Re: [Devel] Re: [PATCH] Hookup group-scheduler with task container infrastructure

2007-09-10 Thread Srivatsa Vaddagiri
On Mon, Sep 10, 2007 at 11:38:10AM -0700, Paul Menage wrote: > By definition any container (about to be renamed control group) > subsystem is some kind of "controller" so that bit seems a bit > redundant. > > Any reason not to just call it "cpu" or "cpu_sched" Done (in the latest patch I sent a w

[Devel] Re: [PATCH] Hookup group-scheduler with task container infrastructure

2007-09-10 Thread Srivatsa Vaddagiri
On Tue, Sep 11, 2007 at 12:28:51AM +0200, Dmitry Adamushko wrote: > > + rq = task_rq_lock(tsk, &flags); > > + > > I guess, update_rq_clock(rq) should be placed here. > > humm... do you really need deactivate/activate_task() here? 'rq' and > p->se.load.weight stay unchanged so enqueue/dequeu

[Devel] [PATCH 3/3] Signal semantics for pid namespaces

2007-09-10 Thread sukadev
From: Sukadev Bhattiprolu <[EMAIL PROTECTED]> Subject: [PATCH 3/3] Signal semantics for pid namespaces With support for multiple pid namespaces, each pid namespace has a separate child reaper and this process needs some special handling of signals. - The child reaper should appear like

[Devel] [PATCH 1/3] Signal semantics for /sbin/init

2007-09-10 Thread sukadev
(This is Oleg's patch with my pid ns additions. Compiled and unit tested on 2.6.23-rc4-mm1 with other patches in this set. Oleg pls update this patch if necessary and sign-off) --- Currently, /sbin/init is protected from unhandled signals by the "current == child_reaper(current)" check in get_sig

[Devel] [PATCH 2/3] Pid ns helpers for signals

2007-09-10 Thread sukadev
Define some helper functions that will be used to implement signal semantics with multiple pid namespaces. is_current_in_ancestor_pid_ns(task) TRUE iff active pid namespace of 'current' is an ancestor of active pid namespace of @task. is_current

[Devel] Re: [RFC] [PATCH] memory controller statistics

2007-09-10 Thread Balbir Singh
Paul Menage wrote: > On 9/7/07, Balbir Singh <[EMAIL PROTECTED]> wrote: >> Thanks for doing this. We are building containerstats for >> per container statistics. It would be really nice to provide >> the statistics using that interface. I am not opposed to >> memory.stat, but Paul Menage recommends

[Devel] Re: pid namespace .text overhead

2007-09-10 Thread sukadev
Cedric Le Goater [EMAIL PROTECTED] wrote: | FYI, | | I just did a compile test on a 2.6.23-rc4-mm1 kernel with and without | the following patches on a x86_64 defconfig (I also had to remove | CONFIG_IPV6 for some compile reason) : Thats a good point. We have been a bit liberal with "inline"

[Devel] Re: [PATCH 16/16] net: netlink support for moving devices between network namespaces.

2007-09-10 Thread Serge E. Hallyn
Quoting Eric W. Biederman ([EMAIL PROTECTED]): > "Serge E. Hallyn" <[EMAIL PROTECTED]> writes: > >> > >> +static struct net *get_net_ns_by_pid(pid_t pid) > >> +{ > >> + struct task_struct *tsk; > >> + struct net *net; > >> + > >> + /* Lookup the network namespace */ > >> + net = ERR_PTR(-ESRCH

[Devel] Re: [-mm PATCH 1/9] Memory controller resource counters (v6)

2007-09-10 Thread Paul Menage
Hi Balbir/Pavel, As I mentioned to you directly at the kernel summit, I think it might be cleaner to integrate resource counters more closely with control groups. So rather than controllers such as the memory controller having to create their own boilerplate cf_type structures and read/write funct

[Devel] Re: [RFC] [PATCH] memory controller statistics

2007-09-10 Thread Paul Menage
On 9/7/07, Balbir Singh <[EMAIL PROTECTED]> wrote: > > Thanks for doing this. We are building containerstats for > per container statistics. It would be really nice to provide > the statistics using that interface. I am not opposed to > memory.stat, but Paul Menage recommends that one file has > ju

[Devel] Re: [PATCH] Hookup group-scheduler with task container infrastructure

2007-09-10 Thread Dmitry Adamushko
On 10/09/2007, Srivatsa Vaddagiri <[EMAIL PROTECTED]> wrote: > On Mon, Sep 10, 2007 at 10:22:59AM -0700, Andrew Morton wrote: > > objection ;) "cpuctlr" isn't memorable. Kernel code is write-rarely, > > read-often. "cpu_controller", please. The extra typing is worth it ;) > > Ok! Here's the mod

[Devel] Re: [PATCH] Hookup group-scheduler with task container infrastructure

2007-09-10 Thread Paul Menage
On 9/10/07, Dmitry Adamushko <[EMAIL PROTECTED]> wrote: > On 10/09/2007, Srivatsa Vaddagiri <[EMAIL PROTECTED]> wrote: > > On Mon, Sep 10, 2007 at 10:22:59AM -0700, Andrew Morton wrote: > > > objection ;) "cpuctlr" isn't memorable. Kernel code is write-rarely, > > > read-often. "cpu_controller",

[Devel] Re: [PATCH] Hookup group-scheduler with task container infrastructure

2007-09-10 Thread Dmitry Adamushko
On 10/09/2007, Srivatsa Vaddagiri <[EMAIL PROTECTED]> wrote: > On Mon, Sep 10, 2007 at 10:22:59AM -0700, Andrew Morton wrote: > > objection ;) "cpuctlr" isn't memorable. Kernel code is write-rarely, > > read-often. "cpu_controller", please. The extra typing is worth it ;) > > Ok! Here's the mod

[Devel] Re: containers - bug

2007-09-10 Thread Paul Menage
On 8/31/07, Paul Menage <[EMAIL PROTECTED]> wrote: > > I have a fix for this that I'm testing and should be able to send out soon. > Sorry for the delay on this - I was away all last week at the kernel summit. I've sent out a patch to the list and to andrew, as a separate thread. Paul ___

[Devel] [PATCH] Containers: Fix refcount bug

2007-09-10 Thread Paul Menage
Fix a reference counting bug in containerfs As part of the extraction of cpusetfs to containerfs, a call to cpuset_get_dentry() was lost (justified by the fact that the dentry in question was now being passed down by the caller). Since cpuset_get_dentry() called lookup_one_len(), this resulted in

[Devel] pid namespace .text overhead

2007-09-10 Thread Cedric Le Goater
FYI, I just did a compile test on a 2.6.23-rc4-mm1 kernel with and without the following patches on a x86_64 defconfig (I also had to remove CONFIG_IPV6 for some compile reason) : + pid-namespaces-rework-forget_original_parent.patch + pid-namespaces-move-exit_task_namespaces.patch + pid-namesp

Re: [Devel] [RFC] [PATCH 2/2] namespace enter: introduce sys_hijack (v3)

2007-09-10 Thread Serge E. Hallyn
Quoting Paul Menage ([EMAIL PROTECTED]): > On 9/4/07, Serge E. Hallyn <[EMAIL PROTECTED]> wrote: > > We could of course have the ns_container subsystem do that. The > > ns_container generally stick around until the admin does a manual rm on > > its directory, so this way we could keep the nsproxy

[Devel] Re: [PATCH 16/16] net: netlink support for moving devices between network namespaces.

2007-09-10 Thread Eric W. Biederman
"Serge E. Hallyn" <[EMAIL PROTECTED]> writes: >> >> +static struct net *get_net_ns_by_pid(pid_t pid) >> +{ >> +struct task_struct *tsk; >> +struct net *net; >> + >> +/* Lookup the network namespace */ >> +net = ERR_PTR(-ESRCH); >> +rcu_read_lock(); >> +tsk = find_task_by_pi

[Devel] Re: [PATCH 16/16] net: netlink support for moving devices between network namespaces.

2007-09-10 Thread Serge E. Hallyn
Quoting Eric W. Biederman ([EMAIL PROTECTED]): > > The simplest thing to implement is moving network devices between > namespaces. However with the same attribute IFLA_NET_NS_PID we can > easily implement creating devices in the destination network > namespace as well. However that is a little b

Re: [Devel] Re: [PATCH] Hookup group-scheduler with task container infrastructure

2007-09-10 Thread Paul Menage
On 9/10/07, Srivatsa Vaddagiri <[EMAIL PROTECTED]> wrote: > > Unless folks have strong objection to it, I prefer "cptctlr", the way it is. > By definition any container (about to be renamed control group) subsystem is some kind of "controller" so that bit seems a bit redundant. Any reason not to

