Date: Mon, 14 Feb 2000 10:46:19 -0500 From: "Yevmenkin, Maksim N, CSCIO" <myevmenkin@att.com> To: "'freebsd-hackers@freebsd.org'" <freebsd-hackers@freebsd.org> Cc: "'freebsd-current@freebsd.org'" <freebsd-current@freebsd.org> Subject: raw socket, bpf, netgraph, etc Message-ID: <E598F159668DD311B9C700902799EAF4473382@njb140po01.ems.att.com>
next in thread | raw e-mail | index | archive | help
Hello All, Is it possible to get access to link layer (AF_LINK) via raw socket? kind of Linux SOCK_PACKET. It seems to me that it is not. (hope I wrong :) I can access raw IP via socket(AF_INET, SOCK_RAW, IPPROTO_RAW) and event get access to IP header with setsockopt. But not AF_LINK :( On the other hand is bpf. but here is the small problem. i have interface with bpf attached to it. when i write to /dev/bpf i got the same packet back. kind of loop. the only solution is to filter these packets. but there is no way to find out which packet i wrote, and which is received from outside. i was thinking about netgraph. would't it be nice to have netgraph interface in each network driver? Any ideas? Thanks, emax To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?E598F159668DD311B9C700902799EAF4473382>