search for: targinfo

Displaying 4 results from an estimated 4 matches for "targinfo".

Did you mean: arginfo
2005 Oct 04
0
IMQ and nfcache
...t/ipv4/netfilter/ipt-IMQ.c: static unsigned int imq_target(struct sk_buff **pskb, const struct net_device *in, const struct net_device *out, unsigned int hooknum, const void *targinfo, void *userdata) { struct ipt_imq_info *mr = (struct ipt_imq_info*)targinfo; (*pskb)->imq_flags = mr->todev | IMQ_F_ENQUEUE; (*pskb)->nfcache |= NFC_ALTERED; return IPT_CONTINUE; } I found that in places like ip_conntrack_co...
2006 Dec 11
21
iptables 1.3.7, kernel 2.6.19, ROUTE and Layer7 issues
...able I have this error: [root@myhost ~]# iptables -v -t mangle -A POSTROUTING -p tcp --dport msnp -j ROUTE --gw $chat_gw ROUTE tcp opt -- in * out * 0.0.0.0/0 -> 0.0.0.0/0 tcp dpt:1863 ROUTE gw:80.32.61.1 iptables: Invalid argument [root@myhost ~]# dmesg | grep "ROUTE" ipt_ROUTE: targinfosize 0 != 40 [root@myhost ~]# cat /var/log/messages | grep "ROUTE" Dec 11 20:32:50 myhost kernel: ipt_ROUTE: targinfosize 0 != 40 With layer7 filter, I have a problem too, but it has no dmesg or syslog entry: [root@myhost ~]# iptables -v -t mangle -A PREROUTING -m layer7 --l7proto msnme...
2002 May 14
1
what''s the meaning of xchg()?
...r **argv, int invert, unsigned int *flags, >+ const struct ipt_entry *entry, >+ struct ipt_entry_target **target) >+{ >+ if (c) >+ return 0; >+ >+ return 1; >+} >+ >+static void >+final_check(unsigned int flags) >+{ >+} >+ >+/* Prints out the targinfo. */ >+static void >+print(const struct ipt_ip *ip, >+ const struct ipt_entry_target *target, >+ int numeric) >+{ >+ printf("IMQX"); >+} >+ >+/* Saves the union ipt_targinfo in parsable form to stdout. */ >+static void >+save(const struct ipt_ip *...
2006 May 19
25
iptables CLASSIFY and MARK not working?
I have to match my packets based on MAC address, which I cannot do in the POSTROUTING chain, so I do it in PREROUTING using MARK. Then, I match on the MARK in the POSTROUTING chain to do a CLASSIFY. But this does not seem to work: wireless-r1 bwlimit # iptables -L -v -n -t mangle Chain PREROUTING (policy ACCEPT 3353K packets, 941M bytes) pkts bytes target prot opt in out source