Re: [Devel] Re: [RFC][patch 3/3] activate filtering for the bind

2007-09-10 Thread Paul Menage
On 9/10/07, Serge E. Hallyn <[EMAIL PROTECTED]> wrote: > > Perhaps the biggest upside of this approach is that it's providing > network functionality in a way that should be much more familiar to > network folks. As opposed to using an lsm with a new vfs interface. Right - one of the things that

Re: [Devel] Re: [RFC][patch 3/3] activate filtering for the bind

2007-09-10 Thread Serge E. Hallyn
Quoting Paul Menage ([EMAIL PROTECTED]): > On 9/10/07, Serge E. Hallyn <[EMAIL PROTECTED]> wrote: > > > > The only downside I see right now is what to do about a sendto() on a > > udp socket that hasn't been bound. > > Maybe have additional chains in the new iptable called "sendto" and > "recvfrom

Re: [Devel] Re: [RFC][patch 3/3] activate filtering for the bind

2007-09-10 Thread Paul Menage
On 9/10/07, Serge E. Hallyn <[EMAIL PROTECTED]> wrote: > > The only downside I see right now is what to do about a sendto() on a > udp socket that hasn't been bound. Maybe have additional chains in the new iptable called "sendto" and "recvfrom" that are invoked for those operations on unbound data

[Devel] Re: [PATCH] Hookup group-scheduler with task container infrastructure

2007-09-10 Thread Jan Engelhardt
On Sep 10 2007 22:58, Srivatsa Vaddagiri wrote: >On Mon, Sep 10, 2007 at 10:53:34PM +0530, Srivatsa Vaddagiri wrote: >> > cpuctl, cpuctrl, cpu_controller? >> >> *shrug* .. I used "cpuctlr" to mean "CPU Controller". Any other short names >> would do. From your list, cpuctl or cpuctrl both qualifie

[Devel] Re: [PATCH] Hookup group-scheduler with task container infrastructure

2007-09-10 Thread Jan Engelhardt
On Sep 10 2007 10:22, Andrew Morton wrote: >> Unless folks have strong objection to it, I prefer "cptctlr", the way it is. > >Kernel code is write-rarely, read-often. I think you mean __read_mostly. :-) Jan -- ___ Containers mailing list [E

[Devel] Re: [PATCH] Hookup group-scheduler with task container infrastructure

2007-09-10 Thread Srivatsa Vaddagiri
On Mon, Sep 10, 2007 at 10:22:59AM -0700, Andrew Morton wrote: > objection ;) "cpuctlr" isn't memorable. Kernel code is write-rarely, > read-often. "cpu_controller", please. The extra typing is worth it ;) Ok! Here's the modified patch (against 2.6.23-rc4-mm1). Signed-off-by : Srivatsa Vaddag

[Devel] Re: [PATCH] Hookup group-scheduler with task container infrastructure

2007-09-10 Thread Srivatsa Vaddagiri
On Mon, Sep 10, 2007 at 10:53:34PM +0530, Srivatsa Vaddagiri wrote: > > cpuctl, cpuctrl, cpu_controller? > > *shrug* .. I used "cpuctlr" to mean "CPU Controller". Any other short names > would do. From your list, cpuctl or cpuctrl both qualifies IMO! > > Unless folks have strong objection to it,

[Devel] Re: [PATCH] Hookup group-scheduler with task container infrastructure

2007-09-10 Thread Andrew Morton
On Mon, 10 Sep 2007 22:53:34 +0530 Srivatsa Vaddagiri <[EMAIL PROTECTED]> wrote: > On Mon, Sep 10, 2007 at 07:05:00PM +0200, Jan Engelhardt wrote: > > On Sep 10 2007 22:40, Srivatsa Vaddagiri wrote: > > >+#ifdef CONFIG_FAIR_GROUP_SCHED > > >+SUBSYS(cpuctlr) > > >+#endif > > > > cpuctl, cpuctrl, c

[Devel] Re: [PATCH] Hookup group-scheduler with task container infrastructure

2007-09-10 Thread Srivatsa Vaddagiri
On Mon, Sep 10, 2007 at 07:05:00PM +0200, Jan Engelhardt wrote: > On Sep 10 2007 22:40, Srivatsa Vaddagiri wrote: > >+#ifdef CONFIG_FAIR_GROUP_SCHED > >+SUBSYS(cpuctlr) > >+#endif > > cpuctl, cpuctrl, cpu_controller? *shrug* .. I used "cpuctlr" to mean "CPU Controller". Any other short names woul

[Devel] Re: [PATCH] Hookup group-scheduler with task container infrastructure

2007-09-10 Thread Jan Engelhardt
On Sep 10 2007 22:40, Srivatsa Vaddagiri wrote: >+#ifdef CONFIG_FAIR_GROUP_SCHED >+SUBSYS(cpuctlr) >+#endif cpuctl, cpuctrl, cpu_controller? ___ Containers mailing list [EMAIL PROTECTED] https://lists.linux-foundation.org/mailman/listinfo/containers __

[Devel] [PATCH] Hookup group-scheduler with task container infrastructure

2007-09-10 Thread Srivatsa Vaddagiri
Ingo and Andrew, The cfs core has been enhanced since quite sometime now to understand task-groups and provide fairness to such task-group. What was needed is an interface for the administrator to define task-groups and specify group "importance" in terms of its cpu share. The patch below

[Devel] Re: [DRAFT] Container mini-summit notes v0.01

2007-09-10 Thread Eric W. Biederman
"Serge E. Hallyn" <[EMAIL PROTECTED]> writes: > Sorry, I was focusing on the virtual server needs. > > devpts is it's own fs so I was fully expecting to make it mountable > multiple times so a container can have it's own /dev/pts/0. So what > other virtual devices would we want to be able to rec-

[Devel] Re: [RFC][patch 3/3] activate filtering for the bind

2007-09-10 Thread Serge E. Hallyn
Quoting Daniel Lezcano ([EMAIL PROTECTED]): > Serge E. Hallyn wrote: >> Quoting Daniel Lezcano ([EMAIL PROTECTED]): >>> Serge E. Hallyn wrote: Quoting [EMAIL PROTECTED] ([EMAIL PROTECTED]): > From: Daniel Lezcano <[EMAIL PROTECTED]> > > For the moment, I only made this patch for th

[Devel] Re: [PATCH 03/16] net: Basic network namespace infrastructure.

2007-09-10 Thread Eric W. Biederman
Pavel Emelyanov <[EMAIL PROTECTED]> writes: > Eric W. Biederman wrote: > > [snip] > >> --- /dev/null >> +++ b/include/net/net_namespace.h >> @@ -0,0 +1,68 @@ >> +/* >> + * Operations on the network namespace >> + */ >> +#ifndef __NET_NET_NAMESPACE_H >> +#define __NET_NET_NAMESPACE_H >> + >> +#incl

[Devel] Re: containers access control 'roadmap'

2007-09-10 Thread Serge E. Hallyn
Quoting Herbert Poetzl ([EMAIL PROTECTED]): > On Thu, Sep 06, 2007 at 01:26:11PM -0500, Serge E. Hallyn wrote: > > Quoting Herbert Poetzl ([EMAIL PROTECTED]): > > > On Thu, Sep 06, 2007 at 11:55:34AM -0500, Serge E. Hallyn wrote: > > > > Roadmap is a bit of an exaggeration, but here is a list of th

[Devel] Re: [PATCH 03/16] net: Basic network namespace infrastructure.

2007-09-10 Thread Krishna Kumar2
Eric W. Biederman wrote on 09/09/2007 02:45:34 AM: Hi Eric, > +static int register_pernet_operations(struct list_head *list, > + struct pernet_operations *ops) > +{ > > +out: > + return error; > + > +out_undo: > + /* If I have an error cleanup all namespaces I initialized */

[Devel] Re: containers access control 'roadmap'

2007-09-10 Thread Serge E. Hallyn
Quoting Serge E. Hallyn ([EMAIL PROTECTED]): > Quoting Herbert Poetzl ([EMAIL PROTECTED]): > > > For instance CAP_IPC_LOCK doesn't really matter for > > > CAP_HOST_ADMIN since the namespaces prevent you cross-ns > > > access. > > > > hmm? maybe I am misunderstanding the entire concept > > of CA

[Devel] Re: containers access control 'roadmap'

2007-09-10 Thread Herbert Poetzl
On Thu, Sep 06, 2007 at 01:26:11PM -0500, Serge E. Hallyn wrote: > Quoting Herbert Poetzl ([EMAIL PROTECTED]): > > On Thu, Sep 06, 2007 at 11:55:34AM -0500, Serge E. Hallyn wrote: > > > Roadmap is a bit of an exaggeration, but here is a list of the > > > next bit of work i expect to do relating to

