6,534
edits
Changes
formatting fixes
==== diff-arch-4gb-xen-b-20070613 ====
<div class="change">
Patch from Sergey Ya Korshunoff (seyko2@)<br/>
Fix TSS handling in vm86.c in Xen kernel.
Fix TSS handling in vm86.c in Xen kernel.
There was a stupid misprint due to which load_esp0()
was not called in Xen kernels at all.
</div>
==== diff-cpt-deleted-ref-b-20070613 ====
<div class="change">
Patch from Andrey Mirkin <major@openvz.org><br/>
[PATCH] CPT: remove redundant kfree()
Remove redundant kfree() call from open_deleted() function.
Now ii is static structure and kfree on it leads to oops :/
Bug #84173.
</div>
==== diff-ms-bridge-nf-ebt-among-20070607 ====
<div class="change">
Patch from Evgeny Kravtsunov <emkravts@openvz.org><br/>
[PATCH] ebtables: ebtables_among fails on check() on x86-64
ebtables module calls the checker ebt_among_check()
that compares the correct size of user supplied data.
On x86_64 EBT_ALIGN does alignment on 8 bytes, so the problem arises.
{{bug|576}}.
</div>
==== diff-ms-net-bridge-via-eth-c-20070613 ====
<div class="change">
Patch from Dmitry Mishin <dim@openvz.org><br/>
[PATCH] Fix bridge removal with active master device
Fix bridge removal with active master device:
simple misprint</pre>.
</div>
==== diff-rh-mmap-return-addr-b-20070608 ====
<div class="change">
Patch from Vitaliy Gusev <vgusev@openvz.org><br/>
[PATCH] IA64: mmap returns EINVAL if len==0
mmap on IA64 architecture returns EINVAL when len==0,
while old kernel behaviour is to return addr in this case.
have to keep compatibility for some time with old stupid
apps like rpm which did exactly this and expected success :/
Bug #83938.
</div>
==== diff-arch-4gb-suspend-fix-20070629 ====
<div class="change">
Patch from Dmitry Monakhov <dmonakhov@openvz.org><br/>
[PATCH] 4gb split: fix broken suspend
Following code was removed by 4gb split patch set,
after this suspend was broken. Fix it.
Bug #84909.
</div>
==== diff-cpt-dump-eintr-20070622 ====
<div class="change">
Patch from Andrey Mirkin <major@openvz.org><br/>
[PATCH] CPT: check ctx->file for NULL
We need to be sure that dumpfile pointer (ctx->file) is not NULL, because we
can't start dump without it.
can't simply restart dump ioctl. The reason is that dumpfile is already
closed and we need to reopen it before calling dump ioctl second time.
Bug #84412.
</div>
[PATCH] CPT: ignore user signals in kernel threads
Under ptrace signals are not handled immediately and we have non-zero
shared_pending mask on current task, so fork() returns -ERESTARTNOINTR and
We need to block signals SIGCHLD, SIGWINCH, SIGCONT and SIGURG to be sure that
this signals will be ignored while kernel thread creation.
Bug #84412.
</div>
==== diff-cpt-rm-kill-external-process-20070702 ====
<div class="change">
Patch from Kirill Korotaev <dev@openvz.org><br/>
[PATCH] CPT: remove killing of external processes
External processes can't be easily detected.
Even if process has a virtual pid, it doesn't
Revert of the patches:
</div>
==== diff-ms-ia32-compat-autofs4-20070618 ====
<div class="change">
Patch from Roman Chechnev <rchechnev@openvz.org><br/>
[PATCH] autofs4: compat layer for x8664
autofs4 uses platform dependant protocol
which has 'long' data types inside data structures
Thanks to this 32bit autofs tools do not work with 64 bit kernel.
Bug #82040.
</div>
==== diff-ms-jbd-cpt-list-20070702 ====
<div class="change">
Patch from Jan Kara <jack@suse.cz><br/>
[PATCH] jbd: remove_transaction fix
We have to check that also the second checkpoint list is non-empty before
dropping the transaction.
Signed-off-by: Jan Kara <jack@suse.cz><br/>Signed-off-by: Andrew Morton <akpm@osdl.org><br/>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
X-Git-Tag: v2.6.16-rc2~350<br/>X-Git-Url: [http://git.kernel.org/?p=linux%2Fkernel%2Fgit%2Ftorvalds%2Flinux-2.6.git;a=commitdiff_plain;h=43c3e6f5abdf6acac9b90c86bf03f995bf7d3d92</pre>43c3e6f5abdf6acac9b90c86bf03f995bf7d3d92]
</div>
==== diff-ms-net-bridge-carrier-check-20070627 ====
<div class="change">
Patch from Konstantin Khorenko <khorenko@openvz.org><br/>
[PATCH] bridge: race between br_del_if() and port_carrier_check()
This patch eliminates a race between br_del_if() and port_carrier_check()
which leads to the oops in the latter function.
