As you can see only 19 Mb Vmalloc is used.
> And if that's normal, may be you should override default limit in
> OpenVZ patch? For now I used vmalloc=256m in kernel's command line, but
> this is not trivial to found out the problem for normal not skilled
> user.
Could You p
ollowing
article in our wiki:
http://wiki.openvz.org/Oracle_10g_VE
thank you,
Vasily Averin
___
Devel mailing list
Devel@openvz.org
https://openvz.org/mailman/listinfo/devel
Hi Shawn,
To use Oracle inside Virtual private server You should install OpenVZ, create
new Container (i.e. new Virtual Private server), then install Oracle inside this
container as described in our article.
thank you,
Vasily Averin
Vasily Averin wrote:
> Hi Shawn,
>
> duyuy
cribe the situation where this way will give us some
significant benefits?
thank you,
Vasily Averin
___
Devel mailing list
Devel@openvz.org
https://openvz.org/mailman/listinfo/devel
side VE.
thank you,
Vasily Averin
___
Devel mailing list
Devel@openvz.org
https://openvz.org/mailman/listinfo/devel
ocated but last smb_rput still
tries to free it again.
To prevent this issue rq_trans2buffer pointer should be set to NULL after kfree.
Signed-off-by: Vasily Averin <[EMAIL PROTECTED]>
--- 2.6.21-rc3/fs/smbfs/request.c 2007-03-13 14:22:53.0 +0300
+++ 2.6.21-rc3/fs/smbfs/request
T3_SB(sb)->turn_ro_timer that nobody uses
in kernel.
I do not understand the function of this ioctl and believe this code is dead
long time ago. From my POV it makes sense to remove it from kernel instead of
fixing it. Has somebody any objections?
Thank you,
Va
extra debug checks without any drawbacks and
restores the normal driver's work.
Signed-off-by: Vasily Averin <[EMAIL PROTECTED]>
--- 2.6.21-rc5/drivers/message/i2o/i2o_block.c 2007-02-04 21:44:54.0
+0300
+++ 2.6.21-rc5/drivers/message/i2o/i2o_block.c 2007-03-26 11:03:52.
bucket may be empty but the
neighbour ones can have the number of conntracks that can be freed. With the
following patch early_drop() will search conntracks in all hash buckets.
Signed-off-by: Vasily Averin <[EMAIL PROTECTED]>
--- 2.6.21-rc6/net/ipv4/netfilter/ip_conntrack_core.c
bucket may be empty but the
neighbour ones can have the number of conntracks that can be freed. With the
following patch early_drop() will search conntracks in all hash buckets.
Signed-off-by: Vasily Averin <[EMAIL PROTECTED]>
--- 2.6.21-rc6/net/ipv4/netfilter/ip_conntrack_core.c
Eric Dumazet wrote:
> On Fri, 06 Apr 2007 12:00:29 +0400
> Vasily Averin <[EMAIL PROTECTED]> wrote:
>
>> When the number of conntracks is reached ip_conntrack_max limit,
>> early_drop() is
>> called and tries to free one of already used conntracks in one of th
bucket and allows to search conntracks in other hash
buckets.
Signed-off-by: Vasily Averin <[EMAIL PROTECTED]>
diff --git a/net/netfilter/nf_conntrack_core.c
b/net/netfilter/nf_conntrack_core.c
index e132c8a..d0b5794 100644
--- a/net/netfilter/nf_conntrack_core.c
+++ b/net/net
Eric Dumazet wrote:
> Vasily Averin a e'crit :
>> When the number of conntracks is reached nf_conntrack_max limit,
>> early_drop() is
>> called and tries to free one of already used conntracks in one of the
>> hash
>> buckets. If it does not find any conntr
bucket (NF_CT_PER_BUCKET) and allows to search conntracks
in other hash buckets. As result in any case the search will have the same
chances to free one of the conntracks and the check will not lead to long
delays.
Signed-off-by: Vasily Averin <[EMAIL PROTECTED]>
diff --git a/net/net
h i2o 5/6] i2o_proc files permission
[patch i2o 6/6] i2o debug output cleanup
However because of Markus Lidel is not i2o maintainer now, I do not understand
who should agree the following patches.
Thank you,
Vasily Averin
___
Devel mailing list
torig controllers state, and in case of memory shortage it leads to the
node crash or disk IO stall.
