x86/P2M: relax guarding of MMIO entries
authorJan Beulich <jbeulich@suse.com>
Tue, 7 Sep 2021 07:39:38 +0000 (09:39 +0200)
committerJan Beulich <jbeulich@suse.com>
Tue, 7 Sep 2021 07:39:38 +0000 (09:39 +0200)
commit111469cc7b3f586c2335e70205320ed3c828b89e
tree19ae9dcebaaacd0f7bf2c67d91ff9318004114d1
parent5c10b96795ff546fbc9ba2f10141d4fb97e32672
x86/P2M: relax guarding of MMIO entries

One of the changes comprising the fixes for XSA-378 disallows replacing
MMIO mappings by code paths not intended for this purpose. At least in
the case of PVH Dom0 hitting an RMRR covered by an E820 ACPI region,
this is too strict. Generally short-circuit requests establishing the
same kind of mapping (mfn, type), but allow permissions to differ.

While there, also add a log message to the other domain_crash()
invocation that did prevent PVH Dom0 from coming up after the XSA-378
changes.

Fixes: 753cb68e6530 ("x86/p2m: guard (in particular) identity mapping entries")
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Andrew Cooper <andrew.cooper3@citrix.com>
xen/arch/x86/mm/p2m.c