Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp43011ybv; Tue, 18 Feb 2020 17:20:17 -0800 (PST) X-Google-Smtp-Source: APXvYqyojgYTIk0yk77UlD1na/G4kXFl4xxsGoVSAWtwrNmNSR7IZNYKCMjNp4v+4rr7uKf31N/4 X-Received: by 2002:a9d:6415:: with SMTP id h21mr18708406otl.152.1582075217442; Tue, 18 Feb 2020 17:20:17 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582075217; cv=none; d=google.com; s=arc-20160816; b=wdAB4OiED/UFaBa9r5mgR57X6PPrAVtVm7q/2JkA6z8yWVJmLI+nrWJ0iU0ap0Ocrk ziD05oWS8QUBnjtuC3D6TFYm1s3Kd7M8YZHHgHOCgi3ckicN/dIz2fwltlvVf7cug1CF Aab7GXVRPcIE83DyjLEMfMxpZ3ogdCZ2Yw/2/elHVfKqqHB84dIBhvcSNf549vnHigZt 4Tpq6J5B6rstWLm5C+oxMjunHhwBHOLYMjw9HnhcjTpkGmOvwCcXczhVCAMuOLfmMfTX iVHnugojp468L8XlYZoMaCuGXQ9xMAAP1XWNrHH6xUFV4esjAQUAFMqju8xXQ7Ocps7B Gdww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:message-id:date :mime-version:subject:references:in-reply-to:cc:to:envelope-from :from:dkim-signature; bh=dhzg+9rEG0nYcIh4AOwylZPaZZyNGN2eZQsA5FMtWoE=; b=R4e6CJyBDEDTuGrZ8z2De4qAOPPzjz9DurZWGOaqt834iz29Ai2muNkZ5mjSYHntb1 G3Iqhj0PyeMTzO87FxuRodqK87lJbEDn9CLCcVMrCEMxx/nVvTSBSXJpE5KRy//9ERJR txhH6T0DtCIj/mKyYYA/i2gPNvZeekM7leJ9E/ICwdNUyX0gkfXqXboQJcA+T4H62abA hMIJtwWxDFja39MVvYh9j248hU0sep59gLzlQx35GfkOVh9dfptWJqEPsNxbBDP++eH3 /NuDu3IF740rwfnMWPvLKVTLlRdjPemg/JVJUk8NDC0xa47O6LAMpb8MrJjRRh5Il2ZB lNTw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@yandex.ru header.s=mail header.b=si75TmNC; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v5si8391905oix.197.2020.02.18.17.20.04; Tue, 18 Feb 2020 17:20:17 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@yandex.ru header.s=mail header.b=si75TmNC; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727939AbgBSBTn (ORCPT + 99 others); Tue, 18 Feb 2020 20:19:43 -0500 Received: from forward500o.mail.yandex.net ([37.140.190.195]:43267 "EHLO forward500o.mail.yandex.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726939AbgBSBTm (ORCPT ); Tue, 18 Feb 2020 20:19:42 -0500 Received: from mxback1j.mail.yandex.net (mxback1j.mail.yandex.net [IPv6:2a02:6b8:0:1619::10a]) by forward500o.mail.yandex.net (Yandex) with ESMTP id 140CD60197; Wed, 19 Feb 2020 04:19:37 +0300 (MSK) Received: from localhost (localhost [::1]) by mxback1j.mail.yandex.net (mxback/Yandex) with ESMTP id YL0iA9Gz0m-JaSGc8gP; Wed, 19 Feb 2020 04:19:36 +0300 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yandex.ru; s=mail; t=1582075176; bh=dhzg+9rEG0nYcIh4AOwylZPaZZyNGN2eZQsA5FMtWoE=; h=Message-Id:Cc:Subject:In-Reply-To:Date:References:To:From; b=si75TmNCnigp1gijVvAyW6PptfGedGlHvhQvaznvclILqwVmsEXMjhsvM8pOngavb Awj/YjLvQWi/LfWq1YiF/eSwIPvCjX62UR+pjVc7UqIixpYJCGoPfgNbc5M/RU/MFQ cFJqE+n49y9mC7oNMfz74gz5sg5jpfPbDHN2AUX4= Authentication-Results: mxback1j.mail.yandex.net; dkim=pass header.i=@yandex.ru Received: by myt2-508c8f44300a.qloud-c.yandex.net with HTTP; Wed, 19 Feb 2020 04:19:36 +0300 From: Evgeniy Polyakov Envelope-From: drustafa@yandex.ru To: "Daniel Walker (danielwa)" , David Miller Cc: "netdev@vger.kernel.org" , "linux-kernel@vger.kernel.org" In-Reply-To: <20200218205441.GA24043@zorba> References: <20200217175209.GM24152@zorba> <20200217.185235.495219494110132658.davem@davemloft.net> <20200218163030.GR24152@zorba> <20200218.123546.666027846950664712.davem@davemloft.net> <20200218205441.GA24043@zorba> Subject: Re: [PATCH] drivers: connector: cn_proc: allow limiting certain messages MIME-Version: 1.0 X-Mailer: Yamail [ http://yandex.ru ] 5.0 Date: Wed, 19 Feb 2020 04:19:36 +0300 Message-Id: <17008791582075176@myt2-508c8f44300a.qloud-c.yandex.net> Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset=utf-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 18.02.2020, 23:55, "Daniel Walker (danielwa)" : >>  > I think I would agree with you if this was unicast, and each listener could tailor >>  > what messages they want to get. However, this interface isn't that, and it would >>  > be considerable work to convert to that. >> >>  You filter at recvmsg() on the specific socket, multicast or not, I >>  don't understand what the issue is. > > Cisco tried something like this (I don't know if it was exactly what your referring to), > and it was messy and fairly complicated for a simple interface. In fact it was > the first thing I suggested for Cisco. > > I'm not sure why Connector has to supply an exact set of messages, one could > just make a whole new kernel module hooked into netlink sending a different > subset of connector messages. The interface eats up CPU and slows the > system if it's sending messages your just going to ignore. I'm sure the > filtering would also slows down the system. Connector has unicast interface and multicast-like 'subscription', but sending system-wide messages implies using broadcast interface, since you can not hold per-user/per-socket information about particular event mask, instead you have channels in connector each one could have been used for specific message type, but it looks overkill for simple process mask changes. And in fact, now I do not understand your point. I thought you have been concerned about receiving too many messages from particular connector module because there are, for example, too many 'fork/signal' events. And now you want to limit them to 'fork' events only. Even if there could be other users who wanted to receive 'signal' and other events. And you blame connector - basically a network media, call it TCP if you like - for not filtering this for you? And after you have been told to use connector channels - let's call them TCP ports - which requires quite a bit of work - you do not want to do this (also, this will break backward compatibility for everyone else including (!) Cisco (!!)). I'm a little bit lost here. As a side and more practical way - do we want to have a global switch for particular process state changes broadcasting?