• Peng Fan's avatar
    vfio: platform: support No-IOMMU mode · 9698cbf0
    Peng Fan authored
    The vfio No-IOMMU mode was supported by this
    'commit 03a76b60 ("vfio: Include No-IOMMU mode")',
    but it only support vfio-pci.
    
    Using vfio_iommu_group_get/put, but not iommu_group_get/put,
    the platform devices can be exposed to userspace with
    CONFIG_VFIO_NOIOMMU and the "enable_unsafe_noiommu_mode"
    option enabled.
    
    From 'commit 03a76b60 ("vfio: Include No-IOMMU mode")',
    "This should make it very clear that this mode is not safe.
    Additionally, CAP_SYS_RAWIO privileges are necessary to work
    with groups and containers using this mode.  Groups making
    use of this support are named /dev/vfio/noiommu-$GROUP and
    can only make use of the special VFIO_NOIOMMU_IOMMU for the
    container.  Use of this mode, specifically binding a device
    without a native IOMMU group to a VFIO bus driver will taint
    the kernel and should therefore not be considered supported."
    Signed-off-by: default avatarPeng Fan <van.freenix@gmail.com>
    Cc: Eric Auger <eric.auger@linaro.org>
    Cc: Baptiste Reynal <b.reynal@virtualopensystems.com>
    Cc: Alex Williamson <alex.williamson@redhat.com>
    Reviewed-by: default avatarEric Auger <eric.auger@redhat.com>
    Signed-off-by: default avatarAlex Williamson <alex.williamson@redhat.com>
    9698cbf0
vfio_platform_common.c 14 KB