From: Tian, Kevin
Sent: 05 May 2016 10:37...
Or a malicious guest driver for an ethernet card setting upAcutually, we are not aimed at accessing MSI-X table fromThen how do you prevent malicious guest kernel accessing it?
guest. So I think it's safe to passthrough MSI-X table if we
can make sure guest kernel would not touch MSI-X table in
normal code path such as para-virtualized guest kernel on PPC64.
the receive buffer ring to contain a single word entry that
contains the address associated with an MSI-X interrupt and
then using a loopback mode to cause a specific packet be
received that writes the required word through that address.
Remember the PCIe cycle for an interrupt is a normal memory write
cycle.
David