[Devel] Re: [RFC] [PATCH] memory controller statistics

2007-09-10 Thread 箕浦 真
Takashi is AFK for a while; i'm replying for him as possible. > Thanks for doing this. We are building containerstats for > per container statistics. It would be really nice to provide > the statistics using that interface. I am not opposed to > memory.stat, but Paul Menage recommends that one fi

[Devel] containers access control 'roadmap'

2007-09-10 Thread Serge E. Hallyn
Roadmap is a bit of an exaggeration, but here is a list of the next bit of work i expect to do relating to containers and access control. The list gets more vague toward the end, with the intent of going far enough ahead to show what the final result would hopefully look like. Please review and t

[Devel] Re: containers access control 'roadmap'

2007-09-10 Thread Serge E. Hallyn
Quoting Herbert Poetzl ([EMAIL PROTECTED]): > On Thu, Sep 06, 2007 at 11:55:34AM -0500, Serge E. Hallyn wrote: > > Roadmap is a bit of an exaggeration, but here is a list of the next bit > > of work i expect to do relating to containers and access control. The > > list gets more vague toward the e

[Devel] Re: containers access control 'roadmap'

2007-09-10 Thread Herbert Poetzl
On Thu, Sep 06, 2007 at 11:55:34AM -0500, Serge E. Hallyn wrote: > Roadmap is a bit of an exaggeration, but here is a list of the next bit > of work i expect to do relating to containers and access control. The > list gets more vague toward the end, with the intent of going far enough > ahead to s

[Devel] Re: Container mini-summit notes

2007-09-10 Thread Cedric Le Goater
>> * Console >> >> . a running getty should be covered by tty namespace to log onto a container, we could simply run a getty in the guest with the guest end of the tty in a pts namespace. C. ___ Containers mailing list [EMAIL PROTECTED] https://li

[Devel] Re: Container mini-summit notes

2007-09-10 Thread Balbir Singh
Cedric Le Goater wrote: > Held at De Vere Universty Arms Hotel, Cambridge, UK > > * Monday, Sept 3, 9h00 to 16h00 : > > Kir Kolyshkin <[EMAIL PROTECTED]> > Pavel Emelianov <[EMAIL PROTECTED]> > Masahiko Takahashi <[EMAIL PROTECTED]> > Oren Laadan <[EMAIL PROTECTED]> >

[Devel] Re: Container mini-summit notes

2007-09-10 Thread Serge E. Hallyn
Quoting Cedric Le Goater ([EMAIL PROTECTED]): ... > Container mini-summit notes v0.01 > > == > > Held at Universty Arm's, Cambridge, UK > > on 3rd of September, 9h00 to 16h00 : > > Kir Kolyshkin <[EMAIL PROTECTED]> >

[Devel] Re: Container mini-summit notes

2007-09-10 Thread Daniel Lezcano
Cedric Le Goater wrote: Held at De Vere Universty Arms Hotel, Cambridge, UK * Monday, Sept 3, 9h00 to 16h00 : Kir Kolyshkin <[EMAIL PROTECTED]> Pavel Emelianov <[EMAIL PROTECTED]> Masahiko Takahashi <[EMAIL PROTECTED]> Oren Laadan <[EMAIL PROTECTED]> James Youngman <[EMAIL

[Devel] kthread API cleanups (Re: Container mini-summit notes)

2007-09-10 Thread Cedric Le Goater
>>. kthread cleanup >> replace kernel_thread() by the kthread API >> change core kthread API to support signals no one on that task. I'm pretty sure hch would be happy to help someone on it. >> nfs needs extra love. is someone working on it ? > > REALLY wou

[Devel] Container mini-summit notes

2007-09-10 Thread Cedric Le Goater
Held at De Vere Universty Arms Hotel, Cambridge, UK * Monday, Sept 3, 9h00 to 16h00 : Kir Kolyshkin <[EMAIL PROTECTED]> Pavel Emelianov <[EMAIL PROTECTED]> Masahiko Takahashi <[EMAIL PROTECTED]> Oren Laadan <[EMAIL PROTECTED]> James Youngman <[EMAIL PROTE

[Devel] Re: [PATCH 17/16] net: Disable netfilter sockopts when not in the initial network namespace

2007-09-10 Thread Eric W. Biederman
Pavel Emelyanov <[EMAIL PROTECTED]> writes: > Eric W. Biederman wrote: >> Until we support multiple network namespaces with netfilter only allow >> netfilter configuration in the initial network namespace. > > PATCH 17/16? :) Exactly! If my target was the core of the networking stack I figured I

