1. 26 12月, 2011 1 次提交
    • A
      KVM: Device assignment permission checks · 3d27e23b
      Alex Williamson 提交于
      Only allow KVM device assignment to attach to devices which:
      
       - Are not bridges
       - Have BAR resources (assume others are special devices)
       - The user has permissions to use
      
      Assigning a bridge is a configuration error, it's not supported, and
      typically doesn't result in the behavior the user is expecting anyway.
      Devices without BAR resources are typically chipset components that
      also don't have host drivers.  We don't want users to hold such devices
      captive or cause system problems by fencing them off into an iommu
      domain.  We determine "permission to use" by testing whether the user
      has access to the PCI sysfs resource files.  By default a normal user
      will not have access to these files, so it provides a good indication
      that an administration agent has granted the user access to the device.
      
      [Yang Bai: add missing #include]
      [avi: fix comment style]
      Signed-off-by: NAlex Williamson <alex.williamson@redhat.com>
      Signed-off-by: NYang Bai <hamo.by@gmail.com>
      Signed-off-by: NMarcelo Tosatti <mtosatti@redhat.com>
      3d27e23b
  2. 25 12月, 2011 1 次提交
  3. 08 12月, 2011 1 次提交
  4. 07 12月, 2011 1 次提交
  5. 06 12月, 2011 3 次提交
  6. 01 12月, 2011 1 次提交
  7. 29 11月, 2011 6 次提交
  8. 23 11月, 2011 1 次提交
  9. 16 11月, 2011 4 次提交
  10. 10 11月, 2011 1 次提交
  11. 09 11月, 2011 2 次提交
  12. 08 11月, 2011 1 次提交
  13. 07 11月, 2011 2 次提交
  14. 06 11月, 2011 1 次提交
  15. 05 11月, 2011 10 次提交
  16. 04 11月, 2011 4 次提交