Summary: | kern.log flooded with "neighbour table overflow " | ||
---|---|---|---|
Product: | Gentoo Linux | Reporter: | Kim Nilsson <gentoo.bug> |
Component: | [OLD] Core system | Assignee: | Gentoo Kernel Bug Wranglers and Kernel Maintainers <kernel> |
Status: | RESOLVED TEST-REQUEST | ||
Severity: | normal | CC: | jakub |
Priority: | High | ||
Version: | 2006.0 | ||
Hardware: | x86 | ||
OS: | Linux | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- | |
Attachments: | Logs of various commands for checking network settings |
Description
Kim Nilsson
2006-07-29 21:50:59 UTC
Created attachment 93043 [details] Logs of various commands for checking network settings Same info is found here, in a more readable format: http://forums.gentoo.org/viewtopic-t-20204-highlight-neighbour+table+overflow.html I really fail to see the security impact here, re-assigning. You might want to set /proc/sys/net/ipv4/neigh/default/gc_thresh1 /proc/sys/net/ipv4/neigh/default/gc_thresh2 /proc/sys/net/ipv4/neigh/default/gc_thresh3 to some higher value in /etc/sysctl.conf (In reply to comment #2) > I really fail to see the security impact here, re-assigning. You might want to > set > > /proc/sys/net/ipv4/neigh/default/gc_thresh1 > /proc/sys/net/ipv4/neigh/default/gc_thresh2 > /proc/sys/net/ipv4/neigh/default/gc_thresh3 > > to some higher value in /etc/sysctl.conf Give those a go, if that doesn't fix the problem please supply further information (what sysctl values you used, for example and when the problem occurs) and reopen the bug. Thanks. |