From nobody Wed Dec 4 08:42:32 2024 Received: from mail-pj1-f53.google.com (mail-pj1-f53.google.com [209.85.216.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 3A1C022318; Wed, 20 Nov 2024 09:51:24 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.216.53 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1732096286; cv=none; b=kfOhZCA1CpIf0TvxE8FOeDOGVOdFSvzg77xpnBsDWrDxloCcWzoYK/jSYA1CcPxWlMRSFmni3oyMJehwHwIJw0KqiRbEI3A/PPdkEA0iZIFP6AJBfyjhnhvQ96W0BLL4s/YlB/1yFbNcxJ4vn/yj02pK1sjtCW7EWRkW8cHYhn4= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1732096286; c=relaxed/simple; bh=bdfVzDHS0RbRycCkztXr8m9XUd8atXqb0RSeP6dHbQw=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=iPOYIsnoIicGtHzU4PRcimyxOMVOjB+gMPD3TsUfpr1w93sjuW8XmBefb5jGqcckEBHfV/axOSBY2kqaBBV4wmVH6I655/nLZ7tgWT+A0b4ZL4WY2gc7wcQ94UA9/bRK4oTbjGiGKEl8oFv4jSteG+o0jZC+fXmtJ2uiItU2/pA= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=DWTyx4ip; arc=none smtp.client-ip=209.85.216.53 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="DWTyx4ip" Received: by mail-pj1-f53.google.com with SMTP id 98e67ed59e1d1-2ea527ae14aso1428924a91.1; Wed, 20 Nov 2024 01:51:24 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1732096284; x=1732701084; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=A07EaYUYVSyppCmn+wLYtsIPbMP3vR19wbpnU2pl6Qo=; b=DWTyx4ipI3x7LchB9k5UQpdTtwosEI9hODAkq1q03CQrqEQSBFv1TDMFgsN1o2fe35 K9SNRgS7d+oNPxTJ2Ra4LLz+kyVKwLvczSOMgjq224P2+XTmyLpWwy37jGJDrUuWmz/F n76y4yYK00qP3rN+gSe5aIvVwbBeqoH8ABmaqZYxu73HdGTyT3rfDU3CqRpLfhSDKNcX wxlnWXC/ABPAO3fwa6DbhEhsVYt27LrHh5onujCkfbMGwcMWROS1dA+HMZ+ejFhITPCY WGCcIXV1jlsvk1DqMePhYmceSCv84BYRXZaT0gQjxANsaLnlRDgz51ZLklElLhdvEGMn oWLQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1732096284; x=1732701084; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=A07EaYUYVSyppCmn+wLYtsIPbMP3vR19wbpnU2pl6Qo=; b=Yz9LSWGONdud4Tgou4CgPl/ULh56uVAc2Y9dP7YUJrUZZqIcsijIJKz7GVKoz8It8E RrKZAMuy45EubrmqKGicpFHNl01zE4Lr1xEYoQY9u4+NdKaTlZEM5Pnkg4DdfN/Kjsf4 IkjXMmEK5tOYtw+IjvLW0HRt+wXquAK8FBhBgPxM1iAZPVabPx0iLPz3Dos7s534cPa1 Ig8K+9RX4xLIYSyCiSRIAxMCiQ4qVSFLd6ba1UvxTV/ggGCB9J6tlWqJrXzUFlYLUfYg SXqgSVA01TiLOLyefWBvRdwX3NeilVIFeUBG//kZGPhuPXhU1xqVNNkuiiYBPF3RZKJD zGlw== X-Forwarded-Encrypted: i=1; AJvYcCVEtNYJaXyO5j0rJi+VGXhmTuSQfwrOxBf1cc9r/6GlAz73rIlXB0z/GUcFobtVbuKkG6+VDsdzgdbEmWDrOqgR@vger.kernel.org, AJvYcCW/NBzY6iuB/qSBtomQEqkI/25OuX4K1cpXkAeMj/Wi6CsT8y1+20BCfMyR/qmYuo81bOUiX8spOQR2/34=@vger.kernel.org X-Gm-Message-State: AOJu0YzC5mydTPlQfI78WrH6fkB1UbA8PAJRTGv5oLzw8ODQtF3xHkMS axTDTL4f9Qb3lvLL4MvGYxYxuP6hMsFnfdl0t7RxeuavFFAhWtccX1g/CVK+rNY= X-Gm-Gg: ASbGncsaVR1D9+0Q6T6NzLPGx6qQtXbrcFY5V3+WZEeGcBgcUcUx00mI6sCoq6TSKcc vUXDdqHNELPoobcJB42HHyNZTOSYPlzUlXdgw03qXoz/XF8U1iMFbKfA6hrtZf1nGPD4u+PKQ7F sS69gdEExBmW2pB/uLR8ixetfu8f1iqPETFrTwF0uOBRzjAqaVMcr3LUy0FRimRnyKTx2PKLB2+ AgTpOA3haBQY3Kcfqk6tVSjjkxSILWrk44Q/RVN2NCgwFh/UWW+eGecMzd+Riuh08hkGA== X-Google-Smtp-Source: AGHT+IFepS+mMuTupRIh49Vx6oHoS69KSVeOFuVhduZ5zU6H1V56K/wHcjw/DeARYcqm82+rVERmlw== X-Received: by 2002:a17:90b:3c48:b0:2ea:95ac:54c6 with SMTP id 