From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-yx1-f42.google.com (mail-yx1-f42.google.com [74.125.224.42]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 9025332BF21 for ; Wed, 21 Jan 2026 17:36:51 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=74.125.224.42 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1769017014; cv=none; b=hjpv/h5Vx+EVMVN7vE/2gqETDtsb/2OJ7ahPtJyBkwJPsGtsoBMyXN8x4lbSajzxuJAVoYxsgyJNPNeVSJg1kwga/PeGn1zRKIlxocoC6cxCW+NvWtG9CME/++NMKpaTqDqzuJgPVb8kHjo1PE8F3N7tyGPRdy+w1txyXE03JbU= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1769017014; c=relaxed/simple; bh=tpGlhPJQhs6K29z4KKdexPB885DZk84UD04BRE7PW+k=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=X+CnoypvD7dJKG/FpJuhF5w5EAahuo2lmYqsI2jdX9oIU36A5JWxNMZdFcH4k+xi0Iko/VsyULrleWr5hACrX04AGYASWvwhLmf/lKjWBV9REfua6+VGwByOFR/5jArTVUDDBz7Gnjyj0FEkEeTwPVJnsiJFYeSSEA9LocXkIto= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=AwOabsPQ; arc=none smtp.client-ip=74.125.224.42 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="AwOabsPQ" Received: by mail-yx1-f42.google.com with SMTP id 956f58d0204a3-64942ebf1a3so152158d50.3 for ; Wed, 21 Jan 2026 09:36:51 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1769017010; x=1769621810; darn=lists.linux.dev; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to; bh=TzQpPNktFvNOdBi7+gsCZqhpBpuEURHyo6CUuqA6z7E=; b=AwOabsPQ4Dj/j8sYPrYGxEb5wJYf/xc9W3pjuV+3MeX94D8+rKjsxvERHta5JiZFoF JUvlzZRktLzH1lZ2vwXzI7gsYqu5tAuR+/xtMV/fqs1cXSrAVy2iP81+CZY3E7au7aAQ jUpKNQGUT/SgODCSuknhBqQcVRz/SQJ3N3aZuS3Q9N+7FnK5P1lJZoOin3NzOMXHMxWm +alxXHuoTjv5rzdSmDh1wdY0mn9IVpyY4Ly1gTHlWuKa7tzukDjU5K3x0BTmWceRD88L cUPtTMuyvby9pahwrQaytmLpQvjOhVgZMBXR8AeSGisUne1P3ptOULTd3L2QXI+cSAu6 /y4w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769017010; x=1769621810; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-gg:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=TzQpPNktFvNOdBi7+gsCZqhpBpuEURHyo6CUuqA6z7E=; b=NaIxEO9RAw1+n4FAv2uVu+zgCvGCiMJ0FatMQiiHGpWeCb1SSl8KY1Vqi2UhCmVFLF gcB4zAJtmZzlHc4ro9scVmoNNcbWnjuQkJhvu3vc1vokLbl0q9RFRzz8QDAGVFikX4QN ld6NpQiluh5LZ3DID4nVS2FbhvlOCU3XPejCw7pxrmb7gI9cOEMv1NQxmn8/sNJNXwY5 zv6uJnKBCAAhpTtNoLZeh1EGHTX5/14IzfwIzyZBQReLXIkm5qzQaf355eYF/OCDxqDd kx3WZjwJ9EG3XZnkgyFD2Bbja+mun+nRLJiQOfsyDfcqt4/UFA3H7y/BQP+jQp+66+0L kmHw== X-Forwarded-Encrypted: i=1; AJvYcCWwxL506IUIfqq1kj9vmZMcxATUHuoDC3uTU1zIIbOw2ryeCHuUKkQ2d0MprzQufGabgzah1fHCSm7Zlur0eQ==@lists.linux.dev X-Gm-Message-State: AOJu0Yyq0jSh4+R9A+x/JQRFEkfCfOk5yOOkoD1Dhb9Wl+SARbuSTSgO w/BiG2PV6fbe+QQfRy3iCf9jEghAWhdqpRsu+Axzi0TJE/cnz+UzONQy X-Gm-Gg: AZuq6aLGNrATO7xofdh9Cxb9FthXFdazqyjN+bFBncanvNAK/ZwkJAPBtMLe9daoCrR AK4q4H8ns2v/CcVJv8pJeeqKPBiBW/6gtYkyP/GmHZj/xaDE6IRL8smv51bDLVi2lgjU3hyVZ8i xsPII7IlM0tR2jCpi5kn7E8fuLYiCHN74Fcf9z8Nlv9V0KHpNoTc5vrrYkbtI65ocfUCRCfjMRS TbeF8NveueHQkftQt4Vf+0QnSAlx5QfXJW0bZdqRuwL3KzMN2KFv6MkcUoKrgDKrgqD51YF+lvp vyNEq0zFmDSNQkldIqyGNys/hzfDRO6Lgqp4xrdPFZChgsYuYdhXT00gq/YaYV8E8Qm4yPGtR01 JCDLxKrE2rzm1VoMXKnd7yAYH7RbZoXTnJ7iowM3bnx+dXSfXJFQb6nP6v/MP2/NnM2J02Y48MC uKNDXxJS+ZK9beRT1eiqJOrllTZcmoMbNXbJJXIGn1EwHd X-Received: by 2002:a05:690e:1c1c:b0:644:60d9:864d with SMTP id 956f58d0204a3-6493c872baemr4135180d50.92.1769017010185; Wed, 21 Jan 2026 09:36:50 -0800 (PST) Received: from devvm11784.nha0.facebook.com ([2a03:2880:25ff:d::]) by smtp.gmail.com with ESMTPSA id 956f58d0204a3-649170adf11sm8096311d50.16.2026.01.21.09.36.49 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 21 Jan 2026 09:36:49 -0800 (PST) Date: Wed, 21 Jan 2026 09:36:48 -0800 From: Bobby Eshleman To: Paolo Abeni Cc: Stefano Garzarella , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Simon Horman , Stefan Hajnoczi , "Michael S. Tsirkin" , Jason Wang , Eugenio =?iso-8859-1?Q?P=E9rez?= , Xuan Zhuo , "K. Y. Srinivasan" , Haiyang Zhang , Wei Liu , Dexuan Cui , Bryan Tan , Vishnu Dasa , Broadcom internal kernel review list , Shuah Khan , Long Li , Jonathan Corbet , linux-kernel@vger.kernel.org, virtualization@lists.linux.dev, netdev@vger.kernel.org, kvm@vger.kernel.org, linux-hyperv@vger.kernel.org, linux-kselftest@vger.kernel.org, berrange@redhat.com, Sargun Dhillon , linux-doc@vger.kernel.org, Bobby Eshleman Subject: Re: [PATCH net-next v15 01/12] vsock: add netns to vsock core Message-ID: References: <20260116-vsock-vmtest-v15-0-bbfd1a668548@meta.com> <20260116-vsock-vmtest-v15-1-bbfd1a668548@meta.com> <4997118e-471c-45fe-bc1f-8f6140199db5@redhat.com> Precedence: bulk X-Mailing-List: virtualization@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <4997118e-471c-45fe-bc1f-8f6140199db5@redhat.com> On Wed, Jan 21, 2026 at 05:32:34PM +0100, Paolo Abeni wrote: > On 1/21/26 3:48 PM, Stefano Garzarella wrote: > >> diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt > >> index a8d0afde7f85..b6e3bfe365a1 100644 > >> --- a/Documentation/admin-guide/kernel-parameters.txt > >> +++ b/Documentation/admin-guide/kernel-parameters.txt > >> @@ -8253,6 +8253,20 @@ Kernel parameters > >> them quite hard to use for exploits but > >> might break your system. > >> > >> + vsock_init_ns_mode= > >> + [KNL,NET] Set the vsock namespace mode for the init > >> + (root) network namespace. > >> + > >> + global [default] The init namespace operates in > >> + global mode where CIDs are system-wide and > >> + sockets can communicate across global > >> + namespaces. > >> + > >> + local The init namespace operates in local mode > >> + where CIDs are private to the namespace and > >> + sockets can only communicate within the same > >> + namespace. > >> + > > > > My comment on v14 was more to start a discussion :-) sorry to not be > > clear. > > > > I briefly discussed it with Paolo in chat to better understand our > > policy between cmdline parameters and module parameters, and it seems > > that both are discouraged. > > Double checking the git log it looks like __setup() usage is less > constrained/restricted than what I thought. > > > So he asked me if we have a use case for this, and thinking about it, I > > don't have one at the moment. Also, if a user decides to set all netns > > to local, whether init_net is local or global doesn't really matter, > > right? > > > > So perhaps before adding this, we should have a real use case. > > Perhaps more than this feature, I would add a way to change the default > > of all netns (including init_net) from global to local. But we can do > > that later, since all netns have a way to understand what mode they are > > in, so we don't break anything and the user has to explicitly change it, > > knowing that they are breaking compatibility with pre-netns support.\ > > Lacking a clear use-case for vsock_init_ns_mode I tend to think it would > be better to postpone its introduction. It should be easier to add it > later than vice-versa. > > If there is a clear/well defined/known use-case, I guess the series can > go as-is. > > /P > Our use case also does not need the ability to set the init ns mode, so I'll revert this bit. Thanks, Bobby