Skip to content

Commit ef493bd

Browse files
Instigat0rummakynes
authored andcommitted
netfilter: nfnetlink_queue: add security context information
This patch adds an additional attribute when sending packet information via netlink in netfilter_queue module. It will send additional security context data, so that userspace applications can verify this context against their own security databases. Signed-off-by: Roman Kubiak <[email protected]> Acked-by: Florian Westphal <[email protected]> Signed-off-by: Pablo Neira Ayuso <[email protected]>
1 parent 89d256b commit ef493bd

File tree

2 files changed

+37
-2
lines changed

2 files changed

+37
-2
lines changed

include/uapi/linux/netfilter/nfnetlink_queue.h

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,7 @@ enum nfqnl_attr_type {
4949
NFQA_EXP, /* nf_conntrack_netlink.h */
5050
NFQA_UID, /* __u32 sk uid */
5151
NFQA_GID, /* __u32 sk gid */
52+
NFQA_SECCTX, /* security context string */
5253

5354
__NFQA_MAX
5455
};
@@ -102,7 +103,8 @@ enum nfqnl_attr_config {
102103
#define NFQA_CFG_F_CONNTRACK (1 << 1)
103104
#define NFQA_CFG_F_GSO (1 << 2)
104105
#define NFQA_CFG_F_UID_GID (1 << 3)
105-
#define NFQA_CFG_F_MAX (1 << 4)
106+
#define NFQA_CFG_F_SECCTX (1 << 4)
107+
#define NFQA_CFG_F_MAX (1 << 5)
106108

107109
/* flags for NFQA_SKB_INFO */
108110
/* packet appears to have wrong checksums, but they are ok */

net/netfilter/nfnetlink_queue_core.c

Lines changed: 34 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -278,6 +278,23 @@ static int nfqnl_put_sk_uidgid(struct sk_buff *skb, struct sock *sk)
278278
return -1;
279279
}
280280

281+
static u32 nfqnl_get_sk_secctx(struct sk_buff *skb, char **secdata)
282+
{
283+
u32 seclen = 0;
284+
#if IS_ENABLED(CONFIG_NETWORK_SECMARK)
285+
if (!skb || !sk_fullsock(skb->sk))
286+
return 0;
287+
288+
read_lock_bh(&skb->sk->sk_callback_lock);
289+
290+
if (skb->secmark)
291+
security_secid_to_secctx(skb->secmark, secdata, &seclen);
292+
293+
read_unlock_bh(&skb->sk->sk_callback_lock);
294+
#endif
295+
return seclen;
296+
}
297+
281298
static struct sk_buff *
282299
nfqnl_build_packet_message(struct net *net, struct nfqnl_instance *queue,
283300
struct nf_queue_entry *entry,
@@ -297,6 +314,8 @@ nfqnl_build_packet_message(struct net *net, struct nfqnl_instance *queue,
297314
struct nf_conn *ct = NULL;
298315
enum ip_conntrack_info uninitialized_var(ctinfo);
299316
bool csum_verify;
317+
char *secdata = NULL;
318+
u32 seclen = 0;
300319

301320
size = nlmsg_total_size(sizeof(struct nfgenmsg))
302321
+ nla_total_size(sizeof(struct nfqnl_msg_packet_hdr))
@@ -352,6 +371,12 @@ nfqnl_build_packet_message(struct net *net, struct nfqnl_instance *queue,
352371
+ nla_total_size(sizeof(u_int32_t))); /* gid */
353372
}
354373

374+
if ((queue->flags & NFQA_CFG_F_SECCTX) && entskb->sk) {
375+
seclen = nfqnl_get_sk_secctx(entskb, &secdata);
376+
if (seclen)
377+
size += nla_total_size(seclen);
378+
}
379+
355380
skb = nfnetlink_alloc_skb(net, size, queue->peer_portid,
356381
GFP_ATOMIC);
357382
if (!skb) {
@@ -479,6 +504,9 @@ nfqnl_build_packet_message(struct net *net, struct nfqnl_instance *queue,
479504
nfqnl_put_sk_uidgid(skb, entskb->sk) < 0)
480505
goto nla_put_failure;
481506

507+
if (seclen && nla_put(skb, NFQA_SECCTX, seclen, secdata))
508+
goto nla_put_failure;
509+
482510
if (ct && nfqnl_ct_put(skb, ct, ctinfo) < 0)
483511
goto nla_put_failure;
484512

@@ -1142,7 +1170,12 @@ nfqnl_recv_config(struct sock *ctnl, struct sk_buff *skb,
11421170
ret = -EOPNOTSUPP;
11431171
goto err_out_unlock;
11441172
}
1145-
1173+
#if !IS_ENABLED(CONFIG_NETWORK_SECMARK)
1174+
if (flags & mask & NFQA_CFG_F_SECCTX) {
1175+
ret = -EOPNOTSUPP;
1176+
goto err_out_unlock;
1177+
}
1178+
#endif
11461179
spin_lock_bh(&queue->lock);
11471180
queue->flags &= ~mask;
11481181
queue->flags |= flags & mask;

0 commit comments

Comments
 (0)