mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git
synced 2024-12-29 01:02:08 +00:00
net: clarify SO_DEVMEM_DONTNEED behavior in documentation
Document new behavior when the number of frags passed is too big. Signed-off-by: Mina Almasry <almasrymina@google.com> Link: https://patch.msgid.link/20241107210331.3044434-2-almasrymina@google.com Signed-off-by: Jakub Kicinski <kuba@kernel.org>
This commit is contained in:
parent
f2685c00c3
commit
102d1404c3
@ -225,6 +225,15 @@ The user must ensure the tokens are returned to the kernel in a timely manner.
|
||||
Failure to do so will exhaust the limited dmabuf that is bound to the RX queue
|
||||
and will lead to packet drops.
|
||||
|
||||
The user must pass no more than 128 tokens, with no more than 1024 total frags
|
||||
among the token->token_count across all the tokens. If the user provides more
|
||||
than 1024 frags, the kernel will free up to 1024 frags and return early.
|
||||
|
||||
The kernel returns the number of actual frags freed. The number of frags freed
|
||||
can be less than the tokens provided by the user in case of:
|
||||
|
||||
(a) an internal kernel leak bug.
|
||||
(b) the user passed more than 1024 frags.
|
||||
|
||||
Implementation & Caveats
|
||||
========================
|
||||
|
Loading…
Reference in New Issue
Block a user