Home
Main website
Display Sidebar
Hide Ads
Recent Changes
View Source:
packet(7)
Edit
PageHistory
Diff
Info
LikePages
!!NAME packet, PF_PACKET - packet interface on device level. !!SYNOPSIS #include <sys/socket.h> #include <features.h> /* for the glibc version number */ #if __GLIBC__ >= 2 && __GLIBC_MINOR >= 1 # include <netpacket/packet.h> # include <net/ethernet.h> /* the L2 protocols */ #else # include <asm/types.h> # include <linux/if_packet.h> # include <linux/if_ether.h> /* The L2 protocols */ #endif packet_socket = socket(PF_PACKET, int socket_type, int protocol); !!DESCRIPTION Packet sockets are used to receive or send raw packets at the device driver (OSI Layer 2) level. They allow the user to implement protocol modules in user space on top of the physical layer. The ''socket_type'' is either __SOCK_RAW__ for raw packets including the link level header or __SOCK_DGRAM__ for cooked packets with the link level header removed. The link level header information is available in a common format in a __sockaddr_ll__. ''protocol'' is the IEEE 802.3 protocol number in network order. See the __<linux/if_ether.h>__ include file for a list of allowed protocols. When protocol is set to __htons(ETH_P_ALL)__ then all protocols are received. All incoming packets of that protocol type will be passed to the packet socket before they are passed to the protocols implemented in the kernel. Only processes with effective uid 0 or the __CAP_NET_RAW__ capability may open packet sockets. __SOCK_RAW__ packets are passed to and from the device driver without any changes in the packet data. When receiving a packet, the address is still parsed and passed in a standard __sockaddr_ll__ address structure. When transmitting a packet, the user supplied buffer should contain the physical layer header. That packet is then queued unmodified to the network driver of the interface defined by the destination address. Some device drivers always add other headers. __SOCK_RAW__ is similar to but not compatible with the obsolete __SOCK_PACKET__ of Linux 2.0. __SOCK_DGRAM__ operates on a slightly higher level. The physical header is removed before the packet is passed to the user. Packets sent through a __SOCK_DGRAM__ packet socket get a suitable physical layer header based on the information in the __sockaddr_ll__ destination address before they are queued. By default all packets of the specified protocol type are passed to a packet socket. To only get packets from a specific interface use bind(2) specifying an address in a __struct sockaddr_ll__ to bind the packet socket to an interface. Only the __sll_protocol__ and the __sll_ifindex__ address fields are used for purposes of binding. The connect(2) operation is not supported on packet sockets. When the __MSG_TRUNC__ flag is passed to recvmsg(2), recv(2), recvfrom(2) the real length of the packet on the wire is always returned, even when it is longer than the buffer. !!ADDRESS TYPES The sockaddr_ll is a device independent physical layer address. struct sockaddr_ll { unsigned short sll_family; /* Always AF_PACKET */ unsigned short sll_protocol; /* Physical layer protocol */ int sll_ifindex; /* Interface number */ unsigned short sll_hatype; /* Header type */ unsigned char sll_pkttype; /* Packet type */ unsigned char sll_halen; /* Length of address */ unsigned char sll_addr[[8]; /* Physical layer address */ }; __sll_protocol__ is the standard ethernet protocol type in network order as defined in the __linux/if_ether.h__ include file. It defaults to the socket's protocol. __sll_ifindex__ is the interface index of the interface (see netdevice(2)); 0 matches any interface (only legal for binding). __sll_hatype__ is a ARP type as defined in the __linux/if_arp.h__ include file. __sll_pkttype__ contains the packet type. Valid types are __PACKET_HOST__ for a packet addressed to the local host, __PACKET_BROADCAST__ for a physical layer broadcast packet, __PACKET_MULTICAST__ for a packet sent to a physical layer multicast address, __PACKET_OTHERHOST__ for a packet to some other host that has been caught by a device driver in promiscuous mode, and __PACKET_OUTGOING__ for a packet originated from the local host that is looped back to a packet socket. These types make only sense for receiving. __sll_addr__ and __sll_halen__ contain the physical layer (e.g. IEEE 802.3) address and its length. The exact interpretation depends on the device. When you send packets it is enough to specify __sll_family__, __sll_addr__, __sll_halen__, __sll_ifindex__. The other fields should be 0. __sll_hatype__ and __sll_pkttype__ are set on received packets for your information. For bind only __sll_protocol__ and __sll_ifindex__ are used. !!SOCKET OPTIONS Packet sockets can be used to configure physical layer multicasting and promiscuous mode. It works by calling setsockopt(2) on a packet socket for SOL_PACKET and one of the options __PACKET_ADD_MEMBERSHIP__ to add a binding or __PACKET_DROP_MEMBERSHIP__ to drop it. They both expect a __packet_mreq__ structure as argument: struct packet_mreq { int mr_ifindex; /* interface index */ unsigned short mr_type; /* action */ unsigned short mr_alen; /* address length */ unsigned char mr_address[[8]; /* physical layer address */ }; __mr_ifindex__ contains the interface index for the interface whose status should be changed. The __mr_type__ parameter specifies which action to perform. __PACKET_MR_PROMISC__ enables receiving all packets on a shared medium - often known as ``promiscuous mode'', __PACKET_MR_MULTICAST__ binds the socket to the physical layer multicast group specified in __mr_address__ and __mr_alen__, and __PACKET_MR_ALLMULTI__ sets the socket up to receive all multicast packets arriving at the interface. In addition the traditional ioctls __SIOCSIFFLAGS, SIOCADDMULTI, SIOCDELMULTI__ can be used for the same purpose. !!IOCTLS [SIOCGSTAMP] can be used to receive the time stamp of the last received packet. Argument is a __struct timeval.__ In addition all standard ioctls defined in netdevice(7) and socket(7) are valid on packet sockets. !!ERROR HANDLING Packet sockets do no error handling other than errors occurred while passing the packet to the device driver. They don't have the concept of a pending error. !!COMPATIBILITY In Linux 2.0, the only way to get a packet socket was by calling __socket(PF_INET, SOCK_PACKET,__ ''protocol''__)__. This is still supported but strongly deprecated. The main difference between the two methods is that __SOCK_PACKET__ uses the old __struct sockaddr_pkt__ to specify an interface, which doesn't provide physical layer independence. struct sockaddr_pkt { unsigned short spkt_family; unsigned char spkt_device[[14]; unsigned short spkt_protocol; }; __spkt_family__ contains the device type, __spkt_protocol__ is the IEEE 802.3 protocol type as defined in __<sys/if_ether.h>__ and __spkt_device__ is the device name as a null terminated string, e.g. eth0. This structure is obsolete and should not be used in new code. !!NOTES For portable programs it is suggested to use __PF_PACKET__ via pcap(3); although this only covers a subset of the __PF_PACKET__ features. The __SOCK_DGRAM__ packet sockets make no attempt to create or parse the IEEE 802.2 LLC header for a IEEE 802.3 frame. When __ETH_P_802_3__ is specified as protocol for sending the kernel creates the 802.3 frame and fills out the length field; the user has to supply the LLC header to get a fully conforming packet. Incoming 802.3 packets are not multiplexed on the DSAP/SSAP protocol fields; instead they are supplied to the user as protocol __ETH_P_802_2__ with the LLC header prepended. It is thus not possible to bind to __ETH_P_802_3;__ bind to __ETH_P_802_2__ instead and do the protocol multiplex yourself. The default for sending is the standard Ethernet DIX encapsulation with the protocol filled in. Packet sockets are not subject to the input or output firewall chains. !!ERRORS ;[ENETDOWN]: Interface is not up. ;[ENOTCONN]: No interface address passed. ;[ENODEV]: Unknown device name or interface index specified in interface address. ;[EMSGSIZE]: Packet is bigger than interface MTU. ;[ENOBUFS]: Not enough memory to allocate the packet. ;[EFAULT]: User passed invalid memory address. ;[EINVAL]: Invalid argument. ;[ENXIO]: Interface address contained illegal interface index. ;[EPERM]: User has insufficient privileges to carry out this operation. ;[EADDRNOTAVAIL]: Unknown multicast group address passed. ;[ENOENT]: No packet received. In addition other errors may be generated by the low-level driver. !!VERSIONS __PF_PACKET__ is a new feature in Linux 2.2. Earlier Linux versions supported only __SOCK_PACKET.__ !!BUGS glibc 2.1 does not have a define for __SOL_PACKET.__ The suggested workaround is to use #ifndef SOL_PACKET #define SOL_PACKET 263 #endif This is fixed in later glibc versions and also does not occur on libc5 systems. The IEEE 802.2/803.3 LLC handling could be considered as a bug. Socket filters are not documented. The ''MSG_TRUNC'' recvmsg extension is an ugly hack and should be replaced by a control message. There is currently no way to get the original destination address of packets via SOCK_DGRAM. !!CREDITS This man page was written by Andi Kleen with help from Matthew Wilcox. PF_PACKET in Linux 2.2 was implemented by Alexey Kuznetsov, based on code by Alan Cox and others. !!SEE ALSO ip(7), socket(7), socket(2), raw(7), pcap(3) RFC:894 for the standard IP Ethernet encapsulation. RFC:1700 for the IEEE 802.3 IP encapsulation. The ''<linux/if_ether.h>'' include file for physical layer protocols.
10 pages link to
packet(7)
:
AddressFamily
netdevice(7)
Man7p
arp(7)
socket(2)
raw(7)
PacketSniffer
socket(7)
bind(2)
ip(7)
This page is a man page (or other imported legacy content). We are unable to automatically determine the license status of this page.