[tip:perf/urgent] perf data: Fix 'strncat may truncate' build failure with recent gcc

2019-05-28 Thread tip-bot for Shawn Landden
Commit-ID: 97acec7df172cd1e450f81f5e293c0aa145a2797 Gitweb: https://git.kernel.org/tip/97acec7df172cd1e450f81f5e293c0aa145a2797 Author: Shawn Landden AuthorDate: Sat, 18 May 2019 15:32:38 -0300 Committer: Arnaldo Carvalho de Melo CommitDate: Tue, 28 May 2019 09:49:03 -0300 perf data

Re: [PATCH 05/44] perf data: Fix 'strncat may truncate' build failure with recent gcc

2019-05-28 Thread Shawn Landden
On Tue, May 28, 2019 at 8:04 AM Arnaldo Carvalho de Melo wrote: > > Em Mon, May 27, 2019 at 05:46:26PM -0500, Shawn Landden escreveu: > > On Mon, May 27, 2019 at 5:38 PM Arnaldo Carvalho de Melo > > wrote: > > > > > > From: Shawn Landden > > > &g

Re: [PATCH 05/44] perf data: Fix 'strncat may truncate' build failure with recent gcc

2019-05-27 Thread Shawn Landden
On Mon, May 27, 2019 at 5:38 PM Arnaldo Carvalho de Melo wrote: > > From: Shawn Landden > > This strncat() is safe because the buffer was allocated with zalloc(), > however gcc doesn't know that. Since the string always has 4 non-null > bytes, just use memcpy() here. > >

[PATCH RESEND] powerpc: add simd.h implementation specific to PowerPC

2019-05-12 Thread Shawn Landden
this linuxppc-dev didn't seem to accept it. Buglink: https://bugzilla.kernel.org/show_bug.cgi?id=203571 Signed-off-by: Shawn Landden --- arch/powerpc/include/asm/simd.h | 15 +++ 1 file changed, 15 insertions(+) create mode 100644 arch/powerpc/include/asm/simd.h diff --git a/arch/powerpc

[PATCH] powerpc: add simd.h implementation specific to PowerPC

2019-05-12 Thread Shawn Landden
://bugzilla.kernel.org/show_bug.cgi?id=203571 Signed-off-by: Shawn Landden --- arch/powerpc/include/asm/simd.h | 15 +++ 1 file changed, 15 insertions(+) create mode 100644 arch/powerpc/include/asm/simd.h diff --git a/arch/powerpc/include/asm/simd.h b/arch/powerpc/include/asm/simd.h new file mode

[PATCH] new flag COPY_FILE_RANGE_FILESIZE for copy_file_range()

2019-04-13 Thread Shawn Landden
in the future with this interface. EAGAIN: If COPY_FILE_RANGE_FILESIZE was passed and len is not 0 or the file size. Signed-off-by: Shawn Landden CC: --- fs/read_write.c | 14 +- include/uapi/linux/stat.h | 4 2 files changed, 17 insertions(+), 1 deletion(-) diff

[PATCH] new flag COPY_FILE_RANGE_FILESIZE for copy_file_range()

2019-04-13 Thread Shawn Landden
in the future with this interface. EAGAIN: If COPY_FILE_RANGE_FILESIZE was passed and len is not 0 or the file size. Signed-off-by: Shawn Landden CC: --- fs/read_write.c | 14 +- include/uapi/linux/stat.h | 4 2 files changed, 17 insertions(+), 1 deletion(-) diff

Re: [RFC v4] It is common for services to be stateless around their main event loop. If a process sets PR_SET_IDLE to PR_IDLE_MODE_KILLME then it signals to the kernel that epoll_wait() and friends ma

2017-11-20 Thread Shawn Landden
On Mon, Nov 20, 2017 at 9:16 PM, Shawn Landden <sland...@gmail.com> wrote: > See my systemd patch: https://github.com/shawnl/systemd/tree/prctl > > Android uses this memory model for all programs, and having it in the > kernel will enable integration with the page cache (no

Re: [RFC v4] It is common for services to be stateless around their main event loop. If a process sets PR_SET_IDLE to PR_IDLE_MODE_KILLME then it signals to the kernel that epoll_wait() and friends ma

2017-11-20 Thread Shawn Landden
On Mon, Nov 20, 2017 at 9:16 PM, Shawn Landden wrote: > See my systemd patch: https://github.com/shawnl/systemd/tree/prctl > > Android uses this memory model for all programs, and having it in the > kernel will enable integration with the page cache (not in this > series). Wh

[RFC v4] It is common for services to be stateless around their main event loop. If a process sets PR_SET_IDLE to PR_IDLE_MODE_KILLME then it signals to the kernel that epoll_wait() and friends may no

2017-11-20 Thread Shawn Landden
See my systemd patch: https://github.com/shawnl/systemd/tree/prctl Android uses this memory model for all programs, and having it in the kernel will enable integration with the page cache (not in this series). v2 switch to prctl, memcg support v3 use put OOM after constraint checking v4

[RFC v4] It is common for services to be stateless around their main event loop. If a process sets PR_SET_IDLE to PR_IDLE_MODE_KILLME then it signals to the kernel that epoll_wait() and friends may no

2017-11-20 Thread Shawn Landden
See my systemd patch: https://github.com/shawnl/systemd/tree/prctl Android uses this memory model for all programs, and having it in the kernel will enable integration with the page cache (not in this series). v2 switch to prctl, memcg support v3 use put OOM after constraint checking v4

Re: [RFC v3] It is common for services to be stateless around their main event loop. If a process sets PR_SET_IDLE to PR_IDLE_MODE_KILLME then it signals to the kernel that epoll_wait() and friends ma

2017-11-20 Thread Shawn Landden
On Mon, Nov 20, 2017 at 8:49 PM, Shawn Landden <sland...@gmail.com> wrote: > See my systemd patch: https://github.com/shawnl/systemd/tree/prctl > > Android uses this memory model for all programs, and having it in the > kernel will enable integration with the page cache (no

Re: [RFC v3] It is common for services to be stateless around their main event loop. If a process sets PR_SET_IDLE to PR_IDLE_MODE_KILLME then it signals to the kernel that epoll_wait() and friends ma

2017-11-20 Thread Shawn Landden
On Mon, Nov 20, 2017 at 8:49 PM, Shawn Landden wrote: > See my systemd patch: https://github.com/shawnl/systemd/tree/prctl > > Android uses this memory model for all programs, and having it in the > kernel will enable integration with the page cache (not in this > series).

[RFC v3] It is common for services to be stateless around their main event loop. If a process sets PR_SET_IDLE to PR_IDLE_MODE_KILLME then it signals to the kernel that epoll_wait() and friends may no

2017-11-20 Thread Shawn Landden
See my systemd patch: https://github.com/shawnl/systemd/tree/prctl Android uses this memory model for all programs, and having it in the kernel will enable integration with the page cache (not in this series). v2 switch to prctl, memcg support v3 use put OOM after constraint checking ---

[RFC v3] It is common for services to be stateless around their main event loop. If a process sets PR_SET_IDLE to PR_IDLE_MODE_KILLME then it signals to the kernel that epoll_wait() and friends may no

2017-11-20 Thread Shawn Landden
See my systemd patch: https://github.com/shawnl/systemd/tree/prctl Android uses this memory model for all programs, and having it in the kernel will enable integration with the page cache (not in this series). v2 switch to prctl, memcg support v3 use put OOM after constraint checking ---

Re: [RFC v2] prctl: prctl(PR_SET_IDLE, PR_IDLE_MODE_KILLME), for stateless idle loops

2017-11-20 Thread Shawn Landden
On Mon, Nov 20, 2017 at 12:35 AM, Michal Hocko <mho...@kernel.org> wrote: > On Fri 17-11-17 20:45:03, Shawn Landden wrote: >> On Fri, Nov 3, 2017 at 2:09 AM, Michal Hocko <mho...@kernel.org> wrote: >> >> > On Thu 02-11-17 23:35:44, Shawn Landden wro

Re: [RFC v2] prctl: prctl(PR_SET_IDLE, PR_IDLE_MODE_KILLME), for stateless idle loops

2017-11-20 Thread Shawn Landden
On Mon, Nov 20, 2017 at 12:35 AM, Michal Hocko wrote: > On Fri 17-11-17 20:45:03, Shawn Landden wrote: >> On Fri, Nov 3, 2017 at 2:09 AM, Michal Hocko wrote: >> >> > On Thu 02-11-17 23:35:44, Shawn Landden wrote: >> > > It is common for services to be st

Re: [RFC v2] prctl: prctl(PR_SET_IDLE, PR_IDLE_MODE_KILLME), for stateless idle loops

2017-11-18 Thread Shawn Landden
On Fri, Nov 3, 2017 at 2:09 AM, Michal Hocko <mho...@kernel.org> wrote: > On Thu 02-11-17 23:35:44, Shawn Landden wrote: >> 16 bytes per process is kinda spendy, but I want to keep >> lru behavior, which mem_score_adj does not allow. When a supervisor, >> like Android's

Re: [RFC v2] prctl: prctl(PR_SET_IDLE, PR_IDLE_MODE_KILLME), for stateless idle loops

2017-11-18 Thread Shawn Landden
On Fri, Nov 3, 2017 at 2:09 AM, Michal Hocko wrote: > On Thu 02-11-17 23:35:44, Shawn Landden wrote: >> 16 bytes per process is kinda spendy, but I want to keep >> lru behavior, which mem_score_adj does not allow. When a supervisor, >> like Android's user input is keeping t

[RFC v2] prctl: prctl(PR_SET_IDLE, PR_IDLE_MODE_KILLME), for stateless idle loops

2017-11-03 Thread Shawn Landden
It is common for services to be stateless around their main event loop. If a process sets PR_SET_IDLE to PR_IDLE_MODE_KILLME then it signals to the kernel that epoll_wait() and friends may not complete, and the kernel may send SIGKILL if resources get tight. See my systemd patch:

[RFC v2] prctl: prctl(PR_SET_IDLE, PR_IDLE_MODE_KILLME), for stateless idle loops

2017-11-03 Thread Shawn Landden
It is common for services to be stateless around their main event loop. If a process sets PR_SET_IDLE to PR_IDLE_MODE_KILLME then it signals to the kernel that epoll_wait() and friends may not complete, and the kernel may send SIGKILL if resources get tight. See my systemd patch:

[RFC] EPOLL_KILLME: New flag to epoll_wait() that subscribes process to death row (new syscall)

2017-10-31 Thread Shawn Landden
It is common for services to be stateless around their main event loop. If a process passes the EPOLL_KILLME flag to epoll_wait5() then it signals to the kernel that epoll_wait5() may not complete, and the kernel may send SIGKILL if resources get tight. See my systemd patch:

[RFC] EPOLL_KILLME: New flag to epoll_wait() that subscribes process to death row (new syscall)

2017-10-31 Thread Shawn Landden
It is common for services to be stateless around their main event loop. If a process passes the EPOLL_KILLME flag to epoll_wait5() then it signals to the kernel that epoll_wait5() may not complete, and the kernel may send SIGKILL if resources get tight. See my systemd patch:

[PATCH] timerfd: show procfs fdinfo helper, and now accepts write()

2014-02-03 Thread Shawn Landden
| pos: 0 | flags:02004002 | clockid: 0 | ticks:6 Cc: Thomas Gleixner Cc: Alexander Viro Signed-off-by: Shawn Landden --- fs/timerfd.c | 64 1 file changed, 64 insertions(+) diff --git a/fs/timerfd.c b/fs

[PATCH] timerfd: show procfs fdinfo helper, and now accepts write()

2014-02-03 Thread Shawn Landden
| pos: 0 | flags:02004002 | clockid: 0 | ticks:6 Cc: Thomas Gleixner t...@linutronix.de Cc: Alexander Viro v...@zeniv.linux.org.uk Signed-off-by: Shawn Landden sh...@churchofgit.com --- fs/timerfd.c | 64 1 file

[PATCH] timerfd: show procfs fdinfo helper

2013-12-24 Thread Shawn Landden
| pos: 0 | flags:02004002 | clockid: 0 Cc: Thomas Gleixner Cc: Alexander Viro Signed-off-by: Shawn Landden --- fs/timerfd.c | 17 + 1 file changed, 17 insertions(+) diff --git a/fs/timerfd.c b/fs/timerfd.c index 9293121..e5fa587 100644 --- a/fs/timerfd.c +++ b

[PATCH] timerfd: show procfs fdinfo helper

2013-12-24 Thread Shawn Landden
| pos: 0 | flags:02004002 | clockid: 0 Cc: Thomas Gleixner t...@linutronix.de Cc: Alexander Viro v...@zeniv.linux.org.uk Signed-off-by: Shawn Landden sh...@churchofgit.com --- fs/timerfd.c | 17 + 1 file changed, 17 insertions(+) diff --git a/fs/timerfd.c b/fs

