Bug 983521
Summary: | tgtadm: the read-only parameter does not work | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 6 | Reporter: | Xiaowei Li <xiaoli> |
Component: | scsi-target-utils | Assignee: | Andy Grover <agrover> |
Status: | CLOSED WONTFIX | QA Contact: | Bruno Goncalves <bgoncalv> |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | 6.4 | CC: | bgoncalv, mhoyer |
Target Milestone: | rc | Keywords: | FutureFeature |
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Enhancement | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2017-12-06 11:37:26 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Xiaowei Li
2013-07-11 11:12:25 UTC
This request was not resolved in time for the current release. Red Hat invites you to ask your support representative to propose this request, if still desired, for consideration in the next release of Red Hat Enterprise Linux. The problem is still reproducible on scsi-target-utils-1.0.24-16.el6 Still reproducible with scsi-target-utils-1.0.24-17.el6 kernel-2.6.32-592.el6 There are two parts. What tgt "readonly=1" does now is set the WP (write protect) bit in the lun's MODE SENSE response (e.g. "sg_modes /dev/sdb" you will see "WP=1"). If the underlying media were incapable of writes outside of iscsi, this would be the way for the initiator to know that. But tgt doesn't itself stop writes if the device actually isn't readonly. There's another feature called Software Write Protect (SWP) which actually enforces that writes are not performed. This is not in tgt 1.0.24 but it is in a later version, it would need to be backported to make the test case in comment 0 succeed. Or, just ensuring that tgt only had read access via Unix permissions to the backing store would also achieve the same goal. Red Hat Enterprise Linux 6 is in the Production 3 Phase. During the Production 3 Phase, Critical impact Security Advisories (RHSAs) and selected Urgent Priority Bug Fix Advisories (RHBAs) may be released as they become available. The official life cycle policy can be reviewed here: http://redhat.com/rhel/lifecycle This issue does not meet the inclusion criteria for the Production 3 Phase and will be marked as CLOSED/WONTFIX. If this remains a critical requirement, please contact Red Hat Customer Support to request a re-evaluation of the issue, citing a clear business justification. Note that a strong business justification will be required for re-evaluation. Red Hat Customer Support can be contacted via the Red Hat Customer Portal at the following URL: https://access.redhat.com/ |