aboutsummaryrefslogtreecommitdiffstats
path: root/drivers/xen/events
diff options
context:
space:
mode:
authorJuergen Gross <jgross@suse.com>2021-12-16 08:24:08 +0100
committerJuergen Gross <jgross@suse.com>2021-12-16 08:24:08 +0100
commitb27d47950e481f292c0a5ad57357edb9d95d03ba (patch)
tree70138903bebbabdfa8bb14f7f7dd286b50436a80 /drivers/xen/events
parentxen/blkfront: harden blkfront against event channel storms (diff)
downloadlinux-dev-b27d47950e481f292c0a5ad57357edb9d95d03ba.tar.xz
linux-dev-b27d47950e481f292c0a5ad57357edb9d95d03ba.zip
xen/netfront: harden netfront against event channel storms
The Xen netfront driver is still vulnerable for an attack via excessive number of events sent by the backend. Fix that by using lateeoi event channels. For being able to detect the case of no rx responses being added while the carrier is down a new lock is needed in order to update and test rsp_cons and the number of seen unconsumed responses atomically. This is part of XSA-391 Signed-off-by: Juergen Gross <jgross@suse.com> Reviewed-by: Jan Beulich <jbeulich@suse.com> --- V2: - don't eoi irq in case of interface set broken (Jan Beulich) - handle carrier off + no new responses added (Jan Beulich) V3: - add rx_ prefix to rsp_unconsumed (Jan Beulich) - correct xennet_set_rx_rsp_cons() spelling (Jan Beulich)
Diffstat (limited to 'drivers/xen/events')
0 files changed, 0 insertions, 0 deletions