Commit-ID: 97acec7df172cd1e450f81f5e293c0aa145a2797
Gitweb: https://git.kernel.org/tip/97acec7df172cd1e450f81f5e293c0aa145a2797
Author: Shawn Landden
AuthorDate: Sat, 18 May 2019 15:32:38 -0300
Committer: Arnaldo Carvalho de Melo
CommitDate: Tue, 28 May 2019 09:49:03 -0300
perf data
On Tue, May 28, 2019 at 8:04 AM Arnaldo Carvalho de Melo
wrote:
>
> Em Mon, May 27, 2019 at 05:46:26PM -0500, Shawn Landden escreveu:
> > On Mon, May 27, 2019 at 5:38 PM Arnaldo Carvalho de Melo
> > wrote:
> > >
> > > From: Shawn Landden
> > >
&g
On Mon, May 27, 2019 at 5:38 PM Arnaldo Carvalho de Melo
wrote:
>
> From: Shawn Landden
>
> This strncat() is safe because the buffer was allocated with zalloc(),
> however gcc doesn't know that. Since the string always has 4 non-null
> bytes, just use memcpy() here.
>
>
this linuxppc-dev didn't seem to accept it.
Buglink: https://bugzilla.kernel.org/show_bug.cgi?id=203571
Signed-off-by: Shawn Landden
---
arch/powerpc/include/asm/simd.h | 15 +++
1 file changed, 15 insertions(+)
create mode 100644 arch/powerpc/include/asm/simd.h
diff --git a/arch/powerpc
://bugzilla.kernel.org/show_bug.cgi?id=203571
Signed-off-by: Shawn Landden
---
arch/powerpc/include/asm/simd.h | 15 +++
1 file changed, 15 insertions(+)
create mode 100644 arch/powerpc/include/asm/simd.h
diff --git a/arch/powerpc/include/asm/simd.h b/arch/powerpc/include/asm/simd.h
new file mode
in the future with this interface.
EAGAIN: If COPY_FILE_RANGE_FILESIZE was passed and len is not 0
or the file size.
Signed-off-by: Shawn Landden
CC:
---
fs/read_write.c | 14 +-
include/uapi/linux/stat.h | 4
2 files changed, 17 insertions(+), 1 deletion(-)
diff
in the future with this interface.
EAGAIN: If COPY_FILE_RANGE_FILESIZE was passed and len is not 0
or the file size.
Signed-off-by: Shawn Landden
CC:
---
fs/read_write.c | 14 +-
include/uapi/linux/stat.h | 4
2 files changed, 17 insertions(+), 1 deletion(-)
diff
On Mon, Nov 20, 2017 at 9:16 PM, Shawn Landden <sland...@gmail.com> wrote:
> See my systemd patch: https://github.com/shawnl/systemd/tree/prctl
>
> Android uses this memory model for all programs, and having it in the
> kernel will enable integration with the page cache (no
On Mon, Nov 20, 2017 at 9:16 PM, Shawn Landden wrote:
> See my systemd patch: https://github.com/shawnl/systemd/tree/prctl
>
> Android uses this memory model for all programs, and having it in the
> kernel will enable integration with the page cache (not in this
> series).
Wh
See my systemd patch: https://github.com/shawnl/systemd/tree/prctl
Android uses this memory model for all programs, and having it in the
kernel will enable integration with the page cache (not in this
series).
v2
switch to prctl, memcg support
v3
use
put OOM after constraint checking
v4
See my systemd patch: https://github.com/shawnl/systemd/tree/prctl
Android uses this memory model for all programs, and having it in the
kernel will enable integration with the page cache (not in this
series).
v2
switch to prctl, memcg support
v3
use
put OOM after constraint checking
v4
On Mon, Nov 20, 2017 at 8:49 PM, Shawn Landden <sland...@gmail.com> wrote:
> See my systemd patch: https://github.com/shawnl/systemd/tree/prctl
>
> Android uses this memory model for all programs, and having it in the
> kernel will enable integration with the page cache (no
On Mon, Nov 20, 2017 at 8:49 PM, Shawn Landden wrote:
> See my systemd patch: https://github.com/shawnl/systemd/tree/prctl
>
> Android uses this memory model for all programs, and having it in the
> kernel will enable integration with the page cache (not in this
> series).
See my systemd patch: https://github.com/shawnl/systemd/tree/prctl
Android uses this memory model for all programs, and having it in the
kernel will enable integration with the page cache (not in this
series).
v2
switch to prctl, memcg support
v3
use
put OOM after constraint checking
---
See my systemd patch: https://github.com/shawnl/systemd/tree/prctl
Android uses this memory model for all programs, and having it in the
kernel will enable integration with the page cache (not in this
series).
v2
switch to prctl, memcg support
v3
use
put OOM after constraint checking
---
On Mon, Nov 20, 2017 at 12:35 AM, Michal Hocko <mho...@kernel.org> wrote:
> On Fri 17-11-17 20:45:03, Shawn Landden wrote:
>> On Fri, Nov 3, 2017 at 2:09 AM, Michal Hocko <mho...@kernel.org> wrote:
>>
>> > On Thu 02-11-17 23:35:44, Shawn Landden wro
On Mon, Nov 20, 2017 at 12:35 AM, Michal Hocko wrote:
> On Fri 17-11-17 20:45:03, Shawn Landden wrote:
>> On Fri, Nov 3, 2017 at 2:09 AM, Michal Hocko wrote:
>>
>> > On Thu 02-11-17 23:35:44, Shawn Landden wrote:
>> > > It is common for services to be st
On Fri, Nov 3, 2017 at 2:09 AM, Michal Hocko <mho...@kernel.org> wrote:
> On Thu 02-11-17 23:35:44, Shawn Landden wrote:
>> 16 bytes per process is kinda spendy, but I want to keep
>> lru behavior, which mem_score_adj does not allow. When a supervisor,
>> like Android's
On Fri, Nov 3, 2017 at 2:09 AM, Michal Hocko wrote:
> On Thu 02-11-17 23:35:44, Shawn Landden wrote:
>> 16 bytes per process is kinda spendy, but I want to keep
>> lru behavior, which mem_score_adj does not allow. When a supervisor,
>> like Android's user input is keeping t
It is common for services to be stateless around their main event loop.
If a process sets PR_SET_IDLE to PR_IDLE_MODE_KILLME then it
signals to the kernel that epoll_wait() and friends may not complete,
and the kernel may send SIGKILL if resources get tight.
See my systemd patch:
It is common for services to be stateless around their main event loop.
If a process sets PR_SET_IDLE to PR_IDLE_MODE_KILLME then it
signals to the kernel that epoll_wait() and friends may not complete,
and the kernel may send SIGKILL if resources get tight.
See my systemd patch:
It is common for services to be stateless around their main event loop.
If a process passes the EPOLL_KILLME flag to epoll_wait5() then it
signals to the kernel that epoll_wait5() may not complete, and the kernel
may send SIGKILL if resources get tight.
See my systemd patch:
It is common for services to be stateless around their main event loop.
If a process passes the EPOLL_KILLME flag to epoll_wait5() then it
signals to the kernel that epoll_wait5() may not complete, and the kernel
may send SIGKILL if resources get tight.
See my systemd patch:
| pos: 0
| flags:02004002
| clockid: 0
| ticks:6
Cc: Thomas Gleixner
Cc: Alexander Viro
Signed-off-by: Shawn Landden
---
fs/timerfd.c | 64
1 file changed, 64 insertions(+)
diff --git a/fs/timerfd.c b/fs
| pos: 0
| flags:02004002
| clockid: 0
| ticks:6
Cc: Thomas Gleixner t...@linutronix.de
Cc: Alexander Viro v...@zeniv.linux.org.uk
Signed-off-by: Shawn Landden sh...@churchofgit.com
---
fs/timerfd.c | 64
1 file
| pos: 0
| flags:02004002
| clockid: 0
Cc: Thomas Gleixner
Cc: Alexander Viro
Signed-off-by: Shawn Landden
---
fs/timerfd.c | 17 +
1 file changed, 17 insertions(+)
diff --git a/fs/timerfd.c b/fs/timerfd.c
index 9293121..e5fa587 100644
--- a/fs/timerfd.c
+++ b
| pos: 0
| flags:02004002
| clockid: 0
Cc: Thomas Gleixner t...@linutronix.de
Cc: Alexander Viro v...@zeniv.linux.org.uk
Signed-off-by: Shawn Landden sh...@churchofgit.com
---
fs/timerfd.c | 17 +
1 file changed, 17 insertions(+)
diff --git a/fs/timerfd.c b/fs
Also print out a notice when sysrq is in selective mode.
Signed-off-by: Shawn Landden
---
drivers/tty/sysrq.c | 7 ++-
1 file changed, 6 insertions(+), 1 deletion(-)
diff --git a/drivers/tty/sysrq.c b/drivers/tty/sysrq.c
index ce396ec..4eee0e4 100644
--- a/drivers/tty/sysrq.c
+++ b/drivers
Also print out a notice when sysrq is in selective mode.