This patch is a port of 2 mainstream patches:
<pre>
[BRIDGE] br_if: Fix oops in port_carrier_check
Signed-off-by: Jarek Poplawski <jarkao2@o2.pl>
Acked-by: Stephen Hemminger <shemminger@linux-foundation.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
commit a10d567c89dfba90dde2e0515e25760fd74cde06
</pre>
and
<pre>
[BRIDGE]: eliminate workqueue for carrier check
Signed-off-by: David S. Miller <davem@davemloft.net>
commit 269def7c505b4d229f9ad49bf88543d1e605533e
</pre>
http://bugzilla.kernel.org/show_bug.cgi?id=7962
Bug #84789.
</div>
[BRIDGE]: adding new device to bridge should enable if up
<pre>
[BRIDGE]: adding new device to bridge should enable if up
Aji Srinivas [Thu, 8 Mar 2007 00:10:53 +0000 (16:10 -0800)]
</pre>
Bug #84789.
</div>
==== diff-ms-net-bridge-via-eth-d-20070622 ====
<div class="change">
Patch from Kirill Korotaev <dev@openvz.org><br/>
[PATCH] bridge: fix unaligned access to br->bridge_id
bridge_id is an unaligned structure of chars, which
MUST be aligned on 2 bytes boundary for compare_ether_addr().
So move our field to a bit another place,
returning back alignment of bridge_id.
Bug #84852.
</div>
==== diff-ms-net-sched-cbq-dbg-20070626 ====
<div class="change">
Patch from Vitaliy Gusev <vgusev@openvz.org><br/>
Debug and workaround patch for "division by zero" in sch_cbq module
Debug and workaround patch for "division by zero" in sch_cbq module
(in cbq_normalize_quanta() function).
For some unknown reason "division by zero" occurs and this patch
should help to understand the broken math.
Bug #83243.
</div>
<div class="change">
Patch from Kirill Korotaev <dev@openvz.org><br/>
[PATCH] reiserfs: fix key decrementing
This patch fixes a bug in function decrementing a key of stat data item.
filesystem tree rebuilding.
Signed-off-by: Vladimir Saveliev <vs@namesys.com><br/>Cc: <reiserfs-dev@namesys.com><br/>Signed-off-by: Andrew Morton <akpm@linux-foundation.org><br/>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
X-Git-Tag: v2.6.21-rc7~16<br/>X-Git-Url: [http://git.kernel.org/?p=linux%2Fkernel%2Fgit%2Ftorvalds%2Flinux-2.6.git;a=commitdiff_plain;h=6d205f120547043de663315698dcf5f0eaa31b5c </pre>6d205f120547043de663315698dcf5f0eaa31b5c]
</div>
[PATCH] proc: remove pathetic ->deleted WARN_ON
WARN_ON(de && de->deleted); is sooo unreliable. Why?
<pre>
proc_lookup remove_proc_entry
=========== =================
else
de->deleted = 1;
</pre>
So, if you have some strange oops [1], and doesn't see this WARN_ON it means
nothing.
[1] try_module_get() of module which doesn't exist, two lines below
Signed-off-by: Alexey Dobriyan <adobriyan@sw.ru>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org><br/>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
X-Git-Tag: v2.6.22-rc1~756<br/>X-Git-Url: [http://git.kernel.org/?p=linux%2Fkernel%2Fgit%2Ftorvalds%2Flinux-2.6.git;a=commitdiff_plain;h=578c8183c116e623d53b05d4c79762d053c7090f</pre>578c8183c116e623d53b05d4c79762d053c7090f]
</div>
==== diff-rh-utrace-late-ptrace-may-attach-20070626 ====
<div class="change">
Patch from Alexey Dobriyan <adobriyan@openvz.org> <br/>
Code implementing ptrace_attach() does ~1/3 of job of attaching _before_
Code implementing ptrace_attach() does ~1/3 of job of attaching _before_
checking if attaching process have permissions to mess with target task
NOTE: Right now
<source lang="c">
while (1)
ptrace(PTRACE_ATTACH, pid, NULL, NULL);
</source>
reliably (and _quickly_) crashes kernel if pid is pid of process
like syslogd normal user can't attach to:
<pre>
Unable to handle kernel NULL pointer dereference at 0000000000000000
RIP: [<0000000000000000>]
sysret_signal+0x21/0x31
ptregscall_common+0x67/0xac
</pre>
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245735
</div>
[PATCH] netfilter: wrong debug assertion in nat code
Simple compilation fix if NETFILTER_DEBUG is on
</div>
[PATCH] netfilter: skb struct doesn't have nf_debug anymore
nf_debug field is missing in modern kernels,
but in some places we still refer to it.
