Sponsored Content
Top Forums Programming extending netfilter...plz help Post 99587 by Rakesh Ranjan on Monday 20th of February 2006 01:30:29 AM
Old 02-20-2006
Thanks everyone for viewing and trying to think over it. I got my solution for this strange problem. So that none of u face same problem i'll tell what happened.
I created my kernel module and created a patch (mymodule.patch file) for it. Next I went through the patch-o-matic and learnt how to add ones own new patches to the already existing ones. Now I created all files required to patch makefile, config.in file etc. But to my surprise when I applied this patch last two lines were not included in the C file that resulted from patch. These two lines contained module initialisation and exit code. And so upon calling from user space though the module was loaded but it was loaded as tainted module. Luckily on going through again and again I could find the mistake and then rectified it.
So this way i got rid of problem but still thanks to u all for atleast looking into my problem.
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

plz Help How should I configure cc compiler output file plz help???

i.e configuration of C compiler :confused: (4 Replies)
Discussion started by: atiato
4 Replies

2. Programming

Help in extending netfilter

Hi everybody, I have to write a module for matching in netfilter , extending the netfilter but I'm facing some problems can somebody guide me in that. I know that I need to write matching module working in kernel space and a program in userspace. I went through the HOWTO on netfilter-hacking but... (0 Replies)
Discussion started by: Trusted Penguin
0 Replies

3. Programming

Problem in registering new netfilter target module

Friends I'm facing a big problem trying to extend the netfilter. Somone please help me with your quick reply (any hint) as I've to meet a deadline. My problem is that I've written a new netfilter target module and its corresponding userspace program for iptables to change the packet type of a... (0 Replies)
Discussion started by: Rakesh Ranjan
0 Replies

4. IP Networking

netfilter connection tracking

hi, i'm using tcpreplay to send a traffic trace to my wireless interface (the trace is been captured by the same interface). It seems as netfilter can't trace connections. Is it possible? (0 Replies)
Discussion started by: littleboyblu
0 Replies

5. Cybersecurity

Netfilter conntracking for P2P protocols (edonkey, bittorent...)

Hi everyone, I would like to allow multi users to access P2P networks, so I wonder if there's a way to tracking these kind of protocols with netfilter, and also compatibility with nat, like the module conntrack_ftp seems to do with the FTP protocol. Thanks guys. (0 Replies)
Discussion started by: nekkro-kvlt
0 Replies

6. Linux

netfilter / iptables

HI, Is the Netfilter and IPtables same? Thanks & Regards Arun (1 Reply)
Discussion started by: Arun.Kakarla
1 Replies

7. Linux

C, LKM, netfilter, PF_PACKET and ARP.

Hello, Everyone knows that with PF_PACKET sockets one can "sniff" a determinated frame from the network device, but just that, see the frame without altering its action on the receiving host. What i want is to "intercept" the incoming frame and pass it through some rules, and if it doesn't pass... (9 Replies)
Discussion started by: Zykl0n-B
9 Replies

8. Cybersecurity

Experience with libvirt netfilter API

Hi all, I would like to get some ideas and opinions on matter of libvirt netfilter application in KVM environment. I am looking for some easy way to control it with an API and possible experience with that and its performance in real life application. Thanks for all ideas (0 Replies)
Discussion started by: smoofy
0 Replies

9. Cybersecurity

How to use Netfilter properly with IPv6?

Hello, on a PC with Debian 8 I try to use a Bash script with Netfilter rules so that only traffic goes in and out that is wanted. For that I set all 3 default policies to "drop". The machine uses DHCP to get its IP, gateway and DNS. And I never checked so I was quite surprised that my... (1 Reply)
Discussion started by: SInt
1 Replies
IPQ_SET_MODE(3) 					     Linux Programmer's Manual						   IPQ_SET_MODE(3)

NAME
ipq_set_mode -- set the ip_queue queuing mode SYNOPSIS
#include <linux/netfilter.h> #include <libipq.h> int ipq_set_mode(const struct ipq_handle *h, u_int8_t mode, size_t range); DESCRIPTION
The ipq_set_mode function sends a message to the kernel ip_queue module, specifying whether packet metadata only, or packet payloads as well as metadata should be copied to userspace. The h parameter is a context handle which must previously have been returned successfully from a call to ipq_create_handle. The mode parameter must be one of: IPQ_COPY_META Copy only packet metadata to userspace. IPQ_COPY_PACKET Copy packet metadata and packet payloads to userspace. The range parameter is used to specify how many bytes of the payload to copy to userspace. It is only valid for IPQ_COPY_PACKET mode and is otherwise ignored. The maximum useful value for range is 65535 (greater values will be clamped to this by ip_queue). ipq_set_mode is usually used immediately following ipq_create_handle to enable the flow of packets to userspace. Note that as the underlying Netlink messaging transport is connectionless, the ip_queue module does not know that a userspace application is ready to communicate until it receives a message such as this. RETURN VALUE
On failure, -1 is returned. On success, a non-zero positive value is returned. ERRORS
On failure, a descriptive error message will be available via the ipq_errstr function. DIAGNOSTICS
A relatively common failure may occur if the ip_queue module is not loaded. In this case, the following code excerpt: status = ipq_set_mode(h, IPQ_COPY_META, 0); if (status < 0) { ipq_perror("myapp"); ipq_destroy_handle(h); exit(1); } would generate the following output: myapp: Failed to send netlink message: Connection refused BUGS
None known. AUTHOR
James Morris <jmorris@intercode.com.au> COPYRIGHT
Copyright (c) 2000-2001 Netfilter Core Team. Distributed under the GNU General Public License. SEE ALSO
libipq(3), iptables(8). Linux iptables 1.2 16 October 2001 IPQ_SET_MODE(3)
All times are GMT -4. The time now is 04:01 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy