Re: [PATCH] uts_namespace: Move boot_id in uts namespace

2018-04-04 Thread Marian Marinov
On 04/05/2018 03:35 AM, Eric W. Biederman wrote: > Marian Marinov <ker...@kyup.com> writes: > >> On 04/04/2018 07:02 PM, Eric W. Biederman wrote: >>> Angel Shtilianov <ker...@kyup.com> writes: >>> >>>> Currently the same boot_id is r

Re: [PATCH] uts_namespace: Move boot_id in uts namespace

2018-04-04 Thread Marian Marinov
On 04/05/2018 03:35 AM, Eric W. Biederman wrote: > Marian Marinov writes: > >> On 04/04/2018 07:02 PM, Eric W. Biederman wrote: >>> Angel Shtilianov writes: >>> >>>> Currently the same boot_id is reported for all containers running >>>> on a

Re: [PATCH] uts_namespace: Move boot_id in uts namespace

2018-04-04 Thread Marian Marinov
ernel/utsname.c >> +++ b/kernel/utsname.c >> @@ -34,8 +34,10 @@ static struct uts_namespace *create_uts_ns(void) >> struct uts_namespace *uts_ns; >> >> uts_ns = kmalloc(sizeof(struct uts_namespace), GFP_KERNEL); >> -if (uts_ns) >> +if (uts_ns) { >> kref_init(_ns->kref); >> +memset(uts_ns->sysctl_bootid, 0, 16); >> +} >> return uts_ns; >> } > -- Marian Marinov Co-founder & CTO of Kyup.com Jabber/GTalk: hack...@jabber.org IRQ: 7556201 IRC: hackman @ irc.freenode.net Mobile: +359 886 660 270

Re: [PATCH] uts_namespace: Move boot_id in uts namespace

2018-04-04 Thread Marian Marinov
sysctl_bootid[16]; >> } __randomize_layout; >> extern struct uts_namespace init_uts_ns; >> >> diff --git a/kernel/utsname.c b/kernel/utsname.c >> index 913fe4336d2b..f1749cdcd341 100644 >> --- a/kernel/utsname.c >> +++ b/kernel/utsname.c >> @@

Re: Patch breaks suspend

2015-05-05 Thread Marian Marinov
On 05/05/2015 02:37 AM, Rafael J. Wysocki wrote: > On Saturday, May 02, 2015 11:27:32 PM Marian Marinov wrote: >> Hi guys, >> I have Lenovo T520 with one SSD and one SATA drive. >> >> I tried to upgrade to Linux 4.0 and found that after suspend and resume I >> can

Re: Patch breaks suspend

2015-05-05 Thread Marian Marinov
On 05/05/2015 02:37 AM, Rafael J. Wysocki wrote: On Saturday, May 02, 2015 11:27:32 PM Marian Marinov wrote: Hi guys, I have Lenovo T520 with one SSD and one SATA drive. I tried to upgrade to Linux 4.0 and found that after suspend and resume I can't access the second (SATA) drive. Both

Patch breaks suspend

2015-05-02 Thread Marian Marinov
Hi guys, I have Lenovo T520 with one SSD and one SATA drive. I tried to upgrade to Linux 4.0 and found that after suspend and resume I can't access the second (SATA) drive. Both drives have bios encryption enabled. I did a bisect and found that the following patch causes the issue: commit

Patch breaks suspend

2015-05-02 Thread Marian Marinov
Hi guys, I have Lenovo T520 with one SSD and one SATA drive. I tried to upgrade to Linux 4.0 and found that after suspend and resume I can't access the second (SATA) drive. Both drives have bios encryption enabled. I did a bisect and found that the following patch causes the issue: commit

Re: [PATCH v3 2/2] cgroups: add a pids subsystem

2015-03-05 Thread Marian Marinov
Hi Aleksa, would you be willing to put your patches online in a repo like what Dwight Engen did 3 years ago. https://github.com/dwengen/linux/tree/cpuacct-task-limit-3.14 I'm using his patchset for more then a year now. However I would be happy to experiment with your patches as well. And

Re: [PATCH v3 2/2] cgroups: add a pids subsystem

2015-03-05 Thread Marian Marinov
Hi Aleksa, would you be willing to put your patches online in a repo like what Dwight Engen did 3 years ago. https://github.com/dwengen/linux/tree/cpuacct-task-limit-3.14 I'm using his patchset for more then a year now. However I would be happy to experiment with your patches as well. And