{{bug|627}}.
</div>
Patch from Vasily Tarasov <vtaras@openvz.org><br/>
[PATCH] venet: lots of spaces in /proc/vz/veinfo output
After introducing IPv6 support for venet device, field width for IP
This patch corrects it and fixes the bug:
{{bug|625}}.
</div>
==== diff-xen-x8664-subarch-changes-20070702 ====
<div class="change">
Patch from Evgeny Kravtsunov <emkravts@openvz.org><br/>
[PATCH] Xen: x8664 OVZ changes
x8664 Xen OVZ changes according to x8664 arch changes.
</div>
==== diff-arch-4gb-copy-mnt-options-20070703 ====
<div class="change">
Patch from Andrey Mirkin <major@openvz.org><br/>
[PATCH] 4GB split: add KERNEL_DS handling to copy_mount_options()
On i386 arch with 4gb split kernel addresses can be more than
when called with kernel supplied buffers, i.e.
when get_fs() == KERNEL_DS.
Bug #85041.
</div>
Patch from Alexandr Andreev <aandreev@openvz.org><br/>
[PATCH]: small fix to compile kernel without VCPU support
</div>
[NETFILTER]: nf_conntrack_h323: add checking of out-of-range on choices' index values
Choices' index values may be out of range while still encoded in the fixed
length bit-field. This bug may cause access to undefined types (NULL
This patch also adds checking of decode flag when decoding SEQUENCEs.
Signed-off-by: Jing Min Zhao <zhaojingmin@vivecode.com><br/>
Signed-off-by: Patrick McHardy <kaber@trash.net>
</pre>
</div>
==== diff-ms-security-random-buf-20070711 ====
<div class="change">
Patch from Matt Mackall <mpm@selenic.com><br/>
[PATCH] PaX: wakeup threshold limits
If root raised the default wakeup threshold over the size of the
output pool, the pool transfer function could overflow the stack with
(Bug reported by the PaX Team <pageexec@freemail.hu>)
Cc: Theodore Tso <tytso@mit.edu><br/>Cc: Willy Tarreau <w@1wt.eu><br/>Signed-off-by: Matt Mackall <mpm@selenic.com><br/>
Signed-off-by: Chris Wright <chrisw@sous-sol.org>
drivers/char/random.c | 9 +++++++--
1 files changed, 7 insertions(+), 2 deletions(-)
</div>
<div class="change">
Patch from Pavel Emelianov <xemul@openvz.org><br/>
[PATCH] IPC: fix potential user leak
When user locks an ipc shmem segmant with SHM_LOCK ctl and the
segment is already locked the shmem_lock() function returns 0. After this the subsequent code leaks the existing user struct:
== ipc/shm.c: sys_shmctl() ==
Other results of this are:
The exploit looks like this:
My solution is to return 0 to the userspace and do not change the
segment's user.
Bug #78998.
</div>
[PATCH] swiotlb: add missing phys_to_virt() call
Adds missing call to phys_to_virt() in the
lib/swiotlb.c:swiotlb_sync_sg() function. Without this change, a kernel
machines with more than about 3 GB RAM.
Signed-off-by: David Moore <dcm@acm.org><br/>Signed-off-by: Stefan Richter <stefanr@s5r6.in-berlin.de><br/>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
[http://git.kernel.org/?p=linux%2Fkernel%2Fgit%2Fstable%2Flinux-2.6.20.y.git;a=commitdiff_plain;h=e16b67f9a0ac6d9f89f680b7f3b439abfb1dac5e</pre> {{bug|645}}e16b67f9a0ac6d9f89f680b7f3b439abfb1dac5e]
{{bug|645}}.
</div>
<div class="change">
Patch from Dmitry Monakhov <dmonakhov@openvz.org><br/>
[PATCH] BC: recharge vma if vm_flags changed after ->mmap() call
Several device drivers (sigh... ATI) can change vm_flags
in their f_op->mmap method. Because of this mm->locked_vm
changed after f_op->mmap was called.
If ->vm_flags has been changed we have to recharge ub memory.
</div>
<div class="change">
Patch from Dmitry Monakhov <dmonakhov@openvz.org><br/>
[PATCH] BC: aidband - uncharge UB pages before charging to PB
By design we assume that page may be accounted only in UB or only
in PB counter.
Changes from v1: Add WARN_ON_ONCE according to Pavel's cmomments.
