-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
linux-os (Dick Johnson) wrote:
> This must be a trick question. Linux is not VAX/VMS. There is no
> swapper process. Check in /proc. Processes start at 1. Even
> kernel threads have PIDs greater than 1.
Linux really has swapper process ;)
> Portions of the kernel networking code operate detached. The code
> gets the CPU from a timer queue or from an interrupt. When an
> connection is attempted, the process attempting the connection
> is either waiting, with its CPU time being used, or put to
> sleep, while the timer queue's CPU time is being used. The
> SYN/ACK handshake is handled during this time, therefore it
> is possible to find who is attempting that connection. Netstat
> gets that information from /proc/net and multiple socket
> calls.
I'm writing kernel module that hooks into netfilter code. I can catch
packet's information and its owner process. The first SYN packet of
handshaking belongs to real user-space socket/process. After timeout,
several SYN packets are generated by kernel-space swapper process (PID
0) Is there anyway to find out the relationship between them in
_kernel_space_ (module context).
Thanks,
Mikado.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFER7EQNWc9T2Wr2JcRAkHYAJ9HFfmHjzTRTIDhCPSI12wgWxKAjQCfXh1R
UAeStFg9Wqk+rJJDGr+WI5c=
=lbpv
-----END PGP SIGNATURE-----
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
[Index of Archives]
[Kernel Newbies]
[Netfilter]
[Bugtraq]
[Photo]
[Stuff]
[Gimp]
[Yosemite News]
[MIPS Linux]
[ARM Linux]
[Linux Security]
[Linux RAID]
[Video 4 Linux]
[Linux for the blind]
[Linux Resources]