From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from zeniv.linux.org.uk ([195.92.253.2]:41858 "EHLO ZenIV.linux.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729142AbeGRWBz (ORCPT ); Wed, 18 Jul 2018 18:01:55 -0400 Date: Wed, 18 Jul 2018 22:22:05 +0100 From: Al Viro To: Linus Torvalds Cc: Miklos Szeredi , Stephen Rothwell , linux-fsdevel , Linux Kernel Mailing List Subject: Re: [RFC] call_with_creds() Message-ID: <20180718212205.GY30522@ZenIV.linux.org.uk> References: <20180718124340.GS30522@ZenIV.linux.org.uk> <20180718181252.GU30522@ZenIV.linux.org.uk> <20180718194637.GV30522@ZenIV.linux.org.uk> <20180718200411.GW30522@ZenIV.linux.org.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Sender: linux-fsdevel-owner@vger.kernel.org List-ID: On Wed, Jul 18, 2018 at 01:43:00PM -0700, Linus Torvalds wrote: > What I really think I'd prefer is to have some simple way to "poison" > current_cred(). It could be something as simple as a per-thread > counter, and we'd have current_cred() do > > WARN_ON_ONCE(in_interrupt() || current->cred_poison); Why is counter any better than LSB of a pointer?