Displaying 4 results from an estimated 4 matches for "targinfo".
Did you mean:
arginfo
2005 Oct 04
0
IMQ and nfcache
...t/ipv4/netfilter/ipt-IMQ.c:
static unsigned int imq_target(struct sk_buff **pskb,
const struct net_device *in,
const struct net_device *out,
unsigned int hooknum,
const void *targinfo,
void *userdata)
{
struct ipt_imq_info *mr = (struct ipt_imq_info*)targinfo;
(*pskb)->imq_flags = mr->todev | IMQ_F_ENQUEUE;
(*pskb)->nfcache |= NFC_ALTERED;
return IPT_CONTINUE;
}
I found that in places like ip_conntrack_co...
2006 Dec 11
21
iptables 1.3.7, kernel 2.6.19, ROUTE and Layer7 issues
...able I have this error:
[root@myhost ~]# iptables -v -t mangle -A POSTROUTING -p tcp --dport msnp
-j ROUTE --gw $chat_gw
ROUTE tcp opt -- in * out * 0.0.0.0/0 -> 0.0.0.0/0 tcp dpt:1863 ROUTE
gw:80.32.61.1
iptables: Invalid argument
[root@myhost ~]# dmesg | grep "ROUTE"
ipt_ROUTE: targinfosize 0 != 40
[root@myhost ~]# cat /var/log/messages | grep "ROUTE"
Dec 11 20:32:50 myhost kernel: ipt_ROUTE: targinfosize 0 != 40
With layer7 filter, I have a problem too, but it has no dmesg or syslog
entry:
[root@myhost ~]# iptables -v -t mangle -A PREROUTING -m layer7 --l7proto
msnme...
2002 May 14
1
what''s the meaning of xchg()?
...r **argv, int invert, unsigned int *flags,
>+ const struct ipt_entry *entry,
>+ struct ipt_entry_target **target)
>+{
>+ if (c)
>+ return 0;
>+
>+ return 1;
>+}
>+
>+static void
>+final_check(unsigned int flags)
>+{
>+}
>+
>+/* Prints out the targinfo. */
>+static void
>+print(const struct ipt_ip *ip,
>+ const struct ipt_entry_target *target,
>+ int numeric)
>+{
>+ printf("IMQX");
>+}
>+
>+/* Saves the union ipt_targinfo in parsable form to stdout. */
>+static void
>+save(const struct ipt_ip *...
2006 May 19
25
iptables CLASSIFY and MARK not working?
I have to match my packets based on MAC address, which I cannot do in
the POSTROUTING chain, so I do it in PREROUTING using MARK. Then, I
match on the MARK in the POSTROUTING chain to do a CLASSIFY. But this
does not seem to work:
wireless-r1 bwlimit # iptables -L -v -n -t mangle
Chain PREROUTING (policy ACCEPT 3353K packets, 941M bytes)
pkts bytes target prot opt in out source