Rishikesh K. Rajak wrote:
Hi All,
Today i ran full LTP on kernel 2.6.24-rc6 inside container-init and also
on parent namespace and got some observations.
Here is the machine information:
Linux rishi.in.ibm.com 2.6.18-53.el5 #1 SMP Wed Oct 10 16:34:02 EDT
2007 i686 i686 i386 GNU/Linux
Hi,
On Wed, Jan 23, 2008 at 09:53:50PM +0900, Ryo Tsuruta wrote:
Dm-band gives bandwidth to each job according to its weight,
which each job can set its own value to.
At this time, a job is a group of processes with the same pid or pgrp
or uid.
It seems to rely on
Hi,
Here is the document of dm-band.
Could you please address in the document how the intended use
cases/feature set etc. differs from CFQ2 io priorities?
Thank you for your suggestion, I'll do that step by step.
Thanks,
Ryo Tsuruta
___
Rishikesh K. Rajak wrote:
Hi All,
Today i ran full LTP on kernel 2.6.24-rc6 inside container-init and also
on parent namespace and got some observations.
Here is the machine information:
Linux rishi.in.ibm.com 2.6.18-53.el5 #1 SMP Wed Oct 10 16:34:02 EDT
Wait a bit - this uname
* Propagate netns from userspace down to xt_find_table_lock()
* Register ip6 tables in netns (modules still use init_net)
Signed-off-by: Alexey Dobriyan [EMAIL PROTECTED]
---
include/linux/netfilter_ipv6/ip6_tables.h |3 +
net/ipv6/netfilter/ip6_tables.c | 50
Now it's possible to list and manipulate per-netns ip6tables rules.
Filtering decisions are based on init_net's table so far.
P.S.: remove init_net check in inet6_create() to see the effect
Signed-off-by: Alexey Dobriyan [EMAIL PROTECTED]
---
include/net/netns/ipv6.h |6 +
* Propagate netns from userspace.
* arpt_register_table() registers table in supplied netns.
Signed-off-by: Alexey Dobriyan [EMAIL PROTECTED]
---
include/linux/netfilter_arp/arp_tables.h |3 +
net/ipv4/netfilter/arp_tables.c | 55 +--
Signed-off-by: Alexey Dobriyan [EMAIL PROTECTED]
---
include/net/netns/ipv4.h |1
net/ipv4/netfilter/arptable_filter.c | 38 +--
2 files changed, 29 insertions(+), 10 deletions(-)
--- a/include/net/netns/ipv4.h
+++ b/include/net/netns/ipv4.h
@@
When number of entries exceeds number of initial entries, foo-tables code
will pin table module. But during table unregister on netns stop,
that additional pin was forgotten.
Signed-off-by: Alexey Dobriyan [EMAIL PROTECTED]
---
net/ipv4/netfilter/arp_tables.c |3 +++
The comment about race free view of the set of network
namespaces was a bit hasty. Look (there even can be only
one CPU, as discovered by Alexey Dobriyan and Denis Lunev):
put_net()
if (atomic_dec_and_test(net-refcnt))
/* true */
__put_net(net);
queue_work(...);
/*
* note:
We have INET_MATCH, INET_TW_MATCH and INET6_MATCH to test
sockets and twbuckets for matching, but ipv6 twbuckets are
tested manually.
Here's the INET6_TW_MATCH to help with it.
Since the commit b3652b2dc5ec6ccd946ae9136b30c6babb81305a
[IPV6]: Mischecked tw match in __inet6_check_established.
On Wed 2008-01-16 15:58:55, Pavel Emelyanov wrote:
There's only one bit in the clone_flags left, so we won't be able
to create more namespaces after we make it busy. Besides, for
checkpoint/restart jobs we might want to create tasks with given
pids (virtual of course). And nobody knows for
Pavel Machek wrote:
On Wed 2008-01-16 15:58:55, Pavel Emelyanov wrote:
There's only one bit in the clone_flags left, so we won't be able
to create more namespaces after we make it busy. Besides, for
checkpoint/restart jobs we might want to create tasks with given
pids (virtual of course).