Signed-off-by: Shawn Landden sh...@churchofgit.com
---
drivers/tty/sysrq.c | 7 ++-
1 file changed, 6 insertions(+), 1 deletion(-)
diff --git a/drivers/tty/sysrq.c b/drivers/tty/sysrq.c
index ce396ec..4eee0e4 100644
--- a/drivers/tty
On Mon, Nov 25, 2013 at 7:36 AM, Shawn Landden wrote:
> Commit 35f9c09fe (tcp: tcp_sendpages() should call tcp_push() once)
> added an internal flag MSG_SENDPAGE_NOTLAST, similar to
> MSG_MORE.
>
> algif_hash, algif_skcipher, and udp used MSG_MORE from tcp_sendpages()
> and n
On Mon, Nov 25, 2013 at 12:05 PM, Mateusz Guzik wrote:
> On Mon, Nov 25, 2013 at 11:53:24AM -0800, Shawn Landden wrote:
>> On Mon, Nov 25, 2013 at 10:05 AM, Jason Baron wrote:
>> > On 11/22/2013 12:53 PM, Shawn Landden wrote:
>> >> Hello, when running the attached p
On Mon, Nov 25, 2013 at 10:05 AM, Jason Baron wrote:
> On 11/22/2013 12:53 PM, Shawn Landden wrote:
>> Hello, when running the attached program on 3.12 child processes
>> are missing a socket fd opened, set with SO_REUSEPORT, listen()ed to,
>> and added to epoll_ctl().
>&
On Mon, Nov 25, 2013 at 10:05 AM, Jason Baron jba...@akamai.com wrote:
On 11/22/2013 12:53 PM, Shawn Landden wrote:
Hello, when running the attached program on 3.12 child processes
are missing a socket fd opened, set with SO_REUSEPORT, listen()ed to,
and added to epoll_ctl
On Mon, Nov 25, 2013 at 12:05 PM, Mateusz Guzik mgu...@redhat.com wrote:
On Mon, Nov 25, 2013 at 11:53:24AM -0800, Shawn Landden wrote:
On Mon, Nov 25, 2013 at 10:05 AM, Jason Baron jba...@akamai.com wrote:
On 11/22/2013 12:53 PM, Shawn Landden wrote:
Hello, when running the attached program
On Mon, Nov 25, 2013 at 7:36 AM, Shawn Landden sh...@churchofgit.com wrote:
Commit 35f9c09fe (tcp: tcp_sendpages() should call tcp_push() once)
added an internal flag MSG_SENDPAGE_NOTLAST, similar to
MSG_MORE.
algif_hash, algif_skcipher, and udp used MSG_MORE from tcp_sendpages()
and need
: also fix udp
Cc: Tom Herbert
Cc: Eric Dumazet
Cc: David S. Miller
Cc: # 3.4.x + 3.2.x
Reported-and-tested-by: Shawn Landden
Original-patch: Richard Weinberger
Signed-off-by: Shawn Landden
---
crypto/algif_hash.c | 3 +++
crypto/algif_skcipher.c | 3 +++
net/ipv4/udp.c | 3
Herbert
Cc: Eric Dumazet
Cc: David S. Miller
Cc: # 3.4.x + 3.2.x
Reported-and-tested-by: Shawn Landden
Original-patch: Richard Weinberger
Signed-off-by: Shawn Landden
---
crypto/algif_hash.c | 3 +++
crypto/algif_skcipher.c | 3 +++
2 files changed, 6 insertions(+)
diff --git a/crypto
algif_hash and algif_skcipher used MSG_MORE from tcp_sendpages()
and need to see the new flag as identical to MSG_MORE.
This fixes sendfile() on AF_ALG.
Cc: Tom Herbert
Cc: Eric Dumazet
Cc: David S. Miller
Cc: # 3.4.x + 3.2.x
Reported-and-tested-by: Shawn Landden
Original-patch: Richard
is also set if we set MSG_SENDPAGE_NOTLAST.
>> Otherwise users that check against MSG_MORE will not see it.
>>
>> This fixes sendfile() on AF_ALG.
>>
>> Cc: Tom Herbert
>> Cc: Eric Dumazet
>> Cc: David S. Miller
>> Cc: # 3.4.x
>> Reported-and-te
heck against MSG_MORE will not see it.
>
> This fixes sendfile() on AF_ALG.
>
> Cc: Tom Herbert
> Cc: Eric Dumazet
> Cc: David S. Miller
> Cc: # 3.4.x
The offending commit also got backported to the 3.2 stable kernel, so
we need this fix there as well.
---
Shawn Landd
@debian-T61:~/git/test$ ./connman_afalg /bin/true
send 27080 bytes
recv 20 bytes
45384483cf9cd0d82eba164131795b4807c6d39d /bin/true
shawn@debian-T61:~/git/test$ sha1sum /bin/true
82667ba2ec681d8e55b0ee3b6db2970f9911680d /bin/true
On Sun, Nov 24, 2013 at 2:00 PM, Shawn Landden wrote:
> he
heres a version of the test case that builds.
Sorry about that.
On Sun, Nov 24, 2013 at 9:21 AM, Shawn Landden wrote:
> If I use sendfile() to send to a accept()ed AF_ALG socket set up for
> "hash", I get the wrong
> answer, if I read() and then write() I get the
If I use sendfile() to send to a accept()ed AF_ALG socket set up for
"hash", I get the wrong
answer, if I read() and then write() I get the right answer. None of
the system calls return an error.
test case attached.
--
---
Shawn Landden
+1 360 389 3001 (SMS preferred)
#include
If I use sendfile() to send to a accept()ed AF_ALG socket set up for
"hash", I get the wrong
answer, if I read() and then write() I get the right answer. None of
the system calls return an error.
---
Shawn Landden
+1 360 389 3001 (SMS preferred)
--
To unsubscribe from this list: sen
If I use sendfile() to send to a accept()ed AF_ALG socket set up for
hash, I get the wrong
answer, if I read() and then write() I get the right answer. None of
the system calls return an error.
---
Shawn Landden
+1 360 389 3001 (SMS preferred)
--
To unsubscribe from this list: send the line
If I use sendfile() to send to a accept()ed AF_ALG socket set up for
hash, I get the wrong
answer, if I read() and then write() I get the right answer. None of
the system calls return an error.
test case attached.
--
---
Shawn Landden
+1 360 389 3001 (SMS preferred)
#include sys/sendfile.h
heres a version of the test case that builds.
Sorry about that.
On Sun, Nov 24, 2013 at 9:21 AM, Shawn Landden shawnland...@gmail.com wrote:
If I use sendfile() to send to a accept()ed AF_ALG socket set up for
hash, I get the wrong
answer, if I read() and then write() I get the right
@debian-T61:~/git/test$ ./connman_afalg /bin/true
send 27080 bytes
recv 20 bytes
45384483cf9cd0d82eba164131795b4807c6d39d /bin/true
shawn@debian-T61:~/git/test$ sha1sum /bin/true
82667ba2ec681d8e55b0ee3b6db2970f9911680d /bin/true
On Sun, Nov 24, 2013 at 2:00 PM, Shawn Landden shawnland...@gmail.com
this fix there as well.
---
Shawn Landden
+1 360 389 3001 (SMS preferred)
--
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http
-and-tested-by: Shawn Landden shawnland...@gmail.com
Signed-off-by: Richard Weinberger rich...@nod.at
---
fs/splice.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/fs/splice.c b/fs/splice.c
index 3b7ee65..b93f1b8 100644
--- a/fs/splice.c
+++ b/fs/splice.c
@@ -701,7 +701,7
# 3.4.x + 3.2.x
Reported-and-tested-by: Shawn Landden shawnland...@gmail.com
Original-patch: Richard Weinberger rich...@nod.at
Signed-off-by: Shawn Landden sh...@churchofgit.com
---
crypto/algif_hash.c | 3 +++
crypto/algif_skcipher.c | 3 +++
2 files changed, 6 insertions(+)
diff --git
Herbert therb...@google.com
Cc: Eric Dumazet eric.duma...@gmail.com
Cc: David S. Miller da...@davemloft.net
Cc: sta...@vger.kernel.org # 3.4.x + 3.2.x
Reported-and-tested-by: Shawn Landden shawnland...@gmail.com
Original-patch: Richard Weinberger rich...@nod.at
Signed-off-by: Shawn Landden sh
: also fix udp
Cc: Tom Herbert therb...@google.com
Cc: Eric Dumazet eric.duma...@gmail.com
Cc: David S. Miller da...@davemloft.net
Cc: sta...@vger.kernel.org # 3.4.x + 3.2.x
Reported-and-tested-by: Shawn Landden shawnland...@gmail.com
Original-patch: Richard Weinberger rich...@nod.at
Signed-off
turns successfully
--
---
Shawn Landden
+1 360 389 3001 (SMS preferred)
#include
#include
#include
#include
#include
#include
#include
int main( int argc, char *argv[]) {
int sockfd, epollfd, acceptfd, portno;
struct epoll_event event = {EPOLLIN, NULL}, gotevent;
char b
successfully
--
---
Shawn Landden
+1 360 389 3001 (SMS preferred)
#include stdio.h
#include sys/types.h
#include sys/socket.h
#include netinet/in.h
#include stdlib.h
#include string.h
#include sys/epoll.h
int main( int argc, char *argv[]) {
int sockfd, epollfd, acceptfd, portno
55 matches
Mail list logo