On Wed, 2010-05-19 at 12:00 -0700, Chris Wright wrote: > When libvirt launches a guest it first chowns the relevenat > /sys/bus/pci/.../config file for an assigned device then drops privileges. > > This causes an issue for device assignment because despite being file > owner, the sysfs config space file checks for CAP_SYS_ADMIN before > allowing access to device dependent config space. > > This adds a new qdev configfd property which allows libvirt to open the > sysfs config space file and give qemu an already opened file descriptor. > Along with a change pending for the 2.6.35 kernel, this allows the > capability check to compare against privileges from when the file was > opened. > > Signed-off-by: Chris Wright <chrisw@xxxxxxxxxx> > --- > hw/device-assignment.c | 12 ++++++++---- > 1 files changed, 8 insertions(+), 4 deletions(-) Acked-by: Alex Williamson <alex.williamson@xxxxxxxxxx> -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html