When system is under heavy loading, the __nfulnl_send() may may failed to put nlmsg into skbuf of nfulnl_instance. If not clear the skbuff on failed, the __nfulnl_send() will still try to put next nlmsg onto this half-full skbuf and cause the user program can never receive packet. This patch fix this issue by releasing skbuf immediately after nlmst put failed. Signed-off-by: Houcheng Lin <houcheng@xxxxxxxxx> --- net/netfilter/nfnetlink_log.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/net/netfilter/nfnetlink_log.c b/net/netfilter/nfnetlink_log.c index a11c5ff..0cb9ede 100644 --- a/net/netfilter/nfnetlink_log.c +++ b/net/netfilter/nfnetlink_log.c @@ -358,10 +358,9 @@ __nfulnl_send(struct nfulnl_instance *inst) } status = nfnetlink_unicast(inst->skb, inst->net, inst->peer_portid, MSG_DONTWAIT); - +out: inst->qlen = 0; inst->skb = NULL; -out: return status; } -- 1.7.9.5 -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html