Author | Commit | Message | Commit date | Issues | |
---|---|---|---|---|---|
Konstantin Khlebnikov | d54ea2a06c5 | Fix wrong size of ub0_percpuThe struct percpu_data dynamically allocated and have array only for 1 cpu, so static usage of it does not work. Plus rework macros for static percpu variables declaration and initialization. http://bugzilla.openvz.org/show_bug.cgi?id=1039 Singed-off-by: Konstantin Khlebnikov <khlebnikov@openvz.org> Signed-off-by: Pavel Emelyanov <xemul@openvz.org> | |||
Konstantin Khlebnikov | 750be8457d8 | sunrpc: fix lost set_exec_env-back and unlock the op_semAny NFS connect over TCP-IPv4 from VE block VE stop process. This patch add missed unlock op_sem and set_exec_env. http://bugzilla.openvz.org/show_bug.cgi?id=1007 (picked from openvz ubuntu branch patch 0145-VE-add-missed-semaphore-up-and-set-exec-env.patch 2.6.18 not affected, 2.6.26+ already fixed by den@) | |||
OpenVZ team | 9534606693f | linux-2.6.24-ovz006 released | |||
David S. Miller | ef84a771e3b | [NET]: sk_release_kernel needs to be exported to modulesFixes: ERROR: "sk_release_kernel" [net/ipv6/ipv6.ko] undefined! Signed-off-by: David S. Miller <davem@davemloft.net> (cherry picked from commit 45af1754bc09926b5e062bda24f789d7b320939f) | |||
Denis V. Lunev | 9c9b8a79d90 | [NET]: Make netlink_kernel_release publically available as sk_release_kernel.This staff will be needed for non-netlink kernel sockets, which should also not pin a namespace like tcp_socket and icmp_socket. Signed-off-by: Denis V. Lunev <den@openvz.org> Acked-by: Daniel Lezcano <dlezcano@fr.ibm.com> Signed-off-by: David S. Miller <davem@davemloft.net> (cherry picked from commit edf0208702007ec1f6a36756fdd005f771a4cf17) | |||
Denis V. Lunev | 99dfe5490d4 | [NETLINK]: No need for a separate __netlink_release call.Merge it to netlink_kernel_release. Signed-off-by: Denis V. Lunev <den@openvz.org> Acked-by: Daniel Lezcano <dlezcano@fr.ibm.com> Signed-off-by: David S. Miller <davem@davemloft.net> (cherry picked from commit 9dfbec1fb2bedff6b118504055cd9f0485edba45) | |||
Pavel Emelyanov | 19b9fdf565d | [NETNS]: Fix race between put_net() and netlink_kernel_create().The comment about "race free view of the set of network namespaces" was a bit hasty. Look (there even can be only one CPU, as discovered by Alexey Dobriyan and Denis Lunev): put_net() if (atomic_dec_and_test(&net->refcnt)) /* true */ __put_net(net); queue_work(...); /* * note: the net now has refcnt 0, but still in * the global list of net namespaces */ == re-schedule ... | |||
Denis V. Lunev | 04fd8abede6 | [NETNS]: Namespace stop vs 'ip r l' race.backport mainline commit 775516bfa2bd7993620c9039191a0c30b8d8a496 During network namespace stop process kernel side netlink sockets belonging to a namespace should be closed. They should not prevent namespace to stop, so they do not increment namespace usage counter. Though this counter will be put during last sock_put. The raplacement of the correct netns for init_ns solves the problem only ... | |||
Denis V. Lunev | c7b6f3ae6d0 | [NETNS]: Consolidate kernel netlink socket destruction.backport mainline commit b7c6ba6eb1234e35a74fb8ba8123232a7b1ba9e4 Create a specific helper for netlink kernel socket disposal. This just let the code look better and provides a ground for proper disposal inside a namespace. Signed-off-by: Denis V. Lunev <den@openvz.org> Tested-by: Alexey Dobriyan <adobriyan@openvz.org> Signed-off-by: David S. Miller <davem@davemloft.net> | |||
Denis V. Lunev | 23455248263 | [NETNS]: Double free in netlink_release.Netlink protocol table is global for all namespaces. Some netlink protocols have been virtualized, i.e. they have per/namespace netlink socket. This difference can easily lead to double free if more than 1 namespace is started. Count the number of kernel netlink sockets to track that this table is not used any more. Signed-off-by: Denis V. Lunev <den@openvz.org> Tested-by: Alexey Dobriyan <ado... | |||
Denis V. Lunev | 4d92a24aa85 | [UBC]: Double free for UDP socket akaThe socket resided in UB space waiting queue could be released. In this case ub_snd_wakeup running on the another CPU could hold/release that socket effectively hitting 0 refcounter second time. Signed-off-by: Denis V. Lunev <den@openvz.org> Signed-off-by: Pavel Emelyanov <xemul@openvz.org> | |||
Denis V. Lunev | 07dc3386215 | ubc: uncharging too much for TCPSNDBUFubc: uncharging too much for TCPSNDBUF It is not allowed to go to the label wait_for_memory with chargesize != 0 when this space is already placed to the skb. Signed-off-by: Denis V. Lunev <den@openvz.org> Signed-off-by: Pavel Emelyanov <xemul@openvz.org> | |||
Denis V. Lunev | be11b25694a | Endless loop in __sk_stream_wait_memory.[UBC]: Endless loop in __sk_stream_wait_memory. The loop in __sk_stream_wait_memory when tcp_sendmsg asks to wait for TCPSNDBUF space is endless when the timeout is not specified. The only way out is to queue a signal for that process. Lets return a status flag from ub_sock_snd_queue_add that UB space is available. This is enough to make a correct decision to leave the cycle. Signed-off-by: ... | |||
Vitaliy Gusev | 2e5bd16d930 | Allow envID fields in /proc/self/status in VE. Also allow get VPid, PNState, StopState, etc.OpenVZ Bug #936 http://bugzilla.openvz.org/show_bug.cgi?id=936 Signed-off-by: Vitaliy Gusev <vgusev@openvz.org> Signed-off-by: Pavel Emelyanov <xemul@openvz.org> | |||
Thomas Gleixner | cade99e1743 | futexes: fix fault handling in futex_lock_pifutexes: fix fault handling in futex_lock_pi commit 1b7558e457ed0de61023cfc913d2c342c7c3d9f2 upstream This patch addresses a very sporadic pi-futex related failure in highly threaded java apps on large SMP systems. David Holmes reported that the pi_state consistency check in lookup_pi_state triggered with his test application. This means that the kernel internal pi_state and the user space f... | |||
Andrey Mirkin | 3042d780e8d | CPT: fix restore of inotify on symlinkInside VE file /etc/mtab is a symlink to /proc/mounts. FreeNX server with KDE creates inotify on /etc/mtab file. To restore such inotify we need to obtain dentry with path_lookup() and restore inotify on it. Bug #96464 | |||
Alexey Dobriyan | ed01627a83e | NETFILTER: destroy nf_conntrack_cache correctly | |||
Alexey Dobriyan | fce5e05ba80 | CPT: fix EXIT_DEAD/TASK_DEAD checksFor one thing EXIT_DEAD was moved to ->exit_state only. For another, this task state is called TASK_DEAD now and lives in ->state; | |||
Alexey Dobriyan | da8a02e8fc4 | CPT: assign ->net_ns of restored tun/tap deviceotherwise init_net is used and device becomes invisible in CT. | |||
Alexey Dobriyan | b63b0d6884f | VE: let ->ve_netns live a bit more1. netns shutdown is done asynchronously 2. nsproxy free is done synchronously which means we can't use "get_exec_env()->ve_ns->net_ns" construct anywhere in netns teardown codepath. ->ve_ns will be NULL (fixable) or will point to freed memory (hardly fixable). The solution it to pin netns one more time, and use get_exec_env()->ve_netns . get_exec_env() is always valid. It's ->ve_netns will al... | |||
Alexey Dobriyan | 45a08554c7c | VE: introduce ->ve_netnsPreparations for fixing "NULL ->ve_ns" oops in inet6_rt_notify(). | |||
Konstantin Khlebnikov | 64d5598cc99 | CPT: fix compilation with CONFIG_SYSVIPC=nhttp://bugzilla.openvz.org/show_bug.cgi?id=851 | |||
Denis V. Lunev | 389336a5a20 | Memory leak on network namespace stop.mainline commit 4f84d82f7a623f8641af2574425c329431ff158f Network namespace allocates 2 kernel netlink sockets, fibnl & rtnl. These sockets should be disposed properly, i.e. by sock_release. Plain sock_put is not enough. Signed-off-by: Denis V. Lunev <den@openvz.org> Tested-by: Alexey Dobriyan <adobriyan@openvz.org> Signed-off-by: David S. Miller <davem@davemloft.net> | |||
Alexey Dobriyan | 3c7e408cc14 | Backport "[NET]: Make rtnetlink infrastructure network namespace aware (v3)"mainline commit 97c53cacf00d1f5aa04adabfebcc806ca8b22b10 + tweaks to get netns from either netdevice ot something else. http://bugzilla.openvz.org/show_bug.cgi?id=905 [NET]: Make rtnetlink infrastructure network namespace aware (v3) After this patch none of the netlink callback support anything except the initial network namespace but the rtnetlink infrastructure now handles multiple network... | |||
Alexey Dobriyan | 43bc20d9874 | IPv6: give owner_ve to fib_table and fib6_local_tableotherwise eventually fib6_clean_all will execute code in NULL context which is no-no. | |||
Alexey Dobriyan | 57a39eeffde | netlink: fix lookup checknetlink_unicast() is done in init_net context because a) rtnl socket is bound to init_net, b) kernel-space socket is successfully looked up by any VE, c) rtnl is kernel-spase socket. which is b-r-o-k-e-n, because e.g. just about any manipulation with netdevices via netlink will be projected onto VE0. Fix (after per-netns rtnl socket patches) http://bugzilla.openvz.org/show_bug.cgi?id=905 | |||
Alexey Dobriyan | 72746db0ffb | proc: fix proc_cwd_linkIf d_root_check() in there fails, we shouldn't pretend everything is OK and leave mnt unitialized or NULL (in case /proc/*/cwd). http://bugzilla.openvz.org/show_bug.cgi?id=900 | |||
Alexey Dobriyan | a628e361137 | IPv6: get frag's owner VE from inet_frag_queueIPv6 specific frag queue doesn't need owner_ve, because it's already in core data structure (struct inet_frag_queue). And it's in fact NULL, which is the cause of http://bugzilla.openvz.org/show_bug.cgi?id=899 | |||
Alexey Dobriyan | 24e7cd454bb | Remove spurious warnings in kernel/time.cE.g. code in clock_t_to_jiffies() divides ~0UL thus assuming that all "unsigned long" range is valid. Ditto for other functions. Alexey said these warnings are old debugging stuff. http://bugzilla.openvz.org/show_bug.cgi?id=898 | |||
Alexey Dobriyan | 5f318dd06be | UBC: drop cpuset lock from OOM handlingcpuset_lock dances around OOM killing are gone in main code, so no need to account for them. Mainline commit 3ff566963ce804809af9e32331b287eedeeff501 Bug 112959 ===================================== [ BUG: bad unlock balance detected! ] ------------------------------------- tstspoof/29391 is trying to release lock (callback_mutex) at: [<c04488d2>] ub_oom_lock+0x9a/0xd6 but there are no more l... | |||
Alexey Dobriyan | 734939adb27 | [PATCH] Stick back to mainline behaviour of zero length mmap(2)http://bugzilla.openvz.org/show_bug.cgi?id=893 | |||
Alexey Dobriyan | beee05115ef | VLAN: fix rmmod 8021q with vlan interface setup | |||
Alexey Dobriyan | 96919bc61ea | NETFILTER: make ip_conntrack_disable_ve0 option do something | |||
Alexey Dobriyan | a926aabfcdf | NETFILTER: changes for conntrack CPT | |||
Vasily Averin | 24dba265d24 | [PATCH] kernel.cap-bound sysctl cleanup - proc entry is global and therefore it is ReadOnly-accessible from inside VEhttp://bugzilla.openvz.org/show_bug.cgi?id=524 | |||
Dmitriy Monakhov | efcdd6480b5 | Add /proc/sys/fs/lsyscall_enableSysctl instoduced mostly for testing purposes. | |||
Alexandr Andreev | c3378806fd8 | Allow to change SysRq in Alt+SysRq+* comboYou can get scancodes of your keyboard with programs like showkey or evtest. The default Alt+SysRq combination still works after redifinition. | |||
Alexey Kuznetsov | 0bc6aca1873 | CPT: SMP race in detecting state of ptraced processesWhen suspending VE, we test state of processes while they are still running. It is not a bug: we have to verify for invalid state before checkpointing, real state is saved after processes are scheduled out. The impact is that we can see process in a bad state, f.e. stopped without any reasons. It is also not a bug, but this rersults in random failures of checkpointing. The only way to fix this... | |||
Vasily Tarasov | 94040c96657 | VZDQ: correct size on /proc/vz/aquota/*/aquota.*Bug #59920 Signed-off-by: Vasily Tarasov <vtaras@openvz.org> Signed-off-by: Denis Lunev <den@openvz.org> | |||
Vitaliy Gusev | ecc35d16d0e | BRIDGE: correct checking for input packetsWhen via_phys_dev flag is set then bridge doesn't have any ip address. Therefore ip-traffic HW->VE passes only if brigge has the same MAC-address as real ethernet interface. Bug #92737 | |||
Alexey Dobriyan | 9c3be3c83f3 | ia64: generate cpu_khz | |||
Alexey Kuznetsov | b17bc8ad69d | CPT: changes to core shmem to support iterative shmem migrationNew exported function shmem_insert_page() to insert new page to shmem inode. No ifdefs. It cannot be private to CPT because triggers too much of exports. | |||
Alexey Dobriyan | 483a70883c8 | Linux 2.6.24-ovz005 | |||
Alexey Dobriyan | bee1757116fM | Merge 2.6.24.7Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-2.6.24.y into 2.6.24-openvz Conflicts: Makefile | |||
Greg Kroah-Hartman | 928bb8c418b | Linux 2.6.24.7 | |||
Al Viro | 0bbbae3bfd7 | fix SMP ordering hole in fcntl_setlk() (CVE-2008-1669)commit 0b2bac2f1ea0d33a3621b27ca68b9ae760fca2e9 upstream. fcntl_setlk()/close() race prevention has a subtle hole - we need to make sure that if we *do* have an fcntl/close race on SMP box, the access to descriptor table and inode->i_flock won't get reordered. As it is, we get STORE inode->i_flock, LOAD descriptor table entry vs. STORE descriptor table entry, LOAD inode->i_flock with not a si... | CVE-2008 | ||
