https://github.com/torvalds/linux
Raw File
Tip revision: 9f737633e6ee54fc174282d49b2559bd2208391d authored by Linus Torvalds on 06 August 2006, 18:20:11 UTC
Linux v2.6.18-rc4
Tip revision: 9f73763
xt_CONNSECMARK.c
/*
 * This module is used to copy security markings from packets
 * to connections, and restore security markings from connections
 * back to packets.  This would normally be performed in conjunction
 * with the SECMARK target and state match.
 *
 * Based somewhat on CONNMARK:
 *   Copyright (C) 2002,2004 MARA Systems AB <http://www.marasystems.com>
 *    by Henrik Nordstrom <hno@marasystems.com>
 *
 * (C) 2006 Red Hat, Inc., James Morris <jmorris@redhat.com>
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License version 2 as
 * published by the Free Software Foundation.
 *
 */
#include <linux/module.h>
#include <linux/skbuff.h>
#include <linux/netfilter/x_tables.h>
#include <linux/netfilter/xt_CONNSECMARK.h>
#include <net/netfilter/nf_conntrack_compat.h>

#define PFX "CONNSECMARK: "

MODULE_LICENSE("GPL");
MODULE_AUTHOR("James Morris <jmorris@redhat.com>");
MODULE_DESCRIPTION("ip[6]tables CONNSECMARK module");
MODULE_ALIAS("ipt_CONNSECMARK");
MODULE_ALIAS("ip6t_CONNSECMARK");

/*
 * If the packet has a security mark and the connection does not, copy
 * the security mark from the packet to the connection.
 */
static void secmark_save(struct sk_buff *skb)
{
	if (skb->secmark) {
		u32 *connsecmark;
		enum ip_conntrack_info ctinfo;

		connsecmark = nf_ct_get_secmark(skb, &ctinfo);
		if (connsecmark && !*connsecmark)
			if (*connsecmark != skb->secmark)
				*connsecmark = skb->secmark;
	}
}

/*
 * If packet has no security mark, and the connection does, restore the
 * security mark from the connection to the packet.
 */
static void secmark_restore(struct sk_buff *skb)
{
	if (!skb->secmark) {
		u32 *connsecmark;
		enum ip_conntrack_info ctinfo;

		connsecmark = nf_ct_get_secmark(skb, &ctinfo);
		if (connsecmark && *connsecmark)
			if (skb->secmark != *connsecmark)
				skb->secmark = *connsecmark;
	}
}

static unsigned int target(struct sk_buff **pskb, const struct net_device *in,
			   const struct net_device *out, unsigned int hooknum,
			   const struct xt_target *target,
			   const void *targinfo, void *userinfo)
{
	struct sk_buff *skb = *pskb;
	const struct xt_connsecmark_target_info *info = targinfo;

	switch (info->mode) {
	case CONNSECMARK_SAVE:
		secmark_save(skb);
		break;

	case CONNSECMARK_RESTORE:
		secmark_restore(skb);
		break;

	default:
		BUG();
	}

	return XT_CONTINUE;
}

static int checkentry(const char *tablename, const void *entry,
		      const struct xt_target *target, void *targinfo,
		      unsigned int targinfosize, unsigned int hook_mask)
{
	struct xt_connsecmark_target_info *info = targinfo;

	switch (info->mode) {
	case CONNSECMARK_SAVE:
	case CONNSECMARK_RESTORE:
		break;

	default:
		printk(KERN_INFO PFX "invalid mode: %hu\n", info->mode);
		return 0;
	}

	return 1;
}

static struct xt_target ipt_connsecmark_reg = {
	.name		= "CONNSECMARK",
	.target		= target,
	.targetsize	= sizeof(struct xt_connsecmark_target_info),
	.table		= "mangle",
	.checkentry	= checkentry,
	.me		= THIS_MODULE,
	.family		= AF_INET,
	.revision	= 0,
};

static struct xt_target ip6t_connsecmark_reg = {
	.name		= "CONNSECMARK",
	.target		= target,
	.targetsize	= sizeof(struct xt_connsecmark_target_info),
	.table		= "mangle",
	.checkentry	= checkentry,
	.me		= THIS_MODULE,
	.family		= AF_INET6,
	.revision	= 0,
};

static int __init xt_connsecmark_init(void)
{
	int err;

	need_conntrack();

	err = xt_register_target(&ipt_connsecmark_reg);
	if (err)
		return err;

	err = xt_register_target(&ip6t_connsecmark_reg);
	if (err)
		xt_unregister_target(&ipt_connsecmark_reg);

	return err;
}

static void __exit xt_connsecmark_fini(void)
{
	xt_unregister_target(&ip6t_connsecmark_reg);
	xt_unregister_target(&ipt_connsecmark_reg);
}

module_init(xt_connsecmark_init);
module_exit(xt_connsecmark_fini);
back to top