don't allow Dom0 access to IOMMUs' MMIO pages
authorJan Beulich <jbeulich@suse.com>
Mon, 6 Oct 2014 09:15:01 +0000 (11:15 +0200)
committerJan Beulich <jbeulich@suse.com>
Mon, 6 Oct 2014 09:15:01 +0000 (11:15 +0200)
commitfdf30377fbc4fa6798bfda7d69e5d448c2b8e834
tree2592eb3fe6ea0b3eaf010c84c9d6e7595f0e0a29
parent9d8edc5a8b4a0937193f80da72abdb44c5aeaec6
don't allow Dom0 access to IOMMUs' MMIO pages

Just like for LAPIC, IO-APIC, MSI, and HT we shouldn't be granting Dom0
access to these. This implicitly results in these pages also getting
marked reserved in the machine memory map Dom0 uses to determine the
ranges where PCI devices can have their MMIO ranges placed.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
Acked-by: Kevin Tian <kevin.tian@intel.com>
xen/drivers/passthrough/amd/pci_amd_iommu.c
xen/drivers/passthrough/vtd/iommu.c