diff options
author | Jan Beulich <jbeulich@suse.com> | 2013-02-05 15:20:47 +0100 |
---|---|---|
committer | Jan Beulich <jbeulich@suse.com> | 2013-02-05 15:20:47 +0100 |
commit | 94d4a1119d938aecd02a6df8111e97358161cbf5 (patch) | |
tree | 847b57e1aa363e8b7a77234fd6b550ff78965c0c /xen/include/asm-x86/hvm | |
parent | 32d48e594d48deeaa13f0a9ed82bf22e9c9ac567 (diff) | |
download | xen-94d4a1119d938aecd02a6df8111e97358161cbf5.tar.gz xen-94d4a1119d938aecd02a6df8111e97358161cbf5.tar.bz2 xen-94d4a1119d938aecd02a6df8111e97358161cbf5.zip |
AMD,IOMMU: Clean up old entries in remapping tables when creating new one
When changing the affinity of an IRQ associated with a passed
through PCI device, clear previous mapping.
This is XSA-36 / CVE-2013-0153.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
In addition, because some BIOSes may incorrectly program IVRS
entries for IOAPIC try to check for entry's consistency. Specifically,
if conflicting entries are found disable IOMMU if per-device
remapping table is used. If entries refer to bogus IOAPIC IDs
disable IOMMU unconditionally
Signed-off-by: Boris Ostrovsky <boris.ostrovsky@amd.com>
Diffstat (limited to 'xen/include/asm-x86/hvm')
-rw-r--r-- | xen/include/asm-x86/hvm/svm/amd-iommu-proto.h | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/xen/include/asm-x86/hvm/svm/amd-iommu-proto.h b/xen/include/asm-x86/hvm/svm/amd-iommu-proto.h index 72cc455053..06789bc148 100644 --- a/xen/include/asm-x86/hvm/svm/amd-iommu-proto.h +++ b/xen/include/asm-x86/hvm/svm/amd-iommu-proto.h @@ -101,6 +101,7 @@ int amd_setup_hpet_msi(struct msi_desc *msi_desc); extern struct ioapic_sbdf { u16 bdf, seg; + unsigned long *pin_setup; } ioapic_sbdf[MAX_IO_APICS]; extern void *shared_intremap_table; |