Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756608Ab3EVUUK (ORCPT ); Wed, 22 May 2013 16:20:10 -0400 Received: from li9-11.members.linode.com ([67.18.176.11]:50906 "EHLO imap.thunk.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752843Ab3EVUUH (ORCPT ); Wed, 22 May 2013 16:20:07 -0400 Date: Wed, 22 May 2013 16:19:57 -0400 From: "Theodore Ts'o" To: Paolo Bonzini Cc: "Martin K. Petersen" , Tejun Heo , "James E.J. Bottomley" , Jens Axboe , linux-kernel@vger.kernel.org, linux-scsi@vger.kernel.org Subject: Re: PING^7 (was Re: [PATCH v2 00/14] Corrections and customization of the SG_IO command whitelist (CVE-2012-4542)) Message-ID: <20130522201957.GD20848@thunk.org> Mail-Followup-To: Theodore Ts'o , Paolo Bonzini , "Martin K. Petersen" , Tejun Heo , "James E.J. Bottomley" , Jens Axboe , linux-kernel@vger.kernel.org, linux-scsi@vger.kernel.org References: <20130522100212.GE3466@mtj.dyndns.org> <519C9CBC.3050003@redhat.com> <20130522134134.GA15189@mtj.dyndns.org> <519CD234.40608@redhat.com> <20130522150335.GC2777@thunk.org> <519CE9FE.2030007@redhat.com> <519CF99E.6010804@redhat.com> <20130522181135.GC20848@thunk.org> <519D1E92.7030505@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <519D1E92.7030505@redhat.com> User-Agent: Mutt/1.5.21 (2010-09-15) X-SA-Exim-Connect-IP: X-SA-Exim-Mail-From: tytso@thunk.org X-SA-Exim-Scanned: No (on imap.thunk.org); SAEximRunCond expanded to false Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1036 Lines: 22 On Wed, May 22, 2013 at 09:37:54PM +0200, Paolo Bonzini wrote: > > If it's not theoretical, how does the cloud service control who has > > access to the CD burner, and how are the disks loaded into the CD > > burner? > > CD burning would be used in a VM that runs on your local workstation, so > the VM gets access to the CD burner under your desk. There was also a > developer of a CD burning tool that wanted to test it inside BSD, > Solaris and Windows VMs; the idea is the same. So in both cases all of the VM's and the host OS are within the same trust boundary. This simplifies the security requirements than in the more generic cloud server caser where the VM's are mutually suspicious. This simplifies the requirements of what we need to push into the kernel, yes? - Ted -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/