From patchwork Mon May 10 17:55:34 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Alejandro Colomar X-Patchwork-Id: 1476641 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=sourceware.org (client-ip=8.43.85.97; helo=sourceware.org; envelope-from=libc-alpha-bounces@sourceware.org; receiver=) Authentication-Results: ozlabs.org; dkim=pass (1024-bit key; secure) header.d=sourceware.org header.i=@sourceware.org header.a=rsa-sha256 header.s=default header.b=KUUc+Kz3; dkim-atps=neutral Received: from sourceware.org (ip-8-43-85-97.sourceware.org [8.43.85.97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4Ff80s6x2Hz9sWl for ; Tue, 11 May 2021 03:58:05 +1000 (AEST) Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id 3661F3988886; Mon, 10 May 2021 17:56:57 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 3661F3988886 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sourceware.org; s=default; t=1620669417; bh=abi0pYctvvMdncGo9cnwwy4M+LI2oBukEc5Y0D1R4AA=; h=To:Subject:Date:In-Reply-To:References:List-Id:List-Unsubscribe: List-Archive:List-Post:List-Help:List-Subscribe:From:Reply-To:Cc: From; b=KUUc+Kz36/kgVLQGsEzHvLLYBg/aIXRcBcCPTE5AUIqKxflYjsm/bGw5fsmGpUrK3 uUKtbhHtiZldrqu7Q2TLYzlJlGtcwEkf1ESBMBFT2aPg4+FOZ2931ouKQ6Y1FgtMPi RpZb0f/eUDdh68Km3WRvucZdQpF5G3B7dlSq3hKE= X-Original-To: libc-alpha@sourceware.org Delivered-To: libc-alpha@sourceware.org Received: from mail-wr1-x42c.google.com (mail-wr1-x42c.google.com [IPv6:2a00:1450:4864:20::42c]) by sourceware.org (Postfix) with ESMTPS id EC2903987C3B for ; Mon, 10 May 2021 17:56:54 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.3.2 sourceware.org EC2903987C3B Received: by mail-wr1-x42c.google.com with SMTP id d11so17520681wrw.8 for ; Mon, 10 May 2021 10:56:54 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=abi0pYctvvMdncGo9cnwwy4M+LI2oBukEc5Y0D1R4AA=; b=RKmuCVK7Ls8aZ5WK1yGMulK/WfYlYHI88PG3xWReDEmbae42clSlna9Bk/uIzI/Ojd lwp0HIjlCLOBFnD31F/A09L2gk14nhfoom/LOCevPurWjxQImPfHTdT3sAQhgmKtO4dj gFh5NcGJGacJ8/MlpWitWqnXQ1UiNXE96X6jcPIxy9CKRkLqoRTyIgDkvx/tPIzx5GHx Z8rg+9iJeXz9/fYWRIEqQGu/gao0s4MDlLr2EJe7ZfReh+BFBR+NtXC+cbzEKh1Zj2PJ w+UbYFXi6m5DoYXg4310SMpGLXFvKIE8E/glqz+W9ZDXu3mT9pdcuXeJVn3A87PLDRPv 2ygw== X-Gm-Message-State: AOAM530Vw34l4Rui7Vo7ZYJPXVBBFG/KQkPy9wXGxsdIO/VKSDHxQ7Av U1GlleJsDsrRFFqOtwmNPZc= X-Google-Smtp-Source: ABdhPJxCzNfk26JW5LK2eH+lliFxdB2fPvyVWIpT7AqIb6Z3un6gnGTdKAjTdt9R6gAZBx6YpV1mFQ== X-Received: by 2002:a5d:5263:: with SMTP id l3mr32546370wrc.263.1620669414078; Mon, 10 May 2021 10:56:54 -0700 (PDT) Received: from sqli.sqli.com ([195.53.121.100]) by smtp.googlemail.com with ESMTPSA id m13sm24318830wrw.86.2021.05.10.10.56.52 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 10 May 2021 10:56:53 -0700 (PDT) To: mtk.manpages@gmail.com Subject: [PATCH 25/39] alloc_hugepages.2, arch_prctl.2, capget.2, clone.2, delete_module.2, exit_group.2, get_robust_list.2, getunwind.2, init_module.2: Add note about the use of syscall(2) Date: Mon, 10 May 2021 19:55:34 +0200 Message-Id: <20210510175546.28445-26-alx.manpages@gmail.com> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210510175546.28445-1-alx.manpages@gmail.com> References: <20210510175546.28445-1-alx.manpages@gmail.com> MIME-Version: 1.0 X-Spam-Status: No, score=-12.3 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, FREEMAIL_FROM, GIT_PATCH_0, RCVD_IN_DNSWL_NONE, SPF_HELO_NONE, SPF_PASS, TXREP autolearn=ham autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on server2.sourceware.org X-BeenThere: libc-alpha@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Libc-alpha mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-Patchwork-Original-From: Alejandro Colomar via Libc-alpha From: Alejandro Colomar Reply-To: Alejandro Colomar Cc: Florian Weimer , Jakub Wilk , Alejandro Colomar , libc-alpha@sourceware.org, linux-man@vger.kernel.org Errors-To: libc-alpha-bounces@sourceware.org Sender: "Libc-alpha" Signed-off-by: Alejandro Colomar --- man2/alloc_hugepages.2 | 5 +++++ man2/arch_prctl.2 | 6 ++++++ man2/capget.2 | 5 +++++ man2/clone.2 | 6 ++++++ man2/delete_module.2 | 6 ++++++ man2/exit_group.2 | 6 ++++++ man2/get_robust_list.2 | 5 +++++ man2/getunwind.2 | 6 ++++++ man2/init_module.2 | 5 +++++ 9 files changed, 50 insertions(+) diff --git a/man2/alloc_hugepages.2 b/man2/alloc_hugepages.2 index cc76fc495..47f9da6b0 100644 --- a/man2/alloc_hugepages.2 +++ b/man2/alloc_hugepages.2 @@ -35,6 +35,11 @@ alloc_hugepages, free_hugepages \- allocate or free huge pages .BI "int syscall(SYS_free_hugepages, void *" addr ); .