Signed-off-by: Vasily Averin <[EMAIL PROTECTED]>
--- lk2.6/drivers/message/i2o/i2o_config.c
+++ lk2.6/drivers/message/i2o/i2o_config.c
@@ -554,8 +554,6 @@ static int i2o_cfg_passthru32
This patch fixes access to memory that has not been allocated:
i2o_msg_get_wait() can returns errors different from I2O_QUEUE_EMPTY. But the
result is checked only against this code. If it is not I2O_QUEUE_EMPTY then we
dereference the error code as the pointer later.
Signed-off-by: Vasily Averin
We need to free i2o msg in case of error.
Signed-off-by: Vasily Averin <[EMAIL PROTECTED]>
--- lk2.6/drivers/message/i2o/exec-osm.c
+++ lk2.6/drivers/message/i2o/exec-osm.c
@@ -131,8 +131,10 @@ int i2o_msg_post_wait_mem(struct i2o_con
int rc = 0;
wait = i2o_exec_wait
fixed oops on reading from some i2o proc files (i2o_seq_show_driver_store() and
other) because their handlers uses "exec" field in struct i2o_controller
Signed-off-by: Vasily Averin <[EMAIL PROTECTED]>
--- lk2.6/drivers/message/i2o/exec-osm.c
+++ lk2.6/drivers/message/i2o/exec
Reading from some i2o related proc files can lead to the i2o controller hang due
unknown reasons. As a workaround this patch changes the permission of these
files to root-only accessible.
Signed-off-by: Vasily Averin <[EMAIL PROTECTED]>
--- lk2.6/drivers/message/i2o/i2o_proc.c
+++ lk2.6/d
fixed output of i2o debug messages, extra KERN_ are removed
Signed-off-by: Vasily Averin <[EMAIL PROTECTED]>
--- lk2.6/drivers/message/i2o/debug.c
+++ lk2.6/drivers/message/i2o/debug.c
@@ -24,7 +24,7 @@ void i2o_report_status(const char *sever
if (cmd == I2O_CMD_UTIL_EVT_RE
y send
a I2O command to the controller, but this one couldn't handle it and
instead of just aborting the command "panic's". IIRC it's only Adaptec
related, the Promise controllers doesn't show this behaviour.
Thank you,
Vasily Averin
Vasily Averin wrote:
>
Alan Cox wrote:
> On Tue, 15 May 2007 16:47:05 +0400
> Vasily Averin <[EMAIL PROTECTED]> wrote:
>
>> Reading from some i2o related proc files can lead to the i2o controller hang
>> due
>> unknown reasons. As a workaround this patch changes the permission of these
to set negative timeout values (sets 0 instead) and outputs
ratelimited information message about such attempts.
Signed-Off-By: Vasily Averin <[EMAIL PROTECTED]>
diff --git a/net/core/sock.c b/net/core/sock.c
index 22183c2..27d7a46 100644
--- a/net/core/sock.c
+++ b/net/core/sock.c
@@ -206,7
to set negative timeout values (sets 0 instead) and outputs
ratelimited information message about such attempts.
Signed-Off-By: Vasily Averin <[EMAIL PROTECTED]>
diff --git a/net/core/sock.c b/net/core/sock.c
index 22183c2..7e51d3a 100644
--- a/net/core/sock.c
+++ b/net/core/sock.c
@@ -206,7
cedure recently, probably this issue was fixed already?
thank you,
Vasily Averin
OpenVZ/Virtuozzo Linux kernel Team
May 24 09:39:39 ts28 SCSI subsystem initialized
May 24 09:39:39 ts28 libata version 2.00 loaded.
May 24 09:39:39 ts28 sata_via :00:0f.0: version 2.0
May 24 09:39:39
RHEL4 testkernels)?
thank you,
Vasily Averin
___
Devel mailing list
Devel@openvz.org
https://openvz.org/mailman/listinfo/devel
From: Kirill Korotaev <[EMAIL PROTECTED]>
One of error path in ext3_read_inode() leaks bh since brelse is forgoten.
Signed-Off-By: Kirill Korotaev <[EMAIL PROTECTED]>
Acked-by: Vasily Averin <[EMAIL PROTECTED]>
diff --git a/fs/ext3/inode.c b/fs/ext3/inode.c
inde
Customers claims to ext3-related errors, investigation showed that ext3 orphan
list has been corrupted and have the reference to non-ext3 inode. The following
debug helps to understand the reasons of this issue.
