Hide Forgot
The following patches have been forward ported recently to pvops from 2.6.18-xen.hg: * 324:7fe1c6d02a2b * 325:b2768401db94 * 988:c88a02a22a05 * 990:427276ac595d * 991:9ba6d9f3fbc0 For RHEL5 the issue could even be exploited by a malicious domU to cause a DoS towards any domain whose backends have higher event channel numbers. I doubt it's severe enough to need a CVE, though. There is also no hurry to backport them to RHEL6 pvops (where we have no dom0 support), but it could be done for 6.2/6.3.
To test, start 5-10 guests 1 minute from each other, possibly with drives backed by a ram-disk (i.e. large files in tmpfs). fsmark/iozone on the guests should give roughly the same performance.
c/s 324 and 325 went in as part of bug 456171; the others are cleanups, or otherwise provide diminishing returns. Not worth it. *** This bug has been marked as a duplicate of bug 456171 ***