[Devel] Re: Checkpoint/Restart mini-summit

2008-07-31 Thread C. Craig Ross
Hi Serge, I can confirm the room and we can get you some type of a paper/white board. I should know tomorrow about the speakerphone and Internet access. C. Hi C., I'm sorry after all the emails I'm not straight on what we're actually getting. We have a U-shaped room, but do we have a

[Devel] Re: mini-summit conf#

2008-07-31 Thread Vivek Goyal
On Wed, Jul 09, 2008 at 10:57:10AM -0500, Serge E. Hallyn wrote: Before I forget, we're planning on having a call-in for the containers mini-summit. The phone number is: US toll: 1-770-615-1382 US toll-free: 1-877-421-0023 When asked, the passcode is: 499229 I was

[Devel] Re: memrlimit controller merge to mainline

2008-07-31 Thread Joe MacDonald
2008/7/25 Balbir Singh [EMAIL PROTECTED]: There are applications that can/need to handle overcommit, just that we are not aware of them fully. Immediately after our meeting, I was pointed to

Re: [Devel] [RFC][PATCH 0/2] CR: save/restore a single, simple task

2008-07-31 Thread Andrey Mirkin
Hello Oren, That is great, that you have proposed your version of checkpointing/restart. In a few days I will send a patchset with OpenVZ checkpointing/restart. So, we will be able to compare our approaches and take the best parts from both. Regards, Andrey On Wednesday 30 July 2008 07:24 Oren

[Devel] Re: [RFC][PATCH 0/2] CR: save/restore a single, simple task

2008-07-31 Thread Daniel Lezcano
Oren Laadan wrote: Disclaimer: long reply :) Serge E. Hallyn wrote: Quoting Oren Laadan ([EMAIL PROTECTED]): In the recent mini-summit at OLS 2008 and the following days it was agreed to tackle the checkpoint/restart (CR) by beginning with a very simple case: save and restore a single

[Devel] Re: [RFC][PATCH 2/2] CR: handle a single task with private memory maps

2008-07-31 Thread Serge E. Hallyn
Quoting Louis Rilling ([EMAIL PROTECTED]): On Wed, Jul 30, 2008 at 10:40:35AM -0700, Dave Hansen wrote: On Wed, 2008-07-30 at 11:52 -0500, Serge E. Hallyn wrote: This list is getting on my nerves. Louis, I'm sorry the threading is going to get messed up. I think I just cleared

[Devel] Re: [RFC][PATCH 2/2] CR: handle a single task with private memory maps

2008-07-31 Thread Oren Laadan
Louis Rilling wrote: On Wed, Jul 30, 2008 at 02:27:52PM -0400, Oren Laadan wrote: Louis Rilling wrote: +/** + * cr_vma_fill_pgarr - fill a page-array with addr/page tuples for a vma + * @ctx - checkpoint context + * @pgarr - page-array to fill + * @vma - vma to scan + * @start - start

[Devel] Re: [RFC][PATCH 0/2] CR: save/restore a single, simple task

2008-07-31 Thread Oren Laadan
Daniel Lezcano wrote: Oren Laadan wrote: Disclaimer: long reply :) Serge E. Hallyn wrote: Quoting Oren Laadan ([EMAIL PROTECTED]): In the recent mini-summit at OLS 2008 and the following days it was agreed to tackle the checkpoint/restart (CR) by beginning with a very simple case: save

[Devel] Re: [RFC][PATCH 2/2] CR: handle a single task with private memory maps

2008-07-31 Thread Oren Laadan
Louis Rilling wrote: On Thu, Jul 31, 2008 at 11:09:54AM -0400, Oren Laadan wrote: Louis Rilling wrote: On Wed, Jul 30, 2008 at 06:20:32PM -0400, Oren Laadan wrote: Serge E. Hallyn wrote: Quoting Oren Laadan ([EMAIL PROTECTED]): +int do_checkpoint(struct cr_ctx *ctx) +{ +int ret;

[Devel] Re: [RFC][PATCH 0/2] CR: save/restore a single, simple task

2008-07-31 Thread Daniel Lezcano
Oren Laadan wrote: Daniel Lezcano wrote: Oren Laadan wrote: Disclaimer: long reply :) Serge E. Hallyn wrote: Quoting Oren Laadan ([EMAIL PROTECTED]): In the recent mini-summit at OLS 2008 and the following days it was agreed to tackle the checkpoint/restart (CR) by beginning with a very

[Devel] [PATCH 1/1] namespaces: introduce sys_hijack (v11)

2008-07-31 Thread Serge E. Hallyn
Hi Pavel, Here is the 'hijack' patch that was mentioned during the namespaces part of the containers mini-summit. It's a proposed way of entering namespaces. It's been rotting for awhile as you can see by the changelog, but hopefully I updated it sufficiently and correctly. -serge From

