diff options
author | Hannes Frederic Sowa <hannes@stressinduktion.org> | 2013-09-21 06:32:34 +0200 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2013-09-26 13:46:10 -0400 |
commit | 4ed377e36ec2f385484d12e516faf88516fad31c (patch) | |
tree | 14e4f6cc36ad9f39bb03573b025a7c1e39b52bff /net/core/neighbour.c | |
parent | fd97ba5d5bf97d3dbca6f6fbbd3cad82eece60fd (diff) | |
download | linux-4ed377e36ec2f385484d12e516faf88516fad31c.tar.gz linux-4ed377e36ec2f385484d12e516faf88516fad31c.tar.bz2 linux-4ed377e36ec2f385484d12e516faf88516fad31c.zip |
net: neighbour: use source address of last enqueued packet for solicitation
Currently we always use the first member of the arp_queue to determine
the sender ip address of the arp packet (or in case of IPv6 - source
address of the ndisc packet). This skb is fixed as long as the queue is
not drained by a complete purge because of a timeout or by a successful
response.
If the first packet enqueued on the arp_queue is from a local application
with a manually set source address and the to be discovered system
does some kind of uRPF checks on the source address in the arp packet
the resolving process hangs until a timeout and restarts. This hurts
communication with the participating network node.
This could be mitigated a bit if we use the latest enqueued skb's
source address for the resolving process, which is not as static as
the arp_queue's head. This change of the source address could result in
better recovery of a failed solicitation.
Cc: "David S. Miller" <davem@davemloft.net>
Cc: Julian Anastasov <ja@ssi.bg>
Reviewed-by: Julian Anastasov <ja@ssi.bg>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/core/neighbour.c')
-rw-r--r-- | net/core/neighbour.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/net/core/neighbour.c b/net/core/neighbour.c index 6072610a8672..ca15f32821fb 100644 --- a/net/core/neighbour.c +++ b/net/core/neighbour.c @@ -867,7 +867,7 @@ static void neigh_invalidate(struct neighbour *neigh) static void neigh_probe(struct neighbour *neigh) __releases(neigh->lock) { - struct sk_buff *skb = skb_peek(&neigh->arp_queue); + struct sk_buff *skb = skb_peek_tail(&neigh->arp_queue); /* keep skb alive even if arp_queue overflows */ if (skb) skb = skb_copy(skb, GFP_ATOMIC); |