On 31/10/2015 23:47, Mike Snitzer wrote: > Yes, with your commit ec8013be ("dm: do not forward ioctls from logical > volumes to the underlying device") you added protections to disallow > issuing ioctls to a partition that could impact the rest of the device. > > Given that I can see why you're seizing on the "ti->len != > i_size_read(bdev->bd_inode) >> SECTOR_SHIFT" negative checks that gate > the call to scsi_verify_blk_ioctl(). Right. > For Hannes, and in my head, it didn't matter if a future bdev satisfies > the length condition. I agree actually. The only problem is that the returned errno value is ENOTTY, and to userspace that "sounds like" a future bdev will not make the ioctl valid. > I could've sworn that unprivledged users (without CAP_SYS_RAWIO) > wouldn't be allowed to issue ioctls. Am I completely mistaken? They are allowed to issue ioctls. CAP_SYS_RAWIO changes that to also allow issuing of ioctls to partitions. That was required by Linus for backwards compatibility. > Or is > it still contentious and DM-mpath removing the ability to allow these > unprivledged ioctls (as a side-effect of Hannes' commit ec8013be) makes > your life, and other virt users' lives, harder? Yes, it would. virt runs as an unprivileged user (so does CD burning, which was the original reason to let SG_IO run by unprivileged users; there are probably other use cases). Paolo -- To unsubscribe from this list: send the line "unsubscribe linux-scsi" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html