注册 登录
自由的生活_软路由 返回首页

11的个人空间 https://bbs.routerclub.com/?499 [收藏] [复制] [分享] [RSS]

日志

内核Parasite thread injection and TCP connection hijacking

已有 708 次阅读2013-2-14 21:19 | thread


Hello, guys. So, here's transparent TCP connection hijacking (ie. checkpointing in one process and restoring in another) which adds only relatively small pieces to the kernel. It's by no means complete but already works rather reliably in my test setup even with heavy delay induced with tc. I wrote a rather long README describing how it's working, what's missing which is appended at the end of this mail so if you're interested in the details please go ahead and read. Several ioctls are added to enable TCP connection CR, which adds around 130 lines of code. Note that the interface is ugly. As said above, it's proof-of-concept. We'll need a bit more information exported and knobs to turn and hopefully prettier interface. As my knowledge of networking is fairly rudimentary, I only tried to get the basics working. e.g. I didn't try to store negotiated options and re-establish them on restoration (ie. window scaling, mss, various extra features), and am likely to have made wrong assumptions even on the basics. If you spot some, please shout. The source is available in the following git branch (just git clone from the URL) https://htejun@code.google.com/p/ptrace-parasite/ and can be browsed at http://code.google.com/p/ptrace-parasite/source/browse/ I'm attaching the tcp-ioctls.patch and the source tarball. Thanks.

http://lwn.net/Articles/454304/
看不懂,好象是tcp连接hijack和恢复的。

路过

雷人

握手

鲜花

鸡蛋

评论 (0 个评论)

facelist doodle 涂鸦板

您需要登录后才可以评论 登录 | 注册

QQ|Archiver|手机版|小黑屋|软路由 ( 渝ICP备15001194号-1|渝公网安备 50011602500124号 )

GMT+8, 2024-6-2 16:20 , Processed in 0.039466 second(s), 5 queries , Gzip On, Redis On.

Powered by Discuz! X3.5 Licensed

© 2001-2023 Discuz! Team.

返回顶部