98e67ed59e1d1-2eaca74e933mr2131364a91.21.1732096284188; Wed, 20 Nov 2024 01:51:24 -0800 (PST) Received: from fedora.dns.podman ([43.228.180.230]) by smtp.gmail.com with ESMTPSA id 98e67ed59e1d1-2ead03de5bbsm887338a91.36.2024.11.20.01.51.18 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 Nov 2024 01:51:23 -0800 (PST) From: Hangbin Liu To: netdev@vger.kernel.org Cc: "David S. Miller" , David Ahern , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Simon Horman , Shuah Khan , Sam Edwards , =?UTF-8?q?Maciej=20=C5=BBenczykowski?= , Alex Henrie , linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, Hangbin Liu Subject: [PATCHv2 net 1/2] net/ipv6: delete temporary address if mngtmpaddr is removed or unmanaged Date: Wed, 20 Nov 2024 09:51:07 +0000 Message-ID: <20241120095108.199779-2-liuhangbin@gmail.com> X-Mailer: git-send-email 2.46.0 In-Reply-To: <20241120095108.199779-1-liuhangbin@gmail.com> References: <20241120095108.199779-1-liuhangbin@gmail.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable RFC8981 section 3.4 says that existing temporary addresses must have their lifetimes adjusted so that no temporary addresses should ever remain "valid" or "preferred" longer than the incoming SLAAC Prefix Information. This would strongly imply in Linux's case that if the "mngtmpaddr" address is deleted = or un-flagged as such, its corresponding temporary addresses must be cleared o= ut right away. But now the temporary address is renewed even after =E2=80=98mngtmpaddr=E2= =80=99 is removed or becomes unmanaged as manage_tempaddrs() set temporary addresses prefered/valid time to 0, and later in addrconf_verify_rtnl() all checkings failed to remove the addresses. Fix this by deleting the temporary address directly for these situations. Fixes: 778964f2fdf0 ("ipv6/addrconf: fix timing bug in tempaddr regen") Signed-off-by: Hangbin Liu Reviewed-by: David Ahern --- net/ipv6/addrconf.c | 41 +++++++++++++++++++++++++++++------------ 1 file changed, 29 insertions(+), 12 deletions(-) diff --git a/net/ipv6/addrconf.c b/net/ipv6/addrconf.c index 94dceac52884..01115e1a34cb 100644 --- a/net/ipv6/addrconf.c +++ b/net/ipv6/addrconf.c @@ -2570,6 +2570,24 @@ static struct inet6_dev *addrconf_add_dev(struct net= _device *dev) return idev; } =20 +static void delete_tempaddrs(struct inet6_dev *idev, + struct inet6_ifaddr *ifp) +{ + struct inet6_ifaddr *ift, *tmp; + + write_lock_bh(&idev->lock); + list_for_each_entry_safe(ift, tmp, &idev->tempaddr_list, tmp_list) { + if (ift->ifpub !=3D ifp) + continue; + + in6_ifa_hold(ift); + write_unlock_bh(&idev->lock); + ipv6_del_addr(ift); + write_lock_bh(&idev->lock); + } + write_unlock_bh(&idev->lock); +} + static void manage_tempaddrs(struct inet6_dev *idev, struct inet6_ifaddr *ifp, __u32 valid_lft, __u32 prefered_lft, @@ -3124,11 +3142,12 @@ static int inet6_addr_del(struct net *net, int ifin= dex, u32 ifa_flags, in6_ifa_hold(ifp); read_unlock_bh(&idev->lock); =20 - if (!(ifp->flags & IFA_F_TEMPORARY) && - (ifa_flags & IFA_F_MANAGETEMPADDR)) - manage_tempaddrs(idev, ifp, 0, 0, false, - jiffies); ipv6_del_addr(ifp); + + if (!