From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-yx1-f47.google.com (mail-yx1-f47.google.com [74.125.224.47]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 59E4737F10E for ; Wed, 21 Jan 2026 17:36:51 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=74.125.224.47 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1769017013; cv=none; b=dM/sOaK5stDiMP8j4GOWPdP+T1xRA64ju5CvbhBi/Gkj4a7gUQ18TZe5KvLCbdY1BVf2C6mEOsujWXDYv8E8Z5CasCsyp9b0Pkn/VUcy6fLLgFEKYgfKlGbrTw/mpBDQ6MM7+mA3J1FRh4+nGFbE2wr94hGgDQz2Pqqgtikrlas= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1769017013; c=relaxed/simple; bh=tpGlhPJQhs6K29z4KKdexPB885DZk84UD04BRE7PW+k=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=l/qKfgVTkM4sDLbpmgqepic6uv/HtG7zdkO1z2mk+HdP9uzTwytUpltNIOSuj+2qf594hyrpdwLFsl2d735OK9BzenMopIAqIHjrIjV9VHSD9nhI6QxpqBBV54GQztU5z5DHqu/Risb24VA5DkTkfk+e5aTjcITcS7pWTI7HkOk= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=cCCGwsSn; arc=none smtp.client-ip=74.125.224.47 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="cCCGwsSn" Received: by mail-yx1-f47.google.com with SMTP id 956f58d0204a3-6494a3d92f5so171320d50.2 for ; Wed, 21 Jan 2026 09:36:51 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1769017010; x=1769621810; darn=vger.kernel.org; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to; bh=TzQpPNktFvNOdBi7+gsCZqhpBpuEURHyo6CUuqA6z7E=; b=cCCGwsSnRtmoCkAf/NTQtmaBasIN2I58Q15Ljxb++/KX+GhSiZ/IiKr6dn6nIzF/Qz N1/VL2O9l4io6YRGd/QZx2JxTaoe3km0Ux9s5s0uFOVmfZ4DrdIx5tHlEfnGjWlwVbgD Mm0CVcdR9PjNS5Pqba2TWoKXbXQ3hTnsxAta+gcYwXnQvRWGmReuuAxfXK+WVJ42w7xP HHZznvsa4G9/Z1WE3+wi4VZWZxLvSN6FCnjetTk2698CYz0oek0L0+RMSYU9Bj7R0gsa sGeyyBgemZDSTFqHIlYSpvicCd74Ff+j7gr8yCi2LKY2g7AL4vOu1gPNXxgOiG2iYlT6 ijSQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769017010; x=1769621810; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-gg:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=TzQpPNktFvNOdBi7+gsCZqhpBpuEURHyo6CUuqA6z7E=; b=bsv80/V5k26dqoO3TW5/2TcaAlyM/z95PwDkNdQ+yE8NhJ6UPQL6iEA5yhLQlXjmom aC/NQ/iayekvxfsnZz74yQ7tTNOG0ofJgRk/q+aHPjEafCt8moIgWrYV4eiPj/Go4qfQ GdEzzwkdSGw4D6PVyWPgd7idGkIFhQkn2YJDH8DxQmNkG0raIrzuqCpJaXWW45h51Hsw KPToR6WQymOi6RV5fXh6BQqjqw8YrVi2isvtsJNXp0yYm0wYXf9VO90tVGeVbbxj4oZV I0aFaDr+y47qtCaHPXpXs0esX5wBYFsoJd6j9XRrJC9jcreh2rjnNJK3BnfshYAA2kau ef+g== X-Forwarded-Encrypted: i=1; AJvYcCX+yP2iGPUdlOueTXF5VIjnqpaG2ZEFuo0DBu+8hAGOX2rBI/RCxIhn+Ph/yqfqS9yLii8j+hGb1Jw=@vger.kernel.org X-Gm-Message-State: AOJu0YwnGrgdOgZR/NUm5vY1FMhgaA0bkCsDiUBVLGVerSEj4VktBB1L bBPrIsbHTgeSzD656yDy4B530/YMPmxCaDfhvV3V4AYzJNyv7P6UvqUJ X-Gm-Gg: AZuq6aK89OMxEcEHTEGJjbOkiyoFMNNkD6up0OP+efvKuTRK/1EwkC+ae8+4zBnSbTP /15kKxLrKY81TYp85xOUUbHKQ2uR6Kye1OwU6brzjDM7C98UogSpKcIh4YxBx2DSHTymx7jLAGX EWC6qLk9S9RP77H6LZpjw55/eu+z6S693fQ41RcXmiPreYB2ZW+Yginlh0lfrBXYtEZ+IkMOM59 tdmwEslbFXQq89e0j7jR5NbapLFh6lQENxTnIyug1Uehn9Uqo1M0dcbJxI0+3uaBu49mNN5xFX8 o8U6b1wHjz07KtD/NLE3WKPsrijZGf2U4s4pvS5lOixwi3Tci1wB9HMCwlEtoqcEqD03M5A1KBB jbIizz/4i7/QCKXs4F2s7Xweu/4I3LsV8yXU5MRkXwXl3dJDO00iO4Adt7/Gx0slQHnR0RVDuhf iazLqixxLuYe0Z+Yh5+j6dHGtIW3uGnbVAg2QWip96qc7E X-Received: by 2002:a05:690e:1c1c:b0:644:60d9:864d with SMTP id 956f58d0204a3-6493c872baemr4135180d50.92.1769017010185; Wed, 21 Jan 2026 09:36:50 -0800 (PST) Received: from devvm11784.nha0.facebook.com ([2a03:2880:25ff:d::]) by smtp.gmail.com with ESMTPSA id 956f58d0204a3-649170adf11sm8096311d50.16.2026.01.21.09.36.49 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 21 Jan 2026 09:36:49 -0800 (PST) Date: Wed, 21 Jan 2026 09:36:48 -0800 From: Bobby Eshleman To: Paolo Abeni Cc: Stefano Garzarella , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Simon Horman , Stefan Hajnoczi , "Michael S. Tsirkin" , Jason Wang , Eugenio =?iso-8859-1?Q?P=E9rez?