Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp7434955pxb; Thu, 18 Feb 2021 09:58:20 -0800 (PST) X-Google-Smtp-Source: ABdhPJyTPQRE/n7OnbYXp7PJxrTlJ9JIdRw7d+znEjzjH5MNTVT6GoDFRY/VrmYRYg+jGpev/le5 X-Received: by 2002:a17:906:2743:: with SMTP id a3mr5249159ejd.378.1613671100378; Thu, 18 Feb 2021 09:58:20 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1613671100; cv=none; d=google.com; s=arc-20160816; b=Wet330/wpTAatFkOqTjV8mT7Ix2GWNIS/Tya/FBWTtEv/rGEyzYaROE9dzSRJiUu0c DhXpG59rUlPgMGT3z9rEP5uuHZABta8bBmySkRW+pYKrj5sle0DHlVTeF4QwELac0wXM QqFjlkvG3xnwF7VbiOjmEcFRp1OH8YlAHTAkXIrufQdb+HvIfmVTNfkySZj8A/SkL6Fl mzRIodQdD/U/GYcyCeXJv8DzuOLIk05o6FmuV7daMhPMdJDg9oIxlZaWkwyACBDJTQ/3 CSRoaE5GskCm+SgXDPePcpyI6hw4olC2pmF9x09x/iVSq68yvOI27MZgaRqpcRcmWCeR 45Mw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=4oZWeumg03d8Z1y5Lnt1KGkf0PD/+G44xxBEli+me8o=; b=c3j3ApU670vjDTlC+yTNzIK+iOX2xocA8Pg+NTA77iTeSBj+0jpz7Ym0KYntyZWmVi a/O5ldkDlS8qmBwKoHI6LolkYxJQhds1BgEcrNgKKpiz5NELn+BGb4M1+8f8VwjkxN47 fgk7rjHeLSWbsS6kzzmnf5jBOf+QxxtFIjyL8enh/X5CQiALyh7sfjZoUOw9jXNkk9fa TlrkKJ/BiKFb/kP3SuVgjTiI/l3SrIBVDbYalVn+g+IRlCcYYNFz2F5oNHY6x85nSnQK G4sf6vuUY9ArhliAqPFo5mvotlL0H7VyZwxui4s+DLaQUPK4KbNJFhADgLacJ8aCIfWV c8jw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=vW8TmiLi; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f1si354355edc.288.2021.02.18.09.57.56; Thu, 18 Feb 2021 09:58:20 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=vW8TmiLi; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234872AbhBRR5X (ORCPT + 99 others); Thu, 18 Feb 2021 12:57:23 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55814 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231387AbhBRPPv (ORCPT ); Thu, 18 Feb 2021 10:15:51 -0500 Received: from mail-wm1-x32a.google.com (mail-wm1-x32a.google.com [IPv6:2a00:1450:4864:20::32a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 037FBC061574; Thu, 18 Feb 2021 07:15:07 -0800 (PST) Received: by mail-wm1-x32a.google.com with SMTP id x4so4278382wmi.3; Thu, 18 Feb 2021 07:15:06 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=4oZWeumg03d8Z1y5Lnt1KGkf0PD/+G44xxBEli+me8o=; b=vW8TmiLiGX4AAFg/14PsYui7gubBWEMlEkNvBVNmyfwt0+DdrCN6C98O7iPgaxvNKJ fltwCxn0bXoofh7LLDh81dLzYDEyJYpu6RIscxwmcEv5nJnpXKf4mPJ9x0guRRZPGbik dqsTQ6Sda/IVEUZJXPKgOqKlxtQblJWDFaUCMGgCj8oszmAgvQGEiLt+BcgXQR+Y4E1S hZcuSGC3YehlehZr/JtVr8E5dy44XS/T9jDXqxkO2cIVJDpzYC26TNeXyIdxGHBNbYCa MRHA0IoYAogZc3bYDBlL+r5I5qhILBOGTYF7GfIHslHg/hNCFYO9/tRtGeHLqX0yJXWa Z1vg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=4oZWeumg03d8Z1y5Lnt1KGkf0PD/+G44xxBEli+me8o=; b=OMA+2PFlWu3N+yKwH7nTSyFtJgzvJEZNqJCdFayafd9GLVIME132QQSZoVsMRi94d+ Byvf1SY/jig7OVqJraqHDhMWFJya0Seh1YOlyaS4C3y0Q5SkxLTvHInHJtNFfc4+Oghg sLxfPhRmCDPelzJBZmOrPQ6us4gsG3RSR+QYMkUIu4B76cTcBWTu5vllkM4PKyC0QBjs DVpr55v7sIik9SAKA9UNCcFpcQwPvQ4Ded6khRJlOmWTsq8FPvBqKIMPtxiZGoyuiX6B YfmINwhO87sqTRvX1uY1aXvyMcDBZmYqp+CsewPx4xQskXFjrbLrrLUrBTeCJcuR1qlW Lnbg== X-Gm-Message-State: AOAM531A+unhTCsSxnOkd14KD6nrnjo0vuMifm7ibcJsEQmvPII0f189 1IyNPM/9cjt+y695+cCNU6UJkx4lt984sw== X-Received: by 2002:a05:600c:3516:: with SMTP id h22mr4076388wmq.35.1613661305650; Thu, 18 Feb 2021 07:15:05 -0800 (PST) Received: from localhost.localdomain ([170.253.51.130]) by smtp.googlemail.com with ESMTPSA id k128sm3363760wmf.42.2021.02.18.07.15.04 