* version 1.8.0
* Support for kernels:
2.6.5-7.286 (SLES 9),
- 2.6.9-55.EL (RHEL 4),
- 2.6.16.46-0.14 (SLES 10),
- 2.6.18-8.1.10.EL5 (RHEL 5).
+ 2.6.9-55.0.9.EL (RHEL 4),
+ 2.6.16.53-0.8 (SLES 10),
+ 2.6.18-8.1.14.EL5 (RHEL 5).
2.6.18.8 vanilla (kernel.org)
* Client support for unpatched kernels:
(see http://wiki.lustre.org/index.php?title=Patchless_Client)
* Note that reiserfs quotas are disabled on SLES 10 in this kernel.
Severity : normal
+Bugzilla : 13568
+Description: Remove 2.4 kernel support from lustre 1.8.0
+Details : Remove 2.5.0 check from quota_check.c, quota_ctl.c,
+ quota_interface.c in quota subsystem.
+ Remove 2.4 kernel check from obd_mount.c, linux/linux-sysctl.c in
+ obdclass subsystem.
+ Remove lock_24kernel from fsfilt_ext3.c fsfilt_reiserfs.c
+ lvfs_linux.c upcall_cache.c in lvfs subsystem.
+ Remove 2.5.0 check from dcache.c dir.c file.c llite_internal.h
+ llite_lib.c llite_mmap.c lproc_llite.c namei.c rw.c symlink.c
+ in llite subsystem.
+ Remove 2.5.0 check from handler.c lproc_mds.c mds_fs.c
+ mds_internal.h mds_lib.c mds_open.c mds_reint.c mds_xattr.c
+ in mds subsystem.
+ Remove 2.4 kernel check from lproc_osc.c, osc_request.c in osc
+ subsystem.
+ Remove 2.4 kernel check from filter.c, lproc_obdfilter.c in
+ obdfilter subsystem.
+ Remove 2.4 kernel code from lustre/obdecho/echo_client.c.
+ Remove 2.4 kernel check from lustre/mgs/lproc_mgs.c,
+ lustre/mgs/mgs_fs.c.
+ Remove 2.4 kernel code from lustre/mgc/mgc_request.c.
+ Remove 2.4 kernel check from lustre/mdt/mdt_lproc.c.
+
+Severity : enhancement
+Bugzilla : 13690
+Description: Build SLES10 patchless client fails
+Details : The configure was broken by run ./configure with
+ --with-linux-obj=.... argument for patchless client. When the
+ configure use --with-linux-obj, the LINUXINCLUDE= -Iinclude
+ can't search header adequately. Use absolute path such as
+ -I($LINUX)/include instead.
+
+Severity : normal
+Bugzilla : 13888
+Description: interrupt oig_wait produce painc on resend.
+Details : brw_redo_request can be used for resend requests from ptlrpcd and
+ private set, and this produce situation when rq_ptlrpcd_data not
+ copyed to new allocated request and triggered LBUG on assert
+ req->rq_ptlrpcd_data != NULL. But this member used only for wakeup
+ ptlrpcd set if request is changed and can be safety changed to use
+ rq_set directly.
+
+Severity : normal
+Bugzilla : 13497
+Description: LASSERT_{REQ,REP}SWAB macros are buggy
+Details : If SWAB_PARANOIA is disabled, the LASSERT_REQSWAB and
+ LASSERT_REPSWAB macros become no-ops, which is incorrect. Drop
+ these macros and replace them with their difinitions instead.
+
+Severity : normal
+Bugzilla : 13521
+Description: Update kernel patches for SLES10 2.6.16.53-0.8.
+Details : Update which_patch & target file for SLES10 latest kernel.
+
+Bugzilla : 12411
+Description: Remove client patches from SLES 10 kernel.
+Details : This causes SLES 10 clients to behave as patchless clients
+ even on a Lustre-patched (server) kernel.
+
+Severity : enhancement
+Bugzilla : 2262
+Description: self-adjustable client's lru lists
+Details : use adaptive algorithm for managing client cached locks lru
+ lists according to current server load, other client's work
+ pattern, memory activities, etc. Both, server and client
+ side namespaces provide number of proc tunables for controlling
+ things
+
+Severity : enhancement
+Bugzilla : 13641
+Description: light-weight GSS support
+Details : Support krb5n and krb5a mode, which keep Kerberos 5 authentication
+ and reduce performance overhead.
+
+Severity : enhancement
+Bugzilla : 11832
+Description: Linux keyring support
+Details : Support using service of Linux keyring for Lustre GSS internal
+ context refresh/cache mechanism.
+
+Severity : normal
Bugzilla : 12186
Description: Fix errors in lfs documentation
Details : Fixes man pages
Description: Kernel patches update for RHEL5 2.6.18-8.1.10.el5.
Details : Modify the target file & which_kernel.
+Severity : enhancement
+Bugzilla : 10786
+Description: omit set fsid for export NFS
+Details : fix set/restore device id for avoid EMFILE error and mark lustre fs
+ as FS_REQUIRES_DEV for avoid problems with generate fsid.
