From OpenVZ Virtuozzo Containers Wiki
< Download‎ | kernel‎ | rhel5
Jump to: navigation, search


Since 028stab057.2:



Patch from Pavel Emelianov <>

cpt: lock sock before restoring its synwait queue

This new socket already has all the necessary TCP timers armed, so tcp_keepalive_timer can fire during the rst_restore_synwait_queue and (for the latter being lockless) can spoil the queue.

Locking in the restoring procedure is requires.

Bug #118912.


Patch from Marat Stanichenko <>

quota: Compilation fix for XEN kernels

CONFIG_QUOTA_COMPAT is not enabled in Xen config so we bump into the problem of undefined structures.

Bug #118177.


Patch from Pavel Emelianov <>

Fix sumversion.c compilation with some modern compilers

OpenVZ Bug #951.


Patch from Pavel Emelianov <>

cifs: fix compilation for no-lanman case

backported mainstream commit 516897a208bc1423d561ce2ccce0624c3b652275

OpenVZ Bug #951.


Patch from Vitaliy Gusev <>

[PATCH] Fix compilation error when CONFIG_XFRM is not set.

OpenVZ Bug #963.


Patch from Konstantin Khlebnikov <>

Fix sigqueue_alloc vs switch_uid race

Such a race can result in arbitraru memory corruption (actually).

This is a merge of two mainstream patches from Linus:

 commit 45c18b0bb579b5c1b89f8c99f1b6ffa4c586ba08
 Author: Linus Torvalds <>
 Date:   Sat Nov 4 10:06:02 2006 -0800
     Fix unlikely (but possible) race condition on task->user access
     There's a possible race condition when doing a "switch_uid()" from one
     user to another, which could race with another thread doing a signal
     allocation and looking at the old thread ->user pointer as it is freed.
     This explains an oops reported by Lukasz Trabinski:
     We fix this by delaying the (reference-counted) freeing of the user
     structure until the thread signal handler lock has been released, so
     that we know that the signal allocation has either seen the new value or
     has properly incremented the reference count of the old one.
     Race identified by Oleg Nesterov.
     Cc: Lukasz Trabinski <>
     Cc: Oleg Nesterov <>
     Cc: Andrew Morton <>
     Cc: Ingo Molnar <>
     Signed-off-by: Linus Torvalds <>
 commit 10b1fbdb0a0ca91847a534ad26d0bc250c25b74f
 Author: Linus Torvalds <>
 Date:   Sat Nov 4 13:03:00 2006 -0800
     Make sure "user->sigpending" count is in sync
     The previous commit (45c18b0bb579b5c1b89f8c99f1b6ffa4c586ba08, aka "Fix
     unlikely (but possible) race condition on task->user access") fixed a
     potential oops due to __sigqueue_alloc() getting its "user" pointer out
     of sync with switch_user(), and accessing a user pointer that had been
     de-allocated on another CPU.
     It still left another (much less serious) problem, where a concurrent
     __sigqueue_alloc and swich_user could cause sigqueue_alloc to do signal
     pending reference counting for a _different_ user than the one it then
     actually ended up using.  No oops, but we'd end up with the wrong signal
     Another case of Oleg's eagle-eyes picking up the problem.
     This is trivially fixed by just making sure we load whichever "user"
     structure we decide to use (it doesn't matter _which_ one we pick, we
     just need to pick one) just once.
     Acked-by: Oleg Nesterov <>
     Cc: Andrew Morton <>
     Cc: Ingo Molnar <>
     Signed-off-by: Linus Torvalds <>

OpenVZ Bug #848.


Patch from Marat Stanichenko <>

xen: Fix build for x86_64 arch

we have to export flush_tlb_page() symbol in Xen-x86_64 kernel because cpt modules uses this symbol.

Bugs #118432, #118177.


Patch from Marat Stanichenko <>

xen: Bad "#include" directives position causes Xen-i386 compilation error.

  |#include <asm/cacheflush.h> (#define _I386_CACHEFLUSH_H)
    |#include <linux/mm.h>
      |#include <linux/pagemap.h>
        |#include <linux/highmem.h>
           |#include <asm/cacheflush.h>

(but nothing actually includes right now(see #define _I386_CACHEFLUSH_H)).

cacheflush.h uses the functions from <asm/cacheflush.h> so the definition of the functions occurs after somebody uses them.

Bug #118177.


Patch from Pavel Emelianov <>

xfrm: more compilation fixes for wierd openvz users config

OpenVZ Bug #951.


Patch from Pavel Emelianov <>

bc: fix subbeancounter inode number calculations in /proc/bc

0 and 0.0 still have the same number...

Bug #116868.


Patch from Vasily Averin <>

netfilter: Fix broken isolation for ip_conntrack_checksum sysctl

net.ipv4.netfilter.ip_conntrack_checksum should be read-only inside VE.

Bug #117138.


Patch from Dmitry Monakhov <>

vfs: fix lock inversion in drop_pagecache_sb()

backport mainstream commit: eccb95cee4f0d56faa46ef22fb94dd4a3578d3eb

  Fix longstanding lock inversion in drop_pagecache_sb by dropping inode_lock
  before calling __invalidate_mapping_pages().  We just have to make sure inode
  won't go away from under us by keeping reference to it and putting the
  reference only after we have safely resumed the scan of the inode list.  A bit
  tricky but not too bad...
  Signed-off-by: Jan Kara <>
  Cc: Fengguang Wu <>
  Cc: David Chinner <>
  Signed-off-by: Andrew Morton <>
  Signed-off-by: Linus Torvalds <>

Bug #116673.


Patches from Marat Stanichenko <>

Various kludges to make cciss work properly and make udev receive scsi uevents.

Bugs #114972, #114130.