ipvs: add missing ip_vs_pe_put in sync code
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / net / netfilter / xt_iprange.c
CommitLineData
1da177e4 1/*
f72e25a8 2 * xt_iprange - Netfilter module to match IP address ranges
1da177e4 3 *
f72e25a8 4 * (C) 2003 Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
1a50c5a1 5 * (C) CC Computer Consultants GmbH, 2008
1da177e4 6 *
f72e25a8
JE
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
1da177e4 10 */
ff67e4e4 11#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
1da177e4
LT
12#include <linux/module.h>
13#include <linux/skbuff.h>
14#include <linux/ip.h>
1a50c5a1 15#include <linux/ipv6.h>
6709dbbb 16#include <linux/netfilter/x_tables.h>
5da621f1 17#include <linux/netfilter/xt_iprange.h>
1da177e4 18
1a50c5a1 19static bool
62fc8051 20iprange_mt4(const struct sk_buff *skb, struct xt_action_param *par)
1a50c5a1 21{
f7108a20 22 const struct xt_iprange_mtinfo *info = par->matchinfo;
1a50c5a1
JE
23 const struct iphdr *iph = ip_hdr(skb);
24 bool m;
25
26 if (info->flags & IPRANGE_SRC) {
27 m = ntohl(iph->saddr) < ntohl(info->src_min.ip);
28 m |= ntohl(iph->saddr) > ntohl(info->src_max.ip);
6def1eb4 29 m ^= !!(info->flags & IPRANGE_SRC_INV);
1a50c5a1 30 if (m) {
14d5e834
HH
31 pr_debug("src IP %pI4 NOT in range %s%pI4-%pI4\n",
32 &iph->saddr,
1a50c5a1 33 (info->flags & IPRANGE_SRC_INV) ? "(INV) " : "",
705ca147 34 &info->src_min.ip,
14d5e834 35 &info->src_max.ip);
1a50c5a1
JE
36 return false;
37 }
38 }
39 if (info->flags & IPRANGE_DST) {
40 m = ntohl(iph->daddr) < ntohl(info->dst_min.ip);
41 m |= ntohl(iph->daddr) > ntohl(info->dst_max.ip);
6def1eb4 42 m ^= !!(info->flags & IPRANGE_DST_INV);
1a50c5a1 43 if (m) {
14d5e834
HH
44 pr_debug("dst IP %pI4 NOT in range %s%pI4-%pI4\n",
45 &iph->daddr,
1a50c5a1 46 (info->flags & IPRANGE_DST_INV) ? "(INV) " : "",
14d5e834
HH
47 &info->dst_min.ip,
48 &info->dst_max.ip);
1a50c5a1
JE
49 return false;
50 }
51 }
52 return true;
53}
54
55static inline int
08b5194b 56iprange_ipv6_lt(const struct in6_addr *a, const struct in6_addr *b)
1a50c5a1
JE
57{
58 unsigned int i;
1a50c5a1
JE
59
60 for (i = 0; i < 4; ++i) {
08b5194b
TJ
61 if (a->s6_addr32[i] != b->s6_addr32[i])
62 return ntohl(a->s6_addr32[i]) < ntohl(b->s6_addr32[i]);
1a50c5a1
JE
63 }
64
65 return 0;
66}
67
68static bool
62fc8051 69iprange_mt6(const struct sk_buff *skb, struct xt_action_param *par)
1a50c5a1 70{
f7108a20 71 const struct xt_iprange_mtinfo *info = par->matchinfo;
1a50c5a1
JE
72 const struct ipv6hdr *iph = ipv6_hdr(skb);
73 bool m;
74
75 if (info->flags & IPRANGE_SRC) {
08b5194b
TJ
76 m = iprange_ipv6_lt(&iph->saddr, &info->src_min.in6);
77 m |= iprange_ipv6_lt(&info->src_max.in6, &iph->saddr);
6def1eb4 78 m ^= !!(info->flags & IPRANGE_SRC_INV);
6a4ddef2
TJ
79 if (m) {
80 pr_debug("src IP %pI6 NOT in range %s%pI6-%pI6\n",
81 &iph->saddr,
82 (info->flags & IPRANGE_SRC_INV) ? "(INV) " : "",
83 &info->src_min.in6,
84 &info->src_max.in6);
1a50c5a1 85 return false;
6a4ddef2 86 }
1a50c5a1
JE
87 }
88 if (info->flags & IPRANGE_DST) {
08b5194b
TJ
89 m = iprange_ipv6_lt(&iph->daddr, &info->dst_min.in6);
90 m |= iprange_ipv6_lt(&info->dst_max.in6, &iph->daddr);
6def1eb4 91 m ^= !!(info->flags & IPRANGE_DST_INV);
6a4ddef2
TJ
92 if (m) {
93 pr_debug("dst IP %pI6 NOT in range %s%pI6-%pI6\n",
94 &iph->daddr,
95 (info->flags & IPRANGE_DST_INV) ? "(INV) " : "",
96 &info->dst_min.in6,
97 &info->dst_max.in6);
1a50c5a1 98 return false;
6a4ddef2 99 }
1a50c5a1
JE
100 }
101 return true;
102}
103
104static struct xt_match iprange_mt_reg[] __read_mostly = {
1a50c5a1
JE
105 {
106 .name = "iprange",
107 .revision = 1,
ee999d8b 108 .family = NFPROTO_IPV4,
1a50c5a1
JE
109 .match = iprange_mt4,
110 .matchsize = sizeof(struct xt_iprange_mtinfo),
111 .me = THIS_MODULE,
112 },
113 {
114 .name = "iprange",
115 .revision = 1,
ee999d8b 116 .family = NFPROTO_IPV6,
1a50c5a1
JE
117 .match = iprange_mt6,
118 .matchsize = sizeof(struct xt_iprange_mtinfo),
119 .me = THIS_MODULE,
120 },
1da177e4
LT
121};
122
d3c5ee6d 123static int __init iprange_mt_init(void)
1da177e4 124{
1a50c5a1 125 return xt_register_matches(iprange_mt_reg, ARRAY_SIZE(iprange_mt_reg));
1da177e4
LT
126}
127
d3c5ee6d 128static void __exit iprange_mt_exit(void)
1da177e4 129{
1a50c5a1 130 xt_unregister_matches(iprange_mt_reg, ARRAY_SIZE(iprange_mt_reg));
1da177e4
LT
131}
132
d3c5ee6d
JE
133module_init(iprange_mt_init);
134module_exit(iprange_mt_exit);
f72e25a8 135MODULE_LICENSE("GPL");
36d4084d
JE
136MODULE_AUTHOR("Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>");
137MODULE_AUTHOR("Jan Engelhardt <jengelh@medozas.de>");
f72e25a8 138MODULE_DESCRIPTION("Xtables: arbitrary IPv4 range matching");
01b7a314
PO
139MODULE_ALIAS("ipt_iprange");
140MODULE_ALIAS("ip6t_iprange");