Author | Commit | Message | Commit date | Issues | |
---|---|---|---|---|---|
OpenVZ team | 9534606693f | linux-2.6.24-ovz006 released | |||
David S. Miller | ef84a771e3b | [NET]: sk_release_kernel needs to be exported to modulesFixes: ERROR: "sk_release_kernel" [net/ipv6/ipv6.ko] undefined! Signed-off-by: David S. Miller <davem@davemloft.net> (cherry picked from commit 45af1754bc09926b5e062bda24f789d7b320939f) | |||
Denis V. Lunev | 9c9b8a79d90 | [NET]: Make netlink_kernel_release publically available as sk_release_kernel.This staff will be needed for non-netlink kernel sockets, which should also not pin a namespace like tcp_socket and icmp_socket. Signed-off-by: Denis V. Lunev <den@openvz.org> Acked-by: Daniel Lezcano <dlezcano@fr.ibm.com> Signed-off-by: David S. Miller <davem@davemloft.net> (cherry picked from commit edf0208702007ec1f6a36756fdd005f771a4cf17) | |||
Denis V. Lunev | 99dfe5490d4 | [NETLINK]: No need for a separate __netlink_release call.Merge it to netlink_kernel_release. Signed-off-by: Denis V. Lunev <den@openvz.org> Acked-by: Daniel Lezcano <dlezcano@fr.ibm.com> Signed-off-by: David S. Miller <davem@davemloft.net> (cherry picked from commit 9dfbec1fb2bedff6b118504055cd9f0485edba45) | |||
Pavel Emelyanov | 19b9fdf565d | [NETNS]: Fix race between put_net() and netlink_kernel_create().The comment about "race free view of the set of network namespaces" was a bit hasty. Look (there even can be only one CPU, as discovered by Alexey Dobriyan and Denis Lunev): put_net() if (atomic_dec_and_test(&net->refcnt)) /* true */ __put_net(net); queue_work(...); /* * note: the net now has refcnt 0, but still in * the global list of net namespaces */ == re-schedule ... | |||
Denis V. Lunev | 04fd8abede6 | [NETNS]: Namespace stop vs 'ip r l' race.backport mainline commit 775516bfa2bd7993620c9039191a0c30b8d8a496 During network namespace stop process kernel side netlink sockets belonging to a namespace should be closed. They should not prevent namespace to stop, so they do not increment namespace usage counter. Though this counter will be put during last sock_put. The raplacement of the correct netns for init_ns solves the problem only ... | |||
Denis V. Lunev | c7b6f3ae6d0 | [NETNS]: Consolidate kernel netlink socket destruction.backport mainline commit b7c6ba6eb1234e35a74fb8ba8123232a7b1ba9e4 Create a specific helper for netlink kernel socket disposal. This just let the code look better and provides a ground for proper disposal inside a namespace. Signed-off-by: Denis V. Lunev <den@openvz.org> Tested-by: Alexey Dobriyan <adobriyan@openvz.org> Signed-off-by: David S. Miller <davem@davemloft.net> | |||
Denis V. Lunev | 23455248263 | [NETNS]: Double free in netlink_release.Netlink protocol table is global for all namespaces. Some netlink protocols have been virtualized, i.e. they have per/namespace netlink socket. This difference can easily lead to double free if more than 1 namespace is started. Count the number of kernel netlink sockets to track that this table is not used any more. Signed-off-by: Denis V. Lunev <den@openvz.org> Tested-by: Alexey Dobriyan <ado... | |||
