Blame view
net/netfilter/xt_owner.c
3.91 KB
d2912cb15 treewide: Replace... |
1 |
// SPDX-License-Identifier: GPL-2.0-only |
0265ab44b [NETFILTER]: merg... |
2 3 4 5 6 7 |
/* * Kernel module to match various things tied to sockets associated with * locally generated outgoing packets. * * (C) 2000 Marc Boucher <marc@mbsi.ca> * |
edc26f7aa [NETFILTER]: xt_o... |
8 |
* Copyright © CC Computer Consultants GmbH, 2007 - 2008 |
0265ab44b [NETFILTER]: merg... |
9 10 11 12 |
*/ #include <linux/module.h> #include <linux/skbuff.h> #include <linux/file.h> |
5b825c3af sched/headers: Pr... |
13 |
#include <linux/cred.h> |
0265ab44b [NETFILTER]: merg... |
14 |
#include <net/sock.h> |
fdd723e2a netfilter: xt_own... |
15 |
#include <net/inet_sock.h> |
0265ab44b [NETFILTER]: merg... |
16 17 |
#include <linux/netfilter/x_tables.h> #include <linux/netfilter/xt_owner.h> |
0265ab44b [NETFILTER]: merg... |
18 |
|
26711a791 userns: xt_owner:... |
19 20 21 |
static int owner_check(const struct xt_mtchk_param *par) { struct xt_owner_match_info *info = par->matchinfo; |
9847371a8 netfilter: Allow ... |
22 |
struct net *net = par->net; |
26711a791 userns: xt_owner:... |
23 |
|
9911c1139 netfilter: xt_own... |
24 25 |
if (info->match & ~XT_OWNER_MASK) return -EINVAL; |
9847371a8 netfilter: Allow ... |
26 27 28 |
/* Only allow the common case where the userns of the writer * matches the userns of the network namespace. */ |
26711a791 userns: xt_owner:... |
29 |
if ((info->match & (XT_OWNER_UID|XT_OWNER_GID)) && |
9847371a8 netfilter: Allow ... |
30 |
(current_user_ns() != net->user_ns)) |
26711a791 userns: xt_owner:... |
31 |
return -EINVAL; |
9847371a8 netfilter: Allow ... |
32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 |
/* Ensure the uids are valid */ if (info->match & XT_OWNER_UID) { kuid_t uid_min = make_kuid(net->user_ns, info->uid_min); kuid_t uid_max = make_kuid(net->user_ns, info->uid_max); if (!uid_valid(uid_min) || !uid_valid(uid_max) || (info->uid_max < info->uid_min) || uid_lt(uid_max, uid_min)) { return -EINVAL; } } /* Ensure the gids are valid */ if (info->match & XT_OWNER_GID) { kgid_t gid_min = make_kgid(net->user_ns, info->gid_min); kgid_t gid_max = make_kgid(net->user_ns, info->gid_max); if (!gid_valid(gid_min) || !gid_valid(gid_max) || (info->gid_max < info->gid_min) || gid_lt(gid_max, gid_min)) { return -EINVAL; } } |
26711a791 userns: xt_owner:... |
56 57 |
return 0; } |
0265ab44b [NETFILTER]: merg... |
58 |
static bool |
62fc80510 netfilter: xtable... |
59 |
owner_mt(const struct sk_buff *skb, struct xt_action_param *par) |
0265ab44b [NETFILTER]: merg... |
60 |
{ |
f7108a20d netfilter: xtable... |
61 |
const struct xt_owner_match_info *info = par->matchinfo; |
0265ab44b [NETFILTER]: merg... |
62 |
const struct file *filp; |
fdd723e2a netfilter: xt_own... |
63 |
struct sock *sk = skb_to_full_sk(skb); |
613dbd957 netfilter: x_tabl... |
64 |
struct net *net = xt_net(par); |
0265ab44b [NETFILTER]: merg... |
65 |
|
f56465010 netfilter: check ... |
66 |
if (!sk || !sk->sk_socket || !net_eq(net, sock_net(sk))) |
0265ab44b [NETFILTER]: merg... |
67 68 69 70 71 72 73 |
return (info->match ^ info->invert) == 0; else if (info->match & info->invert & XT_OWNER_SOCKET) /* * Socket exists but user wanted ! --socket-exists. * (Single ampersands intended.) */ return false; |
fdd723e2a netfilter: xt_own... |
74 |
filp = sk->sk_socket->file; |
0265ab44b [NETFILTER]: merg... |
75 76 77 |
if (filp == NULL) return ((info->match ^ info->invert) & (XT_OWNER_UID | XT_OWNER_GID)) == 0; |
26711a791 userns: xt_owner:... |
78 |
if (info->match & XT_OWNER_UID) { |
9847371a8 netfilter: Allow ... |
79 80 |
kuid_t uid_min = make_kuid(net->user_ns, info->uid_min); kuid_t uid_max = make_kuid(net->user_ns, info->uid_max); |
26711a791 userns: xt_owner:... |
81 82 |
if ((uid_gte(filp->f_cred->fsuid, uid_min) && uid_lte(filp->f_cred->fsuid, uid_max)) ^ |
edc26f7aa [NETFILTER]: xt_o... |
83 |
!(info->invert & XT_OWNER_UID)) |
0265ab44b [NETFILTER]: merg... |
84 |
return false; |
26711a791 userns: xt_owner:... |
85 |
} |
0265ab44b [NETFILTER]: merg... |
86 |
|
26711a791 userns: xt_owner:... |
87 |
if (info->match & XT_OWNER_GID) { |
ea6cc2fd8 netfilter: xt_own... |
88 |
unsigned int i, match = false; |
9847371a8 netfilter: Allow ... |
89 90 |
kgid_t gid_min = make_kgid(net->user_ns, info->gid_min); kgid_t gid_max = make_kgid(net->user_ns, info->gid_max); |
ea6cc2fd8 netfilter: xt_own... |
91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 |
struct group_info *gi = filp->f_cred->group_info; if (gid_gte(filp->f_cred->fsgid, gid_min) && gid_lte(filp->f_cred->fsgid, gid_max)) match = true; if (!match && (info->match & XT_OWNER_SUPPL_GROUPS) && gi) { for (i = 0; i < gi->ngroups; ++i) { kgid_t group = gi->gid[i]; if (gid_gte(group, gid_min) && gid_lte(group, gid_max)) { match = true; break; } } } if (match ^ !(info->invert & XT_OWNER_GID)) |
0265ab44b [NETFILTER]: merg... |
110 |
return false; |
26711a791 userns: xt_owner:... |
111 |
} |
0265ab44b [NETFILTER]: merg... |
112 113 114 |
return true; } |
6461caed8 netfilter: xtable... |
115 116 117 118 |
static struct xt_match owner_mt_reg __read_mostly = { .name = "owner", .revision = 1, .family = NFPROTO_UNSPEC, |
26711a791 userns: xt_owner:... |
119 |
.checkentry = owner_check, |
6461caed8 netfilter: xtable... |
120 121 122 123 124 |
.match = owner_mt, .matchsize = sizeof(struct xt_owner_match_info), .hooks = (1 << NF_INET_LOCAL_OUT) | (1 << NF_INET_POST_ROUTING), .me = THIS_MODULE, |
0265ab44b [NETFILTER]: merg... |
125 126 127 128 |
}; static int __init owner_mt_init(void) { |
6461caed8 netfilter: xtable... |
129 |
return xt_register_match(&owner_mt_reg); |
0265ab44b [NETFILTER]: merg... |
130 131 132 133 |
} static void __exit owner_mt_exit(void) { |
6461caed8 netfilter: xtable... |
134 |
xt_unregister_match(&owner_mt_reg); |
0265ab44b [NETFILTER]: merg... |
135 136 137 138 |
} module_init(owner_mt_init); module_exit(owner_mt_exit); |
6461caed8 netfilter: xtable... |
139 |
MODULE_AUTHOR("Jan Engelhardt <jengelh@medozas.de>"); |
2ae15b64e [NETFILTER]: Upda... |
140 |
MODULE_DESCRIPTION("Xtables: socket owner matching"); |
0265ab44b [NETFILTER]: merg... |
141 142 143 |
MODULE_LICENSE("GPL"); MODULE_ALIAS("ipt_owner"); MODULE_ALIAS("ip6t_owner"); |