[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20120612175503.3462962f@pyramind.ukuu.org.uk>
Date: Tue, 12 Jun 2012 17:55:03 +0100
From: Alan Cox <alan@...rguk.ukuu.org.uk>
To: Paolo Bonzini <pbonzini@...hat.com>
Cc: linux-kernel@...r.kernel.org, axboe@...nel.dk,
linux-scsi@...r.kernel.org, jbottomley@...allels.com
Subject: Re: [PATCH] scsi: allow persistent reservations without
CAP_SYS_RAWIO
On Tue, 12 Jun 2012 18:08:32 +0200
Paolo Bonzini <pbonzini@...hat.com> wrote:
> Persistent reservations commands cannot be issued right now without
> giving CAP_SYS_RAWIO to the process who wishes to send them. This
> is a bit heavy-handed, allow these two commands.
>
> Signed-off-by: Paolo Bonzini <pbonzini@...hat.com>
> ---
> Ok for 3.5 as well?
NAK.
Persistent reservations are exactly the kind of command that should have
a security model attached to them.
Red Hat seems to be an ever growing source of "mummy its hard, lets
disable all the security" type fixes. Please stop it.
There is a sensible debate to be had about whether a lesser privilege
ought to be allowed. The real fix to this as with half of the other
crazy attempts to break all the security models that seem to keep spewing
forth is for someone who cares about it (that seems to me Red Hat) add
support for pushing a BPF filter onto a block device command queue.
All the supporting code is there and used for other stuff, we can even
jit the things, not that it's a fast path here.
Alan
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists