diff options
author | Keir Fraser <[email protected]> | 2010-11-24 22:08:20 -0800 |
---|---|---|
committer | Konrad Rzeszutek Wilk <[email protected]> | 2011-04-14 18:26:15 -0400 |
commit | 313d7b003ceceb797e8c0d18ab085ed0638b4aff (patch) | |
tree | 339506d76bb5850adb1203f2f7fd94784ec7541c /tools/perf/scripts/python/sched-migration.py | |
parent | a81135d90bf176e6139c352c7b96c03d00131836 (diff) |
blkback: Fix CVE-2010-3699
A guest can cause the backend driver to leak a kernel thread. Such
leaked threads hold references to the device, whichmakes the device
impossible to tear down. If shut down, the guest remains a zombie
domain, the xenwatch process hangs, and most xm commands will stop
working.
This patch tries to do the following for blkback:
- identify/extract idempotent teardown operations,
- add/move the invocation of said teardown operation
right before we're about to allocate new resources in the
Connected states.
[ linux-2.6.18-xen.hg 59f097ef181b ]
Signed-off-by: Laszlo Ersek <[email protected]>
Signed-off-by: Keir Fraser <[email protected]>
Signed-off-by: Jeremy Fitzhardinge <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/sched-migration.py')
0 files changed, 0 insertions, 0 deletions