From mboxrd@z Thu Jan 1 00:00:00 1970 From: David Vrabel Subject: Re: [PATCHv2 0/3] Xen: FIFO-based event channel ABI fixes Date: Thu, 31 Oct 2013 15:13:07 +0000 Message-ID: <52727383.90706@cantab.net> References: <1383231791-4604-1-git-send-email-david.vrabel@citrix.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <1383231791-4604-1-git-send-email-david.vrabel@citrix.com> List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: David Vrabel , xen-devel@lists.xen.org Cc: Keir Fraser , Jan Beulich List-Id: xen-devel@lists.xenproject.org Sorry Jan, wrong email address. On 31/10/2013 15:03, David Vrabel wrote: > This series addresses two design flaws in the FIFO-based event channel > ABI. > > 1. Allow guests to expand the array after binding events. > > 2. Fix a potential DoS caused by an unbounded loop when setting LINK. > > An updated design document is available from: > > http://xenbits.xen.org/people/dvrabel/event-channels-G.pdf > > - Add section on memory barriers. > - EVTCHNOP expand array should be called after binding events. > - Guest clearing MASKED on a tail event is no longer valid, a > hypercall is required. This allows the loop in the Xen's link() > function to be bounded. > > v8 of the Linux patches will be posted shortly. > > Changes since v1: > - Add MAINTAINERS patch > - Remove some unnecessary temporary pending state clears > - Add fix for DoS > > > _______________________________________________ > Xen-devel mailing list > Xen-devel@lists.xen.org > http://lists.xen.org/xen-devel >