TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

io_uring: So Fast. It's Scary

6 点作者 lichtenberger超过 2 年前

1 comment

mmastrac超过 2 年前
The description is a little bit of a passive-aggressive dig at io_uring for not consulting with a particular group. While I won&#x27;t pass judgment on either side here, why didn&#x27;t LSM work with the io_uring devs earlier in the process? Or perhaps the way in which the LSM community engages others is the problem (later in the slides there&#x27;s a complaint that people are actively avoiding talking to LSM).<p>&gt; The io_uring subsystem was introduced in Linux v5.1 and provided a new way to do asynchronous I&#x2F;O on Linux, improving on the existing AIO subsystem. Since then io_uring has been a source of active development, gaining the ability to delegate credentials across process boundaries in Linux v5.6. Unfortunately, all of this happened without engaging the LSM community, and as a result LSM access controls were not added to io_uring until Linux v5.16. This talk will discuss the challenges in adding LSM controls to the io_uring subsystem, thoughts on why the controls lagged the functional development, and what the LSM community might do to help reduce the changes of similar problems in the future.