Re: [PATCH v2] device-assignment: chmod the rom file before opening read/write

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 01/05/2011 04:57 PM, Alex Williamson wrote:
A valid argument.  I think it could also be argued that the user is
providing ownership of the file and writing to the file is part of the
low level details of the sysfs rom file API and should be handled by the
user of that API.  We basically have 3 places we could put this:

      A. kernel - Why is this file mode 0400 by default anyway if using
         it requires write access?  Set it to mode 0600 here by default.
      B. libvirt - Already does chown, why not do chmod too?  chmod and
         restore here.
      C. qemu - Owns file, chmod is trivial and part of the sysfs rom
         file API?  chmod around usage.


qemu might not actually own the file, just have rw permissions. Or it might own the file and selinux may prevent it from changing the permissions. Or it may die before the reverse chmod and leave things not as they were.

I chose qemu because it seemed to have the least chance of side-effects
and has the smallest usage window.  Do you prefer libvirt or kernel?

No idea really.  What's the kernel's motivation for keeping it ro?  Sanity?

I'd guess libvirt is the one to do it, but someone more familiar with device assignment / pci (you?) should weigh in on this.

--
error compiling committee.c: too many arguments to function

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]
  Powered by Linux