mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-11-17 01:04:19 +08:00
18c7a349d0
The current VFIO implementation allows pci-stub driver to be bound to a PCI device with other devices in the same IOMMU group being assigned to userspace. The pci-stub driver has no dependencies on DMA or the IOVA mapping of the device, but it does prevent the user from having direct access to the device, which is useful in some circumstances. The pci_dma_configure() marks the iommu_group as containing only devices with kernel drivers that manage DMA. For compatibility with the VFIO usage, avoid this default behavior for the pci_stub. This allows the pci_stub still able to be used by the admin to block driver binding after applying the DMA ownership to VFIO. Signed-off-by: Lu Baolu <baolu.lu@linux.intel.com> Reviewed-by: Jason Gunthorpe <jgg@nvidia.com> Acked-by: Bjorn Helgaas <bhelgaas@google.com> Link: https://lore.kernel.org/r/20220418005000.897664-6-baolu.lu@linux.intel.com Signed-off-by: Joerg Roedel <jroedel@suse.de>
97 lines
2.3 KiB
C
97 lines
2.3 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/*
|
|
* Simple stub driver to reserve a PCI device
|
|
*
|
|
* Copyright (C) 2008 Red Hat, Inc.
|
|
* Author:
|
|
* Chris Wright
|
|
*
|
|
* Usage is simple, allocate a new id to the stub driver and bind the
|
|
* device to it. For example:
|
|
*
|
|
* # echo "8086 10f5" > /sys/bus/pci/drivers/pci-stub/new_id
|
|
* # echo -n 0000:00:19.0 > /sys/bus/pci/drivers/e1000e/unbind
|
|
* # echo -n 0000:00:19.0 > /sys/bus/pci/drivers/pci-stub/bind
|
|
* # ls -l /sys/bus/pci/devices/0000:00:19.0/driver
|
|
* .../0000:00:19.0/driver -> ../../../bus/pci/drivers/pci-stub
|
|
*/
|
|
|
|
#include <linux/module.h>
|
|
#include <linux/pci.h>
|
|
|
|
static char ids[1024] __initdata;
|
|
|
|
module_param_string(ids, ids, sizeof(ids), 0);
|
|
MODULE_PARM_DESC(ids, "Initial PCI IDs to add to the stub driver, format is "
|
|
"\"vendor:device[:subvendor[:subdevice[:class[:class_mask]]]]\""
|
|
" and multiple comma separated entries can be specified");
|
|
|
|
static int pci_stub_probe(struct pci_dev *dev, const struct pci_device_id *id)
|
|
{
|
|
pci_info(dev, "claimed by stub\n");
|
|
return 0;
|
|
}
|
|
|
|
static struct pci_driver stub_driver = {
|
|
.name = "pci-stub",
|
|
.id_table = NULL, /* only dynamic id's */
|
|
.probe = pci_stub_probe,
|
|
.driver_managed_dma = true,
|
|
};
|
|
|
|
static int __init pci_stub_init(void)
|
|
{
|
|
char *p, *id;
|
|
int rc;
|
|
|
|
rc = pci_register_driver(&stub_driver);
|
|
if (rc)
|
|
return rc;
|
|
|
|
/* no ids passed actually */
|
|
if (ids[0] == '\0')
|
|
return 0;
|
|
|
|
/* add ids specified in the module parameter */
|
|
p = ids;
|
|
while ((id = strsep(&p, ","))) {
|
|
unsigned int vendor, device, subvendor = PCI_ANY_ID,
|
|
subdevice = PCI_ANY_ID, class = 0, class_mask = 0;
|
|
int fields;
|
|
|
|
if (!strlen(id))
|
|
continue;
|
|
|
|
fields = sscanf(id, "%x:%x:%x:%x:%x:%x",
|
|
&vendor, &device, &subvendor, &subdevice,
|
|
&class, &class_mask);
|
|
|
|
if (fields < 2) {
|
|
pr_warn("pci-stub: invalid ID string \"%s\"\n", id);
|
|
continue;
|
|
}
|
|
|
|
pr_info("pci-stub: add %04X:%04X sub=%04X:%04X cls=%08X/%08X\n",
|
|
vendor, device, subvendor, subdevice, class, class_mask);
|
|
|
|
rc = pci_add_dynid(&stub_driver, vendor, device,
|
|
subvendor, subdevice, class, class_mask, 0);
|
|
if (rc)
|
|
pr_warn("pci-stub: failed to add dynamic ID (%d)\n",
|
|
rc);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void __exit pci_stub_exit(void)
|
|
{
|
|
pci_unregister_driver(&stub_driver);
|
|
}
|
|
|
|
module_init(pci_stub_init);
|
|
module_exit(pci_stub_exit);
|
|
|
|
MODULE_LICENSE("GPL");
|
|
MODULE_AUTHOR("Chris Wright <chrisw@sous-sol.org>");
|