From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751967AbaEOA3a (ORCPT ); Wed, 14 May 2014 20:29:30 -0400 Received: from terminus.zytor.com ([198.137.202.10]:34701 "EHLO mail.zytor.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750762AbaEOA33 (ORCPT ); Wed, 14 May 2014 20:29:29 -0400 Message-ID: <53740A30.20807@zytor.com> Date: Wed, 14 May 2014 17:28:32 -0700 From: "H. Peter Anvin" User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.5.0 MIME-Version: 1.0 To: Davidlohr Bueso , mtk.manpages@gmail.com CC: Darren Hart , Thomas Gleixner , Ingo Molnar , Jakub Jelinek , "linux-man@vger.kernel.org" , lkml , Davidlohr Bueso , Arnd Bergmann , Steven Rostedt , Peter Zijlstra , Linux API , "Carlos O'Donell" Subject: Re: futex(2) man page update help request References: <537346E5.4050407@gmail.com> <1400100977.3865.30.camel@buesod1.americas.hpqcorp.net> In-Reply-To: <1400100977.3865.30.camel@buesod1.americas.hpqcorp.net> X-Enigmail-Version: 1.6 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 05/14/2014 01:56 PM, Davidlohr Bueso wrote: >> >>> However, unless I'm sorely mistaken, the larger problem is that glibc >>> removed the futex() call entirely, so these man pages don't describe >> >> I don't think futex() ever was in glibc--that's by design, and >> completely understandable: no user-space application would want to >> directly use futex(). > > That's actually not quite true. There are plenty of software efforts out > there that use futex calls directly to implement userspace serialization > mechanisms as an alternative to the bulky sysv semaphores. I worked > closely with an in-memory DB project that makes heavy use of them. Not > everyone can simply rely on pthreads. > More fundamentally, futex(2), like clone(2), are things that can be legitimately by user space without automatically breaking all of glibc. There are some other things where that is *not* true, because glibc relies on being able to mediate all accesses to a kernel facility, but not here. -hpa