[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <b25312890805120408n1b396562l39a47983a38116d8@mail.gmail.com>
Date: Mon, 12 May 2008 14:08:09 +0300
From: "Rami Rosen" <roszenrami@...il.com>
To: "Andy Johnson" <johnsonzjo@...il.com>
Cc: "David Shwatrz" <dshwatrz@...il.com>, netdev@...r.kernel.org,
"YOSHIFUJI Hideaki / 吉藤英明"
<yoshfuji@...ux-ipv6.org>
Subject: Re: A question about setting the net device for multicast forwarding in IPv4 and in IPv6
Hi,
>If you will try to change it thus:
>echo "1" > /proc/sys/net/ipv4/conf/eth0/mc_forwarding
>you will get:
...
To be more accurate, the MRT_INIT option when calling
setsockopt() sets multicast forwarding on /proc/sys/net/ipv4/conf/all
but **not** on /proc/sys/net/ipv4/conf/eth0.
>User space daemons (like xorp) will set
>/proc/sys/net/ipv4/conf/all/mc_forwarding to 1
>(because they call setsockopt with MRT_INIT, which calls
>IPV4_DEVCONF_ALL(sock_net(sk), MC_FORWARDING)++;
>in ip_mroute_setsockopt(), as you mentioned
This is true; but user space daemons (like xorp) also set
/proc/sys/net/ipv4/conf/eth0/mc_forwarding to 1. (or other eth*).
And this is done also via setsockopt(); but this time it is done
**NOT**with MRT_INIT but with MRT_ADD_VIF, which calls
IPV4_DEVCONF(in_dev->cnf, MC_FORWARDING)++
in vif_add(). (net/ipv4/ipmr.c).
Regards,
Rami Rosen
On Mon, May 12, 2008 at 11:57 AM, Andy Johnson <johnsonzjo@...il.com> wrote:
> Hello, David,
>
> - I wanted to note that there is one more difference I had noted
> between IPv4 and IPv6
> regarding multicast forwarding:
>
> - In IPv4, mc_forwarding is disabled by default (the value is 0). If
> you will try to change it thus:
> echo "1" > /proc/sys/net/ipv4/conf/eth0/mc_forwarding
> you will get:
>
> /proc/sys/net/ipv4/conf/eth0/mc_forwarding: Permission denied.
>
> ls -al /proc/sys/net/ipv4/conf/eth0/mc_forwarding
> will show:
> -r--r--r-- 1 root root 0 ...
>
> But:
> chmod 666 /proc/sys/net/ipv4/conf/eth0/mc_forwarding
> gives:
>
> chmod 666 /proc/sys/net/ipv4/conf/eth0/mc_forwarding
> chmod: changing permissions of
> `/proc/sys/net/ipv4/conf/eth0/mc_forwarding': Operation not permitted
>
> User space daemons (like xorp) will set
> /proc/sys/net/ipv4/conf/all/mc_forwarding to 1
> (because they call setsockopt with MRT_INIT, which calls
>
> IPV4_DEVCONF_ALL(sock_net(sk), MC_FORWARDING)++;
> in ip_mroute_setsockopt(), as you mentioned.
>
> In IPV6, this does not happen.
>
> In IPV6, Multicast Routing is also disabled by default.
>
> **But **
>
> echo "1" > /proc/sys/net/ipv6/conf/all/mc_forwarding
> **does** work and **does not** give an error (as in IPV4).
>
> I wonder what is the reason for it ? Or maybe it should be changed to
> have the same behaviour both in IPV6 and IPV4?
>
> Regards,
> Andy
>
>
>
>
>
>
>
>
> On Tue, May 6, 2008 at 4:38 PM, David Shwatrz <dshwatrz@...il.com> wrote:
> > Hi,
> > I had noticed that in IPV4 we set the net device for multicast
> > forwarding in case
> > it is not already configured so, when the user space app calls
> > setsockopt() with MRT_INIT;
> > this is done by calling IPV4_DEVCONF_ALL(sock_net(sk), MC_FORWARDING)++;
> > in ip_mroute_setsockopt(); (net/ipv4/ipmr.c).
> >
> > On the other hand, the parallel method in IPv6 does **not** performs
> > such action, as can be seen
> > from ip6_mroute_setsockopt() in net/ipv6/ip6mr.c.
> >
> > My question is : is there any special for it to be so? (In case it
> > should be also in IPv6, I will happy to send such a patch).
> >
> > Best Regards,
> > DS
> > --
> > To unsubscribe from this list: send the line "unsubscribe netdev" in
> > the body of a message to majordomo@...r.kernel.org
> > More majordomo info at http://vger.kernel.org/majordomo-info.html
> >
> --
> To unsubscribe from this list: send the line "unsubscribe netdev" in
> the body of a message to majordomo@...r.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
>
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists