10 More Discussions You Might Find Interesting
1. Cybersecurity
Hello,
on a PC with Debian 8 I try to use a Bash script with Netfilter rules so that only traffic goes in and out that is wanted. For that I set all 3 default policies to "drop". The machine uses DHCP to get its IP, gateway and DNS. And I never checked so I was quite surprised that my... (1 Reply)
Discussion started by: SInt
1 Replies
2. Cybersecurity
Hi all,
I would like to get some ideas and opinions on matter of libvirt netfilter application in KVM environment. I am looking for some easy way to control it with an API and possible experience with that and its performance in real life application.
Thanks for all ideas (0 Replies)
Discussion started by: smoofy
0 Replies
3. Linux
Hello,
Everyone knows that with PF_PACKET sockets one can "sniff" a determinated frame from the network device, but just that, see the frame without altering its action on the receiving host. What i want is to "intercept" the incoming frame and pass it through some rules, and if it doesn't pass... (9 Replies)
Discussion started by: Zykl0n-B
9 Replies
4. IP Networking
Hello,
I have switch port, that allows only a single MAC/IP connected to it. - But, I would like to connect two hosts, without any additional private network. (No NAT.)
Therefore the plan is adding a linux router doing proxy-arp with three interfaces, one for host1, one for host2 and one... (2 Replies)
Discussion started by: michas
2 Replies
5. Solaris
Hi everyone,
I am hoping anyone of you could help me in this weird problem we have in 1 of our Solaris 10 servers. Lately, we have been having some ftp problems in this server. Though it can ping any server within the network, it seems that it can only ftp to a select few. For most servers, the... (4 Replies)
Discussion started by: labdakos
4 Replies
6. Linux
HI,
Is the Netfilter and IPtables same?
Thanks & Regards
Arun (1 Reply)
Discussion started by: Arun.Kakarla
1 Replies
7. Cybersecurity
Hi everyone, I would like to allow multi users to access P2P networks, so I wonder if there's a way to tracking these kind of protocols with netfilter, and also compatibility with nat, like the module conntrack_ftp seems to do with the FTP protocol.
Thanks guys. (0 Replies)
Discussion started by: nekkro-kvlt
0 Replies
8. Programming
Hello friends i'm trying to extend iptables to include a target by which we can change the packet type field of a packet.
For this i created a kernel module and a userspace extension.
Now i face the problem that when i try to invoke iptable with the target i created i get an error message saying... (1 Reply)
Discussion started by: Rakesh Ranjan
1 Replies
9. Programming
Friends I'm facing a big problem trying to extend the netfilter. Somone please help me with your quick reply (any hint) as I've to meet a deadline.
My problem is that I've written a new netfilter target module and its corresponding userspace program for iptables to change the packet type of a... (0 Replies)
Discussion started by: Rakesh Ranjan
0 Replies
10. Programming
Hi everybody,
I have to write a module for matching in netfilter , extending the netfilter but I'm facing some problems can somebody guide me in that. I know that I need to write matching module working in kernel space and a program in userspace. I went through the HOWTO on netfilter-hacking but... (0 Replies)
Discussion started by: Trusted Penguin
0 Replies
TRACE-CMD(1) TRACE-CMD(1)
NAME
trace-cmd - interacts with Ftrace Linux kernel internal tracer
SYNOPSIS
trace-cmd COMMAND [OPTIONS]
DESCRIPTION
The trace-cmd(1) command interacts with the Ftrace tracer that is built inside the Linux kernel. It interfaces with the Ftrace specific
files found in the debugfs file system under the tracing directory. A COMMAND must be specified to tell trace-cmd what to do.
COMMANDS
record - record a live trace and write a trace.dat file to the
local disk or to the network.
report - reads a trace.dat file and converts the binary data to a
ASCII text readable format.
hist - show a histogram of the events.
options - list the plugin options that are available to *report*
start - start the tracing without recording to a trace.dat file.
stop - stop tracing (only disables recording, overhead of tracer
is still in effect)
extract - extract the data from the kernel buffer and create a trace.dat
file.
reset - disables all tracing and gives back the system performance.
(clears all data from the kernel buffers)
split - splits a trace.dat file into smaller files.
list - list the available plugins or events that can be recorded.
listen - open up a port to listen for remote tracing connections.
restore - restore the data files of a crashed run of trace-cmd record
stack - run and display the stack tracer
check-events - parse format strings for all trace events and return
whether all formats are parseable
OPTIONS
-h, --help
Display the help text.
Other options see the man page for the corresponding command.
SEE ALSO
trace-cmd-record(1), trace-cmd-report(1), trace-cmd-hist(1), trace-cmd-start(1), trace-cmd-stop(1), trace-cmd-extract(1),
trace-cmd-reset(1), trace-cmd-restore(1), trace-cmd-stack(1), trace-cmd-split(1), trace-cmd-list(1), trace-cmd-listen(1), trace-cmd.dat(5),
trace-cmd-check-events(1)
AUTHOR
Written by Steven Rostedt, <rostedt@goodmis.org[1]>
RESOURCES
git://git.kernel.org/pub/scm/linux/kernel/git/rostedt/trace-cmd.git
COPYING
Copyright (C) 2010 Red Hat, Inc. Free use of this software is granted under the terms of the GNU Public License (GPL).
NOTES
1. rostedt@goodmis.org
mailto:rostedt@goodmis.org
06/11/2014 TRACE-CMD(1)