1.\" Copyright (c) 1983, 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. 9.\" 2. Redistributions in binary form must reproduce the above copyright 10.\" notice, this list of conditions and the following disclaimer in the 11.\" documentation and/or other materials provided with the distribution. 12.\" 3. Neither the name of the University nor the names of its contributors 13.\" may be used to endorse or promote products derived from this software 14.\" without specific prior written permission. 15.\" 16.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 17.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 18.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 19.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 20.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 21.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 22.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 23.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 24.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 25.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 26.\" SUCH DAMAGE. 27.\" 28.\" @(#)ip.4 8.2 (Berkeley) 11/30/93 29.\" $FreeBSD$ 30.\" 31.Dd August 9, 2021 32.Dt IP 4 33.Os 34.Sh NAME 35.Nm ip 36.Nd Internet Protocol 37.Sh SYNOPSIS 38.In sys/types.h 39.In sys/socket.h 40.In netinet/in.h 41.Ft int 42.Fn socket AF_INET SOCK_RAW proto 43.Sh DESCRIPTION 44.Tn IP 45is the transport layer protocol used 46by the Internet protocol family. 47Options may be set at the 48.Tn IP 49level 50when using higher-level protocols that are based on 51.Tn IP 52(such as 53.Tn TCP 54and 55.Tn UDP ) . 56It may also be accessed 57through a 58.Dq raw socket 59when developing new protocols, or 60special-purpose applications. 61.Pp 62There are several 63.Tn IP-level 64.Xr setsockopt 2 65and 66.Xr getsockopt 2 67options. 68.Dv IP_OPTIONS 69may be used to provide 70.Tn IP 71options to be transmitted in the 72.Tn IP 73header of each outgoing packet 74or to examine the header options on incoming packets. 75.Tn IP 76options may be used with any socket type in the Internet family. 77The format of 78.Tn IP 79options to be sent is that specified by the 80.Tn IP 81protocol specification (RFC-791), with one exception: 82the list of addresses for Source Route options must include the first-hop 83gateway at the beginning of the list of gateways. 84The first-hop gateway address will be extracted from the option list 85and the size adjusted accordingly before use. 86To disable previously specified options, 87use a zero-length buffer: 88.Bd -literal 89setsockopt(s, IPPROTO_IP, IP_OPTIONS, NULL, 0); 90.Ed 91.Pp 92.Dv IP_TOS 93may be used to set the differential service codepoint (DSCP) and the 94explicit congestion notfication (ECN) codepoint. 95Setting the ECN codepoint - the two least significant bits - on a 96socket using a transport protocol implementing ECN has no effect. 97.Pp 98.Dv IP_TTL 99configures the time-to-live (TTL) field in the 100.Tn IP 101header for 102.Dv SOCK_STREAM , SOCK_DGRAM , 103and certain types of 104.Dv SOCK_RAW 105sockets. 106For example, 107.Bd -literal 108int tos = IPTOS_DSCP_EF; /* see <netinet/ip.h> */ 109setsockopt(s, IPPROTO_IP, IP_TOS, &tos, sizeof(tos)); 110 111int ttl = 60; /* max = 255 */ 112setsockopt(s, IPPROTO_IP, IP_TTL, &ttl, sizeof(ttl)); 113.Ed 114.Pp 115.Dv IP_IPSEC_POLICY 116controls IPSec policy for sockets. 117For example, 118.Bd -literal 119const char *policy = "in ipsec ah/transport//require"; 120char *buf = ipsec_set_policy(policy, strlen(policy)); 121setsockopt(s, IPPROTO_IP, IP_IPSEC_POLICY, buf, ipsec_get_policylen(buf)); 122.Ed 123.Pp 124.Dv IP_MINTTL 125may be used to set the minimum acceptable TTL a packet must have when 126received on a socket. 127All packets with a lower TTL are silently dropped. 128This option is only really useful when set to 255, preventing packets 129from outside the directly connected networks reaching local listeners 130on sockets. 