Linux Audio

Check our new training course

Loading...
v5.14.15
  1// SPDX-License-Identifier: GPL-2.0-only
  2/*
  3 * Xtables module to match the process control group.
  4 *
  5 * Might be used to implement individual "per-application" firewall
  6 * policies in contrast to global policies based on control groups.
  7 * Matching is based upon processes tagged to net_cls' classid marker.
  8 *
  9 * (C) 2013 Daniel Borkmann <dborkman@redhat.com>
 
 
 
 
 10 */
 11
 12#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
 13
 14#include <linux/skbuff.h>
 15#include <linux/module.h>
 16#include <linux/netfilter/x_tables.h>
 17#include <linux/netfilter/xt_cgroup.h>
 18#include <net/sock.h>
 19
 20MODULE_LICENSE("GPL");
 21MODULE_AUTHOR("Daniel Borkmann <dborkman@redhat.com>");
 22MODULE_DESCRIPTION("Xtables: process control group matching");
 23MODULE_ALIAS("ipt_cgroup");
 24MODULE_ALIAS("ip6t_cgroup");
 25
 26static int cgroup_mt_check_v0(const struct xt_mtchk_param *par)
 27{
 28	struct xt_cgroup_info_v0 *info = par->matchinfo;
 29
 30	if (info->invert & ~1)
 31		return -EINVAL;
 32
 33	return 0;
 34}
 35
 36static int cgroup_mt_check_v1(const struct xt_mtchk_param *par)
 37{
 38	struct xt_cgroup_info_v1 *info = par->matchinfo;
 39	struct cgroup *cgrp;
 40
 41	if ((info->invert_path & ~1) || (info->invert_classid & ~1))
 42		return -EINVAL;
 43
 44	if (!info->has_path && !info->has_classid) {
 45		pr_info("xt_cgroup: no path or classid specified\n");
 46		return -EINVAL;
 47	}
 48
 49	if (info->has_path && info->has_classid) {
 50		pr_info_ratelimited("path and classid specified\n");
 51		return -EINVAL;
 52	}
 53
 54	info->priv = NULL;
 55	if (info->has_path) {
 56		cgrp = cgroup_get_from_path(info->path);
 57		if (IS_ERR(cgrp)) {
 58			pr_info_ratelimited("invalid path, errno=%ld\n",
 59					    PTR_ERR(cgrp));
 60			return -EINVAL;
 61		}
 62		info->priv = cgrp;
 63	}
 64
 65	return 0;
 66}
 67
 68static int cgroup_mt_check_v2(const struct xt_mtchk_param *par)
 69{
 70	struct xt_cgroup_info_v2 *info = par->matchinfo;
 71	struct cgroup *cgrp;
 72
 73	if ((info->invert_path & ~1) || (info->invert_classid & ~1))
 74		return -EINVAL;
 75
 76	if (!info->has_path && !info->has_classid) {
 77		pr_info("xt_cgroup: no path or classid specified\n");
 78		return -EINVAL;
 79	}
 80
 81	if (info->has_path && info->has_classid) {
 82		pr_info_ratelimited("path and classid specified\n");
 83		return -EINVAL;
 84	}
 85
 86	info->priv = NULL;
 87	if (info->has_path) {
 88		cgrp = cgroup_get_from_path(info->path);
 89		if (IS_ERR(cgrp)) {
 90			pr_info_ratelimited("invalid path, errno=%ld\n",
 91					    PTR_ERR(cgrp));
 92			return -EINVAL;
 93		}
 94		info->priv = cgrp;
 95	}
 96
 97	return 0;
 98}
 99
100static bool
101cgroup_mt_v0(const struct sk_buff *skb, struct xt_action_param *par)
102{
103	const struct xt_cgroup_info_v0 *info = par->matchinfo;
104	struct sock *sk = skb->sk;
105
106	if (!sk || !sk_fullsock(sk) || !net_eq(xt_net(par), sock_net(sk)))
107		return false;
108
109	return (info->id == sock_cgroup_classid(&skb->sk->sk_cgrp_data)) ^
110		info->invert;
111}
112
113static bool cgroup_mt_v1(const struct sk_buff *skb, struct xt_action_param *par)
114{
115	const struct xt_cgroup_info_v1 *info = par->matchinfo;
116	struct sock_cgroup_data *skcd = &skb->sk->sk_cgrp_data;
117	struct cgroup *ancestor = info->priv;
118	struct sock *sk = skb->sk;
119
120	if (!sk || !sk_fullsock(sk) || !net_eq(xt_net(par), sock_net(sk)))
121		return false;
122
123	if (ancestor)
124		return cgroup_is_descendant(sock_cgroup_ptr(skcd), ancestor) ^
125			info->invert_path;
126	else
127		return (info->classid == sock_cgroup_classid(skcd)) ^
128			info->invert_classid;
129}
130
131static bool cgroup_mt_v2(const struct sk_buff *skb, struct xt_action_param *par)
132{
133	const struct xt_cgroup_info_v2 *info = par->matchinfo;
134	struct sock_cgroup_data *skcd = &skb->sk->sk_cgrp_data;
135	struct cgroup *ancestor = info->priv;
136	struct sock *sk = skb->sk;
137
138	if (!sk || !sk_fullsock(sk) || !net_eq(xt_net(par), sock_net(sk)))
139		return false;
140
141	if (ancestor)
142		return cgroup_is_descendant(sock_cgroup_ptr(skcd), ancestor) ^
143			info->invert_path;
144	else
145		return (info->classid == sock_cgroup_classid(skcd)) ^
146			info->invert_classid;
147}
148
149static void cgroup_mt_destroy_v1(const struct xt_mtdtor_param *par)
150{
151	struct xt_cgroup_info_v1 *info = par->matchinfo;
152
153	if (info->priv)
154		cgroup_put(info->priv);
155}
156
157static void cgroup_mt_destroy_v2(const struct xt_mtdtor_param *par)
158{
159	struct xt_cgroup_info_v2 *info = par->matchinfo;
160
161	if (info->priv)
162		cgroup_put(info->priv);
163}
164
165static struct xt_match cgroup_mt_reg[] __read_mostly = {
166	{
167		.name		= "cgroup",
168		.revision	= 0,
169		.family		= NFPROTO_UNSPEC,
170		.checkentry	= cgroup_mt_check_v0,
171		.match		= cgroup_mt_v0,
172		.matchsize	= sizeof(struct xt_cgroup_info_v0),
173		.me		= THIS_MODULE,
174		.hooks		= (1 << NF_INET_LOCAL_OUT) |
175				  (1 << NF_INET_POST_ROUTING) |
176				  (1 << NF_INET_LOCAL_IN),
177	},
178	{
179		.name		= "cgroup",
180		.revision	= 1,
181		.family		= NFPROTO_UNSPEC,
182		.checkentry	= cgroup_mt_check_v1,
183		.match		= cgroup_mt_v1,
184		.matchsize	= sizeof(struct xt_cgroup_info_v1),
185		.usersize	= offsetof(struct xt_cgroup_info_v1, priv),
186		.destroy	= cgroup_mt_destroy_v1,
187		.me		= THIS_MODULE,
188		.hooks		= (1 << NF_INET_LOCAL_OUT) |
189				  (1 << NF_INET_POST_ROUTING) |
190				  (1 << NF_INET_LOCAL_IN),
191	},
192	{
193		.name		= "cgroup",
194		.revision	= 2,
195		.family		= NFPROTO_UNSPEC,
196		.checkentry	= cgroup_mt_check_v2,
197		.match		= cgroup_mt_v2,
198		.matchsize	= sizeof(struct xt_cgroup_info_v2),
199		.usersize	= offsetof(struct xt_cgroup_info_v2, priv),
200		.destroy	= cgroup_mt_destroy_v2,
201		.me		= THIS_MODULE,
202		.hooks		= (1 << NF_INET_LOCAL_OUT) |
203				  (1 << NF_INET_POST_ROUTING) |
204				  (1 << NF_INET_LOCAL_IN),
205	},
206};
207
208static int __init cgroup_mt_init(void)
209{
210	return xt_register_matches(cgroup_mt_reg, ARRAY_SIZE(cgroup_mt_reg));
211}
212
213static void __exit cgroup_mt_exit(void)
214{
215	xt_unregister_matches(cgroup_mt_reg, ARRAY_SIZE(cgroup_mt_reg));
216}
217
218module_init(cgroup_mt_init);
219module_exit(cgroup_mt_exit);
v4.17
 
  1/*
  2 * Xtables module to match the process control group.
  3 *
  4 * Might be used to implement individual "per-application" firewall
  5 * policies in contrast to global policies based on control groups.
  6 * Matching is based upon processes tagged to net_cls' classid marker.
  7 *
  8 * (C) 2013 Daniel Borkmann <dborkman@redhat.com>
  9 *
 10 * This program is free software; you can redistribute it and/or modify
 11 * it under the terms of the GNU General Public License version 2 as
 12 * published by the Free Software Foundation.
 13 */
 14
 15#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
 16
 17#include <linux/skbuff.h>
 18#include <linux/module.h>
 19#include <linux/netfilter/x_tables.h>
 20#include <linux/netfilter/xt_cgroup.h>
 21#include <net/sock.h>
 22
 23MODULE_LICENSE("GPL");
 24MODULE_AUTHOR("Daniel Borkmann <dborkman@redhat.com>");
 25MODULE_DESCRIPTION("Xtables: process control group matching");
 26MODULE_ALIAS("ipt_cgroup");
 27MODULE_ALIAS("ip6t_cgroup");
 28
 29static int cgroup_mt_check_v0(const struct xt_mtchk_param *par)
 30{
 31	struct xt_cgroup_info_v0 *info = par->matchinfo;
 32
 33	if (info->invert & ~1)
 34		return -EINVAL;
 35
 36	return 0;
 37}
 38
 39static int cgroup_mt_check_v1(const struct xt_mtchk_param *par)
 40{
 41	struct xt_cgroup_info_v1 *info = par->matchinfo;
 42	struct cgroup *cgrp;
 43
 44	if ((info->invert_path & ~1) || (info->invert_classid & ~1))
 45		return -EINVAL;
 46
 47	if (!info->has_path && !info->has_classid) {
 48		pr_info("xt_cgroup: no path or classid specified\n");
 49		return -EINVAL;
 50	}
 51
 52	if (info->has_path && info->has_classid) {
 53		pr_info_ratelimited("path and classid specified\n");
 54		return -EINVAL;
 55	}
 56
 57	info->priv = NULL;
 58	if (info->has_path) {
 59		cgrp = cgroup_get_from_path(info->path);
 60		if (IS_ERR(cgrp)) {
 61			pr_info_ratelimited("invalid path, errno=%ld\n",
 62					    PTR_ERR(cgrp));
 63			return -EINVAL;
 64		}
 65		info->priv = cgrp;
 66	}
 67
 68	return 0;
 69}
 70
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 71static bool
 72cgroup_mt_v0(const struct sk_buff *skb, struct xt_action_param *par)
 73{
 74	const struct xt_cgroup_info_v0 *info = par->matchinfo;
 
