You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
605 lines
16 KiB
605 lines
16 KiB
/*
|
|
* libxt_owner - iptables addon for xt_owner
|
|
*
|
|
* Copyright © CC Computer Consultants GmbH, 2007 - 2008
|
|
* Jan Engelhardt <jengelh@computergmbh.de>
|
|
*/
|
|
#include <grp.h>
|
|
#include <pwd.h>
|
|
#include <stdbool.h>
|
|
#include <stdio.h>
|
|
#include <limits.h>
|
|
#include <xtables.h>
|
|
#include <linux/netfilter/xt_owner.h>
|
|
|
|
/* match and invert flags */
|
|
enum {
|
|
IPT_OWNER_UID = 0x01,
|
|
IPT_OWNER_GID = 0x02,
|
|
IPT_OWNER_PID = 0x04,
|
|
IPT_OWNER_SID = 0x08,
|
|
IPT_OWNER_COMM = 0x10,
|
|
IP6T_OWNER_UID = IPT_OWNER_UID,
|
|
IP6T_OWNER_GID = IPT_OWNER_GID,
|
|
IP6T_OWNER_PID = IPT_OWNER_PID,
|
|
IP6T_OWNER_SID = IPT_OWNER_SID,
|
|
IP6T_OWNER_COMM = IPT_OWNER_COMM,
|
|
};
|
|
|
|
struct ipt_owner_info {
|
|
uid_t uid;
|
|
gid_t gid;
|
|
pid_t pid;
|
|
pid_t sid;
|
|
char comm[16];
|
|
uint8_t match, invert; /* flags */
|
|
};
|
|
|
|
struct ip6t_owner_info {
|
|
uid_t uid;
|
|
gid_t gid;
|
|
pid_t pid;
|
|
pid_t sid;
|
|
char comm[16];
|
|
uint8_t match, invert; /* flags */
|
|
};
|
|
|
|
/*
|
|
* Note: "UINT32_MAX - 1" is used in the code because -1 is a reserved
|
|
* UID/GID value anyway.
|
|
*/
|
|
|
|
enum {
|
|
O_USER = 0,
|
|
O_GROUP,
|
|
O_SOCK_EXISTS,
|
|
O_PROCESS,
|
|
O_SESSION,
|
|
O_COMM,
|
|
O_SUPPL_GROUPS,
|
|
};
|
|
|
|
static void owner_mt_help_v0(void)
|
|
{
|
|
printf(
|
|
"owner match options:\n"
|
|
"[!] --uid-owner userid Match local UID\n"
|
|
"[!] --gid-owner groupid Match local GID\n"
|
|
"[!] --pid-owner processid Match local PID\n"
|
|
"[!] --sid-owner sessionid Match local SID\n"
|
|
"[!] --cmd-owner name Match local command name\n"
|
|
"NOTE: PID, SID and command matching are broken on SMP\n");
|
|
}
|
|
|
|
static void owner_mt6_help_v0(void)
|
|
{
|
|
printf(
|
|
"owner match options:\n"
|
|
"[!] --uid-owner userid Match local UID\n"
|
|
"[!] --gid-owner groupid Match local GID\n"
|
|
"[!] --pid-owner processid Match local PID\n"
|
|
"[!] --sid-owner sessionid Match local SID\n"
|
|
"NOTE: PID and SID matching are broken on SMP\n");
|
|
}
|
|
|
|
static void owner_mt_help(void)
|
|
{
|
|
printf(
|
|
"owner match options:\n"
|
|
"[!] --uid-owner userid[-userid] Match local UID\n"
|
|
"[!] --gid-owner groupid[-groupid] Match local GID\n"
|
|
"[!] --socket-exists Match if socket exists\n"
|
|
" --suppl-groups Also match supplementary groups set with --gid-owner\n");
|
|
}
|
|
|
|
#define s struct ipt_owner_info
|
|
