Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752450AbdFUR7I (ORCPT ); Wed, 21 Jun 2017 13:59:08 -0400 Received: from prod-mx.aristanetworks.com ([162.210.130.12]:29813 "EHLO prod-mx.aristanetworks.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751487AbdFUR67 (ORCPT ); Wed, 21 Jun 2017 13:58:59 -0400 From: Julien Gomes To: davem@davemloft.net Cc: netdev@vger.kernel.org, linux-kernel@vger.kernel.org, Julien Gomes Subject: [PATCH net-next 2/2] ip6mr: restrict mroute6 "queue full" warning to related error values Date: Wed, 21 Jun 2017 10:58:11 -0700 Message-Id: <20170621175811.16940-2-julien@arista.com> X-Mailer: git-send-email 2.13.1 In-Reply-To: <20170621175811.16940-1-julien@arista.com> References: <20170621175811.16940-1-julien@arista.com> Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 985 Lines: 30 When sending a cache report on mroute6_sk, mroute6 will emit a "pending queue full" warning for every error value returned by sock_queue_rcv_skb(). This warning can be misleading, for example on the EPERM error value that sk_filter() can return. Restricting this warning to only ENOMEM or ENOBUFS seems more appropriate. Signed-off-by: Julien Gomes --- net/ipv6/ip6mr.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/net/ipv6/ip6mr.c b/net/ipv6/ip6mr.c index 7454850f2098..62fe5fd64f22 100644 --- a/net/ipv6/ip6mr.c +++ b/net/ipv6/ip6mr.c @@ -1215,7 +1215,8 @@ static int ip6mr_cache_report(struct mr6_table *mrt, struct sk_buff *pkt, */ ret = sock_queue_rcv_skb(mrt->mroute6_sk, skb); if (ret < 0) { - net_warn_ratelimited("mroute6: pending queue full, dropping entries\n"); + if (ret == -ENOMEM || ret == -ENOBUFS) + net_warn_ratelimited("mroute6: pending queue full, dropping entries\n"); kfree_skb(skb); } -- 2.13.1