Signed-off-by: Vasily Averin <[EMAIL PROTECTED]>
diff --git a/fs/ext3/sup
rrectly.
As far as i see is_bad_inode() is called after iget() in all places excluding
ext3_lookup() and ext3_get_parent(). I believe it makes sense to add bad inode
check to these functions too and call iput if bad inode detected.
Signed-off-by: Vasily Averin <[EMAIL PROTECTED]>
diff --
Andrew Morton wrote:
> On Mon, 04 Jun 2007 09:19:10 +0400 Vasily Averin <[EMAIL PROTECTED]> wrote:
>> diff --git a/fs/ext3/namei.c b/fs/ext3/namei.c
>> index 9bb046d..e3ac8c3 100644
>> --- a/fs/ext3/namei.c
>> +++ b/fs/ext3/namei.c
>> @@ -1019,6 +1019,11 @@ s
Eric Sandeen wrote:
> Vasily Averin wrote:
>> Customers claims to ext3-related errors, investigation showed that ext3
>> orphan list has been corrupted and have the reference to non-ext3 inode.
>> The following debug helps to understand the reasons of this issue.
>
>
Eric Sandeen wrote:
> Vasily Averin wrote:
>> Bad inode can live some time, ext3_unlink can add it to orphan list, but
>> ext3_delete_inode() do not deleted this inode from orphan list. As result
>> we can have orphan list corruption detected in ext3_destroy_inode().
>
&
Christoph Hellwig wrote:
> On Tue, Jun 05, 2007 at 10:11:12AM +0400, Vasily Averin wrote:
>>>>return d_splice_alias(inode, dentry);
>>>> }
>>> Seems reasonable. So this prevents the bad inodes from getting onto the
>>> orphan list in the fi
Customers claims to ext3-related errors, investigation showed that ext3 orphan
list has been corrupted and have the reference to non-ext3 inode. The following
debug helps to understand the reasons of this issue.
Signed-off-by: Vasily Averin <[EMAIL PROTECTED]>
diff --git a/fs/ext3/super.
Jeff Garzik wrote:
> Vasily Averin wrote:
>> Jeff, Tejun,
>>
>> Our RHEL5-based OpenVZ linux kernel reports about SATA-related issues:
>> VIA VT6420 SATA RAID Controller on MSI motherboard, x86_64 kernel based on
>> latest RHEL5 kernel,
>> On booting hard
our on various nodes. However I doubt strongly
that anybody will want to change this value. Do you think it is really required?
thank you,
Vasily Averin
___
Devel mailing list
Devel@openvz.org
https://openvz.org/mailman/listinfo/devel
hash buckets. As result in any case the search will have the
same chances to free one of the conntracks and the check will not lead to long
delays.
Signed-off-by: Vasily Averin <[EMAIL PROTECTED]>
diff --git a/net/netfilter/nf_conntrack_core.c
b/net/netfilter/nf_conntrack_core.c
index 7
it is incorrect,
We should count the number of checked _conntracks_, but you count the number of
hash buckets. I.e "i" should be incremented/checked inside the nested loop.
Thank you,
Vasily Averin
___
Devel mailing list
Devel@openvz.org
https://openvz.org/mailman/listinfo/devel
Patrick McHardy wrote:
> Vasily Averin wrote:
>> it is incorrect,
>> We should count the number of checked _conntracks_, but you count the number
>> of
>> hash buckets. I.e "i" should be incremented/checked inside the nested loop.
>
>
> I misunderst
Patrick McHardy wrote:
> Vasily Averin wrote:
>> Patrick McHardy wrote:
> -static int early_drop(struct hlist_head *chain)
> +static int early_drop(unsigned int hash)
> {
> /* Use oldest entry, which is roughly LRU */
> struct nf_conntrack_tuple_hash *h;
&g
sense buffer and go to sleep
again.
Could you please confirm that it is expected behavior? It's a bit strange for
me, IMHO other scsi drivers requests sense buffer without EH thread.
Thank you,
Vasily Averin
Jul 20 13:20:15 ts28 cdrom: entering cdrom_open
Jul 20 13:
Albert Lee wrote:
>>> Vasily Averin wrote:
>>>> I've noticed that some scsi commands for DVD-drive attached to pata_via
>>>> successfully finishes without any delays but reports about TIMEOUT
>>>> condition. It
>>>> happens b
period: -3913.800 s
0 total events
[EMAIL PROTECTED] ~]# echo q > /proc/sysrq-trigger
Jul 30 06:25:47 ts28 now at 25322820465391 nsecs
Full serial console logs are attached, The other hardware details can be found
in http://bugzilla.kernel.org/show_bug.cgi?id=8650
Thank you,
Vasily Av
Groundhog Day?
