Package: kernel-patch-openvz
Version: 028.18.1etch4
Severity: grave
Tags: patch

The security updates present in 2.6.18.dfsg.1-13etch3 conflict with two
hunks of the openvz patch.

The attached patch is sufficient to make it apply, athough the line
numbers could use some adjustment..


-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable'), (1, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-5-686
Locale: LANG=pl_PL.UTF-8, LC_CTYPE=pl_PL.UTF-8 (charmap=UTF-8)

Versions of packages kernel-patch-openvz depends on:
ii  bash                          3.1dfsg-8  The GNU Bourne Again SHell
ii  grep-dctrl                    2.9.3      Grep Debian package information - 
ii  patch                         2.5.9-4    Apply a diff file to an original

kernel-patch-openvz recommends no packages.

-- no debconf information
--- diff-ovz-028.18-deb	2007-09-28 22:23:16.000000000 +0100
+++ ovz-028.18-deb.patch	2007-09-28 22:22:48.000000000 +0100
@@ -46105,15 +46105,15 @@
 diff -uprN linux-source-2.6.18/fs/jffs2/acl.h linux-source-2.6.18-ovz/fs/jffs2/acl.h
 --- linux-source-2.6.18/fs/jffs2/acl.h	2006-09-20 07:42:06.000000000 +0400
 +++ linux-source-2.6.18-ovz/fs/jffs2/acl.h	2007-03-09 17:52:50.000000000 +0300
-@@ -27,7 +27,8 @@ struct jffs2_acl_header {
- 
+@@ -28,7 +28,8 @@
  #define JFFS2_ACL_NOT_CACHED ((void *)-1)
  
+ extern struct posix_acl *jffs2_get_acl(struct inode *inode, int type);
 -extern int jffs2_permission(struct inode *, int, struct nameidata *);
 +extern int jffs2_permission(struct inode *, int, struct nameidata *,
 +		struct exec_perm *perm);
  extern int jffs2_acl_chmod(struct inode *);
- extern int jffs2_init_acl(struct inode *, struct inode *);
+ extern int jffs2_init_acl(struct inode *, struct posix_acl *);
  extern void jffs2_clear_acl(struct jffs2_inode_info *);
 diff -uprN linux-source-2.6.18/fs/jfs/acl.c linux-source-2.6.18-ovz/fs/jfs/acl.c
 --- linux-source-2.6.18/fs/jfs/acl.c	2006-09-20 07:42:06.000000000 +0400
@@ -114491,9 +114491,9 @@
  	if (charged)
  		vm_unacct_memory(charged);
  	return error;
-@@ -1492,12 +1518,16 @@ static int acct_stack_growth(struct vm_a
- 			return -ENOMEM;
- 	}
+@@ -1525,12 +1525,16 @@
+ 	if (is_hugepage_only_range(vma->vm_mm, new_start, size))
+ 		return -EFAULT;
  
 +	if (ub_memory_charge(mm, grow << PAGE_SHIFT, vma->vm_flags,
 +				vma->vm_file, UB_SOFT))
@@ -114505,7 +114505,7 @@
  	 */
  	if (security_vm_enough_memory(grow))
 -		return -ENOMEM;
-+		goto fail_sec;
++		goto fail_charge;
  
  	/* Ok, everything looks good - let it rip */
  	mm->total_vm += grow;

Reply via email to