2 * xt_iprange - Netfilter module to match IP address ranges
4 * (C) 2003 Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
5 * (C) CC Computer Consultants GmbH, 2008
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
11 #include <linux/module.h>
12 #include <linux/skbuff.h>
14 #include <linux/ipv6.h>
15 #include <linux/netfilter/x_tables.h>
16 #include <linux/netfilter/xt_iprange.h>
19 iprange_mt4(const struct sk_buff
*skb
, const struct xt_match_param
*par
)
21 const struct xt_iprange_mtinfo
*info
= par
->matchinfo
;
22 const struct iphdr
*iph
= ip_hdr(skb
);
25 if (info
->flags
& IPRANGE_SRC
) {
26 m
= ntohl(iph
->saddr
) < ntohl(info
->src_min
.ip
);
27 m
|= ntohl(iph
->saddr
) > ntohl(info
->src_max
.ip
);
28 m
^= !!(info
->flags
& IPRANGE_SRC_INV
);
30 pr_debug("src IP %pI4 NOT in range %s%pI4-%pI4\n",
32 (info
->flags
& IPRANGE_SRC_INV
) ? "(INV) " : "",
38 if (info
->flags
& IPRANGE_DST
) {
39 m
= ntohl(iph
->daddr
) < ntohl(info
->dst_min
.ip
);
40 m
|= ntohl(iph
->daddr
) > ntohl(info
->dst_max
.ip
);
41 m
^= !!(info
->flags
& IPRANGE_DST_INV
);
43 pr_debug("dst IP %pI4 NOT in range %s%pI4-%pI4\n",
45 (info
->flags
& IPRANGE_DST_INV
) ? "(INV) " : "",
55 iprange_ipv6_sub(const struct in6_addr
*a
, const struct in6_addr
*b
)
60 for (i
= 0; i
< 4; ++i
) {
61 r
= ntohl(a
->s6_addr32
[i
]) - ntohl(b
->s6_addr32
[i
]);
70 iprange_mt6(const struct sk_buff
*skb
, const struct xt_match_param
*par
)
72 const struct xt_iprange_mtinfo
*info
= par
->matchinfo
;
73 const struct ipv6hdr
*iph
= ipv6_hdr(skb
);
76 if (info
->flags
& IPRANGE_SRC
) {
77 m
= iprange_ipv6_sub(&iph
->saddr
, &info
->src_min
.in6
) < 0;
78 m
|= iprange_ipv6_sub(&iph
->saddr
, &info
->src_max
.in6
) > 0;
79 m
^= !!(info
->flags
& IPRANGE_SRC_INV
);
83 if (info
->flags
& IPRANGE_DST
) {
84 m
= iprange_ipv6_sub(&iph
->daddr
, &info
->dst_min
.in6
) < 0;
85 m
|= iprange_ipv6_sub(&iph
->daddr
, &info
->dst_max
.in6
) > 0;
86 m
^= !!(info
->flags
& IPRANGE_DST_INV
);
93 static struct xt_match iprange_mt_reg
[] __read_mostly
= {
97 .family
= NFPROTO_IPV4
,
99 .matchsize
= sizeof(struct xt_iprange_mtinfo
),
105 .family
= NFPROTO_IPV6
,
106 .match
= iprange_mt6
,
107 .matchsize
= sizeof(struct xt_iprange_mtinfo
),
112 static int __init
iprange_mt_init(void)
114 return xt_register_matches(iprange_mt_reg
, ARRAY_SIZE(iprange_mt_reg
));
117 static void __exit
iprange_mt_exit(void)
119 xt_unregister_matches(iprange_mt_reg
, ARRAY_SIZE(iprange_mt_reg
));
122 module_init(iprange_mt_init
);
123 module_exit(iprange_mt_exit
);
124 MODULE_LICENSE("GPL");
125 MODULE_AUTHOR("Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>");
126 MODULE_AUTHOR("Jan Engelhardt <jengelh@medozas.de>");
127 MODULE_DESCRIPTION("Xtables: arbitrary IPv4 range matching");
128 MODULE_ALIAS("ipt_iprange");
129 MODULE_ALIAS("ip6t_iprange");