Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753322AbcK1R4y (ORCPT ); Mon, 28 Nov 2016 12:56:54 -0500 Received: from charlotte.tuxdriver.com ([70.61.120.58]:57262 "EHLO smtp.tuxdriver.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751515AbcK1R4p (ORCPT ); Mon, 28 Nov 2016 12:56:45 -0500 Date: Mon, 28 Nov 2016 12:56:26 -0500 From: Neil Horman To: Florian Westphal Cc: Marcelo Ricardo Leitner , Andrey Konovalov , Vlad Yasevich , linux-sctp@vger.kernel.org, netdev , LKML , Pablo Neira Ayuso , Patrick McHardy , Jozsef Kadlecsik , "David S. Miller" , netfilter-devel@vger.kernel.org, coreteam@netfilter.org, Dmitry Vyukov , Kostya Serebryany , Eric Dumazet , syzkaller Subject: Re: net/sctp: vmalloc allocation failure in sctp_setsockopt/xt_alloc_table_info Message-ID: <20161128175626.GD29839@hmsreliant.think-freely.org> References: <20161128141340.GA29839@hmsreliant.think-freely.org> <20161128143931.GB29839@hmsreliant.think-freely.org> <20161128151312.GA13172@localhost.localdomain> <20161128174647.GC29839@hmsreliant.think-freely.org> <20161128174710.GE28510@breakpoint.cc> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20161128174710.GE28510@breakpoint.cc> User-Agent: Mutt/1.7.1 (2016-10-04) X-Spam-Score: -2.9 (--) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1155 Lines: 26 On Mon, Nov 28, 2016 at 06:47:10PM +0100, Florian Westphal wrote: > Neil Horman wrote: > > I'm not sure I agree with that. Generally speaking it seems like the right > > thing to do, if you want to avoid filling logs with warnings, but this is the > > sort of error that is going to be accompanied by severe service interruption. > > I'd rather see a reason behind that in the logs, than just have it occur > > silently. > > Its not silent -- the setsockopt call will fail and userspace should > display an error. > Thats not true. If the OOM succedes in freeing enough memory to fulfill the request the setsockopt may complete without error, you're just left with a killed process...somewhere. Thats seems a bit dodgy to me Not saying it has to be a full stack trace, but some log annotation that shows the oom killer got invoked seems called for here Neil > So I agree with Marcelo, lets suppress the oom spew here. > -- > To unsubscribe from this list: send the line "unsubscribe linux-sctp" in > the body of a message to majordomo@vger.kernel.org > More majordomo info at http://vger.kernel.org/majordomo-info.html >