static const struct xt_option_entry owner_mt_opts_v0[] = {
|
|
{.name = "uid-owner", .id = O_USER, .type = XTTYPE_STRING,
|
|
.flags = XTOPT_INVERT},
|
|
{.name = "gid-owner", .id = O_GROUP, .type = XTTYPE_STRING,
|
|
.flags = XTOPT_INVERT},
|
|
{.name = "pid-owner", .id = O_PROCESS, .type = XTTYPE_UINT32,
|
|
.flags = XTOPT_INVERT | XTOPT_PUT, XTOPT_POINTER(s, pid),
|
|
.max = INT_MAX},
|
|
{.name = "sid-owner", .id = O_SESSION, .type = XTTYPE_UINT32,
|
|
.flags = XTOPT_INVERT | XTOPT_PUT, XTOPT_POINTER(s, sid),
|
|
.max = INT_MAX},
|
|
{.name = "cmd-owner", .id = O_COMM, .type = XTTYPE_STRING,
|
|
.flags = XTOPT_INVERT | XTOPT_PUT, XTOPT_POINTER(s, comm)},
|
|
XTOPT_TABLEEND,
|
|
};
|
|
#undef s
|
|
|
|
#define s struct ip6t_owner_info
|
|
static const struct xt_option_entry owner_mt6_opts_v0[] = {
|
|
{.name = "uid-owner", .id = O_USER, .type = XTTYPE_STRING,
|
|
.flags = XTOPT_INVERT},
|
|
{.name = "gid-owner", .id = O_GROUP, .type = XTTYPE_STRING,
|
|
.flags = XTOPT_INVERT},
|
|
{.name = "pid-owner", .id = O_PROCESS, .type = XTTYPE_UINT32,
|
|
.flags = XTOPT_INVERT | XTOPT_PUT, XTOPT_POINTER(s, pid),
|
|
.max = INT_MAX},
|
|
{.name = "sid-owner", .id = O_SESSION, .type = XTTYPE_UINT32,
|
|
.flags = XTOPT_INVERT | XTOPT_PUT, XTOPT_POINTER(s, sid),
|
|
.max = INT_MAX},
|
|
XTOPT_TABLEEND,
|
|
};
|
|
#undef s
|
|
|
|
static const struct xt_option_entry owner_mt_opts[] = {
|
|
{.name = "uid-owner", .id = O_USER, .type = XTTYPE_STRING,
|
|
.flags = XTOPT_INVERT},
|
|
{.name = "gid-owner", .id = O_GROUP, .type = XTTYPE_STRING,
|
|
.flags = XTOPT_INVERT},
|
|
{.name = "socket-exists", .id = O_SOCK_EXISTS, .type = XTTYPE_NONE,
|
|
.flags = XTOPT_INVERT},
|
|
{.name = "suppl-groups", .id = O_SUPPL_GROUPS, .type = XTTYPE_NONE},
|
|
XTOPT_TABLEEND,
|
|
};
|
|
|
|
static void owner_mt_parse_v0(struct xt_option_call *cb)
|
|
{
|
|
struct ipt_owner_info *info = cb->data;
|
|
struct passwd *pwd;
|
|
struct group *grp;
|
|
unsigned int id;
|
|
|
|
xtables_option_parse(cb);
|
|
switch (cb->entry->id) {
|
|
case O_USER:
|
|
if ((pwd = getpwnam(cb->arg)) != NULL)
|
|
id = pwd->pw_uid;
|
|
else if (!xtables_strtoui(cb->arg, NULL, &id, 0, UINT32_MAX - 1))
|
|
xtables_param_act(XTF_BAD_VALUE, "owner", "--uid-owner", cb->arg);
|
|
if (cb->invert)
|
|
info->invert |= IPT_OWNER_UID;
|
|
info->match |= IPT_OWNER_UID;
|
|
info->uid = id;
|
|
break;
|
|
case O_GROUP:
|
|
if ((grp = getgrnam(cb->arg)) != NULL)
|
|
id = grp->gr_gid;
|
|
else if (!xtables_strtoui(cb->arg, NULL, &id, 0, UINT32_MAX - 1))
|
|
xtables_param_act(XTF_BAD_VALUE, "owner", "--gid-owner", cb->arg);
|
|
if (cb->invert)
|
|
info->invert |= IPT_OWNER_GID;
|
|
info->match |= IPT_OWNER_GID;
|
|
info->gid = id;
|
|
break;
|
|
case O_PROCESS:
|
|
if (cb->invert)
|
|
info->invert |= IPT_OWNER_PID;
|
|
info->match |= IPT_OWNER_PID;
|
|
break;
|
|
case O_SESSION:
|
|
if (cb->invert)
|
|
info->invert |= IPT_OWNER_SID;
|
|
info->match |= IPT_OWNER_SID;
|
|
break;
|
|
case O_COMM:
|
|
if (cb->invert)
|
|
info->invert |= IPT_OWNER_COMM;
|
|
info->match |= IPT_OWNER_COMM;
|
|
break;
|
|
}
|
|
}
|
|
|
|
static void owner_mt6_parse_v0(struct xt_option_call *cb)
|
|
{
|
|
struct ip6t_owner_info *info = cb->data;
|
|
struct passwd *pwd;
|
|
struct group *grp;
|
|
unsigned int id;
|
|
|
|
xtables_option_parse(cb);
|
|
switch (cb->entry->id) {
|
|
case O_USER:
|
|
if ((pwd = getpwnam(cb->arg)) != NULL)
|
|
id = pwd->pw_uid;
|
|
else if (!xtables_strtoui(cb->arg, NULL, &id, 0, UINT32_MAX - 1))
|
|
xtables_param_act(XTF_BAD_VALUE, "owner", "--uid-owner", cb->arg);
|
|
if (cb->invert)
|
|
info->invert |= IP6T_OWNER_UID;
|
|
info->match |= IP6T_OWNER_UID;
|
|
info->uid = id;
|
|
break;
|
|
case O_GROUP:
|
|
if ((grp = getgrnam(cb->arg)) != NULL)
|
|
id = grp->gr_gid;
|
|
else if (!xtables_strtoui(cb->arg, NULL, &id, 0, UINT32_MAX - 1))
|
|
xtables_param_act(XTF_BAD_VALUE, "owner", "--gid-owner", cb->arg);
|
|
if (cb->invert)
|
|
info->invert |= IP6T_OWNER_GID;
|
|
info->match |= IP6T_OWNER_GID;
|
|
info->gid = id;
|
|
break;
|
|
case O_PROCESS:
|
|
if (cb->invert)
|
|
info->invert |= IP6T_OWNER_PID;
|
|
info->match |= IP6T_OWNER_PID;
|
|
break;
|
|
case O_SESSION:
|
|
if (cb->invert)
|
|
info->invert |= IP6T_OWNER_SID;
|
|
info->match |= IP6T_OWNER_SID;
|
|
break;
|
|
}
|
|
}
|
|
|
|
static void owner_parse_range(const char *s, unsigned int *from,
|
|
unsigned int *to, const char *opt)
|
|
{
|
|
char *end;
|
|
|
|
/* -1 is reversed, so the max is one less than that. */
|
|
if (!xtables_strtoui(s, &end, from, 0, UINT32_MAX - 1))
|
|
xtables_param_act(XTF_BAD_VALUE, "owner", opt, s);
|
|
*to = *from;
|
|
if (*end == '-' || *end == ':')
|
|
if (!xtables_strtoui(end + 1, &end, to, 0, UINT32_MAX - 1))
|
|
xtables_param_act(XTF_BAD_VALUE, "owner", opt, s);
|
|
if (*end != '\0')
|
|
xtables_param_act(XTF_BAD_VALUE, "owner", opt, s);
|
|
}
|
|
|
|
static void owner_mt_parse(struct xt_option_call *cb)
|
|
{
|
|
struct xt_owner_match_info *info = cb->data;
|
|
struct passwd *pwd;
|
|
struct group *grp;
|
|
unsigned int from, to;
|
|
|
|
xtables_option_parse(cb);
|
|
switch (cb->entry->id) {