Denis V. Lunev | 4d92a24aa85 | [UBC]: Double free for UDP socket akaThe socket resided in UB space waiting queue could be released. In this case ub_snd_wakeup running on the another CPU could hold/release that socket effectively hitting 0 refcounter second time. Signed-off-by: Denis V. Lunev <den@openvz.org> Signed-off-by: Pavel Emelyanov <xemul@openvz.org> | |||
Denis V. Lunev | 07dc3386215 | ubc: uncharging too much for TCPSNDBUFubc: uncharging too much for TCPSNDBUF It is not allowed to go to the label wait_for_memory with chargesize != 0 when this space is already placed to the skb. Signed-off-by: Denis V. Lunev <den@openvz.org> Signed-off-by: Pavel Emelyanov <xemul@openvz.org> | |||
Denis V. Lunev | be11b25694a | Endless loop in __sk_stream_wait_memory.[UBC]: Endless loop in __sk_stream_wait_memory. The loop in __sk_stream_wait_memory when tcp_sendmsg asks to wait for TCPSNDBUF space is endless when the timeout is not specified. The only way out is to queue a signal for that process. Lets return a status flag from ub_sock_snd_queue_add that UB space is available. This is enough to make a correct decision to leave the cycle. Signed-off-by: ... | |||
Vitaliy Gusev | 2e5bd16d930 | Allow envID fields in /proc/self/status in VE. Also allow get VPid, PNState, StopState, etc.OpenVZ Bug #936 http://bugzilla.openvz.org/show_bug.cgi?id=936 Signed-off-by: Vitaliy Gusev <vgusev@openvz.org> Signed-off-by: Pavel Emelyanov <xemul@openvz.org> | |||
Thomas Gleixner | cade99e1743 | futexes: fix fault handling in futex_lock_pifutexes: fix fault handling in futex_lock_pi commit 1b7558e457ed0de61023cfc913d2c342c7c3d9f2 upstream This patch addresses a very sporadic pi-futex related failure in highly threaded java apps on large SMP systems. David Holmes reported that the pi_state consistency check in lookup_pi_state triggered with his test application. This means that the kernel internal pi_state and the user space f... | |||
Andrey Mirkin | 3042d780e8d | CPT: fix restore of inotify on symlinkInside VE file /etc/mtab is a symlink to /proc/mounts. FreeNX server with KDE creates inotify on /etc/mtab file. To restore such inotify we need to obtain dentry with path_lookup() and restore inotify on it. Bug #96464 | |||
Alexey Dobriyan | ed01627a83e | NETFILTER: destroy nf_conntrack_cache correctly | |||
Alexey Dobriyan | fce5e05ba80 | CPT: fix EXIT_DEAD/TASK_DEAD checksFor one thing EXIT_DEAD was moved to ->exit_state only. For another, this task state is called TASK_DEAD now and lives in ->state; | |||
Alexey Dobriyan | da8a02e8fc4 | CPT: assign ->net_ns of restored tun/tap deviceotherwise init_net is used and device becomes invisible in CT. | |||
Alexey Dobriyan | b63b0d6884f | VE: let ->ve_netns live a bit more1. netns shutdown is done asynchronously 2. nsproxy free is done synchronously which means we can't use "get_exec_env()->ve_ns->net_ns" construct anywhere in netns teardown codepath. ->ve_ns will be NULL (fixable) or will point to freed memory (hardly fixable). The solution it to pin netns one more time, and use get_exec_env()->ve_netns . get_exec_env() is always valid. It's ->ve_netns will al... | |||
Alexey Dobriyan | 45a08554c7c | VE: introduce ->ve_netnsPreparations for fixing "NULL ->ve_ns" oops in inet6_rt_notify(). | |||
Konstantin Khlebnikov | 64d5598cc99 | CPT: fix compilation with CONFIG_SYSVIPC=nhttp://bugzilla.openvz.org/show_bug.cgi?id=851 | |||
