[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20170623.133947.433422648753848462.davem@davemloft.net>
Date: Fri, 23 Jun 2017 13:39:47 -0400 (EDT)
From: David Miller <davem@...emloft.net>
To: julien@...sta.com
Cc: netdev@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH net-next 1/2] ipmr: restrict mroute "queue full"
warning to related error values
From: Julien Gomes <julien@...sta.com>
Date: Wed, 21 Jun 2017 10:58:10 -0700
> When sending a cache report on mroute_sk, mroute will emit a
> "pending queue full" warning for every error value returned by
> sock_queue_rcv_skb().
> This warning can be misleading, for example on the EPERM error value
> that sk_filter() can return.
>
> Restricting this warning to only ENOMEM or ENOBUFS seems more
> appropriate.
>
> Signed-off-by: Julien Gomes <julien@...sta.com>
Incorrect, no other error codes are possible.
We never attach a socket filter to these kernel internal sockets,
therefore sk_filter() is not even applicable in this analysis.
Therefore, -ENOBUFS and -ENOMEM are the only errors we can ever see
returned from sock_queue_rcv_skb().
This goes for your second patch as well.
Powered by blists - more mailing lists