From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-5.8 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id AD662C433EF for ; Tue, 14 Sep 2021 08:29:39 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 8CABD604D1 for ; Tue, 14 Sep 2021 08:29:39 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230072AbhINIaz (ORCPT ); Tue, 14 Sep 2021 04:30:55 -0400 Received: from Galois.linutronix.de ([193.142.43.55]:60230 "EHLO galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229458AbhINIax (ORCPT ); Tue, 14 Sep 2021 04:30:53 -0400 From: Thomas Gleixner DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020; t=1631608175; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=uHkQ2f03H/PuJHXm8XPlJhTMFmQaWQv3oameKd/9pIM=; b=Fj0aHeO69qk/iu1WeOScRO/audTzEodFbNV1WK85R/QJT0mRZdUMh1SxUU7ps0Pg+pBQyr E4BJ5vTRFeo5EUPSd5htXSrL8QFHGlpaXZ3U3XICyes1/cp0K90pfF6JckbCE9FUCWTwl5 AlA/ZfKlDHQ7OKmFUQ8bIC0Cc7jNKc7WlUr1+2KrvTkV4Mk0sh+LQD3ayuQmgSJXOl9w6s psPsp59bFHrP+rE2736xe38iF9kL+EpFtGDOaxrqhjC5t71n8bZvrw9hNd/xlwJdoCPq3P p5a6CGsUBrceiJRgK7yAWu9ivH76OxFbaOIZkvVjZlLjOuNnQW7tpKnT7esEoA== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020e; t=1631608175; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=uHkQ2f03H/PuJHXm8XPlJhTMFmQaWQv3oameKd/9pIM=; b=cNiMAtDbpBa10XpUJgI4NVAbvk88gwVvjrYB/S9/ooE1FdRTbPykAQS5QAHOo/8KAhxh1s XJcVOXKp4ZcLuHBQ== To: "Michael S. Tsirkin" Cc: Jason Wang , virtualization , linux-kernel , "Hetzelt, Felicitas" , "kaplan, david" , Konrad Rzeszutek Wilk , pbonzini , Andi Kleen , Dan Williams , "Kuppuswamy, Sathyanarayanan" , Ingo Molnar , Borislav Petkov , Peter Zijlstra , Andy Lutomirski , Bjorn Helgaas , Richard Henderson , Thomas Bogendoerfer , James E J Bottomley , Helge Deller , "David S . Miller" , Arnd Bergmann , Jonathan Corbet , Peter H Anvin , Dave Hansen , Tony Luck , Kirill Shutemov , Sean Christopherson , Kuppuswamy Sathyanarayanan , X86 ML Subject: Re: [PATCH 6/9] virtio_pci: harden MSI-X interrupts In-Reply-To: <20210913164934-mutt-send-email-mst@kernel.org> References: <20210913055353.35219-1-jasowang@redhat.com> <20210913055353.35219-7-jasowang@redhat.com> <20210913015711-mutt-send-email-mst@kernel.org> <20210913022257-mutt-send-email-mst@kernel.org> <20210913023626-mutt-send-email-mst@kernel.org> <20210913024153-mutt-send-email-mst@kernel.org> <87bl4wfeq1.ffs@tglx> <20210913164934-mutt-send-email-mst@kernel.org> Date: Tue, 14 Sep 2021 10:29:35 +0200 Message-ID: <878rzzef0w.ffs@tglx> MIME-Version: 1.0 Content-Type: text/plain Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Sep 13 2021 at 16:54, Michael S. Tsirkin wrote: > On Mon, Sep 13, 2021 at 09:38:30PM +0200, Thomas Gleixner wrote: >> and disable it again >> before reset() is invoked. That's a question of general robustness and >> not really a question of trusted hypervisors and encrypted guests. > > We can do this for some MSIX interrupts, sure. Not for shared interrupts though. But you have to make sure that the handler does not run before and after the defined points. And that's even more important for shared because with shared interrupts the interrupt can be raised at any point in time via the other devices which share the line. Thanks, tglx