1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
|
/*
* Shared library add-on to iptables to add SECMARK target support.
*
* Based on the MARK target.
*
* Copyright (C) 2006 Red Hat, Inc., James Morris <jmorris@redhat.com>
*/
#include <stdio.h>
#include <string.h>
#include <stdlib.h>
#include <getopt.h>
#include <iptables.h>
#include <linux/netfilter/xt_SECMARK.h>
#define PFX "SECMARK target: "
static void help(void)
{
printf(
"SECMARK target v%s options:\n"
" --selctx value Set the SELinux security context\n"
"\n",
IPTABLES_VERSION);
}
static struct option opts[] = {
{ "selctx", 1, 0, '1' },
{ 0 }
};
/* Initialize the target. */
static void init(struct xt_entry_target *t, unsigned int *nfcache)
{ }
/*
* Function which parses command options; returns true if it
* ate an option.
*/
static int parse(int c, char **argv, int invert, unsigned int *flags,
const void *entry, struct xt_entry_target **target)
{
struct xt_secmark_target_info *info =
(struct xt_secmark_target_info*)(*target)->data;
switch (c) {
case '1':
if (*flags & SECMARK_MODE_SEL)
exit_error(PARAMETER_PROBLEM, PFX
"Can't specify --selctx twice");
info->mode = SECMARK_MODE_SEL;
if (strlen(optarg) > SECMARK_SELCTX_MAX-1)
exit_error(PARAMETER_PROBLEM, PFX
"Maximum length %u exceeded by --selctx"
" parameter (%zu)",
SECMARK_SELCTX_MAX-1, strlen(optarg));
strcpy(info->u.sel.selctx, optarg);
*flags |= SECMARK_MODE_SEL;
break;
default:
return 0;
}
return 1;
}
static void final_check(unsigned int flags)
{
if (!flags)
exit_error(PARAMETER_PROBLEM, PFX "parameter required");
}
static void print_secmark(struct xt_secmark_target_info *info)
{
switch (info->mode) {
case SECMARK_MODE_SEL:
printf("selctx %s ", info->u.sel.selctx);\
break;
default:
exit_error(OTHER_PROBLEM, PFX "invalid mode %hhu\n", info->mode);
}
}
static void print(const void *ip,
const struct xt_entry_target *target, int numeric)
{
struct xt_secmark_target_info *info =
(struct xt_secmark_target_info*)(target)->data;
printf("SECMARK ");
print_secmark(info);
}
/* Saves the target info in parsable form to stdout. */
static void save(const void *ip, const struct xt_entry_target *target)
{
struct xt_secmark_target_info *info =
(struct xt_secmark_target_info*)target->data;
printf("--");
print_secmark(info);
}
static struct iptables_target secmark = {
.next = NULL,
.name = "SECMARK",
.version = IPTABLES_VERSION,
.revision = 0,
.size = IPT_ALIGN(sizeof(struct xt_secmark_target_info)),
.userspacesize = IPT_ALIGN(sizeof(struct xt_secmark_target_info)),
.help = &help,
.init = &init,
.parse = &parse,
.final_check = &final_check,
.print = &print,
.save = &save,
.extra_opts = opts
};
void _init(void)
{
register_target(&secmark);
}
|