Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 14 Feb 2000 10:46:19 -0500
From:      "Yevmenkin, Maksim N, CSCIO" <myevmenkin@att.com>
To:        "'freebsd-hackers@freebsd.org'" <freebsd-hackers@freebsd.org>
Cc:        "'freebsd-current@freebsd.org'" <freebsd-current@freebsd.org>
Subject:   raw socket, bpf, netgraph, etc
Message-ID:  <E598F159668DD311B9C700902799EAF4473382@njb140po01.ems.att.com>

next in thread | raw e-mail | index | archive | help
Hello All,

Is it possible to get access to link layer (AF_LINK) via raw socket?
kind of Linux SOCK_PACKET. It seems to me that it is not. (hope I wrong :)

I can access raw IP via socket(AF_INET, SOCK_RAW, IPPROTO_RAW)
and event get access to IP header with setsockopt. But not AF_LINK :(

On the other hand is bpf. but here is the small problem. i have interface
with
bpf attached to it. when i write to /dev/bpf i got the same packet back.
kind of loop. the only solution is to filter these packets. but there is no
way to find out which packet i wrote, and which is received from outside.

i was thinking about netgraph. would't it be nice to have netgraph interface
in each network driver? 

Any ideas?

Thanks,
emax


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?E598F159668DD311B9C700902799EAF4473382>