More context: <andreas> brauner: hi, kernel uring, exciting? <andreas> brauner: I'm wondering if it's too early to consider it for an MIR <andreas> samba 4.12.x can use it * trudd (r...@71-218-245-87.hlrn.qwest.net) has joined <brauner> andreas: a lot of people want it i'm sure. especially db people. but it is a lot of code and relatively new. it should be enabled by default anyway, no? <andreas> brauner: what do you mean enabled by default? Where? <andreas> in the kernel? <brauner> andreas: i.e. it's a new feature that defaults to =y in the kernel <brauner> andreas: yes <andreas> ah, sure <andreas> I was asking about the userspace library <brauner> andreas: oh ok <andreas> but yeah, also about the feature in general <andreas> agreed with "it's new" <brauner> andreas: so if you have the kernel stuff enabled you can likely enable the userspace stuff too <brauner> andreas: the problem really is the kernel side default <andreas> brauner: right, but it's in universe <andreas> the userspace bit <brauner> andreas: one thing to consider is that io_uring offloads unprivileged user workloads on async kernel threads <brauner> andreas: and that's pretty scary <brauner> andreas: it has seen some naste cves already <andreas> cves in the kernel? <brauner> andreas: yes <andreas> interesting <andreas> mind if I paste this conversation in the MIR bug I'm preparing? <brauner> andreas: an obvious problem is that kernel threads run with kernel creds usually and io_uring needs to override them with the creator's cred (of the io_uring instance) <brauner> andreas: and they forgot that at one point so ... <brauner> andreas: that was the first cve <brauner> andreas: no, go ahead <andreas> it's my understanding this shared space is the big benefit of uring <brauner> andreas: there's more to it than that but yes, it means you don't have a lot of context switches <andreas> no data to copy between kernel and user space <andreas> right <brauner> andreas: you register work, kernel does it, notifies you when done. data is shared in mmaped buffers basically
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19241 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-19241 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1878006 Title: MIR: liburing To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/liburing/+bug/1878006/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs