Blame view

net/netfilter/xt_owner.c 3.91 KB
d2912cb15   Thomas Gleixner   treewide: Replace...
1
  // SPDX-License-Identifier: GPL-2.0-only
0265ab44b   Jan Engelhardt   [NETFILTER]: merg...
2
3
4
5
6
7
  /*
   * Kernel module to match various things tied to sockets associated with
   * locally generated outgoing packets.
   *
   * (C) 2000 Marc Boucher <marc@mbsi.ca>
   *
edc26f7aa   Jan Engelhardt   [NETFILTER]: xt_o...
8
   * Copyright © CC Computer Consultants GmbH, 2007 - 2008
0265ab44b   Jan Engelhardt   [NETFILTER]: merg...
9
10
11
12
   */
  #include <linux/module.h>
  #include <linux/skbuff.h>
  #include <linux/file.h>
5b825c3af   Ingo Molnar   sched/headers: Pr...
13
  #include <linux/cred.h>
0265ab44b   Jan Engelhardt   [NETFILTER]: merg...
14
  #include <net/sock.h>
fdd723e2a   Eric Dumazet   netfilter: xt_own...
15
  #include <net/inet_sock.h>
0265ab44b   Jan Engelhardt   [NETFILTER]: merg...
16
17
  #include <linux/netfilter/x_tables.h>
  #include <linux/netfilter/xt_owner.h>
0265ab44b   Jan Engelhardt   [NETFILTER]: merg...
18

26711a791   Eric W. Biederman   userns: xt_owner:...
19
20
21
  static int owner_check(const struct xt_mtchk_param *par)
  {
  	struct xt_owner_match_info *info = par->matchinfo;
9847371a8   Eric W. Biederman   netfilter: Allow ...
22
  	struct net *net = par->net;
26711a791   Eric W. Biederman   userns: xt_owner:...
23

9911c1139   Pablo Neira Ayuso   netfilter: xt_own...
24
25
  	if (info->match & ~XT_OWNER_MASK)
  		return -EINVAL;
9847371a8   Eric W. Biederman   netfilter: Allow ...
26
27
28
  	/* Only allow the common case where the userns of the writer
  	 * matches the userns of the network namespace.
  	 */
26711a791   Eric W. Biederman   userns: xt_owner:...
29
  	if ((info->match & (XT_OWNER_UID|XT_OWNER_GID)) &&
9847371a8   Eric W. Biederman   netfilter: Allow ...
30
  	    (current_user_ns() != net->user_ns))
26711a791   Eric W. Biederman   userns: xt_owner:...
31
  		return -EINVAL;
9847371a8   Eric W. Biederman   netfilter: Allow ...
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
  
  	/* Ensure the uids are valid */
  	if (info->match & XT_OWNER_UID) {
  		kuid_t uid_min = make_kuid(net->user_ns, info->uid_min);
  		kuid_t uid_max = make_kuid(net->user_ns, info->uid_max);
  
  		if (!uid_valid(uid_min) || !uid_valid(uid_max) ||
  		    (info->uid_max < info->uid_min) ||
  		    uid_lt(uid_max, uid_min)) {
  			return -EINVAL;
  		}
  	}
  
  	/* Ensure the gids are valid */
  	if (info->match & XT_OWNER_GID) {
  		kgid_t gid_min = make_kgid(net->user_ns, info->gid_min);
  		kgid_t gid_max = make_kgid(net->user_ns, info->gid_max);
  
  		if (!gid_valid(gid_min) || !gid_valid(gid_max) ||
  		    (info->gid_max < info->gid_min) ||
  		    gid_lt(gid_max, gid_min)) {
  			return -EINVAL;
  		}
  	}
26711a791   Eric W. Biederman   userns: xt_owner:...
56
57
  	return 0;
  }
0265ab44b   Jan Engelhardt   [NETFILTER]: merg...
58
  static bool
62fc80510   Jan Engelhardt   netfilter: xtable...
59
  owner_mt(const struct sk_buff *skb, struct xt_action_param *par)
0265ab44b   Jan Engelhardt   [NETFILTER]: merg...
60
  {
f7108a20d   Jan Engelhardt   netfilter: xtable...
61
  	const struct xt_owner_match_info *info = par->matchinfo;
0265ab44b   Jan Engelhardt   [NETFILTER]: merg...
62
  	const struct file *filp;
fdd723e2a   Eric Dumazet   netfilter: xt_own...
63
  	struct sock *sk = skb_to_full_sk(skb);
613dbd957   Pablo Neira Ayuso   netfilter: x_tabl...
64
  	struct net *net = xt_net(par);
0265ab44b   Jan Engelhardt   [NETFILTER]: merg...
65

f56465010   Flavio Leitner   netfilter: check ...
66
  	if (!sk || !sk->sk_socket || !net_eq(net, sock_net(sk)))
0265ab44b   Jan Engelhardt   [NETFILTER]: merg...
67
68
69
70
71
72
73
  		return (info->match ^ info->invert) == 0;
  	else if (info->match & info->invert & XT_OWNER_SOCKET)
  		/*
  		 * Socket exists but user wanted ! --socket-exists.
  		 * (Single ampersands intended.)
  		 */
  		return false;
fdd723e2a   Eric Dumazet   netfilter: xt_own...
74
  	filp = sk->sk_socket->file;
0265ab44b   Jan Engelhardt   [NETFILTER]: merg...
75
76
77
  	if (filp == NULL)
  		return ((info->match ^ info->invert) &
  		       (XT_OWNER_UID | XT_OWNER_GID)) == 0;
26711a791   Eric W. Biederman   userns: xt_owner:...
78
  	if (info->match & XT_OWNER_UID) {
9847371a8   Eric W. Biederman   netfilter: Allow ...
79
80
  		kuid_t uid_min = make_kuid(net->user_ns, info->uid_min);
  		kuid_t uid_max = make_kuid(net->user_ns, info->uid_max);
26711a791   Eric W. Biederman   userns: xt_owner:...
81
82
  		if ((uid_gte(filp->f_cred->fsuid, uid_min) &&
  		     uid_lte(filp->f_cred->fsuid, uid_max)) ^
edc26f7aa   Jan Engelhardt   [NETFILTER]: xt_o...
83
  		    !(info->invert & XT_OWNER_UID))
0265ab44b   Jan Engelhardt   [NETFILTER]: merg...
84
  			return false;
26711a791   Eric W. Biederman   userns: xt_owner:...
85
  	}
0265ab44b   Jan Engelhardt   [NETFILTER]: merg...
86

26711a791   Eric W. Biederman   userns: xt_owner:...
87
  	if (info->match & XT_OWNER_GID) {
ea6cc2fd8   Lukasz Pawelczyk   netfilter: xt_own...
88
  		unsigned int i, match = false;
9847371a8   Eric W. Biederman   netfilter: Allow ...
89
90
  		kgid_t gid_min = make_kgid(net->user_ns, info->gid_min);
  		kgid_t gid_max = make_kgid(net->user_ns, info->gid_max);
ea6cc2fd8   Lukasz Pawelczyk   netfilter: xt_own...
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
  		struct group_info *gi = filp->f_cred->group_info;
  
  		if (gid_gte(filp->f_cred->fsgid, gid_min) &&
  		    gid_lte(filp->f_cred->fsgid, gid_max))
  			match = true;
  
  		if (!match && (info->match & XT_OWNER_SUPPL_GROUPS) && gi) {
  			for (i = 0; i < gi->ngroups; ++i) {
  				kgid_t group = gi->gid[i];
  
  				if (gid_gte(group, gid_min) &&
  				    gid_lte(group, gid_max)) {
  					match = true;
  					break;
  				}
  			}
  		}
  
  		if (match ^ !(info->invert & XT_OWNER_GID))
0265ab44b   Jan Engelhardt   [NETFILTER]: merg...
110
  			return false;
26711a791   Eric W. Biederman   userns: xt_owner:...
111
  	}
0265ab44b   Jan Engelhardt   [NETFILTER]: merg...
112
113
114
  
  	return true;
  }
6461caed8   Jan Engelhardt   netfilter: xtable...
115
116
117
118
  static struct xt_match owner_mt_reg __read_mostly = {
  	.name       = "owner",
  	.revision   = 1,
  	.family     = NFPROTO_UNSPEC,
26711a791   Eric W. Biederman   userns: xt_owner:...
119
  	.checkentry = owner_check,
6461caed8   Jan Engelhardt   netfilter: xtable...
120
121
122
123
124
  	.match      = owner_mt,
  	.matchsize  = sizeof(struct xt_owner_match_info),
  	.hooks      = (1 << NF_INET_LOCAL_OUT) |
  	              (1 << NF_INET_POST_ROUTING),
  	.me         = THIS_MODULE,
0265ab44b   Jan Engelhardt   [NETFILTER]: merg...
125
126
127
128
  };
  
  static int __init owner_mt_init(void)
  {
6461caed8   Jan Engelhardt   netfilter: xtable...
129
  	return xt_register_match(&owner_mt_reg);
0265ab44b   Jan Engelhardt   [NETFILTER]: merg...
130
131
132
133
  }
  
  static void __exit owner_mt_exit(void)
  {
6461caed8   Jan Engelhardt   netfilter: xtable...
134
  	xt_unregister_match(&owner_mt_reg);
0265ab44b   Jan Engelhardt   [NETFILTER]: merg...
135
136
137
138
  }
  
  module_init(owner_mt_init);
  module_exit(owner_mt_exit);
6461caed8   Jan Engelhardt   netfilter: xtable...
139
  MODULE_AUTHOR("Jan Engelhardt <jengelh@medozas.de>");
2ae15b64e   Jan Engelhardt   [NETFILTER]: Upda...
140
  MODULE_DESCRIPTION("Xtables: socket owner matching");
0265ab44b   Jan Engelhardt   [NETFILTER]: merg...
141
142
143
  MODULE_LICENSE("GPL");
  MODULE_ALIAS("ipt_owner");
  MODULE_ALIAS("ip6t_owner");