At the moment DMA map/unmap requests are handled irrespective to
the container's state. This allows the user space to pin memory which
it might not be allowed to pin.

This adds checks to MAP/UNMAP that the container is enabled, otherwise
-EPERM is returned.

Signed-off-by: Alexey Kardashevskiy <a...@ozlabs.ru>
---
 drivers/vfio/vfio_iommu_spapr_tce.c | 6 ++++++
 1 file changed, 6 insertions(+)

diff --git a/drivers/vfio/vfio_iommu_spapr_tce.c 
b/drivers/vfio/vfio_iommu_spapr_tce.c
index 432a0de..d3ab34f 100644
--- a/drivers/vfio/vfio_iommu_spapr_tce.c
+++ b/drivers/vfio/vfio_iommu_spapr_tce.c
@@ -333,6 +333,9 @@ static long tce_iommu_ioctl(void *iommu_data,
                struct iommu_table *tbl = container->tbl;
                unsigned long tce;
 
+               if (!container->enabled)
+                       return -EPERM;
+
                if (!tbl)
                        return -ENXIO;
 
@@ -377,6 +380,9 @@ static long tce_iommu_ioctl(void *iommu_data,
                struct vfio_iommu_type1_dma_unmap param;
                struct iommu_table *tbl = container->tbl;
 
+               if (!container->enabled)
+                       return -EPERM;
+
                if (WARN_ON(!tbl))
                        return -ENXIO;
 
-- 
2.0.0

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to