]> xenbits.xensource.com Git - people/royger/linux-2.6.18-xen.git/commit
blkback/blktap/netback: Fix CVE-2010-3699
authorKeir Fraser <keir@xen.org>
Tue, 23 Nov 2010 13:58:38 +0000 (13:58 +0000)
committerKeir Fraser <keir@xen.org>
Tue, 23 Nov 2010 13:58:38 +0000 (13:58 +0000)
commitef9e715c419c25f9103d706abb103e503551a6df
treed75f2f3c320a78669b21a658e5f59f72bd38aae0
parent8a2b39b1f1e665d0e05cda5548d7b783a968d794
blkback/blktap/netback: Fix CVE-2010-3699

A guest can cause the backend driver to leak a kernel
thread. Such leaked threads hold references to the device, whichmakes
the device impossible to tear down. If shut down, the guest remains a
zombie domain, the xenwatch process hangs, and most xm commands will
stop working.

This patch tries to do the following, for all of netback, blkback,
blktap:
    - identify/extract idempotent teardown operations,
    - add/move the invocation of said teardown operation
      right before we're about to allocate new resources in the
      Connected states.

Signed-off-by: Laszlo Ersek <lersek@redhat.com>
drivers/xen/blkback/xenbus.c
drivers/xen/blktap/xenbus.c
drivers/xen/netback/xenbus.c