OpenVZ-legacy
  1. OpenVZ-legacy

linux-2.6.24-openvz

Public
AuthorCommitMessageCommit dateIssues
Alexey DobriyanAlexey Dobriyan
54c5b7426aaLinux 2.6.24-ovz003
Alexey DobriyanAlexey Dobriyan
0812a8a04f8Backport "modules: warn about suspicious return values from module's ->init() hook"commit e24e2e64c468c8060bb7173abecdf11d00ed5751 Author: Alexey Dobriyan <adobriyan@gmail.com> Date: Mon Mar 10 11:43:53 2008 -0700 modules: warn about suspicious return values from module's ->init() hook Return value convention of module's init functions is 0/-E. Sometimes, e.g. during forward-porting mistakes happen and buggy module created, where result of comparison "wo...
Konstantin KhlebnikovAlexey DobriyanKonstantin Khlebnikov
bbbb51672f1CPT: disable for "hidden" pid namespacesCPT is currently broken if session id or process group id not presented in global pid ns.
Konstantin KhlebnikovAlexey DobriyanKonstantin Khlebnikov
c8f0641ada5Add kernel.pid_ns_hide_child sysctlIt's PID_NS_HIDE_CHILD flg manipulator for current pidns. If set to 1, all process except first (like init) in all created pid namespaces after set will be invisible from current and upfollow pid namespaces. sysctl itself visible only in VE0.
Konstantin KhlebnikovAlexey DobriyanKonstantin Khlebnikov
5f6872e2893Add pid hide logic on VE creationDup the logic from CLONE_NEWPID codepath. init and entered processes remain visible in all pidns's.
Konstantin KhlebnikovAlexey DobriyanKonstantin Khlebnikov
f024f0d3b8cAdd pid ns flags PID_NS_HIDE_CHILD and PID_NS_HIDDENIf pid ns created in ns with PID_NS_HIDE_CHILD flag first process (like init) will be added to parent ns, then flag PID_NS_HIDDEN set on new child ns and all following process will be hidden. Hidden processes have their pids allocated in all parent ns, but they aren't added to hash.
Konstantin KhlebnikovAlexey DobriyanKonstantin Khlebnikov
5185276590eChange sys_setsid() and set_special_pids() to work with struct pid.Backport mainstream patch from Oleg Nesterov <oleg@tv-sign.ru> .
Alexey DobriyanAlexey Dobriyan
06927aa0b67NETFILTER: remove many useless NULL assignmentsVE is going to disappear in a second and memory will be freed, so all those clears are indeedd useless.
Alexey DobriyanAlexey Dobriyan
5dbe8ec3aebNETFILTER: fix ipv4 conntrack structure double freeIt's masked by it's NULLifying, but it's double free nonetheless.
Alexey DobriyanAlexey Dobriyan
f05b28d968dNETFILTER: fix freeing of ve_nf_conntrack_l4proto_genericDo it only only on VE stop, not on rmmod, because it's statically allocated on case of VE0.
Alexey DobriyanAlexey Dobriyan
d211c001739NETFILTER: don't free nf_conntrack_l4proto_generic if VE_IPTABLES=nve_nf_conntrack_l4proto_generic is stubbed to nf_conntrack_l4proto_generic which is statically allocated array and thus shouldn't be freed.
Alexey DobriyanAlexey Dobriyan
92d6607dfe0NETFILTER: free nat_protos on VE stop
Alexey DobriyanAlexey Dobriyan
73501b73901NETFILTER: fix nf_conntrack_l4proto_generic's leak on VE stop
Alexey DobriyanAlexey Dobriyan
5b45e0d2b46NETFILTER: add back __init/__exit markers for nf_conntrack_ipv4
Alexey DobriyanAlexey Dobriyan
69e391057ffNETFILTER: move init functions after fini functionsThis is getting incosistent across netfilter changes, so make it consistent.
