Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754138AbaLHTQJ (ORCPT ); Mon, 8 Dec 2014 14:16:09 -0500 Received: from mx1.redhat.com ([209.132.183.28]:35670 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753957AbaLHTQE (ORCPT ); Mon, 8 Dec 2014 14:16:04 -0500 Date: Mon, 8 Dec 2014 14:15:51 -0500 From: Dave Jones To: Linus Torvalds Cc: "Kirill A. Shutemov" , Al Viro , Linux Kernel Mailing List , linux-fsdevel , Network Development Subject: Re: [RFC][PATCHES] iov_iter.c rewrite Message-ID: <20141208191551.GA7525@redhat.com> Mail-Followup-To: Dave Jones , Linus Torvalds , "Kirill A. Shutemov" , Al Viro , Linux Kernel Mailing List , linux-fsdevel , Network Development References: <20141204202011.GO29748@ZenIV.linux.org.uk> <20141208164650.GB29028@node.dhcp.inet.fi> <20141208175805.GB22149@ZenIV.linux.org.uk> <20141208185635.GA25867@node.dhcp.inet.fi> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Dec 08, 2014 at 11:01:41AM -0800, Linus Torvalds wrote: > On Mon, Dec 8, 2014 at 10:56 AM, Kirill A. Shutemov > wrote: > > > > trinity triggers it for me in few minutes. I will try find out more once > > get some time. > > You run trinity as *root*? > > You're a brave man. Stupid, but brave ;) > > I guess you're running it in a VM, but still.. Doing random system > calls as root sounds like a bad bad idea. I've flip-flopped on this a few times. I used to be solidly in the same position as your statement, but after seeing the things the secure-boot crowd want to lock down, there are a ton of places in the kernel that would need additional root-proofing to avoid scribbling over kernel memory. In short though, yeah, expect fireworks right now, especially on bare-metal. At the same time, just to increase coverage testing of a lot of root-required functionality (like various network sockets that can't be opened as a regular user) I added a --drop-privs mode to trinity a while ago, so after the socket creation, it can't do anything _too_ crazy. Dave -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/