Bug#444472: does not apply to linux-2.6 2.6.18.dfsg.1-13etch3

2007-09-29 Thread Ola Lundqvist
Hi Marcin

Thanks for the report. I must have missed the latest security update.
I'll correct that and upload a new version.

Best regards,

// Ola

On Fri, Sep 28, 2007 at 10:27:39PM +0100, Marcin Owsiany wrote:
 Package: kernel-patch-openvz
 Version: 028.18.1etch4
 Severity: grave
 Tags: patch
 
 The security updates present in 2.6.18.dfsg.1-13etch3 conflict with two
 hunks of the openvz patch.
 
 The attached patch is sufficient to make it apply, athough the line
 numbers could use some adjustment..
 
 
 -- System Information:
 Debian Release: 4.0
   APT prefers stable
   APT policy: (500, 'stable'), (1, 'experimental')
 Architecture: i386 (i686)
 Shell:  /bin/sh linked to /bin/bash
 Kernel: Linux 2.6.18-5-686
 Locale: LANG=pl_PL.UTF-8, LC_CTYPE=pl_PL.UTF-8 (charmap=UTF-8)
 
 Versions of packages kernel-patch-openvz depends on:
 ii  bash  3.1dfsg-8  The GNU Bourne Again SHell
 ii  grep-dctrl2.9.3  Grep Debian package information 
 - 
 ii  patch 2.5.9-4Apply a diff file to an original
 
 kernel-patch-openvz recommends no packages.
 
 -- no debconf information



-- 
 - Ola Lundqvist ---
/  [EMAIL PROTECTED] Annebergsslingan 37  \
|  [EMAIL PROTECTED] 654 65 KARLSTAD  |
|  http://opalsys.net/ +46 (0)70-332 1551   |
\  gpg/f.p.: 7090 A92B 18FE 7994 0C36  4FE4 18A1 B1CF 0FE5 3DD9 /
 ---



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#444472: does not apply to linux-2.6 2.6.18.dfsg.1-13etch3

2007-09-29 Thread Ola Lundqvist
Hi

I have now verified that the version in unstable apply fine. However
that version have an other problem, but it is about to be corrected as well.

Best regards,

// Ola

On Fri, Sep 28, 2007 at 10:27:39PM +0100, Marcin Owsiany wrote:
 Package: kernel-patch-openvz
 Version: 028.18.1etch4
 Severity: grave
 Tags: patch
 
 The security updates present in 2.6.18.dfsg.1-13etch3 conflict with two
 hunks of the openvz patch.
 
 The attached patch is sufficient to make it apply, athough the line
 numbers could use some adjustment..
 
 
 -- System Information:
 Debian Release: 4.0
   APT prefers stable
   APT policy: (500, 'stable'), (1, 'experimental')
 Architecture: i386 (i686)
 Shell:  /bin/sh linked to /bin/bash
 Kernel: Linux 2.6.18-5-686
 Locale: LANG=pl_PL.UTF-8, LC_CTYPE=pl_PL.UTF-8 (charmap=UTF-8)
 
 Versions of packages kernel-patch-openvz depends on:
 ii  bash  3.1dfsg-8  The GNU Bourne Again SHell
 ii  grep-dctrl2.9.3  Grep Debian package information 
 - 
 ii  patch 2.5.9-4Apply a diff file to an original
 
 kernel-patch-openvz recommends no packages.
 
 -- no debconf information



-- 
 - Ola Lundqvist ---
/  [EMAIL PROTECTED] Annebergsslingan 37  \
|  [EMAIL PROTECTED] 654 65 KARLSTAD  |
|  http://opalsys.net/ +46 (0)70-332 1551   |
\  gpg/f.p.: 7090 A92B 18FE 7994 0C36  4FE4 18A1 B1CF 0FE5 3DD9 /
 ---



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#444472: does not apply to linux-2.6 2.6.18.dfsg.1-13etch3

2007-09-28 Thread Marcin Owsiany
Package: kernel-patch-openvz
Version: 028.18.1etch4
Severity: grave
Tags: patch

The security updates present in 2.6.18.dfsg.1-13etch3 conflict with two
hunks of the openvz patch.

The attached patch is sufficient to make it apply, athough the line
numbers could use some adjustment..


-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable'), (1, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-5-686
Locale: LANG=pl_PL.UTF-8, LC_CTYPE=pl_PL.UTF-8 (charmap=UTF-8)

Versions of packages kernel-patch-openvz depends on:
ii  bash  3.1dfsg-8  The GNU Bourne Again SHell
ii  grep-dctrl2.9.3  Grep Debian package information - 
ii  patch 2.5.9-4Apply a diff file to an original

kernel-patch-openvz recommends no packages.

-- no debconf information
--- diff-ovz-028.18-deb	2007-09-28 22:23:16.0 +0100
+++ ovz-028.18-deb.patch	2007-09-28 22:22:48.0 +0100
@@ -46105,15 +46105,15 @@
 diff -uprN linux-source-2.6.18/fs/jffs2/acl.h linux-source-2.6.18-ovz/fs/jffs2/acl.h
 --- linux-source-2.6.18/fs/jffs2/acl.h	2006-09-20 07:42:06.0 +0400
 +++ linux-source-2.6.18-ovz/fs/jffs2/acl.h	2007-03-09 17:52:50.0 +0300
-@@ -27,7 +27,8 @@ struct jffs2_acl_header {
- 
+@@ -28,7 +28,8 @@
  #define JFFS2_ACL_NOT_CACHED ((void *)-1)
  
+ extern struct posix_acl *jffs2_get_acl(struct inode *inode, int type);
 -extern int jffs2_permission(struct inode *, int, struct nameidata *);
 +extern int jffs2_permission(struct inode *, int, struct nameidata *,
 +		struct exec_perm *perm);
  extern int jffs2_acl_chmod(struct inode *);
- extern int jffs2_init_acl(struct inode *, struct inode *);
+ extern int jffs2_init_acl(struct inode *, struct posix_acl *);
  extern void jffs2_clear_acl(struct jffs2_inode_info *);
 diff -uprN linux-source-2.6.18/fs/jfs/acl.c linux-source-2.6.18-ovz/fs/jfs/acl.c
 --- linux-source-2.6.18/fs/jfs/acl.c	2006-09-20 07:42:06.0 +0400
@@ -114491,9 +114491,9 @@
  	if (charged)
  		vm_unacct_memory(charged);
  	return error;
-@@ -1492,12 +1518,16 @@ static int acct_stack_growth(struct vm_a
- 			return -ENOMEM;
- 	}
+@@ -1525,12 +1525,16 @@
+ 	if (is_hugepage_only_range(vma-vm_mm, new_start, size))
+ 		return -EFAULT;
  
 +	if (ub_memory_charge(mm, grow  PAGE_SHIFT, vma-vm_flags,
 +vma-vm_file, UB_SOFT))
@@ -114505,7 +114505,7 @@
  	 */
  	if (security_vm_enough_memory(grow))
 -		return -ENOMEM;
-+		goto fail_sec;
++		goto fail_charge;
  
  	/* Ok, everything looks good - let it rip */
  	mm-total_vm += grow;