• J
    iommu/vt-d: Prevent VMD child devices from being remapping targets · 5823e330
    Jon Derrick 提交于
    VMD child devices must use the VMD endpoint's ID as the requester.  Because
    of this, there needs to be a way to link the parent VMD endpoint's IOMMU
    group and associated mappings to the VMD child devices such that attaching
    and detaching child devices modify the endpoint's mappings, while
    preventing early detaching on a singular device removal or unbinding.
    
    The reassignment of individual VMD child devices devices to VMs is outside
    the scope of VMD, but may be implemented in the future. For now it is best
    to prevent any such attempts.
    
    Prevent VMD child devices from returning an IOMMU, which prevents it from
    exposing an iommu_group sysfs directory and allowing subsequent binding by
    userspace-access drivers such as VFIO.
    Signed-off-by: NJon Derrick <jonathan.derrick@intel.com>
    Signed-off-by: NBjorn Helgaas <bhelgaas@google.com>
    5823e330
intel-iommu.c 139.4 KB