diff options
author | Niklas Cassel <niklas.cassel@wdc.com> | 2021-08-11 11:05:18 +0000 |
---|---|---|
committer | Jens Axboe <axboe@kernel.dk> | 2021-08-24 10:12:36 -0600 |
commit | ead3b768bb51259e3a5f2287ff5fc9041eb6f450 (patch) | |
tree | 341b117d7d9debcf01e9a49975ed498d28e3e2c9 /Documentation/networking/xfrm_proc.rst | |
parent | 158ee7b65653d9f841823c249014c2d0dfdeeb8f (diff) | |
download | linux-ead3b768bb51259e3a5f2287ff5fc9041eb6f450.tar.gz linux-ead3b768bb51259e3a5f2287ff5fc9041eb6f450.tar.bz2 linux-ead3b768bb51259e3a5f2287ff5fc9041eb6f450.zip |
blk-zoned: allow zone management send operations without CAP_SYS_ADMIN
Zone management send operations (BLKRESETZONE, BLKOPENZONE, BLKCLOSEZONE
and BLKFINISHZONE) should be allowed under the same permissions as write().
(write() does not require CAP_SYS_ADMIN).
Additionally, other ioctls like BLKSECDISCARD and BLKZEROOUT only check if
the fd was successfully opened with FMODE_WRITE.
(They do not require CAP_SYS_ADMIN).
Currently, zone management send operations require both CAP_SYS_ADMIN
and that the fd was successfully opened with FMODE_WRITE.
Remove the CAP_SYS_ADMIN requirement, so that zone management send
operations match the access control requirement of write(), BLKSECDISCARD
and BLKZEROOUT.
Fixes: 3ed05a987e0f ("blk-zoned: implement ioctls")
Signed-off-by: Niklas Cassel <niklas.cassel@wdc.com>
Reviewed-by: Damien Le Moal <damien.lemoal@wdc.com>
Reviewed-by: Aravind Ramesh <aravind.ramesh@wdc.com>
Reviewed-by: Adam Manzanares <a.manzanares@samsung.com>
Reviewed-by: Himanshu Madhani <himanshu.madhani@oracle.com>
Reviewed-by: Johannes Thumshirn <johannes.thumshirn@wdc.com>
Cc: stable@vger.kernel.org # v4.10+
Link: https://lore.kernel.org/r/20210811110505.29649-2-Niklas.Cassel@wdc.com
Signed-off-by: Jens Axboe <axboe@kernel.dk>
Diffstat (limited to 'Documentation/networking/xfrm_proc.rst')
0 files changed, 0 insertions, 0 deletions