Denis V. Lunev | 389336a5a20 | Memory leak on network namespace stop.mainline commit 4f84d82f7a623f8641af2574425c329431ff158f Network namespace allocates 2 kernel netlink sockets, fibnl & rtnl. These sockets should be disposed properly, i.e. by sock_release. Plain sock_put is not enough. Signed-off-by: Denis V. Lunev <den@openvz.org> Tested-by: Alexey Dobriyan <adobriyan@openvz.org> Signed-off-by: David S. Miller <davem@davemloft.net> | |||
Alexey Dobriyan | 3c7e408cc14 | Backport "[NET]: Make rtnetlink infrastructure network namespace aware (v3)"mainline commit 97c53cacf00d1f5aa04adabfebcc806ca8b22b10 + tweaks to get netns from either netdevice ot something else. http://bugzilla.openvz.org/show_bug.cgi?id=905 [NET]: Make rtnetlink infrastructure network namespace aware (v3) After this patch none of the netlink callback support anything except the initial network namespace but the rtnetlink infrastructure now handles multiple network... | |||
Alexey Dobriyan | 43bc20d9874 | IPv6: give owner_ve to fib_table and fib6_local_tableotherwise eventually fib6_clean_all will execute code in NULL context which is no-no. | |||
Alexey Dobriyan | 57a39eeffde | netlink: fix lookup checknetlink_unicast() is done in init_net context because a) rtnl socket is bound to init_net, b) kernel-space socket is successfully looked up by any VE, c) rtnl is kernel-spase socket. which is b-r-o-k-e-n, because e.g. just about any manipulation with netdevices via netlink will be projected onto VE0. Fix (after per-netns rtnl socket patches) http://bugzilla.openvz.org/show_bug.cgi?id=905 | |||
Alexey Dobriyan | 72746db0ffb | proc: fix proc_cwd_linkIf d_root_check() in there fails, we shouldn't pretend everything is OK and leave mnt unitialized or NULL (in case /proc/*/cwd). http://bugzilla.openvz.org/show_bug.cgi?id=900 | |||
Alexey Dobriyan | a628e361137 | IPv6: get frag's owner VE from inet_frag_queueIPv6 specific frag queue doesn't need owner_ve, because it's already in core data structure (struct inet_frag_queue). And it's in fact NULL, which is the cause of http://bugzilla.openvz.org/show_bug.cgi?id=899 | |||
Alexey Dobriyan | 24e7cd454bb | Remove spurious warnings in kernel/time.cE.g. code in clock_t_to_jiffies() divides ~0UL thus assuming that all "unsigned long" range is valid. Ditto for other functions. Alexey said these warnings are old debugging stuff. http://bugzilla.openvz.org/show_bug.cgi?id=898 | |||
Alexey Dobriyan | 5f318dd06be | UBC: drop cpuset lock from OOM handlingcpuset_lock dances around OOM killing are gone in main code, so no need to account for them. Mainline commit 3ff566963ce804809af9e32331b287eedeeff501 Bug 112959 ===================================== [ BUG: bad unlock balance detected! ] ------------------------------------- tstspoof/29391 is trying to release lock (callback_mutex) at: [<c04488d2>] ub_oom_lock+0x9a/0xd6 but there are no more l... | |||
Alexey Dobriyan | 734939adb27 | [PATCH] Stick back to mainline behaviour of zero length mmap(2)http://bugzilla.openvz.org/show_bug.cgi?id=893 | |||
Alexey Dobriyan | beee05115ef | VLAN: fix rmmod 8021q with vlan interface setup | |||
Alexey Dobriyan | 96919bc61ea | NETFILTER: make ip_conntrack_disable_ve0 option do something | |||
Alexey Dobriyan | a926aabfcdf | NETFILTER: changes for conntrack CPT | |||
