FS#16715 - [kernel26] Request for the needed Linux Container kernel options to be enabled by default
Attached to Project:
Arch Linux
Opened by Dwight Schauer (dschauer) - Sunday, 18 October 2009, 04:06 GMT
Last edited by Tobias Powalowski (tpowa) - Saturday, 27 February 2010, 14:48 GMT
Opened by Dwight Schauer (dschauer) - Sunday, 18 October 2009, 04:06 GMT
Last edited by Tobias Powalowski (tpowa) - Saturday, 27 February 2010, 14:48 GMT
|
Details
Now that LXC (Linux Containers) are mainstream, I'm
requesting that the needed configuration options be enabled
in the default container, so that linux containers are
available out of the box, so that one does not have to
maintain a custom kernel/nvidia/other packages.
# Needed for LXC. See http://lxc.sourceforge.net/lxc.html CONFIG_GROUP_SCHED=y CONFIG_FAIR_GROUP_SCHED=y CONFIG_RT_GROUP_SCHED=y CONFIG_CGROUP_SCHED=y CONFIG_CGROUPS=y CONFIG_CGROUP_NS=y CONFIG_CGROUP_FREEZER=y CONFIG_CGROUP_DEVICE=y CONFIG_CPUSETS=y CONFIG_PROC_PID_CPUSET=y CONFIG_CGROUP_CPUACCT=y CONFIG_RESOURCE_COUNTERS=y CONFIG_CGROUP_MEM_RES_CTLR=y CONFIG_CGROUP_MEM_RES_CTLR_SWAP=y CONFIG_MM_OWNER=y CONFIG_NAMESPACES=y CONFIG_UTS_NS=y CONFIG_IPC_NS=y CONFIG_USER_NS=y CONFIG_PID_NS=y CONFIG_NET_NS=y CONFIG_NET_CLS_CGROUP=y # The following should already be turned on. CONFIG_SECURITY_FILE_CAPABILITIES=y # The following would also be nice. CONFIG_SECURITY_SMACK=y # http://www.ibm.com/developerworks/linux/library/l-lxc-security/index.html |
This task depends upon
Closed by Tobias Powalowski (tpowa)
Saturday, 27 February 2010, 14:48 GMT
Reason for closing: Fixed
Additional comments about closing: 2.6.33
Saturday, 27 February 2010, 14:48 GMT
Reason for closing: Fixed
Additional comments about closing: 2.6.33
Shridhar
As for the rest, I never knew what they were about - are there any drawbacks in enabling them?
As far as drawbacks of enabling the configs required for LXC, I'm not aware of any. As far as I know the only thing that uses them is the LXC userspace tools to setup containers. I have these enabled on 2 machines and have not had any issues, I'm about to them to 4 or 5 more as I plan to start using Linux containers a lot more. I was using OpenVZ, but it is unlikely that will ever make it to recent kernels any time soon or ever make into into the mainstream kernel code as Linux containers is already in there and is a lot more flexible.
Prior to 2.6.29 most of these features were only available as patches to the mainstream kernel.
I'll ask about any potential drawbacks on the Linux Containers mailing list.
On Sun, Oct 18, 2009 at 10:44 AM, Daniel Lezcano <daniel.lezcano@free.fr> wrote:
In general the cgroup adds a small overhead at fork/exit when a subsystem make use of the cgroup_callbacks, for example the freezer. But that can be considered as negligeable.
CONFIG_GROUP_SCHED=y
CONFIG_FAIR_GROUP_SCHED=y
CONFIG_RT_GROUP_SCHED=y
CONFIG_CGROUP_SCHED=y
CONFIG_CGROUPS=y
CONFIG_CGROUP_NS=y
CONFIG_CGROUP_FREEZER=y
This one does not add any overhead.
CONFIG_CGROUP_DEVICE=y
For these ones, I don't know.
CONFIG_CPUSETS=y
CONFIG_PROC_PID_CPUSET=y
AFAIR these following options add some overhead especially the memory resource controller.
CONFIG_CGROUP_CPUACCT=y
CONFIG_RESOURCE_COUNTERS=y
CONFIG_CGROUP_MEM_RES_CTLR=y
CONFIG_CGROUP_MEM_RES_CTLR_SWAP=y
CONFIG_MM_OWNER=y
The overhead and footprint of the following options are neligeable
CONFIG_NAMESPACES=y
CONFIG_UTS_NS=y
CONFIG_IPC_NS=y
CONFIG_USER_NS=y
CONFIG_PID_NS=y
CONFIG_NET_NS=y
CONFIG_NET_CLS_CGROUP=y
This one, no overhead.
CONFIG_SECURITY_FILE_CAPABILITIES=y
Would also be useful: Support multiple instances of devpts
http://cateee.net/lkddb/web-lkddb/DEVPTS_MULTIPLE_INSTANCES.html
http://blog.flameeyes.eu/2009/08/10/some-more-notes-about-linux-containers
https://lists.linux-foundation.org/pipermail/containers/2009-October/021616.html
On Tue, Oct 27, 2009 at 3:42 AM, KAMEZAWA Hiroyuki <kamezawa.hiroyu@jp.fujitsu.com> wrote:
> On Sun, 18 Oct 2009 17:44:31 +0200
> Daniel Lezcano <daniel.lezcano@free.fr> wrote:
>
>> AFAIR these following options add some overhead especially the memory resource controller.
>>
>> CONFIG_CGROUP_CPUACCT=y
>> CONFIG_RESOURCE_COUNTERS=y
>> CONFIG_CGROUP_MEM_RES_CTLR=y
>> CONFIG_CGROUP_MEM_RES_CTLR_SWAP=y
>> CONFIG_MM_OWNER=y
>>
>>
> sorry, memcg's performance fix is now tested under -mm kernel.
> plz wait for 2.6.33 ;(
>
> Thanks,
> -Kame
Shridhar
CONFIG_GROUP_SCHED=y
CONFIG_FAIR_GROUP_SCHED=y
CONFIG_RT_GROUP_SCHED=y
CONFIG_CGROUP_SCHED=y
CONFIG_CGROUPS=y
CONFIG_CGROUP_NS=y
CONFIG_CGROUP_FREEZER=y
CONFIG_CGROUP_DEVICE=y
CONFIG_CPUSETS=y
CONFIG_PROC_PID_CPUSET=y
CONFIG_CGROUP_CPUACCT=y
CONFIG_RESOURCE_COUNTERS=y
CONFIG_CGROUP_MEM_RES_CTLR=y
CONFIG_CGROUP_MEM_RES_CTLR_SWAP=y
CONFIG_MM_OWNER=y
CONFIG_NAMESPACES=y
CONFIG_UTS_NS=y
CONFIG_IPC_NS=y
CONFIG_USER_NS=y
CONFIG_PID_NS=y
CONFIG_NET_NS=y
CONFIG_NET_CLS_CGROUP=y
CONFIG_DEVPTS_MULTIPLE_INSTANCES=y
# The following should already be turned on.
CONFIG_SECURITY_FILE_CAPABILITIES=y