diff options
author | Alex Williamson <alex.williamson@redhat.com> | 2013-02-14 14:02:13 -0700 |
---|---|---|
committer | Alex Williamson <alex.williamson@redhat.com> | 2013-02-14 14:02:13 -0700 |
commit | 2b489a45f63102205cece37057c21f6fa66f6ce4 (patch) | |
tree | df611ac0d055cce871f1de978accff9d23e31e65 /drivers/vfio | |
parent | e014e9444aedc365742d533e1443b22470cc67b9 (diff) |
vfio: whitelist pcieport
pcieport does nice things like manage AER and we know it doesn't do
DMA or expose any user accessible devices on the host. It also keeps
the Memory, I/O, and Busmaster bits enabled, which is pretty handy
when trying to use anyting below it. Devices owned by pcieport cannot
be given to users via vfio, but we can tolerate them not being owned
by vfio-pci.
Signed-off-by: Alex Williamson <alex.williamson@redhat.com>
Diffstat (limited to 'drivers/vfio')
-rw-r--r-- | drivers/vfio/vfio.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/drivers/vfio/vfio.c b/drivers/vfio/vfio.c index 8e6dcecbc40..28e2d5b2c0c 100644 --- a/drivers/vfio/vfio.c +++ b/drivers/vfio/vfio.c @@ -442,7 +442,7 @@ static struct vfio_device *vfio_group_get_device(struct vfio_group *group, * a device. It's not always practical to leave a device within a group * driverless as it could get re-bound to something unsafe. */ -static const char * const vfio_driver_whitelist[] = { "pci-stub" }; +static const char * const vfio_driver_whitelist[] = { "pci-stub", "pcieport" }; static bool vfio_whitelisted_driver(struct device_driver *drv) { |