Linus yelled at him for trying to push shitcode to the Linux kernel
I really like the kernel development philosophy of "don't break userspace", and I was actually wondering why Lennart doesn't apply something similar to systemd not breaking user software or systems given how important it is.
An easy example is the famous 2038 issue
(1143), where reaching a specific date on 32bit platforms wouldn't let systemd run, so his init system didn't even init, which I'd consider a breaking bug, and so have others from the issue. Some systems had this date set when their RTC battery died.
I think it shouldn't be the case that once we reach the magic day, user space stops booting.
This was a kernel issue, it kept sending infinite notifications causing systemd to busy loop, but these notifications come from a timerfd from systemd.
So if you have an edge case where old systems might not boot because of infinite notifications from a timerfd you created, you probably just stop listening to that timerfd, let the system boot but have lots of errors about it so the user can fix it, right?
No. Lennart doesn't care, it's not his fault. If you can't update your kernel to the latest bleeding version that has this bugfix and your battery dies, you're fucked.
This isn't to say that systemd is the spawn of Satan, I haven't personally had any issues with it, but Lennart is insufferable.
Regarding his run0 stuff, it's nice to be an unprivileged user in case you accidentally do something retarded, and even if an attacker gains access or you run some malware, you should not be able to do any real damage outside of that user's space.
However, if without authentication you can switch to a privileged user or run commands as one, then any actual protection you had goes down the drain. Having sudo/doas/run0 in the first place is the vulnerability. From helping out my buddies use Linux, I see that if a command requires root privileges they just give it root privileges without giving a shit about what it does. The tutorial said to use this command, they are using this fucking command. Look at LTT removing his DE by uninstalling steam, he didn't even need sudo.
If an attacker gets access to a user who can either `doas`, `sudo` or `run0`, you're fucked anyway, so who does it even protect to use sudo instead of just switching to root for your commands? If you do a lot of stuff in the terminal you're likely going to switch to root anyway, because typing sudo/doas/run0 before everything is annoying.