|
@@ -22,6 +22,7 @@
|
|
|
#include <linux/rculist_nulls.h>
|
|
|
#include <linux/types.h>
|
|
|
#include <linux/timer.h>
|
|
|
+#include <linux/security.h>
|
|
|
#include <linux/skbuff.h>
|
|
|
#include <linux/errno.h>
|
|
|
#include <linux/netlink.h>
|
|
@@ -245,16 +246,31 @@ nla_put_failure:
|
|
|
|
|
|
#ifdef CONFIG_NF_CONNTRACK_SECMARK
|
|
|
static inline int
|
|
|
-ctnetlink_dump_secmark(struct sk_buff *skb, const struct nf_conn *ct)
|
|
|
+ctnetlink_dump_secctx(struct sk_buff *skb, const struct nf_conn *ct)
|
|
|
{
|
|
|
- NLA_PUT_BE32(skb, CTA_SECMARK, htonl(ct->secmark));
|
|
|
- return 0;
|
|
|
+ struct nlattr *nest_secctx;
|
|
|
+ int len, ret;
|
|
|
+ char *secctx;
|
|
|
+
|
|
|
+ ret = security_secid_to_secctx(ct->secmark, &secctx, &len);
|
|
|
+ if (ret)
|
|
|
+ return ret;
|
|
|
+
|
|
|
+ ret = -1;
|
|
|
+ nest_secctx = nla_nest_start(skb, CTA_SECCTX | NLA_F_NESTED);
|
|
|
+ if (!nest_secctx)
|
|
|
+ goto nla_put_failure;
|
|
|
|
|
|
+ NLA_PUT_STRING(skb, CTA_SECCTX_NAME, secctx);
|
|
|
+ nla_nest_end(skb, nest_secctx);
|
|
|
+
|
|
|
+ ret = 0;
|
|
|
nla_put_failure:
|
|
|
- return -1;
|
|
|
+ security_release_secctx(secctx, len);
|
|
|
+ return ret;
|
|
|
}
|
|
|
#else
|
|
|
-#define ctnetlink_dump_secmark(a, b) (0)
|
|
|
+#define ctnetlink_dump_secctx(a, b) (0)
|
|
|
#endif
|
|
|
|
|
|
#define master_tuple(ct) &(ct->master->tuplehash[IP_CT_DIR_ORIGINAL].tuple)
|
|
@@ -391,7 +407,7 @@ ctnetlink_fill_info(struct sk_buff *skb, u32 pid, u32 seq,
|
|
|
ctnetlink_dump_protoinfo(skb, ct) < 0 ||
|
|
|
ctnetlink_dump_helpinfo(skb, ct) < 0 ||
|
|
|
ctnetlink_dump_mark(skb, ct) < 0 ||
|
|
|
- ctnetlink_dump_secmark(skb, ct) < 0 ||
|
|
|
+ ctnetlink_dump_secctx(skb, ct) < 0 ||
|
|
|
ctnetlink_dump_id(skb, ct) < 0 ||
|
|
|
ctnetlink_dump_use(skb, ct) < 0 ||
|
|
|
ctnetlink_dump_master(skb, ct) < 0 ||
|
|
@@ -437,6 +453,17 @@ ctnetlink_counters_size(const struct nf_conn *ct)
|
|
|
;
|
|
|
}
|
|
|
|
|
|
+#ifdef CONFIG_NF_CONNTRACK_SECMARK
|
|
|
+static int ctnetlink_nlmsg_secctx_size(const struct nf_conn *ct)
|
|
|
+{
|
|
|
+ int len;
|
|
|
+
|
|
|
+ security_secid_to_secctx(ct->secmark, NULL, &len);
|
|
|
+
|
|
|
+ return sizeof(char) * len;
|
|
|
+}
|
|
|
+#endif
|
|
|
+
|
|
|
static inline size_t
|
|
|
ctnetlink_nlmsg_size(const struct nf_conn *ct)
|
|
|
{
|
|
@@ -453,7 +480,8 @@ ctnetlink_nlmsg_size(const struct nf_conn *ct)
|
|
|
+ nla_total_size(0) /* CTA_HELP */
|
|
|
+ nla_total_size(NF_CT_HELPER_NAME_LEN) /* CTA_HELP_NAME */
|
|
|
#ifdef CONFIG_NF_CONNTRACK_SECMARK
|
|
|
- + nla_total_size(sizeof(u_int32_t)) /* CTA_SECMARK */
|
|
|
+ + nla_total_size(0) /* CTA_SECCTX */
|
|
|
+ + nla_total_size(ctnetlink_nlmsg_secctx_size(ct)) /* CTA_SECCTX_NAME */
|
|
|
#endif
|
|
|
#ifdef CONFIG_NF_NAT_NEEDED
|
|
|
+ 2 * nla_total_size(0) /* CTA_NAT_SEQ_ADJ_ORIG|REPL */
|
|
@@ -554,11 +582,9 @@ ctnetlink_conntrack_event(unsigned int events, struct nf_ct_event *item)
|
|
|
&& ctnetlink_dump_helpinfo(skb, ct) < 0)
|
|
|
goto nla_put_failure;
|
|
|
|
|
|
-#ifdef CONFIG_NF_CONNTRACK_SECMARK
|
|
|
if ((events & (1 << IPCT_SECMARK) || ct->secmark)
|
|
|
- && ctnetlink_dump_secmark(skb, ct) < 0)
|
|
|
+ && ctnetlink_dump_secctx(skb, ct) < 0)
|
|
|
goto nla_put_failure;
|
|
|
-#endif
|
|
|
|
|
|
if (events & (1 << IPCT_RELATED) &&
|
|
|
ctnetlink_dump_master(skb, ct) < 0)
|