From mboxrd@z Thu Jan 1 00:00:00 1970 From: David Vrabel Subject: [PATCHv2 0/3] Xen: FIFO-based event channel ABI fixes Date: Thu, 31 Oct 2013 15:03:08 +0000 Message-ID: <1383231791-4604-1-git-send-email-david.vrabel@citrix.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: xen-devel@lists.xen.org Cc: Keir Fraser , David Vrabel , Jan Beulich List-Id: xen-devel@lists.xenproject.org This series addresses two design flaws in the FIFO-based event channel ABI. 1. Allow guests to expand the array after binding events. 2. Fix a potential DoS caused by an unbounded loop when setting LINK. An updated design document is available from: http://xenbits.xen.org/people/dvrabel/event-channels-G.pdf - Add section on memory barriers. - EVTCHNOP expand array should be called after binding events. - Guest clearing MASKED on a tail event is no longer valid, a hypercall is required. This allows the loop in the Xen's link() function to be bounded. v8 of the Linux patches will be posted shortly. Changes since v1: - Add MAINTAINERS patch - Remove some unnecessary temporary pending state clears - Add fix for DoS