\" asmlinkage int sys_free_hugepages(unsigned long addr); .fi +.PP +.IR Note : +glibc provides no wrappers for these system calls, +necessitating the use of +.BR syscall (2). .SH DESCRIPTION The system calls .BR alloc_hugepages () diff --git a/man2/arch_prctl.2 b/man2/arch_prctl.2 index 7ae5b350c..982416761 100644 --- a/man2/arch_prctl.2 +++ b/man2/arch_prctl.2 @@ -34,6 +34,12 @@ arch_prctl \- set architecture-specific thread state .BI "int syscall(SYS_arch_prctl, int " code ", unsigned long " addr ); .BI "int syscall(SYS_arch_prctl, int " code ", unsigned long *" addr ); .fi +.PP +.IR Note : +glibc provides no wrapper for +.BR arch_prctl (), +necessitating the use of +.BR syscall (2). .SH DESCRIPTION .BR arch_prctl () sets architecture-specific process or thread state. diff --git a/man2/capget.2 b/man2/capget.2 index 9dbc0404c..3ac05106f 100644 --- a/man2/capget.2 +++ b/man2/capget.2 @@ -28,6 +28,11 @@ capget, capset \- set/get capabilities of thread(s) .BI "int syscall(SYS_capset, cap_user_header_t " hdrp , .BI " const cap_user_data_t " datap ); .fi +.PP +.IR Note : +glibc provides no wrappers for these system calls, +necessitating the use of +.BR syscall (2). .SH DESCRIPTION These two system calls are the raw kernel interface for getting and setting thread capabilities. diff --git a/man2/clone.2 b/man2/clone.2 index 04b4ec38c..e381da165 100644 --- a/man2/clone.2 +++ b/man2/clone.2 @@ -63,6 +63,12 @@ clone, __clone2, clone3 \- create a child process .PP .BI "long syscall(SYS_clone3, struct clone_args *" cl_args ", size_t " size ); .fi +.PP +.IR Note : +glibc provides no wrapper for +.BR clone3 (), +necessitating the use of +.BR syscall (2). .SH DESCRIPTION These system calls create a new ("child") process, in a manner similar to diff --git a/man2/delete_module.2 b/man2/delete_module.2 index 21c9e9d8d..3b14111c5 100644 --- a/man2/delete_module.2 +++ b/man2/delete_module.2 @@ -33,6 +33,12 @@ delete_module \- unload a kernel module .PP .BI "int syscall(SYS_delete_module, const char *" name ", unsigned int " flags ); .fi +.PP +.IR Note : +glibc provides no wrapper for +.BR delete_module (), +necessitating the use of +.BR syscall (2). .SH DESCRIPTION The .BR delete_module () diff --git a/man2/exit_group.2 b/man2/exit_group.2 index d197f1f2e..1533529f8 100644 --- a/man2/exit_group.2 +++ b/man2/exit_group.2 @@ -32,6 +32,12 @@ exit_group \- exit all threads in a process .PP .BI "noreturn void syscall(SYS_exit_group, int " status ); .fi +.PP +.IR Note : +glibc provides no wrapper for +.BR exit_group (), +necessitating the use of +.BR syscall (2). .SH DESCRIPTION This system call is equivalent to .BR _exit (2) diff --git a/man2/get_robust_list.2 b/man2/get_robust_list.2 index d1b1c59bc..66b27d905 100644 --- a/man2/get_robust_list.2 +++ b/man2/get_robust_list.2 @@ -42,6 +42,11 @@ get_robust_list, set_robust_list \- get/set list of robust futexes .BI "long syscall(SYS_set_robust_list," .BI " struct robust_list_head *" head ", size_t " len ); .fi +.PP +.IR Note : +glibc provides no wrappers for these system calls, +necessitating the use of +.BR syscall (2). .SH DESCRIPTION These system calls deal with per-thread robust futex lists. These lists are managed in user space: diff --git a/man2/getunwind.2 b/man2/getunwind.2 index 403bd7770..0935497c6 100644 --- a/man2/getunwind.2 +++ b/man2/getunwind.2 @@ -35,6 +35,12 @@ getunwind \- copy the unwind data to caller's buffer .PP .BI "long syscall(SYS_getunwind, void " *buf ", size_t " buf_size ); .fi +.PP +.IR Note : +glibc provides no wrapper for +.BR getunwind (), +necessitating the use of +.BR syscall (2). .SH DESCRIPTION .I Note: this system call is obsolete. .PP diff --git a/man2/init_module.2 b/man2/init_module.2 index 13d1b7f0a..aac0c6631 100644 --- a/man2/init_module.2 +++ b/man2/init_module.2 @@ -38,6 +38,11 @@ init_module, finit_module \- load a kernel module .BI "int syscall(SYS_finit_module, int " fd ", const char *" param_values , .BI " int " flags ); .fi +.PP +.IR Note : +glibc provides no wrappers for these system calls, +necessitating the use of +.BR syscall (2). .SH DESCRIPTION .BR init_module () loads an ELF image into kernel space,