From: Keith Busch <keith.busch@intel.com> To: Christoph Hellwig <hch@infradead.org> Cc: Keith Busch <keith.busch@intel.com>, Yan Liu <yan@purestorage.com>, Matthew Wilcox <willy@linux.intel.com>, linux-kernel@vger.kernel.org, linux-nvme@lists.infradead.org Subject: Re: [PATCH 1/1] NVMe: Do not take nsid while a passthrough IO command is being issued via a block device file descriptor Date: Thu, 22 Jan 2015 15:21:28 +0000 (UTC) [thread overview] Message-ID: <alpine.LNX.2.00.1501221430040.15481@localhost.lm.intel.com> (raw) In-Reply-To: <20150122084517.GA2093@infradead.org> On Thu, 22 Jan 2015, Christoph Hellwig wrote: > On Thu, Jan 22, 2015 at 12:47:24AM +0000, Keith Busch wrote: >> The IOCTL's purpose was to let someone submit completely arbitrary >> commands on IO queues. This technically shouldn't even need a namespace >> handle, but we don't have a request_queue associated to IO queues without >> one like the admin queue has. In fact, we ought to fix that so we can >> issue IO commands without namespaces. > > Honestly, this sounds like a horrible idea. As namespaces aren't really > any different from SCSI LUNs they should only be accessible through > the device associated with the namespaces, and admin commands should > only be allowed through the character device (if at all). The case I considered was the "hidden" attribute in the NVMe LBA Range Type feature. It only indicates the storage should be hidden from the OS for general use, but the host may still use it for special purposes. In truth, the driver doesn't handle the hidden attribute very well and it doesn't seem like a well thought out feature in the spec anyway. But if you really need to restrict namespace access, shouldn't that be enforced on the target side with reservations or similar mechanism? I agree on your last point. Admin commands through namespaces carried over from before the management device existed, but removing it now will break some customer tooling. There's probably a responsible way to migrate. > For these security and usability reasons we did get rid of the > SG_FLAG_LUN_INHIBIT flag in the SCSI passthrough interface, which > allowed for similar horrible things in the distant past.
WARNING: multiple messages have this Message-ID (diff)
From: keith.busch@intel.com (Keith Busch) Subject: [PATCH 1/1] NVMe: Do not take nsid while a passthrough IO command is being issued via a block device file descriptor Date: Thu, 22 Jan 2015 15:21:28 +0000 (UTC) [thread overview] Message-ID: <alpine.LNX.2.00.1501221430040.15481@localhost.lm.intel.com> (raw) In-Reply-To: <20150122084517.GA2093@infradead.org> On Thu, 22 Jan 2015, Christoph Hellwig wrote: > On Thu, Jan 22, 2015@12:47:24AM +0000, Keith Busch wrote: >> The IOCTL's purpose was to let someone submit completely arbitrary >> commands on IO queues. This technically shouldn't even need a namespace >> handle, but we don't have a request_queue associated to IO queues without >> one like the admin queue has. In fact, we ought to fix that so we can >> issue IO commands without namespaces. > > Honestly, this sounds like a horrible idea. As namespaces aren't really > any different from SCSI LUNs they should only be accessible through > the device associated with the namespaces, and admin commands should > only be allowed through the character device (if at all). The case I considered was the "hidden" attribute in the NVMe LBA Range Type feature. It only indicates the storage should be hidden from the OS for general use, but the host may still use it for special purposes. In truth, the driver doesn't handle the hidden attribute very well and it doesn't seem like a well thought out feature in the spec anyway. But if you really need to restrict namespace access, shouldn't that be enforced on the target side with reservations or similar mechanism? I agree on your last point. Admin commands through namespaces carried over from before the management device existed, but removing it now will break some customer tooling. There's probably a responsible way to migrate. > For these security and usability reasons we did get rid of the > SG_FLAG_LUN_INHIBIT flag in the SCSI passthrough interface, which > allowed for similar horrible things in the distant past.
next prev parent reply other threads:[~2015-01-22 15:21 UTC|newest] Thread overview: 32+ messages / expand[flat|nested] mbox.gz Atom feed top 2015-01-22 0:28 [PATCH 1/1] NVMe: Do not take nsid while a passthrough IO command is being issued via a block device file descriptor Yan Liu 2015-01-22 0:28 ` Yan Liu 2015-01-22 0:47 ` Keith Busch 2015-01-22 0:47 ` Keith Busch 2015-01-22 8:45 ` Christoph Hellwig 2015-01-22 8:45 ` Christoph Hellwig 2015-01-22 15:21 ` Keith Busch [this message] 2015-01-22 15:21 ` Keith Busch 2015-01-22 15:49 ` Christoph Hellwig 2015-01-22 15:49 ` Christoph Hellwig 2015-01-22 16:58 ` Keith Busch 2015-01-22 16:58 ` Keith Busch [not found] ` <CADMsRTZjajAj682a5FH-AmpphoQ4vw5QxqnJiGEQ+Jg_f7TvoA@mail.gmail.com> 2015-01-22 14:22 ` Keith Busch 2015-01-22 14:22 ` Keith Busch 2015-01-23 0:02 Yan Liu 2015-01-23 0:02 ` Yan Liu 2015-01-23 7:57 ` Christoph Hellwig 2015-01-23 7:57 ` Christoph Hellwig 2015-01-23 16:22 ` Keith Busch 2015-01-23 16:22 ` Keith Busch 2015-01-23 17:27 ` Christoph Hellwig 2015-01-23 17:27 ` Christoph Hellwig 2015-01-23 17:50 ` Keith Busch 2015-01-23 17:50 ` Keith Busch 2015-01-25 14:41 ` Christoph Hellwig 2015-01-25 14:41 ` Christoph Hellwig 2015-01-23 23:57 Yan Liu 2015-01-23 23:57 ` Yan Liu 2015-01-25 14:59 ` Christoph Hellwig 2015-01-25 14:59 ` Christoph Hellwig 2015-01-26 18:02 ` Keith Busch 2015-01-26 18:02 ` Keith Busch
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=alpine.LNX.2.00.1501221430040.15481@localhost.lm.intel.com \ --to=keith.busch@intel.com \ --cc=hch@infradead.org \ --cc=linux-kernel@vger.kernel.org \ --cc=linux-nvme@lists.infradead.org \ --cc=willy@linux.intel.com \ --cc=yan@purestorage.com \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.