Hi

Thanks for your responses.

Please find the logs below which is coming when I run connmand

connmand[4691]: src/ipconfig.c:__connman_ipconfig_init()
connmand[4691]: src/rtnl.c:__connman_rtnl_init()
connmand[4691]: src/task.c:__connman_task_init()
connmand[4691]: src/proxy.c:__connman_proxy_init()
connmand[4691]: src/detect.c:__connman_detect_init()
connmand[4691]: src/rtnl.c:connman_rtnl_register() rtnl 0xa2448 name detect
connmand[4691]: src/session.c:__connman_session_init()
connmand[4691]: src/notifier.c:connman_notifier_register() notifier 0xa2510
name session
connmand[4691]: src/firewall.c:__connman_firewall_enable() mangle INPUT -j
CONNMARK --restore-mark
connmand[4691]: src/firewall.c:insert_managed_rule() table mangle add
managed chain for INPUT
connmand[4691]: src/iptables.c:__connman_iptables_new_chain() -t mangle -N
connman-INPUT
connmand[4691]: src/iptables.c:iptables_init() mangle
connmand[4691]: src/iptables.c:iptables_add_chain() table mangle chain
connman-INPUT
connmand[4691]: src/iptables.c:__connman_iptables_insert() -t mangle -I
INPUT -j connman-INPUT
(null) v(null): Couldn't load target `standard':No such file or directory

---------------------------------------------------------------------------
On debugging we found that in function __connman_iptables_insert() -I
option is expecting target name which is already added to the chain.
iptables_add_chain() - is adding target name connman-INPUT to chain, but
while __connman_iptables_insert -I instead of connman-INPUT, -I INPUT is
given. There fore it results in error could not load target which is not in
chain.

On debugging further we found that it is called in firewall.c,
static int insert_managed_chain(const char *table_name, int id)
{
        char *rule, *managed_chain;
        int err;

        managed_chain = g_strdup_printf("%s%s", CHAIN_PREFIX,
                                        builtin_chains[id]);

                DBG("T%s C %s", table_name, managed_chain);
        err = __connman_iptables_new_chain(table_name, managed_chain);
        if (err < 0)
                goto out;

        rule = g_strdup_printf("-j %s", managed_chain);
                DBG("T%s C %s R %s ID %d", table_name, builtin_chains[id],
rule, id);
        //err = __connman_iptables_insert(table_name, builtin_chains[id],
rule);
/*      err = __connman_iptables_insert(table_name, managed_chain, rule);
        g_free(rule);
        if (err < 0) {
                __connman_iptables_delete_chain(table_name, managed_chain);
                goto out;
*/

------------------------------------------------------------------------------------------------
By commenting the lines shown above, we are able to run connmand without
any problems.
As this is seems to be a dirty hack, we want to do it in a clean manner.

Can you please suggest which way we can use?

Thanks,
Vidhya


On Thu, Jun 18, 2015 at 3:24 PM, Vidhya Govindan <unicvid...@gmail.com>
wrote:

> Hi,
>
> Could you please let us know how we can disable firewall support in
> connman.
> There are some problems I am facing when I am running firewall. So want to
> test by disabling it.
>
> Thanks in advance.
>
> Vidhya
>
_______________________________________________
connman mailing list
connman@connman.net
https://lists.connman.net/mailman/listinfo/connman

Reply via email to