[Devel] Re: [PATCH 12/16] net: Support multiple network namespaces with netlink

2007-09-10 Thread Eric W. Biederman
Pavel Emelyanov <[EMAIL PROTECTED]> writes: > > Rr. This is the 5th or even the 6th patch that changes tens of files > but (!) most of these changes are just propagating some core thing into > protocols, drivers, etc. E.g. you add an argument to some function and > then make all the rest use it

[Devel] Re: [DRAFT] Container mini-summit notes v0.01

2007-09-10 Thread Serge E. Hallyn
Quoting Eric W. Biederman ([EMAIL PROTECTED]): > "Serge E. Hallyn" <[EMAIL PROTECTED]> writes: > > >> > then you should have taken CAP_SYS_MKNOD away from the container. > >> > >> no serge, > >> > >> we want the container to be able to mknod() > > > > Someone give me one good reason why this is

[Devel] [PATCH] Leases can be hidden by flocks

2007-09-10 Thread Pavel Emelyanov
The inode->i_flock list contains the leases, flocks and posix locks in the specified order. However, the flocks are added in the head of this list thus hiding the leases from F_GETLEASE command, from time_out_leases() and other code that expects the leases to come first. The following example will

[Devel] Re: [RFC][patch 3/3] activate filtering for the bind

2007-09-10 Thread Daniel Lezcano
Serge E. Hallyn wrote: Quoting Daniel Lezcano ([EMAIL PROTECTED]): Serge E. Hallyn wrote: Quoting [EMAIL PROTECTED] ([EMAIL PROTECTED]): From: Daniel Lezcano <[EMAIL PROTECTED]> For the moment, I only made this patch for the RFC. It shows how simple it is to hook different socket syscalls. T

[Devel] Re: [PATCH 17/16] net: Disable netfilter sockopts when not in the initial network namespace

2007-09-10 Thread Pavel Emelyanov
Eric W. Biederman wrote: > Until we support multiple network namespaces with netfilter only allow > netfilter configuration in the initial network namespace. PATCH 17/16? :) Sorry, Pavel ___ Containers mailing list [EMAIL PROTECTED] https://lists.linux-

[Devel] Re: [PATCH 12/16] net: Support multiple network namespaces with netlink

2007-09-10 Thread Pavel Emelyanov
Eric W. Biederman wrote: > Each netlink socket will live in exactly one network namespace, > this includes the controlling kernel sockets. > > This patch updates all of the existing netlink protocols > to only support the initial network namespace. Request > by clients in other namespaces will ge

[Devel] Re: [RFC][patch 3/3] activate filtering for the bind

2007-09-10 Thread Serge E. Hallyn
Quoting Daniel Lezcano ([EMAIL PROTECTED]): > Serge E. Hallyn wrote: >> Quoting [EMAIL PROTECTED] ([EMAIL PROTECTED]): >>> From: Daniel Lezcano <[EMAIL PROTECTED]> >>> >>> For the moment, I only made this patch for the RFC. It shows how simple >>> it is >>> to hook different socket syscalls. This

[Devel] Re: [PATCH 03/16] net: Basic network namespace infrastructure.

2007-09-10 Thread Pavel Emelyanov
Eric W. Biederman wrote: [snip] > --- /dev/null > +++ b/include/net/net_namespace.h > @@ -0,0 +1,68 @@ > +/* > + * Operations on the network namespace > + */ > +#ifndef __NET_NET_NAMESPACE_H > +#define __NET_NET_NAMESPACE_H > + > +#include > +#include > +#include > + > +struct net { Isn't thi

[Devel] Re: [RFC] [PATCH] memory controller statistics

2007-09-10 Thread Balbir Singh
箕浦真 wrote: > Takashi is AFK for a while; i'm replying for him as possible. > >> Thanks for doing this. We are building containerstats for >> per container statistics. It would be really nice to provide >> the statistics using that interface. I am not opposed to >> memory.stat, but Paul Menage reco

[Devel] Re: task->tgid conversion in fs/locks.c

2007-09-10 Thread Pavel Emelyanov
[EMAIL PROTECTED] wrote: > Pavel, > > I noticed that fcntl tests in LTP fail when LTP is run a child pid > namespace. I just hacked up this quick patch and seems to fix the > failures. > > Are you already working on this or do you want me to test and send > this out for review. > > I have one c