Nick Andrew wrote: > Rewrite the help descriptions for clarity, accuracy and consistency. > > Kernel config options affected: > > - NAMESPACES > - UTS_NS > - IPC_NS > - USER_NS > - PID_NS > > Signed-off-by: Nick Andrew <[EMAIL PROTECTED]>
Acked-by: Pavel Emelyanov <[EMAIL PROTECTED]> but I also expect the patch for NET_NS soon :) > --- > Try #3. > > --- a/init/Kconfig 2008-02-20 09:34:48.000000000 +1100 > +++ b/init/Kconfig 2008-02-22 09:01:09.000000000 +1100 > @@ -414,31 +414,71 @@ config NAMESPACES > bool "Namespaces support" if EMBEDDED > default !EMBEDDED > help > - Provides the way to make tasks work with different objects using > - the same id. For example same IPC id may refer to different objects > - or same user id or pid may refer to different tasks when used in > - different namespaces. > + Select various namespace options. > + > + Namespaces allow different kernel objects (such as processes > + or sockets) to have the same ID in different namespaces. > + Identifiers like process IDs, which historically were globally > + unique, will now be unique only within each PID namespace. > + Each task can refer only to PIDs within the same namespace > + as the task itself. > + > + Namespaces are used by container systems (i.e. vservers) > + to provide isolation between the containers. > + > + This option does not affect any kernel code directly; it merely > + allows you to select namespace options below. > + > + Answer Y if you will be using a container system, and you > + will probably want to enable all the namespace options > + below. > > config UTS_NS > bool "UTS namespace" > depends on NAMESPACES > help > - In this namespace tasks see different info provided with the > - uname() system call > + Enable support for multiple UTS system attributes. > + > + Each UTS namespace provides an individual view of the > + information returned by the uname() system call including > + hostname, kernel version and domain name. > + > + This is used by container systems (e.g. vservers) so that > + each container has its own hostname and other attributes. > + Tasks in the container are placed in the UTS namespace > + corresponding to the container. > + > + Answer Y if you will be using a container system. > > config IPC_NS > bool "IPC namespace" > depends on NAMESPACES && SYSVIPC > help > - In this namespace tasks work with IPC ids which correspond to > - different IPC objects in different namespaces > + Enable support for namespace-specific IPC IDs. > + > + IPC IDs will be unique only within each IPC namespace. > + > + This is used by container systems (e.g. vservers). > + Tasks in the container are placed in the IPC namespace > + corresponding to the container. > + > + Answer Y if you will be using a container system. > > config USER_NS > bool "User namespace (EXPERIMENTAL)" > depends on NAMESPACES && EXPERIMENTAL > help > - This allows containers, i.e. vservers, to use user namespaces > - to provide different user info for different servers. > + Enable experimental support for user namespaces. > + > + This is a function used by container-based virtualisation systems > + (e.g. vservers). User namespaces are intended to ensure that > + processes with the same uid which are in different containers are > + isolated from each other. > + > + Currently user namespaces provide separate accounting, while > + isolation must be provided using SELinux or a custom security > + module. > + > If unsure, say N. > > config PID_NS > @@ -446,12 +486,16 @@ config PID_NS > default n > depends on NAMESPACES && EXPERIMENTAL > help > - Suport process id namespaces. This allows having multiple > - process with the same pid as long as they are in different > - pid namespaces. This is a building block of containers. > + Enable experimental support for hierarchical process id namespaces. > > - Unless you want to work with an experimental feature > - say N here. > + This is a function used by container-based virtualisation > + systems (e.g. vservers). Each process will have a distinct > + Process ID in each PID namespace which the process is in. > + Processes in the container are placed in the PID namespace > + corresponding to the container, and cannot see or affect > + processes in any parent PID namespace. > + > + If unsure, say N. > > config BLK_DEV_INITRD > bool "Initial RAM filesystem and RAM disk (initramfs/initrd) support" > -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/