aboutsummaryrefslogtreecommitdiffstats
path: root/xen/include/asm-x86/hvm
diff options
context:
space:
mode:
authorJan Beulich <jbeulich@suse.com>2013-02-05 15:20:47 +0100
committerJan Beulich <jbeulich@suse.com>2013-02-05 15:20:47 +0100
commit94d4a1119d938aecd02a6df8111e97358161cbf5 (patch)
tree847b57e1aa363e8b7a77234fd6b550ff78965c0c /xen/include/asm-x86/hvm
parent32d48e594d48deeaa13f0a9ed82bf22e9c9ac567 (diff)
downloadxen-94d4a1119d938aecd02a6df8111e97358161cbf5.tar.gz
xen-94d4a1119d938aecd02a6df8111e97358161cbf5.tar.bz2
xen-94d4a1119d938aecd02a6df8111e97358161cbf5.zip
AMD,IOMMU: Clean up old entries in remapping tables when creating new one
When changing the affinity of an IRQ associated with a passed through PCI device, clear previous mapping. This is XSA-36 / CVE-2013-0153. Signed-off-by: Jan Beulich <jbeulich@suse.com> In addition, because some BIOSes may incorrectly program IVRS entries for IOAPIC try to check for entry's consistency. Specifically, if conflicting entries are found disable IOMMU if per-device remapping table is used. If entries refer to bogus IOAPIC IDs disable IOMMU unconditionally Signed-off-by: Boris Ostrovsky <boris.ostrovsky@amd.com>
Diffstat (limited to 'xen/include/asm-x86/hvm')
-rw-r--r--xen/include/asm-x86/hvm/svm/amd-iommu-proto.h1
1 files changed, 1 insertions, 0 deletions
diff --git a/xen/include/asm-x86/hvm/svm/amd-iommu-proto.h b/xen/include/asm-x86/hvm/svm/amd-iommu-proto.h
index 72cc455053..06789bc148 100644
--- a/xen/include/asm-x86/hvm/svm/amd-iommu-proto.h
+++ b/xen/include/asm-x86/hvm/svm/amd-iommu-proto.h
@@ -101,6 +101,7 @@ int amd_setup_hpet_msi(struct msi_desc *msi_desc);
extern struct ioapic_sbdf {
u16 bdf, seg;
+ unsigned long *pin_setup;
} ioapic_sbdf[MAX_IO_APICS];
extern void *shared_intremap_table;