2 * xt_iprange - Netfilter module to match IP address ranges
4 * (C) 2003 Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
5 * (C) CC Computer Consultants GmbH, 2008
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
11 #include <linux/module.h>
12 #include <linux/skbuff.h>
14 #include <linux/ipv6.h>
15 #include <linux/netfilter/x_tables.h>
16 #include <linux/netfilter/xt_iprange.h>
17 #include <linux/netfilter_ipv4/ipt_iprange.h>
20 iprange_mt_v0(const struct sk_buff
*skb
, const struct xt_match_param
*par
)
22 const struct ipt_iprange_info
*info
= par
->matchinfo
;
23 const struct iphdr
*iph
= ip_hdr(skb
);
25 if (info
->flags
& IPRANGE_SRC
) {
26 if ((ntohl(iph
->saddr
) < ntohl(info
->src
.min_ip
)
27 || ntohl(iph
->saddr
) > ntohl(info
->src
.max_ip
))
28 ^ !!(info
->flags
& IPRANGE_SRC_INV
)) {
29 pr_debug("src IP %pI4 NOT in range %s%pI4-%pI4\n",
31 info
->flags
& IPRANGE_SRC_INV
? "(INV) " : "",
37 if (info
->flags
& IPRANGE_DST
) {
38 if ((ntohl(iph
->daddr
) < ntohl(info
->dst
.min_ip
)
39 || ntohl(iph
->daddr
) > ntohl(info
->dst
.max_ip
))
40 ^ !!(info
->flags
& IPRANGE_DST_INV
)) {
41 pr_debug("dst IP %pI4 NOT in range %s%pI4-%pI4\n",
43 info
->flags
& IPRANGE_DST_INV
? "(INV) " : "",
53 iprange_mt4(const struct sk_buff
*skb
, const struct xt_match_param
*par
)
55 const struct xt_iprange_mtinfo
*info
= par
->matchinfo
;
56 const struct iphdr
*iph
= ip_hdr(skb
);
59 if (info
->flags
& IPRANGE_SRC
) {
60 m
= ntohl(iph
->saddr
) < ntohl(info
->src_min
.ip
);
61 m
|= ntohl(iph
->saddr
) > ntohl(info
->src_max
.ip
);
62 m
^= !!(info
->flags
& IPRANGE_SRC_INV
);
64 pr_debug("src IP %pI4 NOT in range %s%pI4-%pI4\n",
66 (info
->flags
& IPRANGE_SRC_INV
) ? "(INV) " : "",
72 if (info
->flags
& IPRANGE_DST
) {
73 m
= ntohl(iph
->daddr
) < ntohl(info
->dst_min
.ip
);
74 m
|= ntohl(iph
->daddr
) > ntohl(info
->dst_max
.ip
);
75 m
^= !!(info
->flags
& IPRANGE_DST_INV
);
77 pr_debug("dst IP %pI4 NOT in range %s%pI4-%pI4\n",
79 (info
->flags
& IPRANGE_DST_INV
) ? "(INV) " : "",
89 iprange_ipv6_sub(const struct in6_addr
*a
, const struct in6_addr
*b
)
94 for (i
= 0; i
< 4; ++i
) {
95 r
= ntohl(a
->s6_addr32
[i
]) - ntohl(b
->s6_addr32
[i
]);
104 iprange_mt6(const struct sk_buff
*skb
, const struct xt_match_param
*par
)
106 const struct xt_iprange_mtinfo
*info
= par
->matchinfo
;
107 const struct ipv6hdr
*iph
= ipv6_hdr(skb
);
110 if (info
->flags
& IPRANGE_SRC
) {
111 m
= iprange_ipv6_sub(&iph
->saddr
, &info
->src_min
.in6
) < 0;
112 m
|= iprange_ipv6_sub(&iph
->saddr
, &info
->src_max
.in6
) > 0;
113 m
^= !!(info
->flags
& IPRANGE_SRC_INV
);
117 if (info
->flags
& IPRANGE_DST
) {
118 m
= iprange_ipv6_sub(&iph
->daddr
, &info
->dst_min
.in6
) < 0;
119 m
|= iprange_ipv6_sub(&iph
->daddr
, &info
->dst_max
.in6
) > 0;
120 m
^= !!(info
->flags
& IPRANGE_DST_INV
);
127 static struct xt_match iprange_mt_reg
[] __read_mostly
= {
131 .family
= NFPROTO_IPV4
,
132 .match
= iprange_mt_v0
,
133 .matchsize
= sizeof(struct ipt_iprange_info
),
139 .family
= NFPROTO_IPV4
,
140 .match
= iprange_mt4
,
141 .matchsize
= sizeof(struct xt_iprange_mtinfo
),
147 .family
= NFPROTO_IPV6
,
148 .match
= iprange_mt6
,
149 .matchsize
= sizeof(struct xt_iprange_mtinfo
),
154 static int __init
iprange_mt_init(void)
156 return xt_register_matches(iprange_mt_reg
, ARRAY_SIZE(iprange_mt_reg
));
159 static void __exit
iprange_mt_exit(void)
161 xt_unregister_matches(iprange_mt_reg
, ARRAY_SIZE(iprange_mt_reg
));
164 module_init(iprange_mt_init
);
165 module_exit(iprange_mt_exit
);
166 MODULE_LICENSE("GPL");
167 MODULE_AUTHOR("Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>, Jan Engelhardt <jengelh@computergmbh.de>");
168 MODULE_DESCRIPTION("Xtables: arbitrary IPv4 range matching");
169 MODULE_ALIAS("ipt_iprange");
170 MODULE_ALIAS("ip6t_iprange");