> From: Jason Gunthorpe <jgg@xxxxxxxxxx> > Sent: Friday, December 9, 2022 4:26 AM > > In real HW "secure MSI" is implemented in a few different ways: > > - x86 uses "interrupt remapping" which is a block that sits between > the device and APIC, that can "remap" the MSI MemWr using per-RID > tables. Part of the remapping is discarding, the per-RID tables > will not contain vectors that have not been enabled for the device. > per-RID tables is true for AMD. However for Intel VT-d it's per-IOMMU remapping table.