diff options
| author | Andrew Pogrebnoy <absourd.noise@gmail.com> | 2022-10-07 10:12:54 +0300 |
|---|---|---|
| committer | Gopher Robot <gobot@golang.org> | 2022-10-07 18:28:11 +0000 |
| commit | c7cc2b94c63af610a29b1b48cfbfb87cb8abf05b (patch) | |
| tree | 658fcfa6dedbddaf4a65ed8d2c14851e8155fb38 /src/runtime/export_linux_test.go | |
| parent | 67cd77b88f2fdf620556cd698752aa2ed53fee1b (diff) | |
| download | go-c7cc2b94c63af610a29b1b48cfbfb87cb8abf05b.tar.xz | |
runtime: move epoll syscalls to runtime/internal/syscall
This change moves Linux epoll's syscalls implementation to the
"runtime/internal/syscall" package. The intention in this CL was to
minimise behavioural changes but make the code more generalised. This
also will allow adding new syscalls (like epoll_pwait2) without the
need to implement assembly stubs for each arch.
It also drops epoll_create as not all architectures provide this call.
epoll_create1 was added to the kernel in version 2.6.27 and Go requires
Linux kernel version 2.6.32 or later since Go 1.18. So it is safe to
always use epoll_create1.
This is a resubmit as the previous CL 421994 was reverted due to test
failures after the merge with the master. The issue was fixed in
CL 438615
For #53824
For #51087
Change-Id: I1bd0f23a85b4f9b80178c5dd36fd3e95ff4f9648
Reviewed-on: https://go-review.googlesource.com/c/go/+/440115
Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
TryBot-Result: Gopher Robot <gobot@golang.org>
Auto-Submit: Michael Pratt <mpratt@google.com>
Reviewed-by: Michael Pratt <mpratt@google.com>
Run-TryBot: Michael Pratt <mpratt@google.com>
Diffstat (limited to 'src/runtime/export_linux_test.go')
| -rw-r--r-- | src/runtime/export_linux_test.go | 10 |
1 files changed, 4 insertions, 6 deletions
diff --git a/src/runtime/export_linux_test.go b/src/runtime/export_linux_test.go index dea94a934c..a441c0efa2 100644 --- a/src/runtime/export_linux_test.go +++ b/src/runtime/export_linux_test.go @@ -6,19 +6,17 @@ package runtime -import "unsafe" +import ( + "runtime/internal/syscall" +) const SiginfoMaxSize = _si_max_size const SigeventMaxSize = _sigev_max_size +var Closeonexec = syscall.CloseOnExec var NewOSProc0 = newosproc0 var Mincore = mincore var Add = add -type EpollEvent epollevent type Siginfo siginfo type Sigevent sigevent - -func Epollctl(epfd, op, fd int32, ev unsafe.Pointer) int32 { - return epollctl(epfd, op, fd, (*epollevent)(ev)) -} |
