|  | /* | 
|  | * Module for modifying the secmark field of the skb, for use by | 
|  | * security subsystems. | 
|  | * | 
|  | * Based on the nfmark match by: | 
|  | * (C) 1999-2001 Marc Boucher <marc@mbsi.ca> | 
|  | * | 
|  | * (C) 2006,2008 Red Hat, Inc., James Morris <jmorris@redhat.com> | 
|  | * | 
|  | * This program is free software; you can redistribute it and/or modify | 
|  | * it under the terms of the GNU General Public License version 2 as | 
|  | * published by the Free Software Foundation. | 
|  | * | 
|  | */ | 
|  | #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt | 
|  | #include <linux/module.h> | 
|  | #include <linux/security.h> | 
|  | #include <linux/skbuff.h> | 
|  | #include <linux/netfilter/x_tables.h> | 
|  | #include <linux/netfilter/xt_SECMARK.h> | 
|  |  | 
|  | MODULE_LICENSE("GPL"); | 
|  | MODULE_AUTHOR("James Morris <jmorris@redhat.com>"); | 
|  | MODULE_DESCRIPTION("Xtables: packet security mark modification"); | 
|  | MODULE_ALIAS("ipt_SECMARK"); | 
|  | MODULE_ALIAS("ip6t_SECMARK"); | 
|  |  | 
|  | #define PFX "SECMARK: " | 
|  |  | 
|  | static u8 mode; | 
|  |  | 
|  | static unsigned int | 
|  | secmark_tg(struct sk_buff *skb, const struct xt_action_param *par) | 
|  | { | 
|  | u32 secmark = 0; | 
|  | const struct xt_secmark_target_info *info = par->targinfo; | 
|  |  | 
|  | BUG_ON(info->mode != mode); | 
|  |  | 
|  | switch (mode) { | 
|  | case SECMARK_MODE_SEL: | 
|  | secmark = info->secid; | 
|  | break; | 
|  | default: | 
|  | BUG(); | 
|  | } | 
|  |  | 
|  | skb->secmark = secmark; | 
|  | return XT_CONTINUE; | 
|  | } | 
|  |  | 
|  | static int checkentry_lsm(struct xt_secmark_target_info *info) | 
|  | { | 
|  | int err; | 
|  |  | 
|  | info->secctx[SECMARK_SECCTX_MAX - 1] = '\0'; | 
|  | info->secid = 0; | 
|  |  | 
|  | err = security_secctx_to_secid(info->secctx, strlen(info->secctx), | 
|  | &info->secid); | 
|  | if (err) { | 
|  | if (err == -EINVAL) | 
|  | pr_info("invalid security context \'%s\'\n", info->secctx); | 
|  | return err; | 
|  | } | 
|  |  | 
|  | if (!info->secid) { | 
|  | pr_info("unable to map security context \'%s\'\n", info->secctx); | 
|  | return -ENOENT; | 
|  | } | 
|  |  | 
|  | err = security_secmark_relabel_packet(info->secid); | 
|  | if (err) { | 
|  | pr_info("unable to obtain relabeling permission\n"); | 
|  | return err; | 
|  | } | 
|  |  | 
|  | security_secmark_refcount_inc(); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static int secmark_tg_check(const struct xt_tgchk_param *par) | 
|  | { | 
|  | struct xt_secmark_target_info *info = par->targinfo; | 
|  | int err; | 
|  |  | 
|  | if (strcmp(par->table, "mangle") != 0 && | 
|  | strcmp(par->table, "security") != 0) { | 
|  | pr_info("target only valid in the \'mangle\' " | 
|  | "or \'security\' tables, not \'%s\'.\n", par->table); | 
|  | return -EINVAL; | 
|  | } | 
|  |  | 
|  | if (mode && mode != info->mode) { | 
|  | pr_info("mode already set to %hu cannot mix with " | 
|  | "rules for mode %hu\n", mode, info->mode); | 
|  | return -EINVAL; | 
|  | } | 
|  |  | 
|  | switch (info->mode) { | 
|  | case SECMARK_MODE_SEL: | 
|  | break; | 
|  | default: | 
|  | pr_info("invalid mode: %hu\n", info->mode); | 
|  | return -EINVAL; | 
|  | } | 
|  |  | 
|  | err = checkentry_lsm(info); | 
|  | if (err) | 
|  | return err; | 
|  |  | 
|  | if (!mode) | 
|  | mode = info->mode; | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static void secmark_tg_destroy(const struct xt_tgdtor_param *par) | 
|  | { | 
|  | switch (mode) { | 
|  | case SECMARK_MODE_SEL: | 
|  | security_secmark_refcount_dec(); | 
|  | } | 
|  | } | 
|  |  | 
|  | static struct xt_target secmark_tg_reg __read_mostly = { | 
|  | .name       = "SECMARK", | 
|  | .revision   = 0, | 
|  | .family     = NFPROTO_UNSPEC, | 
|  | .checkentry = secmark_tg_check, | 
|  | .destroy    = secmark_tg_destroy, | 
|  | .target     = secmark_tg, | 
|  | .targetsize = sizeof(struct xt_secmark_target_info), | 
|  | .me         = THIS_MODULE, | 
|  | }; | 
|  |  | 
|  | static int __init secmark_tg_init(void) | 
|  | { | 
|  | return xt_register_target(&secmark_tg_reg); | 
|  | } | 
|  |  | 
|  | static void __exit secmark_tg_exit(void) | 
|  | { | 
|  | xt_unregister_target(&secmark_tg_reg); | 
|  | } | 
|  |  | 
|  | module_init(secmark_tg_init); | 
|  | module_exit(secmark_tg_exit); |