Re: RFC: sysctl fixes

2015-03-04 Thread Marian Marinov
On 03/04/2015 05:48 PM, Stephan Mueller wrote: > Am Mittwoch, 4. März 2015, 15:18:19 schrieb Marian Marinov: > > Hi Marian, > >> Hello, >> we are running hundreds of containers and we got some valid requests > >from customers that want to be able to change their

RFC: sysctl fixes

2015-03-04 Thread Marian Marinov
Hello, we are running hundreds of containers and we got some valid requests from customers that want to be able to change their container's hostname using the sysctl command. The current implementation does not allow each UTS namespace to change its own hostname. So we sponsored the

Re: RFC: sysctl fixes

2015-03-04 Thread Marian Marinov
On 03/04/2015 05:48 PM, Stephan Mueller wrote: Am Mittwoch, 4. März 2015, 15:18:19 schrieb Marian Marinov: Hi Marian, Hello, we are running hundreds of containers and we got some valid requests from customers that want to be able to change their container's hostname using the sysctl

RFC: sysctl fixes

2015-03-04 Thread Marian Marinov
Hello, we are running hundreds of containers and we got some valid requests from customers that want to be able to change their container's hostname using the sysctl command. The current implementation does not allow each UTS namespace to change its own hostname. So we sponsored the

Re: [RFC] oom, memcg: handle sysctl oom_kill_allocating_task while memcg oom happening

2014-06-10 Thread Marian Marinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 06/10/2014 02:52 PM, Michal Hocko wrote: > [More people to CC] On Tue 10-06-14 14:35:02, Marian Marinov wrote: >> -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 >> >> Hello, > > Hi, > >> a wh

[RFC] oom, memcg: handle sysctl oom_kill_allocating_task while memcg oom happening

2014-06-10 Thread Marian Marinov
some tasks) the load drops down to 25 within 5 to 7 minutes. I read the whole thread from 2012 but I do not see the expected behavior that is described by the people that commented the issue. In this case, with real usage for this patch, would it be considered for inclusion? Marian - -- Marian

[RFC] oom, memcg: handle sysctl oom_kill_allocating_task while memcg oom happening

2014-06-10 Thread Marian Marinov
some tasks) the load drops down to 25 within 5 to 7 minutes. I read the whole thread from 2012 but I do not see the expected behavior that is described by the people that commented the issue. In this case, with real usage for this patch, would it be considered for inclusion? Marian - -- Marian

Re: [RFC] oom, memcg: handle sysctl oom_kill_allocating_task while memcg oom happening

2014-06-10 Thread Marian Marinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 06/10/2014 02:52 PM, Michal Hocko wrote: [More people to CC] On Tue 10-06-14 14:35:02, Marian Marinov wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello, Hi, a while back in 2012 there was a request for this functionality. oom

Re: [RFC] Per-user namespace process accounting

2014-06-03 Thread Marian Marinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 06/03/2014 08:54 PM, Eric W. Biederman wrote: > Serge Hallyn writes: > >> Quoting Pavel Emelyanov (xe...@parallels.com): >>> On 05/29/2014 07:32 PM, Serge Hallyn wrote: >>>> Quoting Marian Marinov (m...@1h.com

Re: [RFC] Per-user namespace process accounting

2014-06-03 Thread Marian Marinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 06/03/2014 08:54 PM, Eric W. Biederman wrote: Serge Hallyn serge.hal...@ubuntu.com writes: Quoting Pavel Emelyanov (xe...@parallels.com): On 05/29/2014 07:32 PM, Serge Hallyn wrote: Quoting Marian Marinov (m...@1h.com): We are not using NFS

Re: [RFC] Per-user namespace process accounting

2014-05-29 Thread Marian Marinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 05/29/2014 01:06 PM, Eric W. Biederman wrote: > Marian Marinov writes: > >> Hello, >> >> I have the following proposition. >> >> Number of currently running processes is accounted at the root user

[RFC] Per-user namespace process accounting

2014-05-29 Thread Marian Marinov
creating the user_ns and free it in exit_creds(). Can you please comment on that? Or suggest a better solution? Best regards, Marian - -- Marian Marinov Founder & CEO of 1H Ltd. Jabber/GTalk: hack...@jabber.org ICQ: 7556201 Mobile: +359 886 660 270 -BEGIN PGP SIGNATURE- Version: G

