diff options
author | Jan Beulich <jbeulich@suse.com> | 2013-05-02 16:46:02 +0200 |
---|---|---|
committer | Jan Beulich <jbeulich@suse.com> | 2013-05-02 16:46:02 +0200 |
commit | d1222afda4d27916580c28533762e362d64ace22 (patch) | |
tree | bb948d8c28906c1ad2fc11d80f64748631352052 /xen/arch/x86/mm.c | |
parent | b8efae696c9a2d46e91fa0eda739427efc16c250 (diff) | |
download | xen-d1222afda4d27916580c28533762e362d64ace22.tar.gz xen-d1222afda4d27916580c28533762e362d64ace22.tar.bz2 xen-d1222afda4d27916580c28533762e362d64ace22.zip |
x86: allow Dom0 read-only access to IO-APICs
There are BIOSes that want to map the IO-APIC MMIO region from some
ACPI method(s), and there is at least one BIOS flavor that wants to
use this mapping to clear an RTE's mask bit. While we can't allow the
latter, we can permit reads and simply drop write attempts, leveraging
the already existing infrastructure introduced for dealing with AMD
IOMMUs' representation as PCI devices.
This fixes an interrupt setup problem on a system where _CRS evaluation
involved the above described BIOS/ACPI behavior, and is expected to
also deal with a boot time crash of pv-ops Linux upon encountering the
same kind of system.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Keir Fraser <keir@xen.org>
Diffstat (limited to 'xen/arch/x86/mm.c')
-rw-r--r-- | xen/arch/x86/mm.c | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c index 051e06ebec..aef98d5783 100644 --- a/xen/arch/x86/mm.c +++ b/xen/arch/x86/mm.c @@ -151,6 +151,8 @@ unsigned long __read_mostly pdx_group_valid[BITS_TO_LONGS( bool_t __read_mostly machine_to_phys_mapping_valid = 0; +struct rangeset *__read_mostly mmio_ro_ranges; + #define PAGE_CACHE_ATTRS (_PAGE_PAT|_PAGE_PCD|_PAGE_PWT) bool_t __read_mostly opt_allow_superpage; |