Alexey DobriyanAlexey Dobriyan
0bfe93b674cNETFILTER: fix uber memory leaks during nf_conntrack shutdownve_nf_ct_protos array freeing was skipped during VE stop if it registered L4 protocols. Also remove generic proto freeing from sysctl freeing code -- it's definitely not right place.
Alexey DobriyanAlexey Dobriyan
85e6bc2ba49NETFILTER: fix memory leak if nf_conntrack_ipv4 was used by VE
Alexey DobriyanAlexey Dobriyan
191b730b9ddNETFILTER: fix compilation with VE_IPTABLES=n
Konstantin KhlebnikovAlexey DobriyanKonstantin Khlebnikov
b89e74dc201FAIRSCHED: change proc interface to work with vz groupsShow weight and rate limit from fairsched_node. CFS internals are different, so show (start_tag, value, delay) fields as zeros.
Konstantin KhlebnikovAlexey DobriyanKonstantin Khlebnikov
9eecc52aaa1FAIRSCHED: add /proc/fairsched , /proc/fairsched2
Konstantin KhlebnikovAlexey DobriyanKonstantin Khlebnikov
68e9756e125FAIRSCHED: fix config option name in VE's code
Konstantin KhlebnikovAlexey DobriyanKonstantin Khlebnikov
4f2c64dd3f5FAIRSCHED: wire up sys_fairsched_* system calls
Konstantin KhlebnikovAlexey DobriyanKonstantin Khlebnikov
f14a05b0c80FAIRSCHED: add sys_fairsched_* system calls
Konstantin KhlebnikovAlexey DobriyanKonstantin Khlebnikov
a02e3acb4a9FAIRSCHED: add scheduler grouping based on stock grouping code
Alexey DobriyanAlexey Dobriyan
b7cb384df2eRemove kmem_cache walking logicIt can't work in case of SLUB because full pages aren't in any slab lists.
Alexey DobriyanAlexey Dobriyan
455602f5364NETFILTER: per-VE expect countExpectation count were left global which defeats the point of per-VE expectation limits. :-)
Alexey DobriyanAlexey Dobriyan
c3c7fb30af1NETFILTER: fixup net.netfilter sysctl data for VE0 tooThey were pointing to usual mainline variables, not VE0's and, thus, e.g, net.netfilter.nf_conntrack_count was always reporting 0.
Alexey DobriyanAlexey Dobriyan
3ac4bfd9c19NETFILTER: move VE's expect_max value initialization into correct placeCopying from nf_ct_expect_max is pointless for VE0 because it's 0 at this place Move initialization to nf_conntrack_expect_init() for correct behaviour.
Alexey DobriyanAlexey Dobriyan
b20f7531a00NETFILTER: copy max expect value from VE0's during VE startOtherwise it's set to 0, which effectively means no FTP conntrack by default.
Alexey DobriyanAlexey Dobriyan
fc59e9f2e9aNETFILTER: create net.netfilter.* hierarchy in VE0 too
Alexey DobriyanAlexey Dobriyan
8544df2e3e8CONNTACK: add \n to error message
Alexey DobriyanAlexey Dobriyan
15938557b7eCPT: select PM as wellJust PM_SLEEP is not enough, because selecting logic doesn't select second and all other levels of dependencies (which is probably a bug in build system depending on how to look at it).
Alexey DobriyanAlexey Dobriyan
1cfe443dac8SIT: create sit devices in correct netnshttp://bugzilla.openvz.org/show_bug.cgi?id=825
Alexey DobriyanAlexey Dobriyan
29ec264a595CPT: reexport sys_open()http://bugzilla.openvz.org/show_bug.cgi?id=835
Alexey DobriyanAlexey Dobriyan
73980b5b87eSLUBC: change SLAB_UBC, SLAB_NO_CHARGE flagsSLAB_NO_CHARGE conflicted with __SYSFS_ADD_DEFERRED internal flag which resulted in double and broken additional directories created in /sys/slab/ .
