicitation is just looped-back, will the DAD will fail? How the NS is differentiated between the loop-back and the NS from other node? with regards, G Suresh On Thu, 26 Oct 2006 10:18:28 -0400 Vlad Yasevich <[EMAIL PROTECTED]> wrote: > Suresh wrote: > > Hi, > > > > I have doubt on the Multicast Loopback handling on DAD. > > Does Linux-IPv6 confirm "9. APPENDIX A: LOOPBACK SUPPRESSION & > > DUPLICATE ADDRESS DETECTION" of RFC2462 ? According to the following > > code, DAD will not work where two interfaces are using the same > > link-layer address, since it simply discards the packet from other node > > also. Am I right? > > > > > > if (dev->type == ARPHRD_IEEE802_TR) { > > unsigned char *sadr = skb->mac.raw; > > if (((sadr[8] ^ dev->dev_addr[0]) & > > 0x7f) == 0 && > > sadr[9] == dev->dev_addr[1] && > > sadr[10] == dev->dev_addr[2] && > > sadr[11] == dev->dev_addr[3] && > > sadr[12] == dev->dev_addr[4] && > > sadr[13] == dev->dev_addr[5]) { > > /* looped-back to us */ > > goto out; > > } > > This will only be evaluated on Token Ring devices. > > -vlad _______________________________________________ Users mailing list Users@ipv6.org https://lists.ipv6.org/mailman/listinfo/users