On Fri, 06 Jan 2023 12:17:05 +0800, Ming Lei wrote: > Stefan Hajnoczi suggested un-privileged ublk device[1] for container > use case. > > So far only administrator can create/control ublk device which is too > strict and increase system administrator burden, and this patchset > implements un-privileged ublk device: > > [...] Applied, thanks! [1/6] ublk_drv: remove nr_aborted_queues from ublk_device commit: d66a012deb6567dd127f38d068806adcfc3a5051 [2/6] ublk_drv: don't probe partitions if the ubq daemon isn't trusted commit: 6faa01c8bf3ba4ba6eec95b3ce646a9af9473988 [3/6] ublk_drv: move ublk_get_device_from_id into ublk_ctrl_uring_cmd commit: a5d140c503b6d17800911e2cd9070d5933b11a26 [4/6] ublk_drv: add device parameter UBLK_PARAM_TYPE_DEVT commit: 620183fd3cda8ef7fa9dec07d81ce2551420af8e [5/6] ublk_drv: add module parameter of ublks_max for limiting max allowed ublk dev commit: 961ccca54ad53c4945c4e36982eaff304c3c2624 [6/6] ublk_drv: add mechanism for supporting unprivileged ublk device commit: 56f5160bc1b8d9756a5353f79bd00be989834c7d Best regards, -- Jens Axboe