</div>
==== diff-ve-allow-kthreads-20070716 ====
<div class="change">
Patch from Denis Lunev <den@openvz.org> <br/>
[PATCH] allow kthreads by default in VE (for NFS)
This patch allows kernel threads by default inside VE.
</div>
<pre class="simple">
-----------------------------------------------------------------------------------
family | type | protocol
| | IPPROTO_IP
--------------------------------------------------------------------------------
</pre>* Here "any existing" means that only SOCK_RAW and SOCK_DGRAM will work:
other ones will be rejected by corresponding ->create function (for.ex.
netlink_create). And this reject is ok, as it is not bug provoking.
Patch implements default deny security policy.
{{bug|611}}.
</div>
==== diff-ve-net-udp-regress-20070712 ====
<div class="change">
Patch from Vitaliy Gusev <vgusev@openvz.org> <br/>
[PATCH] net: excessive UDP lost on VE send path
When tring to send big UDP packets from VE then other side
receive about 60% of all IP fragmentated packets and about 10% of all UDP packets
Thanks to Denis Lunev and Alexey Kuznetsov for ideas and help.
</div>
==== diff-ve-nfs-stop-c-20070704 ====
<div class="change">
Patch from Denis Lunev <den@openvz.org><br/>
This patch ensures that VE is up and running during RPC connect. This
This patch ensures that VE is up and running during RPC connect. This
staff can be run as a schedule_work when all tasks has been dead.
{{bug|513}}.
</div>
==== diff-ve-vpid-tsk-pgid-20070706 ====
<div class="change">
Patch from Kirill Korotaev <dev@openvz.org> <br/>
[PATCH] VE: sys_getpgid/sid should depend on context
sys_getpgid/sid() should return global pid of
VE task if info is requisted from VE0 task.
Actually, not critical, but still. let's fix it.
Bug #85662.
</div>
==== diff-xen-x8664-subarch-changes-b-20070709 ====
<div class="change">
Patch from Evgeny Kravtsunov <emkravts@openvz.org> <br/>
Patch fixes compilation error: XEN_CPUID is undefined in
Patch fixes compilation error: XEN_CPUID is undefined in
include/asm-x86_64/mach-xen/asm/msr.h. To define XEN_CPUID on x84_64 patch
attached makes msr.h to include xen/interface/arch-x86_64.h.
<pre class="simple"
linux-2.6.18-drbd-8.0.3-8.0.4.patch:
Patch prepared by Evgeniy Kravtsunov:
DRBD driver update 8.0.3 -> 8.0.4
</pre>
Patch attached updates drbd version from 8.0.3 to 8.0.4.
In 8.0.4 a set of oopses is fixed according to drbd changelog:
http://svn.drbd.org/drbd/trunk/ChangeLog.
{{bug|615}}.
</div>
<div class="change">
Patch from Vasily (vvs@):<br/>
RHEL5 forget to apply last of our megaraid_mbox fixes:
RHEL5 forget to apply last of our megaraid_mbox fixes:
http://forum.openvz.org/index.php?t=msg&goto=14975
<pre class="simple"
From: Andrey Mirkin <amirkin@sw.ru>
Date: Mon, 16 Oct 2006 08:08:43 +0000 (+0400)
X-Git-Url:
http://git.kernel.org/?p=linux%2Fkernel%2Fgit%2Ftorvalds%2Flinux-2.6.git;a=commitdiff_plain;h=8741ca71a3f626a56595b88200ebf952ce77ceef
</pre>
[PATCH] scsi: megaraid_{mm,mbox}: 64-bit DMA capability fix
wrong and driver sets 64-bit DMA mode for these devices.
Signed-off-by: Andrey Mirkin <amirkin@sw.ru><br/>Acked-by: Vasily Averin <vvs@sw.ru><br/>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
</div>
vzabackup, filesystem tests, etc.
Backport from 2.6.22</pre>.
</div>
Signed-off-by: Andi Kleen <ak@suse.de>
[http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1b29c1643c0d82512477ccd97dc290198fe23e221b29c1643c0d82512477ccd97dc290198fe23e22]
[SWSUSP]: correct virt_to_page() usage in swsusp
Bug #86406.
</div>
==== diff-ms-net-cbq-fairness2-20070720 ====
<div class="change">
Patch from Vitaliy Gusev <vgusev@openvz.org> <br/>
[PATCH] CBQ: fix unfairness when gettimeofday clock source is used
<div class="change">
Patch from Pavel Emelianov <xemul@openvz.org><br/>
[PATCH] BC: fix several issues in /proc/bc
find /proc/bc doesn't work with several errors reported.
Reasons:
Fix it all.
</div>
[PATCH] venet: compilation warning fix
label "out" is not used anymore. Fix the warning.
</div>