[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20210601083915.156476-1-Niklas.Cassel@wdc.com>
Date: Tue, 1 Jun 2021 08:39:24 +0000
From: Niklas Cassel <Niklas.Cassel@....com>
To: Jens Axboe <axboe@...nel.dk>, Shaun Tancheff <shaun@...cheff.com>,
Hannes Reinecke <hare@...e.com>,
Damien Le Moal <Damien.LeMoal@....com>,
"Martin K. Petersen" <martin.petersen@...cle.com>
CC: Damien Le Moal <Damien.LeMoal@....com>,
Niklas Cassel <Niklas.Cassel@....com>,
Jens Axboe <axboe@...com>,
"linux-block@...r.kernel.org" <linux-block@...r.kernel.org>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: [PATCH v2 0/2] allow blk-zoned ioctls without CAP_SYS_ADMIN
From: Niklas Cassel <niklas.cassel@....com>
Allow the following blk-zoned ioctls: BLKREPORTZONE, BLKRESETZONE,
BLKOPENZONE, BLKCLOSEZONE, and BLKFINISHZONE to be performed without
CAP_SYS_ADMIN.
These ioctls instead only requires that the corresponding R/W access
control flag to be successfully set on the opened file descriptor.
(open()/openat() will fail with -EPERM if you try to open a file with
flags that you lack permission for.)
Niklas Cassel (2):
blk-zoned: allow zone management send operations without CAP_SYS_ADMIN
blk-zoned: allow BLKREPORTZONE without CAP_SYS_ADMIN
block/blk-zoned.c | 7 ++-----
1 file changed, 2 insertions(+), 5 deletions(-)
--
2.31.1
Powered by blists - more mailing lists