Linux Audio

Check our new training course

Loading...
v5.14.15
  1// SPDX-License-Identifier: GPL-2.0-only
  2/*
  3 *	xt_iprange - Netfilter module to match IP address ranges
  4 *
  5 *	(C) 2003 Jozsef Kadlecsik <kadlec@netfilter.org>
  6 *	(C) CC Computer Consultants GmbH, 2008
 
 
 
 
  7 */
  8#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
  9#include <linux/module.h>
 10#include <linux/skbuff.h>
 11#include <linux/ip.h>
 12#include <linux/ipv6.h>
 13#include <linux/netfilter/x_tables.h>
 14#include <linux/netfilter/xt_iprange.h>
 15
 16static bool
 17iprange_mt4(const struct sk_buff *skb, struct xt_action_param *par)
 18{
 19	const struct xt_iprange_mtinfo *info = par->matchinfo;
 20	const struct iphdr *iph = ip_hdr(skb);
 21	bool m;
 22
 23	if (info->flags & IPRANGE_SRC) {
 24		m  = ntohl(iph->saddr) < ntohl(info->src_min.ip);
 25		m |= ntohl(iph->saddr) > ntohl(info->src_max.ip);
 26		m ^= !!(info->flags & IPRANGE_SRC_INV);
 27		if (m) {
 28			pr_debug("src IP %pI4 NOT in range %s%pI4-%pI4\n",
 29			         &iph->saddr,
 30			         (info->flags & IPRANGE_SRC_INV) ? "(INV) " : "",
 31			         &info->src_min.ip,
 32			         &info->src_max.ip);
 33			return false;
 34		}
 35	}
 36	if (info->flags & IPRANGE_DST) {
 37		m  = ntohl(iph->daddr) < ntohl(info->dst_min.ip);
 38		m |= ntohl(iph->daddr) > ntohl(info->dst_max.ip);
 39		m ^= !!(info->flags & IPRANGE_DST_INV);
 40		if (m) {
 41			pr_debug("dst IP %pI4 NOT in range %s%pI4-%pI4\n",
 42			         &iph->daddr,
 43			         (info->flags & IPRANGE_DST_INV) ? "(INV) " : "",
 44			         &info->dst_min.ip,
 45			         &info->dst_max.ip);
 46			return false;
 47		}
 48	}
 49	return true;
 50}
 51
 52static inline int
 53iprange_ipv6_lt(const struct in6_addr *a, const struct in6_addr *b)
 54{
 55	unsigned int i;
 56
 57	for (i = 0; i < 4; ++i) {
 58		if (a->s6_addr32[i] != b->s6_addr32[i])
 59			return ntohl(a->s6_addr32[i]) < ntohl(b->s6_addr32[i]);
 60	}
 61
 62	return 0;
 63}
 64
 65static bool
 66iprange_mt6(const struct sk_buff *skb, struct xt_action_param *par)
 67{
