lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAHUoWVk-AWekfmXrbY8PeZ2c9nzm6jyuE=orzd7Mxb8HiDuepQ@mail.gmail.com>
Date:	Tue, 25 Oct 2011 16:12:30 -0600
From:	Gabe Black <gabebblack@...il.com>
To:	linux-kernel@...r.kernel.org, netdev@...r.kernel.org
Subject: unres_qlen and arp resolution/cache behavior

Documentation about net.ipv4.neigh.*.unres_qlen seems to indicate that
it determines the number of frames that will be held while an arp is
being resolved.

Say packets start transmitting at a destination that needs to be (arp)
resolved.  If the number of backlogged packets exceeds the queue
length, then the frames are dropped (from what I understand).  My
question is what if the arp cached address expires and another arp is
issued.  Does the same scenario occur (i.e. packets are backlogged
until that arp returns)?  Or is the kernel smart enough to use the old
cached value until the arp returns, at which point it then uses the
updated address?

Thank you for your time,
Gabe
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