[Devel] Re: [PATCH 1/2] CFS CGroup: Code cleanup

2007-10-24 Thread Ingo Molnar
* Srivatsa Vaddagiri [EMAIL PROTECTED] wrote: On Tue, Oct 23, 2007 at 07:32:27PM -0700, Paul Menage wrote: Clean up some CFS CGroup code - replace cont with cgrp in a few places in the CFS cgroup code, - use write_uint rather than write for cpu.shares write function

Re: [Devel] code handles migration

2007-10-24 Thread Kirill Korotaev
99% of the checkpoining code is concentrated in kernel/cpt/* Kirill Yi Wang wrote: Hello, I'm new to OpenVZ. I'm interested in learning more about the way OpenVZ handles its VPS migration, especially the virtualized network stack. I just downloaded the linux-2.6.18-openvz source code.

[Devel] Re: [PATCH] Bogus KERN_ALERT on oops

2007-10-24 Thread Ingo Molnar
* Alexey Dobriyan [EMAIL PROTECTED] wrote: printing eip: f881b9f3 *pdpt = 3001 1*pde = 0480a067 *pte = ^^^ thanks, added this to the x86 queue. Ingo ___

[Devel] Re: [PATCH] Bogus KERN_ALERT on oops

2007-10-24 Thread Alexey Dobriyan
On Wed, Oct 24, 2007 at 12:33:18PM +0200, Ingo Molnar wrote: * Pekka Enberg [EMAIL PROTECTED] wrote: - printk(KERN_ALERT *pde = %016Lx , page); + printk(*pde = %016Lx , page); Use the new KERN_CONT annotation here? indeed - i changed

[Devel] Re: [PATCH] Bogus KERN_ALERT on oops

2007-10-24 Thread Ingo Molnar
* Pekka Enberg [EMAIL PROTECTED] wrote: - printk(KERN_ALERT *pde = %016Lx , page); + printk(*pde = %016Lx , page); Use the new KERN_CONT annotation here? indeed - i changed the patch to do that. Ingo

[Devel] Re: [RFC][PATCH] memory cgroup enhancements updated [2/10] force empty interface

2007-10-24 Thread Balbir Singh
KAMEZAWA Hiroyuki wrote: This patch adds an interface memory.force_empty. Any write to this file will drop all charges in this cgroup if there is no task under. %echo 1 /../memory.force_empty will drop all charges of memory cgroup if cgroup's tasks is empty. This is useful to

[Devel] Help required regarding tool for OpenVZ

2007-10-24 Thread Khyati Sanghvi
Hi, I'm new to OpenVZ. I'm interested in making a tool which can give performance statistics for OpenVZ, which can help users to get details about CPU usage, Memory usage etc for each VE. For this task one file which can act as source is /proc/vz/vzstat. Can somebody guide me on which all

[Devel] Re: [RFC][PATCH] memory cgroup enhancements updated [8/10] add pre_destroy handler

2007-10-24 Thread Balbir Singh
KAMEZAWA Hiroyuki wrote: My main purpose of this patch is for memory controller.. This patch adds a handler pre_destroy to cgroup_subsys. It is called before cgroup_rmdir() checks all subsys's refcnt. I think this is useful for subsyses which have some extra refs even if there are no

[Devel] Re: [RFC][PATCH] memory cgroup enhancements updated [3/10] remember pagecache

2007-10-24 Thread KAMEZAWA Hiroyuki
On Wed, 24 Oct 2007 19:26:34 +0530 Balbir Singh [EMAIL PROTECTED] wrote: Could we define enum { MEM_CGROUP_CHARGE_TYPE_CACHE = 0, MEM_CGROUP_CHARGE_TYPE_MAPPED = 1, }; and use the enums here and below. Okay, I'll use this approach. Thanks, -Kame

[Devel] Re: [RFC][PATCH] memory cgroup enhancements updated [10/10] NUMA aware account

2007-10-24 Thread KAMEZAWA Hiroyuki
On Wed, 24 Oct 2007 20:29:08 +0530 Balbir Singh [EMAIL PROTECTED] wrote: + for_each_possible_cpu(cpu) { + int nid = cpu_to_node(cpu); + struct mem_cgroup_stat_cpu *mcsc; + if (sizeof(*mcsc) PAGE_SIZE) + mcsc =

[Devel] [PATCH] namespaces: introduce sys_hijack (v7)

2007-10-24 Thread Serge E. Hallyn
This is just a first stab at doing hijack by cgroup files. I force using the 'tasks' file just so that I can (a) predict and check the name of the file, (b) make sure it's a cgroup file, and then (c) trust that taking __d_cont(dentry parent) gives me a legitimate container. Seems to work at

[Devel] Re: LSM and Containers

2007-10-24 Thread Serge E. Hallyn
Quoting Peter Dolding ([EMAIL PROTECTED]): On 10/25/07, Crispin Cowan [EMAIL PROTECTED] wrote: Peter Dolding wrote: The other thing you have not though of and is critical. If LSM is the same LSM across all containers. What happens if that is breached and tripped to disable. You only