131.Pp 132.Dv IP_DONTFRAG 133may be used to set the Don't Fragment flag on IP packets. 134Currently this option is respected only on 135.Xr udp 4 136and raw 137.Nm 138sockets, unless the 139.Dv IP_HDRINCL 140option has been set. 141On 142.Xr tcp 4 143sockets, the Don't Fragment flag is controlled by the Path 144MTU Discovery option. 145Sending a packet larger than the MTU size of the egress interface, 146determined by the destination address, returns an 147.Er EMSGSIZE 148error. 149.Pp 150If the 151.Dv IP_ORIGDSTADDR 152option is enabled on a 153.Dv SOCK_DGRAM 154socket, 155the 156.Xr recvmsg 2 157call will return the destination 158.Tn IP 159address and destination port for a 160.Tn UDP 161datagram. 162The 163.Vt msg_control 164field in the 165.Vt msghdr 166structure points to a buffer 167that contains a 168.Vt cmsghdr 169structure followed by the 170.Tn sockaddr_in 171structure. 172The 173.Vt cmsghdr 174fields have the following values: 175.Bd -literal 176cmsg_len = CMSG_LEN(sizeof(struct sockaddr_in)) 177cmsg_level = IPPROTO_IP 178cmsg_type = IP_ORIGDSTADDR 179.Ed 180.Pp 181If the 182.Dv IP_RECVDSTADDR 183option is enabled on a 184.Dv SOCK_DGRAM 185socket, 186the 187.Xr recvmsg 2 188call will return the destination 189.Tn IP 190address for a 191.Tn UDP 192datagram. 193The 194.Vt msg_control 195field in the 196.Vt msghdr 197structure points to a buffer 198that contains a 199.Vt cmsghdr 200structure followed by the 201.Tn IP 202address. 203The 204.Vt cmsghdr 205fields have the following values: 206.Bd -literal 207cmsg_len = CMSG_LEN(sizeof(struct in_addr)) 208cmsg_level = IPPROTO_IP 209cmsg_type = IP_RECVDSTADDR 210.Ed 211.Pp 212The source address to be used for outgoing 213.Tn UDP 214datagrams on a socket can be specified as ancillary data with a type code of 215.Dv IP_SENDSRCADDR . 216The msg_control field in the msghdr structure should point to a buffer 217that contains a 218.Vt cmsghdr 219structure followed by the 220.Tn IP 221address. 222The cmsghdr fields should have the following values: 223.Bd -literal 224cmsg_len = CMSG_LEN(sizeof(struct in_addr)) 225cmsg_level = IPPROTO_IP 226cmsg_type = IP_SENDSRCADDR 227.Ed 228.Pp 229The socket should be either bound to 230.Dv INADDR_ANY 231and a local port, and the address supplied with 232.Dv IP_SENDSRCADDR 233should't be 234.Dv INADDR_ANY , 235or the socket should be bound to a local address and the address supplied with 236.Dv IP_SENDSRCADDR 237should be 238.Dv INADDR_ANY . 239In the latter case bound address is overridden via generic source address 240selection logic, which would choose IP address of interface closest to 241destination. 242.Pp 243For convenience, 244.Dv IP_SENDSRCADDR 245is defined to have the same value as 246.Dv IP_RECVDSTADDR , 247so the 248.Dv IP_RECVDSTADDR 249control message from 250.Xr recvmsg 2 251can be used directly as a control message for 252.Xr sendmsg 2 . 253.\" 254.Pp 255If the 256.Dv IP_ONESBCAST 257option is enabled on a 258.Dv SOCK_DGRAM 259or a 260.Dv SOCK_RAW 261socket, the destination address of outgoing 262broadcast datagrams on that socket will be forced 263to the undirected broadcast address, 264.Dv INADDR_BROADCAST , 265before transmission. 266This is in contrast to the default behavior of the 267system, which is to transmit undirected broadcasts 268via the first network interface with the 269.Dv IFF_BROADCAST 270flag set. 271.Pp 272This option allows applications to choose which 273interface is used to transmit an undirected broadcast 274datagram. 275For example, the following code would force an 276undirected broadcast to be transmitted via the interface 277configured with the broadcast address 192.168.2.255: 278.Bd -literal 279char msg[512]; 280struct sockaddr_in sin; 281int onesbcast = 1; /* 0 = disable (default), 1 = enable */ 282 283setsockopt(s, IPPROTO_IP, IP_ONESBCAST, &onesbcast, sizeof(onesbcast)); 284sin.sin_addr.s_addr = inet_addr("192.168.2.255"); 285sin.sin_port = htons(1234); 286sendto(s, msg, sizeof(msg), 0, &sin, sizeof(sin)); 287.Ed 288.Pp 289It is the application's responsibility to set the 290.Dv IP_TTL 291option 292to an appropriate value in order to prevent broadcast storms. 293The application must have sufficient credentials to set the 294.Dv SO_BROADCAST 295socket level option, otherwise the 296.Dv IP_ONESBCAST 297option has no effect. 298.Pp 299If the 300.Dv IP_BINDANY 301option is enabled on a 302.Dv SOCK_STREAM , 303.Dv SOCK_DGRAM 304or a 305.Dv SOCK_RAW 306socket, one can 307.Xr bind 2 308to any address, even one not bound to any available network interface in the 309system. 310This functionality (in conjunction with special firewall rules) can be used for 311implementing a transparent proxy. 312The 313.Dv PRIV_NETINET_BINDANY 314privilege is needed to set this option. 315.Pp 316If the 317.Dv IP_RECVTTL 318option is enabled on a 319.Dv SOCK_DGRAM 320socket, the 321.Xr recvmsg 2 322call will return the 323.Tn IP 324.Tn TTL 325(time to live) field for a 326.Tn UDP 327datagram. 328The msg_control field in the msghdr structure points to a buffer 329that contains a cmsghdr structure followed by the 330.Tn TTL . 331The cmsghdr fields have the following values: 332.Bd -literal 333cmsg_len = CMSG_LEN(sizeof(u_char)) 334cmsg_level = IPPROTO_IP 335cmsg_type = IP_RECVTTL 336.Ed 337.\" 338.Pp 339If the 340.Dv IP_RECVTOS 341option is enabled on a 342.Dv SOCK_DGRAM 343socket, the 344.Xr recvmsg 2 345call will return the 346.Tn IP 347.Tn TOS 348(type of service) field for a 349.Tn UDP 350datagram. 351The msg_control field in the msghdr structure points to a buffer 352that contains a cmsghdr structure followed by the 353.Tn TOS . 354The cmsghdr fields have the following values: 355.Bd -literal 356cmsg_len = CMSG_LEN(sizeof(u_char)) 357cmsg_level = IPPROTO_IP 358cmsg_type = IP_RECVTOS 359.Ed 360.\" 361.Pp 362If the 363.Dv IP_RECVIF 364option is enabled on a 365.Dv SOCK_DGRAM 366socket, the 367.Xr recvmsg 2 368call returns a 369.Vt "struct sockaddr_dl" 370corresponding to the interface on which the 371packet was received. 372The 373.Va msg_control 374field in the 375.Vt msghdr 376structure points to a buffer that contains a 377.Vt cmsghdr 378structure followed by the 379.Vt "struct sockaddr_dl" . 380The 381.Vt cmsghdr 382fields have the following values: 383.Bd -literal 384cmsg_len = CMSG_LEN(sizeof(struct sockaddr_dl)) 385cmsg_level = IPPROTO_IP 386cmsg_type = IP_RECVIF 387.Ed 388.Pp 389.Dv IP_PORTRANGE 390may be used to set the port range used for selecting a local port number 391on a socket with an unspecified (zero) port number. 392It has the following 393possible values: 394.Bl -tag -width IP_PORTRANGE_DEFAULT 395.It Dv IP_PORTRANGE_DEFAULT 396use the default range of values, normally 397.Dv IPPORT_HIFIRSTAUTO 398through 399.Dv IPPORT_HILASTAUTO . 400This is adjustable through the sysctl setting: 401.Va net.inet.ip.portrange.first 402and 403.Va net.inet.ip.portrange.last . 404.It Dv IP_PORTRANGE_HIGH 405use a high range of values, normally 406.Dv IPPORT_HIFIRSTAUTO 407and 408.Dv IPPORT_HILASTAUTO . 409This is adjustable through the sysctl setting: 410.Va net.inet.ip.portrange.hifirst 411and 412.Va net.inet.ip.portrange.hilast . 413.It Dv IP_PORTRANGE_LOW 414use a low range of ports, which are normally restricted to 415privileged processes on 416.Ux 417systems. 418The range is normally from 419.Dv IPPORT_RESERVED 420\- 1 down to 421.Li IPPORT_RESERVEDSTART 422in descending order. 423This is adjustable through the sysctl setting: 424.Va net.inet.ip.portrange.lowfirst 425and 426.Va net.inet.ip.portrange.lowlast . 427.El 428.Pp 429The range of privileged ports which only may be opened by 430root-owned processes may be modified by the 431.Va net.inet.ip.portrange.reservedlow 432and 433.Va net.inet.ip.portrange.reservedhigh 434sysctl settings. 435The values default to the traditional range, 4360 through 437.Dv IPPORT_RESERVED 438\- 1 439(0 through 1023), respectively. 440Note that these settings do not affect and are not accounted for in the 441use or calculation of the other 442.Va net.inet.ip.portrange 443values above. 444Changing these values departs from 445.Ux 446tradition and has security 447consequences that the administrator should carefully evaluate before 448modifying these settings. 449.Pp 450Ports are allocated at random within the specified port range in order 451to increase the difficulty of random spoofing attacks. 452In scenarios such as benchmarking, this behavior may be undesirable. 453In these cases, 454.Va net.inet.ip.portrange.randomized 455can be used to toggle randomization off. 456.Ss "Multicast Options" 457.Tn IP 458multicasting is supported only on 459.Dv AF_INET 460sockets of type 461.Dv SOCK_DGRAM 462and 463.Dv SOCK_RAW , 464and only on networks where the interface 465driver supports multicasting. 466.Pp 467The 468.Dv IP_MULTICAST_TTL 469option changes the time-to-live (TTL) 470for outgoing multicast datagrams 471in order to control the scope of the multicasts: 472.Bd -literal 473u_char ttl; /* range: 0 to 255, default = 1 */ 474setsockopt(s, IPPROTO_IP, IP_MULTICAST_TTL, &ttl, sizeof(ttl)); 475.Ed 476.Pp 477Datagrams with a TTL of 1 are not forwarded beyond the local network. 478Multicast datagrams with a TTL of 0 will not be transmitted on any network, 479but may be delivered locally if the sending host belongs to the destination 480group and if multicast loopback has not been disabled on the sending socket 481(see below). 482Multicast datagrams with TTL greater than 1 may be forwarded 483to other networks if a multicast router is attached to the local network. 484.Pp 485For hosts with multiple interfaces, where an interface has not 486been specified for a multicast group membership, 487each multicast transmission is sent from the primary network interface. 488The 489.Dv IP_MULTICAST_IF 490option overrides the default for 491subsequent transmissions from a given socket: 492.Bd -literal 493struct in_addr addr; 494setsockopt(s, IPPROTO_IP, IP_MULTICAST_IF, &addr, sizeof(addr)); 495.Ed 496.Pp 497where "addr" is the local 498.Tn IP 499address of the desired interface or 500.Dv INADDR_ANY 501to specify the default interface. 502.Pp 503To specify an interface by index, an instance of 504.Vt ip_mreqn 505may be passed instead. 506The 507.Vt imr_ifindex 508member should be set to the index of the desired interface, 509or 0 to specify the default interface. 510The kernel differentiates between these two structures by their size. 511.Pp 512The use of 513.Vt IP_MULTICAST_IF 514is 515.Em not recommended , 516as multicast memberships are scoped to each 517individual interface. 518It is supported for legacy use only by applications, 519such as routing daemons, which expect to 520be able to transmit link-local IPv4 multicast datagrams (224.0.0.0/24) 521on multiple interfaces, 522without requesting an individual membership for each interface. 523.Pp 524.\" 525An interface's local IP address and multicast capability can 526be obtained via the 527.Dv SIOCGIFCONF 528and 529.Dv SIOCGIFFLAGS 530ioctls. 531Normal applications should not need to use this option. 532.Pp 533If a multicast datagram is sent to a group to which the sending host itself 534belongs (on the outgoing interface), a copy of the datagram is, by default, 535looped back by the IP layer for local delivery. 536The 537.Dv IP_MULTICAST_LOOP 538option gives the sender explicit control 539over whether or not subsequent datagrams are looped back: 540.Bd -literal 541u_char loop; /* 0 = disable, 1 = enable (default) */ 542setsockopt(s, IPPROTO_IP, IP_MULTICAST_LOOP, &loop, sizeof(loop)); 543.Ed 544.Pp 545This option 546improves performance for applications that may have no more than one 547instance on a single host (such as a routing daemon), by eliminating 548the overhead of receiving their own transmissions. 549It should generally not 550be used by applications for which there may be more than one instance on a 551single host (such as a conferencing program) or for which the sender does 552not belong to the destination group (such as a time querying program). 553.Pp 554The sysctl setting 555.Va net.inet.ip.mcast.loop 556controls the default setting of the 557.Dv IP_MULTICAST_LOOP 558socket option for new sockets. 559.Pp 560A multicast datagram sent with an initial TTL greater than 1 may be delivered 561to the sending host on a different interface from that on which it was sent, 562if the host belongs to the destination group on that other interface. 563The loopback control option has no effect on such delivery. 564.Pp 565A host must become a member of a multicast group before it can receive 566datagrams sent to the group. 567To join a multicast group, use the 568.Dv IP_ADD_MEMBERSHIP 569option: 570.Bd -literal 571struct ip_mreqn mreqn; 572setsockopt(s, IPPROTO_IP, IP_ADD_MEMBERSHIP, &mreqn, sizeof(mreqn)); 573.Ed 574.Pp 575where 576.Fa mreqn 577is the following structure: 578.Bd -literal 579struct ip_mreqn { 580 struct in_addr imr_multiaddr; /* IP multicast address of group */ 581 struct in_addr imr_interface; /* local IP address of interface */ 582 int imr_ifindex; /* interface index */ 583} 584.Ed 585.Pp 586.Va imr_ifindex 587should be set to the index of a particular multicast-capable interface if 588the host is multihomed. 589If 590.Va imr_ifindex 591is non-zero, value of 592.Va imr_interface 593is ignored. 594Otherwise, if 595.Va imr_ifindex 596is 0, kernel will use IP address from 597.Va imr_interface 598to lookup the interface. 599Value of 600.Va imr_interface 601may be set to 602.Va INADDR_ANY 603to choose the default interface, although this is not recommended; this is 604considered to be the first interface corresponding to the default route. 605Otherwise, the first multicast-capable interface configured in the system 606will be used. 607.Pp 608Legacy 609.Vt "struct ip_mreq" , 610that lacks 611.Va imr_ifindex 612field is also supported by 613.Dv IP_ADD_MEMBERSHIP 614setsockopt. 615In this case kernel would behave as if 616.Va imr_ifindex 617was set to zero: 618.Va imr_interface 619will be used to lookup interface. 620.Pp 621Prior to 622.Fx 7.0 , 623if the 624.Va imr_interface 625member is within the network range 626.Li 0.0.0.0/8 , 627it is treated as an interface index in the system interface MIB, 628as per the RIP Version 2 MIB Extension (RFC-1724). 629In versions of 630.Fx 631since 7.0, this behavior is no longer supported. 632Developers should 633instead use the RFC 3678 multicast source filter APIs; in particular, 634.Dv MCAST_JOIN_GROUP . 635.Pp 636Up to 637.Dv IP_MAX_MEMBERSHIPS 638memberships may be added on a single socket. 639Membership is associated with a single interface; 640programs running on multihomed hosts may need to 641join the same group on more than one interface. 642.Pp 643To drop a membership, use: 644.Bd -literal 645struct ip_mreq mreq; 646setsockopt(s, IPPROTO_IP, IP_DROP_MEMBERSHIP, &mreq, sizeof(mreq)); 647.Ed 648.Pp 649where 650.Fa mreq 651contains the same values as used to add the membership. 652Memberships are dropped when the socket is closed or the process exits. 653.\" TODO: Update this piece when IPv4 source-address selection is implemented. 654.Pp 655The IGMP protocol uses the primary IP address of the interface 656as its identifier for group membership. 657This is the first IP address configured on the interface. 658If this address is removed or changed, the results are 659undefined, as the IGMP membership state will then be inconsistent. 660If multiple IP aliases are configured on the same interface, 661they will be ignored. 662.Pp 663This shortcoming was addressed in IPv6; MLDv2 requires 664that the unique link-local address for an interface is 665used to identify an MLDv2 listener. 