Re: socket(AF_PACKET,SOCK_RAW) and ioctl(IFF_PROMISC&IFF_MULTICAST) (help)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I am trying to understand the relationship of the netdevice ioctl()
commands and raw packet sockets.

Does "Promiscuous" do anything when reading from a raw packet
socket?
When I monitor for unique MAC addresses, I do not see any difference.

Does "Multicast" do anything when reading from a raw packet socket?

If I have not joined a multicast group, why am I getting the packets?

My original understanding was that the network traffic received by a
NIC would be filtered at the link level based on a source/Dest MAC
match and any registered link layer multicast address. UNLESS, the
interface is put into promiscuous mode. This is obviously not
the case.

The goal:
I have a video player on a network which has many multicast streams.
The video player needs to monitor the network traffic for multicast
packets with custom MAC destinations BUT I do not want to see all
network multicast traffic due to CPU load considerations.

If raw packets are not filtered at the link level, how can
this be done?

Thanks,
Allen
--
To unsubscribe from this list: send the line "unsubscribe
linux-net" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


For what its worth, most modern ethernet MAC hardware has some sort of
capability to do filtering of received multicast packets. Usually
there's a table of bits in the hardware someplace that you can set via
software. When the hardware receives a multicast packet, it does a hash on the destination MAC address and generates from that an index into the table of bits. If the indexed bit is set, the packet gets DMA'ed into a
receive descriptor so that the software can see it, otherwise it gets
dropped and is invisible to software.

The software has to further qualify that the destination MAC address is
one of the one's its interested in since there is going to be a
many-to-one mapping between MAC addresses and the indexes they hash to, but doing this you can exclude the singlecast and most of the multicast
traffic that you aren't interested in in the hardware and not consume
CPU cycles doing so. That is likely going to be a better solution than
putting the interface into promiscuous mode where the hardware will
attempt to do a DMA receive operation on every packet that goes by on
the wire.

Jeff Haran

Hello Jeff,

I guess my original message was not clear. I have NOT enabled promiscuous mode and I an getting all of the packets. Further if neither promiscuous or multicast is enabled, I still get multicast packets. Is this correct? When you are using a PACKET, SOCK_RAW the packets are delivered prior to the firewall or netfiltering. However I thought there was filtering at the hardware level which I am not seeing.

Is my original understanding of operation correct or is the implementation? When are the various ioctl flags mentioned needed? Are they only needed for SOCK_DGRAM?

TIA

--
To unsubscribe from this list: send the line "unsubscribe linux-net" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Netdev]     [Ethernet Bridging]     [Linux 802.1Q VLAN]     [Linux Wireless]     [Kernel Newbies]     [Security]     [Linux for Hams]     [Netfilter]     [Git]     [Bugtraq]     [Yosemite News and Information]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux PCI]     [Linux Admin]     [Samba]

  Powered by Linux