[Devel] v2.6.26-rc7/cgroups: circular locking dependency

2008-06-25 Thread Vegard Nossum
Hi, I decided to see what cgroups is all about, and followed the instructions in Documentation/cgroups.txt :-) It happened when I did this: [EMAIL PROTECTED] /dev/cgroup/Vegard 0] # echo 1 cpuset.cpus I can also provide the kernel config if necessary. Vegard

[Devel] Re: v2.6.26-rc7/cgroups: circular locking dependency

2008-06-25 Thread Cyrill Gorcunov
[Vegard Nossum - Sat, Jun 21, 2008 at 07:38:59PM +0200] | Hi, | | I decided to see what cgroups is all about, and followed the instructions | in Documentation/cgroups.txt :-) It happened when I did this: | | [EMAIL PROTECTED] /dev/cgroup/Vegard 0] | # echo 1 cpuset.cpus | | I can also

[Devel] Obtaining the latest kernel to test out the latest on the containers

2008-06-25 Thread Mukesh G
Hi, Where do I get the latest kernel sources to test out the latest on the containers? Thanks Mukesh ___ Containers mailing list [EMAIL PROTECTED] https://lists.linux-foundation.org/mailman/listinfo/containers

[Devel] Re: v2.6.26-rc7/cgroups: circular locking dependency

2008-06-25 Thread Cyrill Gorcunov
[KOSAKI Motohiro - Mon, Jun 23, 2008 at 12:34:04AM +0900] | CC'ed Paul Jackson | | it seems typical ABBA deadlock. | I think cpuset use cgrou_lock() by mistake. | | IMHO, cpuset_handle_cpuhp() sholdn't use cgroup_lock() and | shouldn't call rebuild_sched_domains(). | | | - #1

[Devel] Re: Obtaining the latest kernel to test out the latest on the containers

2008-06-25 Thread Mukesh G
Forget my question I found the answer... Thanks On Wed, Jun 25, 2008 at 5:22 AM, Mukesh G [EMAIL PROTECTED] wrote: Another dumb question... Should I apply the patch against vanilla 2.6.26 kernel or apply it to the mm branch? Thanks in advance On Wed, Jun 25, 2008 at 3:56 AM,

[Devel] Re: v2.6.26-rc7/cgroups: circular locking dependency

2008-06-25 Thread Cyrill Gorcunov
[Vegard Nossum - Sun, Jun 22, 2008 at 11:42:50AM +0200] | On Sun, Jun 22, 2008 at 11:10 AM, Cyrill Gorcunov [EMAIL PROTECTED] wrote: | [Vegard Nossum - Sat, Jun 21, 2008 at 07:38:59PM +0200] | | === | | [ INFO: possible circular locking

[Devel] Re: v2.6.26-rc7/cgroups: circular locking dependency

2008-06-25 Thread Vegard Nossum
On Sun, Jun 22, 2008 at 11:10 AM, Cyrill Gorcunov [EMAIL PROTECTED] wrote: [Vegard Nossum - Sat, Jun 21, 2008 at 07:38:59PM +0200] | === | [ INFO: possible circular locking dependency detected ] | 2.6.26-rc7 #25 |

[Devel] Re: Obtaining the latest kernel to test out the latest on the containers

2008-06-25 Thread Mukesh G
Another dumb question... Should I apply the patch against vanilla 2.6.26 kernel or apply it to the mm branch? Thanks in advance On Wed, Jun 25, 2008 at 3:56 AM, Serge E. Hallyn [EMAIL PROTECTED] wrote: Quoting Mukesh G ([EMAIL PROTECTED]): Hi, Where do I get the latest kernel

[Devel] Re: [PATCH 05/11] sysfs: sysfs_chmod_file handle multiple superblocks

2008-06-25 Thread Tejun Heo
Daniel Lezcano wrote: Tejun Heo wrote: Hello, Daniel Lezcano wrote: I think it would be great if sysfs_chmod_file can do all-or-nothing instead of failing half way through but given the interface of notify_change(), it could be difficult to implement. Any ideas? Is it acceptable to queue

[Devel] Re: [LTP] [PATCH 0/3] cgroup: block device i/o bandwidth controller (v3)

2008-06-25 Thread Subrata Modak
On Sat, 2008-06-21 at 20:46 +0530, Subrata Modak wrote: On Sat, Jun 21, 2008 at 4:05 PM, Andrea Righi [EMAIL PROTECTED] wrote: Subrata Modak wrote: Dear Andrea, We have been tracking Controllers developement for quite

[Devel] [RFC PATCH 1/6] IPC/sem: RCU-protect the process semundo list

2008-06-25 Thread Nadia . Derbey
PATCH [01/06] Today, 'current' has an exclusive access to its sem_undo_list (anchored at current-sysvsem.undo_list): . it is created during a semop() if the SEMUNDO flag is specified for one of the semaphores. . it can also be created during a copy_process() operation if the

[Devel] [RFC PATCH 5/6] IPC/sem: .show operation for /proc/pid/semundo

2008-06-25 Thread Nadia . Derbey
PATCH [05/06] This patch introduces the .show seq operation for /proc/pid/semundo. Signed-off-by: Pierre Peiffer [EMAIL PROTECTED] Signed-off-by: Nadia Derbey [EMAIL PROTECTED] --- ipc/sem.c | 28 1 file changed, 28 insertions(+) Index:

[Devel] [RFC PATCH 3/6] IPC/sem: start/stop operations for /proc/pid/semundo

2008-06-25 Thread Nadia . Derbey
PATCH [03/06] This patch introduces the .start and .stop seq operations for /proc/pid/semundo. Signed-off-by: Pierre Peiffer [EMAIL PROTECTED] Signed-off-by: Nadia Derbey [EMAIL PROTECTED] --- ipc/sem.c | 43 +-- 1 file changed, 41 insertions(+), 2

[Devel] [RFC PATCH 2/6] IPC/sem: per pid semundo file in procfs

2008-06-25 Thread Nadia . Derbey
PATCH [02/06] This patch adds a new procfs interface to display the per-process semundo data. A new per-PID file is added, called semundo. It contains one line per semaphore IPC where there is something to undo for this process. Then, each line contains the semid followed by each undo value

[Devel] [RFC PATCH 6/6] IPC/sem: .write operation for /proc/self/semundo

2008-06-25 Thread Nadia . Derbey
PATCH [06/06] This patch introduces the .write seq operation for /proc/pid/semundo. In order to simplify the locking strategy, the write operation is only allowed to 'current'. Signed-off-by: Nadia Derbey [EMAIL PROTECTED] --- fs/proc/base.c |2 ipc/sem.c | 250

[Devel] [RFC PATCH 0/6] SYSVIPC/semaphores - allow saving/restoring a process' semundo_list

2008-06-25 Thread Nadia . Derbey
This patchset is a part of an effort to make sysv ipc objects read/writable from userspace for checkpoint / restart. System V ipc's are objects that are global to a system and can thus be checkpointed and restarted on a container basis. But some parts of the ipc structures are process related

[Devel] [RFC PATCH 4/6] IPC/sem: next operations for /proc/pid/semundo

2008-06-25 Thread Nadia . Derbey
PATCH [04/06] This patch introduces the .next seq operation for /proc/pid/semundo. What should be mentioned here is that the undo_list lock is released between between each iteration. Doing this, we only guarantee to access some valid data during the .show, not to have a full coherent view of

[Devel] Re: [PATCH 11/11] sysfs: user namespaces: fix bug with clone(CLONE_NEWUSER) with fairsched

2008-06-25 Thread Serge E. Hallyn
Quoting Tejun Heo ([EMAIL PROTECTED]): Benjamin Thery wrote: Mark the /sys/kernel/uids directory to be tagged so that processes in different user namespaces can remount /sys and see their own uid listings. Without this patch, having CONFIG_FAIR_SCHED=y makes user namespaces unusable,