(ifp->flags & IFA_F_TEMPORARY) && + (ifp->flags & IFA_F_MANAGETEMPADDR)) + delete_tempaddrs(idev, ifp); + addrconf_verify_rtnl(net); if (ipv6_addr_is_multicast(pfx)) { ipv6_mc_config(net->ipv6.mc_autojoin_sk, @@ -4952,14 +4971,12 @@ static int inet6_addr_modify(struct net *net, struc= t inet6_ifaddr *ifp, } =20 if (was_managetempaddr || ifp->flags & IFA_F_MANAGETEMPADDR) { - if (was_managetempaddr && - !(ifp->flags & IFA_F_MANAGETEMPADDR)) { - cfg->valid_lft =3D 0; - cfg->preferred_lft =3D 0; - } - manage_tempaddrs(ifp->idev, ifp, cfg->valid_lft, - cfg->preferred_lft, !was_managetempaddr, - jiffies); + if (was_managetempaddr && !(ifp->flags & IFA_F_MANAGETEMPADDR)) + delete_tempaddrs(ifp->idev, ifp); + else + manage_tempaddrs(ifp->idev, ifp, cfg->valid_lft, + cfg->preferred_lft, !was_managetempaddr, + jiffies); } =20 addrconf_verify_rtnl(net); --=20 2.46.0 From nobody Wed Dec 4 08:42:32 2024 Received: from mail-pj1-f44.google.com (mail-pj1-f44.google.com [209.85.216.44]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 7750522318; Wed, 20 Nov 2024 09:51:31 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.216.44 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1732096292; cv=none; b=hfog+KGuTVi8BRmdSKa3AhVxEVYJ45uDgU8u+HChoioUP9qt6AF/BUi7ct1GdlJ0P7Gj9/vXDRz4B5Bgb8GQRwyWGIiA67Q6rZJadO0VKFejKOtTrKq9yaDlypFoKNL6VQTIhB10sGx2qJdc7PdYTL+epRihgb5dBpNoZHtyAm8= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1732096292; c=relaxed/simple; bh=8z8AJHQyS+sNb/WQ/kGSKpaStwf+sD2vm0PLcfxamok=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=TW24X2Yj+iHpvUnl8QhvoXTCSY6eprFHzlmxfNr3/260Feym760AE5fADXDp/L/0uokM2oM+Ra4gBf2L8VPHAMvww3QK5ulyZMhLNKwNt5mhQfAljefAnsr7IYsA3wG0eGCSQvGewvMHsDCUaiHbnjQeAsVKSHvYfbwF5ej6yoE= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=CmGtNPKU; arc=none smtp.client-ip=209.85.216.44 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="CmGtNPKU" Received: by mail-pj1-f44.google.com with SMTP id 98e67ed59e1d1-2e91403950dso1422643a91.3; Wed, 20 Nov 2024 01:51:31 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1732096290; x=1732701090; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=03TQ/vc+VXYkzrjOICzyrRqCzY7ln3nnZ3S3zhacJQ0=; b=CmGtNPKUJfu0ClnEk5frNXGOH6FzgQ2Ams+PUgyIqySn+TMyTAPs7IPw2Wypg3Uh5H vq27R5TmECgXdHHzEZjDDzuV7jLsizrYs687YNrDFL0XKm8FEfWgZGqWqwCCERVFBhCi tysMi052soinPxo3KbOh+iIFo4my+oSSVm/E88Eu6f35Jxf1B04VJ7/q7TuSYQRCzTzk 19NUCV6qS9z+8ZNSHxN7rs73IPBz0WYiTX0UHY/79sRFzNqrisdGVDPb351QyMmevgxv 0X1iKfWXEqZbaS1Jeo4REahNgdipYmURg+3F88F2qIGxFhz6lmh5NHeSwx6Fx0tp+oZi 1B3Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1732096290; x=1732701090; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=03TQ/vc+VXYkzrjOICzyrRqCzY7ln3nnZ3S3zhacJQ0=; b=DZhCSg+qpi2EUEDO9i+lkonO+doTwd9pJ78Eo/LPeexaJIV+NK1nT3HQtwvGfcPFIn Uvx8eHfPP6x6HhnMbThiWVJHQb021Rt4CPD/Qmpw75ssLaAlwwLqqqrC4C+Uc2ehVKIu MJ85dKahXEWgdVIFsDF7o4kYjMacYCG3COVQBnx8UGivx2pufhzNeZ719HeM4n0VGI6j 2eFRyrYcjNhqSx3bz7a5BTbd4/5BAewR3k8uO91TV1O4Yyvyu0NXWlFWcvAxWvkaFCPx yVT+v3khZHGQimRdFatHIxDW2n+njXCVWvUprdh6PlWNnaqZj6+CvcqaqRqM/JcVOIxU dwbA== X-Forwarded-Encrypted: i=1; AJvYcCX2xROW8ZttMPAZmXpNCex2zCzRIxqYva8iG1CwVBKfBSAQIhErvU4x4+jyr9FlyyDoUaIt9yuZ+UkbIag=@vger.kernel.org, AJvYcCXJ0EjIt1rDN3Gp/ZKou9avOrGWpZZJK+0+s0vkB/toorb90pZovrWx0P+NCCQMuaIqKUv66SgsqYE1EncUa7x4@vger.kernel.org X-Gm-Message-State: AOJu0Yz4oiiYex+Bud4AEYaA4P0+uGJkdTVnTw/59b4K1uh2/hHCY/Ve zJLdJ+qoRoL6v0+lq4XodTRgrfPXlJgkVKpDqdZtcDAGSrjWKGcViiJmvxIVz2w= X-Gm-Gg: ASbGncsoN93dUJqQSJKgWNmUoJn2wdD5X5HeWYqGx6hgBvYGK0RgzPEIDGQ4v9NJnZc axsO4/rXawIcrOQ2t29xE8jnHFoIzO/RScpxklvbCVwNKlX2PDq0Y0C3ScKwYx9xTIz38M+Vjq9 7DxmAYFPV8emAygaI/ErUeCiZYdgW/gkXb/vr1cdl3epwFJC21+Cf5NbRcXOctQVWJHWEMK1k6V 7LNaLGzvhVP/AaaEbYsPIE0SyS0VLoaq5gdAuLm7gjv2paO4SlH17Ew4fN/cswMA4U3Xw== X-Google-Smtp-Source: AGHT+IE1vsmwPVlNhn+X8MM+4leTVObI2J9jlN2t6Zu6w72Yf49rvxUhGKEr/wz8xl8LK3mIPX1Vqg== X-Received: by 2002:a17:90b:3a84:b0:2ea:77d9:634d with SMTP id 98e67ed59e1d1-2eaca7448c4mr2596753a91.17.1732096290488; Wed, 20 Nov 2024 01:51:30 -0800 (PST) Received: from fedora.dns.podman ([43.228.180.230]) by smtp.gmail.com with ESMTPSA id 98e67ed59e1d1-2ead03de5bbsm887338a91.36.2024.11.20.01.51.24 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 Nov 2024 01:51:30 -0800 (PST) From: Hangbin Liu To: netdev@vger.kernel.org Cc: "David S. Miller" , David Ahern , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Simon Horman , Shuah Khan , Sam Edwards , =?UTF-8?q?Maciej=20=C5=BBenczykowski?= , Alex Henrie , linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, Hangbin Liu Subject: [PATCHv2 net 2/2] selftests/rtnetlink.sh: add mngtempaddr test Date: Wed, 20 Nov 2024 09:51:08 +0000 Message-ID: <20241120095108.199779-3-liuhangbin@gmail.com> X-Mailer: git-send-email 2.46.0 In-Reply-To: <20241120095108.199779-1-liuhangbin@gmail.com> References: <20241120095108.199779-1-liuhangbin@gmail.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Add a test to check the temporary address could be added/removed correctly when mngtempaddr is set or removed/unmanaged. Signed-off-by: Sam Edwards Signed-off-by: Hangbin Liu Reviewed-by: David Ahern --- tools/testing/selftests/net/rtnetlink.sh | 95 ++++++++++++++++++++++++ 1 file changed, 95 insertions(+) diff --git a/tools/testing/selftests/net/rtnetlink.sh b/tools/testing/selft= ests/net/rtnetlink.sh index bdf6f10d0558..b63053202524 100755 --- a/tools/testing/selftests/net/rtnetlink.sh +++ b/tools/testing/selftests/net/rtnetlink.sh @@ -29,6 +29,7 @@ ALL_TESTS=3D" kci_test_bridge_parent_id kci_test_address_proto kci_test_enslave_bonding + kci_test_mngtmpaddr " =20 devdummy=3D"test-dummy0" @@ -44,6 +45,7 @@ check_err() if [ $ret -eq 0 ]; then ret=3D$1 fi + [ -n "$2" ] && echo "$2" } =20 # same but inverted -- used when command must fail for test to pass @@ -1267,6 +1269,99 @@ kci_test_enslave_bonding() ip netns del "$testns" } =20 +# Called to validate the addresses on $IFNAME: +# +# 1. Every `temporary` address must have a matching `mngtmpaddr` +# 2. Every `mngtmpaddr` address must have some un`deprecated` `temporary` +# +# If the mngtmpaddr or tempaddr checking failed, return 0 and stop slowwait +validate_mngtmpaddr() +{ + local dev=3D$1 + local prefix=3D"" + local addr_list=3D$(ip -j -n $testns addr show dev ${dev}) + local temp_addrs=3D$(echo ${addr_list} | \ + jq -r '.[].addr_info[] | select(.temporary =3D=3D true) | .local') + local mng_prefixes=3D$(echo ${addr_list} | \ + jq -r '.[].addr_info[] | select(.mngtmpaddr =3D=3D true) | .local' | \ + cut -d: -f1-4 | tr '\n' ' ') + local undep_prefixes=3D$(echo ${addr_list} | \ + jq -r '.[].addr_info[] | select(.temporary =3D=3D true and .deprecated != =3D true) | .local' | \ + cut -d: -f1-4 | tr '\n' ' ') + + # 1. All temporary addresses (temp and dep) must have a matching mngtmpad= dr + for address in ${temp_addrs}; do + prefix=3D$(echo ${address} | cut -d: -f1-4) + if [[ ! " ${mng_prefixes} " =3D~ " $prefix " ]]; then + check_err 1 "FAIL: Temporary $address with no matching mngtmpaddr!"; + return 0 + fi + done + + # 2. All mngtmpaddr addresses must have a temporary address (not dep) + for prefix in ${mng_prefixes}; do + if [[ ! " ${undep_prefixes} " =3D~ " $prefix " ]]; then + check_err 1 "FAIL: No undeprecated temporary in $prefix!"; + return 0 + fi + done + + return 1 +} + +kci_test_mngtmpaddr() +{ + local ret=3D0 + + setup_ns testns + if [ $? -ne 0 ]; then + end_test "SKIP mngtmpaddr tests: cannot add net namespace $testns" + return $ksft_skip + fi + + # 1. Create a dummy Ethernet interface + run_cmd ip -n $testns link add ${devdummy} type dummy + run_cmd ip -n $testns link set ${devdummy} up + run_cmd ip netns exec $testns sysctl -w net.ipv6.conf.${devdummy}.use_tem= paddr=3D1 + run_cmd ip netns exec $testns sysctl -w net.ipv6.conf.${devdummy}.temp_pr= efered_lft=3D10 + run_cmd ip netns exec $testns sysctl -w net.ipv6.conf.${devdummy}.temp_va= lid_lft=3D25 + run_cmd ip netns exec $testns sysctl -w net.ipv6.conf.${devdummy}.max_des= ync_factor=3D1 + + # 2. Create several mngtmpaddr addresses on that interface. + # with temp_*_lft configured to be pretty short (10 and 35 seconds + # for prefer/valid respectively) + for i in $(seq 1 9); do + run_cmd ip -n $testns addr add 2001:db8:7e57:${i}::1/64 mngtmpaddr dev $= {devdummy} + done + + # 3. Confirm that a preferred temporary address exists for each mngtmpaddr + # address at all times, polling once per second for 30 seconds. + slowwait 30 validate_mngtmpaddr ${devdummy} + + # 4. Delete each mngtmpaddr address, one at a time (alternating between + # deleting and merely un-mngtmpaddr-ing), and confirm that the other + # mngtmpaddr addresses still have preferred temporaries. + for i in $(seq 1 9); do + (( $i % 4 =3D=3D 0 )) && mng_flag=3D"mngtmpaddr" || mng_flag=3D"" + if (( $i % 2 =3D=3D 0 )); then + run_cmd ip -n $testns addr del 2001:db8:7e57:${i}::1/64 $mng_flag dev $= {devdummy} + else + run_cmd ip -n $testns addr change 2001:db8:7e57:${i}::1/64 dev ${devdum= my} + fi + # the temp addr should be deleted + validate_mngtmpaddr ${devdummy} + done + + if [ $ret -ne 0 ]; then + end_test "FAIL: mngtmpaddr add/remove incorrect" + else + end_test "PASS: mngtmpaddr add/remove correctly" + fi + + ip netns del "$testns" + return $ret +} + kci_test_rtnl() { local current_test --=20 2.46.0