1994-05-30 19:09:18 +00:00
|
|
|
.\" Copyright (c) 1983, 1991, 1993
|
|
|
|
.\" The Regents of the University of California. All rights reserved.
|
|
|
|
.\"
|
|
|
|
.\" Redistribution and use in source and binary forms, with or without
|
|
|
|
.\" modification, are permitted provided that the following conditions
|
|
|
|
.\" are met:
|
|
|
|
.\" 1. Redistributions of source code must retain the above copyright
|
|
|
|
.\" notice, this list of conditions and the following disclaimer.
|
|
|
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
.\" notice, this list of conditions and the following disclaimer in the
|
|
|
|
.\" documentation and/or other materials provided with the distribution.
|
|
|
|
.\" 3. All advertising materials mentioning features or use of this software
|
|
|
|
.\" must display the following acknowledgement:
|
|
|
|
.\" This product includes software developed by the University of
|
|
|
|
.\" California, Berkeley and its contributors.
|
|
|
|
.\" 4. Neither the name of the University nor the names of its contributors
|
|
|
|
.\" may be used to endorse or promote products derived from this software
|
|
|
|
.\" without specific prior written permission.
|
|
|
|
.\"
|
|
|
|
.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
.\" SUCH DAMAGE.
|
|
|
|
.\"
|
|
|
|
.\" @(#)ip.4 8.2 (Berkeley) 11/30/93
|
1999-08-28 00:22:10 +00:00
|
|
|
.\" $FreeBSD$
|
1994-05-30 19:09:18 +00:00
|
|
|
.\"
|
2001-03-09 12:22:51 +00:00
|
|
|
.Dd March 3, 2001
|
1994-05-30 19:09:18 +00:00
|
|
|
.Dt IP 4
|
2001-03-09 12:22:51 +00:00
|
|
|
.Os
|
1994-05-30 19:09:18 +00:00
|
|
|
.Sh NAME
|
|
|
|
.Nm ip
|
|
|
|
.Nd Internet Protocol
|
|
|
|
.Sh SYNOPSIS
|
2001-10-01 16:09:29 +00:00
|
|
|
.In sys/types.h
|
|
|
|
.In sys/socket.h
|
|
|
|
.In netinet/in.h
|
1994-05-30 19:09:18 +00:00
|
|
|
.Ft int
|
|
|
|
.Fn socket AF_INET SOCK_RAW proto
|
|
|
|
.Sh DESCRIPTION
|
2001-07-14 19:41:16 +00:00
|
|
|
.Tn IP
|
1994-05-30 19:09:18 +00:00
|
|
|
is the transport layer protocol used
|
|
|
|
by the Internet protocol family.
|
|
|
|
Options may be set at the
|
|
|
|
.Tn IP
|
|
|
|
level
|
|
|
|
when using higher-level protocols that are based on
|
|
|
|
.Tn IP
|
|
|
|
(such as
|
|
|
|
.Tn TCP
|
|
|
|
and
|
|
|
|
.Tn UDP ) .
|
|
|
|
It may also be accessed
|
|
|
|
through a
|
|
|
|
.Dq raw socket
|
|
|
|
when developing new protocols, or
|
|
|
|
special-purpose applications.
|
|
|
|
.Pp
|
|
|
|
There are several
|
|
|
|
.Tn IP-level
|
2001-07-14 19:41:16 +00:00
|
|
|
.Xr setsockopt 2
|
1996-04-08 04:18:31 +00:00
|
|
|
and
|
1994-05-30 19:09:18 +00:00
|
|
|
.Xr getsockopt 2
|
|
|
|
options.
|
2001-07-14 19:41:16 +00:00
|
|
|
.Dv IP_OPTIONS
|
1994-05-30 19:09:18 +00:00
|
|
|
may be used to provide
|
|
|
|
.Tn IP
|
|
|
|
options to be transmitted in the
|
|
|
|
.Tn IP
|
|
|
|
header of each outgoing packet
|
|
|
|
or to examine the header options on incoming packets.
|
|
|
|
.Tn IP
|
|
|
|
options may be used with any socket type in the Internet family.
|
|
|
|
The format of
|
|
|
|
.Tn IP
|
|
|
|
options to be sent is that specified by the
|
2001-07-14 19:41:16 +00:00
|
|
|
.Tn IP
|
1994-05-30 19:09:18 +00:00
|
|
|
protocol specification (RFC-791), with one exception:
|
|
|
|
the list of addresses for Source Route options must include the first-hop
|
|
|
|
gateway at the beginning of the list of gateways.
|
|
|
|
The first-hop gateway address will be extracted from the option list
|
|
|
|
and the size adjusted accordingly before use.
|
|
|
|
To disable previously specified options,
|
|
|
|
use a zero-length buffer:
|
|
|
|
.Bd -literal
|
|
|
|
setsockopt(s, IPPROTO_IP, IP_OPTIONS, NULL, 0);
|
|
|
|
.Ed
|
|
|
|
.Pp
|
2001-07-14 19:41:16 +00:00
|
|
|
.Dv IP_TOS
|
|
|
|
and
|
|
|
|
.Dv IP_TTL
|
1994-05-30 19:09:18 +00:00
|
|
|
may be used to set the type-of-service and time-to-live
|
2001-07-14 19:41:16 +00:00
|
|
|
fields in the
|
|
|
|
.Tn IP
|
|
|
|
header for
|
2001-03-09 12:22:51 +00:00
|
|
|
.Dv SOCK_STREAM , SOCK_DGRAM ,
|
|
|
|
and certain types of
|
|
|
|
.Dv SOCK_RAW
|
2000-03-01 14:50:24 +00:00
|
|
|
sockets.
|
|
|
|
For example,
|
1994-05-30 19:09:18 +00:00
|
|
|
.Bd -literal
|
2000-03-22 16:02:49 +00:00
|
|
|
int tos = IPTOS_LOWDELAY; /* see <netinet/ip.h> */
|
1994-05-30 19:09:18 +00:00
|
|
|
setsockopt(s, IPPROTO_IP, IP_TOS, &tos, sizeof(tos));
|
|
|
|
|
|
|
|
int ttl = 60; /* max = 255 */
|
|
|
|
setsockopt(s, IPPROTO_IP, IP_TTL, &ttl, sizeof(ttl));
|
|
|
|
.Ed
|
|
|
|
.Pp
|
2001-07-14 19:41:16 +00:00
|
|
|
If the
|
|
|
|
.Dv IP_RECVDSTADDR
|
|
|
|
option is enabled on a
|
|
|
|
.Dv SOCK_DGRAM
|
1994-05-30 19:09:18 +00:00
|
|
|
socket,
|
|
|
|
the
|
1996-04-08 04:18:31 +00:00
|
|
|
.Xr recvmsg 2
|
2001-07-14 19:41:16 +00:00
|
|
|
call will return the destination
|
|
|
|
.Tn IP
|
|
|
|
address for a
|
|
|
|
.Tn UDP
|
|
|
|
datagram.
|
|
|
|
The msg_control field in the msghdr structure points to a buffer
|
|
|
|
that contains a cmsghdr structure followed by the
|
|
|
|
.Tn IP
|
|
|
|
address.
|
1994-05-30 19:09:18 +00:00
|
|
|
The cmsghdr fields have the following values:
|
|
|
|
.Bd -literal
|
|
|
|
cmsg_len = sizeof(struct in_addr)
|
|
|
|
cmsg_level = IPPROTO_IP
|
|
|
|
cmsg_type = IP_RECVDSTADDR
|
|
|
|
.Ed
|
1996-02-23 21:01:35 +00:00
|
|
|
.Pp
|
2002-10-21 20:40:02 +00:00
|
|
|
The source address to be used for outgoing
|
|
|
|
.Tn UDP
|
|
|
|
datagrams on a socket that is not bound to a specific
|
|
|
|
.Tn IP
|
|
|
|
address can be specified as ancillary data with a type code of
|
|
|
|
.Dv IP_SENDSRCADDR .
|
|
|
|
The msg_control field in the msghdr structure should point to a buffer
|
|
|
|
that contains a cmsghdr structure followed by the
|
|
|
|
.Tn IP
|
|
|
|
address.
|
|
|
|
The cmsghdr fields should have the following values:
|
|
|
|
.Bd -literal
|
|
|
|
cmsg_len = sizeof(struct in_addr)
|
|
|
|
cmsg_level = IPPROTO_IP
|
|
|
|
cmsg_type = IP_SENDSRCADDR
|
|
|
|
.Ed
|
|
|
|
.Pp
|
|
|
|
For convenience,
|
|
|
|
.Dv IP_SENDSRCADDR
|
|
|
|
is defined to have the same value as
|
|
|
|
.Dv IP_RECVDSTADDR ,
|
|
|
|
so the
|
|
|
|
.Dv IP_RECVDSTADDR
|
|
|
|
control message from
|
|
|
|
.Xr recvmsg 2
|
|
|
|
can be used directly as a control message for
|
|
|
|
.Xr sendmsg 2 .
|
|
|
|
.Pp
|
2003-04-01 08:21:44 +00:00
|
|
|
.Dv IP_EVIL_INTENT can be used to specify that IP packets should have their
|
|
|
|
EVIL option set as per RFC3514.
|
|
|
|
The cmsghdr fields should have the following values:
|
|
|
|
.Bd -literal
|
|
|
|
cmsg_len = sizeof(struct in_addr)
|
|
|
|
cmsg_level = IPPROTO_IP
|
|
|
|
cmsg_type = IP_EVIL_INTENT
|
|
|
|
.Ed
|
|
|
|
.Pp
|
2001-07-14 19:41:16 +00:00
|
|
|
.Dv IP_PORTRANGE
|
1996-02-23 21:01:35 +00:00
|
|
|
may be used to set the port range used for selecting a local port number
|
2000-03-01 14:50:24 +00:00
|
|
|
on a socket with an unspecified (zero) port number.
|
|
|
|
It has the following
|
1996-02-23 21:01:35 +00:00
|
|
|
possible values:
|
|
|
|
.Bl -tag -width IP_PORTRANGE_DEFAULT
|
|
|
|
.It Dv IP_PORTRANGE_DEFAULT
|
|
|
|
use the default range of values, normally
|
2002-04-09 18:03:18 +00:00
|
|
|
.Dv IPPORT_HIFIRSTAUTO
|
1996-02-23 21:01:35 +00:00
|
|
|
through
|
2002-04-09 18:03:18 +00:00
|
|
|
.Dv IPPORT_HILASTAUTO .
|
1996-02-23 21:01:35 +00:00
|
|
|
This is adjustable through the sysctl setting:
|
2003-02-24 22:53:26 +00:00
|
|
|
.Va net.inet.ip.portrange.first
|
1996-02-23 21:01:35 +00:00
|
|
|
and
|
2003-02-24 22:53:26 +00:00
|
|
|
.Va net.inet.ip.portrange.last .
|
1996-02-23 21:01:35 +00:00
|
|
|
.It Dv IP_PORTRANGE_HIGH
|
|
|
|
use a high range of values, normally
|
|
|
|
.Dv IPPORT_HIFIRSTAUTO
|
|
|
|
and
|
|
|
|
.Dv IPPORT_HILASTAUTO .
|
|
|
|
This is adjustable through the sysctl setting:
|
2003-02-24 22:53:26 +00:00
|
|
|
.Va net.inet.ip.portrange.hifirst
|
1996-02-23 21:01:35 +00:00
|
|
|
and
|
2003-02-24 22:53:26 +00:00
|
|
|
.Va net.inet.ip.portrange.hilast .
|
1996-02-23 21:01:35 +00:00
|
|
|
.It Dv IP_PORTRANGE_LOW
|
|
|
|
use a low range of ports, which are normally restricted to
|
|
|
|
privileged processes on
|
|
|
|
.Ux
|
|
|
|
systems. The range is normally from
|
2003-02-24 22:53:26 +00:00
|
|
|
.Dv IPPORT_RESERVED
|
|
|
|
\- 1 down to
|
2001-03-29 01:00:42 +00:00
|
|
|
.Li IPPORT_RESERVEDSTART
|
2001-07-14 19:41:16 +00:00
|
|
|
in descending order.
|
2001-03-29 01:00:42 +00:00
|
|
|
This is adjustable through the sysctl setting:
|
2003-02-24 22:53:26 +00:00
|
|
|
.Va net.inet.ip.portrange.lowfirst
|
2001-03-29 01:00:42 +00:00
|
|
|
and
|
2003-02-24 22:53:26 +00:00
|
|
|
.Va net.inet.ip.portrange.lowlast .
