netdev
[Top] [All Lists]

Re: Debug kernel network hook chain or why has Check Point Firewall modu

To: Peter Bieringer <pb@xxxxxxxxxxxx>
Subject: Re: Debug kernel network hook chain or why has Check Point Firewall module problems with IPv6
From: Andi Kleen <ak@xxxxxxx>
Date: Mon, 22 Apr 2002 14:54:12 +0200
Cc: Andi Kleen <ak@xxxxxxx>, Maillist netdev <netdev@xxxxxxxxxxx>
In-reply-to: <20020422124737.16885.qmail@xxxxxxxxxxxxxxxxxx>
References: <22830000.1019458033@localhost> <20020422092252.A17861@xxxxxxxxxxxxx> <20020422085346.12822.qmail@xxxxxxxxxxxxxxxxxx> <20020422120618.A29547@xxxxxxxxxxxxx> <20020422124737.16885.qmail@xxxxxxxxxxxxxxxxxx>
Sender: owner-netdev@xxxxxxxxxxx
User-agent: Mutt/1.3.22.1i
On Mon, Apr 22, 2002 at 12:47:37PM +0000, Peter Bieringer wrote:
> 
> Andi Kleen writes:
> 
> > On Mon, Apr 22, 2002 at 08:53:45AM +0000, Peter Bieringer wrote:
> > > Is such IPv4 hook not seeing packets leaving a dual-stack application like
> > > openssh? Is there any scheme (the way such packet takes) available for
> > > visualisation.
> > 
> > The v4 hook only sees packets that are sent as v4. The v6 hook only v6.
> > It has nothing to do with the application using v4-mapped-on-v6 sockets 
> > or not.
> 
> Thanks for reply. Is there any tool available which can display which
> application has registered which network hooks?

Only a kernel debugger (gdb vmlinux /proc/kcore) 

-Andi

<Prev in Thread] Current Thread [Next in Thread>