Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp495055ybe; Thu, 5 Sep 2019 00:57:05 -0700 (PDT) X-Google-Smtp-Source: APXvYqz3v9Pfz6YN/Q9lV96JgTlInjwNWvX4XJB9pKtMRPdSeGHKjO/en0/XZBpy8/YKU47nxt5F X-Received: by 2002:a17:902:aa48:: with SMTP id c8mr1980723plr.330.1567670224995; Thu, 05 Sep 2019 00:57:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567670224; cv=none; d=google.com; s=arc-20160816; b=u2w4h1XCQp/vorU108/GsouDxi0val4Tx5x+tgDD3P4M3tA2g4GWuV5yV30+0FpGch C1qMzFiBFSBvCnvzZLzF+mIMsw8pEl4oc2Ia5aBSV+vjPyWLEHzMZTyKX/9b30KgmV+S KcjpZU93SWabKhTxswG03ifPza/ZDNLutZfEy5/yB46yXeUlnLfVa/OoG++oODuKNr4d 4Mm6rp9cxklIFsvwHMTy7rMOv5d6Sgtm8dhL5XCadOouiREDPghF6Qz62WivW/PpHpcB ToQWwXoKEIZsXkSmAT7lN+kYvw9gi3ZToX78PtbOp7EO6MqXuLDfsL/uzyEkj06+n0sP bJCA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=QZFlK+vhW9UpQ94M2qyAX2rFwuzAPb7g7VIa0piuWWg=; b=DhVSdxnADMIZj1LqDfYBQJ4KFuO/HwpbJGgfROZd3a9oFwQr/6uqIkiRF0eiBIRHcb x8cwG/z9YWErPjKvNsjemTpk4MQj0SsvqOew1MhgGSkmK/YuYfKR8mBFtGWMxzvwOOVe dRam8jZX1HSpcGnFWAkOXnVo7TZRbn5WoTDZGJHwWZamjwC/4nOvWcUIOxNkO5/92SXt ajn+kW3XY0mWNWEMtV7tlnupcmWdOEYuOBBWWfXX50K+FEhCxqXsN+5Q8jywGuobmBSL hAMGY3Rr5K7H95gPVhVXEDeFGPjWMPX3HXRo4LeO9+RqkjIkHyh8UcDsAw+TX6JmPzJc t0sQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=hILCyJtf; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k13si1094896pfa.162.2019.09.05.00.56.49; Thu, 05 Sep 2019 00:57:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=hILCyJtf; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731993AbfIEHeT (ORCPT + 99 others); Thu, 5 Sep 2019 03:34:19 -0400 Received: from mail.kernel.org ([198.145.29.99]:45538 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731476AbfIEHeT (ORCPT ); Thu, 5 Sep 2019 03:34:19 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 383DF20828; Thu, 5 Sep 2019 07:34:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1567668858; bh=JyKjIUt2nlf6YhRXvLFSLhZ5RiYcJdGMf3i+c+LHOyk=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=hILCyJtfJoxzeUKKtq2YIyKtBjRhelF7MHD+I4Igc4EqLvqKPJg4gdPrGT68kKM/k D+lpZJ75X4dh0ucyS5F+2NaKgabPDOYV4C2XT+Hepz5ALgh7iGN/bxbHFZX5H6aWWF 7hVsBL7qlwVqTEGmiP588utsIMSqSJptHmZnfekU= Date: Thu, 5 Sep 2019 09:34:16 +0200 From: Greg KH To: Kelsey Skunberg Cc: bhelgaas@google.com, linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org, bodong@mellanox.com, linux-kernel-mentees@lists.linuxfoundation.org, skhan@linuxfoundation.org, ddutile@redhat.com, berrange@redhat.com, sathyanarayanan.kuppuswamy@linux.intel.com Subject: Re: [PATCH] PCI/IOV: Make SR-IOV attributes with mode 0664 use 0644 Message-ID: <20190905073416.GC29933@kroah.com> References: <20190905063226.43269-1-skunberg.kelsey@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190905063226.43269-1-skunberg.kelsey@gmail.com> User-Agent: Mutt/1.12.1 (2019-06-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Sep 05, 2019 at 12:32:26AM -0600, Kelsey Skunberg wrote: > sriov_numvfs and sriov_drivers_autoprobe have "unusual" permissions (0664) > with no reported or found reason for allowing group write permissions. > libvirt runs as root when dealing with PCI, and chowns files for qemu > needs. There is not a need for the "0664" permissions. > > sriov_numvfs was introduced in: > commit 1789382a72a5 ("PCI: SRIOV control and status via sysfs") > > sriov_drivers_autoprobe was introduced in: > commit 0e7df22401a3 ("PCI: Add sysfs sriov_drivers_autoprobe to > control VF driver binding") > > Change sriov_numvfs and sriov_drivers_autoprobe from "0664" permissions to > "0644" permissions. > > Exchange DEVICE_ATTR() with DEVICE_ATTR_RW() which sets the mode to "0644". > DEVICE_ATTR() should only be used for "unusual" permissions. > > Signed-off-by: Kelsey Skunberg > --- > drivers/pci/iov.c | 5 ++--- > 1 file changed, 2 insertions(+), 3 deletions(-) > > diff --git a/drivers/pci/iov.c b/drivers/pci/iov.c > index b335db21c85e..b3f972e8cfed 100644 > --- a/drivers/pci/iov.c > +++ b/drivers/pci/iov.c > @@ -375,12 +375,11 @@ static ssize_t sriov_drivers_autoprobe_store(struct device *dev, > } > > static DEVICE_ATTR_RO(sriov_totalvfs); > -static DEVICE_ATTR(sriov_numvfs, 0664, sriov_numvfs_show, sriov_numvfs_store); > +static DEVICE_ATTR_RW(sriov_numvfs); > static DEVICE_ATTR_RO(sriov_offset); > static DEVICE_ATTR_RO(sriov_stride); > static DEVICE_ATTR_RO(sriov_vf_device); > -static DEVICE_ATTR(sriov_drivers_autoprobe, 0664, sriov_drivers_autoprobe_show, > - sriov_drivers_autoprobe_store); > +static DEVICE_ATTR_RW(sriov_drivers_autoprobe); > > static struct attribute *sriov_dev_attrs[] = { > &dev_attr_sriov_totalvfs.attr, Nice!!! Reviewed-by: Greg Kroah-Hartman