Hi,
On Thu, 2015-06-18 at 17:12 +0530, Vidhya Govindan wrote:
> static int insert_managed_chain(const char *table_name, int id)
> {
> char *rule, *managed_chain;
> int err;
>
> managed_chain = g_strdup_printf("%s%s", CHAIN_PREFIX,
> builtin_chains[id]);
>
> DBG("T%s C %s", table_name, managed_chain);
> err = __connman_iptables_new_chain(table_name, managed_chain);
> if (err < 0)
> goto out;
>
> rule = g_strdup_printf("-j %s", managed_chain);
> DBG("T%s C %s R %s ID %d", table_name, builtin_chains[id],
> rule, id);
> //err = __connman_iptables_insert(table_name, builtin_chains[id],
> rule);
> /* err = __connman_iptables_insert(table_name, managed_chain, rule);
> g_free(rule);
> if (err < 0) {
> __connman_iptables_delete_chain(table_name, managed_chain);
> goto out;
> */
>
> ------------------------------------------------------------------------------------------------
> By commenting the lines shown above, we are able to run connmand without
> any problems.
> As this is seems to be a dirty hack, we want to do it in a clean manner.
>
> Can you please suggest which way we can use?
>From where does this function get called if it manages to prevent
ConnMan from running? BTW, does ConnMan close down or what happens?
Cheers,
Patrik
_______________________________________________
connman mailing list
[email protected]
https://lists.connman.net/mailman/listinfo/connman