diff options
author | Jens Axboe <axboe@kernel.dk> | 2024-02-14 08:44:24 -0700 |
---|---|---|
committer | Jens Axboe <axboe@kernel.dk> | 2024-02-14 08:44:24 -0700 |
commit | e8447308e0b54d23e487afb8cbe3cb34636d5ec7 (patch) | |
tree | 087df1caaed37c7388272ded6264010bb059bba9 | |
parent | a80a4a4aa73a30d4840be7df089fba82f97e329f (diff) | |
download | liburing-e8447308e0b54d23e487afb8cbe3cb34636d5ec7.tar.gz |
test/accept: check for bad result on multishot accept overflow
Unsure of where the 195 is coming from, but it's consistent across
my testing and the initial report. So while this may look odd, and it is,
let's just roll with it.
Signed-off-by: Jens Axboe <axboe@kernel.dk>
-rw-r--r-- | test/accept.c | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/test/accept.c b/test/accept.c index b9ff9b25..a65ddb07 100644 --- a/test/accept.c +++ b/test/accept.c @@ -311,6 +311,9 @@ static int test_loop(struct io_uring *ring, multishot ? "Multishot" : "", i, s_fd[i]); goto err; + } else if (s_fd[i] == 195 && args.overflow) { + fprintf(stderr, "Broken overflow handling\n"); + goto err; } if (multishot && fixed) { |