 75
 76	if (skb->sk == NULL || !sk_fullsock(skb->sk))
 77		return false;
 78
 79	return (info->id == sock_cgroup_classid(&skb->sk->sk_cgrp_data)) ^
 80		info->invert;
 81}
 82
 83static bool cgroup_mt_v1(const struct sk_buff *skb, struct xt_action_param *par)
 84{
 85	const struct xt_cgroup_info_v1 *info = par->matchinfo;
 86	struct sock_cgroup_data *skcd = &skb->sk->sk_cgrp_data;
 87	struct cgroup *ancestor = info->priv;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 88
 89	if (!skb->sk || !sk_fullsock(skb->sk))
 90		return false;
 91
 92	if (ancestor)
 93		return cgroup_is_descendant(sock_cgroup_ptr(skcd), ancestor) ^
 94			info->invert_path;
 95	else
 96		return (info->classid == sock_cgroup_classid(skcd)) ^
 97			info->invert_classid;
 98}
 99
100static void cgroup_mt_destroy_v1(const struct xt_mtdtor_param *par)
101{
102	struct xt_cgroup_info_v1 *info = par->matchinfo;
103
104	if (info->priv)
105		cgroup_put(info->priv);
106}
107
 
 
 
 
 
 
 
 
108static struct xt_match cgroup_mt_reg[] __read_mostly = {
109	{
110		.name		= "cgroup",
111		.revision	= 0,
112		.family		= NFPROTO_UNSPEC,
113		.checkentry	= cgroup_mt_check_v0,
114		.match		= cgroup_mt_v0,
115		.matchsize	= sizeof(struct xt_cgroup_info_v0),
116		.me		= THIS_MODULE,
117		.hooks		= (1 << NF_INET_LOCAL_OUT) |
118				  (1 << NF_INET_POST_ROUTING) |
119				  (1 << NF_INET_LOCAL_IN),
120	},
121	{
122		.name		= "cgroup",
123		.revision	= 1,
124		.family		= NFPROTO_UNSPEC,
125		.checkentry	= cgroup_mt_check_v1,
126		.match		= cgroup_mt_v1,
127		.matchsize	= sizeof(struct xt_cgroup_info_v1),
128		.usersize	= offsetof(struct xt_cgroup_info_v1, priv),
129		.destroy	= cgroup_mt_destroy_v1,
 
 
 
 
 
 
 
 
 
 
 
 
 
 
130		.me		= THIS_MODULE,
131		.hooks		= (1 << NF_INET_LOCAL_OUT) |
132				  (1 << NF_INET_POST_ROUTING) |
133				  (1 << NF_INET_LOCAL_IN),
134	},
135};
136
137static int __init cgroup_mt_init(void)
138{
139	return xt_register_matches(cgroup_mt_reg, ARRAY_SIZE(cgroup_mt_reg));
140}
141
142static void __exit cgroup_mt_exit(void)
143{
144	xt_unregister_matches(cgroup_mt_reg, ARRAY_SIZE(cgroup_mt_reg));
145}
146
147module_init(cgroup_mt_init);
148module_exit(cgroup_mt_exit);