= , Xuan Zhuo , "K. Y. Srinivasan" , Haiyang Zhang , Wei Liu , Dexuan Cui , Bryan Tan , Vishnu Dasa , Broadcom internal kernel review list , Shuah Khan , Long Li , Jonathan Corbet , linux-kernel@vger.kernel.org, virtualization@lists.linux.dev, netdev@vger.kernel.org, kvm@vger.kernel.org, linux-hyperv@vger.kernel.org, linux-kselftest@vger.kernel.org, berrange@redhat.com, Sargun Dhillon , linux-doc@vger.kernel.org, Bobby Eshleman Subject: Re: [PATCH net-next v15 01/12] vsock: add netns to vsock core Message-ID: References: <20260116-vsock-vmtest-v15-0-bbfd1a668548@meta.com> <20260116-vsock-vmtest-v15-1-bbfd1a668548@meta.com> <4997118e-471c-45fe-bc1f-8f6140199db5@redhat.com> Precedence: bulk X-Mailing-List: linux-doc@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <4997118e-471c-45fe-bc1f-8f6140199db5@redhat.com> On Wed, Jan 21, 2026 at 05:32:34PM +0100, Paolo Abeni wrote: > On 1/21/26 3:48 PM, Stefano Garzarella wrote: > >> diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt > >> index a8d0afde7f85..b6e3bfe365a1 100644 > >> --- a/Documentation/admin-guide/kernel-parameters.txt > >> +++ b/Documentation/admin-guide/kernel-parameters.txt > >> @@ -8253,6 +8253,20 @@ Kernel parameters > >> them quite hard to use for exploits but > >> might break your system. > >> > >> + vsock_init_ns_mode= > >> + [KNL,NET] Set the vsock namespace mode for the init > >> + (root) network namespace. > >> + > >> + global [default] The init namespace operates in > >> + global mode where CIDs are system-wide and > >> + sockets can communicate across global > >> + namespaces. > >> + > >> + local The init namespace operates in local mode > >> + where CIDs are private to the namespace and > >> + sockets can only communicate within the same > >> + namespace. > >> + > > > > My comment on v14 was more to start a discussion :-) sorry to not be > > clear. > > > > I briefly discussed it with Paolo in chat to better understand our > > policy between cmdline parameters and module parameters, and it seems > > that both are discouraged. > > Double checking the git log it looks like __setup() usage is less > constrained/restricted than what I thought. > > > So he asked me if we have a use case for this, and thinking about it, I > > don't have one at the moment. Also, if a user decides to set all netns > > to local, whether init_net is local or global doesn't really matter, > > right? > > > > So perhaps before adding this, we should have a real use case. > > Perhaps more than this feature, I would add a way to change the default > > of all netns (including init_net) from global to local. But we can do > > that later, since all netns have a way to understand what mode they are > > in, so we don't break anything and the user has to explicitly change it, > > knowing that they are breaking compatibility with pre-netns support.\ > > Lacking a clear use-case for vsock_init_ns_mode I tend to think it would > be better to postpone its introduction. It should be easier to add it > later than vice-versa. > > If there is a clear/well defined/known use-case, I guess the series can > go as-is. > > /P > Our use case also does not need the ability to set the init ns mode, so I'll revert this bit. Thanks, Bobby