Hi! Take a look please, once time permit. This series doesn't cover all patches because we can't use css_local_root() helper until PSBM-134002 get merged (in those patches this helper is introduced). Thus the commit
c1b584c0d3be ve/cgroup: Get correct VE init css when ve init_task is moved to child cgroup has been skipped and needs to be merged later. Next, the commits are dropped because they either already merged upstream or reworked f7ae79e2d38a ms/socket: fix unused-function warning merged 3017fd2c568e ms/mm/memcontrol.c: allocate shrinker_map on appropriate NUMA node reworked in ms 2bfd36374edd9ed7f2ebf66cacebedf7273901cb 9538790c376b ms/mm, page_alloc: drop should_suppress_show_mem reworked in ms 1be334e5c0886197cc82923ff0ac5836111b7b57 ecd4688343a6 ms/tracing: Fix race in trace_open and buffer resize call merged 33a9ea68d666 ms/VFS: use synchronize_rcu_expedited() in namespace_unlock() merged 1bd9cde59979 ms/net: drop bogus skb with CHECKSUM_PARTIAL and offset beyond end of trimmed packet merged 68fdee03df0f ms/signal: avoid double atomic counter increments for user accounting merged (an updated in ms) The next commits has to be applied manually due to significant kernel changes though I kept former authors 75fde78a1d92 scsi: ratelimit messages about rejected I/O d29e2f9fbf27 ve/proc/block: show /proc/diskstats inside a Container And the last commit fa37f42fa2e1 ve/net/bridge: make net.bridge.* sysctl visible in Containers (r/o) been dropped because bridge sysctl has been fully virtualised. Still note that in our approach we hide this sysctl for unprivileged users in VE while mainstream version doesn't do so. I'm not really sure if we have to introduce this hack back and hide sysctl? Kostya? Kirill? Vasya? Obviously the series build/boot tested only. Andrey Zhadchenko (1): net: openvswitch: add capability to specify ifindex of new links Konstantin Khorenko (2): ve/sysfs: relax sanity check for ns equality in kernfs_find_ns() scsi: ratelimit messages about rejected I/O Pavel Tikhomirov (4): ve/memcg: Virtualize /proc/vmstat view inside CT ve: prohibit opening proc/self/exe from VE for VD_VE_ENTER_TASK shmem/ve: virtualize tmpfs default size ms/sock: allow reading and changing sk_userlocks with setsockopt Vasily Averin (3): openvswitch: allow to create ovs bridges inside Containers ve/bridge: handle netlink messages AF_BRIDGE / RTM_[GSD]ETLINK sent from inside a Container ve/proc/block: show /proc/diskstats inside a Container arch/alpha/include/uapi/asm/socket.h | 2 ++ arch/mips/include/uapi/asm/socket.h | 2 ++ arch/parisc/include/uapi/asm/socket.h | 2 ++ arch/sparc/include/uapi/asm/socket.h | 2 ++ block/genhd.c | 8 +++++- drivers/scsi/scsi_lib.c | 14 +++++++--- fs/kernfs/dir.c | 5 ++-- fs/proc/base.c | 11 ++++++++ include/linux/memcontrol.h | 6 ++++ include/net/sock.h | 3 +- include/uapi/asm-generic/socket.h | 2 ++ include/uapi/linux/socket.h | 5 ++++ kernel/ve/ve.c | 3 ++ mm/memcontrol.c | 40 +++++++++++++++++++++++++++ mm/shmem.c | 22 +++++++++++++-- mm/vmstat.c | 16 ++++++++++- net/core/sock.c | 13 +++++++++ net/openvswitch/datapath.c | 16 +++++++++-- net/openvswitch/vport-internal_dev.c | 4 ++- net/openvswitch/vport.h | 2 ++ 20 files changed, 163 insertions(+), 15 deletions(-) base-commit: 3202bc6765b3752c6a79660a754133cd478182aa -- 2.31.1 _______________________________________________ Devel mailing list Devel@openvz.org https://lists.openvz.org/mailman/listinfo/devel