[PATCH 5/5] vfio-pci: Allow to mmap MSI-X table if interrupt remapping is supported
David.Laight at ACULAB.COM
Thu May 5 19:54:07 AEST 2016
From: Tian, Kevin
> Sent: 05 May 2016 10:37
> > Acutually, we are not aimed at accessing MSI-X table from
> > guest. So I think it's safe to passthrough MSI-X table if we
> > can make sure guest kernel would not touch MSI-X table in
> > normal code path such as para-virtualized guest kernel on PPC64.
> Then how do you prevent malicious guest kernel accessing it?
Or a malicious guest driver for an ethernet card setting up
the receive buffer ring to contain a single word entry that
contains the address associated with an MSI-X interrupt and
then using a loopback mode to cause a specific packet be
received that writes the required word through that address.
Remember the PCIe cycle for an interrupt is a normal memory write
More information about the Linuxppc-dev