Is this supposed to work? Or is it a just something linux
doesn't implement?


Date: Wed, 1 Feb 2006 12:48:03 -0800
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [Bug 5990] New: call to socket(AF_INET, SOCK_RAW, IPPROTO_IP);


http://bugzilla.kernel.org/show_bug.cgi?id=5990

           Summary: call to socket(AF_INET, SOCK_RAW, IPPROTO_IP);
    Kernel Version: 2.4 and 2.6
            Status: NEW
          Severity: high
             Owner: [EMAIL PROTECTED]
         Submitter: [EMAIL PROTECTED]


Most recent kernel where this bug did not occur:
Distribution:
Hardware Environment:
Software Environment:
Problem Description:
When I call the socket function with the following parameters, AF_INET,
SOCK_RAW, IPPROTO_IP the stack return -1. It's seem that the function
inet_create() doesn't support the creation of a socket to receive on the
protocol 0. 

Steps to reproduce:
sock = socket(AF_INET, SOCK_RAW, IPPROTO_IP);

------- Additional Comments From [EMAIL PROTECTED]  2006-02-01 14:49 -------
Normally in BSD interface all protocol are permit. The reason why I need this 
specific protocol number is to interface with an Ethernet Testset from Sunrise 
Telecom. They put their messaging with this specific protocol ID. I don't use 
PF_PACKET socket to avoid packet flooding from other protocol. 
 
Here is a dump of the packet: 
 
Frame 4 (60 bytes on wire, 60 bytes captured) 
    Arrival Time: Feb  1, 2006 16:11:31.402582000 
    Time delta from previous packet: 0.001567000 seconds 
    Time since reference or first frame: 1.000974000 seconds 
    Frame Number: 4 
    Packet Length: 60 bytes 
    Capture Length: 60 bytes 
Ethernet II, Src: 00:d0:dd:0e:29:e6, Dst: 00:90:27:1c:92:3e 
    Destination: 00:90:27:1c:92:3e (100.100.100.2) 
    Source: 00:d0:dd:0e:29:e6 (100.100.100.1) 
    Type: IP (0x0800) 
Internet Protocol, Src Addr: 100.100.100.1 (100.100.100.1), Dst Addr: 
100.100.100.2 (100.100.100.2) 
    Version: 4 
    Header length: 20 bytes 
    Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00) 
        0000 00.. = Differentiated Services Codepoint: Default (0x00) 
        .... ..0. = ECN-Capable Transport (ECT): 0 
        .... ...0 = ECN-CE: 0 
    Total Length: 46 
    Identification: 0x0000 (0) 
    Flags: 0x04 
        0... = Reserved bit: Not set 
        .1.. = Don't fragment: Set 
        ..0. = More fragments: Not set 
    Fragment offset: 0 
    Time to live: 255 
    Protocol: IPv6 hop-by-hop option (0x00) 
    Header checksum: 0xeb03 (correct) 
    Source: 100.100.100.1 (100.100.100.1) 
    Destination: 100.100.100.2 (100.100.100.2) 
Data (26 bytes) 
 
0000  00 90 27 1c 92 3e 00 d0 dd 0e 29 e6 08 00 45 00   ..'..>....)...E. 
0010  00 2e 00 00 40 00 ff 00 eb 03 64 64 64 01 64 64   [EMAIL PROTECTED] 
0020  64 02 00 00 00 02 aa 55 f3 01 62 a6 53 52 54 49   d......U..b.SRTI 
0030  20 4c 4f 4f 50 20 46 52 41 4d ae 62                LOOP FRAM.b 

-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to