summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMike Manning <mmanning@brocade.com>2016-07-22 18:32:11 +0100
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2016-08-16 09:33:16 +0200
commitf59c73b9b368d20f12b6687cc5173cd9a6f6842b (patch)
tree50af1e52c7761e090c752c03b5455feeb808d995
parent43b90d5fe8694d8cfb2e69a72a190d94e24b0d6f (diff)
downloadlinux-stable-f59c73b9b368d20f12b6687cc5173cd9a6f6842b.tar.gz
linux-stable-f59c73b9b368d20f12b6687cc5173cd9a6f6842b.tar.bz2
linux-stable-f59c73b9b368d20f12b6687cc5173cd9a6f6842b.zip
net: ipv6: Always leave anycast and multicast groups on link down
[ Upstream commit ea06f7176413e2538d13bb85b65387d0917943d9 ] Default kernel behavior is to delete IPv6 addresses on link down, which entails deletion of the multicast and the subnet-router anycast addresses. These deletions do not happen with sysctl setting to keep global IPv6 addresses on link down, so every link down/up causes an increment of the anycast and multicast refcounts. These bogus refcounts may stop these addrs from being removed on subsequent calls to delete them. The solution is to leave the groups for the multicast and subnet anycast on link down for the callflow when global IPv6 addresses are kept. Fixes: f1705ec197e7 ("net: ipv6: Make address flushing on ifdown optional") Signed-off-by: Mike Manning <mmanning@brocade.com> Acked-by: David Ahern <dsa@cumulusnetworks.com> Signed-off-by: David S. Miller <davem@davemloft.net> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r--net/ipv6/addrconf.c4
1 files changed, 4 insertions, 0 deletions
diff --git a/net/ipv6/addrconf.c b/net/ipv6/addrconf.c
index 8ec4b3089e20..e3fc0cdf82a9 100644
--- a/net/ipv6/addrconf.c
+++ b/net/ipv6/addrconf.c
@@ -3563,6 +3563,10 @@ restart:
if (state != INET6_IFADDR_STATE_DEAD) {
__ipv6_ifa_notify(RTM_DELADDR, ifa);
inet6addr_notifier_call_chain(NETDEV_DOWN, ifa);
+ } else {
+ if (idev->cnf.forwarding)
+ addrconf_leave_anycast(ifa);
+ addrconf_leave_solict(ifa->idev, &ifa->addr);
}
write_lock_bh(&idev->lock);