lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 12 Nov 2008 11:43:39 -0800 From: Ben Greear <greearb@...delatech.com> To: Patrick McHardy <kaber@...sh.net> CC: NetDev <netdev@...r.kernel.org> Subject: ARP table question I have 500 mac-vlans on a system talking to 500 other mac-vlans. My problem is that the arp-table gets extremely huge because every time an arp-request comes in on all mac-vlans, a stale arp entry is added for each mac-vlan. I have filtering turned on, but that doesn't help because the neigh_event_ns call below will cause a stale neighbor entry to be created regardless of whether a replay will be sent or not. Maybe the neigh_event code should be below the checks for dont_send, and only create check neigh_event_ns if we are !dont_send? This is the code I'm talking about, in arp.c (in kernel 2.6.25.15) if (arp->ar_op == htons(ARPOP_REQUEST) && ip_route_input(skb, tip, sip, 0, dev) == 0) { rt = (struct rtable*)skb->dst; addr_type = rt->rt_type; if (addr_type == RTN_LOCAL) { n = neigh_event_ns(&arp_tbl, sha, &sip, dev); int dont_send = 0; if (!dont_send) dont_send |= arp_ignore(in_dev,sip,tip); if (!dont_send && IN_DEV_ARPFILTER(in_dev)) dont_send |= arp_filter(sip,tip,dev); if (!dont_send) arp_send(ARPOP_REPLY,ETH_P_ARP,sip,dev,tip,sha,dev->dev_addr,sha); Thanks, Ben -- Ben Greear <greearb@...delatech.com> Candela Technologies Inc http://www.candelatech.com -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists