commit | f253c849c733489aa39df8039886ed1fd3101b37 | [log] [tgz] |
---|---|---|
author | Julius Werner <jwerner@chromium.org> | Thu Dec 20 14:52:30 2012 -0800 |
committer | ChromeBot <chrome-bot@google.com> | Wed Dec 26 18:35:23 2012 -0800 |
tree | 0d924960d445639cadd741f80283eb6d77b966dd | |
parent | 0818cca76b252080dc78f10e6c4c7c4580a226fc [diff] |
shill: Increase receive buffer size for RTNL socket We have seen some rare but nasty occurences of ENOBUFS errors on shill's RTNL socket. While it is hard to say how exactly those errors come to pass, we hope to be able to mitigate them by increasing the socket's receive buffer size. As an ancient kernel bug (http://marc.info/?m=134860874327843) currently makes it default to a low hard limit on receive buffer size, we need to leverage our root UID by using SO_RCVBUFFORCE. BUG=chromium-os:36328 TEST=None Change-Id: I5ac21e69d64a8e09a24b4c25152a51d61b5844e1 Signed-off-by: Julius Werner <jwerner@chromium.org> Reviewed-on: https://gerrit.chromium.org/gerrit/40042 Reviewed-by: Paul Stewart <pstew@chromium.org>