From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.5 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_PASS,USER_AGENT_MUTT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8D418C43441 for ; Sun, 11 Nov 2018 08:17:43 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 568362087C for ; Sun, 11 Nov 2018 08:17:43 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 568362087C Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=1wt.eu Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727490AbeKKSFe (ORCPT ); Sun, 11 Nov 2018 13:05:34 -0500 Received: from wtarreau.pck.nerim.net ([62.212.114.60]:41825 "EHLO 1wt.eu" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727055AbeKKSFe (ORCPT ); Sun, 11 Nov 2018 13:05:34 -0500 Received: (from willy@localhost) by pcw.home.local (8.15.2/8.15.2/Submit) id wAB8HQRa030289; Sun, 11 Nov 2018 09:17:26 +0100 Date: Sun, 11 Nov 2018 09:17:25 +0100 From: Willy Tarreau To: "Michael Kerrisk (man-pages)" Cc: Daniel Colascione , linux-kernel , Joel Fernandes , Linux API , Vlastimil Babka , Florian Weimer , "Carlos O'Donell" , "libc-alpha@sourceware.org" Subject: Re: Official Linux system wrapper library? Message-ID: <20181111081725.GA30248@1wt.eu> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.6.1 (2016-04-27) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Nov 11, 2018 at 07:55:30AM +0100, Michael Kerrisk (man-pages) wrote: > [1] https://sourceware.org/bugzilla/show_bug.cgi?id=6399 is a > longstanding example. This one was a sad read and shows that applications will continue to suffer from glibc's prehistorical view on operating systems and will continue to have to define their own syscall wrappers to exploit the full potential of the modern operating systems they execute on. This reminds me when one had to write their own spinlocks and atomics many years ago. Seeing comments suggesting an application should open /proc/$PID makes me really wonder if people actually want to use slow and insecure applications designed this way. Bah, after all, this wipes quite a bit of the shame I feel every time I do something to bypass it :-/ The sad thing is that the energy wasted arguing in the bug above could have been better spent designing and implementing a generic solution to expose syscalls without depending on glibc's politics anymore. Willy