666.Ss "Source-Specific Multicast Options" 667Since 668.Fx 8.0 , 669the use of Source-Specific Multicast (SSM) is supported. 670These extensions require an IGMPv3 multicast router in order to 671make best use of them. 672If a legacy multicast router is present on the link, 673.Fx 674will simply downgrade to the version of IGMP spoken by the router, 675and the benefits of source filtering on the upstream link 676will not be present, although the kernel will continue to 677squelch transmissions from blocked sources. 678.Pp 679Each group membership on a socket now has a filter mode: 680.Bl -tag -width MCAST_EXCLUDE 681.It Dv MCAST_EXCLUDE 682Datagrams sent to this group are accepted, 683unless the source is in a list of blocked source addresses. 684.It Dv MCAST_INCLUDE 685Datagrams sent to this group are accepted 686only if the source is in a list of accepted source addresses. 687.El 688.Pp 689Groups joined using the legacy 690.Dv IP_ADD_MEMBERSHIP 691option are placed in exclusive-mode, 692and are able to request that certain sources are blocked or allowed. 693This is known as the 694.Em delta-based API . 695.Pp 696To block a multicast source on an existing group membership: 697.Bd -literal 698struct ip_mreq_source mreqs; 699setsockopt(s, IPPROTO_IP, IP_BLOCK_SOURCE, &mreqs, sizeof(mreqs)); 700.Ed 701.Pp 702where 703.Fa mreqs 704is the following structure: 705.Bd -literal 706struct ip_mreq_source { 707 struct in_addr imr_multiaddr; /* IP multicast address of group */ 708 struct in_addr imr_sourceaddr; /* IP address of source */ 709 struct in_addr imr_interface; /* local IP address of interface */ 710} 711.Ed 712.Va imr_sourceaddr 713should be set to the address of the source to be blocked. 714.Pp 715To unblock a multicast source on an existing group: 716.Bd -literal 717struct ip_mreq_source mreqs; 718setsockopt(s, IPPROTO_IP, IP_UNBLOCK_SOURCE, &mreqs, sizeof(mreqs)); 719.Ed 720.Pp 721The 722.Dv IP_BLOCK_SOURCE 723and 724.Dv IP_UNBLOCK_SOURCE 725options are 726.Em not permitted 727for inclusive-mode group memberships. 728.Pp 729To join a multicast group in 730.Dv MCAST_INCLUDE 731mode with a single source, 732or add another source to an existing inclusive-mode membership: 733.Bd -literal 734struct ip_mreq_source mreqs; 735setsockopt(s, IPPROTO_IP, IP_ADD_SOURCE_MEMBERSHIP, &mreqs, sizeof(mreqs)); 736.Ed 737.Pp 738To leave a single source from an existing group in inclusive mode: 739.Bd -literal 740struct ip_mreq_source mreqs; 741setsockopt(s, IPPROTO_IP, IP_DROP_SOURCE_MEMBERSHIP, &mreqs, sizeof(mreqs)); 742.Ed 743If this is the last accepted source for the group, the membership 744will be dropped. 745.Pp 746The 747.Dv IP_ADD_SOURCE_MEMBERSHIP 748and 749.Dv IP_DROP_SOURCE_MEMBERSHIP 750options are 751.Em not accepted 752for exclusive-mode group memberships. 753However, both exclusive and inclusive mode memberships 754support the use of the 755.Em full-state API 756documented in RFC 3678. 757For management of source filter lists using this API, 758please refer to 759.Xr sourcefilter 3 . 760.Pp 761The sysctl settings 762.Va net.inet.ip.mcast.maxsocksrc 763and 764.Va net.inet.ip.mcast.maxgrpsrc 765are used to specify an upper limit on the number of per-socket and per-group 766source filter entries which the kernel may allocate. 767.\"----------------------- 768.Ss "Raw IP Sockets" 769Raw 770.Tn IP 771sockets are connectionless, 772and are normally used with the 773.Xr sendto 2 774and 775.Xr recvfrom 2 776calls, though the 777.Xr connect 2 778call may also be used to fix the destination for future 779packets (in which case the 780.Xr read 2 781or 782.Xr recv 2 783and 784.Xr write 2 785or 786.Xr send 2 787system calls may be used). 788.Pp 789If 790.Fa proto 791is 0, the default protocol 792.Dv IPPROTO_RAW 793is used for outgoing 794packets, and only incoming packets destined for that protocol 795are received. 796If 797.Fa proto 798is non-zero, that protocol number will be used on outgoing packets 799and to filter incoming packets. 