[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[xen master] AMD/IOMMU: don't increase perms when splitting superpage

commit b8238afd076189c1e1b459752f78e8639b5c2a3a
Author:     Jan Beulich <jbeulich@xxxxxxxx>
AuthorDate: Fri Aug 20 12:31:08 2021 +0200
Commit:     Jan Beulich <jbeulich@xxxxxxxx>
CommitDate: Fri Aug 20 12:31:08 2021 +0200

    AMD/IOMMU: don't increase perms when splitting superpage
    The old (super)page's permissions ought to be propagated, rather than
    blindly allowing both reads and writes.
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Paul Durrant <paul@xxxxxxx>
 xen/drivers/passthrough/amd/iommu_map.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/xen/drivers/passthrough/amd/iommu_map.c 
index 1ed39bbee5..0d4dd7cc37 100644
--- a/xen/drivers/passthrough/amd/iommu_map.c
+++ b/xen/drivers/passthrough/amd/iommu_map.c
@@ -231,7 +231,7 @@ static int iommu_pde_from_dfn(struct domain *d, unsigned 
long dfn,
             next_table_mfn = mfn_x(page_to_mfn(table));
             set_iommu_ptes_present(next_table_mfn, pfn, mfn, 
-                                   next_level, true, true);
+                                   next_level, pde->iw, pde->ir);
             set_iommu_pde_present(pde, next_table_mfn, next_level, true,
generated by git-patchbot for /home/xen/git/xen.git#master



Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.