Displaying 5 results from an estimated 5 matches for "targinfosize".
2005 Dec 13
7
MARK: targinfosize 8 != 4
Hello all,
I got this problem while trying to shape traffic with iptables MARK and
HTB.
MARK: targinfosize 8 != 4
--set-mark gives "invalid argument" error message.
Kernel version is 2.4.29 (some patches from patch o matic applied)
Iptables version 1.3.4
Intel x86 architecture.
I saw this problem discussed in a few places, but the discussions didn''t
come to a conclusion or solutio...
2006 Jul 04
25
[Bug 490] ROUTE extension module unusable since 2.6.16
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=490
netfilter@linuxace.com changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |netfilter@linuxace.com
Status|NEW |RESOLVED
Resolution|
2006 Dec 11
21
iptables 1.3.7, kernel 2.6.19, ROUTE and Layer7 issues
...able I have this error:
[root@myhost ~]# iptables -v -t mangle -A POSTROUTING -p tcp --dport msnp
-j ROUTE --gw $chat_gw
ROUTE tcp opt -- in * out * 0.0.0.0/0 -> 0.0.0.0/0 tcp dpt:1863 ROUTE
gw:80.32.61.1
iptables: Invalid argument
[root@myhost ~]# dmesg | grep "ROUTE"
ipt_ROUTE: targinfosize 0 != 40
[root@myhost ~]# cat /var/log/messages | grep "ROUTE"
Dec 11 20:32:50 myhost kernel: ipt_ROUTE: targinfosize 0 != 40
With layer7 filter, I have a problem too, but it has no dmesg or syslog
entry:
[root@myhost ~]# iptables -v -t mangle -A PREROUTING -m layer7 --l7proto
msnmessen...
2004 Nov 24
8
tc and iptables trouble
Hi all
I have a trouble configuring the qdiscs, when I indicate the "perturb 10" option to tc, i gives me this error:
tc qdisc add dev eth0 parent 5:1323 handle 1323 sfq perturb 10
RTNETLINK answers: Invalid argument
if I don''t put the "perturb 10" option, it works.
another question is about iptables, when I indicate the " --set-mark" option:
iptables -t
2002 May 14
1
what''s the meaning of xchg()?
...serinfo)
>++{
>++ (*pskb)->from_imq = 1;
>++ (*pskb)->nfcache |= NFC_ALTERED;
>++
>++ return IPT_CONTINUE;
>++}
>++
>++static int
>++checkentry(const char *tablename,
>++ const struct ipt_entry *e,
>++ void *targinfo,
>++ unsigned int targinfosize,
>++ unsigned int hook_mask)
>++{
>++ if (strcmp(tablename, "mangle") != 0) {
>++ printk(KERN_WARNING "IMQX: can only be called from \"mangle\" table, not \"s\"\n", tablename);
>++ return 0;
>++ }
>++
>++ return 1;
>++}...