| To: | Peter Bieringer <pb@xxxxxxxxxxxx> |
|---|---|
| Subject: | Re: Debug kernel network hook chain or why has Check Point Firewall module problems with IPv6 |
| From: | Andi Kleen <ak@xxxxxxx> |
| Date: | Mon, 22 Apr 2002 14:54:12 +0200 |
| Cc: | Andi Kleen <ak@xxxxxxx>, Maillist netdev <netdev@xxxxxxxxxxx> |
| In-reply-to: | <20020422124737.16885.qmail@xxxxxxxxxxxxxxxxxx> |
| References: | <22830000.1019458033@localhost> <20020422092252.A17861@xxxxxxxxxxxxx> <20020422085346.12822.qmail@xxxxxxxxxxxxxxxxxx> <20020422120618.A29547@xxxxxxxxxxxxx> <20020422124737.16885.qmail@xxxxxxxxxxxxxxxxxx> |
| Sender: | owner-netdev@xxxxxxxxxxx |
| User-agent: | Mutt/1.3.22.1i |
On Mon, Apr 22, 2002 at 12:47:37PM +0000, Peter Bieringer wrote: > > Andi Kleen writes: > > > On Mon, Apr 22, 2002 at 08:53:45AM +0000, Peter Bieringer wrote: > > > Is such IPv4 hook not seeing packets leaving a dual-stack application like > > > openssh? Is there any scheme (the way such packet takes) available for > > > visualisation. > > > > The v4 hook only sees packets that are sent as v4. The v6 hook only v6. > > It has nothing to do with the application using v4-mapped-on-v6 sockets > > or not. > > Thanks for reply. Is there any tool available which can display which > application has registered which network hooks? Only a kernel debugger (gdb vmlinux /proc/kcore) -Andi |
| <Prev in Thread] | Current Thread | [Next in Thread> |
|---|---|---|
| ||
| Previous by Date: | Re: Debug kernel network hook chain or why has Check Point Firewall module problems with IPv6, Peter Bieringer |
|---|---|
| Next by Date: | Re: Debug kernel network hook chain or why has Check Point Firewall module problems with IPv6, Peter Bieringer |
| Previous by Thread: | Re: Debug kernel network hook chain or why has Check Point Firewall module problems with IPv6, Peter Bieringer |
| Next by Thread: | Re: Debug kernel network hook chain or why has Check Point Firewall module problems with IPv6, Peter Bieringer |
| Indexes: | [Date] [Thread] [Top] [All Lists] |