|
1996-02-23 21:01:35 +00:00
|
|
|
.El
|
2003-02-21 21:09:35 +00:00
|
|
|
.Pp
|
|
|
|
The range of privileged ports which only may be opened by
|
|
|
|
root-owned processes may be modified by the
|
2003-02-24 22:53:26 +00:00
|
|
|
.Va net.inet.ip.portrange.reservedlow
|
2003-02-21 21:09:35 +00:00
|
|
|
and
|
2003-02-24 22:53:26 +00:00
|
|
|
.Va net.inet.ip.portrange.reservedhigh
|
2003-02-21 21:09:35 +00:00
|
|
|
sysctl settings.
|
|
|
|
The values default to the traditional range,
|
|
|
|
0 through
|
2003-02-24 22:53:26 +00:00
|
|
|
.Dv IPPORT_RESERVED
|
|
|
|
\- 1
|
2003-02-21 21:09:35 +00:00
|
|
|
(0 through 1023), respectively.
|
|
|
|
Note that these settings do not affect and are not accounted for in the
|
|
|
|
use or calculation of the other
|
2003-02-24 22:53:26 +00:00
|
|
|
.Va net.inet.ip.portrange
|
2003-02-21 21:09:35 +00:00
|
|
|
values above.
|
2003-02-24 22:53:26 +00:00
|
|
|
Changing these values departs from
|
|
|
|
.Ux
|
|
|
|
tradition and has security
|
|
|
|
consequences that the administrator should carefully evaluate before
|
2003-02-21 21:09:35 +00:00
|
|
|
modifying these settings.
|
1994-05-30 19:09:18 +00:00
|
|
|
.Ss "Multicast Options"
|
|
|
|
.Pp
|
2001-07-14 19:41:16 +00:00
|
|
|
.Tn IP
|
|
|
|
multicasting is supported only on
|
|
|
|
.Dv AF_INET
|
1994-05-30 19:09:18 +00:00
|
|
|
sockets of type
|
2001-07-14 19:41:16 +00:00
|
|
|
.Dv SOCK_DGRAM
|
|
|
|
and
|
2001-02-01 16:38:02 +00:00
|
|
|
.Dv SOCK_RAW ,
|
1994-05-30 19:09:18 +00:00
|
|
|
and only on networks where the interface
|
|
|
|
driver supports multicasting.
|
|
|
|
.Pp
|
2001-07-14 19:41:16 +00:00
|
|
|
The
|
|
|
|
.Dv IP_MULTICAST_TTL
|
1994-05-30 19:09:18 +00:00
|
|
|
option changes the time-to-live (TTL)
|
|
|
|
for outgoing multicast datagrams
|
|
|
|
in order to control the scope of the multicasts:
|
|
|
|
.Bd -literal
|
|
|
|
u_char ttl; /* range: 0 to 255, default = 1 */
|
|
|
|
setsockopt(s, IPPROTO_IP, IP_MULTICAST_TTL, &ttl, sizeof(ttl));
|
|
|
|
.Ed
|
1997-01-30 23:49:46 +00:00
|
|
|
.Pp
|
1994-05-30 19:09:18 +00:00
|
|
|
Datagrams with a TTL of 1 are not forwarded beyond the local network.
|
|
|
|
Multicast datagrams with a TTL of 0 will not be transmitted on any network,
|
|
|
|
but may be delivered locally if the sending host belongs to the destination
|
|
|
|
group and if multicast loopback has not been disabled on the sending socket
|
|
|
|
(see below). Multicast datagrams with TTL greater than 1 may be forwarded
|
|
|
|
to other networks if a multicast router is attached to the local network.
|
|
|
|
.Pp
|
2001-07-14 19:41:16 +00:00
|
|
|
For hosts with multiple interfaces, each multicast transmission is
|
1994-05-30 19:09:18 +00:00
|
|
|
sent from the primary network interface.
|
2001-07-14 19:41:16 +00:00
|
|
|
The
|
|
|
|
.Dv IP_MULTICAST_IF
|
|
|
|
option overrides the default for
|
1994-05-30 19:09:18 +00:00
|
|
|
subsequent transmissions from a given socket:
|
|
|
|
.Bd -literal
|
|
|
|
struct in_addr addr;
|
|
|
|
setsockopt(s, IPPROTO_IP, IP_MULTICAST_IF, &addr, sizeof(addr));
|
|
|
|
.Ed
|
1997-01-30 23:49:46 +00:00
|
|
|
.Pp
|
2001-07-14 19:41:16 +00:00
|
|
|
where "addr" is the local
|
|
|
|
.Tn IP
|
1994-05-30 19:09:18 +00:00
|
|
|
address of the desired interface or
|
2001-07-14 19:41:16 +00:00
|
|
|
.Dv INADDR_ANY
|
1994-05-30 19:09:18 +00:00
|
|
|
to specify the default interface.
|
2001-07-14 19:41:16 +00:00
|
|
|
An interface's local IP address and multicast capability can
|
|
|
|
be obtained via the
|
|
|
|
.Dv SIOCGIFCONF
|
|
|
|
and
|
|
|
|
.Dv SIOCGIFFLAGS
|
|
|
|
ioctls.
|
1994-05-30 19:09:18 +00:00
|
|
|
Normal applications should not need to use this option.
|
|
|
|
.Pp
|
|
|
|
If a multicast datagram is sent to a group to which the sending host itself
|
|
|
|
belongs (on the outgoing interface), a copy of the datagram is, by default,
|
2001-07-14 19:41:16 +00:00
|
|
|
looped back by the IP layer for local delivery.
|
|
|
|
The
|
|
|
|
.Dv IP_MULTICAST_LOOP
|
|
|
|
option gives the sender explicit control
|
1994-05-30 19:09:18 +00:00
|
|
|
over whether or not subsequent datagrams are looped back:
|
|
|
|
.Bd -literal
|
|
|
|
u_char loop; /* 0 = disable, 1 = enable (default) */
|
|
|
|
setsockopt(s, IPPROTO_IP, IP_MULTICAST_LOOP, &loop, sizeof(loop));
|
|
|
|
.Ed
|
1997-01-30 23:49:46 +00:00
|
|
|
.Pp
|
1994-05-30 19:09:18 +00:00
|
|
|
This option
|
|
|
|
improves performance for applications that may have no more than one
|
2000-11-20 10:15:38 +00:00
|
|
|
instance on a single host (such as a router daemon), by eliminating
|
1994-05-30 19:09:18 +00:00
|
|
|
the overhead of receiving their own transmissions. It should generally not
|
|
|
|
be used by applications for which there may be more than one instance on a
|
|
|
|
single host (such as a conferencing program) or for which the sender does
|
|
|
|
not belong to the destination group (such as a time querying program).
|
|
|
|
.Pp
|
|
|
|
A multicast datagram sent with an initial TTL greater than 1 may be delivered
|
|
|
|
to the sending host on a different interface from that on which it was sent,
|
|
|
|
if the host belongs to the destination group on that other interface. The
|
|
|
|
loopback control option has no effect on such delivery.
|
|
|
|
.Pp
|
2001-07-14 19:41:16 +00:00
|
|
|
A host must become a member of a multicast group before it can receive
|
|
|
|
datagrams sent to the group. To join a multicast group, use the
|
|
|
|
.Dv IP_ADD_MEMBERSHIP
|
1994-05-30 19:09:18 +00:00
|
|
|
option:
|
|
|
|
.Bd -literal
|
|
|
|
struct ip_mreq mreq;
|
|
|
|
setsockopt(s, IPPROTO_IP, IP_ADD_MEMBERSHIP, &mreq, sizeof(mreq));
|
|
|
|
.Ed
|
1997-01-30 23:49:46 +00:00
|
|
|
.Pp
|
2001-07-14 19:41:16 +00:00
|
|
|
where
|
1994-05-30 19:09:18 +00:00
|
|
|
.Fa mreq
|
|
|
|
is the following structure:
|
|
|
|
.Bd -literal
|
|
|
|
struct ip_mreq {
|
1997-01-30 23:49:46 +00:00
|
|
|
struct in_addr imr_multiaddr; /* IP multicast address of group */
|
|
|
|
struct in_addr imr_interface; /* local IP address of interface */
|
1994-05-30 19:09:18 +00:00
|
|
|
}
|
|
|
|
.Ed
|
1997-01-30 23:49:46 +00:00
|
|
|
.Pp
|
2001-07-14 19:41:16 +00:00
|
|
|
.Dv imr_interface
|
1994-05-30 19:09:18 +00:00
|
|
|
should
|
2001-07-14 19:41:16 +00:00
|
|
|
be
|
|
|
|
.Dv INADDR_ANY
|
|
|
|
to choose the default multicast interface,
|
|
|
|
or the
|
|
|
|
.Tn IP
|
1994-05-30 19:09:18 +00:00
|
|
|
address of a particular multicast-capable interface if
|
|
|
|
the host is multihomed.
|
2001-07-14 19:41:16 +00:00
|
|
|
Membership is associated with a single interface;
|
|
|
|
programs running on multihomed hosts may need to
|
|
|
|
join the same group on more than one interface.
|
|
|
|
Up to
|
|
|
|
.Dv IP_MAX_MEMBERSHIPS
|
1994-05-30 19:09:18 +00:00
|
|
|
(currently 20) memberships may be added on a
|
|
|
|
single socket.
|
|
|
|
.Pp
|
|
|
|
To drop a membership, use:
|
|
|
|
.Bd -literal
|
|
|
|
struct ip_mreq mreq;
|
|
|
|
setsockopt(s, IPPROTO_IP, IP_DROP_MEMBERSHIP, &mreq, sizeof(mreq));
|
|
|
|
.Ed
|
1997-01-30 23:49:46 +00:00
|
|
|
.Pp
|
2001-07-14 19:41:16 +00:00
|
|
|
where
|
1994-05-30 19:09:18 +00:00
|
|
|
.Fa mreq
|
2001-07-14 19:41:16 +00:00
|
|
|
contains the same values as used to add the membership.
|
|
|
|
Memberships are dropped when the socket is closed or the process exits.
|
1994-05-30 19:09:18 +00:00
|
|
|
.\"-----------------------
|
|
|
|
.Ss "Raw IP Sockets"
|
|
|
|
.Pp
|
|
|
|
Raw
|
|
|
|
.Tn IP
|
|
|
|
sockets are connectionless,
|
|
|
|
and are normally used with the
|
1996-04-08 04:18:31 +00:00
|
|
|
.Xr sendto 2
|
1994-05-30 19:09:18 +00:00
|
|
|
and
|
1996-04-08 04:18:31 +00:00
|
|
|
.Xr recvfrom 2
|
1994-05-30 19:09:18 +00:00
|
|
|
calls, though the
|
|
|
|
.Xr connect 2
|
|
|
|
call may also be used to fix the destination for future
|
2001-07-14 19:41:16 +00:00
|
|
|
packets (in which case the
|
1994-05-30 19:09:18 +00:00
|
|
|
.Xr read 2
|
|
|
|
or
|
|
|
|
.Xr recv 2
|
2001-07-14 19:41:16 +00:00
|
|
|
and
|
1994-05-30 19:09:18 +00:00
|
|
|
.Xr write 2
|
|
|
|
or
|
|
|
|
.Xr send 2
|
|
|
|
system calls may be used).
|
|
|
|
.Pp
|
|
|
|
If
|
|
|
|
.Fa proto
|
|
|
|
is 0, the default protocol
|
|
|
|
.Dv IPPROTO_RAW
|
|
|
|
is used for outgoing
|
|
|
|
packets, and only incoming packets destined for that protocol
|
|
|
|
are received.
|
|
|
|
If
|
|
|
|
.Fa proto
|
|
|
|
is non-zero, that protocol number will be used on outgoing packets
|
|
|
|
and to filter incoming packets.
|
|
|
|
.Pp
|
|
|
|
Outgoing packets automatically have an
|
|
|
|
.Tn IP
|
|
|
|
header prepended to
|
|
|
|
them (based on the destination address and the protocol
|
|
|
|
number the socket is created with),
|
2001-07-14 19:41:16 +00:00
|
|
|
unless the
|
|
|
|
.Dv IP_HDRINCL
|
1994-05-30 19:09:18 +00:00
|
|
|
option has been set.
|
|
|
|
Incoming packets are received with
|
|
|
|
.Tn IP
|
|
|
|
header and options intact.
|
|
|
|
.Pp
|
2001-07-14 19:41:16 +00:00
|
|
|
.Dv IP_HDRINCL
|
1994-05-30 19:09:18 +00:00
|
|
|
indicates the complete IP header is included with the data
|
2001-07-14 19:41:16 +00:00
|
|
|
and may be used only with the
|
|
|
|
.Dv SOCK_RAW
|
1994-05-30 19:09:18 +00:00
|
|
|
type.