On Thu, 2008-01-24 at 18:09 +0100, Cedric Le Goater wrote:
yes but we would need more something like :
long sys_clone64(unsigned long flags_high, unsigned long flag_low)
if we want the syscall to be supported on 32bit arch. clone2 is also
being used on ia64 already.
Did we decide not
Alexey Dobriyan wrote:
* Propagate netns from userspace down to xt_find_table_lock()
* Register ip6 tables in netns (modules still use init_net)
Signed-off-by: Alexey Dobriyan [EMAIL PROTECTED]
---
include/linux/netfilter_ipv6/ip6_tables.h |3 +
net/ipv6/netfilter/ip6_tables.c |
On Thu 2008-01-24 09:24:34, Dave Hansen wrote:
On Thu, 2008-01-24 at 18:09 +0100, Cedric Le Goater wrote:
yes but we would need more something like :
long sys_clone64(unsigned long flags_high, unsigned long flag_low)
if we want the syscall to be supported on 32bit arch. clone2 is
Alexey Dobriyan wrote:
Now it's possible to list and manipulate per-netns ip6tables rules.
Filtering decisions are based on init_net's table so far.
P.S.: remove init_net check in inet6_create() to see the effect
OK, this patch fixes all but one checkpatch warning again.
Please try to make
Alexey Dobriyan wrote:
* Propagate netns from userspace.
* arpt_register_table() registers table in supplied netns.
Applied.
___
Devel mailing list
Devel@openvz.org
https://openvz.org/mailman/listinfo/devel
Alexey Dobriyan wrote:
Signed-off-by: Alexey Dobriyan [EMAIL PROTECTED]
Applied.
___
Devel mailing list
Devel@openvz.org
https://openvz.org/mailman/listinfo/devel
On Thu, 2008-01-24 at 18:37 +0100, Pavel Machek wrote:
Did we decide not to do something with a variable number of
arguments?
sys_clonefoo(unsigned long *flags, int len);
That is evil, because that means strace can no longer reliably print
flags being used (for example).
Ahhh.
Alexey Dobriyan wrote:
When number of entries exceeds number of initial entries, foo-tables code
will pin table module. But during table unregister on netns stop,
that additional pin was forgotten.
Applied, thanks.
___
Devel mailing list
On Thu 2008-01-24 09:46:57, Dave Hansen wrote:
On Thu, 2008-01-24 at 18:37 +0100, Pavel Machek wrote:
Did we decide not to do something with a variable number of
arguments?
sys_clonefoo(unsigned long *flags, int len);
That is evil, because that means strace can no longer
Serge E. Hallyn wrote:
Hi,
here is a list of topics which I believe people are interested in
writing papers on. I'm listing names of those who I think are
interested in writing them. Sorry if I leave anyone off of a topic
they're interested in. However it seems to me it would be best if
Quoting Kir Kolyshkin ([EMAIL PROTECTED]):
Serge E. Hallyn wrote:
Hi,
here is a list of topics which I believe people are interested in
writing papers on. I'm listing names of those who I think are
interested in writing them. Sorry if I leave anyone off of a topic
they're
Serge E. Hallyn wrote:
Quoting Kir Kolyshkin ([EMAIL PROTECTED]):
Serge E. Hallyn wrote:
Hi,
here is a list of topics which I believe people are interested in
writing papers on. I'm listing names of those who I think are
interested in writing them. Sorry if I leave anyone off of
Hi,
On Wed, Jan 23, 2008 at 09:53:50PM +0900, Ryo Tsuruta wrote:
Dm-band gives bandwidth to each job according to its weight,
which each job can set its own value to.
At this time, a job is a group of processes with the same pid or pgrp
or uid.
It seems to
Hi,
Now I report the result of dm-band bandwidth control test I did yesterday.
I've got really good results that dm-band works as I expected. I made
several band-groups on several disk partitions and gave them heavy I/O loads.
Hardware Spec.
==
DELL Dimention E521:
Linux
27 matches
Mail list logo