[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [early RFC] ARM PCI Passthrough design document
Hi Roger, On 02/02/17 15:40, Roger Pau Monné wrote: On Wed, Feb 01, 2017 at 07:04:43PM +0000, Julien Grall wrote:Or maybe we could avoid mapping the doorbell in the guest and let Xen receive an SMMU abort. When receiving the SMMU abort, Xen could sanitize the value and write into the real MSI doorbell. Not sure if it would works thought.AFAIK (and I might be wrong) you can only know the address that caused the fault, but not the data that was attempted to be written there. TBH, I wouldn't expect this approach to work. You are right, I got confused with the data abort path. So I guess there is no way to do secure MSI in this case :/ Cheers, Roger. _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |