lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 09 Mar 2022 06:20:12 +0000 From: patchwork-bot+netdevbpf@...nel.org To: Samuel Thibault <samuel.thibault@...ri.fr> Cc: davem@...emloft.net, kuba@...nel.org, willemdebruijn.kernel@...il.com, linux-kernel@...r.kernel.org, netdev@...r.kernel.org Subject: Re: [PATCHv2] SO_ZEROCOPY should return -EOPNOTSUPP rather than -ENOTSUPP Hello: This patch was applied to netdev/net-next.git (master) by Jakub Kicinski <kuba@...nel.org>: On Mon, 7 Mar 2022 23:31:26 +0100 you wrote: > ENOTSUPP is documented as "should never be seen by user programs", > and thus not exposed in <errno.h>, and thus applications cannot safely > check against it (they get "Unknown error 524" as strerror). We should > rather return the well-known -EOPNOTSUPP. > > This is similar to 2230a7ef5198 ("drop_monitor: Use correct error > code") and 4a5cdc604b9c ("net/tls: Fix return values to avoid > ENOTSUPP"), which did not seem to cause problems. > > [...] Here is the summary with links: - [PATCHv2] SO_ZEROCOPY should return -EOPNOTSUPP rather than -ENOTSUPP https://git.kernel.org/netdev/net-next/c/869420a8be19 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists