[NETFILTER]: nf_conntrack_sip: perform NAT after parsing
[linux-2.6/libata-dev.git] / net / netfilter / nf_conntrack_sip.c
blob29a37d21269559929b438a7c01cf34cd7318bd6e
1 /* SIP extension for IP connection tracking.
3 * (C) 2005 by Christian Hentschel <chentschel@arnet.com.ar>
4 * based on RR's ip_conntrack_ftp.c and other modules.
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2 as
8 * published by the Free Software Foundation.
9 */
11 #include <linux/module.h>
12 #include <linux/ctype.h>
13 #include <linux/skbuff.h>
14 #include <linux/inet.h>
15 #include <linux/in.h>
16 #include <linux/udp.h>
17 #include <linux/netfilter.h>
19 #include <net/netfilter/nf_conntrack.h>
20 #include <net/netfilter/nf_conntrack_expect.h>
21 #include <net/netfilter/nf_conntrack_helper.h>
22 #include <linux/netfilter/nf_conntrack_sip.h>
24 MODULE_LICENSE("GPL");
25 MODULE_AUTHOR("Christian Hentschel <chentschel@arnet.com.ar>");
26 MODULE_DESCRIPTION("SIP connection tracking helper");
27 MODULE_ALIAS("ip_conntrack_sip");
29 #define MAX_PORTS 8
30 static unsigned short ports[MAX_PORTS];
31 static unsigned int ports_c;
32 module_param_array(ports, ushort, &ports_c, 0400);
33 MODULE_PARM_DESC(ports, "port numbers of SIP servers");
35 static unsigned int sip_timeout __read_mostly = SIP_TIMEOUT;
36 module_param(sip_timeout, uint, 0600);
37 MODULE_PARM_DESC(sip_timeout, "timeout for the master SIP session");
39 unsigned int (*nf_nat_sip_hook)(struct sk_buff *skb,
40 const char **dptr,
41 unsigned int *datalen) __read_mostly;
42 EXPORT_SYMBOL_GPL(nf_nat_sip_hook);
44 unsigned int (*nf_nat_sdp_hook)(struct sk_buff *skb,
45 const char **dptr,
46 unsigned int *datalen,
47 struct nf_conntrack_expect *exp) __read_mostly;
48 EXPORT_SYMBOL_GPL(nf_nat_sdp_hook);
50 static int string_len(const struct nf_conn *ct, const char *dptr,
51 const char *limit, int *shift)
53 int len = 0;
55 while (dptr < limit && isalpha(*dptr)) {
56 dptr++;
57 len++;
59 return len;
62 static int digits_len(const struct nf_conn *ct, const char *dptr,
63 const char *limit, int *shift)
65 int len = 0;
66 while (dptr < limit && isdigit(*dptr)) {
67 dptr++;
68 len++;
70 return len;
73 static int parse_addr(const struct nf_conn *ct, const char *cp,
74 const char **endp, union nf_inet_addr *addr,
75 const char *limit)
77 const char *end;
78 int family = ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.src.l3num;
79 int ret = 0;
81 switch (family) {
82 case AF_INET:
83 ret = in4_pton(cp, limit - cp, (u8 *)&addr->ip, -1, &end);
84 break;
85 case AF_INET6:
86 ret = in6_pton(cp, limit - cp, (u8 *)&addr->ip6, -1, &end);
87 break;
88 default:
89 BUG();
92 if (ret == 0 || end == cp)
93 return 0;
94 if (endp)
95 *endp = end;
96 return 1;
99 /* skip ip address. returns its length. */
100 static int epaddr_len(const struct nf_conn *ct, const char *dptr,
101 const char *limit, int *shift)
103 union nf_inet_addr addr;
104 const char *aux = dptr;
106 if (!parse_addr(ct, dptr, &dptr, &addr, limit)) {
107 pr_debug("ip: %s parse failed.!\n", dptr);
108 return 0;
111 /* Port number */
112 if (*dptr == ':') {
113 dptr++;
114 dptr += digits_len(ct, dptr, limit, shift);
116 return dptr - aux;
119 /* get address length, skiping user info. */
120 static int skp_epaddr_len(const struct nf_conn *ct, const char *dptr,
121 const char *limit, int *shift)
123 const char *start = dptr;
124 int s = *shift;
126 /* Search for @, but stop at the end of the line.
127 * We are inside a sip: URI, so we don't need to worry about
128 * continuation lines. */
129 while (dptr < limit &&
130 *dptr != '@' && *dptr != '\r' && *dptr != '\n') {
131 (*shift)++;
132 dptr++;
135 if (dptr < limit && *dptr == '@') {
136 dptr++;
137 (*shift)++;
138 } else {
139 dptr = start;
140 *shift = s;
143 return epaddr_len(ct, dptr, limit, shift);
146 /* Parse a SIP request line of the form:
148 * Request-Line = Method SP Request-URI SP SIP-Version CRLF
150 * and return the offset and length of the address contained in the Request-URI.
152 int ct_sip_parse_request(const struct nf_conn *ct,
153 const char *dptr, unsigned int datalen,
154 unsigned int *matchoff, unsigned int *matchlen,
155 union nf_inet_addr *addr, __be16 *port)
157 const char *start = dptr, *limit = dptr + datalen, *end;
158 unsigned int mlen;
159 unsigned int p;
160 int shift = 0;
162 /* Skip method and following whitespace */
163 mlen = string_len(ct, dptr, limit, NULL);
164 if (!mlen)
165 return 0;
166 dptr += mlen;
167 if (++dptr >= limit)
168 return 0;
170 /* Find SIP URI */
171 limit -= strlen("sip:");
172 for (; dptr < limit; dptr++) {
173 if (*dptr == '\r' || *dptr == '\n')
174 return -1;
175 if (strnicmp(dptr, "sip:", strlen("sip:")) == 0)
176 break;
178 if (!skp_epaddr_len(ct, dptr, limit, &shift))
179 return 0;
180 dptr += shift;
182 if (!parse_addr(ct, dptr, &end, addr, limit))
183 return -1;
184 if (end < limit && *end == ':') {
185 end++;
186 p = simple_strtoul(end, (char **)&end, 10);
187 if (p < 1024 || p > 65535)
188 return -1;
189 *port = htons(p);
190 } else
191 *port = htons(SIP_PORT);
193 if (end == dptr)
194 return 0;
195 *matchoff = dptr - start;
196 *matchlen = end - dptr;
197 return 1;
199 EXPORT_SYMBOL_GPL(ct_sip_parse_request);
201 /* SIP header parsing: SIP headers are located at the beginning of a line, but
202 * may span several lines, in which case the continuation lines begin with a
203 * whitespace character. RFC 2543 allows lines to be terminated with CR, LF or
204 * CRLF, RFC 3261 allows only CRLF, we support both.
206 * Headers are followed by (optionally) whitespace, a colon, again (optionally)
207 * whitespace and the values. Whitespace in this context means any amount of
208 * tabs, spaces and continuation lines, which are treated as a single whitespace
209 * character.
211 * Some headers may appear multiple times. A comma seperated list of values is
212 * equivalent to multiple headers.
214 static const struct sip_header ct_sip_hdrs[] = {
215 [SIP_HDR_CSEQ] = SIP_HDR("CSeq", NULL, NULL, digits_len),
216 [SIP_HDR_FROM] = SIP_HDR("From", "f", "sip:", skp_epaddr_len),
217 [SIP_HDR_TO] = SIP_HDR("To", "t", "sip:", skp_epaddr_len),
218 [SIP_HDR_CONTACT] = SIP_HDR("Contact", "m", "sip:", skp_epaddr_len),
219 [SIP_HDR_VIA] = SIP_HDR("Via", "v", "UDP ", epaddr_len),
220 [SIP_HDR_CONTENT_LENGTH] = SIP_HDR("Content-Length", "l", NULL, digits_len),
223 static const char *sip_follow_continuation(const char *dptr, const char *limit)
225 /* Walk past newline */
226 if (++dptr >= limit)
227 return NULL;
229 /* Skip '\n' in CR LF */
230 if (*(dptr - 1) == '\r' && *dptr == '\n') {
231 if (++dptr >= limit)
232 return NULL;
235 /* Continuation line? */
236 if (*dptr != ' ' && *dptr != '\t')
237 return NULL;
239 /* skip leading whitespace */
240 for (; dptr < limit; dptr++) {
241 if (*dptr != ' ' && *dptr != '\t')
242 break;
244 return dptr;
247 static const char *sip_skip_whitespace(const char *dptr, const char *limit)
249 for (; dptr < limit; dptr++) {
250 if (*dptr == ' ')
251 continue;
252 if (*dptr != '\r' && *dptr != '\n')
253 break;
254 dptr = sip_follow_continuation(dptr, limit);
255 if (dptr == NULL)
256 return NULL;
258 return dptr;
261 /* Search within a SIP header value, dealing with continuation lines */
262 static const char *ct_sip_header_search(const char *dptr, const char *limit,
263 const char *needle, unsigned int len)
265 for (limit -= len; dptr < limit; dptr++) {
266 if (*dptr == '\r' || *dptr == '\n') {
267 dptr = sip_follow_continuation(dptr, limit);
268 if (dptr == NULL)
269 break;
270 continue;
273 if (strnicmp(dptr, needle, len) == 0)
274 return dptr;
276 return NULL;
279 int ct_sip_get_header(const struct nf_conn *ct, const char *dptr,
280 unsigned int dataoff, unsigned int datalen,
281 enum sip_header_types type,
282 unsigned int *matchoff, unsigned int *matchlen)
284 const struct sip_header *hdr = &ct_sip_hdrs[type];
285 const char *start = dptr, *limit = dptr + datalen;
286 int shift = 0;
288 for (dptr += dataoff; dptr < limit; dptr++) {
289 /* Find beginning of line */
290 if (*dptr != '\r' && *dptr != '\n')
291 continue;
292 if (++dptr >= limit)
293 break;
294 if (*(dptr - 1) == '\r' && *dptr == '\n') {
295 if (++dptr >= limit)
296 break;
299 /* Skip continuation lines */
300 if (*dptr == ' ' || *dptr == '\t')
301 continue;
303 /* Find header. Compact headers must be followed by a
304 * non-alphabetic character to avoid mismatches. */
305 if (limit - dptr >= hdr->len &&
306 strnicmp(dptr, hdr->name, hdr->len) == 0)
307 dptr += hdr->len;
308 else if (hdr->cname && limit - dptr >= hdr->clen + 1 &&
309 strnicmp(dptr, hdr->cname, hdr->clen) == 0 &&
310 !isalpha(*(dptr + hdr->clen + 1)))
311 dptr += hdr->clen;
312 else
313 continue;
315 /* Find and skip colon */
316 dptr = sip_skip_whitespace(dptr, limit);
317 if (dptr == NULL)
318 break;
319 if (*dptr != ':' || ++dptr >= limit)
320 break;
322 /* Skip whitespace after colon */
323 dptr = sip_skip_whitespace(dptr, limit);
324 if (dptr == NULL)
325 break;
327 *matchoff = dptr - start;
328 if (hdr->search) {
329 dptr = ct_sip_header_search(dptr, limit, hdr->search,
330 hdr->slen);
331 if (!dptr)
332 return -1;
333 dptr += hdr->slen;
336 *matchlen = hdr->match_len(ct, dptr, limit, &shift);
337 if (!*matchlen)
338 return -1;
339 *matchoff = dptr - start + shift;
340 return 1;
342 return 0;
344 EXPORT_SYMBOL_GPL(ct_sip_get_header);
346 /* Get next header field in a list of comma seperated values */
347 static int ct_sip_next_header(const struct nf_conn *ct, const char *dptr,
348 unsigned int dataoff, unsigned int datalen,
349 enum sip_header_types type,
350 unsigned int *matchoff, unsigned int *matchlen)
352 const struct sip_header *hdr = &ct_sip_hdrs[type];
353 const char *start = dptr, *limit = dptr + datalen;
354 int shift = 0;
356 dptr += dataoff;
358 dptr = ct_sip_header_search(dptr, limit, ",", strlen(","));
359 if (!dptr)
360 return 0;
362 dptr = ct_sip_header_search(dptr, limit, hdr->search, hdr->slen);
363 if (!dptr)
364 return 0;
365 dptr += hdr->slen;
367 *matchoff = dptr - start;
368 *matchlen = hdr->match_len(ct, dptr, limit, &shift);
369 if (!*matchlen)
370 return -1;
371 *matchoff += shift;
372 return 1;
375 /* Walk through headers until a parsable one is found or no header of the
376 * given type is left. */
377 static int ct_sip_walk_headers(const struct nf_conn *ct, const char *dptr,
378 unsigned int dataoff, unsigned int datalen,
379 enum sip_header_types type, int *in_header,
380 unsigned int *matchoff, unsigned int *matchlen)
382 int ret;
384 if (in_header && *in_header) {
385 while (1) {
386 ret = ct_sip_next_header(ct, dptr, dataoff, datalen,
387 type, matchoff, matchlen);
388 if (ret > 0)
389 return ret;
390 if (ret == 0)
391 break;
392 dataoff += *matchoff;
394 *in_header = 0;
397 while (1) {
398 ret = ct_sip_get_header(ct, dptr, dataoff, datalen,
399 type, matchoff, matchlen);
400 if (ret > 0)
401 break;
402 if (ret == 0)
403 return ret;
404 dataoff += *matchoff;
407 if (in_header)
408 *in_header = 1;
409 return 1;
412 /* Locate a SIP header, parse the URI and return the offset and length of
413 * the address as well as the address and port themselves. A stream of
414 * headers can be parsed by handing in a non-NULL datalen and in_header
415 * pointer.
417 int ct_sip_parse_header_uri(const struct nf_conn *ct, const char *dptr,
418 unsigned int *dataoff, unsigned int datalen,
419 enum sip_header_types type, int *in_header,
420 unsigned int *matchoff, unsigned int *matchlen,
421 union nf_inet_addr *addr, __be16 *port)
423 const char *c, *limit = dptr + datalen;
424 unsigned int p;
425 int ret;
427 ret = ct_sip_walk_headers(ct, dptr, dataoff ? *dataoff : 0, datalen,
428 type, in_header, matchoff, matchlen);
429 WARN_ON(ret < 0);
430 if (ret == 0)
431 return ret;
433 if (!parse_addr(ct, dptr + *matchoff, &c, addr, limit))
434 return -1;
435 if (*c == ':') {
436 c++;
437 p = simple_strtoul(c, (char **)&c, 10);
438 if (p < 1024 || p > 65535)
439 return -1;
440 *port = htons(p);
441 } else
442 *port = htons(SIP_PORT);
444 if (dataoff)
445 *dataoff = c - dptr;
446 return 1;
448 EXPORT_SYMBOL_GPL(ct_sip_parse_header_uri);
450 /* SDP header parsing: a SDP session description contains an ordered set of
451 * headers, starting with a section containing general session parameters,
452 * optionally followed by multiple media descriptions.
454 * SDP headers always start at the beginning of a line. According to RFC 2327:
455 * "The sequence CRLF (0x0d0a) is used to end a record, although parsers should
456 * be tolerant and also accept records terminated with a single newline
457 * character". We handle both cases.
459 static const struct sip_header ct_sdp_hdrs[] = {
460 [SDP_HDR_VERSION] = SDP_HDR("v=", NULL, digits_len),
461 [SDP_HDR_OWNER_IP4] = SDP_HDR("o=", "IN IP4 ", epaddr_len),
462 [SDP_HDR_CONNECTION_IP4] = SDP_HDR("c=", "IN IP4 ", epaddr_len),
463 [SDP_HDR_OWNER_IP6] = SDP_HDR("o=", "IN IP6 ", epaddr_len),
464 [SDP_HDR_CONNECTION_IP6] = SDP_HDR("c=", "IN IP6 ", epaddr_len),
465 [SDP_HDR_MEDIA] = SDP_HDR("m=", "audio ", digits_len),
468 /* Linear string search within SDP header values */
469 static const char *ct_sdp_header_search(const char *dptr, const char *limit,
470 const char *needle, unsigned int len)
472 for (limit -= len; dptr < limit; dptr++) {
473 if (*dptr == '\r' || *dptr == '\n')
474 break;
475 if (strncmp(dptr, needle, len) == 0)
476 return dptr;
478 return NULL;
481 /* Locate a SDP header (optionally a substring within the header value),
482 * optionally stopping at the first occurence of the term header, parse
483 * it and return the offset and length of the data we're interested in.
485 int ct_sip_get_sdp_header(const struct nf_conn *ct, const char *dptr,
486 unsigned int dataoff, unsigned int datalen,
487 enum sdp_header_types type,
488 enum sdp_header_types term,
489 unsigned int *matchoff, unsigned int *matchlen)
491 const struct sip_header *hdr = &ct_sdp_hdrs[type];
492 const struct sip_header *thdr = &ct_sdp_hdrs[term];
493 const char *start = dptr, *limit = dptr + datalen;
494 int shift = 0;
496 for (dptr += dataoff; dptr < limit; dptr++) {
497 /* Find beginning of line */
498 if (*dptr != '\r' && *dptr != '\n')
499 continue;
500 if (++dptr >= limit)
501 break;
502 if (*(dptr - 1) == '\r' && *dptr == '\n') {
503 if (++dptr >= limit)
504 break;
507 if (term != SDP_HDR_UNSPEC &&
508 limit - dptr >= thdr->len &&
509 strnicmp(dptr, thdr->name, thdr->len) == 0)
510 break;
511 else if (limit - dptr >= hdr->len &&
512 strnicmp(dptr, hdr->name, hdr->len) == 0)
513 dptr += hdr->len;
514 else
515 continue;
517 *matchoff = dptr - start;
518 if (hdr->search) {
519 dptr = ct_sdp_header_search(dptr, limit, hdr->search,
520 hdr->slen);
521 if (!dptr)
522 return -1;
523 dptr += hdr->slen;
526 *matchlen = hdr->match_len(ct, dptr, limit, &shift);
527 if (!*matchlen)
528 return -1;
529 *matchoff = dptr - start + shift;
530 return 1;
532 return 0;
534 EXPORT_SYMBOL_GPL(ct_sip_get_sdp_header);
536 static int set_expected_rtp(struct sk_buff *skb,
537 const char **dptr, unsigned int *datalen,
538 union nf_inet_addr *addr, __be16 port)
540 struct nf_conntrack_expect *exp;
541 enum ip_conntrack_info ctinfo;
542 struct nf_conn *ct = nf_ct_get(skb, &ctinfo);
543 enum ip_conntrack_dir dir = CTINFO2DIR(ctinfo);
544 int family = ct->tuplehash[!dir].tuple.src.l3num;
545 int ret;
546 typeof(nf_nat_sdp_hook) nf_nat_sdp;
548 exp = nf_ct_expect_alloc(ct);
549 if (exp == NULL)
550 return NF_DROP;
551 nf_ct_expect_init(exp, NF_CT_EXPECT_CLASS_DEFAULT, family,
552 &ct->tuplehash[!dir].tuple.src.u3, addr,
553 IPPROTO_UDP, NULL, &port);
555 nf_nat_sdp = rcu_dereference(nf_nat_sdp_hook);
556 if (nf_nat_sdp && ct->status & IPS_NAT_MASK)
557 ret = nf_nat_sdp(skb, dptr, datalen, exp);
558 else {
559 if (nf_ct_expect_related(exp) != 0)
560 ret = NF_DROP;
561 else
562 ret = NF_ACCEPT;
564 nf_ct_expect_put(exp);
566 return ret;
569 static int process_sdp(struct sk_buff *skb,
570 const char **dptr, unsigned int *datalen,
571 unsigned int cseq)
573 enum ip_conntrack_info ctinfo;
574 struct nf_conn *ct = nf_ct_get(skb, &ctinfo);
575 int family = ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.src.l3num;
576 unsigned int matchoff, matchlen;
577 union nf_inet_addr addr;
578 unsigned int port;
579 enum sdp_header_types type;
581 /* Get address and port from SDP packet. */
582 type = family == AF_INET ? SDP_HDR_CONNECTION_IP4 :
583 SDP_HDR_CONNECTION_IP6;
585 if (ct_sip_get_sdp_header(ct, *dptr, 0, *datalen,
586 type, SDP_HDR_UNSPEC,