 68	const struct xt_iprange_mtinfo *info = par->matchinfo;
 69	const struct ipv6hdr *iph = ipv6_hdr(skb);
 70	bool m;
 71
 72	if (info->flags & IPRANGE_SRC) {
 73		m  = iprange_ipv6_lt(&iph->saddr, &info->src_min.in6);
 74		m |= iprange_ipv6_lt(&info->src_max.in6, &iph->saddr);
 75		m ^= !!(info->flags & IPRANGE_SRC_INV);
 76		if (m) {
 77			pr_debug("src IP %pI6 NOT in range %s%pI6-%pI6\n",
 78				 &iph->saddr,
 79				 (info->flags & IPRANGE_SRC_INV) ? "(INV) " : "",
 80				 &info->src_min.in6,
 81				 &info->src_max.in6);
 82			return false;
 83		}
 84	}
 85	if (info->flags & IPRANGE_DST) {
 86		m  = iprange_ipv6_lt(&iph->daddr, &info->dst_min.in6);
 87		m |= iprange_ipv6_lt(&info->dst_max.in6, &iph->daddr);
 88		m ^= !!(info->flags & IPRANGE_DST_INV);
 89		if (m) {
 90			pr_debug("dst IP %pI6 NOT in range %s%pI6-%pI6\n",
 91				 &iph->daddr,
 92				 (info->flags & IPRANGE_DST_INV) ? "(INV) " : "",
 93				 &info->dst_min.in6,
 94				 &info->dst_max.in6);
 95			return false;
 96		}
 97	}
 98	return true;
 99}
100
101static struct xt_match iprange_mt_reg[] __read_mostly = {
102	{
103		.name      = "iprange",
104		.revision  = 1,
105		.family    = NFPROTO_IPV4,
106		.match     = iprange_mt4,
107		.matchsize = sizeof(struct xt_iprange_mtinfo),
108		.me        = THIS_MODULE,
109	},
110	{
111		.name      = "iprange",
112		.revision  = 1,
113		.family    = NFPROTO_IPV6,
114		.match     = iprange_mt6,
115		.matchsize = sizeof(struct xt_iprange_mtinfo),
116		.me        = THIS_MODULE,
117	},
118};
119
120static int __init iprange_mt_init(void)
121{
122	return xt_register_matches(iprange_mt_reg, ARRAY_SIZE(iprange_mt_reg));
123}
124
125static void __exit iprange_mt_exit(void)
126{
127	xt_unregister_matches(iprange_mt_reg, ARRAY_SIZE(iprange_mt_reg));
128}
129
130module_init(iprange_mt_init);
131module_exit(iprange_mt_exit);
132MODULE_LICENSE("GPL");
133MODULE_AUTHOR("Jozsef Kadlecsik <kadlec@netfilter.org>");
134MODULE_AUTHOR("Jan Engelhardt <jengelh@medozas.de>");
135MODULE_DESCRIPTION("Xtables: arbitrary IPv4 range matching");
136MODULE_ALIAS("ipt_iprange");
137MODULE_ALIAS("ip6t_iprange");
v4.17
 
