Received: by 10.223.176.46 with SMTP id f43csp3390680wra; Mon, 22 Jan 2018 13:24:38 -0800 (PST) X-Google-Smtp-Source: AH8x224Dh0V/XpzLNZmu92s+1XUlD3hoMGwvQYb52LLv9c/qQe7sBDcN781/fGV9h8AY3Zt3dX+v X-Received: by 10.107.53.83 with SMTP id c80mr463307ioa.90.1516656278113; Mon, 22 Jan 2018 13:24:38 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516656278; cv=none; d=google.com; s=arc-20160816; b=Ty+gEgOBK96QhsgEm4usTYFSrwVoQWN1zudHIFA3dE2JD/NZzlo27reHBz+KEnazwV u8tYEGv/ntB1RiBUKdrwCuUKsvc9EjTl/CUMQpTrKo2d/q/SHR1PsEaJmEsHDA6hCU/A +IHtot8+0Cs26ndgcm5FY5C58DY37E9XOAKkHgx7zPjbzDOWT+mt+jSTKp7Z6W/WJnSQ pWW+r+ufPWNscwYR0pt/78E1f6LrWTaoXYc6gLElF1cFQ53EUMAONlbArjAUsPDxoihR H/VN7sqWWjGfqJN6w5oGa0MlFol2+UMIMClmUQb0+xP4X6N3CM0Ypr1FBJsOJnxUdslu 3p8A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=QTBYZX4C4Oqg5j0/zZo5U9oUQsN7n0dbbBIg7OG6DHk=; b=TMfHXt/0yV6sed6ogK8pNvGuaogrU3gWlsDLSbqfCjQO4IQXbNLySqH9GmRI68dRz+ edtEHtj8mLSr0lh2bt1G9gvJ63hz8delHhfR9+a1E/0gzIr+mhSFx726RtDzIRI854OX stwBFAoAqKC7tCCGwHI4aj6VBIezROSMy9d9o+cU2OKjiEiRw19jsZ4jkUXFB/0iTzku IuRL4cx4yFkteZj1LkNjUTPtARN38XiiuJ+UtiEbM1UYBckD45puaUgMpMZpzks+5jqq E/FUKhlGBlPw9Yi6BrMcwe1npbwdP+TKA6MWD5vTYRarljeh6bL+T41mgGKig5dhSbS5 np6g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d191si12651150iof.199.2018.01.22.13.24.24; Mon, 22 Jan 2018 13:24:38 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751170AbeAVVYA (ORCPT + 99 others); Mon, 22 Jan 2018 16:24:00 -0500 Received: from youngberry.canonical.com ([91.189.89.112]:45230 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750973AbeAVVX6 (ORCPT ); Mon, 22 Jan 2018 16:23:58 -0500 Received: from mail-wm0-f70.google.com ([74.125.82.70]) by youngberry.canonical.com with esmtps (TLS1.0:RSA_AES_128_CBC_SHA1:16) (Exim 4.76) (envelope-from ) id 1edjZN-0005lm-IH for linux-kernel@vger.kernel.org; Mon, 22 Jan 2018 21:23:57 +0000 Received: by mail-wm0-f70.google.com with SMTP id 2so3959905wmz.0 for ; Mon, 22 Jan 2018 13:23:57 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=QTBYZX4C4Oqg5j0/zZo5U9oUQsN7n0dbbBIg7OG6DHk=; b=pHuCaEI1O3xz2uxzttQNCMtrzHepMalXMhNZ4p9xiHm2CMwxKPCCTmaT1B3s9NyWoQ G5JO2SSVuqrBATsCJRjj6D1powTWo7JdhTtBTfzocE21L/ss07ncGQhLTKtJgl0KlfYs sYo5HCVP0N+iwUsWDlIf4CkteWPtu8L0qjqXeAIFjMqjW2W4moQ5xF9Wu9ZSWLs2IFMf KcC8l49pzKTJxgLDLqPDTnj6MrgBaMmnIjAsYoUjBDw/e8PdQu/1gbYKGxiTwNBHyMVT FJPyjAbgC5Q+cuKU8IG3XSNlP8soacL36+c2NEkx+d3mHbZocKuYOxlWN3hOGcWVr7fg dKgw== X-Gm-Message-State: AKwxytc9B0S3U+3s5k6IXTJ20oZwvSZtc+quQImz1F0/lafF/ocKgwcq vDLqiQroPrc02EURDPaV1e76YYDGlNYij/STVt/4NSVngi6N7/aOzGPeNXJljW3KhOWsu0VGeN2 QdbsGrfftZ7qB1NQBdYIK/NUlIjSf6Itbkx+3zFvNOQ== X-Received: by 10.28.92.201 with SMTP id q192mr124896wmb.33.1516656237171; Mon, 22 Jan 2018 13:23:57 -0800 (PST) X-Received: by 10.28.92.201 with SMTP id q192mr124878wmb.33.1516656236966; Mon, 22 Jan 2018 13:23:56 -0800 (PST) Received: from gmail.com ([2a02:8070:8895:9700:651a:bac0:9d46:d9b2]) by smtp.gmail.com with ESMTPSA id k35sm31213624wrc.2.2018.01.22.13.23.55 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Mon, 22 Jan 2018 13:23:56 -0800 (PST) Date: Mon, 22 Jan 2018 22:23:54 +0100 From: Christian Brauner To: Jiri Benc Cc: Christian Brauner , davem@davemloft.net, dsahern@gmail.com, fw@strlen.de, daniel@iogearbox.net, lucien.xin@gmail.com, mschiffer@universe-factory.net, jakub.kicinski@netronome.com, vyasevich@gmail.com, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, stephen@networkplumber.org Subject: Re: [PATCH net-next 1/1] rtnetlink: request RTM_GETLINK by pid or fd Message-ID: <20180122212353.7n6lrruqedfhrwux@gmail.com> References: <20180118202124.21616-1-christian.brauner@ubuntu.com> <20180118202124.21616-2-christian.brauner@ubuntu.com> <20180118212914.74878b82@redhat.com> <20180118205552.jm7shzcojbumax2k@gmail.com> <20180122220046.7b65a98a@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20180122220046.7b65a98a@redhat.com> User-Agent: NeoMutt/20170609 (1.8.3) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jan 22, 2018 at 10:00:46PM +0100, Jiri Benc wrote: > On Thu, 18 Jan 2018 21:55:53 +0100, Christian Brauner wrote: > > A more concrete scenario is creating a network namespace, moving a > > device into it via RTM_SETLINK which also supports IFLA_NET_NS_{FD,PID} > > and then wanting to query the device. This would be very easy to do if > > one could reuse the IFLA_NET_NS_{FD,PID} without having to set a > > netnsid. > > Wouldn't be a better solution to have a way to request the netnsid > allocation (and return it) right away when creating the name space, > then? That is certainly a good idea and I'm happy to send a follow-up patch for that! But there's still value in being able to use IFLA_NET_NS_{FD,PID} in scenarios where the network namespace has been created by another process. In this case we don't know what its netnsid is and not even if it had been assigned one at creation time or not. In this case it would be useful to refer to the netns via a pid or fd. A more concrete and frequent example is querying a network namespace of a (sorry for the buzzword :)) container for all defined network interfaces.