Re: how to hack the sk_buff memory

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 





On 10/8/07, Mansha Linux <mansha.linux@xxxxxxxxx> wrote:


On 10/4/07, Peter Teoh < htmldeveloper@xxxxxxxxx> wrote:
The whole net code is highly optimized - in the sense that it is
copied between different parts of the memory only twice - according to
"Linux Network Internals" - all the way to userspace (correct? if i
did not remember wrongly :-)).   And if you want to intercept, many
ways.   One is to intercept right after the packets is received from
the network card, which is the function net_rx_action(), and just
before sending is net_tx_action().
Above that the packet will be reassembled/disassembled according to
network protocols.
Have fun.





The goal my of my kernel module is to fill the sk_buff or use it before the network drivers use it for tx/rx. so, i have make this sk_buff unavailable for tx/rx.

--
regards,
Mansha

--
regards,
Mansha

[Index of Archives]     [Newbies FAQ]     [Linux Kernel Mentors]     [Linux Kernel Development]     [IETF Annouce]     [Git]     [Networking]     [Security]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux SCSI]     [Linux ACPI]
  Powered by Linux