Vasily Averin wrote:
> [EMAIL PROTECTED] ~]# echo 1 > /proc/timer_stats
> [EMAIL PROTECTED] ~]# cat /proc/timer_stats
> Timer Stats Version: v0.1
> Sample period: 17.992 s
> 0 total events
> [EMAIL PROTECTED] ~]# cat /proc/timer_stats
> Timer Stats Versi
john stultz wrote:
> On 7/29/07, Vasily Averin <[EMAIL PROTECTED]> wrote:
>> I've investigated why my testnode freezes. When I found that node is freezed
>> again I've started to press Sysrq keys and noticed the following negative
>> time jump.
>>
>&g
Vasily Averin wrote:
> john stultz wrote:
>> On 7/29/07, Vasily Averin <[EMAIL PROTECTED]> wrote:
>>> I've investigated why my testnode freezes. When I found that node is freezed
>>> again I've started to press Sysrq keys and noticed the following negativ
r now I have no ideas how to
continue the investigation of this problem.
Could please anybody advise me any new ways for investigation of this issue?
Thank you,
Vasily Averin
OpenVZ Linux Kernel Team
___
Devel mailing list
Devel@openvz.org
htt
Jan Engelhardt wrote:
> On Oct 9 2007 09:26, Vasily Averin wrote:
>> On one of our servers timer interrupts (i.e irq0) are stops working. As
>> result
>> any kernel timers do not triggers and tasks waiting some signals from timers
>> hangs forever.
>
> What
it become "invalid" instead be
freed? Who holds the references to these pages?
thank you,
Vasily Averin
___
Devel mailing list
Devel@openvz.org
https://openvz.org/mailman/listinfo/devel
Nick Piggin wrote:
> Hi,
>
> On Thursday 18 October 2007 16:24, Vasily Averin wrote:
>> Hi all,
>>
>> could anybody explain how "inactive" may be much greater than "cached"?
>> stress test (http://weather.ou.edu/~apw/projects/stress/) that w
Nick Piggin wrote:
> Some filesystems, including I believe, ext3 with data=ordered,
> can leave orphaned pages around after they have been truncated
> out of the pagecache. These pages get left on the LRU and vmscan
> reclaims them pretty easily.
>
> Try ext3 data=writeback, or even ext2.
thanks,
it saves some bytes memory
Signed-off-by: Vasily Averin <[EMAIL PROTECTED]>
--- a/include/linux/device-mapper.h
+++ b/include/linux/device-mapper.h
@@ -110,12 +110,12 @@ struct target_type {
};
struct io_restrictions {
+ unsigned long seg_boundary_mask;
unsign
direct IO requests are addressed to dm-over-i2o device.
Signed-off-by: Vasily Averin <[EMAIL PROTECTED]>
--- a/drivers/md/dm-table.c
+++ b/drivers/md/dm-table.c
@@ -102,6 +102,8 @@ static void combine_restrictions_low(struct io_restrictions
lhs->seg_boundary_mask =
min
max_phys_segments and max_sectors were swapped
Signed-off-by: Vasily Averin <[EMAIL PROTECTED]>
--- a/drivers/message/i2o/i2o_block.c
+++ b/drivers/message/i2o/i2o_block.c
@@ -1076,8 +1076,8 @@ static int i2o_block_probe(struct device *dev)
blk_queue_max_sectors(queue, max_s
i2o crashed when CONFIG_DEBUG_SG is enabled because i2o_block_request structure
includes array of scatterlists that should be initialised
Signed-off-by: Vasily Averin <[EMAIL PROTECTED]>
--- a/drivers/message/i2o/i2o_block.c
+++ b/drivers/message/i2o/i2o_block.c
@@ -1137,6 +1137,18 @@
max_hw_segments limit.
Unfortunately there is not any checks and when i2o driver handles this incorrect
request it fills the memory out of i2o_iop0_msg_inpool slab.
Thank you,
Vasily Averin
___
Devel mailing list
Devel@openvz.org
https://openvz.org/mailman/listinfo/devel
Thomas Gleixner wrote:
> On Tue, 9 Oct 2007, Vasily Averin wrote:
>> On one of our servers timer interrupts (i.e irq0) are stops working. As
>> result
>> any kernel timers do not triggers and tasks waiting some signals from timers
>> hangs forever.
>>
>> Als
issue was reproduced several times on several nodes, but every time it
was occurred after the following message:
"CIFS VFS: Invalid size SMB length 4 pdu_length 4"
Is it probably known issue for you?
Thank you,
Vasily Averin
Virtuozzo/OpenVZ linux kernel Team
Unable to ha
Jeff Layton wrote:
> On Fri, 09 Nov 2007 14:17:38 +0300
> Vasily Averin <[EMAIL PROTECTED]> wrote:
>
>> Hello Steve,
>>
>> Could you please take a look at the following oops? It looks like it
>> is related to cifs:
>> 1) Code line is corrupted (21 by
Hi Ayaz,
While testing new OpenVZ kernel based on RHEL5.1 kernel 2.6.18-53.el5 we have
observed that node loads forcedeth driver too long:
Nov 28 14:04:19 ts49 kjournald starting. Commit interval 5 seconds
Nov 28 14:04:19 ts49 EXT3-fs: mounted filesystem with ordered data mode.
...
Nov 28 19:34
rc cannot be -EBADF now and condition is always true
Signed-off-by: Vasily Averin <[EMAIL PROTECTED]>
--- a/fs/cifs/file.c2007-12-18 16:46:53.0 +0300
+++ b/fs/cifs/file.c2007-12-18 16:49:25.0 +0300
@@ -1181,10 +1181,8 @@ static int cifs_partialpagewrite(
lain it in more details?
thank you,
Vasily Averin
___
Devel mailing list
Devel@openvz.org
https://openvz.org/mailman/listinfo/devel
Vasily, Solar Designer,
first of all thank you very much for your report!
For me it looks like security issue, however it do not affect default
containers, because of neither loopback nor real devices cannot be mounted
without additional permission.
thank you,
Vasily Averin
On 01/24
On 01/29/2011 06:52 PM, Solar Designer wrote:
Hi,
It appears that linux-2.6.18-atl1-1.0.41.0.patch in RHEL5 branch OpenVZ
kernels is your addition, not Red Hat's, correct?
yes, it's our patch, prepared 4 years ago, sources were taken from
http://atl1.sourceforge.net/
I have a machine with
On 01/29/2011 08:50 PM, Solar Designer wrote:
On Sat, Jan 29, 2011 at 07:08:25PM +0300, Vasily Averin wrote:
On 01/29/2011 06:52 PM, Solar Designer wrote:
It appears that linux-2.6.18-atl1-1.0.41.0.patch in RHEL5 branch OpenVZ
kernels is your addition, not Red Hat's, correct?
yes, it&
On 01/30/2011 11:08 AM, Vasily Averin wrote:
On 01/29/2011 08:50 PM, Solar Designer wrote:
On Sat, Jan 29, 2011 at 07:08:25PM +0300, Vasily Averin wrote:
On 01/29/2011 06:52 PM, Solar Designer wrote:
It appears that linux-2.6.18-atl1-1.0.41.0.patch in RHEL5 branch OpenVZ
kernels is your
just FYI: I've found this hardware locally, node is free for investigation.
I'm reinstalling Centos to this node right now and then I will try to reproduce
reported issue.
thank you,
Vasily Averin
On 01/30/2011 11:28 AM, Solar Designer wrote:
On 01/30/2011 11:08 AM, Vas
On 01/31/2011 11:29 AM, Vasily Averin wrote:
just FYI: I've found this hardware locally, node is free for investigation.
I'm reinstalling Centos to this node right now and then I will try to reproduce
reported issue.
I can confirm this issue,
upload to this node is normal, but downlo
On 01/31/2011 01:05 PM, Vasily Averin wrote:
On 01/31/2011 11:29 AM, Vasily Averin wrote:
just FYI: I've found this hardware locally, node is free for investigation.
I'm reinstalling Centos to this node right now and then I will try to reproduce
reported issue.
I can confirm
might and greatest Solar Designer! :)
On Mon, Jan 31, 2011 at 06:55:27PM +0300, Vasily Averin wrote:
I've recompiled driver from sources (atl1-1.2.40.3) and it works well on
2.6.18-028stab083.1 kernel.
Do you mean that the problem went away with this recompile?
No, I've used sources
Alexander,
thank you very much for reporting and testing.
Pavel,
this is one more remainder: please do not forget to replace patches in new
kernels. :)
On 02/03/2011 03:09 AM, Solar Designer wrote:
On Tue, Feb 01, 2011 at 04:53:47PM +0300, Vasily Averin wrote:
I've prepared new patch
if dst is not local br_handle_frame_finish() does not clone original skb and
forgets to reset IPCB before return to IP stack. it can lead to stack corruption
in icmp_send()
Signed-off-by: Vasily Averin
---
net/bridge/br_input.c |5 +++--
1 files changed, 3 insertions(+), 2 deletions
On 11/02/2011 11:08 PM, Vasily Averin wrote:
> if dst is not local br_handle_frame_finish() does not clone original skb and
> forgets to reset IPCB before return to IP stack. it can lead to stack
> corruption
> in icmp_send()
example of stack corruption
http://bugzilla.openvz.org/sho
v2: extra bracket was removed
if dst is not local br_handle_frame_finish() does not clone original skb and
forgets to reset IPCB before return to IP stack. it can lead to stack corruption
in icmp_send()
Signed-off-by: Vasily Averin
---
net/bridge/br_input.c |5 +++--
1 files changed, 3
On 11/02/2011 11:31 PM, Stephen Hemminger wrote:
> On Wed, 02 Nov 2011 23:08:57 +0400
> Vasily Averin wrote:
>
>> if dst is not local br_handle_frame_finish() does not clone original skb and
>> forgets to reset IPCB before return to IP stack. it can lead to stack
>>
possible to use gdbserver-like functionality with crash?
IMHO it would be great to start crash utility locally, with debug symbols but
without core dump file, and then connect to gdbserver on remote node attached
to core dump file.
Thank you,
Vasily Averin
valid flags to a subset
Theoretically in future kmem_cache_sanity_check() can return positive value.
Probably it's better to check (err < 0) in caller ?
Thank you,
Vasily Averin
___
Devel mailing list
Devel@openvz.org
https://lists.openvz.org/mailman/listinfo/devel
On 12/19/2013 12:39 PM, Vladimir Davydov wrote:
> On 12/19/2013 12:17 PM, Vasily Averin wrote:
>> On 12/18/2013 05:16 PM, Vladimir Davydov wrote:
>>> --- a/mm/slab_common.c
>>> +++ b/mm/slab_common.c
>>> @@ -176,8 +176,9 @@ kmem_cache_create_memcg(struct mem_
nt
in pid_hash array.
Attached patch fix this problem.
Thank you,
Vasily Averin
diff -up crash-7.0.8/task.c.pidns crash-7.0.8/task.c
--- crash-7.0.8/task.c.pidns2014-09-11 11:08:25.0 -0400
+++ crash-7.0.8/task.c 2014-09-19 06:15:42.0 -0400
@@ -2033,7 +2033,7 @@ do_ch
ideas.
Vasily Averin (2):
net -n option renamed to -N
namespace support for net command
defs.h| 1 +
help.c| 9 ++---
net.c | 48 ++--
symbols.c | 2 ++
4 files changed, 43 insertions(+), 17 deletions(-)
--
ipcs and mount commands uses -n key as namespace pointer
clear place for similar option in net command
Signed-off-by: Vasily Averin
---
help.c | 6 +++---
net.c | 4 ++--
2 files changed, 5 insertions(+), 5 deletions(-)
diff --git a/help.c b/help.c
index 6aa3e20..780966b 100644
--- a/help.c
now "net -n pid|task" should show list of network devices in specifed network
namespace
Signed-off-by: Vasily Averin
---
defs.h| 1 +
help.c| 5 -
net.c | 46 +-
symbols.c | 2 ++
4 files changed, 40 insertions(+), 14
proxy support
- tested, seems works correctly on RHEL6-based OpenVZ kernel
Vasily Averin (2):
net -n option renamed to -N
namespace support for net command
defs.h| 1 +
help.c| 14 +++---
net.c | 58 ++
symbols.c |
ipcs and mount commands uses -n key as namespace pointer
here we clear the place for similar option in net command
Signed-off-by: Vasily Averin
---
help.c | 6 +++---
net.c | 4 ++--
2 files changed, 5 insertions(+), 5 deletions(-)
diff --git a/help.c b/help.c
index 6aa3e20..780966b 100644
net without arguments shows network devices in init_net
net -n -- in network namespace of current task
net -n pid|taskp -- in network namespace of specified task
Signed-off-by: Vasily Averin
---
defs.h| 1 +
help.c| 10 +-
net.c | 56
rollback to using of init_net on kernels without
nsproxy support
- tested, seems works correctly on RHEL6-based OpenVZ kernel
Vasily Averin (2):
net -n option renamed to -N
namespace support for net command
defs.h| 1 +
help.
ipcs and mount commands uses -n key as namespace pointer.