[RFC] Per-user namespace process accounting

2014-05-29 Thread Marian Marinov
creating the user_ns and free it in exit_creds(). Can you please comment on that? Or suggest a better solution? Best regards, Marian - -- Marian Marinov Founder CEO of 1H Ltd. Jabber/GTalk: hack...@jabber.org ICQ: 7556201 Mobile: +359 886 660 270 -BEGIN PGP SIGNATURE- Version: GnuPG

Re: [RFC] Per-user namespace process accounting

2014-05-29 Thread Marian Marinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 05/29/2014 01:06 PM, Eric W. Biederman wrote: Marian Marinov m...@1h.com writes: Hello, I have the following proposition. Number of currently running processes is accounted at the root user namespace. The problem I'm facing

[RFC] Per user namespace process accounting

2014-05-28 Thread Marian Marinov
creating the user_ns and free it in exit_creds(). Can you please comment on that? Or suggest a better solution? Best regards, Marian - -- Marian Marinov Founder & CEO of 1H Ltd. Jabber/GTalk: hack...@jabber.org ICQ: 7556201 Mobile: +359 886 660 270 -BEGIN PGP SIGNATURE- Version: G

[RFC] Per user namespace process accounting

2014-05-28 Thread Marian Marinov
creating the user_ns and free it in exit_creds(). Can you please comment on that? Or suggest a better solution? Best regards, Marian - -- Marian Marinov Founder CEO of 1H Ltd. Jabber/GTalk: hack...@jabber.org ICQ: 7556201 Mobile: +359 886 660 270 -BEGIN PGP SIGNATURE- Version: GnuPG

Re: [PATCH] IPC initialize shmmax and shmall from the current value not the default

2014-05-25 Thread Marian Marinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi Manfred, On 05/25/2014 11:01 PM, Manfred Spraul wrote: > Hi Marian, > > On 05/22/2014 03:01 PM, Marian Marinov wrote: >> -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 >> >> On 05/05/2014 10:59 PM, Marian Marinov

Re: inotify, new idea?

2014-05-25 Thread Marian Marinov
ed, but it works. I'm considering fixing some of the issues at has for use in my home setup. Marian > Thanks, //richard -- To unsubscribe from this list: send the line > "unsubscribe linux-kernel" in the body of a > message to majord...@vger.kernel.org More majord

Re: inotify, new idea?

2014-05-25 Thread Marian Marinov
/ - -- Marian Marinov Founder CEO of 1H Ltd. Jabber/GTalk: hack...@jabber.org ICQ: 7556201 Mobile: +359 886 660 270 -BEGIN PGP SIGNATURE- Version: GnuPG v2.0.22 (GNU/Linux) iEYEARECAAYFAlOCgOwACgkQ4mt9JeIbjJSXrgCdHCFADxvKN3Hxb4qinc/5Fj6V WYMAnArk3Zb8YqTUNoyNCh1zYplUUx9B =y/Sm -END PGP

Re: [PATCH] IPC initialize shmmax and shmall from the current value not the default

2014-05-25 Thread Marian Marinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi Manfred, On 05/25/2014 11:01 PM, Manfred Spraul wrote: Hi Marian, On 05/22/2014 03:01 PM, Marian Marinov wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 05/05/2014 10:59 PM, Marian Marinov wrote: In my tests it worked exactly

Re: [lxc-devel] [RFC PATCH 00/11] Add support for devtmpfs in user namespaces

2014-05-23 Thread Marian Marinov
block device to appear. That user doesn't need >> permission to mount it > > Interesting point. This would further suggest that we absolutely must ensure > that a loop device which shows up in > the container does not also show up in the host. Can I suggest the usage of the device

Re: [lxc-devel] [RFC PATCH 00/11] Add support for devtmpfs in user namespaces

2014-05-23 Thread Marian Marinov
-kernel in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/ - -- Marian Marinov Founder CEO of 1H Ltd. Jabber/GTalk: hack...@jabber.org ICQ: 7556201 Mobile: +359 886 660 270

Re: [RFC PATCH 11/11] loop: Allow priveleged operations for root in the namespace which owns a device

