On 01/05/2011 04:57 PM, Alex Williamson wrote:
A valid argument. I think it could also be argued that the user is
providing ownership of the file and writing to the file is part of the
low level details of the sysfs rom file API and should be handled by the
user of that API. We basically have 3 places we could put this:
A. kernel - Why is this file mode 0400 by default anyway if using
it requires write access? Set it to mode 0600 here by default.
B. libvirt - Already does chown, why not do chmod too? chmod and
restore here.
C. qemu - Owns file, chmod is trivial and part of the sysfs rom
file API? chmod around usage.
qemu might not actually own the file, just have rw permissions. Or it
might own the file and selinux may prevent it from changing the
permissions. Or it may die before the reverse chmod and leave things
not as they were.
I chose qemu because it seemed to have the least chance of side-effects
and has the smallest usage window. Do you prefer libvirt or kernel?
No idea really. What's the kernel's motivation for keeping it ro? Sanity?
I'd guess libvirt is the one to do it, but someone more familiar with
device assignment / pci (you?) should weigh in on this.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html