Vasily Averin | 24dba265d24 | [PATCH] kernel.cap-bound sysctl cleanup - proc entry is global and therefore it is ReadOnly-accessible from inside VEhttp://bugzilla.openvz.org/show_bug.cgi?id=524 | |||
Dmitriy Monakhov | efcdd6480b5 | Add /proc/sys/fs/lsyscall_enableSysctl instoduced mostly for testing purposes. | |||
Alexandr Andreev | c3378806fd8 | Allow to change SysRq in Alt+SysRq+* comboYou can get scancodes of your keyboard with programs like showkey or evtest. The default Alt+SysRq combination still works after redifinition. | |||
Alexey Kuznetsov | 0bc6aca1873 | CPT: SMP race in detecting state of ptraced processesWhen suspending VE, we test state of processes while they are still running. It is not a bug: we have to verify for invalid state before checkpointing, real state is saved after processes are scheduled out. The impact is that we can see process in a bad state, f.e. stopped without any reasons. It is also not a bug, but this rersults in random failures of checkpointing. The only way to fix this... | |||
Vasily Tarasov | 94040c96657 | VZDQ: correct size on /proc/vz/aquota/*/aquota.*Bug #59920 Signed-off-by: Vasily Tarasov <vtaras@openvz.org> Signed-off-by: Denis Lunev <den@openvz.org> | |||
Vitaliy Gusev | ecc35d16d0e | BRIDGE: correct checking for input packetsWhen via_phys_dev flag is set then bridge doesn't have any ip address. Therefore ip-traffic HW->VE passes only if brigge has the same MAC-address as real ethernet interface. Bug #92737 | |||
Alexey Dobriyan | 9c3be3c83f3 | ia64: generate cpu_khz | |||
Alexey Kuznetsov | b17bc8ad69d | CPT: changes to core shmem to support iterative shmem migrationNew exported function shmem_insert_page() to insert new page to shmem inode. No ifdefs. It cannot be private to CPT because triggers too much of exports. | |||
Alexey Dobriyan | 483a70883c8 | Linux 2.6.24-ovz005 | |||
Alexey Dobriyan | bee1757116fM | Merge 2.6.24.7Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-2.6.24.y into 2.6.24-openvz Conflicts: Makefile | |||
Greg Kroah-Hartman | 928bb8c418b | Linux 2.6.24.7 | |||
Al Viro | 0bbbae3bfd7 | fix SMP ordering hole in fcntl_setlk() (CVE-2008-1669)commit 0b2bac2f1ea0d33a3621b27ca68b9ae760fca2e9 upstream. fcntl_setlk()/close() race prevention has a subtle hole - we need to make sure that if we *do* have an fcntl/close race on SMP box, the access to descriptor table and inode->i_flock won't get reordered. As it is, we get STORE inode->i_flock, LOAD descriptor table entry vs. STORE descriptor table entry, LOAD inode->i_flock with not a si... | CVE-2008 | ||
Alexey Dobriyan | 818c0c13b3bM | Merge 2.6.24.6Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-2.6.24.y into 2.6.24-openvz Conflicts: Makefile net/ipv6/netfilter/nf_conntrack_reasm.c net/sched/sch_generic.c | |||
Alexey Dobriyan | f28668f8d34 | CPT: fix shmat(2)'ted segmentsCommit bc56bba8f31bd99f350a5ebfd43d50f411b620c7 aka "[PATCH] shm: make sysv ipc shared memory use stacked files"... It changed number and relationship of "struct file"s associated with SysV shmem: Before: one struct file for each shmem segment After: one struct file for each shmem segment + one struct file (different) for each shmat(2) call. Obviously checkpointing broke horribly. T... | |||
Greg Kroah-Hartman | 430adffc974 | Linux 2.6.24.6 | |||