Alexey DobriyanAlexey Dobriyan
b1a7063c226CPT: select tun, venet, veth modulesCONFIG_VZ_CHEKPOINT=y, CONFIG_TUN=m result in linking breakage because CPT can't find tun_chr_open() et al. So, if you build CPT as standalone, tun/tap will be also standalone.
PeterAlexey DobriyanPeter
da23c1831f3Fix proc compilationfs/proc/generic.c: In function 'xlate_proc_loc_name': fs/proc/generic.c:330: error: implicit declaration of function 'get_exec_env' fs/proc/generic.c:330: error: invalid type argument of '->' fs/proc/generic.c: In function 'proc_lookup': fs/proc/generic.c:516: error: implicit declaration of function 've_is_super'
Alexey DobriyanAlexey Dobriyan
9c10803877cCONNTRACK: move exp_proc_init() to text sectionnf_conntrack_expect_init() is calling exp_proc_init() which was can't be in .init.text for that reason.
Alexey DobriyanAlexey Dobriyan
5e5b46ec815SLUB: drop "inline" from __flush_cpu_slab() prototype3.4 gcc sometimes treats as error the following sequence: static inline foo(); foo(); static inline foo() { ... }
Alexey DobriyanAlexey Dobriyan
bfd1a53e3dfLinux 2.6.24-ovz002
Alexey DobriyanAlexey Dobriyan
7155bb8dedfRevert "An ugly fixup to cure x86_64 strace"This reverts commit 7596140b517c486eafcec8fb6cf183c54efd3c9d. Commit is needed only together with segment registers renaming patch.
Alexey DobriyanAlexey Dobriyan
e5fa3ca979aFix pid charging logic in case of process enteringWho would've thought... Effective size of object in pid_2 cache can be very well be smaller than size of object in pid_1 cache. This depends on sizeof(struct foo), debug options, cache line sizes and so on. So, now, we charge bit more or uncharge a bit depending on sizes.
Alexey DobriyanAlexey Dobriyan
03d60f5abacCPT: print unknown inode's magic as well
Alexey DobriyanAlexey Dobriyan
095a23ef61esnd: remove PDE from correct proc_rootOpenVZ has multiple proc_root's so explicitly specifying a proc_root during creation or removal is dangerous.
Alexey DobriyanAlexey Dobriyan
08a3c5198299p: don't oops on rmmodUnloadable modules should just skip module_exit() hook ;-)
Alexey DobriyanAlexey Dobriyan
93af30a6005Remove "Not cloning cgroup for unused subsystem ns" spamIt triggers on every VE start/stop.
Vitaliy GusevAlexey DobriyanVitaliy Gusev
bb11576f093sunrpc: add cleanup hookcall_status() can go to the sleep: .... switch(status) { case -EHOSTDOWN: case -EHOSTUNREACH: case -ENETUNREACH: /* * Delay any retries for 3 seconds, then handle as if it * were a timeout. */ rpc_delay(task, 3*HZ); case -ETIMEDOUT: task->tk_action = call_timeout; .... Task after some delay will be waked up and try access to loopback device. Then do VE stop, fini_ve_netdev...
Alexey DobriyanAlexey Dobriyan
c04ac36c7acTweak headers placement to please headers_check
Alexey DobriyanAlexey Dobriyan
4441b3e219cMMerge 2.6.24.1, 2.6.24.2Merge git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-2.6.24.y into 2.6.24-openvz Conflicts: Makefile
Alexey DobriyanAlexey Dobriyan
0bca28c8e04Fix one more nsproxy refcount bugDuring error recovery after CLONE_NEWNET was successfully done, temporary nsproxy was put more that needed. It's refcount was 1 during VE start but it was put one time when tsk detached from it to VE0's one and one time when VE detached from it. Patch adds GET when tsk or VE attached to nsproxy even on error recovery path.