  1/*
  2 *	xt_iprange - Netfilter module to match IP address ranges
  3 *
  4 *	(C) 2003 Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
  5 *	(C) CC Computer Consultants GmbH, 2008
  6 *
  7 *	This program is free software; you can redistribute it and/or modify
  8 *	it under the terms of the GNU General Public License version 2 as
  9 *	published by the Free Software Foundation.
 10 */
 11#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
 12#include <linux/module.h>
 13#include <linux/skbuff.h>
 14#include <linux/ip.h>
 15#include <linux/ipv6.h>
 16#include <linux/netfilter/x_tables.h>
 17#include <linux/netfilter/xt_iprange.h>
 18
 19static bool
 20iprange_mt4(const struct sk_buff *skb, struct xt_action_param *par)
 21{
 22	const struct xt_iprange_mtinfo *info = par->matchinfo;
 23	const struct iphdr *iph = ip_hdr(skb);
 24	bool m;
 25
 26	if (info->flags & IPRANGE_SRC) {
 27		m  = ntohl(iph->saddr) < ntohl(info->src_min.ip);
 28		m |= ntohl(iph->saddr) > ntohl(info->src_max.ip);
 29		m ^= !!(info->flags & IPRANGE_SRC_INV);
 30		if (m) {
 31			pr_debug("src IP %pI4 NOT in range %s%pI4-%pI4\n",
 32			         &iph->saddr,
 33			         (info->flags & IPRANGE_SRC_INV) ? "(INV) " : "",
 34			         &info->src_min.ip,
 35			         &info->src_max.ip);
 36			return false;
 37		}
 38	}
 39	if (info->flags & IPRANGE_DST) {
 40		m  = ntohl(iph->daddr) < ntohl(info->dst_min.ip);
 41		m |= ntohl(iph->daddr) > ntohl(info->dst_max.ip);
 42		m ^= !!(info->flags & IPRANGE_DST_INV);
 43		if (m) {
 44			pr_debug("dst IP %pI4 NOT in range %s%pI4-%pI4\n",
 45			         &iph->daddr,
 46			         (info->flags & IPRANGE_DST_INV) ? "(INV) " : "",
 47			         &info->dst_min.ip,
 48			         &info->dst_max.ip);
 49			return false;
 50		}
 51	}
 52	return true;
 53}
 54
 55static inline int
 56iprange_ipv6_lt(const struct in6_addr *a, const struct in6_addr *b)
 57{
 58	unsigned int i;
 59
 60	for (i = 0; i < 4; ++i) {
 61		if (a->s6_addr32[i] != b->s6_addr32[i])
 62			return ntohl(a->s6_addr32[i]) < ntohl(b->s6_addr32[i]);
 63	}
 64
 65	return 0;
 66}
 67
 68static bool
 69iprange_mt6(const struct sk_buff *skb, struct xt_action_param *par)
 70{
 71	const struct xt_iprange_mtinfo *info = par->matchinfo;
 72	const struct ipv6hdr *iph = ipv6_hdr(skb);
 73	bool m;
 74
 75	if (info->flags & IPRANGE_SRC) {
 76		m  = iprange_ipv6_lt(&iph->saddr, &info->src_min.in6);
 77		m |= iprange_ipv6_lt(&info->src_max.in6, &iph->saddr);
 78		m ^= !!(info->flags & IPRANGE_SRC_INV);
 79		if (m) {
 80			pr_debug("src IP %pI6 NOT in range %s%pI6-%pI6\n",
 81				 &iph->saddr,
 82				 (info->flags & IPRANGE_SRC_INV) ? "(INV) " : "",
 83				 &info->src_min.in6,
 84				 &info->src_max.in6);
 85			return false;
 86		}
 87	}
 88	if (info->flags & IPRANGE_DST) {
 89		m  = iprange_ipv6_lt(&iph->daddr, &info->dst_min.in6);
 90		m |= iprange_ipv6_lt(&info->dst_max.in6, &iph->daddr);
 91		m ^= !!(info->flags & IPRANGE_DST_INV);
 92		if (m) {
 93			pr_debug("dst IP %pI6 NOT in range %s%pI6-%pI6\n",
 94				 &iph->daddr,
 95				 (info->flags & IPRANGE_DST_INV) ? "(INV) " : "",
 96				 &info->dst_min.in6,
 97				 &info->dst_max.in6);
 98			return false;
 99		}
100	}
101	return true;
102}
103
104static struct xt_match iprange_mt_reg[] __read_mostly = {
105	{
106		.name      = "iprange",
107		.revision  = 1,
108		.family    = NFPROTO_IPV4,
109		.match     = iprange_mt4,
110		.matchsize = sizeof(struct xt_iprange_mtinfo),
111		.me        = THIS_MODULE,
112	},
113	{
114		.name      = "iprange",
115		.revision  = 1,
116		.family    = NFPROTO_IPV6,
117		.match     = iprange_mt6,
118		.matchsize = sizeof(struct xt_iprange_mtinfo),
119		.me        = THIS_MODULE,
120	},
121};
122
123static int __init iprange_mt_init(void)
124{
125	return xt_register_matches(iprange_mt_reg, ARRAY_SIZE(iprange_mt_reg));
126}
127
128static void __exit iprange_mt_exit(void)
129{
130	xt_unregister_matches(iprange_mt_reg, ARRAY_SIZE(iprange_mt_reg));
131}
132
133module_init(iprange_mt_init);
134module_exit(iprange_mt_exit);
135MODULE_LICENSE("GPL");
136MODULE_AUTHOR("Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>");
137MODULE_AUTHOR("Jan Engelhardt <jengelh@medozas.de>");
138MODULE_DESCRIPTION("Xtables: arbitrary IPv4 range matching");
139MODULE_ALIAS("ipt_iprange");
140MODULE_ALIAS("ip6t_iprange");