Skip to content

Conversation

@SeanTAllen
Copy link
Contributor

@SeanTAllen SeanTAllen commented Sep 10, 2021

Previously, we only had support for VPMem devices, however, under some scenarios, container
layer devices will be mounted as SCSI; for those scenarios, we will to enforce policy.

Currently, we only enforce policy for read-only devices in a guest as those are the only ones that
are container layers. The scratch space for containers is mounted as read-write and we do
not want enforce policy for them.

Actually dm-verity setup isn't included in this commit and will be added in a future change.

Signed-off-by: Sean T. Allen [email protected]

@SeanTAllen SeanTAllen requested a review from a team as a code owner September 10, 2021 17:14
@SeanTAllen
Copy link
Contributor Author

@anmaxvl @dcantah PTAL

@SeanTAllen SeanTAllen changed the title Add support for mounting devices via SCSI with dm-verity Add security policy enforcement for SCSI devices Sep 14, 2021
Copy link
Contributor

@anmaxvl anmaxvl left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

small nit, otherwise LGTM

Previously, we only had support for VPMem devices, however, under some scenarios, container
layer devices will be mounted as SCSI; for those scenarios, we will to enforce policy.

Currently, we only enforce policy for read-only devices in a guest as those are the only ones that
are container layers. The scratch space for containers is mounted as read-write and we do
not want enforce policy for them.

Actually dm-verity setup isn't included in this commit and will be added in a future change.

Signed-off-by: Sean T. Allen <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants