diff options
author | Patrick McHardy <kaber@trash.net> | 2008-03-20 10:15:55 -0400 |
---|---|---|
committer | Patrick McHardy <kaber@trash.net> | 2008-04-14 05:15:49 -0400 |
commit | 2bc780499aa33311ec0f3e42624dfaa7be0ade5e (patch) | |
tree | 5920fd09120573dc5a48ccdfa7d223ae9ae30fae | |
parent | d63a650736f566a1f9e9434725d2089597c0d2cc (diff) |
[NETFILTER]: nf_conntrack: add DCCP protocol support
Add DCCP conntrack helper. Thanks to Gerrit Renker <gerrit@erg.abdn.ac.uk>
for review and testing.
Signed-off-by: Patrick McHardy <kaber@trash.net>
-rw-r--r-- | include/linux/netfilter/nf_conntrack_dccp.h | 40 | ||||
-rw-r--r-- | include/linux/netfilter/nfnetlink_conntrack.h | 8 | ||||
-rw-r--r-- | include/net/netfilter/nf_conntrack.h | 2 | ||||
-rw-r--r-- | include/net/netfilter/nf_conntrack_tuple.h | 6 | ||||
-rw-r--r-- | net/netfilter/Kconfig | 10 | ||||
-rw-r--r-- | net/netfilter/Makefile | 1 | ||||
-rw-r--r-- | net/netfilter/nf_conntrack_proto_dccp.c | 816 |
7 files changed, 883 insertions, 0 deletions
diff --git a/include/linux/netfilter/nf_conntrack_dccp.h b/include/linux/netfilter/nf_conntrack_dccp.h new file mode 100644 index 000000000000..40dcc82058d1 --- /dev/null +++ b/include/linux/netfilter/nf_conntrack_dccp.h | |||
@@ -0,0 +1,40 @@ | |||
1 | #ifndef _NF_CONNTRACK_DCCP_H | ||
2 | #define _NF_CONNTRACK_DCCP_H | ||
3 | |||
4 | /* Exposed to userspace over nfnetlink */ | ||
5 | enum ct_dccp_states { | ||
6 | CT_DCCP_NONE, | ||
7 | CT_DCCP_REQUEST, | ||
8 | CT_DCCP_RESPOND, | ||
9 | CT_DCCP_PARTOPEN, | ||
10 | CT_DCCP_OPEN, | ||
11 | CT_DCCP_CLOSEREQ, | ||
12 | CT_DCCP_CLOSING, | ||
13 | CT_DCCP_TIMEWAIT, | ||
14 | CT_DCCP_IGNORE, | ||
15 | CT_DCCP_INVALID, | ||
16 | __CT_DCCP_MAX | ||
17 | }; | ||
18 | #define CT_DCCP_MAX (__CT_DCCP_MAX - 1) | ||
19 | |||
20 | enum ct_dccp_roles { | ||
21 | CT_DCCP_ROLE_CLIENT, | ||
22 | CT_DCCP_ROLE_SERVER, | ||
23 | __CT_DCCP_ROLE_MAX | ||
24 | }; | ||
25 | #define CT_DCCP_ROLE_MAX (__CT_DCCP_ROLE_MAX - 1) | ||
26 | |||
27 | #ifdef __KERNEL__ | ||
28 | #include <net/netfilter/nf_conntrack_tuple.h> | ||
29 | |||
30 | struct nf_ct_dccp { | ||
31 | u_int8_t role[IP_CT_DIR_MAX]; | ||
32 | u_int8_t state; | ||
33 | u_int8_t last_pkt; | ||
34 | u_int8_t last_dir; | ||
35 | u_int64_t handshake_seq; | ||
36 | }; | ||
37 | |||
38 | #endif /* __KERNEL__ */ | ||
39 | |||
40 | #endif /* _NF_CONNTRACK_DCCP_H */ | ||
diff --git a/include/linux/netfilter/nfnetlink_conntrack.h b/include/linux/netfilter/nfnetlink_conntrack.h index e3e1533aba2d..0a383ac083cb 100644 --- a/include/linux/netfilter/nfnetlink_conntrack.h +++ b/include/linux/netfilter/nfnetlink_conntrack.h | |||
@@ -80,6 +80,7 @@ enum ctattr_l4proto { | |||
80 | enum ctattr_protoinfo { | 80 | enum ctattr_protoinfo { |
81 | CTA_PROTOINFO_UNSPEC, | 81 | CTA_PROTOINFO_UNSPEC, |
82 | CTA_PROTOINFO_TCP, | 82 | CTA_PROTOINFO_TCP, |
83 | CTA_PROTOINFO_DCCP, | ||
83 | __CTA_PROTOINFO_MAX | 84 | __CTA_PROTOINFO_MAX |
84 | }; | 85 | }; |
85 | #define CTA_PROTOINFO_MAX (__CTA_PROTOINFO_MAX - 1) | 86 | #define CTA_PROTOINFO_MAX (__CTA_PROTOINFO_MAX - 1) |
@@ -95,6 +96,13 @@ enum ctattr_protoinfo_tcp { | |||
95 | }; | 96 | }; |
96 | #define CTA_PROTOINFO_TCP_MAX (__CTA_PROTOINFO_TCP_MAX - 1) | 97 | #define CTA_PROTOINFO_TCP_MAX (__CTA_PROTOINFO_TCP_MAX - 1) |
97 | 98 | ||
99 | enum ctattr_protoinfo_dccp { | ||
100 | CTA_PROTOINFO_DCCP_UNSPEC, | ||
101 | CTA_PROTOINFO_DCCP_STATE, | ||
102 | __CTA_PROTOINFO_DCCP_MAX, | ||
103 | }; | ||
104 | #define CTA_PROTOINFO_DCCP_MAX (__CTA_PROTOINFO_DCCP_MAX - 1) | ||
105 | |||
98 | enum ctattr_counters { | 106 | enum ctattr_counters { |
99 | CTA_COUNTERS_UNSPEC, | 107 | CTA_COUNTERS_UNSPEC, |
100 | CTA_COUNTERS_PACKETS, /* old 64bit counters */ | 108 | CTA_COUNTERS_PACKETS, /* old 64bit counters */ |
diff --git a/include/net/netfilter/nf_conntrack.h b/include/net/netfilter/nf_conntrack.h index a3567a7a6d67..bb9fc852e973 100644 --- a/include/net/netfilter/nf_conntrack.h +++ b/include/net/netfilter/nf_conntrack.h | |||
@@ -20,6 +20,7 @@ | |||
20 | #include <asm/atomic.h> | 20 | #include <asm/atomic.h> |
21 | 21 | ||
22 | #include <linux/netfilter/nf_conntrack_tcp.h> | 22 | #include <linux/netfilter/nf_conntrack_tcp.h> |
23 | #include <linux/netfilter/nf_conntrack_dccp.h> | ||
23 | #include <linux/netfilter/nf_conntrack_sctp.h> | 24 | #include <linux/netfilter/nf_conntrack_sctp.h> |
24 | #include <linux/netfilter/nf_conntrack_proto_gre.h> | 25 | #include <linux/netfilter/nf_conntrack_proto_gre.h> |
25 | #include <net/netfilter/ipv4/nf_conntrack_icmp.h> | 26 | #include <net/netfilter/ipv4/nf_conntrack_icmp.h> |
@@ -30,6 +31,7 @@ | |||
30 | /* per conntrack: protocol private data */ | 31 | /* per conntrack: protocol private data */ |
31 | union nf_conntrack_proto { | 32 | union nf_conntrack_proto { |
32 | /* insert conntrack proto private data here */ | 33 | /* insert conntrack proto private data here */ |
34 | struct nf_ct_dccp dccp; | ||
33 | struct ip_ct_sctp sctp; | 35 | struct ip_ct_sctp sctp; |
34 | struct ip_ct_tcp tcp; | 36 | struct ip_ct_tcp tcp; |
35 | struct ip_ct_icmp icmp; | 37 | struct ip_ct_icmp icmp; |
diff --git a/include/net/netfilter/nf_conntrack_tuple.h b/include/net/netfilter/nf_conntrack_tuple.h index 168c91754d89..bdeec3461384 100644 --- a/include/net/netfilter/nf_conntrack_tuple.h +++ b/include/net/netfilter/nf_conntrack_tuple.h | |||
@@ -41,6 +41,9 @@ union nf_conntrack_man_proto | |||
41 | } icmp; | 41 | } icmp; |
42 | struct { | 42 | struct { |
43 | __be16 port; | 43 | __be16 port; |
44 | } dccp; | ||
45 | struct { | ||
46 | __be16 port; | ||
44 | } sctp; | 47 | } sctp; |
45 | struct { | 48 | struct { |
46 | __be16 key; /* GRE key is 32bit, PPtP only uses 16bit */ | 49 | __be16 key; /* GRE key is 32bit, PPtP only uses 16bit */ |
@@ -79,6 +82,9 @@ struct nf_conntrack_tuple | |||
79 | } icmp; | 82 | } icmp; |
80 | struct { | 83 | struct { |
81 | __be16 port; | 84 | __be16 port; |
85 | } dccp; | ||
86 | struct { | ||
87 | __be16 port; | ||
82 | } sctp; | 88 | } sctp; |
83 | struct { | 89 | struct { |
84 | __be16 key; | 90 | __be16 key; |
diff --git a/net/netfilter/Kconfig b/net/netfilter/Kconfig index daf5b881064d..c1fc0f1a641c 100644 --- a/net/netfilter/Kconfig +++ b/net/netfilter/Kconfig | |||
@@ -86,6 +86,16 @@ config NF_CONNTRACK_EVENTS | |||
86 | 86 | ||
87 | If unsure, say `N'. | 87 | If unsure, say `N'. |
88 | 88 | ||
89 | config NF_CT_PROTO_DCCP | ||
90 | tristate 'DCCP protocol connection tracking support (EXPERIMENTAL)' | ||
91 | depends on EXPERIMENTAL && NF_CONNTRACK | ||
92 | depends on NETFILTER_ADVANCED | ||
93 | help | ||
94 | With this option enabled, the layer 3 independent connection | ||
95 | tracking code will be able to do state tracking on DCCP connections. | ||
96 | |||
97 | If unsure, say 'N'. | ||
98 | |||
89 | config NF_CT_PROTO_GRE | 99 | config NF_CT_PROTO_GRE |
90 | tristate | 100 | tristate |
91 | depends on NF_CONNTRACK | 101 | depends on NF_CONNTRACK |
diff --git a/net/netfilter/Makefile b/net/netfilter/Makefile index ea7508387f95..5c4b183f6422 100644 --- a/net/netfilter/Makefile +++ b/net/netfilter/Makefile | |||
@@ -13,6 +13,7 @@ obj-$(CONFIG_NETFILTER_NETLINK_LOG) += nfnetlink_log.o | |||
13 | obj-$(CONFIG_NF_CONNTRACK) += nf_conntrack.o | 13 | obj-$(CONFIG_NF_CONNTRACK) += nf_conntrack.o |
14 | 14 | ||
15 | # SCTP protocol connection tracking | 15 | # SCTP protocol connection tracking |
16 | obj-$(CONFIG_NF_CT_PROTO_DCCP) += nf_conntrack_proto_dccp.o | ||
16 | obj-$(CONFIG_NF_CT_PROTO_GRE) += nf_conntrack_proto_gre.o | 17 | obj-$(CONFIG_NF_CT_PROTO_GRE) += nf_conntrack_proto_gre.o |
17 | obj-$(CONFIG_NF_CT_PROTO_SCTP) += nf_conntrack_proto_sctp.o | 18 | obj-$(CONFIG_NF_CT_PROTO_SCTP) += nf_conntrack_proto_sctp.o |
18 | obj-$(CONFIG_NF_CT_PROTO_UDPLITE) += nf_conntrack_proto_udplite.o | 19 | obj-$(CONFIG_NF_CT_PROTO_UDPLITE) += nf_conntrack_proto_udplite.o |
diff --git a/net/netfilter/nf_conntrack_proto_dccp.c b/net/netfilter/nf_conntrack_proto_dccp.c new file mode 100644 index 000000000000..db88c5bcc5fd --- /dev/null +++ b/net/netfilter/nf_conntrack_proto_dccp.c | |||
@@ -0,0 +1,816 @@ | |||
1 | /* | ||
2 | * DCCP connection tracking protocol helper | ||
3 | * | ||
4 | * Copyright (c) 2005, 2006, 2008 Patrick McHardy <kaber@trash.net> | ||
5 | * | ||
6 | * This program is free software; you can redistribute it and/or modify | ||
7 | * it under the terms of the GNU General Public License version 2 as | ||
8 | * published by the Free Software Foundation. | ||
9 | * | ||
10 | */ | ||
11 | #include <linux/kernel.h> | ||
12 | #include <linux/module.h> | ||
13 | #include <linux/init.h> | ||
14 | #include <linux/sysctl.h> | ||
15 | #include <linux/spinlock.h> | ||
16 | #include <linux/skbuff.h> | ||
17 | #include <linux/dccp.h> | ||
18 | |||
19 | #include <linux/netfilter/nfnetlink_conntrack.h> | ||
20 | #include <net/netfilter/nf_conntrack.h> | ||
21 | #include <net/netfilter/nf_conntrack_l4proto.h> | ||
22 | #include <net/netfilter/nf_log.h> | ||
23 | |||
24 | static DEFINE_RWLOCK(dccp_lock); | ||
25 | |||
26 | static int nf_ct_dccp_loose __read_mostly = 1; | ||
27 | |||
28 | /* Timeouts are based on values from RFC4340: | ||
29 | * | ||
30 | * - REQUEST: | ||
31 | * | ||
32 | * 8.1.2. Client Request | ||
33 | * | ||
34 | * A client MAY give up on its DCCP-Requests after some time | ||
35 | * (3 minutes, for example). | ||
36 | * | ||
37 | * - RESPOND: | ||
38 | * | ||
39 | * 8.1.3. Server Response | ||
40 | * | ||
41 | * It MAY also leave the RESPOND state for CLOSED after a timeout of | ||
42 | * not less than 4MSL (8 minutes); | ||
43 | * | ||
44 | * - PARTOPEN: | ||
45 | * | ||
46 | * 8.1.5. Handshake Completion | ||
47 | * | ||
48 | * If the client remains in PARTOPEN for more than 4MSL (8 minutes), | ||
49 | * it SHOULD reset the connection with Reset Code 2, "Aborted". | ||
50 | * | ||
51 | * - OPEN: | ||
52 | * | ||
53 | * The DCCP timestamp overflows after 11.9 hours. If the connection | ||
54 | * stays idle this long the sequence number won't be recognized | ||
55 | * as valid anymore. | ||
56 | * | ||
57 | * - CLOSEREQ/CLOSING: | ||
58 | * | ||
59 | * 8.3. Termination | ||
60 | * | ||
61 | * The retransmission timer should initially be set to go off in two | ||
62 | * round-trip times and should back off to not less than once every | ||
63 | * 64 seconds ... | ||
64 | * | ||
65 | * - TIMEWAIT: | ||
66 | * | ||
67 | * 4.3. States | ||
68 | * | ||
69 | * A server or client socket remains in this state for 2MSL (4 minutes) | ||
70 | * after the connection has been town down, ... | ||
71 | */ | ||
72 | |||
73 | #define DCCP_MSL (2 * 60 * HZ) | ||
74 | |||
75 | static unsigned int dccp_timeout[CT_DCCP_MAX + 1] __read_mostly = { | ||
76 | [CT_DCCP_REQUEST] = 2 * DCCP_MSL, | ||
77 | [CT_DCCP_RESPOND] = 4 * DCCP_MSL, | ||
78 | [CT_DCCP_PARTOPEN] = 4 * DCCP_MSL, | ||
79 | [CT_DCCP_OPEN] = 12 * 3600 * HZ, | ||
80 | [CT_DCCP_CLOSEREQ] = 64 * HZ, | ||
81 | [CT_DCCP_CLOSING] = 64 * HZ, | ||
82 | [CT_DCCP_TIMEWAIT] = 2 * DCCP_MSL, | ||
83 | }; | ||
84 | |||
85 | static const char * const dccp_state_names[] = { | ||
86 | [CT_DCCP_NONE] = "NONE", | ||
87 | [CT_DCCP_REQUEST] = "REQUEST", | ||
88 | [CT_DCCP_RESPOND] = "RESPOND", | ||
89 | [CT_DCCP_PARTOPEN] = "PARTOPEN", | ||
90 | [CT_DCCP_OPEN] = "OPEN", | ||
91 | [CT_DCCP_CLOSEREQ] = "CLOSEREQ", | ||
92 | [CT_DCCP_CLOSING] = "CLOSING", | ||
93 | [CT_DCCP_TIMEWAIT] = "TIMEWAIT", | ||
94 | [CT_DCCP_IGNORE] = "IGNORE", | ||
95 | [CT_DCCP_INVALID] = "INVALID", | ||
96 | }; | ||
97 | |||
98 | #define sNO CT_DCCP_NONE | ||
99 | #define sRQ CT_DCCP_REQUEST | ||
100 | #define sRS CT_DCCP_RESPOND | ||
101 | #define sPO CT_DCCP_PARTOPEN | ||
102 | #define sOP CT_DCCP_OPEN | ||
103 | #define sCR CT_DCCP_CLOSEREQ | ||
104 | #define sCG CT_DCCP_CLOSING | ||
105 | #define sTW CT_DCCP_TIMEWAIT | ||
106 | #define sIG CT_DCCP_IGNORE | ||
107 | #define sIV CT_DCCP_INVALID | ||
108 | |||
109 | /* | ||
110 | * DCCP state transistion table | ||
111 | * | ||
112 | * The assumption is the same as for TCP tracking: | ||
113 | * | ||
114 | * We are the man in the middle. All the packets go through us but might | ||
115 | * get lost in transit to the destination. It is assumed that the destination | ||
116 | * can't receive segments we haven't seen. | ||
117 | * | ||
118 | * The following states exist: | ||
119 | * | ||
120 | * NONE: Initial state, expecting Request | ||