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 18 Feb 2021 07:15:05 -0800 (PST) From: Alejandro Colomar To: mtk.manpages@gmail.com Cc: Alejandro Colomar , linux-man@vger.kernel.org, libc-alpha@sourceware.org, Florian Weimer , linux-kernel@vger.kernel.org Subject: [RFC v2] execve.2: SYNOPSIS: Document both glibc wrapper and kernel sycalls Date: Thu, 18 Feb 2021 16:13:42 +0100 Message-Id: <20210218151341.51095-1-alx.manpages@gmail.com> X-Mailer: git-send-email 2.30.1.721.g45526154a5 In-Reply-To: <938df2c0-04b5-f6a4-79c3-b8fe09973828@gmail.com> References: <938df2c0-04b5-f6a4-79c3-b8fe09973828@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Until now, the manual pages have (usually) documented only either the glibc (or another library) wrapper for a syscall, or the kernel syscall (this only when there's not a wrapper). Let's document both prototypes, which many times are slightly different. This will solve a problem where documenting glibc wrappers implied shadowing the documentation for the raw syscall. Signed-off-by: Alejandro Colomar --- man2/execve.2 | 15 +++++++++++++-- man2/membarrier.2 | 14 +++++--------- 2 files changed, 18 insertions(+), 11 deletions(-) diff --git a/man2/execve.2 b/man2/execve.2 index 027a0efd2..318c71c85 100644 --- a/man2/execve.2 +++ b/man2/execve.2 @@ -41,8 +41,8 @@ execve \- execute program .nf .B #include .PP -.BI "int execve(const char *" pathname ", char *const " argv [], -.BI " char *const " envp []); +.BI "int execve(const char *" pathname ", +.BI " char *const " argv "[], char *const " envp []); .fi .SH DESCRIPTION .BR execve () @@ -772,6 +772,17 @@ Thus, this argument list was not directly usable in a further .BR exec () call. Since UNIX\ V7, both are NULL. +.SS C library/kernel differences +.RS 4 +.nf +/* Kernel system call: */ +.BR "#include " " /* For " SYS_* " constants */" +.B #include +.PP +.BI "int syscall(SYS_execve, const char *" pathname , +.BI " const char *const " argv "[], const char *const " envp []); +.fi +.RE .\" .\" .SH BUGS .\" Some Linux versions have failed to check permissions on ELF diff --git a/man2/membarrier.2 b/man2/membarrier.2 index 173195484..25d6add77 100644 --- a/man2/membarrier.2 +++ b/man2/membarrier.2 @@ -28,13 +28,12 @@ membarrier \- issue memory barriers on a set of threads .SH SYNOPSIS .nf .PP -.B #include +.BR "#include " " /* For " MEMBARRIER_* " constants */" +.BR "#include " " /* For " SYS_* " constants */" +.B #include .PP -.BI "int membarrier(int " cmd ", unsigned int " flags ", int " cpu_id ); +.BI "int syscall(SYS_membarrier, int " cmd ", unsigned int " flags ", int " cpu_id ); .fi -.PP -.IR Note : -There is no glibc wrapper for this system call; see NOTES. .SH DESCRIPTION The .BR membarrier () @@ -295,7 +294,7 @@ was: .PP .in +4n .EX -.BI "int membarrier(int " cmd ", int " flags ); +.BI "int syscall(SYS_membarrier, int " cmd ", int " flags ); .EE .in .SH CONFORMING TO @@ -322,9 +321,6 @@ Examples where .BR membarrier () can be useful include implementations of Read-Copy-Update libraries and garbage collectors. -.PP -Glibc does not provide a wrapper for this system call; call it using -.BR syscall (2). .SH EXAMPLES Assuming a multithreaded application where "fast_path()" is executed very frequently, and where "slow_path()" is executed infrequently, the -- 2.30.1.721.g45526154a5