587 &matchoff, &matchlen) <= 0)
588 return NF_ACCEPT;
590 /* We'll drop only if there are parse problems. */
591 if (!parse_addr(ct, *dptr + matchoff, NULL, &addr, *dptr + *datalen))
592 return NF_DROP;
594 if (ct_sip_get_sdp_header(ct, *dptr, 0, *datalen,
595 SDP_HDR_MEDIA, SDP_HDR_UNSPEC,
596 &matchoff, &matchlen) <= 0)
597 return NF_ACCEPT;
599 port = simple_strtoul(*dptr + matchoff, NULL, 10);
600 if (port < 1024 || port > 65535)
601 return NF_DROP;
603 return set_expected_rtp(skb, dptr, datalen, &addr, htons(port));
605 static int process_invite_response(struct sk_buff *skb,
606 const char **dptr, unsigned int *datalen,
607 unsigned int cseq, unsigned int code)
609 if ((code >= 100 && code <= 199) ||
610 (code >= 200 && code <= 299))
611 return process_sdp(skb, dptr, datalen, cseq);
613 return NF_ACCEPT;
616 static int process_update_response(struct sk_buff *skb,
617 const char **dptr, unsigned int *datalen,
618 unsigned int cseq, unsigned int code)
620 if ((code >= 100 && code <= 199) ||
621 (code >= 200 && code <= 299))
622 return process_sdp(skb, dptr, datalen, cseq);
624 return NF_ACCEPT;
627 static const struct sip_handler sip_handlers[] = {
628 SIP_HANDLER("INVITE", process_sdp, process_invite_response),
629 SIP_HANDLER("UPDATE", process_sdp, process_update_response),
632 static int process_sip_response(struct sk_buff *skb,
633 const char **dptr, unsigned int *datalen)
635 static const struct sip_handler *handler;
636 enum ip_conntrack_info ctinfo;
637 struct nf_conn *ct = nf_ct_get(skb, &ctinfo);
638 unsigned int matchoff, matchlen;
639 unsigned int code, cseq, dataoff, i;
641 if (*datalen < strlen("SIP/2.0 200"))
642 return NF_ACCEPT;
643 code = simple_strtoul(*dptr + strlen("SIP/2.0 "), NULL, 10);
644 if (!code)
645 return NF_DROP;
647 if (ct_sip_get_header(ct, *dptr, 0, *datalen, SIP_HDR_CSEQ,
648 &matchoff, &matchlen) <= 0)
649 return NF_DROP;
650 cseq = simple_strtoul(*dptr + matchoff, NULL, 10);
651 if (!cseq)
652 return NF_DROP;
653 dataoff = matchoff + matchlen + 1;
655 for (i = 0; i < ARRAY_SIZE(sip_handlers); i++) {
656 handler = &sip_handlers[i];
657 if (handler->response == NULL)
658 continue;
659 if (*datalen < dataoff + handler->len ||
660 strnicmp(*dptr + dataoff, handler->method, handler->len))
661 continue;
662 return handler->response(skb, dptr, datalen, cseq, code);
664 return NF_ACCEPT;
667 static int process_sip_request(struct sk_buff *skb,
668 const char **dptr, unsigned int *datalen)
670 static const struct sip_handler *handler;
671 enum ip_conntrack_info ctinfo;
672 struct nf_conn *ct = nf_ct_get(skb, &ctinfo);
673 unsigned int matchoff, matchlen;
674 unsigned int cseq, i;
676 for (i = 0; i < ARRAY_SIZE(sip_handlers); i++) {
677 handler = &sip_handlers[i];
678 if (handler->request == NULL)
679 continue;
680 if (*datalen < handler->len ||
681 strnicmp(*dptr, handler->method, handler->len))
682 continue;
684 if (ct_sip_get_header(ct, *dptr, 0, *datalen, SIP_HDR_CSEQ,
685 &matchoff, &matchlen) <= 0)
686 return NF_DROP;
687 cseq = simple_strtoul(*dptr + matchoff, NULL, 10);
688 if (!cseq)
689 return NF_DROP;
691 return handler->request(skb, dptr, datalen, cseq);
693 return NF_ACCEPT;
696 static int sip_help(struct sk_buff *skb,
697 unsigned int protoff,
698 struct nf_conn *ct,
699 enum ip_conntrack_info ctinfo)
701 unsigned int dataoff, datalen;
702 const char *dptr;
703 int ret;
704 typeof(nf_nat_sip_hook) nf_nat_sip;
706 /* No Data ? */
707 dataoff = protoff + sizeof(struct udphdr);
708 if (dataoff >= skb->len)
709 return NF_ACCEPT;
711 nf_ct_refresh(ct, skb, sip_timeout * HZ);
713 if (!skb_is_nonlinear(skb))
714 dptr = skb->data + dataoff;
715 else {
716 pr_debug("Copy of skbuff not supported yet.\n");
717 return NF_ACCEPT;
720 datalen = skb->len - dataoff;
721 if (datalen < strlen("SIP/2.0 200"))
722 return NF_ACCEPT;
724 if (strnicmp(dptr, "SIP/2.0 ", strlen("SIP/2.0 ")) != 0)
725 ret = process_sip_request(skb, &dptr, &datalen);
726 else
727 ret = process_sip_response(skb, &dptr, &datalen);
729 if (ret == NF_ACCEPT && ct->status & IPS_NAT_MASK) {
730 nf_nat_sip = rcu_dereference(nf_nat_sip_hook);
731 if (nf_nat_sip && !nf_nat_sip(skb, &dptr, &datalen))
732 ret = NF_DROP;
735 return ret;
738 static struct nf_conntrack_helper sip[MAX_PORTS][2] __read_mostly;
739 static char sip_names[MAX_PORTS][2][sizeof("sip-65535")] __read_mostly;
741 static const struct nf_conntrack_expect_policy sip_exp_policy = {
742 .max_expected = 2,
743 .timeout = 3 * 60,
746 static void nf_conntrack_sip_fini(void)
748 int i, j;
750 for (i = 0; i < ports_c; i++) {
751 for (j = 0; j < 2; j++) {
752 if (sip[i][j].me == NULL)
753 continue;
754 nf_conntrack_helper_unregister(&sip[i][j]);
759 static int __init nf_conntrack_sip_init(void)
761 int i, j, ret;
762 char *tmpname;
764 if (ports_c == 0)
765 ports[ports_c++] = SIP_PORT;
767 for (i = 0; i < ports_c; i++) {
768 memset(&sip[i], 0, sizeof(sip[i]));
770 sip[i][0].tuple.src.l3num = AF_INET;
771 sip[i][1].tuple.src.l3num = AF_INET6;
772 for (j = 0; j < 2; j++) {
773 sip[i][j].tuple.dst.protonum = IPPROTO_UDP;
774 sip[i][j].tuple.src.u.udp.port = htons(ports[i]);
775 sip[i][j].expect_policy = &sip_exp_policy;
776 sip[i][j].me = THIS_MODULE;
777 sip[i][j].help = sip_help;
779 tmpname = &sip_names[i][j][0];
780 if (ports[i] == SIP_PORT)
781 sprintf(tmpname, "sip");
782 else
783 sprintf(tmpname, "sip-%u", i);
784 sip[i][j].name = tmpname;
786 pr_debug("port #%u: %u\n", i, ports[i]);
788 ret = nf_conntrack_helper_register(&sip[i][j]);
789 if (ret) {
790 printk("nf_ct_sip: failed to register helper "
791 "for pf: %u port: %u\n",
792 sip[i][j].tuple.src.l3num, ports[i]);
793 nf_conntrack_sip_fini();
794 return ret;
798 return 0;
801 module_init(nf_conntrack_sip_init);
802 module_exit(nf_conntrack_sip_fini);