public inbox for linux-block@vger.kernel.org
 help / color / mirror / Atom feed
* [LSF TOPIC] block namespaces
@ 2022-05-01 23:14 Hannes Reinecke
  2022-05-02 16:09 ` Omar Sandoval
  0 siblings, 1 reply; 4+ messages in thread
From: Hannes Reinecke @ 2022-05-01 23:14 UTC (permalink / raw)
  To: Omar Sandoval, Christian Brauner, linux-block@vger.kernel.org,
	lsf-pc@lists.linux-foundation.org

Hi Omar,

here's a late topic for the I/O Track: Block namespaces

We already proposed it for the (canceled) LSF last year, and now I found 
that Christian Brauner is actually present here at LSF.

What this is about: Similarly to network namespaces we'd like to explore 
the possibility of block namespaces.
Canonical use-case here is iscsi sessions within containers: if one 
container starts up an iscsi session, why should this session be visible 
to the other containers?
The discussion should be about general design and possible use-cases.

Cheers,

Hannes
-- 
Dr. Hannes Reinecke                Kernel Storage Architect
hare@suse.de                              +49 911 74053 688
SUSE Software Solutions GmbH, Maxfeldstr. 5, 90409 Nürnberg
HRB 36809 (AG Nürnberg), Geschäftsführer: Felix Imendörffer

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [LSF TOPIC] block namespaces
  2022-05-01 23:14 [LSF TOPIC] block namespaces Hannes Reinecke
@ 2022-05-02 16:09 ` Omar Sandoval
  2022-05-02 16:17   ` Hannes Reinecke
  0 siblings, 1 reply; 4+ messages in thread
From: Omar Sandoval @ 2022-05-02 16:09 UTC (permalink / raw)
  To: Hannes Reinecke
  Cc: Omar Sandoval, Christian Brauner, linux-block@vger.kernel.org,
	lsf-pc@lists.linux-foundation.org

On Mon, May 02, 2022 at 01:14:48AM +0200, Hannes Reinecke wrote:
> Hi Omar,
> 
> here's a late topic for the I/O Track: Block namespaces
> 
> We already proposed it for the (canceled) LSF last year, and now I found
> that Christian Brauner is actually present here at LSF.
> 
> What this is about: Similarly to network namespaces we'd like to explore the
> possibility of block namespaces.
> Canonical use-case here is iscsi sessions within containers: if one
> container starts up an iscsi session, why should this session be visible to
> the other containers?
> The discussion should be about general design and possible use-cases.

Hey, Hannes,

How much does this overlap with Chris Leech's "network storage
transports managed within a container" topic?

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [LSF TOPIC] block namespaces
  2022-05-02 16:09 ` Omar Sandoval
@ 2022-05-02 16:17   ` Hannes Reinecke
  2022-05-02 16:21     ` Omar Sandoval
  0 siblings, 1 reply; 4+ messages in thread
From: Hannes Reinecke @ 2022-05-02 16:17 UTC (permalink / raw)
  To: Omar Sandoval
  Cc: Omar Sandoval, Christian Brauner, linux-block@vger.kernel.org,
	lsf-pc@lists.linux-foundation.org

On 5/2/22 09:09, Omar Sandoval wrote:
> On Mon, May 02, 2022 at 01:14:48AM +0200, Hannes Reinecke wrote:
>> Hi Omar,
>>
>> here's a late topic for the I/O Track: Block namespaces
>>
>> We already proposed it for the (canceled) LSF last year, and now I found
>> that Christian Brauner is actually present here at LSF.
>>
>> What this is about: Similarly to network namespaces we'd like to explore the
>> possibility of block namespaces.
>> Canonical use-case here is iscsi sessions within containers: if one
>> container starts up an iscsi session, why should this session be visible to
>> the other containers?
>> The discussion should be about general design and possible use-cases.
> 
> Hey, Hannes,
> 
> How much does this overlap with Chris Leech's "network storage
> transports managed within a container" topic?

Hmm. Good question; I don't really know. But yeah, I guess there is some.
So we could lump both of them together I think.

Cheers,

Hannes
-- 
Dr. Hannes Reinecke                Kernel Storage Architect
hare@suse.de                              +49 911 74053 688
SUSE Software Solutions GmbH, Maxfeldstr. 5, 90409 Nürnberg
HRB 36809 (AG Nürnberg), Geschäftsführer: Felix Imendörffer

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [LSF TOPIC] block namespaces
  2022-05-02 16:17   ` Hannes Reinecke
@ 2022-05-02 16:21     ` Omar Sandoval
  0 siblings, 0 replies; 4+ messages in thread
From: Omar Sandoval @ 2022-05-02 16:21 UTC (permalink / raw)
  To: Hannes Reinecke
  Cc: Omar Sandoval, Christian Brauner, linux-block@vger.kernel.org,
	lsf-pc@lists.linux-foundation.org

On Mon, May 02, 2022 at 09:17:04AM -0700, Hannes Reinecke wrote:
> On 5/2/22 09:09, Omar Sandoval wrote:
> > On Mon, May 02, 2022 at 01:14:48AM +0200, Hannes Reinecke wrote:
> > > Hi Omar,
> > > 
> > > here's a late topic for the I/O Track: Block namespaces
> > > 
> > > We already proposed it for the (canceled) LSF last year, and now I found
> > > that Christian Brauner is actually present here at LSF.
> > > 
> > > What this is about: Similarly to network namespaces we'd like to explore the
> > > possibility of block namespaces.
> > > Canonical use-case here is iscsi sessions within containers: if one
> > > container starts up an iscsi session, why should this session be visible to
> > > the other containers?
> > > The discussion should be about general design and possible use-cases.
> > 
> > Hey, Hannes,
> > 
> > How much does this overlap with Chris Leech's "network storage
> > transports managed within a container" topic?
> 
> Hmm. Good question; I don't really know. But yeah, I guess there is some.
> So we could lump both of them together I think.

I added a slot for it right after Chris's topic. We can adapt based on
how much we cover in the first topic.

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2022-05-02 16:22 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2022-05-01 23:14 [LSF TOPIC] block namespaces Hannes Reinecke
2022-05-02 16:09 ` Omar Sandoval
2022-05-02 16:17   ` Hannes Reinecke
2022-05-02 16:21     ` Omar Sandoval

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox