linux/drivers/vfio/platform
Peng Fan 9698cbf0be vfio: platform: support No-IOMMU mode
The vfio No-IOMMU mode was supported by this
'commit 03a76b60f8 ("vfio: Include No-IOMMU mode")',
but it only support vfio-pci.

Using vfio_iommu_group_get/put, but not iommu_group_get/put,
the platform devices can be exposed to userspace with
CONFIG_VFIO_NOIOMMU and the "enable_unsafe_noiommu_mode"
option enabled.

From 'commit 03a76b60f8 ("vfio: Include No-IOMMU mode")',
"This should make it very clear that this mode is not safe.
Additionally, CAP_SYS_RAWIO privileges are necessary to work
with groups and containers using this mode.  Groups making
use of this support are named /dev/vfio/noiommu-$GROUP and
can only make use of the special VFIO_NOIOMMU_IOMMU for the
container.  Use of this mode, specifically binding a device
without a native IOMMU group to a VFIO bus driver will taint
the kernel and should therefore not be considered supported."

Signed-off-by: Peng Fan <van.freenix@gmail.com>
Cc: Eric Auger <eric.auger@linaro.org>
Cc: Baptiste Reynal <b.reynal@virtualopensystems.com>
Cc: Alex Williamson <alex.williamson@redhat.com>
Reviewed-by: Eric Auger <eric.auger@redhat.com>
Signed-off-by: Alex Williamson <alex.williamson@redhat.com>
2016-06-23 09:37:17 -06:00
..
reset VFIO: platform: reset: fix a warning message condition 2015-12-21 15:28:11 -07:00
Kconfig VFIO: platform: enable ARM64 build 2015-06-22 09:35:47 -06:00
Makefile vfio: platform: introduce vfio-platform-base module 2015-11-03 12:54:56 -07:00
vfio_amba.c vfio: platform: introduce vfio-platform-base module 2015-11-03 12:54:56 -07:00
vfio_platform_common.c vfio: platform: support No-IOMMU mode 2016-06-23 09:37:17 -06:00
vfio_platform_irq.c VFIO: platform: clear IRQ_NOAUTOEN when de-assigning the IRQ 2015-10-27 15:02:53 -06:00
vfio_platform_private.h vfio: platform: add dev_info on device reset 2015-11-03 12:55:05 -07:00
vfio_platform.c vfio: Drop owner assignment from platform_driver 2015-11-19 15:52:08 -07:00