Someone should write a library that uses seccomp-bpf to intercept blocking syscalls and route them to a user-mode scheduler on Linux…
To be clear, this is an awful hack, and I don’t love M:N, but IMHO if you’re going to do it you should make it compatible with existing code
-
-
IMO it's more interesting for sandboxing N threads or even processes in one actual thread.
-
Sure, that’s what seccomp was designed for. My basic problem is “if people really want M:N, what’s the best way to provide it”.
- 1 more reply
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.