Is this supposed to work? Or is it a just something linux doesn't implement?
Date: Wed, 1 Feb 2006 12:48:03 -0800 From: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: [Bug 5990] New: call to socket(AF_INET, SOCK_RAW, IPPROTO_IP); http://bugzilla.kernel.org/show_bug.cgi?id=5990 Summary: call to socket(AF_INET, SOCK_RAW, IPPROTO_IP); Kernel Version: 2.4 and 2.6 Status: NEW Severity: high Owner: [EMAIL PROTECTED] Submitter: [EMAIL PROTECTED] Most recent kernel where this bug did not occur: Distribution: Hardware Environment: Software Environment: Problem Description: When I call the socket function with the following parameters, AF_INET, SOCK_RAW, IPPROTO_IP the stack return -1. It's seem that the function inet_create() doesn't support the creation of a socket to receive on the protocol 0. Steps to reproduce: sock = socket(AF_INET, SOCK_RAW, IPPROTO_IP); ------- Additional Comments From [EMAIL PROTECTED] 2006-02-01 14:49 ------- Normally in BSD interface all protocol are permit. The reason why I need this specific protocol number is to interface with an Ethernet Testset from Sunrise Telecom. They put their messaging with this specific protocol ID. I don't use PF_PACKET socket to avoid packet flooding from other protocol. Here is a dump of the packet: Frame 4 (60 bytes on wire, 60 bytes captured) Arrival Time: Feb 1, 2006 16:11:31.402582000 Time delta from previous packet: 0.001567000 seconds Time since reference or first frame: 1.000974000 seconds Frame Number: 4 Packet Length: 60 bytes Capture Length: 60 bytes Ethernet II, Src: 00:d0:dd:0e:29:e6, Dst: 00:90:27:1c:92:3e Destination: 00:90:27:1c:92:3e (100.100.100.2) Source: 00:d0:dd:0e:29:e6 (100.100.100.1) Type: IP (0x0800) Internet Protocol, Src Addr: 100.100.100.1 (100.100.100.1), Dst Addr: 100.100.100.2 (100.100.100.2) Version: 4 Header length: 20 bytes Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00) 0000 00.. = Differentiated Services Codepoint: Default (0x00) .... ..0. = ECN-Capable Transport (ECT): 0 .... ...0 = ECN-CE: 0 Total Length: 46 Identification: 0x0000 (0) Flags: 0x04 0... = Reserved bit: Not set .1.. = Don't fragment: Set ..0. = More fragments: Not set Fragment offset: 0 Time to live: 255 Protocol: IPv6 hop-by-hop option (0x00) Header checksum: 0xeb03 (correct) Source: 100.100.100.1 (100.100.100.1) Destination: 100.100.100.2 (100.100.100.2) Data (26 bytes) 0000 00 90 27 1c 92 3e 00 d0 dd 0e 29 e6 08 00 45 00 ..'..>....)...E. 0010 00 2e 00 00 40 00 ff 00 eb 03 64 64 64 01 64 64 [EMAIL PROTECTED] 0020 64 02 00 00 00 02 aa 55 f3 01 62 a6 53 52 54 49 d......U..b.SRTI 0030 20 4c 4f 4f 50 20 46 52 41 4d ae 62 LOOP FRAM.b - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html
