Return-Path: Delivered-To: apmail-httpd-dev-archive@www.apache.org Received: (qmail 94065 invoked from network); 10 Dec 2009 06:18:31 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.3) by minotaur.apache.org with SMTP; 10 Dec 2009 06:18:31 -0000 Received: (qmail 56236 invoked by uid 500); 10 Dec 2009 06:18:30 -0000 Delivered-To: apmail-httpd-dev-archive@httpd.apache.org Received: (qmail 56115 invoked by uid 500); 10 Dec 2009 06:18:27 -0000 Mailing-List: contact dev-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: dev@httpd.apache.org list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list dev@httpd.apache.org Received: (qmail 56106 invoked by uid 99); 10 Dec 2009 06:18:27 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 10 Dec 2009 06:18:27 +0000 X-ASF-Spam-Status: No, hits=-0.0 required=10.0 tests=SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (nike.apache.org: domain of philipp_subx@redfish-solutions.com designates 66.232.79.143 as permitted sender) Received: from [66.232.79.143] (HELO mail.redfish-solutions.com) (66.232.79.143) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 10 Dec 2009 06:18:19 +0000 Received: from [192.168.10.7] (builder.redfish-solutions.com [192.168.10.7]) (authenticated bits=0) by mail.redfish-solutions.com (8.14.3/8.14.3) with ESMTP id nBA6HtnA003230 (version=TLSv1/SSLv3 cipher=DHE-RSA-CAMELLIA256-SHA bits=256 verify=NO) for ; Wed, 9 Dec 2009 23:17:57 -0700 Message-ID: <4B209293.6050305@redfish-solutions.com> Date: Wed, 09 Dec 2009 22:17:55 -0800 From: "Philip A. Prindeville" User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.1.4pre) Gecko/20091112 Fedora/3.0-2.8.b4.fc11 Thunderbird/3.0b4 MIME-Version: 1.0 To: dev@httpd.apache.org Subject: [PATCH 42848] add IP TOS support to apr_socket_opt_set() Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.67 on 192.168.1.3 X-Virus-Checked: Checked by ClamAV on apache.org Seems this one has been around a while. Allowing the server to DSCP mark its traffic is a good thing for networks (and intranets) that share bandwidth between data, voice, and video. This simple patch extends the setsockopt(..., SOL_IP, IP_TOS, ...) call to the apr_socket_opt_set() abstraction. Please review and comment.