On 09/21/2010 03:02 AM, Giovanni Bellac wrote:
> Hello
>
> I have used my 2.6.32.20 config and compiled now a 2.6.32.22 from
> kernel.org.
> 2.6.32.22 has the important security fix (local user can be root with
> a exploit).
Does this help?
Thanks,
J
From: Jeremy Fitzhardinge <jeremy.fitzhardinge@xxxxxxxxxx>
Date: Wed, 22 Sep 2010 15:28:52 -0700
Subject: [PATCH] xen: set up IRQ before binding virq to evtchn
Make sure the irq is set up before binding a virq event channel to it.
Signed-off-by: Jeremy Fitzhardinge <jeremy.fitzhardinge@xxxxxxxxxx>
diff --git a/drivers/xen/events.c b/drivers/xen/events.c
index 3132a5e..cd17f86 100644
--- a/drivers/xen/events.c
+++ b/drivers/xen/events.c
@@ -426,6 +426,11 @@ static int bind_virq_to_irq(unsigned int virq, unsigned
int cpu)
irq = per_cpu(virq_to_irq, cpu)[virq];
if (irq == -1) {
+ irq = find_unbound_irq();
+
+ set_irq_chip_and_handler_name(irq, &xen_percpu_chip,
+ handle_percpu_irq, "virq");
+
bind_virq.virq = virq;
bind_virq.vcpu = cpu;
if (HYPERVISOR_event_channel_op(EVTCHNOP_bind_virq,
@@ -433,11 +438,6 @@ static int bind_virq_to_irq(unsigned int virq, unsigned
int cpu)
BUG();
evtchn = bind_virq.port;
- irq = find_unbound_irq();
-
- set_irq_chip_and_handler_name(irq, &xen_percpu_chip,
- handle_percpu_irq, "virq");
-
evtchn_to_irq[evtchn] = irq;
irq_info[irq] = mk_virq_info(evtchn, virq);
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|