Here we clear the place for similar option in net command
Signed-off-by: Vasily Averin
---
help.c | 6 +++---
net.c | 4 ++--
2 files changed, 5 insertions(+), 5 deletions(-)
diff --git a/help.c b/help.c
index 6aa3e20..780966b 100644
net without arguments shows network devices in init_net
net -n -- in network namespace of current task
net -n pid|taskp -- in network namespace of specified task
Signed-off-by: Vasily Averin
---
defs.h| 1 +
help.c| 10 +-
net.c | 56
ps -L no longer exists
Signed-off-by: Vasily Averin
---
task.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/task.c b/task.c
index c875bb9..bc7911b 100644
--- a/task.c
+++ b/task.c
@@ -2843,7 +2843,7 @@ task_struct_member(struct task_context *tc, unsigned int
radix
121 99625 8801ce134ff0 saslauthd
121 248691 88040e2ee9c0 httpd
ctid -- shows ContainerID for given task
crash> ctid 99614
CTIDPID TASKCOMM
121 99614 8803fb26cf70 xfs
Thank you,
Vasily Averin
__
vz extension contains OpenVZ specific commands:
vzlistshows list of OpenVZ containers,
vzps shows all tasks executed inside of specified container,
ctid shows ContainerID of given task.
Signed-off-by: Vasily Averin
---
extensions/vz.c | 345
aintain it,
and notify you about important changes via crash-utility mailing list?
Thank you,
Vasily Averin
___
Devel mailing list
Devel@openvz.org
https://lists.openvz.org/mailman/listinfo/devel
On 05.05.2015 15:48, Vladimir Davydov wrote:
> The problem is some data looked up by VEID can outlive the corresponding
> container. An example is /proc/vz/venetstat, whose entries live until
> container destruction. Since we currently remove all cgroups, including
> the VE cgroup, on container sto
Signed-off-by: James Morris
https://bugzilla.openvz.org/show_bug.cgi?id=2693
Signed-off-by: Vasily Averin
---
fs/proc/kmsg.c | 14 +++---
include/linux/security.h | 11 ++-
include/linux/syslog.h | 29 +
kernel/printk.c|
This patch set is port of rh6 diff-ve-printk-conntrack-tables-full.
Thank you,
Vasily Averin
___
Devel mailing list
Devel@openvz.org
https://lists.openvz.org/mailman/listinfo/devel
net_veboth_ratelimited is required to save net-ratelimited messages
both into host and into containers dmesg buffers
Signed-off-by: Vasily Averin
diff --git a/include/linux/net.h b/include/linux/net.h
index d7b2205..7e59abe 100644
--- a/include/linux/net.h
+++ b/include/linux/net.h
@@ -249,6
port of diff-ve-printk-conntrack-tables-full from rh6-based kernels
"nf_conntrack: table full, dropping packet" message
should be visible both in CT and on HN and
should contain CTID for reading simplicity.
https://bugzilla.openvz.org/show_bug.cgi?id=2940
Signed-off-by: Vasily Av
like in rh6-based kernels,
/proc/cgroups output inside container shows 1 in 'num_cgroups' column
https://jira.sw.ru/browse/PSBM-33400
Signed-off-by: Vasily Averin
diff --git a/kernel/cgroup.c b/kernel/cgroup.c
index f881f69..f897042 100644
--- a/kernel/cgroup.c
+++ b/kernel/cgroup.c
1) how about rh6?
2) how about spin_unlock(lock) ?
On 19.05.2015 17:43, Kirill Tkhai wrote:
> Double loop is here, "break works is not as expected".
>
> Signed-off-by: Kirill Tkhai
> ---
> net/ipv4/tcp_ipv4.c |3 ++-
> 1 file changed, 2 insertions(+), 1 deletion(-)
>
> diff --git a/net/ipv
1 - 100 of 827 matches
Mail list logo