| To: | cranium2003 <cranium2003@xxxxxxxxx> |
|---|---|
| Subject: | Re: how netfilter handles fragmented packets |
| From: | Nish Aravamudan <nish.aravamudan@xxxxxxxxx> |
| Date: | Mon, 22 Nov 2004 11:55:23 -0800 |
| Cc: | kernelnewbies@xxxxxxxxxxxx, linux-kernel@xxxxxxxxxxxxxxx, netfilter-devel@xxxxxxxxxxxxxxxxxxx, netdev@xxxxxxxxxxx |
| Domainkey-signature: | a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:reply-to:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:references; b=XRqKMlqS5js7oZV3WnduzJYQ/TPAt633VzecMDAhFfMfLHQ7OLNd5/O6htaB2C7gn01Uzmz9M7Z/MTO8hrlUrridVIZk6llvQaGedyyuYyCoOXM1DQe0jem9wS2ztXhr70NL5wFaoAvyl9c3RR8+el2lhu8HFnpF+sJTZ+I+IsY= |
| In-reply-to: | <20041121194202.14581.qmail@web41407.mail.yahoo.com> |
| References: | <29495f1d04112109372bb8ebe4@mail.gmail.com> <20041121194202.14581.qmail@web41407.mail.yahoo.com> |
| Reply-to: | Nish Aravamudan <nish.aravamudan@xxxxxxxxx> |
| Sender: | netdev-bounce@xxxxxxxxxxx |
On Sun, 21 Nov 2004 11:42:02 -0800 (PST), cranium2003 <cranium2003@xxxxxxxxx> wrote: > > --- Nish Aravamudan <nish.aravamudan@xxxxxxxxx> wrote: > Hello Nish, > > > > > On Sun, 21 Nov 2004 17:15:12 +0100 (MET), Jan > > Engelhardt > > <jengelh@xxxxxxxxxxxxxxx> wrote: > > > >hello, > > > > In ip_output.c file ip_fragmet function > > when > > > >create a new fragmented packet given to > > output(skb) > > > >function. i want to know which function are > > actually > > > >called by output(skb)? > > > > > > use stack_dump() (or was it dump_stack()?) > > > > dump_stack(), if you want to dump the current > > process' stack context. > > > > -Nish > > > > can you please tell me how can i use dump_stack() > method? so using dump_stack i will come to know which > function will be called by output(skb) right? But > where i get dump_stack()??? Last time i used it, I didn't need to do a darn thing. I believe it's part of the traps code, so you can just call dump_stack(). dump_stack() will throw out the trace of the current task's stack at the point when it is called. See what happens when you place it in different places. Another option, if you ever have a hanging sytem is Alt-SysRq-T (presuming you have the magic option enabled and you are able to scrollback still), which pretty much calls dump_stack() for all available processes. -Nish |
| <Prev in Thread] | Current Thread | [Next in Thread> |
|---|---|---|
| ||
| Previous by Date: | Re: [PATCH 2.6 PKT_SCHED]: Fix overflow on 64bit in times reported to userspace by tc actions, Patrick McHardy |
|---|---|
| Next by Date: | Fw: [Bugme-new] [Bug 3796] New: ipsec causes kernel deadlock, Andrew Morton |
| Previous by Thread: | Re: how netfilter handles fragmented packets, cranium2003 |
| Next by Thread: | Re: how netfilter handles fragmented packets, cranium2003 |
| Indexes: | [Date] [Thread] [Top] [All Lists] |