update to iptables-1.3.8
[iptables.git] / extensions / libip6t_SECMARK.c
diff --git a/extensions/libip6t_SECMARK.c b/extensions/libip6t_SECMARK.c
new file mode 100644 (file)
index 0000000..8fbae05
--- /dev/null
@@ -0,0 +1,125 @@
+/*
+ * Shared library add-on to iptables to add SECMARK target support.
+ *
+ * Based on the MARK target.
+ *
+ * IPv6 version.
+ *
+ * Copyright (C) 2006 Red Hat, Inc., James Morris <jmorris@redhat.com>
+ */
+#include <stdio.h>
+#include <string.h>
+#include <stdlib.h>
+#include <getopt.h>
+#include <ip6tables.h>
+#include <linux/netfilter/xt_SECMARK.h>
+
+#define PFX "SECMARK target: "
+
+static void help(void)
+{
+       printf(
+"SECMARK target v%s options:\n"
+"  --selctx value                     Set the SELinux security context\n"
+"\n",
+IPTABLES_VERSION);
+}
+
+static struct option opts[] = {
+       { "selctx", 1, 0, '1' },
+       { 0 }
+};
+
+/* Initialize the target. */
+static void init(struct ip6t_entry_target *t, unsigned int *nfcache)
+{ }
+
+/*
+ * Function which parses command options; returns true if it
+ * ate an option.
+ */
+static int parse(int c, char **argv, int invert, unsigned int *flags,
+                 const struct ip6t_entry *entry, struct ip6t_entry_target **target)
+{
+       struct xt_secmark_target_info *info =
+               (struct xt_secmark_target_info*)(*target)->data;
+
+       switch (c) {
+       case '1':
+               if (*flags & SECMARK_MODE_SEL)
+                       exit_error(PARAMETER_PROBLEM, PFX
+                                  "Can't specify --selctx twice");
+               info->mode = SECMARK_MODE_SEL;
+
+               if (strlen(optarg) > SECMARK_SELCTX_MAX-1)
+                       exit_error(PARAMETER_PROBLEM, PFX
+                                  "Maximum length %u exceeded by --selctx"
+                                  " parameter (%zu)",
+                                  SECMARK_SELCTX_MAX-1, strlen(optarg));
+
+               strcpy(info->u.sel.selctx, optarg);
+               *flags |= SECMARK_MODE_SEL;
+               break;
+       default:
+               return 0;
+       }
+
+       return 1;
+}
+
+static void final_check(unsigned int flags)
+{
+       if (!flags)
+               exit_error(PARAMETER_PROBLEM, PFX "parameter required");
+}
+
+static void print_secmark(struct xt_secmark_target_info *info)
+{
+       switch (info->mode) {
+       case SECMARK_MODE_SEL:
+               printf("selctx %s ", info->u.sel.selctx);\
+               break;
+       
+       default:
+               exit_error(OTHER_PROBLEM, PFX "invalid mode %hhu\n", info->mode);
+       }
+}
+
+static void print(const struct ip6t_ip6 *ip,
+                 const struct ip6t_entry_target *target, int numeric)
+{
+       struct xt_secmark_target_info *info =
+               (struct xt_secmark_target_info*)(target)->data;
+
+       printf("SECMARK ");
+       print_secmark(info);
+}
+
+/* Saves the target info in parsable form to stdout. */
+static void save(const struct ip6t_ip6 *ip, const struct ip6t_entry_target *target)
+{
+       struct xt_secmark_target_info *info =
+               (struct xt_secmark_target_info*)target->data;
+
+       printf("--");
+       print_secmark(info);
+}
+
+static struct ip6tables_target secmark = {
+       .name           = "SECMARK",
+       .version        = IPTABLES_VERSION,
+       .size           = IP6T_ALIGN(sizeof(struct xt_secmark_target_info)),
+       .userspacesize  = IP6T_ALIGN(sizeof(struct xt_secmark_target_info)),
+       .help           = &help,
+       .init           = &init,
+       .parse          = &parse,
+       .final_check    = &final_check,
+       .print          = &print,
+       .save           = &save,
+       .extra_opts     = opts
+};
+
+void _init(void)
+{
+       register_target6(&secmark);
+}