Hide Forgot
Description of problem: Failed on tahi test "Part B: NUT receives DAD NS (target == NUT)" The test description can be seen in http://focus.bne.redhat.com/~xhu/Core-Router/Conform/RHEL5u7-beta/Self_Test_5-0-0-Router-RHEL5.7beta-20110516/addr.p2/LLA_DAD_NSPostDAD_SameDstSameTgt.html The test log can be seen in http://focus.bne.redhat.com/~xhu/Core-Router/Conform/RHEL5u7-beta/Self_Test_5-0-0-Router-RHEL5.7beta-20110516/addr.p2/3.html The test tcpdump file can be seen in http://focus.bne.redhat.com/~xhu/Core-Router/Conform/RHEL5u7-beta/Self_Test_5-0-0-Router-RHEL5.7beta-20110516/addr.p2/3_html_Link0.pcap and http://focus.bne.redhat.com/~xhu/Core-Router/Conform/RHEL5u7-beta/Self_Test_5-0-0-Router-RHEL5.7beta-20110516/addr.p2/3_html_Link1.pcap Version-Release number of selected component (if applicable): kernel-2.6.18-261.el5 radvd-0.9.1-4 How reproducible: everytimes Steps to Reproduce: 1. 2. 3. Actual results: Failed on tahi test "Part B: NUT receives DAD NS (target == NUT)" Expected results: Tahi test "Part B: NUT receives DAD NS (target == NUT)" should be pass Additional info:
This request was evaluated by Red Hat Product Management for inclusion in Red Hat Enterprise Linux 5.7 and Red Hat does not plan to fix this issue the currently developed update. Contact your manager or support representative in case you need to escalate this bug.
These two bugs can be easily fixed by modifying one condition in the file: /net/ipv6/addrconf.c, function void addrconf_dad_failure(struct inet6_ifaddr *ifp), around line 1436: if (idev->cnf.accept_dad >= 1 && !idev->cnf.disable_ipv6) {
I don't understand the point of the last packet being sent. It's not related to the NUT's address fe80::baac:6fff:fe3e:6387 on which DAD is being performed on.
All of the bugs boil down to RFC 4862 5.4.5, which states: If the address is a link-local address formed from an interface identifier based on the hardware address, which is supposed to be uniquely assigned (e.g., EUI-64 for an Ethernet interface), IP operation on the interface SHOULD be disabled. As it is "SHOULD", the implementation may choose to behave differently if there is a good reason. In case of Linux, the default behavior is not to stop IPv6 on the interface. To behave accordingly to this clause, the administrator has to set accept_dad sysctl to 2: sysctl net.ipv6.conf.eth0.accept_dad=2 I believe this should fix the problem. Could you please retest with this setting applied (probably for all interfaces)?
*** Bug 705298 has been marked as a duplicate of this bug. ***
*** Bug 705300 has been marked as a duplicate of this bug. ***
*** Bug 705303 has been marked as a duplicate of this bug. ***
*** Bug 705304 has been marked as a duplicate of this bug. ***
*** Bug 705311 has been marked as a duplicate of this bug. ***
Release RHEL5.7 is passed with net.ipv6.conf.default.accept_dad = 2 The description: http://home.englab.nay.redhat.com/~zhpeng/Self_Test_5-0-0-Router-RHEL5.7-release/addr.p2/LLA_DAD_NSPostDAD_SameDstSameTgt.html The test log: http://home.englab.nay.redhat.com/~zhpeng/Self_Test_5-0-0-Router-RHEL5.7-release/addr.p2/3.html The tcpdump file: http://home.englab.nay.redhat.com/~zhpeng/Self_Test_5-0-0-Router-RHEL5.7-release/addr.p2/3_html_Link0.pcap and http://home.englab.nay.redhat.com/~zhpeng/Self_Test_5-0-0-Router-RHEL5.7-release/addr.p2/3_html_Link1.pcap
Thanks. Closing, then.