2014-05-22 Thread Marian Marinov
; - if ((mode & FMODE_WRITE) || > capable(CAP_SYS_ADMIN)) + if ((mode & FMODE_WRITE) || + > ns_capable(disk_to_dev(lo->lo_disk)->ns, > CAP_SYS_ADMIN)) err = loop_set_capacity(lo, bdev); break; default: > - -- Marian Marinov Founder &

Re: Pondering per-process vsyscall disablement

2014-05-22 Thread Marian Marinov
nel" in the body of a message to > majord...@vger.kernel.org More majordomo info at > http://vger.kernel.org/majordomo-info.html Please read the FAQ at > http://www.tux.org/lkml/ > - -- Marian Marinov Founder & CEO of 1H Ltd. Jabber/GTalk: hack...@jabber.org ICQ: 7

Re: [PATCH] IPC initialize shmmax and shmall from the current value not the default

2014-05-22 Thread Marian Marinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 05/05/2014 10:59 PM, Marian Marinov wrote: > On 05/04/2014 02:17 PM, Manfred Spraul wrote: >> Hi Marian, >> >> Note: The limits will soon be increased to (nearly) ULONG_MAX. I.e.: If you >> propose the patch because you

Re: [PATCH] IPC initialize shmmax and shmall from the current value not the default

2014-05-22 Thread Marian Marinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 05/05/2014 10:59 PM, Marian Marinov wrote: On 05/04/2014 02:17 PM, Manfred Spraul wrote: Hi Marian, Note: The limits will soon be increased to (nearly) ULONG_MAX. I.e.: If you propose the patch because you are running into issues with a too

Re: Pondering per-process vsyscall disablement

2014-05-22 Thread Marian Marinov
the FAQ at http://www.tux.org/lkml/ - -- Marian Marinov Founder CEO of 1H Ltd. Jabber/GTalk: hack...@jabber.org ICQ: 7556201 Mobile: +359 886 660 270 -BEGIN PGP SIGNATURE- Version: GnuPG v2.0.22 (GNU/Linux) iEYEARECAAYFAlN+tg4ACgkQ4mt9JeIbjJRGkgCgjnD2s+J9kIr5oEDeL3VKHNvX

Re: [RFC PATCH 11/11] loop: Allow priveleged operations for root in the namespace which owns a device

2014-05-22 Thread Marian Marinov
= -EPERM; - if ((mode FMODE_WRITE) || capable(CAP_SYS_ADMIN)) + if ((mode FMODE_WRITE) || + ns_capable(disk_to_dev(lo-lo_disk)-ns, CAP_SYS_ADMIN)) err = loop_set_capacity(lo, bdev); break; default: - -- Marian Marinov Founder CEO of 1H Ltd. Jabber/GTalk

Re: [PATCH] IPC initialize shmmax and shmall from the current value not the default

2014-05-05 Thread Marian Marinov
AM, Davidlohr Bueso wrote: On Sun, 2014-05-04 at 01:48 +0300, Marian Marinov wrote: When we are creating new IPC namespace that should be cloned from the current namespace it is a good idea to copy the values of the current shmmax and shmall to the new namespace. The idea sounds reasonable

Re: [PATCH] IPC initialize shmmax and shmall from the current value not the default

2014-05-05 Thread Marian Marinov
AM, Davidlohr Bueso wrote: On Sun, 2014-05-04 at 01:48 +0300, Marian Marinov wrote: When we are creating new IPC namespace that should be cloned from the current namespace it is a good idea to copy the values of the current shmmax and shmall to the new namespace. The idea sounds reasonable

Re: [PATCH] IPC initialize shmmax and shmall from the current value not the default

2014-05-04 Thread Marian Marinov
On 05/04/2014 04:20 AM, Davidlohr Bueso wrote: On Sun, 2014-05-04 at 03:28 +0300, Marian Marinov wrote: On 05/04/2014 02:53 AM, Davidlohr Bueso wrote: On Sun, 2014-05-04 at 01:48 +0300, Marian Marinov wrote: When we are creating new IPC namespace that should be cloned from the current

Re: [PATCH] IPC initialize shmmax and shmall from the current value not the default