[PATCH] tty: only print sysrq help for handlers that are enabled

2013-12-03 Thread Shawn Landden
Also print out a notice when sysrq is in selective mode. Signed-off-by: Shawn Landden --- drivers/tty/sysrq.c | 7 ++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/drivers/tty/sysrq.c b/drivers/tty/sysrq.c index ce396ec..4eee0e4 100644 --- a/drivers/tty/sysrq.c +++ b/drivers

[PATCH] tty: only print sysrq help for handlers that are enabled

2013-12-03 Thread Shawn Landden
Also print out a notice when sysrq is in selective mode. Signed-off-by: Shawn Landden sh...@churchofgit.com --- drivers/tty/sysrq.c | 7 ++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/drivers/tty/sysrq.c b/drivers/tty/sysrq.c index ce396ec..4eee0e4 100644 --- a/drivers/tty

Re: [PATCH] update consumers of MSG_MORE to recognize MSG_SENDPAGE_NOTLAST

2013-11-25 Thread Shawn Landden
On Mon, Nov 25, 2013 at 7:36 AM, Shawn Landden wrote: > Commit 35f9c09fe (tcp: tcp_sendpages() should call tcp_push() once) > added an internal flag MSG_SENDPAGE_NOTLAST, similar to > MSG_MORE. > > algif_hash, algif_skcipher, and udp used MSG_MORE from tcp_sendpages() > and n

Re: disappearing listen()ed SO_REUSEPORT sockets across fork() when using epoll

2013-11-25 Thread Shawn Landden
On Mon, Nov 25, 2013 at 12:05 PM, Mateusz Guzik wrote: > On Mon, Nov 25, 2013 at 11:53:24AM -0800, Shawn Landden wrote: >> On Mon, Nov 25, 2013 at 10:05 AM, Jason Baron wrote: >> > On 11/22/2013 12:53 PM, Shawn Landden wrote: >> >> Hello, when running the attached p

Re: disappearing listen()ed SO_REUSEPORT sockets across fork() when using epoll

2013-11-25 Thread Shawn Landden
On Mon, Nov 25, 2013 at 10:05 AM, Jason Baron wrote: > On 11/22/2013 12:53 PM, Shawn Landden wrote: >> Hello, when running the attached program on 3.12 child processes >> are missing a socket fd opened, set with SO_REUSEPORT, listen()ed to, >> and added to epoll_ctl(). >&

Re: disappearing listen()ed SO_REUSEPORT sockets across fork() when using epoll

2013-11-25 Thread Shawn Landden
On Mon, Nov 25, 2013 at 10:05 AM, Jason Baron jba...@akamai.com wrote: On 11/22/2013 12:53 PM, Shawn Landden wrote: Hello, when running the attached program on 3.12 child processes are missing a socket fd opened, set with SO_REUSEPORT, listen()ed to, and added to epoll_ctl

Re: disappearing listen()ed SO_REUSEPORT sockets across fork() when using epoll

2013-11-25 Thread Shawn Landden
On Mon, Nov 25, 2013 at 12:05 PM, Mateusz Guzik mgu...@redhat.com wrote: On Mon, Nov 25, 2013 at 11:53:24AM -0800, Shawn Landden wrote: On Mon, Nov 25, 2013 at 10:05 AM, Jason Baron jba...@akamai.com wrote: On 11/22/2013 12:53 PM, Shawn Landden wrote: Hello, when running the attached program

Re: [PATCH] update consumers of MSG_MORE to recognize MSG_SENDPAGE_NOTLAST

2013-11-25 Thread Shawn Landden
On Mon, Nov 25, 2013 at 7:36 AM, Shawn Landden sh...@churchofgit.com wrote: Commit 35f9c09fe (tcp: tcp_sendpages() should call tcp_push() once) added an internal flag MSG_SENDPAGE_NOTLAST, similar to MSG_MORE. algif_hash, algif_skcipher, and udp used MSG_MORE from tcp_sendpages() and need

[PATCH] update consumers of MSG_MORE to recognize MSG_SENDPAGE_NOTLAST

2013-11-24 Thread Shawn Landden
: also fix udp Cc: Tom Herbert Cc: Eric Dumazet Cc: David S. Miller Cc: # 3.4.x + 3.2.x Reported-and-tested-by: Shawn Landden Original-patch: Richard Weinberger Signed-off-by: Shawn Landden --- crypto/algif_hash.c | 3 +++ crypto/algif_skcipher.c | 3 +++ net/ipv4/udp.c | 3