Al Viro | 344fb8a4953 | Fix dnotify/close race (CVE-2008-1375)commit 214b7049a7929f03bbd2786aaef04b8b79db34e2 upstream. We have a race between fcntl() and close() that can lead to dnotify_struct inserted into inode's list *after* the last descriptor had been gone from current->files. Since that's the only point where dnotify_struct gets evicted, we are screwed - it will stick around indefinitely. Even after struct file in question is gone and freed. W... | CVE-2008 | ||
Paul Bolle | ce5fb291813 | ISDN: Do not validate ISDN net device address prior to interface-upCommit bada339 (Validate device addr prior to interface-up) caused a regression in the ISDN network code, see: http://bugzilla.kernel.org/show_bug.cgi?id=9923 The trivial fix is to remove the pointer to eth_validate_addr() in the net_device struct in isdn_net_init(). Signed-off-by: Paul Bolle <pebolle@tiscali.nl> Signed-off-by: David S. Miller <davem@davemloft.net> Signed-off-by: Greg Kroah-Ha... | |||
Steven Toth | dcd8f5bca37 | V4L: cx88: enable radio GPIO correctlyThis patch fixes an issue on the HVR1300, where GPIO is blown away due to the radio input being undefined, breaking the functionality of the DVB demodulator and MPEG2 encoder used on the cx8802 mpeg TS port. This is a minimal patch for 2.6.26 and the -stable series. This must be fixed a better way for 2.6.27. Signed-off-by: Steven Toth <stoth@hauppauge.com> Signed-off-by: Mauro Carvalho Cheh... |
Commits
Author | Commit | Commit date | Issues | |
---|---|---|---|---|
OpenVZ team | 9534606693f | |||
David S. Miller | ef84a771e3b | |||
Denis V. Lunev | 9c9b8a79d90 | |||
Denis V. Lunev | 99dfe5490d4 | |||
Pavel Emelyanov | 19b9fdf565d | |||
Denis V. Lunev | 04fd8abede6 | |||
Denis V. Lunev | c7b6f3ae6d0 | |||
Denis V. Lunev | 23455248263 | |||
Denis V. Lunev | 4d92a24aa85 | |||
Denis V. Lunev | 07dc3386215 | |||
Denis V. Lunev | be11b25694a | |||
Vitaliy Gusev | 2e5bd16d930 | |||
Thomas Gleixner | cade99e1743 | |||
Andrey Mirkin | 3042d780e8d | |||
Alexey Dobriyan | ed01627a83e | |||
Alexey Dobriyan | fce5e05ba80 | |||
Alexey Dobriyan | da8a02e8fc4 | |||
Alexey Dobriyan | b63b0d6884f | |||
Alexey Dobriyan | 45a08554c7c | |||
Konstantin Khlebnikov | 64d5598cc99 | |||
Denis V. Lunev | 389336a5a20 | |||
Alexey Dobriyan | 3c7e408cc14 | |||
Alexey Dobriyan | 43bc20d9874 | |||
Alexey Dobriyan | 57a39eeffde | |||
Alexey Dobriyan | 72746db0ffb | |||
Alexey Dobriyan | a628e361137 | |||
Alexey Dobriyan | 24e7cd454bb | |||
Alexey Dobriyan | 5f318dd06be | |||
Alexey Dobriyan | 734939adb27 | |||
Alexey Dobriyan | beee05115ef | |||
Alexey Dobriyan | 96919bc61ea | |||
Alexey Dobriyan | a926aabfcdf | |||
Vasily Averin | 24dba265d24 | |||
Dmitriy Monakhov | efcdd6480b5 | |||
Alexandr Andreev | c3378806fd8 | |||
Alexey Kuznetsov | 0bc6aca1873 | |||
Vasily Tarasov | 94040c96657 | |||
Vitaliy Gusev | ecc35d16d0e | |||
Alexey Dobriyan | 9c3be3c83f3 | |||
Alexey Kuznetsov | b17bc8ad69d | |||
Alexey Dobriyan | 483a70883c8 | |||
Alexey Dobriyan | bee1757116fM | |||
Greg Kroah-Hartman | 928bb8c418b | |||
Al Viro | 0bbbae3bfd7 | CVE-2008 | ||
Alexey Dobriyan | 818c0c13b3bM | |||
Alexey Dobriyan | f28668f8d34 | |||
Greg Kroah-Hartman | 430adffc974 | |||
Al Viro | 344fb8a4953 | CVE-2008 | ||
Paul Bolle | ce5fb291813 | |||
Steven Toth | dcd8f5bca37 |