Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751363AbbBKGcm (ORCPT ); Wed, 11 Feb 2015 01:32:42 -0500 Received: from out01.mta.xmission.com ([166.70.13.231]:36348 "EHLO out01.mta.xmission.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750723AbbBKGck (ORCPT ); Wed, 11 Feb 2015 01:32:40 -0500 From: ebiederm@xmission.com (Eric W. Biederman) To: Tejun Heo Cc: "Serge E. Hallyn" , Richard Weinberger , Linux API , Linux Containers , Serge Hallyn , "linux-kernel\@vger.kernel.org" , Andy Lutomirski , cgroups mailinglist , Ingo Molnar References: <20150107224430.GA28414@htj.dyndns.org> <878uhe42km.fsf@x220.int.ebiederm.org> <20150107230615.GA28630@htj.dyndns.org> <87fvbm2nni.fsf@x220.int.ebiederm.org> <87y4peyxw5.fsf@x220.int.ebiederm.org> <20150107233553.GC28630@htj.dyndns.org> <20150211034616.GA25022@mail.hallyn.com> <20150211040957.GC21356@htj.duckdns.org> <20150211042942.GA27931@mail.hallyn.com> <87oap1qbv3.fsf@x220.int.ebiederm.org> <20150211051704.GB24897@mtj.duckdns.org> Date: Wed, 11 Feb 2015 00:29:20 -0600 In-Reply-To: <20150211051704.GB24897@mtj.duckdns.org> (Tejun Heo's message of "Wed, 11 Feb 2015 00:17:04 -0500") Message-ID: <87twytklkv.fsf@x220.int.ebiederm.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/24.3 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-XM-AID: U2FsdGVkX18yR8ip2qCv5hWVCe+XHN9uZqpChxyYs3Y= X-SA-Exim-Connect-IP: 70.59.163.10 X-SA-Exim-Mail-From: ebiederm@xmission.com X-Spam-Report: * -1.0 ALL_TRUSTED Passed through trusted hosts only via SMTP * 0.0 TVD_RCVD_IP Message was received from an IP address * 0.7 XMSubLong Long Subject * 0.0 T_TM2_M_HEADER_IN_MSG BODY: No description available. * 2.5 XMGppyBdWords BODY: Gappy or l33t words * 0.8 BAYES_50 BODY: Bayes spam probability is 40 to 60% * [score: 0.5000] * -0.0 DCC_CHECK_NEGATIVE Not listed in DCC * [sa05 1397; Body=1 Fuz1=1 Fuz2=1] * 0.5 XM_Body_Dirty_Words Contains a dirty word X-Spam-DCC: XMission; sa05 1397; Body=1 Fuz1=1 Fuz2=1 X-Spam-Combo: ***;Tejun Heo X-Spam-Relay-Country: X-Spam-Timing: total 339 ms - load_scoreonly_sql: 0.08 (0.0%), signal_user_changed: 6 (1.9%), b_tie_ro: 3.7 (1.1%), parse: 2.3 (0.7%), extract_message_metadata: 5 (1.5%), get_uri_detail_list: 1.98 (0.6%), tests_pri_-1000: 4.7 (1.4%), tests_pri_-950: 1.49 (0.4%), tests_pri_-900: 1.15 (0.3%), tests_pri_-400: 25 (7.5%), check_bayes: 24 (7.1%), b_tokenize: 7 (2.0%), b_tok_get_all: 8 (2.4%), b_comp_prob: 3.0 (0.9%), b_tok_touch_all: 3.0 (0.9%), b_finish: 0.91 (0.3%), tests_pri_0: 273 (80.4%), tests_pri_500: 7 (2.0%), rewrite_mail: 0.00 (0.0%) Subject: Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces X-Spam-Flag: No X-SA-Exim-Version: 4.2.1 (built Wed, 24 Sep 2014 11:00:52 -0600) X-SA-Exim-Scanned: Yes (on in01.mta.xmission.com) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2436 Lines: 56 Tejun Heo writes: > Hey, > > On Tue, Feb 10, 2015 at 11:02:40PM -0600, Eric W. Biederman wrote: >> A slightly off topic comment, for where this thread has gone but >> relevant if we are talking about cgroup namespaces. >> >> If don't implement compatibility with existing userspace, they get a >> nack. A backwards-incompatible change should figure out how to remove >> the need for any namespaces. >> >> Because that is what namespaces are about backwards compatibility. > > Are you claiming that namespaces are soley about backwards > compatibility? ie. to trick userland into scoping without letting it > notice? That's a very restricted view and namespaces do provide > further isolation capabilties in addition to what can be achieved > otherwise and it is logical to collect simliar funtionalities there. In principle a namespace is an additional layer of indirection from names to objects. A namespace does not invent new kinds of objects. A namespace takes things that were previously global and gives them a scope. In princple after name resolution a namespace should impose no overhead. In general namespaces are not necessary if your scope of names already has hierarchy. Which means that new interfaces can almost always be designed in such a way that you can support containers without needing to add any special namespace support. Which typically results in more flexible and useful APIs for everyone, with no real code cost. Further in the cgroup namespace patchset I looked at a while ago, the only reason for having a cgroup namespace was to provide a measure of backwards compatibility with existing userspace. I expect removing the /proc//cgroup file and replacing it with something in cgroupfs itself would serve just as well if backwards compatibility is not the objective. Or possibly replacincg /proc//cgroup into a magic symlink onto somewhere in the unified cgroupfs itself. I just don't see any point in doing weird silly namespace things to keep existing userspace working when the existing userspace won't work. As such if a namespace doesn't implement compatibility with the existing userspace it gets my nack. Eric -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/