[PATCH] update consumers of MSG_MORE to recognize MSG_SENDPAGE_NOTLAST

2013-11-24 Thread Shawn Landden
Herbert Cc: Eric Dumazet Cc: David S. Miller Cc: # 3.4.x + 3.2.x Reported-and-tested-by: Shawn Landden Original-patch: Richard Weinberger Signed-off-by: Shawn Landden --- crypto/algif_hash.c | 3 +++ crypto/algif_skcipher.c | 3 +++ 2 files changed, 6 insertions(+) diff --git a/crypto

[PATCH] Commit 35f9c09fe (tcp: tcp_sendpages() should call tcp_push() once) added an internal flag MSG_SENDPAGE_NOTLAST, similar to MSG_MORE.

2013-11-24 Thread Shawn Landden
algif_hash and algif_skcipher used MSG_MORE from tcp_sendpages() and need to see the new flag as identical to MSG_MORE. This fixes sendfile() on AF_ALG. Cc: Tom Herbert Cc: Eric Dumazet Cc: David S. Miller Cc: # 3.4.x + 3.2.x Reported-and-tested-by: Shawn Landden Original-patch: Richard

Re: [PATCH] pipe_to_sendpage: Ensure that MSG_MORE is set if we set MSG_SENDPAGE_NOTLAST

2013-11-24 Thread Shawn Landden
is also set if we set MSG_SENDPAGE_NOTLAST. >> Otherwise users that check against MSG_MORE will not see it. >> >> This fixes sendfile() on AF_ALG. >> >> Cc: Tom Herbert >> Cc: Eric Dumazet >> Cc: David S. Miller >> Cc: # 3.4.x >> Reported-and-te

Re: [PATCH] pipe_to_sendpage: Ensure that MSG_MORE is set if we set MSG_SENDPAGE_NOTLAST

2013-11-24 Thread Shawn Landden
heck against MSG_MORE will not see it. > > This fixes sendfile() on AF_ALG. > > Cc: Tom Herbert > Cc: Eric Dumazet > Cc: David S. Miller > Cc: # 3.4.x The offending commit also got backported to the 3.2 stable kernel, so we need this fix there as well. --- Shawn Landd

Re: AF_ALG buggy with sendfile

2013-11-24 Thread Shawn Landden
@debian-T61:~/git/test$ ./connman_afalg /bin/true send 27080 bytes recv 20 bytes 45384483cf9cd0d82eba164131795b4807c6d39d /bin/true shawn@debian-T61:~/git/test$ sha1sum /bin/true 82667ba2ec681d8e55b0ee3b6db2970f9911680d /bin/true On Sun, Nov 24, 2013 at 2:00 PM, Shawn Landden wrote: > he

Re: AF_ALG buggy with sendfile

2013-11-24 Thread Shawn Landden
heres a version of the test case that builds. Sorry about that. On Sun, Nov 24, 2013 at 9:21 AM, Shawn Landden wrote: > If I use sendfile() to send to a accept()ed AF_ALG socket set up for > "hash", I get the wrong > answer, if I read() and then write() I get the

AF_ALG buggy with sendfile

2013-11-24 Thread Shawn Landden
If I use sendfile() to send to a accept()ed AF_ALG socket set up for "hash", I get the wrong answer, if I read() and then write() I get the right answer. None of the system calls return an error. test case attached. -- --- Shawn Landden +1 360 389 3001 (SMS preferred) #include

AF_ALG does not work with sendfile()

2013-11-24 Thread Shawn Landden
If I use sendfile() to send to a accept()ed AF_ALG socket set up for "hash", I get the wrong answer, if I read() and then write() I get the right answer. None of the system calls return an error. --- Shawn Landden +1 360 389 3001 (SMS preferred) -- To unsubscribe from this list: sen

AF_ALG does not work with sendfile()

2013-11-24 Thread Shawn Landden
If I use sendfile() to send to a accept()ed AF_ALG socket set up for hash, I get the wrong answer, if I read() and then write() I get the right answer. None of the system calls return an error. --- Shawn Landden +1 360 389 3001 (SMS preferred) -- To unsubscribe from this list: send the line

AF_ALG buggy with sendfile

2013-11-24 Thread Shawn Landden
If I use sendfile() to send to a accept()ed AF_ALG socket set up for hash, I get the wrong answer, if I read() and then write() I get the right answer. None of the system calls return an error. test case attached. -- --- Shawn Landden +1 360 389 3001 (SMS preferred) #include sys/sendfile.h

Re: AF_ALG buggy with sendfile

2013-11-24 Thread Shawn Landden
heres a version of the test case that builds. Sorry about that. On Sun, Nov 24, 2013 at 9:21 AM, Shawn Landden shawnland...@gmail.com wrote: If I use sendfile() to send to a accept()ed AF_ALG socket set up for hash, I get the wrong answer, if I read() and then write() I get the right

Re: AF_ALG buggy with sendfile

2013-11-24 Thread Shawn Landden
@debian-T61:~/git/test$ ./connman_afalg /bin/true send 27080 bytes recv 20 bytes 45384483cf9cd0d82eba164131795b4807c6d39d /bin/true shawn@debian-T61:~/git/test$ sha1sum /bin/true 82667ba2ec681d8e55b0ee3b6db2970f9911680d /bin/true On Sun, Nov 24, 2013 at 2:00 PM, Shawn Landden shawnland...@gmail.com

Re: [PATCH] pipe_to_sendpage: Ensure that MSG_MORE is set if we set MSG_SENDPAGE_NOTLAST

2013-11-24 Thread Shawn Landden
this fix there as well. --- Shawn Landden +1 360 389 3001 (SMS preferred) -- To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http

Re: [PATCH] pipe_to_sendpage: Ensure that MSG_MORE is set if we set MSG_SENDPAGE_NOTLAST

2013-11-24 Thread Shawn Landden
-and-tested-by: Shawn Landden shawnland...@gmail.com Signed-off-by: Richard Weinberger rich...@nod.at --- fs/splice.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/fs/splice.c b/fs/splice.c index 3b7ee65..b93f1b8 100644 --- a/fs/splice.c +++ b/fs/splice.c @@ -701,7 +701,7

[PATCH] Commit 35f9c09fe (tcp: tcp_sendpages() should call tcp_push() once) added an internal flag MSG_SENDPAGE_NOTLAST, similar to MSG_MORE.

2013-11-24 Thread Shawn Landden
# 3.4.x + 3.2.x Reported-and-tested-by: Shawn Landden shawnland...@gmail.com Original-patch: Richard Weinberger rich...@nod.at Signed-off-by: Shawn Landden sh...@churchofgit.com --- crypto/algif_hash.c | 3 +++ crypto/algif_skcipher.c | 3 +++ 2 files changed, 6 insertions(+) diff --git

[PATCH] update consumers of MSG_MORE to recognize MSG_SENDPAGE_NOTLAST

2013-11-24 Thread Shawn Landden
Herbert therb...@google.com Cc: Eric Dumazet eric.duma...@gmail.com Cc: David S. Miller da...@davemloft.net Cc: sta...@vger.kernel.org # 3.4.x + 3.2.x Reported-and-tested-by: Shawn Landden shawnland...@gmail.com Original-patch: Richard Weinberger rich...@nod.at Signed-off-by: Shawn Landden sh

[PATCH] update consumers of MSG_MORE to recognize MSG_SENDPAGE_NOTLAST

2013-11-24 Thread Shawn Landden
: also fix udp Cc: Tom Herbert therb...@google.com Cc: Eric Dumazet eric.duma...@gmail.com Cc: David S. Miller da...@davemloft.net Cc: sta...@vger.kernel.org # 3.4.x + 3.2.x Reported-and-tested-by: Shawn Landden shawnland...@gmail.com Original-patch: Richard Weinberger rich...@nod.at Signed-off

disappearing listen()ed SO_REUSEPORT sockets across fork() when using epoll

2013-11-22 Thread Shawn Landden
turns successfully -- --- Shawn Landden +1 360 389 3001 (SMS preferred) #include #include #include #include #include #include #include int main( int argc, char *argv[]) { int sockfd, epollfd, acceptfd, portno; struct epoll_event event = {EPOLLIN, NULL}, gotevent; char b

disappearing listen()ed SO_REUSEPORT sockets across fork() when using epoll

2013-11-22 Thread Shawn Landden
successfully -- --- Shawn Landden +1 360 389 3001 (SMS preferred) #include stdio.h #include sys/types.h #include sys/socket.h #include netinet/in.h #include stdlib.h #include string.h #include sys/epoll.h int main( int argc, char *argv[]) { int sockfd, epollfd, acceptfd, portno