bonding: assign random address if device address is same as bond
[ Upstream commit 5c3bf6cba7911f470afd748606be5c03a9512fcc ] This change addresses a MAC address conflict issue in failover scenarios, similar to the problem described in commita951bc1e6b
("bonding: correct the MAC address for 'follow' fail_over_mac policy"). In fail_over_mac=follow mode, the bonding driver expects the formerly active slave to swap MAC addresses with the newly active slave during failover. However, under certain conditions, two slaves may end up with the same MAC address, which breaks this policy: 1) ip link set eth0 master bond0 -> bond0 adopts eth0's MAC address (MAC0). 2) ip link set eth1 master bond0 -> eth1 is added as a backup with its own MAC (MAC1). 3) ip link set eth0 nomaster -> eth0 is released and restores its MAC (MAC0). -> eth1 becomes the active slave, and bond0 assigns MAC0 to eth1. 4) ip link set eth0 master bond0 -> eth0 is re-added to bond0, now both eth0 and eth1 have MAC0. This results in a MAC address conflict and violates the expected behavior of the failover policy. To fix this, we assign a random MAC address to any newly added slave if its current MAC address matches that of the bond. The original (permanent) MAC address is saved and will be restored when the device is released from the bond. This ensures that each slave has a unique MAC address during failover transitions, preserving the integrity of the fail_over_mac=follow policy. Fixes:3915c1e863
("bonding: Add "follow" option to fail_over_mac") Signed-off-by: Hangbin Liu <liuhangbin@gmail.com> Acked-by: Jay Vosburgh <jv@jvosburgh.net> Signed-off-by: David S. Miller <davem@davemloft.net> Signed-off-by: Sasha Levin <sashal@kernel.org>
This commit is contained in:
committed by
Greg Kroah-Hartman
parent
8fa998b842
commit
4b88a4dfbe
@@ -2040,14 +2040,25 @@ int bond_enslave(struct net_device *bond_dev, struct net_device *slave_dev,
|
||||
* set the master's mac address to that of the first slave
|
||||
*/
|
||||
memcpy(ss.__data, bond_dev->dev_addr, bond_dev->addr_len);
|
||||
} else if (bond->params.fail_over_mac == BOND_FOM_FOLLOW &&
|
||||
BOND_MODE(bond) == BOND_MODE_ACTIVEBACKUP &&
|
||||
memcmp(slave_dev->dev_addr, bond_dev->dev_addr, bond_dev->addr_len) == 0) {
|
||||
/* Set slave to random address to avoid duplicate mac
|
||||
* address in later fail over.
|
||||
*/
|
||||
eth_random_addr(ss.__data);
|
||||
} else {
|
||||
goto skip_mac_set;
|
||||
}
|
||||
|
||||
ss.ss_family = slave_dev->type;
|
||||
res = dev_set_mac_address(slave_dev, (struct sockaddr *)&ss,
|
||||
extack);
|
||||
res = dev_set_mac_address(slave_dev, (struct sockaddr *)&ss, extack);
|
||||
if (res) {
|
||||
slave_err(bond_dev, slave_dev, "Error %d calling set_mac_address\n", res);
|
||||
goto err_restore_mtu;
|
||||
}
|
||||
}
|
||||
|
||||
skip_mac_set:
|
||||
|
||||
/* set no_addrconf flag before open to prevent IPv6 addrconf */
|
||||
slave_dev->priv_flags |= IFF_NO_ADDRCONF;
|
||||
|
Reference in New Issue
Block a user