DENY_RULE (io_uring_enter, EPERM);
DENY_RULE (io_uring_register, EPERM);
DENY_RULE (io_uring_setup, EPERM);Whereas rootful docker is a well known thing, run on millions of machines, and none of the vulnerabilities discovered in its entire existence is as bad as any single priv escalation issue caused by allowing unprivileged users to create a user namespace.
Pretty much everything high performance is ringbuffers these days, e.g. NVMe. What makes io_uring the one thing that cannot be done?
p_ing•5mo ago
8 Months - https://news.ycombinator.com/item?id=42608436