+
+Severity : normal
+Bugzilla : 13304
+Frequency : Always, for kernels after 2.6.16
+Description: Fix warning idr_remove called for id=.. which is not
+ allocated.
+Details : Last kernels save old s_dev before kill super and not allow
+ to restore from callback - restore it before call kill_anon_super.
+
+Severity : minor
+Bugzilla : 12948
+Description: buffer overruns could theoretically occur
+Details : llapi_semantic_traverse() modifies the "path" argument by
+ appending values to the end of the origin string, and a
+ overrun may occur. Adding buffer overrun check in liblustreapi.
+
+Severity : normal
+Bugzilla : 13334
+Description: Fix error on 'ls .' at the top of the Lustre mount.
+Details : Don't revalidate dentry if it is a root dentry.
+
+Severity : normal
+Bugzilla : 13518
+Description: Kernel patches update for RHEL4 2.6.9-55.0.6.
+Details : Modify vm-tunables-rhel4.patch.
+
+Severity : normal
+Bugzilla : 13452
+Description: Kernel config for 2.6.18-vanilla.
+Details : Modify targets/2.6-vanilla.target.in.
+ Add config file kernel-2.6.18-2.6-vanilla-i686.config.
+ Add config file kernel-2.6.18-2.6-vanilla-i686-smp.config.
+ Add config file kernel-2.6.18-2.6-vanilla-x86_64.config.
+ Add config file kernel-2.6.18-2.6-vanilla-x86_64-smp.config.
+
+Severity : major
+Bugzilla : 11710
+Description: improve handling recoverable errors
+Details : if request processig with error which can be recoverable on server
+ request should be resend, otherwise page released from cache and
+ marked as error.
+
+Severity : critical
+Bugzilla : 13751
+Description: Kernel patches update for RHEL5 2.6.18-8.1.14.el5.
+Details : Modify target file & which_patch.
+ A flaw was found in the IA32 system call emulation provided
+ on AMD64 and Intel 64 platforms. An improperly validated 64-bit
+ value could be stored in the %RAX register, which could trigger an
+ out-of-bounds system call table access. An untrusted local user
+ could exploit this flaw to run code in the kernel
+ (ie a root privilege escalation). (CVE-2007-4573).
+
+Severity : major
+Bugzilla : 13093
+Description: O_DIRECT bypasses client statistics.
+Details : When running with O_DIRECT I/O, neither the client rpc_stats nor
+ read_ahead_stats were updated. copied the stats section from
+ osc_send_oap_rpc() into async_internal().
+
+Severity : normal
+Bugzilla : 13454
+Description: Add jbd statistics patch for RHEL5 and 2.6.18-vanilla
+
+Severity : minor
+Bugzilla : 13732
+Description: change order of libsysio includes
+Details : '#include sysio.h' should always come before '#include xtio.h'
+
+Severity : normal
+Bugzilla : 11673
+Description: handle "serious error: objid * already exists" more gracefully
+Details : If LAST_ID value on disk is smaller than the objects existing in
+ the O/0/d* directories, it indicates disk corruption and causes an
+ LBUG(). If the object is 0-length, then we should use the existing
+ object. This will help to avoid a full fsck in most cases.
+
+Severity : enhancement
+Bugzilla : 13207
+Description: adapt the lustre_config script to support the upgrade case
+Details : Add "-u" option for lustre_config script to support upgrading 1.4
+ server targets to 1.6 in parallel.
+
+Severity : normal
+Bugzilla : 13570
+Description: To avoid grant space > avaible space when the disk is almost
+ full. Without this patch you might see the error "grant XXXX >
+ available" or some LBUG about grant, when the disk is almost
+ full.
+Details : In filter_check_grant, for non_grant cache write, we should
+ check the left space by if (*left > ungranted + bytes), instead
+ of (*left > ungranted), because only we are sure the left space
+ is enough for another "bytes", then the ungrant space should be
+ increase. In client, we should update cl_avail_grant only there
+ is OBD_MD_FLGRANT in the reply.
+
+Severity : critical
+Bugzilla : 13748
+Description: Update RHEL 4 kernel to fix local root privilege escalation.
+Details : Update to the latest RHEL 4 kernel to fix the vulnerability
+ described in CVE-2007-4573. This problem could allow untrusted
+ local users to gain root access.
+
+
+Severity : normal
+Frequency : when using O_DIRECT and quotas
+Bugzilla : 13930
+Description: Incorrect file ownership on O_DIRECT output files
+Details : block usage reported by 'lfs quota' does not take into account
+ files that have been written with O_DIRECT.
+
--------------------------------------------------------------------------------
2007-08-10 Cluster File Systems, Inc. <info@clusterfs.com>
Description: block reactivating mgc import until all deactivates complete
Details : Fix race when failing back MDT/MGS to itself (testing)
+Severity : minor
+Frequency : at statup only
+Bugzilla : 12860
+Description: mds_lov_synchronize race leads to various problems
+Details : simultaneous MDT->OST connections at startup can cause the
+ sync to abort, leaving the OSC in a bad state.
+
Severity : enhancement
Bugzilla : 12194
Description: add optional extra BUILD_VERSION info