[Devel] Re: [RFC][PATCH 2/2] CR: handle a single task with private memory maps

2008-07-31 Thread Oren Laadan
Louis Rilling wrote: On Thu, Jul 31, 2008 at 12:28:57PM -0400, Oren Laadan wrote: Louis Rilling wrote: On Thu, Jul 31, 2008 at 11:09:54AM -0400, Oren Laadan wrote: Louis Rilling wrote: On Wed, Jul 30, 2008 at 06:20:32PM -0400, Oren Laadan wrote: Serge E. Hallyn wrote: Quoting Oren Laadan

[Devel] Re: [RFC][PATCH 2/2] CR: handle a single task with private memory maps

2008-07-31 Thread Serge E. Hallyn
Quoting Oren Laadan ([EMAIL PROTECTED]): Serge E. Hallyn wrote: Quoting Oren Laadan ([EMAIL PROTECTED]): +int do_checkpoint(struct cr_ctx *ctx) +{ + int ret; + + /* FIX: need to test whether container is checkpointable */ + + ret = cr_write_hdr(ctx); + if (!ret) +

Re: [Devel] [RFC][PATCH 0/2] CR: save/restore a single, simple task

2008-07-31 Thread Serge E. Hallyn
Quoting Andrey Mirkin ([EMAIL PROTECTED]): Hello Oren, That is great, that you have proposed your version of checkpointing/restart. In a few days I will send a patchset with OpenVZ checkpointing/restart. So, we will be able to compare our approaches and take the best parts from both.

[Devel] 2.6.26 panic (skb-dev==NULL), NFS support

2008-07-31 Thread Karel Tuma
Hello list, I hope this is the right place to post. I've recently moved to 2.6.26 git (i hope that's the bleeding edge) OpenVZ to find out how usable it is. I'm running it on a box under fair IO load (100-300 BIO/s). The thing panics in net/ipv4/tcp_ipv4.c:tcp_v4_send_ack() once every couple of

[Devel] [PATCH 0/9] Bridging and ebtables in netns!

2008-07-31 Thread Alexey Dobriyan
Hi, I'm going to send this once networking people will start accepting new stuff. Please, try and test on your favourite bridging setup, I'm currently very limited in this. To try ebtables, apply this patch first: diff --git a/net/netfilter/core.c b/net/netfilter/core.c index 292fa28..c4065b8

[Devel] [PATCH 1/9] netns bridge: netdevice part

2008-07-31 Thread Alexey Dobriyan
Allow creation of bridges in netns. Bridge netdevice doesn't cross netns boundaries. Additions and deletions are done with netdevices in the same netns. Process notifications in netns, too. Signed-off-by: Alexey Dobriyan [EMAIL PROTECTED] --- net/bridge/br_device.c |3 ++-

[Devel] [PATCH 2/9] netns bridge: remove bridges during netns stop

2008-07-31 Thread Alexey Dobriyan
Signed-off-by: Alexey Dobriyan [EMAIL PROTECTED] --- net/bridge/br.c | 22 -- net/bridge/br_if.c |4 ++-- net/bridge/br_private.h |2 +- 3 files changed, 19 insertions(+), 9 deletions(-) --- a/net/bridge/br.c +++ b/net/bridge/br.c @@ -28,6 +28,10 @@

[Devel] [PATCH 3/9] netns ebtables: per-netns table list

2008-07-31 Thread Alexey Dobriyan
Signed-off-by: Alexey Dobriyan [EMAIL PROTECTED] --- include/net/net_namespace.h |4 include/net/netns/bridge.h |9 + net/bridge/netfilter/ebtables.c |8 3 files changed, 17 insertions(+), 4 deletions(-) --- a/include/net/net_namespace.h +++

[Devel] [PATCh 4/9] netns ebtables: per-netns ebtables itself

2008-07-31 Thread Alexey Dobriyan
Register ebtable in netns. For this duplicate table at the very beginning. This is done so we won't add one table first to table list of netns#1, then overwrite list_head when adding to table list of netns #2, and so on. P.S.: Addition of underscored variables is temporary and will go away in a

[Devel] [PATCH 5/9] netns ebtables: netns-aware broute table

2008-07-31 Thread Alexey Dobriyan
Signed-off-by: Alexey Dobriyan [EMAIL PROTECTED] --- include/net/netns/bridge.h|1 net/bridge/netfilter/ebtable_broute.c | 35 ++ 2 files changed, 28 insertions(+), 8 deletions(-) --- a/include/net/netns/bridge.h +++

