diff options
author | V3n3RiX <venerix@redcorelinux.org> | 2017-01-25 17:37:21 +0000 |
---|---|---|
committer | V3n3RiX <venerix@redcorelinux.org> | 2017-01-25 17:37:21 +0000 |
commit | 011dbc9d6821df057bf337438aaaefbff6b7612c (patch) | |
tree | f3bc445e402088bf99b6dbe1122e1db621bd4167 /sys-apps/systemd/files/215-0003-udev-exclude-MD-from-block-device-ownership-event-lo.patch | |
parent | 8b1caee825d7881ebb89fd53014de58fd85e7cd2 (diff) |
systemd security update : https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10156
Diffstat (limited to 'sys-apps/systemd/files/215-0003-udev-exclude-MD-from-block-device-ownership-event-lo.patch')
-rw-r--r-- | sys-apps/systemd/files/215-0003-udev-exclude-MD-from-block-device-ownership-event-lo.patch | 54 |
1 files changed, 0 insertions, 54 deletions
diff --git a/sys-apps/systemd/files/215-0003-udev-exclude-MD-from-block-device-ownership-event-lo.patch b/sys-apps/systemd/files/215-0003-udev-exclude-MD-from-block-device-ownership-event-lo.patch deleted file mode 100644 index c730242c..00000000 --- a/sys-apps/systemd/files/215-0003-udev-exclude-MD-from-block-device-ownership-event-lo.patch +++ /dev/null @@ -1,54 +0,0 @@ -From 9d17a215fb30cb3e49db516a39c9bec2159004a7 Mon Sep 17 00:00:00 2001 -From: Kay Sievers <kay@vrfy.org> -Date: Thu, 24 Jul 2014 23:37:35 +0200 -Subject: [PATCH 3/3] udev: exclude MD from block device ownership event - locking - -MD instantiates devices at open(). This is incomptible with the -locking logic, as the "change" event emitted when stopping a -device will bring it back. ---- - src/udev/udevd.c | 23 +++++++---------------- - 1 file changed, 7 insertions(+), 16 deletions(-) - -diff --git a/src/udev/udevd.c b/src/udev/udevd.c -index a45d324..db935d6 100644 ---- a/src/udev/udevd.c -+++ b/src/udev/udevd.c -@@ -285,26 +285,17 @@ static void worker_new(struct event *event) - udev_event->exec_delay = exec_delay; - - /* -- * Take a "read lock" on the device node; this establishes -+ * Take a shared lock on the device node; this establishes - * a concept of device "ownership" to serialize device -- * access. External processes holding a "write lock" will -+ * access. External processes holding an exclusive lock will - * cause udev to skip the event handling; in the case udev -- * acquired the lock, the external process will block until -+ * acquired the lock, the external process can block until - * udev has finished its event handling. - */ -- -- /* -- * <kabi_> since we make check - device seems unused - we try -- * ioctl to deactivate - and device is found to be opened -- * <kay> sure, you try to take a write lock -- * <kay> if you get it udev is out -- * <kay> if you can't get it, udev is busy -- * <kabi_> we cannot deactivate openned device (as it is in-use) -- * <kay> maybe we should just exclude dm from that thing entirely -- * <kabi_> IMHO this sounds like a good plan for this moment -- */ -- if (streq_ptr("block", udev_device_get_subsystem(dev)) && -- !startswith(udev_device_get_sysname(dev), "dm-")) { -+ if (!streq_ptr(udev_device_get_action(dev), "remove") && -+ streq_ptr("block", udev_device_get_subsystem(dev)) && -+ !startswith(udev_device_get_sysname(dev), "dm-") && -+ !startswith(udev_device_get_sysname(dev), "md")) { - struct udev_device *d = dev; - - if (streq_ptr("partition", udev_device_get_devtype(d))) --- -1.8.5.5 - |