[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [early RFC] ARM PCI Passthrough design document



Hi Roger,

On 02/02/17 15:40, Roger Pau Monné wrote:
On Wed, Feb 01, 2017 at 07:04:43PM +0000, Julien Grall wrote:
Or maybe we could avoid mapping the doorbell in the guest and let Xen
receive an SMMU abort. When receiving the SMMU abort, Xen could sanitize the
value and write into the real MSI doorbell. Not sure if it would works
thought.

AFAIK (and I might be wrong) you can only know the address that caused the
fault, but not the data that was attempted to be written there. TBH, I wouldn't
expect this approach to work.

You are right, I got confused with the data abort path. So I guess there is no way to do secure MSI in this case :/

Cheers,


Roger.


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.