[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20171116095846.GB14616@1wt.eu>
Date: Thu, 16 Nov 2017 10:58:46 +0100
From: Willy Tarreau <w@....eu>
To: Sarah Newman <srn@...mr.com>
Cc: Nikolay Aleksandrov <nikolay@...ulusnetworks.com>,
netdev@...r.kernel.org, roopa <roopa@...ulusnetworks.com>
Subject: Re: [PATCH] net: bridge: add max_fdb_count
Hi Sarah,
On Thu, Nov 16, 2017 at 01:20:18AM -0800, Sarah Newman wrote:
> I note that anyone who would run up against a too-low limit on the maximum
> number of fdb entries would also be savvy enough to fix it in a matter of
> minutes.
I disagree on this point. There's a huge difference between experiencing
sudden breakage under normal conditions due to arbitrary limits being set
and being down because of an attack. While the latter is not desirable,
it's much more easily accepted and most often requires operations anyway.
The former is never an option.
And I continue to think that the default behaviour once the limit is reached
must not be to prevent new entries from being learned but to purge older
ones. At least it preserves normal operations.
But given the high CPU impact you reported for a very low load, definitely
something needs to be done.
> They could also default the limit to U32_MAX in their particular
> distribution if it was a configuration option.
Well, I'd say that we don't have a default limit on the socket number either
and that it happens to be the expected behaviour. It's almost impossible to
find a suitable limit for everyone. People dealing with regular loads never
read docs and get caught. People working in hostile environments are always
more careful and will ensure that their limits are properly set.
> At the moment there is not even a single log message if the problem doesn't
> result in memory exhaustion.
This probably needs to be addressed as well!
Regards,
Willy
Powered by blists - more mailing lists