From mboxrd@z Thu Jan 1 00:00:00 1970 From: Avi Kivity Subject: Re: strange error loading kvm module on latest FC6 kernel Date: Thu, 08 Mar 2007 15:52:04 +0200 Message-ID: <45F01504.5050403@qumranet.com> References: <1173241719.4317.5.camel@greg-linux.ncs.co.nz> <45EE62F6.3060300@qumranet.com> <45F011A2.6080209@redhat.com> <1173361148.10467.30.camel@moss-spartans.epoch.ncsc.mil> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Cc: Greg M Lee , kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org, Daniel J Walsh , Karl MacMillan To: Stephen Smalley Return-path: In-Reply-To: <1173361148.10467.30.camel-/ugcdrsPCSfIm9DtXLC9OUVfdvkotuLY+aIohriVLy8@public.gmane.org> List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: kvm-devel-bounces-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org Errors-To: kvm-devel-bounces-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org List-Id: kvm.vger.kernel.org Stephen Smalley wrote: >> I will add this fs to policy. >> > > What are the protection requirements for it? What should be allowed to > access it? > > It's unmountable, so no one outside the kernel should be able to access it. Within the kernel, if you have access to the /dev/kvm inode, you should be able to access it. 2.6.22 may have an anonymous inode internal filesystem, which will supercede kvmfs (and eventpollfs and friends) -- error compiling committee.c: too many arguments to function ------------------------------------------------------------------------- Take Surveys. Earn Cash. Influence the Future of IT Join SourceForge.net's Techsay panel and you'll get the chance to share your opinions on IT & business topics through brief surveys-and earn cash http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV