/* Kernel module to match various things tied to sockets associated with
|
/* Kernel module to match various things tied to sockets associated with
|
locally generated outgoing packets.
|
locally generated outgoing packets.
|
|
|
Copyright (C) 2000 Marc Boucher
|
Copyright (C) 2000 Marc Boucher
|
*/
|
*/
|
#include <linux/module.h>
|
#include <linux/module.h>
|
#include <linux/skbuff.h>
|
#include <linux/skbuff.h>
|
#include <linux/file.h>
|
#include <linux/file.h>
|
#include <net/sock.h>
|
#include <net/sock.h>
|
|
|
#include <linux/netfilter_ipv4/ipt_owner.h>
|
#include <linux/netfilter_ipv4/ipt_owner.h>
|
#include <linux/netfilter_ipv4/ip_tables.h>
|
#include <linux/netfilter_ipv4/ip_tables.h>
|
|
|
static int
|
static int
|
match_comm(const struct sk_buff *skb, const char *comm)
|
match_comm(const struct sk_buff *skb, const char *comm)
|
{
|
{
|
struct task_struct *p;
|
struct task_struct *p;
|
struct files_struct *files;
|
struct files_struct *files;
|
int i;
|
int i;
|
|
|
read_lock(&tasklist_lock);
|
read_lock(&tasklist_lock);
|
for_each_task(p) {
|
for_each_task(p) {
|
if(strncmp(p->comm, comm, sizeof(p->comm)))
|
if(strncmp(p->comm, comm, sizeof(p->comm)))
|
continue;
|
continue;
|
|
|
task_lock(p);
|
task_lock(p);
|
files = p->files;
|
files = p->files;
|
if(files) {
|
if(files) {
|
read_lock(&files->file_lock);
|
read_lock(&files->file_lock);
|
for (i=0; i < files->max_fds; i++) {
|
for (i=0; i < files->max_fds; i++) {
|
if (fcheck_files(files, i) == skb->sk->socket->file) {
|
if (fcheck_files(files, i) == skb->sk->socket->file) {
|
read_unlock(&files->file_lock);
|
read_unlock(&files->file_lock);
|
task_unlock(p);
|
task_unlock(p);
|
read_unlock(&tasklist_lock);
|
read_unlock(&tasklist_lock);
|
return 1;
|
return 1;
|
}
|
}
|
}
|
}
|
read_unlock(&files->file_lock);
|
read_unlock(&files->file_lock);
|
}
|
}
|
task_unlock(p);
|
task_unlock(p);
|
}
|
}
|
read_unlock(&tasklist_lock);
|
read_unlock(&tasklist_lock);
|
return 0;
|
return 0;
|
}
|
}
|
|
|
static int
|
static int
|
match_pid(const struct sk_buff *skb, pid_t pid)
|
match_pid(const struct sk_buff *skb, pid_t pid)
|
{
|
{
|
struct task_struct *p;
|
struct task_struct *p;
|
struct files_struct *files;
|
struct files_struct *files;
|
int i;
|
int i;
|
|
|
read_lock(&tasklist_lock);
|
read_lock(&tasklist_lock);
|
p = find_task_by_pid(pid);
|
p = find_task_by_pid(pid);
|
if (!p)
|
if (!p)
|
goto out;
|
goto out;
|
task_lock(p);
|
task_lock(p);
|
files = p->files;
|
files = p->files;
|
if(files) {
|
if(files) {
|
read_lock(&files->file_lock);
|
read_lock(&files->file_lock);
|
for (i=0; i < files->max_fds; i++) {
|
for (i=0; i < files->max_fds; i++) {
|
if (fcheck_files(files, i) == skb->sk->socket->file) {
|
if (fcheck_files(files, i) == skb->sk->socket->file) {
|
read_unlock(&files->file_lock);
|
read_unlock(&files->file_lock);
|
task_unlock(p);
|
task_unlock(p);
|
read_unlock(&tasklist_lock);
|
read_unlock(&tasklist_lock);
|
return 1;
|
return 1;
|
}
|
}
|
}
|
}
|
read_unlock(&files->file_lock);
|
read_unlock(&files->file_lock);
|
}
|
}
|
task_unlock(p);
|
task_unlock(p);
|
out:
|
out:
|
read_unlock(&tasklist_lock);
|
read_unlock(&tasklist_lock);
|
return 0;
|
return 0;
|
}
|
}
|
|
|
static int
|
static int
|
match_sid(const struct sk_buff *skb, pid_t sid)
|
match_sid(const struct sk_buff *skb, pid_t sid)
|
{
|
{
|
struct task_struct *p;
|
struct task_struct *p;
|
struct file *file = skb->sk->socket->file;
|
struct file *file = skb->sk->socket->file;
|
int i, found=0;
|
int i, found=0;
|
|
|
read_lock(&tasklist_lock);
|
read_lock(&tasklist_lock);
|
for_each_task(p) {
|
for_each_task(p) {
|
struct files_struct *files;
|
struct files_struct *files;
|
if (p->session != sid)
|
if (p->session != sid)
|
continue;
|
continue;
|
|
|
task_lock(p);
|
task_lock(p);
|
files = p->files;
|
files = p->files;
|
if (files) {
|
if (files) {
|
read_lock(&files->file_lock);
|
read_lock(&files->file_lock);
|
for (i=0; i < files->max_fds; i++) {
|