[Devel] Re: [RFC PATCH 1/6] IPC/sem: RCU-protect the process semundo list

2008-06-25 Thread Serge E. Hallyn
Quoting [EMAIL PROTECTED] ([EMAIL PROTECTED]): PATCH [01/06] Today, 'current' has an exclusive access to its sem_undo_list (anchored at current-sysvsem.undo_list): . it is created during a semop() if the SEMUNDO flag is specified for one of the semaphores. . it can also be created

[Devel] Re: [RFC PATCH 2/6] IPC/sem: per pid semundo file in procfs

2008-06-25 Thread Serge E. Hallyn
Quoting [EMAIL PROTECTED] ([EMAIL PROTECTED]): PATCH [02/06] This patch adds a new procfs interface to display the per-process semundo data. A new per-PID file is added, called semundo. It contains one line per semaphore IPC where there is something to undo for this process. Then, each

[Devel] Re: [RFC PATCH 3/6] IPC/sem: start/stop operations for /proc/pid/semundo

2008-06-25 Thread Serge E. Hallyn
Quoting [EMAIL PROTECTED] ([EMAIL PROTECTED]): PATCH [03/06] This patch introduces the .start and .stop seq operations for /proc/pid/semundo. Signed-off-by: Pierre Peiffer [EMAIL PROTECTED] Signed-off-by: Nadia Derbey [EMAIL PROTECTED] Acked-by: Serge Hallyn [EMAIL PROTECTED] ---

[Devel] Re: [PATCH 11/11] sysfs: user namespaces: fix bug with clone(CLONE_NEWUSER) with fairsched

2008-06-25 Thread Eric W. Biederman
Serge E. Hallyn [EMAIL PROTECTED] writes: Except the sysfs mount holds no refcount on the userns. So as long as we do the ida tagging as you suggested in your response to patch 6, there should be no reference to the user_ns left in sysfs code. The extra reference in patch #9 is for a light

[Devel] Re: [PATCH 2/3] i/o bandwidth controller infrastructure

2008-06-25 Thread Andrew Morton
On Fri, 20 Jun 2008 12:05:34 +0200 Andrea Righi [EMAIL PROTECTED] wrote: This is the core io-throttle kernel infrastructure. It creates the basic interfaces to cgroups and implements the I/O measurement and throttling functions. Signed-off-by: Andrea Righi [EMAIL PROTECTED] ---

[Devel] Re: [PATCH 3/3] i/o accounting and control

2008-06-25 Thread Andrew Morton
On Fri, 20 Jun 2008 12:05:35 +0200 Andrea Righi [EMAIL PROTECTED] wrote: Apply the io-throttle controller to the opportune kernel functions. Both accounting and throttling functionalities are performed by cgroup_io_throttle(). Signed-off-by: Andrea Righi [EMAIL PROTECTED] ---

[Devel] RE: [RFC][v2][patch 0/12][CFQ-cgroup]Yet another I/O bandwidth controlling subsystem for CGroups based on CFQ

2008-06-25 Thread Satoshi UCHIDA
Hi, Tsuruta. In addition, I got the following message during test #2. Program ioload, our benchmark program, was blocked more than 120 seconds. Do you see any problems? No. I tried to test in environment which runs from 1 to 200 processes per group. However, such message was not output.

[Devel] Re: [RFC PATCH 4/6] IPC/sem: next operations for /proc/pid/semundo

2008-06-25 Thread Nadia Derbey
Serge E. Hallyn wrote: Quoting [EMAIL PROTECTED] ([EMAIL PROTECTED]): PATCH [04/06] This patch introduces the .next seq operation for /proc/pid/semundo. What should be mentioned here is that the undo_list lock is released between between each iteration. Doing this, we only guarantee to access

[Devel] Re: [RFC PATCH 6/6] IPC/sem: .write operation for /proc/self/semundo

2008-06-25 Thread Nadia Derbey
Serge E. Hallyn wrote: Quoting [EMAIL PROTECTED] ([EMAIL PROTECTED]): PATCH [06/06] This patch introduces the .write seq operation for /proc/pid/semundo. In order to simplify the locking strategy, the write operation is only allowed to 'current'. There should also be a patch against