|
|
case O_USER:
|
|
if ((pwd = getpwnam(cb->arg)) != NULL)
|
|
from = to = pwd->pw_uid;
|
|
else
|
|
owner_parse_range(cb->arg, &from, &to, "--uid-owner");
|
|
if (cb->invert)
|
|
info->invert |= XT_OWNER_UID;
|
|
info->match |= XT_OWNER_UID;
|
|
info->uid_min = from;
|
|
info->uid_max = to;
|
|
break;
|
|
case O_GROUP:
|
|
if ((grp = getgrnam(cb->arg)) != NULL)
|
|
from = to = grp->gr_gid;
|
|
else
|
|
owner_parse_range(cb->arg, &from, &to, "--gid-owner");
|
|
if (cb->invert)
|
|
info->invert |= XT_OWNER_GID;
|
|
info->match |= XT_OWNER_GID;
|
|
info->gid_min = from;
|
|
info->gid_max = to;
|
|
break;
|
|
case O_SOCK_EXISTS:
|
|
if (cb->invert)
|
|
info->invert |= XT_OWNER_SOCKET;
|
|
info->match |= XT_OWNER_SOCKET;
|
|
break;
|
|
case O_SUPPL_GROUPS:
|
|
if (!(info->match & XT_OWNER_GID))
|
|
xtables_param_act(XTF_BAD_VALUE, "owner", "--suppl-groups", "you need to use --gid-owner first");
|
|
info->match |= XT_OWNER_SUPPL_GROUPS;
|
|
break;
|
|
}
|
|
}
|
|
|
|
static void owner_mt_check(struct xt_fcheck_call *cb)
|
|
{
|
|
if (cb->xflags == 0)
|
|
xtables_error(PARAMETER_PROBLEM, "owner: At least one of "
|
|
"--uid-owner, --gid-owner or --socket-exists "
|
|
"is required");
|
|
}
|
|
|
|
static void
|
|
owner_mt_print_item_v0(const struct ipt_owner_info *info, const char *label,
|
|
uint8_t flag, bool numeric)
|
|
{
|
|
if (!(info->match & flag))
|
|
return;
|
|
if (info->invert & flag)
|
|
printf(" !");
|
|
printf(" %s", label);
|
|
|
|
switch (info->match & flag) {
|
|
case IPT_OWNER_UID:
|
|
if (!numeric) {
|
|
struct passwd *pwd = getpwuid(info->uid);
|
|
|
|
if (pwd != NULL && pwd->pw_name != NULL) {
|
|
printf(" %s", pwd->pw_name);
|
|
break;
|
|
}
|
|
}
|
|
printf(" %u", (unsigned int)info->uid);
|
|
break;
|
|
|
|
case IPT_OWNER_GID:
|
|
if (!numeric) {
|
|
struct group *grp = getgrgid(info->gid);
|
|
|
|
if (grp != NULL && grp->gr_name != NULL) {
|
|
printf(" %s", grp->gr_name);
|
|
break;
|
|
}
|
|
}
|
|
printf(" %u", (unsigned int)info->gid);
|
|
break;
|
|
|
|
case IPT_OWNER_PID:
|
|
printf(" %u", (unsigned int)info->pid);
|
|
break;
|
|
|
|
case IPT_OWNER_SID:
|
|
printf(" %u", (unsigned int)info->sid);
|
|
break;
|
|
|
|
case IPT_OWNER_COMM:
|
|
printf(" %.*s", (int)sizeof(info->comm), info->comm);
|
|
break;
|
|
}
|
|
}
|
|
|
|
static void
|
|
owner_mt6_print_item_v0(const struct ip6t_owner_info *info, const char *label,
|
|
uint8_t flag, bool numeric)
|
|
{
|
|
if (!(info->match & flag))
|
|
return;
|
|
if (info->invert & flag)
|
|
printf(" !");
|
|
printf(" %s", label);
|
|
|
|
switch (info->match & flag) {
|
|
case IP6T_OWNER_UID:
|
|
if (!numeric) {
|
|
struct passwd *pwd = getpwuid(info->uid);
|
|
|
|
if (pwd != NULL && pwd->pw_name != NULL) {
|
|
printf(" %s", pwd->pw_name);
|
|
break;
|
|
}
|
|
}
|
|
printf(" %u", (unsigned int)info->uid);
|
|
break;
|
|
|
|
case IP6T_OWNER_GID:
|
|
if (!numeric) {
|
|
struct group *grp = getgrgid(info->gid);
|
|
|
|
if (grp != NULL && grp->gr_name != NULL) {
|
|
printf(" %s", grp->gr_name);
|
|
break;
|
|
}
|
|
}
|
|
printf(" %u", (unsigned int)info->gid);
|
|
break;
|
|
|
|
case IP6T_OWNER_PID:
|
|
printf(" %u", (unsigned int)info->pid);
|
|
break;
|
|
|
|
case IP6T_OWNER_SID:
|
|
printf(" %u", (unsigned int)info->sid);
|
|
break;
|
|
}
|
|
}
|
|
|
|
static void
|
|
owner_mt_print_item(const struct xt_owner_match_info *info, const char *label,
|
|
uint8_t flag, bool numeric)
|
|
{
|
|
if (!(info->match & flag))
|
|
return;
|
|
if (info->invert & flag)
|
|
printf(" !");
|
|
printf(" %s", label);
|
|
|
|
switch (info->match & flag) {
|
|
case XT_OWNER_UID:
|
|
if (info->uid_min != info->uid_max) {
|
|
printf(" %u-%u", (unsigned int)info->uid_min,
|
|
(unsigned int)info->uid_max);
|
|
break;
|
|
} else if (!numeric) {
|
|
const struct passwd *pwd = getpwuid(info->uid_min);
|
|
|
|
if (pwd != NULL && pwd->pw_name != NULL) {
|
|
printf(" %s", pwd->pw_name);
|
|
break;
|
|
}
|
|
}
|
|
printf(" %u", (unsigned int)info->uid_min);
|
|
break;
|
|
|
|
case XT_OWNER_GID:
|
|
if (info->gid_min != info->gid_max) {
|
|
printf(" %u-%u", (unsigned int)info->gid_min,
|
|
(unsigned int)info->gid_max);
|
|
break;
|
|
} else if (!numeric) {
|
|
const struct group *grp = getgrgid(info->gid_min);
|
|
|
|
if (grp != NULL && grp->gr_name != NULL) {
|
|
printf(" %s", grp->gr_name);
|
|
break;
|
|
}
|
|
}
|
|
printf(" %u", (unsigned int)info->gid_min);
|
|
break;
|
|
}
|
|
}
|
|
|
|
static void
|
|
owner_mt_print_v0(const void *ip, const struct xt_entry_match *match,
|
|
int numeric)
|
|
{
|
|
const struct ipt_owner_info *info = (void *)match->data;
|
|
|
|
owner_mt_print_item_v0(info, "owner UID match", IPT_OWNER_UID, numeric);
|
|
owner_mt_print_item_v0(info, "owner GID match", IPT_OWNER_GID, numeric);
|
|
owner_mt_print_item_v0(info, "owner PID match", IPT_OWNER_PID, numeric);
|
|
owner_mt_print_item_v0(info, "owner SID match", IPT_OWNER_SID, numeric);
|
|
owner_mt_print_item_v0(info, "owner CMD match", IPT_OWNER_COMM, numeric);
|
|
}
|
|
|
|
static void
|
|
owner_mt6_print_v0(const void *ip, const struct xt_entry_match *match,
|
|
int numeric)
|
|
{
|
|
const struct ip6t_owner_info *info = (void *)match->data;
|
|
|
|
owner_mt6_print_item_v0(info, "owner UID match", IPT_OWNER_UID, numeric);
|
|
owner_mt6_print_item_v0(info, "owner GID match", IPT_OWNER_GID, numeric);
|
|
owner_mt6_print_item_v0(info, "owner PID match", IPT_OWNER_PID, numeric);
|
|
owner_mt6_print_item_v0(info, "owner SID match", IPT_OWNER_SID, numeric);
|
|
}
|
|
|
|
static void owner_mt_print(const void *ip, const struct xt_entry_match *match,
|
|
int numeric)
|
|
{
|
|
const struct xt_owner_match_info *info = (void *)match->data;
|
|
|
|
owner_mt_print_item(info, "owner socket exists", XT_OWNER_SOCKET, numeric);
|
|
owner_mt_print_item(info, "owner UID match", XT_OWNER_UID, numeric);
|
|
owner_mt_print_item(info, "owner GID match", XT_OWNER_GID, numeric);
|
|
owner_mt_print_item(info, "incl. suppl. groups", XT_OWNER_SUPPL_GROUPS, numeric);
|
|
}
|
|
|
|
static void
|
|
owner_mt_save_v0(const void *ip, const struct xt_entry_match *match)
|
|
{
|
|
const struct ipt_owner_info *info = (void *)match->data;
|
|
|
|
owner_mt_print_item_v0(info, "--uid-owner", IPT_OWNER_UID, true);
|
|
owner_mt_print_item_v0(info, "--gid-owner", IPT_OWNER_GID, true);
|
|
owner_mt_print_item_v0(info, "--pid-owner", IPT_OWNER_PID, true);
|
|
owner_mt_print_item_v0(info, "--sid-owner", IPT_OWNER_SID, true);
|
|
owner_mt_print_item_v0(info, "--cmd-owner", IPT_OWNER_COMM, true);
|
|
}
|
|
|
|
static void
|
|
owner_mt6_save_v0(const void *ip, const struct xt_entry_match *match)
|
|
{
|
|
const struct ip6t_owner_info *info = (void *)match->data;
|
|
|
|
owner_mt6_print_item_v0(info, "--uid-owner", IPT_OWNER_UID, true);
|
|
owner_mt6_print_item_v0(info, "--gid-owner", IPT_OWNER_GID, true);
|
|
owner_mt6_print_item_v0(info, "--pid-owner", IPT_OWNER_PID, true);
|
|
owner_mt6_print_item_v0(info, "--sid-owner", IPT_OWNER_SID, true);
|
|
}
|
|
|
|
static void owner_mt_save(const void *ip, const struct xt_entry_match *match)
|
|
{
|
|
const struct xt_owner_match_info *info = (void *)match->data;
|
|
|
|
owner_mt_print_item(info, "--socket-exists", XT_OWNER_SOCKET, true);
|
|
owner_mt_print_item(info, "--uid-owner", XT_OWNER_UID, true);
|
|
owner_mt_print_item(info, "--gid-owner", XT_OWNER_GID, true);
|
|
owner_mt_print_item(info, "--suppl-groups", XT_OWNER_SUPPL_GROUPS, true);
|
|
}
|
|
|
|
static int
|
|
owner_mt_print_uid_xlate(const struct xt_owner_match_info *info,
|
|
struct xt_xlate *xl)
|
|
{
|
|
xt_xlate_add(xl, "skuid%s ", info->invert ? " !=" : "");
|
|
|
|
if (info->uid_min != info->uid_max)
|
|
xt_xlate_add(xl, "%u-%u", (unsigned int)info->uid_min,
|
|
(unsigned int)info->uid_max);
|
|
else
|
|
xt_xlate_add(xl, "%u", (unsigned int)info->uid_min);
|
|
|
|
return 1;
|
|
}
|
|
|
|
static int
|
|
owner_mt_print_gid_xlate(const struct xt_owner_match_info *info,
|
|
struct xt_xlate *xl)
|
|
{
|
|
xt_xlate_add(xl, "skgid%s ", info->invert ? " !=" : "");
|
|
|
|
if (info->gid_min != info->gid_max)
|
|
xt_xlate_add(xl, "%u-%u", (unsigned int)info->gid_min,
|
|
(unsigned int)info->gid_max);
|
|
else
|
|
xt_xlate_add(xl, "%u", (unsigned int)info->gid_min);
|
|
|
|
return 1;
|
|
}
|
|
|
|
static int owner_mt_xlate(struct xt_xlate *xl,
|
|
const struct xt_xlate_mt_params *params)
|
|
{
|
|
const struct xt_owner_match_info *info = (void *)params->match->data;
|
|
int ret;
|
|
|
|
switch (info->match) {
|
|
case XT_OWNER_UID:
|
|
ret = owner_mt_print_uid_xlate(info, xl);
|
|
break;
|
|
case XT_OWNER_GID:
|
|
ret = owner_mt_print_gid_xlate(info, xl);
|
|
break;
|
|
default:
|
|
ret = 0;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static struct xtables_match owner_mt_reg[] = {
|
|
{
|
|
.version = XTABLES_VERSION,
|
|
.name = "owner",
|
|
.revision = 0,
|
|
.family = NFPROTO_IPV4,
|
|
.size = XT_ALIGN(sizeof(struct ipt_owner_info)),
|
|
.userspacesize = XT_ALIGN(sizeof(struct ipt_owner_info)),
|
|
.help = owner_mt_help_v0,
|
|
.x6_parse = owner_mt_parse_v0,
|
|
.x6_fcheck = owner_mt_check,
|
|
.print = owner_mt_print_v0,
|
|
.save = owner_mt_save_v0,
|
|
.x6_options = owner_mt_opts_v0,
|
|
},
|
|
{
|
|
.version = XTABLES_VERSION,
|
|
.name = "owner",
|
|
.revision = 0,
|
|
.family = NFPROTO_IPV6,
|
|
.size = XT_ALIGN(sizeof(struct ip6t_owner_info)),
|
|
.userspacesize = XT_ALIGN(sizeof(struct ip6t_owner_info)),
|
|
.help = owner_mt6_help_v0,
|
|
.x6_parse = owner_mt6_parse_v0,
|
|
.x6_fcheck = owner_mt_check,
|
|
.print = owner_mt6_print_v0,
|
|
.save = owner_mt6_save_v0,
|
|
.x6_options = owner_mt6_opts_v0,
|
|
},
|
|
{
|
|
.version = XTABLES_VERSION,
|
|
.name = "owner",
|
|
.revision = 1,
|
|
.family = NFPROTO_UNSPEC,
|
|
.size = XT_ALIGN(sizeof(struct xt_owner_match_info)),
|
|
.userspacesize = XT_ALIGN(sizeof(struct xt_owner_match_info)),
|
|
.help = owner_mt_help,
|
|
.x6_parse = owner_mt_parse,
|
|
.x6_fcheck = owner_mt_check,
|
|
.print = owner_mt_print,
|
|
.save = owner_mt_save,
|
|
.x6_options = owner_mt_opts,
|
|
.xlate = owner_mt_xlate,
|
|
},
|
|
};
|
|
|
|
void _init(void)
|
|
{
|
|
xtables_register_matches(owner_mt_reg, ARRAY_SIZE(owner_mt_reg));
|
|
}
|