for (i=0; i < files->max_fds; i++) {
|
if (fcheck_files(files, i) == file) {
|
if (fcheck_files(files, i) == file) {
|
found = 1;
|
found = 1;
|
break;
|
break;
|
}
|
}
|
}
|
}
|
read_unlock(&files->file_lock);
|
read_unlock(&files->file_lock);
|
}
|
}
|
task_unlock(p);
|
task_unlock(p);
|
if(found)
|
if(found)
|
break;
|
break;
|
}
|
}
|
read_unlock(&tasklist_lock);
|
read_unlock(&tasklist_lock);
|
|
|
return found;
|
return found;
|
}
|
}
|
|
|
static int
|
static int
|
match(const struct sk_buff *skb,
|
match(const struct sk_buff *skb,
|
const struct net_device *in,
|
const struct net_device *in,
|
const struct net_device *out,
|
const struct net_device *out,
|
const void *matchinfo,
|
const void *matchinfo,
|
int offset,
|
int offset,
|
const void *hdr,
|
const void *hdr,
|
u_int16_t datalen,
|
u_int16_t datalen,
|
int *hotdrop)
|
int *hotdrop)
|
{
|
{
|
const struct ipt_owner_info *info = matchinfo;
|
const struct ipt_owner_info *info = matchinfo;
|
|
|
if (!skb->sk || !skb->sk->socket || !skb->sk->socket->file)
|
if (!skb->sk || !skb->sk->socket || !skb->sk->socket->file)
|
return 0;
|
return 0;
|
|
|
if(info->match & IPT_OWNER_UID) {
|
if(info->match & IPT_OWNER_UID) {
|
if((skb->sk->socket->file->f_uid != info->uid) ^
|
if((skb->sk->socket->file->f_uid != info->uid) ^
|
!!(info->invert & IPT_OWNER_UID))
|
!!(info->invert & IPT_OWNER_UID))
|
return 0;
|
return 0;
|
}
|
}
|
|
|
if(info->match & IPT_OWNER_GID) {
|
if(info->match & IPT_OWNER_GID) {
|
if((skb->sk->socket->file->f_gid != info->gid) ^
|
if((skb->sk->socket->file->f_gid != info->gid) ^
|
!!(info->invert & IPT_OWNER_GID))
|
!!(info->invert & IPT_OWNER_GID))
|
return 0;
|
return 0;
|
}
|
}
|
|
|
if(info->match & IPT_OWNER_PID) {
|
if(info->match & IPT_OWNER_PID) {
|
if (!match_pid(skb, info->pid) ^
|
if (!match_pid(skb, info->pid) ^
|
!!(info->invert & IPT_OWNER_PID))
|
!!(info->invert & IPT_OWNER_PID))
|
return 0;
|
return 0;
|
}
|
}
|
|
|
if(info->match & IPT_OWNER_SID) {
|
if(info->match & IPT_OWNER_SID) {
|
if (!match_sid(skb, info->sid) ^
|
if (!match_sid(skb, info->sid) ^
|
!!(info->invert & IPT_OWNER_SID))
|
!!(info->invert & IPT_OWNER_SID))
|
return 0;
|
return 0;
|
}
|
}
|
|
|
if(info->match & IPT_OWNER_COMM) {
|
if(info->match & IPT_OWNER_COMM) {
|
if (!match_comm(skb, info->comm) ^
|
if (!match_comm(skb, info->comm) ^
|
!!(info->invert & IPT_OWNER_COMM))
|
!!(info->invert & IPT_OWNER_COMM))
|
return 0;
|
return 0;
|
}
|
}
|
|
|
return 1;
|
return 1;
|
}
|
}
|
|
|
static int
|
static int
|
checkentry(const char *tablename,
|
checkentry(const char *tablename,
|
const struct ipt_ip *ip,
|
const struct ipt_ip *ip,
|
void *matchinfo,
|
void *matchinfo,
|
unsigned int matchsize,
|
unsigned int matchsize,
|
unsigned int hook_mask)
|
unsigned int hook_mask)
|
{
|
{
|
if (hook_mask
|
if (hook_mask
|
& ~((1 << NF_IP_LOCAL_OUT) | (1 << NF_IP_POST_ROUTING))) {
|
& ~((1 << NF_IP_LOCAL_OUT) | (1 << NF_IP_POST_ROUTING))) {
|
printk("ipt_owner: only valid for LOCAL_OUT or POST_ROUTING.\n");
|
printk("ipt_owner: only valid for LOCAL_OUT or POST_ROUTING.\n");
|
return 0;
|
return 0;
|
}
|
}
|
|
|
if (matchsize != IPT_ALIGN(sizeof(struct ipt_owner_info)))
|
if (matchsize != IPT_ALIGN(sizeof(struct ipt_owner_info)))
|
return 0;
|
return 0;
|
|
|
return 1;
|
return 1;
|
}
|
}
|
|
|
static struct ipt_match owner_match
|
static struct ipt_match owner_match
|
= { { NULL, NULL }, "owner", &match, &checkentry, NULL, THIS_MODULE };
|
= { { NULL, NULL }, "owner", &match, &checkentry, NULL, THIS_MODULE };
|
|
|
static int __init init(void)
|
static int __init init(void)
|
{
|
{
|
return ipt_register_match(&owner_match);
|
return ipt_register_match(&owner_match);
|
}
|
}
|
|
|
static void __exit fini(void)
|
static void __exit fini(void)
|
{
|
{
|
ipt_unregister_match(&owner_match);
|
ipt_unregister_match(&owner_match);
|
}
|
}
|
|
|
module_init(init);
|
module_init(init);
|
module_exit(fini);
|
module_exit(fini);
|
MODULE_LICENSE("GPL");
|
MODULE_LICENSE("GPL");
|
|
|