[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH 0/2] Xen/mem_event: Do not rely on the toolstack being bug-free


  • To: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • From: "Aravindh Puthiyaparambil (aravindp)" <aravindp@xxxxxxxxx>
  • Date: Thu, 17 Jul 2014 19:01:56 +0000
  • Accept-language: en-US
  • Cc: Xen-devel <xen-devel@xxxxxxxxxxxxx>
  • Delivery-date: Thu, 17 Jul 2014 19:02:22 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xen.org>
  • Thread-index: AQHPofBLWffiriv/KUeB2ABJe/lp55uknMTA
  • Thread-topic: [Xen-devel] [PATCH 0/2] Xen/mem_event: Do not rely on the toolstack being bug-free

>Xen performs insufficient validation of the contents of mem_event responses
>from the toolstack.  As a result, a buggy toolstack could cause Xen to walk off
>the end of a domain's vcpu list, and get out of sync with vcpu pause reference
>counts.
>
>These two fixes are compile tested only, as I have no way to plausibly test the
>mem-event functionality itself.

One easy way of testing is to use the tools/tests/xen-access test program which 
exercises mem_access and thereby mem_event. It is fairly easy to run. Bring up 
a domain and execute " xen-access <domain_id> write|exec". But I understand if 
you are under time constraints and cannot do it. If you Cc me on these patches, 
I will gladly test them for you.

Thanks,
Aravindh

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.