Hi,

On Thu, 2015-06-18 at 17:12 +0530, Vidhya Govindan wrote:
> static int insert_managed_chain(const char *table_name, int id)
> {
>         char *rule, *managed_chain;
>         int err;
> 
>         managed_chain = g_strdup_printf("%s%s", CHAIN_PREFIX,
>                                         builtin_chains[id]);
> 
>                 DBG("T%s C %s", table_name, managed_chain);
>         err = __connman_iptables_new_chain(table_name, managed_chain);
>         if (err < 0)
>                 goto out;
> 
>         rule = g_strdup_printf("-j %s", managed_chain);
>                 DBG("T%s C %s R %s ID %d", table_name, builtin_chains[id],
> rule, id);
>         //err = __connman_iptables_insert(table_name, builtin_chains[id],
> rule);
> /*      err = __connman_iptables_insert(table_name, managed_chain, rule);
>         g_free(rule);
>         if (err < 0) {
>                 __connman_iptables_delete_chain(table_name, managed_chain);
>                 goto out;
> */
> 
> ------------------------------------------------------------------------------------------------
> By commenting the lines shown above, we are able to run connmand without
> any problems.
> As this is seems to be a dirty hack, we want to do it in a clean manner.
> 
> Can you please suggest which way we can use?

>From where does this function get called if it manages to prevent
ConnMan from running? BTW, does ConnMan close down or what happens?

Cheers,

        Patrik

_______________________________________________
connman mailing list
[email protected]
https://lists.connman.net/mailman/listinfo/connman

Reply via email to