From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754159AbbAaXab (ORCPT ); Sat, 31 Jan 2015 18:30:31 -0500 Received: from e32.co.us.ibm.com ([32.97.110.150]:57615 "EHLO e32.co.us.ibm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753423AbbAaXa3 (ORCPT ); Sat, 31 Jan 2015 18:30:29 -0500 Date: Sat, 31 Jan 2015 15:30:21 -0800 From: "Paul E. McKenney" To: Richard Weinberger Cc: Josh Triplett , Casey Schaufler , Iulia Manda , One Thousand Gnomes , Serge Hallyn , LKML , Andrew Morton , Peter Zijlstra , Michal Hocko , LSM Subject: Re: [PATCH v2] kernel: Conditionally support non-root users, groups and capabilities Message-ID: <20150131233021.GZ19109@linux.vnet.ibm.com> Reply-To: paulmck@linux.vnet.ibm.com References: <20150129184311.GA6404@winterfell> <54CAC5EE.8060107@schaufler-ca.com> <20150130003228.GJ19109@linux.vnet.ibm.com> <54CADDA4.4040602@schaufler-ca.com> <20150130013600.GM19109@linux.vnet.ibm.com> <54CAEB93.5090508@schaufler-ca.com> <20150130191302.GA19744@cloud> <54CBDFF4.1070503@schaufler-ca.com> <20150130214007.GA2613@jtriplet-mobl1> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.21 (2010-09-15) X-TM-AS-MML: disable X-Content-Scanned: Fidelis XPS MAILER x-cbid: 15013123-0005-0000-0000-00000875A7C3 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jan 30, 2015 at 10:56:14PM +0100, Richard Weinberger wrote: > On Fri, Jan 30, 2015 at 10:40 PM, Josh Triplett wrote: > > *Today*, Linux is a challenging choice for a tiny embedded system. > > We're trying to fix that. > > Can you please more specific about the embedded systems exactly you're > talking about? > > I find this patch rather controversial as it removes a lot of security. > Embedded systems *are* a target for all kind of attacks. > Misguided embedded engineers will abuse this feature and produce even more > weak targets. Without this patch, those same engineers would simply run everything as root. "Make a foolproof system, and they will invent a better fool". ;-) Thanx, Paul