[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH 1/5] Add MSI support to XEN



[Keir Fraser]

> On 28/3/08 09:37, "Jiang, Yunhong" <yunhong.jiang@xxxxxxxxx> wrote:

>> DomainU (PV and hvm) should have no idea of vector. Do you think it
>> will matter if domain0 have such idea?  one thing missed here is,
>> if domainU want to access the MSI config spafce, pci backend should
>> return 0xff. Then it should be secure if domain0 can have idea of
>> vector.

> No, it's not a security risk for dom0 kernel to know about real
> vectors.  It's already part of the TCB.

> It's just a question of which is the cleanest design. And letting
> Xen get some access to PCI config space (just a little -- not a lot
> -- and under direction of dom0 kernel) will let it properly mask
> MSIs, which would be a nicer and deadlock-free alternative to the
> 'ACK-NEW' masking method.


With the introduction of VT-d interrupt remapping you might want to
relinquish some more control of the PCI config space to Xen anyway.
More precisely, the interrupt address and message data written into
the MSI capability structure or MSI-X Table will no longer be the
destination APIC id, interrupt type, vector, etc., for delivering the
interrupt.  Instead, the information goes into the interrupt remapping
table, and a special remappable message type goes into the capabilty
structure/MSI-X table.  This already happens for IOAPIC entries.  The
alternative is to put the interrupt remapping table under the control
of dom0.

        eSk


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.