[Devel] [PATCH 7/9] netns ebtables: netns-aware nat table

2008-07-31 Thread Alexey Dobriyan
Signed-off-by: Alexey Dobriyan [EMAIL PROTECTED] --- include/net/netns/bridge.h |1 net/bridge/netfilter/ebtable_nat.c | 47 + 2 files changed, 33 insertions(+), 15 deletions(-) --- a/include/net/netns/bridge.h +++ b/include/net/netns/bridge.h

[Devel] [PATCH 6/9] netns ebtables: netns-aware filter table

2008-07-31 Thread Alexey Dobriyan
Signed-off-by: Alexey Dobriyan [EMAIL PROTECTED] --- include/net/netns/bridge.h|1 net/bridge/netfilter/ebtable_filter.c | 50 +- 2 files changed, 38 insertions(+), 13 deletions(-) --- a/include/net/netns/bridge.h +++

[Devel] [PATCH 8/9] netns ebtables: deal with fake netdevices et al

2008-07-31 Thread Alexey Dobriyan
Bridge netfilter code uses fake netdevice and fake rtable. Fake means static struct net_device. So these should be logically created in bridge's portion of struct netns. But! Adding struct net_device __fake_net_device creates header circular dependency, which is PITA to resolve. I couldn't, so

[Devel] [PATCH 9/9] ebtables: cleanup table entries during table unregister

2008-07-31 Thread Alexey Dobriyan
So far table could be unregistered only during module unload. Which didn't happen, because depending on table entries, module was pinned enough times to prevent unload at all. Now table will be unregistered during netns stop, so prevent module refcount leaks by cleaning up table entries at table

[Devel] [PATCH 0/6] Container Freezer: Reuse Suspend Freezer

2008-07-31 Thread Matt Helsley
This patch series introduces a cgroup subsystem that utilizes the swsusp freezer to freeze a group of tasks. It's immediately useful for batch job management scripts. It should also be useful in the future for implementing container checkpoint/restart. The freezer subsystem in the container

[Devel] [PATCH 5/6] Container Freezer: Prevent frozen tasks or cgroups from changing

2008-07-31 Thread Matt Helsley
Don't let frozen tasks or cgroups change. This means frozen tasks can't leave their current cgroup for another cgroup. It also means that tasks cannot be added to or removed from a cgroup in the FROZEN state. We enforce these rules by checking for frozen tasks and cgroups in the can_attach()

[Devel] [PATCH 3/6] Container Freezer: Implement freezer cgroup subsystem

2008-07-31 Thread Matt Helsley
This patch implements a new freezer subsystem in the control groups framework. It provides a way to stop and resume execution of all tasks in a cgroup by writing in the cgroup filesystem. The freezer subsystem in the container filesystem defines a file named freezer.state. Writing FROZEN to the

[Devel] [PATCH 6/6] Container Freezer: Use cgroup write_string method

2008-07-31 Thread Matt Helsley
Use the new cgroup write_string method rather than the raw write method because it better matches the needs of the freezer cgroup subsystem. Signed-off-by: Matt Helsley [EMAIL PROTECTED] --- kernel/cgroup_freezer.c | 21 + 1 file changed, 5 insertions(+), 16 deletions(-)

[Devel] [PATCH 2/6] Container Freezer: Make refrigerator always available

2008-07-31 Thread Matt Helsley
Now that the TIF_FREEZE flag is available in all architectures, extract the refrigerator() and freeze_task() from kernel/power/process.c and make it available to all. The refrigerator() can now be used in a control group subsystem implementing a control group freezer. Signed-off-by: Cedric Le

[Devel] [PATCH 4/6] Container Freezer: Skip frozen cgroups during power management resume

2008-07-31 Thread Matt Helsley
When a system is resumed after a suspend, it will also unfreeze frozen cgroups. This patchs modifies the resume sequence to skip the tasks which are part of a frozen control group. Signed-off-by: Cedric Le Goater [EMAIL PROTECTED] Signed-off-by: Matt Helsley [EMAIL PROTECTED] Acked-by: Serge E.

[Devel] [PATCH 1/6] Container Freezer: Add TIF_FREEZE flag to all architectures

2008-07-31 Thread Matt Helsley
This patch is the first step in making the refrigerator() available to all architectures, even for those without power management. The purpose of such a change is to be able to use the refrigerator() in a new control group subsystem which will implement a control group freezer. Signed-off-by:

[Devel] Re: [PATCH 0/6] Container Freezer: Reuse Suspend Freezer

2008-07-31 Thread Matt Helsley
On Thu, 2008-07-31 at 22:06 -0700, Matt Helsley wrote: This patch series introduces a cgroup subsystem that utilizes the swsusp freezer to freeze a group of tasks. It's immediately useful for batch job management scripts. It should also be useful in the future for implementing container