Alexey Dobriyan | 818c0c13b3bM | Merge 2.6.24.6Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-2.6.24.y into 2.6.24-openvz Conflicts: Makefile net/ipv6/netfilter/nf_conntrack_reasm.c net/sched/sch_generic.c | |||
Alexey Dobriyan | f28668f8d34 | CPT: fix shmat(2)'ted segmentsCommit bc56bba8f31bd99f350a5ebfd43d50f411b620c7 aka "[PATCH] shm: make sysv ipc shared memory use stacked files"... It changed number and relationship of "struct file"s associated with SysV shmem: Before: one struct file for each shmem segment After: one struct file for each shmem segment + one struct file (different) for each shmat(2) call. Obviously checkpointing broke horribly. T... | |||
Greg Kroah-Hartman | 430adffc974 | Linux 2.6.24.6 | |||
Al Viro | 344fb8a4953 | Fix dnotify/close race (CVE-2008-1375)commit 214b7049a7929f03bbd2786aaef04b8b79db34e2 upstream. We have a race between fcntl() and close() that can lead to dnotify_struct inserted into inode's list *after* the last descriptor had been gone from current->files. Since that's the only point where dnotify_struct gets evicted, we are screwed - it will stick around indefinitely. Even after struct file in question is gone and freed. W... | CVE-2008 |
Commits
Author | Commit | Commit date | Issues | |
---|---|---|---|---|
Konstantin Khlebnikov | d54ea2a06c5 | |||
Konstantin Khlebnikov | 750be8457d8 | |||
OpenVZ team | 9534606693f | |||
David S. Miller | ef84a771e3b | |||
Denis V. Lunev | 9c9b8a79d90 | |||
Denis V. Lunev | 99dfe5490d4 | |||
Pavel Emelyanov | 19b9fdf565d | |||
Denis V. Lunev | 04fd8abede6 | |||
Denis V. Lunev | c7b6f3ae6d0 | |||
Denis V. Lunev | 23455248263 | |||
Denis V. Lunev | 4d92a24aa85 | |||
Denis V. Lunev | 07dc3386215 | |||
Denis V. Lunev | be11b25694a | |||
Vitaliy Gusev | 2e5bd16d930 | |||
Thomas Gleixner | cade99e1743 | |||
Andrey Mirkin | 3042d780e8d | |||
Alexey Dobriyan | ed01627a83e | |||
Alexey Dobriyan | fce5e05ba80 | |||
Alexey Dobriyan | da8a02e8fc4 | |||
Alexey Dobriyan | b63b0d6884f | |||
Alexey Dobriyan | 45a08554c7c | |||
Konstantin Khlebnikov | 64d5598cc99 | |||
Denis V. Lunev | 389336a5a20 | |||
Alexey Dobriyan | 3c7e408cc14 | |||
Alexey Dobriyan | 43bc20d9874 | |||
Alexey Dobriyan | 57a39eeffde | |||
Alexey Dobriyan | 72746db0ffb | |||
Alexey Dobriyan | a628e361137 | |||
Alexey Dobriyan | 24e7cd454bb | |||
Alexey Dobriyan | 5f318dd06be | |||
Alexey Dobriyan | 734939adb27 | |||
Alexey Dobriyan | beee05115ef | |||
Alexey Dobriyan | 96919bc61ea | |||
Alexey Dobriyan | a926aabfcdf | |||
Vasily Averin | 24dba265d24 | |||
Dmitriy Monakhov | efcdd6480b5 | |||
Alexandr Andreev | c3378806fd8 | |||
Alexey Kuznetsov | 0bc6aca1873 | |||
Vasily Tarasov | 94040c96657 | |||
Vitaliy Gusev | ecc35d16d0e | |||
Alexey Dobriyan | 9c3be3c83f3 | |||
Alexey Kuznetsov | b17bc8ad69d | |||
Alexey Dobriyan | 483a70883c8 | |||
Alexey Dobriyan | bee1757116fM | |||
Greg Kroah-Hartman | 928bb8c418b | |||
Al Viro | 0bbbae3bfd7 | CVE-2008 | ||
Alexey Dobriyan | 818c0c13b3bM | |||
Alexey Dobriyan | f28668f8d34 | |||
Greg Kroah-Hartman | 430adffc974 | |||
Al Viro | 344fb8a4953 | CVE-2008 |