2014-05-04 Thread Marian Marinov
On 05/04/2014 04:20 AM, Davidlohr Bueso wrote: On Sun, 2014-05-04 at 03:28 +0300, Marian Marinov wrote: On 05/04/2014 02:53 AM, Davidlohr Bueso wrote: On Sun, 2014-05-04 at 01:48 +0300, Marian Marinov wrote: When we are creating new IPC namespace that should be cloned from the current

Re: [PATCH] IPC initialize shmmax and shmall from the current value not the default

2014-05-03 Thread Marian Marinov
On 05/04/2014 02:53 AM, Davidlohr Bueso wrote: On Sun, 2014-05-04 at 01:48 +0300, Marian Marinov wrote: When we are creating new IPC namespace that should be cloned from the current namespace it is a good idea to copy the values of the current shmmax and shmall to the new namespace. Why

[PATCH] IPC initialize shmmax and shmall from the current value not the default

2014-05-03 Thread Marian Marinov
ns->shm_ctlmax = init_ipc_ns.shm_ctlmax; + ns->shm_ctlall = init_ipc_ns.shm_ctlall; + } ns->shm_ctlmni = SHMMNI; ns->shm_rmid_forced = 0; ns->shm_tot = 0; -- 1.8.4 -- Marian Marinov Founder & CEO of 1H Ltd. Jabber/GTalk: hack...

[PATCH] IPC initialize shmmax and shmall from the current value not the default

2014-05-03 Thread Marian Marinov
-shm_ctlmax = init_ipc_ns.shm_ctlmax; + ns-shm_ctlall = init_ipc_ns.shm_ctlall; + } ns-shm_ctlmni = SHMMNI; ns-shm_rmid_forced = 0; ns-shm_tot = 0; -- 1.8.4 -- Marian Marinov Founder CEO of 1H Ltd. Jabber/GTalk: hack...@jabber.org ICQ: 7556201 Mobile: +359

Re: [PATCH] IPC initialize shmmax and shmall from the current value not the default

2014-05-03 Thread Marian Marinov
On 05/04/2014 02:53 AM, Davidlohr Bueso wrote: On Sun, 2014-05-04 at 01:48 +0300, Marian Marinov wrote: When we are creating new IPC namespace that should be cloned from the current namespace it is a good idea to copy the values of the current shmmax and shmall to the new namespace. Why

Re: ioctl CAP_LINUX_IMMUTABLE is checked in the wrong namespace

2014-04-29 Thread Marian Marinov
On 04/30/2014 03:01 AM, Stéphane Graber wrote: On Tue, Apr 29, 2014 at 04:51:54PM -0700, Andy Lutomirski wrote: On Tue, Apr 29, 2014 at 4:47 PM, Stéphane Graber wrote: On Tue, Apr 29, 2014 at 04:22:55PM -0700, Andy Lutomirski wrote: On Tue, Apr 29, 2014 at 4:20 PM, Marian Marinov wrote

Re: ioctl CAP_LINUX_IMMUTABLE is checked in the wrong namespace

2014-04-29 Thread Marian Marinov
On 04/30/2014 01:45 AM, Andy Lutomirski wrote: On 04/29/2014 03:29 PM, Serge Hallyn wrote: Quoting Marian Marinov (mm-108mbtlg...@public.gmane.org): On 04/30/2014 01:02 AM, Serge Hallyn wrote: Quoting Marian Marinov (mm-108mbtlg...@public.gmane.org): On 04/29/2014 09:52 PM, Serge Hallyn

Re: ioctl CAP_LINUX_IMMUTABLE is checked in the wrong namespace

2014-04-29 Thread Marian Marinov
On 04/30/2014 01:02 AM, Serge Hallyn wrote: Quoting Marian Marinov (m...@1h.com): On 04/29/2014 09:52 PM, Serge Hallyn wrote: Quoting Theodore Ts'o (ty...@mit.edu): On Tue, Apr 29, 2014 at 04:49:14PM +0300, Marian Marinov wrote: I'm proposing a fix to this, by replacing the capable

Re: ioctl CAP_LINUX_IMMUTABLE is checked in the wrong namespace

2014-04-29 Thread Marian Marinov
On 04/29/2014 09:52 PM, Serge Hallyn wrote: Quoting Theodore Ts'o (ty...@mit.edu): On Tue, Apr 29, 2014 at 04:49:14PM +0300, Marian Marinov wrote: I'm proposing a fix to this, by replacing the capable(CAP_LINUX_IMMUTABLE) check with ns_capable(current_cred()->user_ns, CAP_LINUX_IMMUTA

ioctl CAP_LINUX_IMMUTABLE is checked in the wrong namespace

2014-04-29 Thread Marian Marinov
-- 1.8.4 -- Marian Marinov Founder & CEO of 1H Ltd. Jabber/GTalk: hack...@jabber.org ICQ: 7556201 Mobile: +359 886 660 270 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://v

ioctl CAP_LINUX_IMMUTABLE is checked in the wrong namespace

2014-04-29 Thread Marian Marinov
-- Marian Marinov Founder CEO of 1H Ltd. Jabber/GTalk: hack...@jabber.org ICQ: 7556201 Mobile: +359 886 660 270 -- To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: ioctl CAP_LINUX_IMMUTABLE is checked in the wrong namespace

2014-04-29 Thread Marian Marinov
On 04/29/2014 09:52 PM, Serge Hallyn wrote: Quoting Theodore Ts'o (ty...@mit.edu): On Tue, Apr 29, 2014 at 04:49:14PM +0300, Marian Marinov wrote: I'm proposing a fix to this, by replacing the capable(CAP_LINUX_IMMUTABLE) check with ns_capable(current_cred()-user_ns, CAP_LINUX_IMMUTABLE

Re: ioctl CAP_LINUX_IMMUTABLE is checked in the wrong namespace

2014-04-29 Thread Marian Marinov
On 04/30/2014 01:02 AM, Serge Hallyn wrote: Quoting Marian Marinov (m...@1h.com): On 04/29/2014 09:52 PM, Serge Hallyn wrote: Quoting Theodore Ts'o (ty...@mit.edu): On Tue, Apr 29, 2014 at 04:49:14PM +0300, Marian Marinov wrote: I'm proposing a fix to this, by replacing the capable

Re: ioctl CAP_LINUX_IMMUTABLE is checked in the wrong namespace

2014-04-29 Thread Marian Marinov
On 04/30/2014 01:45 AM, Andy Lutomirski wrote: On 04/29/2014 03:29 PM, Serge Hallyn wrote: Quoting Marian Marinov (mm-108mbtlg...@public.gmane.org): On 04/30/2014 01:02 AM, Serge Hallyn wrote: Quoting Marian Marinov (mm-108mbtlg...@public.gmane.org): On 04/29/2014 09:52 PM, Serge Hallyn

Re: ioctl CAP_LINUX_IMMUTABLE is checked in the wrong namespace

2014-04-29 Thread Marian Marinov
Marinov m...@1h.com wrote: On 04/30/2014 01:45 AM, Andy Lutomirski wrote: On 04/29/2014 03:29 PM, Serge Hallyn wrote: Quoting Marian Marinov (mm-108mbtlg...@public.gmane.org): On 04/30/2014 01:02 AM, Serge Hallyn wrote: Quoting Marian Marinov (mm-108mbtlg...@public.gmane.org): On 04/29

kernel trees

2014-03-31 Thread Marian Marinov
Hello, I'm maintaining a few patches out of the main tree. Currently I keep one repository that is a clone of this: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git But if I'm monitoring the 3.13 version I can see only the rc versions in that repository. Which repository

kernel trees

2014-03-31 Thread Marian Marinov
Hello, I'm maintaining a few patches out of the main tree. Currently I keep one repository that is a clone of this: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git But if I'm monitoring the 3.13 version I can see only the rc versions in that repository. Which repository

Re: RFC: cgroups aware proc

2014-01-13 Thread Marian Marinov
On 01/13/2014 07:12 PM, Peter Zijlstra wrote: On Mon, Jan 13, 2014 at 06:23:50PM +0200, Marian Marinov wrote: Hello Peter, I need help with the scheduler. I'm currently trying to patch the /proc/loadavg to show the load that is only related to the processes from the current cgroup. I looked

Re: RFC: cgroups aware proc

2014-01-13 Thread Marian Marinov
On 01/13/2014 07:12 PM, Peter Zijlstra wrote: On Mon, Jan 13, 2014 at 06:23:50PM +0200, Marian Marinov wrote: Hello Peter, I need help with the scheduler. I'm currently trying to patch the /proc/loadavg to show the load that is only related to the processes from the current cgroup. I looked