Just one final thought. A second reason we deliberately exclude those iSCSI
devices is that they're actually the drives backing customer VMs, so any
LVM metadata on them should be interpreted by an untrusted guest kernel and
not by the host. Untrusted third parties have complete control over the
contents of the block devices.
Is LVM well-secured against attacks from block devices containing malicious
LVM metadata? If not, an unexpected change in filtering behaviour might
potentially be a security issue in some environments.
Cheers,
Chris.
_______________________________________________
linux-lvm mailing list
linux-lvm@redhat.com
https://www.redhat.com/mailman/listinfo/linux-lvm
read the LVM HOW-TO at http://tldp.org/HOWTO/LVM-HOWTO/