[Devel] [PATCH 6/11 net-2.6.26] [NETNS]: Process IP layer in the context of the correct namespace.

2008-03-24 Thread Denis V. Lunev
Replace all the rest of the init_net with a proper net on the IP layer. Signed-off-by: Denis V. Lunev [EMAIL PROTECTED] --- net/ipv4/ip_fragment.c |5 - net/ipv4/ip_input.c|6 -- net/ipv4/ip_options.c |2 +- net/ipv4/ip_output.c |2 +- net/ipv4/ip_sockglue.c |7

[Devel] [PATCH 2/11 net-2.6.26] [NETNS]: /proc/net/arp namespacing.

2008-03-24 Thread Denis V. Lunev
Seqfile operation showing /proc/net/arp are already namespace aware. All we need is to register this file for each namespace. Signed-off-by: Denis V. Lunev [EMAIL PROTECTED] --- net/ipv4/arp.c | 20 ++-- 1 files changed, 18 insertions(+), 2 deletions(-) diff --git

[Devel] [PATCH 5/11 net-2.6.26] [NETNS]: Add namespace parameter to ip_cmsg_send.

2008-03-24 Thread Denis V. Lunev
Pass the init_net there for now. Signed-off-by: Denis V. Lunev [EMAIL PROTECTED] --- include/net/ip.h |3 ++- net/ipv4/ip_sockglue.c |4 ++-- net/ipv4/raw.c |2 +- net/ipv4/udp.c |2 +- 4 files changed, 6 insertions(+), 5 deletions(-) diff --git

[Devel] [PATCH 3/11 net-2.6.26] [NETNS]: Add namespace parameter to ip_options_compile.

2008-03-24 Thread Denis V. Lunev
ip_options_compile uses inet_addr_type which requires a namespace. The packet argument is optional, so parameter is the only way to obtain it. Pass the init_net there for now. Signed-off-by: Denis V. Lunev [EMAIL PROTECTED] --- include/net/ip.h |3 ++- net/ipv4/ip_input.c |2 +-

[Devel] Re: [PATCH 0/11 net-2.6.26] UDP/ICMP/TCP for a namespace

2008-03-24 Thread David Miller
From: Denis V. Lunev [EMAIL PROTECTED] Date: Mon, 24 Mar 2008 17:33:05 +0300 This patch set finally enables TCP/UDP and ICMP inside a namespace. In order to do this we fix ARP processing, IP options processing and allow packets to flow to namespace aware protocols. Finally, this makes

[Devel] [PATCH 0/7][v2] Cloning PTS namespace

2008-03-24 Thread sukadev
Devpts namespace patchset In continuation of the implementation of containers in mainline, we need to support multiple PTY namespaces so that the PTY index (ie the tty names) in one container is independent of the PTY indices of other containers. For instance this would allow each container to

[Devel] [PATCH 1/7] Propagate error code from devpts_pty_new

2008-03-24 Thread sukadev
From: Sukadev Bhattiprolu [EMAIL PROTECTED] Subject: [PATCH 1/7]: Propagate error code from devpts_pty_new Have ptmx_open() propagate any error code returned by devpts_pty_new(). Signed-off-by: Sukadev Bhattiprolu [EMAIL PROTECTED] Cc: Cedric Le Goater [EMAIL PROTECTED] Cc: Dave Hansen [EMAIL

[Devel] [PATCH 2/7]: Factor out PTY index allocation

2008-03-24 Thread sukadev
From: Sukadev Bhattiprolu [EMAIL PROTECTED] Subject: [PATCH 2/7]: Factor out PTY index allocation Factor out the code used to allocate/free a pts index into new interfaces, devpts_new_index() and devpts_kill_index(). This localizes the external data structures used in managing the pts indices.

[Devel] [PATCH 4/7] Implement get_pts_ns() and put_pts_ns()

2008-03-24 Thread sukadev
From: Sukadev Bhattiprolu [EMAIL PROTECTED] Subject: [PATCH 4/7]: Implement get_pts_ns() and put_pts_ns() Implement get_pts_ns() and put_pts_ns() interfaces. Signed-off-by: Sukadev Bhattiprolu [EMAIL PROTECTED] --- include/linux/devpts_fs.h | 21 - 1 file changed, 20

[Devel] [PATCH 5/7]: Determine pts_ns from a pty's inode.

2008-03-24 Thread sukadev
From: Sukadev Bhattiprolu [EMAIL PROTECTED] Subject: [PATCH 5/7]: Determine pts_ns from a pty's inode. The devpts interfaces currently operate on a specific pts namespace which they get from the 'current' task. With implementation of containers and cloning of PTS namespaces, we want to be able

[Devel] [PATCH 6/7]: Check for user-space mount of /dev/pts

2008-03-24 Thread sukadev
From: Sukadev Bhattiprolu [EMAIL PROTECTED] Subject: [PATCH 6/7]: Check for user-space mount of /dev/pts When the pts namespace is cloned, the /dev/pts is not useful unless it is remounted from the user space. If user-space clones pts namespace but does not remount /dev/pts, it would end up

[Devel] Re: [RFC][PATCH] another swap controller for cgroup

2008-03-24 Thread Daisuke Nishimura
YAMAMOTO Takashi wrote: hi, Daisuke Nishimura wrote: Hi, Yamamoto-san. I'm reviewing and testing your patch now. In building kernel infinitely(in a cgroup of memory.limit=64M and swap.limit=128M, with swappiness=100), almost all of the swap (1GB) is consumed as swap cache after a day

[Devel] [PATCH 7/7]: Enable cloning PTY namespaces

2008-03-24 Thread sukadev
From: Sukadev Bhattiprolu [EMAIL PROTECTED] Subject: [PATCH 7/7]: Enable cloning PTY namespaces Enable cloning PTY namespaces. Signed-off-by: Sukadev Bhattiprolu [EMAIL PROTECTED] Signed-off-by: Serge Hallyn [EMAIL PROTECTED] Signed-off-by: Matt Helsley [EMAIL PROTECTED] --- fs/devpts/inode.c

[Devel] [PATCH] fix spurious EBUSY on memory cgroup removal

2008-03-24 Thread YAMAMOTO Takashi
[ resending with To: akpm. Andrew, can you include this in -mm tree? ] hi, the following patch is to fix spurious EBUSY on cgroup removal. YAMAMOTO Takashi call mm_free_cgroup earlier. otherwise a reference due to lazy mm switching can prevent cgroup removal. Signed-off-by: YAMAMOTO Takashi

[Devel] Re: [PATCH] fix spurious EBUSY on memory cgroup removal

2008-03-24 Thread Andrew Morton
On Tue, 25 Mar 2008 14:47:13 +0900 (JST) [EMAIL PROTECTED] (YAMAMOTO Takashi) wrote: [ resending with To: akpm. Andrew, can you include this in -mm tree? ] Shouldn't it be in 2.6.25? hi, the following patch is to fix spurious EBUSY on cgroup removal. YAMAMOTO Takashi call