More context:
<andreas> brauner: hi, kernel uring, exciting?
<andreas> brauner: I'm wondering if it's too early to consider it for an MIR
<andreas> samba 4.12.x can use it
* trudd (r...@71-218-245-87.hlrn.qwest.net) has joined
<brauner> andreas: a lot of people want it i'm sure. especially db people. but 
it is a lot of code and relatively new. it should be enabled by default anyway, 
no?
<andreas> brauner: what do you mean enabled by default? Where?
<andreas> in the kernel?
<brauner> andreas: i.e. it's a new feature that defaults to =y in the kernel
<brauner> andreas: yes
<andreas> ah, sure
<andreas> I was asking about the userspace library
<brauner> andreas: oh ok
<andreas> but yeah, also about the feature in general
<andreas> agreed with "it's new"
<brauner> andreas: so if you have the kernel stuff enabled you can likely 
enable the userspace stuff too
<brauner> andreas: the problem really is the kernel side default
<andreas> brauner: right, but it's in universe
<andreas> the userspace bit
<brauner> andreas: one thing to consider is that io_uring offloads unprivileged 
user workloads on async kernel threads
<brauner> andreas: and that's pretty scary
<brauner> andreas: it has seen some naste cves already
<andreas> cves in the kernel?
<brauner> andreas: yes
<andreas> interesting
<andreas> mind if I paste this conversation in the MIR bug I'm preparing?
<brauner> andreas: an obvious problem is that kernel threads run with kernel 
creds usually and io_uring needs to override them with the creator's cred (of 
the io_uring instance)
<brauner> andreas: and they forgot that at one point so ...
<brauner> andreas: that was the first cve
<brauner> andreas: no, go ahead
<andreas> it's my understanding this shared space is the big benefit of uring
<brauner> andreas: there's more to it than that but yes, it means you don't 
have a lot of context switches
<andreas> no data to copy between kernel and user space
<andreas> right
<brauner> andreas: you register work, kernel does it, notifies you when done. 
data is shared in mmaped buffers basically

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19241


** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-19241

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1878006

Title:
  MIR: liburing

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/liburing/+bug/1878006/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to