diff options
author | Juergen Gross <jgross@suse.com> | 2020-09-14 14:01:02 +0200 |
---|---|---|
committer | Juergen Gross <jgross@suse.com> | 2020-10-20 10:22:19 +0200 |
commit | 5f7f77400ab5b357b5fdb7122c3442239672186c (patch) | |
tree | 97e21b64edbc6345af5aec7658a358200e80cddb /include/xen | |
parent | xen/events: defer eoi in case of excessive number of events (diff) | |
download | linux-5f7f77400ab5b357b5fdb7122c3442239672186c.tar.xz linux-5f7f77400ab5b357b5fdb7122c3442239672186c.zip |
xen/events: block rogue events for some time
In order to avoid high dom0 load due to rogue guests sending events at
high frequency, block those events in case there was no action needed
in dom0 to handle the events.
This is done by adding a per-event counter, which set to zero in case
an EOI without the XEN_EOI_FLAG_SPURIOUS is received from a backend
driver, and incremented when this flag has been set. In case the
counter is 2 or higher delay the EOI by 1 << (cnt - 2) jiffies, but
not more than 1 second.
In order not to waste memory shorten the per-event refcnt to two bytes
(it should normally never exceed a value of 2). Add an overflow check
to evtchn_get() to make sure the 2 bytes really won't overflow.
This is part of XSA-332.
Cc: stable@vger.kernel.org
Signed-off-by: Juergen Gross <jgross@suse.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Stefano Stabellini <sstabellini@kernel.org>
Reviewed-by: Wei Liu <wl@xen.org>
Diffstat (limited to 'include/xen')
0 files changed, 0 insertions, 0 deletions