Difference between revisions of "Download/kernel/rhel5/028stab053.4/changes"
(created) |
(added missing /noinclude) |
||
Line 327: | Line 327: | ||
Linus commit 22d699aa88897de59b33ed8579e1df8331035b86 | Linus commit 22d699aa88897de59b33ed8579e1df8331035b86 | ||
</div> | </div> | ||
+ | </noinclude> |
Revision as of 21:33, 20 March 2008
Contents
- 1 Changes
- 1.1 Config changes
- 1.2 Compatibility notes
- 1.3 Patches
- 1.3.1 diff-cifs-close-20071218
- 1.3.2 diff-cpt-close-socket-in-correct-env-20071205
- 1.3.3 diff-cpt-dump-tmpfs-fix-20071214
- 1.3.4 diff-cpt-rename-ct-20071224
- 1.3.5 diff-cpt-rst-mask-mxcsr-bits-20071201:
- 1.3.6 diff-fairsched-timer-nohz-20071217
- 1.3.7 diff-ms-fs-utimensat-20071225
- 1.3.8 diff-ms-nf-ipt-CONNMARK-compat-b-20071109
- 1.3.9 diff-ms-nf-ipt-MARK-compat-b-20071109
- 1.3.10 diff-ubc-net-orphan-msg-20071225
- 1.3.11 diff-ve-ipt-hashlimit-20071220
- 1.3.12 diff-ve-ipt-rename-ct-20071224
- 1.3.13 diff-ve-printk-decls-20071214
- 1.3.14 diff-ve-rename-ct-20071224
- 1.3.15 linux-2.6.18-r8169-2.2LK-NAPI-ms-2.6.24-rc3.patch
- 1.3.16 diff-snd-hda-intel
- 1.3.17 diff-cpt-net-restore-hwaddr-20071228
- 1.3.18 diff-cpt-net-restore-stats-20071228
- 1.3.19 diff-cpt-net-restore-veth-20071228
- 1.3.20 diff-cpt-shm-restore-iter-20071228
- 1.3.21 diff-cpt-shmem-restore-iter-support-20071228
- 1.3.22 diff-cpt-shmlimits-20071228
- 1.3.23 diff-ubc-net-twbucket-msg-20071226
- 1.3.24 diff-ve-cap-bset-b-20071228
- 1.3.25 diff-security-dir-truncate-20080114
Changes
- Major mainstream security fix (CVE-2008-0001).
- Updated to latest RHEL5 kernel (2.6.18-53.1.4.el5) -- security fixes (RHSA-2007:0993).
- utimensat() syscall backport for new distros.
- CPT fixes/improvements.
- CIFS bugfix.
- Other minor fixes.
Config changes
Added:
- +
CONFIG_FB_VESA=y
Removed:
- -
CONFIG_FB_INTEL
(was m)
Compatibility notes
- Checkpointing file format changed; live migration to earlier kernels won't work.
Patches
diff-cifs-close-20071218
[CIFS] Fix oops in find_writable_file
There was a case in which find_writable_file was not waiting long enough under heavy stress when writepages was racing with close of the file handle being used by the write.
Signed-off-by: Steve French <sfrench@us.ibm.com>
X-Git-Tag: v2.6.24-rc1~1382~42
X-Git-Url
diff-cpt-close-socket-in-correct-env-20071205
[PATCH] CPT: set correct context on socket close
Sockets should be closed in context of VE, in other case resets can be sent and connection on other side will be closed prematurely during live migration.
Bug #95113.
diff-cpt-dump-tmpfs-fix-20071214
[PATCH] CPT: clone kernel threads for exec() with CLONE_VFORK
During checkpointing kernel threads are created to dump tmpfs with help of tar. Arguments are passed to this kernel thread from parent. If parent exits due to recieved signal then created kernel thread will get oops during access to args.
Create thread with CLONE_VFORK flag, so parent process will wait until thread will do exec().
Bug #96002.
diff-cpt-rename-ct-20071224
[PATCH] CPT: rename VE -> CT (container) in user visible messages
diff-cpt-rst-mask-mxcsr-bits-20071201:
[PATCH] CPT: be carefull with MXCSR register on restore
Patch introduces rst_apply_mxcsr_mask function that is to be called from rst_restore_process for masking 6 and 16-31 bits in MXCSR register if SSE2 is not supported on destination HN.
When VE migrates from i386 HN with sse2 support to i386 HN without sse2 support (P3) we are facing general protection fault on restore process that uses fpu. The reason is described in Intel Architectures Software Developer's Manual (Volume 1 Basic Architecture):
" 10.2.3 MXCSR Control and Status Register The 32-bit MXCSR register contains control and status information for SSE, SSE2, SSE3, and SSE3 SIMD floating-point operations. This register contains: ... denormals-are-zeros flag that controls how SIMD floating-point instructions handle denormal source operands ... Bits 16 through 31 of MXCSR register are reserved and are cleared on a power-up or reset of the processor; attempting to write a non-zero value to these bits, using either FXRSTOR or LDMXCSR instructions, will result in a general-protection exception (# GP) being generated. ... 10.2.3.4 Denormals-Are-Zeros ... The denormals-are-zeros mode was introduced inthe Pentium 4 and Intel Xeon processor with the SSE2 extensions... In earlier IA-32 processors and in some models of Pentium 4 processor, this flag (bit 6) is reserved. Attempting to set bit 6 of the MXCSR registers on processors that do not support the DAZ flag will cause a general protection exception (# GP). "
diff-fairsched-timer-nohz-20071217
[PATCH] fairsched: requires timer ints even with NOHZ
We are facing hang on boot ovz-xen kernel on smp machines. Hang takes place on loading modules in stop_machine_run on waiting for completion do_stop thread (sys_init_module->stop_machine_run->__stop_machine_run-> wait_for_completion). This happens due to 1 or more of 4 physical cpus that are running idle tasks are not available for running stopmachine thread. The reason is next_timer_interrupt function prevents exiting tickless mode on an idle cpu in xen's stop_hz_timer.
The solution is to make next_timer_interrupt() return jiffies when CONFIG_SCHED_VCPU is defined. No better solution now available...
diff-ms-fs-utimensat-20071225
[PATCH] fs: utimensat syscall backported
Some newer glibc uses lutimes() syscall which asks for sys_utimensat(). sys_utimensat is backported from 2.6.23, with additional conversion timespec->timeval in order to get rid from "wrong pointer" warning.
diff-ms-nf-ipt-CONNMARK-compat-b-20071109
[PATCH] xt_CONNMARK compat cleanup
The main fix is usage of xt_entry_target instead of xt_entry_match (found by Evgeny). Previous patch is still ok due to these structs are equal. Nevertheless - cleanup. Also some local variables renames: match->target.
Bug #93689.
diff-ms-nf-ipt-MARK-compat-b-20071109
[PATCH] xt_MARK compat cleanup
The main change is usage of xt_entry_target instead of xt_entry_match (found by Evgeny). Previous patch is still ok due to these structs are equal. Nevertheless - cleanup. Also some local variables renames: match->target.
diff-ubc-net-orphan-msg-20071225
[PATCH] UBC: enhance orphan socket warnings
Messages like "Out of socket memory" disturbs the customers, they would like to know what VE generates these messages.
diff-ve-ipt-hashlimit-20071220
[PATCH] VE: ipt_hashlimit virtualization
Patch virtualizes ipt_hashlimit match:
- Introduced struct ve_ipt_hashlimit and corresponding _ipt_hashlimit entry in ve_struct. ve_ipt_hashlimit contains global variables from ipt_hashlimit module.
- Functions init_ipt_hashlimit, fini_ipt_hashlimit implemented. Current functions designed to be called from ipt_hashlimit_init/fini and hashlimit_checkentry/destroy to alloc ve_ipt_hashlimit structure and initialize/cleanup _ipt_hashlimit entry in ve_struct.
- Functions ipt_hashlimit_init, ipt_hashlimit_exit updated.
diff-ve-ipt-rename-ct-20071224
[PATCH] VE: rename VE -> CT (container) in user visible messages
diff-ve-printk-decls-20071214
[PATCH] fix compilation in case CONFIG_PRINTK=n
diff-ve-rename-ct-20071224
linux-2.6.18-r8169-2.2LK-NAPI-ms-2.6.24-rc3.patch
Updates r8169 driver up to latest mainstream version.
Bug #96092.
diff-snd-hda-intel
diff-cpt-net-restore-hwaddr-20071228
[PATCH] CPT: Add support for netdevice hardware addresses
In current implementation netdevice hardware (MAC) address is not saved, so devices like tap will have different MAC address after restore. This will lead to creation of new local IPv6 address based on MAC address.
This patch allows to save/restore hardware addresses on all netdevices.
Also this patch changes cpt image version. This is done because of following code we have now:
err = rst_get_object(CPT_OBJ_NET_DEVICE, sec, &di, ctx); if (err) return err; if (di.cpt_next > sizeof(di)) { err = rst_restore_tuntap(sec, &di, ctx); if (err) return err; }
It was supposed that we will have only netdevice image or netdevice image and tuntap image.
With new code it will be possible to have netdevice and hwaddr image, so old kernel will consider hwaddr image as tuntap image. And will return -EINVAL while reading this image. So, migration to old kernel is prohibited, just to be sure that sensible error will be returned in this case.
Bug #96040.
diff-cpt-net-restore-stats-20071228
[PATCH] CPT: Add support for network statistics
In current implementation network statistics are not dumped at all. This patch allows to save/restore network statistics on all supported network devices.
Statistics is restored on current cpu.
diff-cpt-net-restore-veth-20071228
[PATCH] CPT: enhance support of veth device
In current implementation veth devices are not dumped correctly and we can lose private veth data.
This patch allows to save/restore private veth data.
diff-cpt-shm-restore-iter-20071228
[CPT] iterative shmem migration: restore part
It is logically simple and cannot hurt normal functionality.
diff-cpt-shmem-restore-iter-support-20071228
[CPT] changes to core shmem to support iterative shmem migration
New exported function shmem_insert_page() to insert new page to shmem inode. No ifdefs. It cannot be private to CPT because triggers too much of exports.
diff-cpt-shmlimits-20071228
[CPT] ugly struts to migrate 64bit ipc limits
Ugly mistake, only 32 bits of 64bit ipc limits migrate. Quick fix is to limit them to 0xFFFFFFFF while checkpointing.
Even uglier strut is to check for 0 limit and to promote it to something meaningful.
Probably, we can use the fact that image version is advanced, change the structure and promote this limit to 0xFFFFFFFF when we see old version.
diff-ubc-net-twbucket-msg-20071226
[PATCH] enhance "time wait bucket table overflow" message
CTID added to the message "TCP: time wait bucket table overflow"
diff-ve-cap-bset-b-20071228
[PATCH] kernel.cap-bound sysctl cleanup
- proc entry is global and therefore it is ReadOnly-accessible from inside VE
- added check for sysctl handler
diff-security-dir-truncate-20080114
CVE-2008-0001. Linus commit 22d699aa88897de59b33ed8579e1df8331035b86