From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from vps0.lunn.ch (vps0.lunn.ch [156.67.10.101]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 6DDA7197A67; Tue, 25 Feb 2025 17:30:46 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=156.67.10.101 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1740504648; cv=none; b=rAwXwuXImNZnHTNql5VTeUBrmNwVCYFOtpTJPqkCOlfSEkzeI5Ro+p38HIuTflfI6R4q9zlAQWqKj/TzF95W5u7U83Uz8SaQrP/WPLuNNom+fDJSrQX7ePwW8wTvlGugihHNX5x0Dc0q28XaLOsGyf/E8YxjbTvnoQFwcVWeb7s= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1740504648; c=relaxed/simple; bh=itwgK22G9rllbagjd/8jiNO6p0Fq5QxWo+ez3b+qMAs=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=ly0K5mgYg/BZausavHXJUGQmIq5mHvxwmy7ChMv8zxhFuUxgjcmKohC289T+QnSmqDPsAHUKSF6qCBekq3BD4WuX0XBvRgH5BLCfU2yQVaDQkrrWGXlqhwvIH2mE+oANCZLvyAnHI/fEW2nEx1XkZzpweDH8t6x1e2vng3lRS/I= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=lunn.ch; spf=pass smtp.mailfrom=lunn.ch; dkim=pass (1024-bit key) header.d=lunn.ch header.i=@lunn.ch header.b=tpqM2TGw; arc=none smtp.client-ip=156.67.10.101 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=lunn.ch Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=lunn.ch Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=lunn.ch header.i=@lunn.ch header.b="tpqM2TGw" DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lunn.ch; s=20171124; h=In-Reply-To:Content-Disposition:Content-Type:MIME-Version: References:Message-ID:Subject:Cc:To:From:Date:From:Sender:Reply-To:Subject: Date:Message-ID:To:Cc:MIME-Version:Content-Type:Content-Transfer-Encoding: Content-ID:Content-Description:Content-Disposition:In-Reply-To:References; bh=PoNy04ufD75FmyL3FJfDlJ+7bfM+YkXytgxrTMkPUTA=; b=tpqM2TGwG8r9JI43TiUsJZQcyV N9QO1ezGwHjR2jGSg2DWKw7IZMrQHjxQSjawlFNPZvaa3Bk1qJ4f8DeGF+TfoSOStek9kDCizeVqN 092U3o64glZQQ2yDCbcURyVpo49zDdnuUcgq8IilS6S3WNpRIubzydAv62Rgm4aTiMxE=; Received: from andrew by vps0.lunn.ch with local (Exim 4.94.2) (envelope-from ) id 1tmylF-00HaE9-TD; Tue, 25 Feb 2025 18:30:25 +0100 Date: Tue, 25 Feb 2025 18:30:25 +0100 From: Andrew Lunn To: Leon Romanovsky Cc: Bjorn Helgaas , Krzysztof =?utf-8?Q?Wilczy=C5=84ski?= , linux-pci@vger.kernel.org, Ariel Almog , Aditya Prabhune , Hannes Reinecke , Heiner Kallweit , Arun Easi , Jonathan Chocron , Bert Kenward , Matt Carlson , Kai-Heng Feng , Jean Delvare , Alex Williamson , linux-kernel@vger.kernel.org, netdev@vger.kernel.org, Jakub Kicinski , Thomas =?iso-8859-1?Q?Wei=DFschuh?= , Stephen Hemminger Subject: Re: [PATCH v4] PCI/sysfs: Change read permissions for VPD attributes Message-ID: <7ff54e42-a76c-42b1-b95c-1dd2ee47fe93@lunn.ch> References: <20250225160542.GA507421@bhelgaas> <20250225165746.GH53094@unreal> Precedence: bulk X-Mailing-List: linux-pci@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20250225165746.GH53094@unreal> > We always read VPD by using "sudo ..." command, until one of our customers > requested to provide a way to run monitoring library without any root access. > It runs on hypervisor and being non-root there is super important for them. You can chmod files in sys. So the administrator can change the permissions, and then non-root users can access it. This seems a more scalable solution that adding a special case in the kernel. Andrew