[PATCH] libnetfilter_queue: Add information about retrieving UID/GID/SECCTX fields

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



From: Piotr Radoslaw Sawicki <piotr.sawicki@xxxxxxxxx>

Add information about retrieving UID/GID/SECCTX fields

Signed-off-by: Piotr Radoslaw Sawicki <piotr.sawicki@xxxxxxxxx>
---
 src/libnetfilter_queue.c | 19 +++++++++++++++++++
 1 file changed, 19 insertions(+)

diff --git a/src/libnetfilter_queue.c b/src/libnetfilter_queue.c
index 1702158..4002687 100644
--- a/src/libnetfilter_queue.c
+++ b/src/libnetfilter_queue.c
@@ -698,6 +698,13 @@ EXPORT_SYMBOL(nfq_set_mode);
 	flags &= ~NFQA_CFG_F_FAIL_OPEN;
 	err = nfq_set_queue_flags(qh, mask, flags);
 \endverbatim
+ * - NFQA_CFG_F_SECCTX: the kernel will dump security context of the socket to
+ *  which each packet belongs.
+ *
+ *  \warning
+ *  When fragmentation occurs and NFQA_CFG_F_GSO is NOT set then the kernel
+ * dumps UID/GID and security context fields only for one fragment. To deal with
+ *  this limitation always set NFQA_CFG_F_GSO.
  *
  * \return -1 on error with errno set appropriately; =0 otherwise.
  */
@@ -1201,6 +1208,10 @@ EXPORT_SYMBOL(nfq_get_packet_hw);
 /**
  * nfq_get_uid - get the UID of the user the packet belongs to
  * \param nfad Netlink packet data handle passed to callback function
+ * \warning If the NFQA_CFG_F_GSO flag is not set, then fragmented packets
+ *       may be pushed into the queue. In this case, only one fragment will
+ *       have the UID field set. To deal with this issue always set
+ *       NFQA_CFG_F_GSO.
  *
  * \return 1 if there is a UID available, 0 otherwise.
  */
@@ -1217,6 +1228,10 @@ EXPORT_SYMBOL(nfq_get_uid);
 /**
  * nfq_get_gid - get the GID of the user the packet belongs to
  * \param nfad Netlink packet data handle passed to callback function
+ * \warning If the NFQA_CFG_F_GSO flag is not set, then fragmented packets
+ *       may be pushed into the queue. In this case, only one fragment will
+ *       have the GID field set. To deal with this issue always set
+ *       NFQA_CFG_F_GSO.
  *
  * \return 1 if there is a GID available, 0 otherwise.
  */
@@ -1235,6 +1250,10 @@ EXPORT_SYMBOL(nfq_get_gid);
  * nfq_get_secctx - get the security context for this packet
  * \param nfad Netlink packet data handle passed to callback function
  * \param secdata data to write the security context to
+ * \warning If the NFQA_CFG_F_GSO flag is not set, then fragmented packets
+ *       may be pushed into the queue. In this case, only one fragment will
+ *       have the SECCTX field set. To deal with this issue always set
+ *       NFQA_CFG_F_GSO.
  *
  * \return -1 on error, otherwise > 0
  */
--
2.7.4

--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [Netfitler Users]     [LARTC]     [Bugtraq]     [Yosemite Forum]

  Powered by Linux