x86/MSI: drop workaround for insecure Dom0 kernels
authorJan Beulich <jbeulich@suse.com>
Tue, 22 Apr 2014 10:04:20 +0000 (12:04 +0200)
committerJan Beulich <jbeulich@suse.com>
Tue, 22 Apr 2014 10:04:20 +0000 (12:04 +0200)
commit061eebe0e99ad45c9c3b1a778b06140de4a91f25
tree68820b52472083accc79ef2ad79b1b3f67473604
parent01feb234d0cb3bff248694d99397fb63a9757490
x86/MSI: drop workaround for insecure Dom0 kernels

Considering that
- the workaround is expensive (iterating through the entire P2M space
  of a domain),
- the planned elimination of the expensiveness (by propagating the type
  change step by step to the individual P2M leaves) wouldn't address
  the IOMMU side of things (as for it to obey to the changed
  permissions the adjustments must be pushed down immediately through
  the entire tree)
- the proper solution (PHYSDEVOP_msix_prepare) should by now be
  implemented by all security conscious Dom0 kernels
remove the workaround, killing eventual guests that would be known to
become a security risk instead.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Kevin Tian <kevin.tian@intel.com>
xen/arch/x86/mm/p2m-ept.c
xen/arch/x86/msi.c