linux-stable/virt/kvm
Alex Williamson 48bb09eee4 KVM: remove CAP_SYS_RAWIO requirement from kvm_vm_ioctl_assign_irq
Remove this check in an effort to allow kvm guests to run without
root privileges.  This capability check doesn't seem to add any
security since the device needs to have already been added via the
assign device ioctl and the io actually occurs through the pci
sysfs interface.

Signed-off-by: Alex Williamson <alex.williamson@redhat.com>
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
2010-08-01 10:35:45 +03:00
..
assigned-dev.c KVM: remove CAP_SYS_RAWIO requirement from kvm_vm_ioctl_assign_irq 2010-08-01 10:35:45 +03:00
coalesced_mmio.c KVM: coalesced_mmio: fix kvm_coalesced_mmio_init()'s error handling 2010-05-17 12:15:53 +03:00
coalesced_mmio.h KVM: Simplify coalesced mmio initialization 2010-03-01 12:35:41 -03:00
eventfd.c include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h 2010-03-30 22:02:32 +09:00
ioapic.c KVM: read apic->irr with ioapic lock held 2010-06-10 20:29:03 +03:00
ioapic.h KVM: convert ioapic lock to spinlock 2010-05-13 01:23:55 -03:00
iodev.h KVM: remove in_range from io devices 2009-09-10 08:33:05 +03:00
iommu.c KVM: Fix order passed to iommu_unmap 2010-06-09 18:48:38 +03:00
irq_comm.c include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h 2010-03-30 22:02:32 +09:00
Kconfig KVM: Add KVM_MMIO kconfig item 2010-03-01 12:35:41 -03:00
kvm_main.c KVM: Avoid killing userspace through guest SRAO MCE on unmapped pages 2010-08-01 10:35:26 +03:00