Netdev List
 help / color / mirror / Atom feed
* Using VRF to limit 'ip monitor' and 'iw event' messages
@ 2026-05-18 21:51 Ben Greear
  2026-05-19  2:59 ` David Ahern
  0 siblings, 1 reply; 5+ messages in thread
From: Ben Greear @ 2026-05-18 21:51 UTC (permalink / raw)
  To: David Ahern; +Cc: John-Paul Powers, netdev

Hello David,

We are interested in filtering out iw and ip netlink events for processes bound
to VRFs.

For instance, Chromium starts spewing errors when we try to run it on a system with many
network interfaces, we guess because it is being confused by all of the other network devices
going up and down.

I think the crux of the problem is to know if a netlink listener socket is bound
to a VRF or not, and also to know if the generator of the message is bound to
a particular VRF.

Do you have any suggestions for how we might go about this?  We'll be happy to post
the resulting patches for consideration to be included upstream.

Thanks,
Ben

-- 
Ben Greear <greearb@candelatech.com>
Candela Technologies Inc  http://www.candelatech.com


^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2026-05-20 21:48 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2026-05-18 21:51 Using VRF to limit 'ip monitor' and 'iw event' messages Ben Greear
2026-05-19  2:59 ` David Ahern
2026-05-19 14:04   ` Ben Greear
2026-05-20  0:15     ` David Ahern
2026-05-20 21:47       ` Ben Greear

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox