summaryrefslogtreecommitdiffstats
path: root/extensions/libxt_SECMARK.c
blob: 24249bd618ffed8a2d2496bbcf2e91aa704ba3eb (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
/*
 * Shared library add-on to iptables to add SECMARK target support.
 *
 * Based on the MARK target.
 *
 * Copyright (C) 2006 Red Hat, Inc., James Morris <jmorris@redhat.com>
 */
#include <stdio.h>
#include <xtables.h>
#include <linux/netfilter/xt_SECMARK.h>

#define PFX "SECMARK target: "

enum {
	O_SELCTX = 0,
};

static void SECMARK_help(void)
{
	printf(
"SECMARK target options:\n"
"  --selctx value                     Set the SELinux security context\n");
}

static const struct xt_option_entry SECMARK_opts[] = {
	{.name = "selctx", .id = O_SELCTX, .type = XTTYPE_STRING,
	 .flags = XTOPT_MAND | XTOPT_PUT,
	 XTOPT_POINTER(struct xt_secmark_target_info, secctx)},
	XTOPT_TABLEEND,
};

static const struct xt_option_entry SECMARK_opts_v1[] = {
	{.name = "selctx", .id = O_SELCTX, .type = XTTYPE_STRING,
	 .flags = XTOPT_MAND | XTOPT_PUT,
	 XTOPT_POINTER(struct xt_secmark_target_info_v1, secctx)},
	XTOPT_TABLEEND,
};

static void SECMARK_parse(struct xt_option_call *cb)
{
	struct xt_secmark_target_info *info = cb->data;

	xtables_option_parse(cb);
	info->mode = SECMARK_MODE_SEL;
}

static void SECMARK_parse_v1(struct xt_option_call *cb)
{
	struct xt_secmark_target_info_v1 *info = cb->data;

	xtables_option_parse(cb);
	info->mode = SECMARK_MODE_SEL;
}

static void print_secmark(__u8 mode, const char *secctx)
{
	switch (mode) {
	case SECMARK_MODE_SEL:
		printf("selctx %s", secctx);
		break;

	default:
		xtables_error(OTHER_PROBLEM, PFX "invalid mode %hhu\n", mode);
	}
}

static void SECMARK_print(const void *ip, const struct xt_entry_target *target,
                          int numeric)
{
	const struct xt_secmark_target_info *info =
		(struct xt_secmark_target_info*)(target)->data;

	printf(" SECMARK ");
	print_secmark(info->mode, info->secctx);
}

static void SECMARK_print_v1(const void *ip,
			     const struct xt_entry_target *target, int numeric)
{
	const struct xt_secmark_target_info_v1 *info =
		(struct xt_secmark_target_info_v1 *)(target)->data;

	printf(" SECMARK ");
	print_secmark(info->mode, info->secctx);
}

static void SECMARK_save(const void *ip, const struct xt_entry_target *target)
{
	const struct xt_secmark_target_info *info =
		(struct xt_secmark_target_info*)target->data;

	printf(" --");
	print_secmark(info->mode, info->secctx);
}

static void SECMARK_save_v1(const void *ip,
			    const struct xt_entry_target *target)
{
	const struct xt_secmark_target_info_v1 *info =
		(struct xt_secmark_target_info_v1 *)target->data;

	printf(" --");
	print_secmark(info->mode, info->secctx);
}

static struct xtables_target secmark_tg_reg[] = {
	{
		.family		= NFPROTO_UNSPEC,
		.name		= "SECMARK",
		.version	= XTABLES_VERSION,
		.revision	= 0,
		.size		= XT_ALIGN(sizeof(struct xt_secmark_target_info)),
		.userspacesize	= XT_ALIGN(sizeof(struct xt_secmark_target_info)),
		.help		= SECMARK_help,
		.print		= SECMARK_print,
		.save		= SECMARK_save,
		.x6_parse	= SECMARK_parse,
		.x6_options	= SECMARK_opts,
	},
	{
		.family		= NFPROTO_UNSPEC,
		.name		= "SECMARK",
		.version	= XTABLES_VERSION,
		.revision	= 1,
		.size		= XT_ALIGN(sizeof(struct xt_secmark_target_info_v1)),
		.userspacesize	= XT_ALIGN(offsetof(struct xt_secmark_target_info_v1, secid)),
		.help		= SECMARK_help,
		.print		= SECMARK_print_v1,
		.save		= SECMARK_save_v1,
		.x6_parse	= SECMARK_parse_v1,
		.x6_options	= SECMARK_opts_v1,
	}
};

void _init(void)
{
	xtables_register_targets(secmark_tg_reg, ARRAY_SIZE(secmark_tg_reg));
}