From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Message-ID: <4F1EAA6A.6020207@redhat.com> Date: Tue, 24 Jan 2012 13:56:10 +0100 From: Paolo Bonzini MIME-Version: 1.0 To: Ben Hutchings CC: stable@vger.kernel.org, Linus Torvalds , linux-kernel@vger.kernel.org, Petr Matousek , linux-scsi@vger.kernel.org, Jens Axboe , James Bottomley Subject: Re: [PATCH stable 3/4] block: fail SCSI passthrough ioctls on partition devices References: <1326772723.2819.167.camel@deadeye> <1326773222.2819.172.camel@deadeye> <4F1545A4.3000809@redhat.com> <1326862077.2819.210.camel@deadeye> <4F168A49.8000606@redhat.com> <1326902676.3271.10.camel@deadeye> In-Reply-To: <1326902676.3271.10.camel@deadeye> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: On 01/18/2012 05:04 PM, Ben Hutchings wrote: > > There is harm. You'll be blacklisting also the standard block device > > ioctls, and those won't work on 32-on-64 anymore. A system with 32-bit > > userland will likely not boot anymore. > > It does (yes, I tested that myself now). The standard block device > ioctls are handled without calling the driver's compat_ioctl. What about the non-compat path when done by non-root? * Does BLKROSET still return EACCES when run by non-root and without CAP_SYS_ADMIN? I suspect your patch is changing it to EINVAL. * Does BLKFLSBUF work when run by non-root but with CAP_SYS_ADMIN? Paolo