800.Pp 801Outgoing packets automatically have an 802.Tn IP 803header prepended to 804them (based on the destination address and the protocol 805number the socket is created with), 806unless the 807.Dv IP_HDRINCL 808option has been set. 809Unlike in previous 810.Bx 811releases, incoming packets are received with 812.Tn IP 813header and options intact, leaving all fields in network byte order. 814.Pp 815.Dv IP_HDRINCL 816indicates the complete IP header is included with the data 817and may be used only with the 818.Dv SOCK_RAW 819type. 820.Bd -literal 821#include <netinet/in_systm.h> 822#include <netinet/ip.h> 823 824int hincl = 1; /* 1 = on, 0 = off */ 825setsockopt(s, IPPROTO_IP, IP_HDRINCL, &hincl, sizeof(hincl)); 826.Ed 827.Pp 828Unlike previous 829.Bx 830releases, the program must set all 831the fields of the IP header, including the following: 832.Bd -literal 833ip->ip_v = IPVERSION; 834ip->ip_hl = hlen >> 2; 835ip->ip_id = 0; /* 0 means kernel set appropriate value */ 836ip->ip_off = htons(offset); 837ip->ip_len = htons(len); 838.Ed 839.Pp 840The packet should be provided as is to be sent over wire. 841This implies all fields, including 842.Va ip_len 843and 844.Va ip_off 845to be in network byte order. 846See 847.Xr byteorder 3 848for more information on network byte order. 849If the 850.Va ip_id 851field is set to 0 then the kernel will choose an 852appropriate value. 853If the header source address is set to 854.Dv INADDR_ANY , 855the kernel will choose an appropriate address. 856.Sh ERRORS 857A socket operation may fail with one of the following errors returned: 858.Bl -tag -width Er 859.It Bq Er EISCONN 860when trying to establish a connection on a socket which 861already has one, or when trying to send a datagram with the destination 862address specified and the socket is already connected; 863.It Bq Er ENOTCONN 864when trying to send a datagram, but 865no destination address is specified, and the socket has not been 866connected; 867.It Bq Er ENOBUFS 868when the system runs out of memory for 869an internal data structure; 870.It Bq Er EADDRNOTAVAIL 871when an attempt is made to create a 872socket with a network address for which no network interface 873exists. 874.It Bq Er EACCES 875when an attempt is made to create 876a raw IP socket by a non-privileged process. 877.El 878.Pp 879The following errors specific to 880.Tn IP 881may occur when setting or getting 882.Tn IP 883options: 884.Bl -tag -width Er 885.It Bq Er EINVAL 886An unknown socket option name was given. 887.It Bq Er EINVAL 888The IP option field was improperly formed; 889an option field was shorter than the minimum value 890or longer than the option buffer provided. 891.El 892.Pp 893The following errors may occur when attempting to send 894.Tn IP 895datagrams via a 896.Dq raw socket 897with the 898.Dv IP_HDRINCL 899option set: 900.Bl -tag -width Er 901.It Bq Er EINVAL 902The user-supplied 903.Va ip_len 904field was not equal to the length of the datagram written to the socket. 905.El 906.Sh SEE ALSO 907.Xr getsockopt 2 , 908.Xr recv 2 , 909.Xr send 2 , 910.Xr byteorder 3 , 911.Xr CMSG_DATA 3 , 912.Xr sourcefilter 3 , 913.Xr icmp 4 , 914.Xr igmp 4 , 915.Xr inet 4 , 916.Xr intro 4 , 917.Xr multicast 4 918.Rs 919.%A D. Thaler 920.%A B. Fenner 921.%A B. Quinn 922.%T "Socket Interface Extensions for Multicast Source Filters" 923.%N RFC 3678 924.%D Jan 2004 925.Re 926.Sh HISTORY 927The 928.Nm 929protocol appeared in 930.Bx 4.2 . 931The 932.Vt ip_mreqn 933structure appeared in 934.Tn Linux 2.4 . 935.Sh BUGS 936Before 937.Fx 10.0 938packets received on raw IP sockets had the 939.Va ip_hl 940subtracted from the 941.Va ip_len 942field. 943.Pp 944Before 945.Fx 11.0 946packets received on raw IP sockets had the 947.Va ip_len 948and 949.Va ip_off 950fields converted to host byte order. 951Packets written to raw IP sockets were expected to have 952.Va ip_len 953and 954.Va ip_off 955in host byte order. 956