|
|
|
|
.Bd -literal
|
1997-03-19 19:47:43 +00:00
|
|
|
#include <netinet/in_systm.h>
|
1994-05-30 19:09:18 +00:00
|
|
|
#include <netinet/ip.h>
|
|
|
|
|
|
|
|
int hincl = 1; /* 1 = on, 0 = off */
|
|
|
|
setsockopt(s, IPPROTO_IP, IP_HDRINCL, &hincl, sizeof(hincl));
|
|
|
|
.Ed
|
1997-01-30 23:49:46 +00:00
|
|
|
.Pp
|
2001-07-14 19:41:16 +00:00
|
|
|
Unlike previous
|
|
|
|
.Bx
|
1994-05-30 19:09:18 +00:00
|
|
|
releases, the program must set all
|
|
|
|
the fields of the IP header, including the following:
|
|
|
|
.Bd -literal
|
|
|
|
ip->ip_v = IPVERSION;
|
|
|
|
ip->ip_hl = hlen >> 2;
|
|
|
|
ip->ip_id = 0; /* 0 means kernel set appropriate value */
|
|
|
|
ip->ip_off = offset;
|
|
|
|
.Ed
|
1997-01-30 23:49:46 +00:00
|
|
|
.Pp
|
2001-07-14 19:41:16 +00:00
|
|
|
If the header source address is set to
|
2001-02-01 16:38:02 +00:00
|
|
|
.Dv INADDR_ANY ,
|
1994-05-30 19:09:18 +00:00
|
|
|
the kernel will choose an appropriate address.
|
2001-04-13 19:49:07 +00:00
|
|
|
.Sh ERRORS
|
1994-05-30 19:09:18 +00:00
|
|
|
A socket operation may fail with one of the following errors returned:
|
2001-04-13 19:49:07 +00:00
|
|
|
.Bl -tag -width Er
|
1994-05-30 19:09:18 +00:00
|
|
|
.It Bq Er EISCONN
|
|
|
|
when trying to establish a connection on a socket which
|
|
|
|
already has one, or when trying to send a datagram with the destination
|
|
|
|
address specified and the socket is already connected;
|
|
|
|
.It Bq Er ENOTCONN
|
|
|
|
when trying to send a datagram, but
|
|
|
|
no destination address is specified, and the socket hasn't been
|
|
|
|
connected;
|
|
|
|
.It Bq Er ENOBUFS
|
|
|
|
when the system runs out of memory for
|
|
|
|
an internal data structure;
|
|
|
|
.It Bq Er EADDRNOTAVAIL
|
2001-07-14 19:41:16 +00:00
|
|
|
when an attempt is made to create a
|
1994-05-30 19:09:18 +00:00
|
|
|
socket with a network address for which no network interface
|
|
|
|
exists.
|
1999-03-15 00:14:16 +00:00
|
|
|
.It Bq Er EACCES
|
1994-05-30 19:09:18 +00:00
|
|
|
when an attempt is made to create
|
|
|
|
a raw IP socket by a non-privileged process.
|
|
|
|
.El
|
|
|
|
.Pp
|
|
|
|
The following errors specific to
|
|
|
|
.Tn IP
|
|
|
|
may occur when setting or getting
|
|
|
|
.Tn IP
|
|
|
|
options:
|
|
|
|
.Bl -tag -width EADDRNOTAVAILxx
|
|
|
|
.It Bq Er EINVAL
|
|
|
|
An unknown socket option name was given.
|
|
|
|
.It Bq Er EINVAL
|
|
|
|
The IP option field was improperly formed;
|
|
|
|
an option field was shorter than the minimum value
|
|
|
|
or longer than the option buffer provided.
|
|
|
|
.El
|
|
|
|
.Sh SEE ALSO
|
|
|
|
.Xr getsockopt 2 ,
|
|
|
|
.Xr recv 2 ,
|
1996-12-26 16:16:37 +00:00
|
|
|
.Xr send 2 ,
|
1994-05-30 19:09:18 +00:00
|
|
|
.Xr icmp 4 ,
|
1996-12-26 16:16:37 +00:00
|
|
|
.Xr inet 4 ,
|
|
|
|
.Xr intro 4
|
1994-05-30 19:09:18 +00:00
|
|
|
.Sh HISTORY
|
|
|
|
The
|
|
|
|
.Nm
|
|
|
|
protocol appeared in
|
|
|
|
.Bx 4.2 .
|