public inbox for pve-devel@lists.proxmox.com
 help / color / mirror / Atom feed
* [pve-devel] [PATCH manager 0/2] fix small glitch in OSD destruction due to tainting
@ 2020-11-24 18:55 Stoiko Ivanov
  2020-11-24 18:55 ` [pve-devel] [PATCH manager 1/2] api2: osd destroy: fix error function Stoiko Ivanov
                   ` (2 more replies)
  0 siblings, 3 replies; 4+ messages in thread
From: Stoiko Ivanov @ 2020-11-24 18:55 UTC (permalink / raw)
  To: pve-devel

Saw the forum thread's subject [0]  and was reminded of the issue with the LIO
target provider recently [1].

Depending on feedback I might slowly be inclined to blindly untaint in
run_command again?


[0] https://forum.proxmox.com/threads/insecure-dependency-in-exec-during-osd-destroy.79574/
[1] https://lists.proxmox.com/pipermail/pve-devel/2020-October/045524.html

Stoiko Ivanov (2):
  api2: osd destroy: fix error function
  api2: osd destroy: untaint device before pvremove

 PVE/API2/Ceph/OSD.pm | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

-- 
2.20.1





^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2020-11-25 10:03 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-11-24 18:55 [pve-devel] [PATCH manager 0/2] fix small glitch in OSD destruction due to tainting Stoiko Ivanov
2020-11-24 18:55 ` [pve-devel] [PATCH manager 1/2] api2: osd destroy: fix error function Stoiko Ivanov
2020-11-24 18:55 ` [pve-devel] [PATCH manager 2/2] api2: osd destroy: untaint device before pvremove Stoiko Ivanov
2020-11-25 10:03 ` [pve-devel] applied: [PATCH manager 0/2] fix small glitch in OSD destruction due to tainting Thomas Lamprecht

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox
Service provided by Proxmox Server Solutions GmbH | Privacy | Legal