Problem in registering new netfilter target module


 
Thread Tools Search this Thread
Top Forums Programming Problem in registering new netfilter target module
# 1  
Old 11-09-2005
Problem in registering new netfilter target module

Friends I'm facing a big problem trying to extend the netfilter. Somone please help me with your quick reply (any hint) as I've to meet a deadline.

My problem is that I've written a new netfilter target module and its corresponding userspace program for iptables to change the packet type of a packet. I compiled the iptables and kernel without any error and installed this new kernel (with newly compiled parameters) in my boot partition.

Next when I booted into this kernel and tried using this target it gives error "invalid argument" which I think is coming because the target module is not geting loaded (as on failure it returns EINVAL).

Now can anyone tell me what may b the problem.
I think I can summarise my problem as what can b pozbl. reasons for which any kernel module not get registered.
Login or Register to Ask a Question

Previous Thread | Next Thread

9 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Problem with ssh on target server.

ssh works from source server srcuser@10.8.44.13 to all other target servers except one which is target server trguser@10.8.44.43 On target the <trguser-home>/.ssh folder is set to permission 700 and authorized_keys file is set to permissions 600 cksum for id_rsa.pub on source 10.8.44.13 and... (8 Replies)
Discussion started by: mohtashims
8 Replies

2. HP-UX

After adding new iscsi target port, still the session state of that target port is showing offline

Hi, I wanted to configure new iscsi port on HPUX system, i added the target port address and configured it, once done, went to array side and searched for that host iqn number , but was nt able to find the same, came to host, then when i ran "iscsiutil -pVS" command it gave me below result ... (0 Replies)
Discussion started by: Vinay Kumar D
0 Replies

3. Red Hat

Problem registering a new system

Hi, A registered a new system the other day using the subscription-manager (RedHat ES6, Academic edition) but it's not showing up on the web site so that I can entitle it and get updates, etc. Any ideas? ~ Rob (1 Reply)
Discussion started by: caspersgrin
1 Replies

4. UNIX for Advanced & Expert Users

Problem loading cpufreq module

I'd like to install cpufreq modules on my server . I tried sudo modprobe acpi-cpufreq but got the error FATAL: Error inserting acpi_cpufreq (/lib/modules/2.6.18-238.12.1.el5xen/kernel/arch/x86_64/kernel/cpufreq/acpi-cpufreq.ko): No such device cat /proc/cpuinfo gives this ... (11 Replies)
Discussion started by: vishwamitra
11 Replies

5. UNIX for Advanced & Expert Users

problem with netfilter hook function struct skbuff *sock is null..

iam trying to built a firewall.so i have used netfilter for it. in function main_hook sock_buff is returning null and in my log file continuously "sock buff null" is printed plse help to solve this problem.. (using print_string iam printing strings on current terminal (terminal we ping)) ... (1 Reply)
Discussion started by: pavan6754
1 Replies

6. UNIX for Advanced & Expert Users

Kernel module compilation problem

I have one big module 2.6.18 kernel mod.c I want to divide this to several files. The problem is to write right Makefile lib1.h lib1.c mod.c mod.c works fine normally but when I divide into several files and try to compile with this makefile obj-m := mod.o mod-objs := lib1.o ... (3 Replies)
Discussion started by: marcintom
3 Replies

7. Shell Programming and Scripting

Compatibility problem of Tk Module in different versions

Hi, I am using Tk module in perl 5.6 and it is working fine. Now when i installed the newer version 5.10.0 then getting error that Tk module not found. But i will have to work on this newer verison only to use some other modules of perl. I want to know why Tk module is not working in newer... (6 Replies)
Discussion started by: kunal_dixit
6 Replies

8. Red Hat

Problem with kernel-module-ntfs

Hi All Im trying to access the my windows XP NTFS from Redhat linux 4.0 Enterprise edition I have downloaded the respective rpm And im able to install it successfully Then i have given the following command , but got an error Here are my partitions And when i give the below... (1 Reply)
Discussion started by: balumankala
1 Replies

9. Programming

Basic multi module problem

I am trying to learn how to use multiple modules and hearder files. I have tried a little experiment but cannot get it to work. Here is my code and compilation attempt. Any help with finding my problems appreciated. The main function (main01.c) calls a function located in another file... (9 Replies)
Discussion started by: enuenu
9 Replies
Login or Register to Ask a Question
CONNTRACKD(8)															     CONNTRACKD(8)

NAME
conntrackd - netfilter connection tracking user-space daemon SYNOPSIS
conntrackd [options] DESCRIPTION
conntrackd is the user-space daemon for the netfilter connection tracking system. This daemon synchronizes connection tracking states between several replica firewalls. Thus, conntrackd can be used to deploy highly available stateful firewalls. The daemon supports Primary- Backup and Multiprimary setups. The daemon can also be used as statistics collector. OPTIONS
The options recognized by conntrackd can be divided into several different groups. MODES These options specify the particular operation mode in which conntrackd runs. Only one of them can be specified at any given time. -d Run conntrackd in daemon mode. CLIENT COMMANDS conntrackd can be used in client mode to request several information and operations to a running daemon -i [ct|expect]" Dump the internal cache, i.e. show local states -e [ct|expect]" Dump the external cache, i.e. show foreign states -x Display output in XML format. This option is only valid in combination with "-i" and "-e" parameters. -f [|internal|external] Flush the internal and/or external cache -F [ct|expect] Flush the kernel conntrack table (if you use a Linux kernel >= 2.6.29, this option will not flush your internal and external cache). -c Commit external cache to conntrack table. -B Force a bulk send to other replica firewalls. With this command, you will ask conntrackd to send the state-entries that it owns to others. -n Request resync with other node (only FT-FW and NOTRACK modes). -k Kill the daemon -s [|network|cache|runtime|link|rsqueue|process|queue|ct|expect] Dump statistics. If no parameter is passed, it displays the general statistics. If "network" is passed as parameter it displays the networking statistics. If "cache" is passed as parameter, it shows the extended cache statistics. If "runtime" is passed as param- eter, it shows the run-time statistics. If "process" is passed as parameter, it shows existing child processes (if any). If "queue" is passed as parameter, it shows queue statistics. If "ct" is passed, it displays the general statistics. If "expect" is passed as parameter, it shows expectation statistics. -R [ct|expect] Force a resync against the kernel connection tracking table -t Reset the in-kernel timers (See PurgeTimeout clause) -v Display version information. -h Display help information. -C config file Configuration file path. DIAGNOSTICS The exit code is 0 for correct function. Errors cause an exit code of 1. EXAMPLES
The following example are illustrative, for a real use in a firewall fail-over, check the primary-backup.sh script that comes with the sources. conntrackd -d Runs conntrackd in daemon and synchronization mode conntrackd -i Dumps the states held in the internal cache, i.e. those handled by this firewall conntrackd -e Dumps the states held in the external cache, i.e. those handled by other replica firewalls conntrackd -c Commits the external cache into the kernel connection tracking system. This is used to inject the state so that the connections can be recovered during the failover. DEPENDENCIES
This daemon requires a Linux kernel version >= 2.6.18. TCP window tracking support requires >= 2.6.22, otherwise you have to disable it. Helpers are fully supported since >= 2.6.25, however, if you use any previous version, depending on the protocol helper and your setup (e.g. if you setup performs NAT sequence adjustments or not), your help connection may be successfully recovered. There are several unsupported stateful iptables matches such as recent, connbytes and the quota matches which gather internal information to operate. Since that information does not belong to the domain of the connection tracking system, connections affected by those matches may not be fully recovered during the takeover. The daemon requires a Linux kernel version >= 2.6.26 to support kernel-space event filtering. Otherwise, all the event filtering is done in userspace with the corresponding extra overhead. If you are not using the Filter clause in the configuration file, ignore this notice. INCOMPATIBILITIES
During the 0.9.9 development, some important changes in the replication message format were introduced. Therefore, conntrackd >= 0.9.9 will not work appropriately with conntrackd <= 0.9.8. This should not be a problem if you use the same conntrackd version in all the firewall replica nodes. SEE ALSO
conntrack(8),iptables(8) See http://conntrack-tools.netfilter.org BUGS
Please, report them to netfilter-devel@vger.kernel.org or file a bug in Netfilter's bugzilla (https://bugzilla.netfilter.org). AUTHORS
Pablo Neira Ayuso wrote and maintains the conntrackd tool Please send bug reports to <netfilter-devel@lists.netfilter.org>. Subscription is required. Man page written by Pablo Neira Ayuso <pablo@netfilter.org>. Oct 21, 2008 CONNTRACKD(8)