From mboxrd@z Thu Jan 1 00:00:00 1970 From: Cong Wang Subject: Re: [PATCH net-next v3 4/5] net/tc: introduce TC_ACT_REINJECT. Date: Tue, 24 Jul 2018 13:38:29 -0700 Message-ID: References: <3c20787be0fd5d64728ffed46ae0a7dff10d7e05.1532437050.git.pabeni@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Cc: Linux Kernel Network Developers , Jamal Hadi Salim , Jiri Pirko , Daniel Borkmann , Marcelo Ricardo Leitner , Eyal Birger , David Miller To: Paolo Abeni Return-path: Received: from mail-pf1-f195.google.com ([209.85.210.195]:39199 "EHLO mail-pf1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388643AbeGXVqx (ORCPT ); Tue, 24 Jul 2018 17:46:53 -0400 Received: by mail-pf1-f195.google.com with SMTP id j8-v6so1119288pff.6 for ; Tue, 24 Jul 2018 13:38:41 -0700 (PDT) In-Reply-To: <3c20787be0fd5d64728ffed46ae0a7dff10d7e05.1532437050.git.pabeni@redhat.com> Sender: netdev-owner@vger.kernel.org List-ID: On Tue, Jul 24, 2018 at 1:07 PM Paolo Abeni wrote: > +static inline void skb_tc_reinject(struct sk_buff *skb, struct tcf_result *res) > +{ > + struct gnet_stats_queue *stats = res->qstats; > + int ret; > + > + if (res->ingress) > + ret = netif_receive_skb(skb); > + else > + ret = dev_queue_xmit(skb); > + if (ret && stats) > + qstats_overlimit_inc(res->qstats); Why increasing overlimit? Overlimit is typically increased by traffic shapers to indicate there is no bandwidth to send out the packet. I fail to understand why overlimit is increased in your case here. I guess you want to increase 'drops' instead.