Someone should write a library that uses seccomp-bpf to intercept blocking syscalls and route them to a user-mode scheduler on Linux…
I guess 180ns ≃ 500 cycles is achievable for syscalls without much work to do, and ~3x that might be plausible for round trips.
-
-
To be clear, this is an awful hack, and I don’t love M:N, but IMHO if you’re going to do it you should make it compatible with existing code
-
IMO it's more interesting for sandboxing N threads or even processes in one actual thread.
-
Sure, that’s what seccomp was designed for. My basic problem is “if people really want M:N, what’s the best way to provide it”.
- End of conversation
New conversation -
-
-
In an almost simlar µ-benchmark, I measured the "round trip" to be 1.3µs on a i5-6600K (in VM). So it seems plausible to me
-
I am expecting the 0.18µs would vary a bit with different syscalls though - better test a bit more
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.