d621d35e57
This patch introduces a mechanism for checking when labeled IPsec or SECMARK are in use by keeping introducing a configuration reference counter for each subsystem. In the case of labeled IPsec, whenever a labeled SA or SPD entry is created the labeled IPsec/XFRM reference count is increased and when the entry is removed it is decreased. In the case of SECMARK, when a SECMARK target is created the reference count is increased and later decreased when the target is removed. These reference counters allow SELinux to quickly determine if either of these subsystems are enabled. NetLabel already has a similar mechanism which provides the netlbl_enabled() function. This patch also renames the selinux_relabel_packet_permission() function to selinux_secmark_relabel_packet_permission() as the original name and description were misleading in that they referenced a single packet label which is not the case. Signed-off-by: Paul Moore <paul.moore@hp.com> Signed-off-by: James Morris <jmorris@namei.org>
157 lines
3.6 KiB
C
157 lines
3.6 KiB
C
/*
|
|
* Module for modifying the secmark field of the skb, for use by
|
|
* security subsystems.
|
|
*
|
|
* Based on the nfmark match by:
|
|
* (C) 1999-2001 Marc Boucher <marc@mbsi.ca>
|
|
*
|
|
* (C) 2006 Red Hat, Inc., James Morris <jmorris@redhat.com>
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License version 2 as
|
|
* published by the Free Software Foundation.
|
|
*
|
|
*/
|
|
#include <linux/module.h>
|
|
#include <linux/skbuff.h>
|
|
#include <linux/selinux.h>
|
|
#include <linux/netfilter/x_tables.h>
|
|
#include <linux/netfilter/xt_SECMARK.h>
|
|
|
|
MODULE_LICENSE("GPL");
|
|
MODULE_AUTHOR("James Morris <jmorris@redhat.com>");
|
|
MODULE_DESCRIPTION("Xtables: packet security mark modification");
|
|
MODULE_ALIAS("ipt_SECMARK");
|
|
MODULE_ALIAS("ip6t_SECMARK");
|
|
|
|
#define PFX "SECMARK: "
|
|
|
|
static u8 mode;
|
|
|
|
static unsigned int
|
|
secmark_tg(struct sk_buff *skb, const struct net_device *in,
|
|
const struct net_device *out, unsigned int hooknum,
|
|
const struct xt_target *target, const void *targinfo)
|
|
{
|
|
u32 secmark = 0;
|
|
const struct xt_secmark_target_info *info = targinfo;
|
|
|
|
BUG_ON(info->mode != mode);
|
|
|
|
switch (mode) {
|
|
case SECMARK_MODE_SEL:
|
|
secmark = info->u.sel.selsid;
|
|
break;
|
|
|
|
default:
|
|
BUG();
|
|
}
|
|
|
|
skb->secmark = secmark;
|
|
return XT_CONTINUE;
|
|
}
|
|
|
|
static bool checkentry_selinux(struct xt_secmark_target_info *info)
|
|
{
|
|
int err;
|
|
struct xt_secmark_target_selinux_info *sel = &info->u.sel;
|
|
|
|
sel->selctx[SECMARK_SELCTX_MAX - 1] = '\0';
|
|
|
|
err = selinux_string_to_sid(sel->selctx, &sel->selsid);
|
|
if (err) {
|
|
if (err == -EINVAL)
|
|
printk(KERN_INFO PFX "invalid SELinux context \'%s\'\n",
|
|
sel->selctx);
|
|
return false;
|
|
}
|
|
|
|
if (!sel->selsid) {
|
|
printk(KERN_INFO PFX "unable to map SELinux context \'%s\'\n",
|
|
sel->selctx);
|
|
return false;
|
|
}
|
|
|
|
err = selinux_secmark_relabel_packet_permission(sel->selsid);
|
|
if (err) {
|
|
printk(KERN_INFO PFX "unable to obtain relabeling permission\n");
|
|
return false;
|
|
}
|
|
|
|
selinux_secmark_refcount_inc();
|
|
return true;
|
|
}
|
|
|
|
static bool
|
|
secmark_tg_check(const char *tablename, const void *entry,
|
|
const struct xt_target *target, void *targinfo,
|
|
unsigned int hook_mask)
|
|
{
|
|
struct xt_secmark_target_info *info = targinfo;
|
|
|
|
if (mode && mode != info->mode) {
|
|
printk(KERN_INFO PFX "mode already set to %hu cannot mix with "
|
|
"rules for mode %hu\n", mode, info->mode);
|
|
return false;
|
|
}
|
|
|
|
switch (info->mode) {
|
|
case SECMARK_MODE_SEL:
|
|
if (!checkentry_selinux(info))
|
|
return false;
|
|
break;
|
|
|
|
default:
|
|
printk(KERN_INFO PFX "invalid mode: %hu\n", info->mode);
|
|
return false;
|
|
}
|
|
|
|
if (!mode)
|
|
mode = info->mode;
|
|
return true;
|
|
}
|
|
|
|
void secmark_tg_destroy(const struct xt_target *target, void *targinfo)
|
|
{
|
|
switch (mode) {
|
|
case SECMARK_MODE_SEL:
|
|
selinux_secmark_refcount_dec();
|
|
}
|
|
}
|
|
|
|
static struct xt_target secmark_tg_reg[] __read_mostly = {
|
|
{
|
|
.name = "SECMARK",
|
|
.family = AF_INET,
|
|
.checkentry = secmark_tg_check,
|
|
.destroy = secmark_tg_destroy,
|
|
.target = secmark_tg,
|
|
.targetsize = sizeof(struct xt_secmark_target_info),
|
|
.table = "mangle",
|
|
.me = THIS_MODULE,
|
|
},
|
|
{
|
|
.name = "SECMARK",
|
|
.family = AF_INET6,
|
|
.checkentry = secmark_tg_check,
|
|
.destroy = secmark_tg_destroy,
|
|
.target = secmark_tg,
|
|
.targetsize = sizeof(struct xt_secmark_target_info),
|
|
.table = "mangle",
|
|
.me = THIS_MODULE,
|
|
},
|
|
};
|
|
|
|
static int __init secmark_tg_init(void)
|
|
{
|
|
return xt_register_targets(secmark_tg_reg, ARRAY_SIZE(secmark_tg_reg));
|
|
}
|
|
|
|
static void __exit secmark_tg_exit(void)
|
|
{
|
|
xt_unregister_targets(secmark_tg_reg, ARRAY_SIZE(secmark_tg_reg));
|
|
}
|
|
|
|
module_init(secmark_tg_init);
|
|
module_exit(secmark_tg_exit);
|