121 | * REQUEST: Request seen, waiting for Response from server | ||
122 | * RESPOND: Response from server seen, waiting for Ack from client | ||
123 | * PARTOPEN: Ack after Response seen, waiting for packet other than Response, | ||
124 | * Reset or Sync from server | ||
125 | * OPEN: Packet other than Response, Reset or Sync seen | ||
126 | * CLOSEREQ: CloseReq from server seen, expecting Close from client | ||
127 | * CLOSING: Close seen, expecting Reset | ||
128 | * TIMEWAIT: Reset seen | ||
129 | * IGNORE: Not determinable whether packet is valid | ||
130 | * | ||
131 | * Some states exist only on one side of the connection: REQUEST, RESPOND, | ||
132 | * PARTOPEN, CLOSEREQ. For the other side these states are equivalent to | ||
133 | * the one it was in before. | ||
134 | * | ||
135 | * Packets are marked as ignored (sIG) if we don't know if they're valid | ||
136 | * (for example a reincarnation of a connection we didn't notice is dead | ||
137 | * already) and the server may send back a connection closing Reset or a | ||
138 | * Response. They're also used for Sync/SyncAck packets, which we don't | ||
139 | * care about. | ||
140 | */ | ||
141 | static const u_int8_t | ||
142 | dccp_state_table[CT_DCCP_ROLE_MAX + 1][DCCP_PKT_SYNCACK + 1][CT_DCCP_MAX + 1] = { | ||
143 | [CT_DCCP_ROLE_CLIENT] = { | ||
144 | [DCCP_PKT_REQUEST] = { | ||
145 | /* | ||
146 | * sNO -> sRQ Regular Request | ||
147 | * sRQ -> sRQ Retransmitted Request or reincarnation | ||
148 | * sRS -> sRS Retransmitted Request (apparently Response | ||
149 | * got lost after we saw it) or reincarnation | ||
150 | * sPO -> sIG Ignore, conntrack might be out of sync | ||
151 | * sOP -> sIG Ignore, conntrack might be out of sync | ||
152 | * sCR -> sIG Ignore, conntrack might be out of sync | ||
153 | * sCG -> sIG Ignore, conntrack might be out of sync | ||
154 | * sTW -> sRQ Reincarnation | ||
155 | * | ||
156 | * sNO, sRQ, sRS, sPO. sOP, sCR, sCG, sTW, */ | ||
157 | sRQ, sRQ, sRS, sIG, sIG, sIG, sIG, sRQ, | ||
158 | }, | ||
159 | [DCCP_PKT_RESPONSE] = { | ||
160 | /* | ||
161 | * sNO -> sIV Invalid | ||
162 | * sRQ -> sIG Ignore, might be response to ignored Request | ||
163 | * sRS -> sIG Ignore, might be response to ignored Request | ||
164 | * sPO -> sIG Ignore, might be response to ignored Request | ||
165 | * sOP -> sIG Ignore, might be response to ignored Request | ||
166 | * sCR -> sIG Ignore, might be response to ignored Request | ||
167 | * sCG -> sIG Ignore, might be response to ignored Request | ||
168 | * sTW -> sIV Invalid, reincarnation in reverse direction | ||
169 | * goes through sRQ | ||
170 | * | ||
171 | * sNO, sRQ, sRS, sPO, sOP, sCR, sCG, sTW */ | ||
172 | sIV, sIG, sIG, sIG, sIG, sIG, sIG, sIV, | ||
173 | }, | ||
174 | [DCCP_PKT_ACK] = { | ||
175 | /* | ||
176 | * sNO -> sIV No connection | ||
177 | * sRQ -> sIV No connection | ||
178 | * sRS -> sPO Ack for Response, move to PARTOPEN (8.1.5.) | ||
179 | * sPO -> sPO Retransmitted Ack for Response, remain in PARTOPEN | ||
180 | * sOP -> sOP Regular ACK, remain in OPEN | ||
181 | * sCR -> sCR Ack in CLOSEREQ MAY be processed (8.3.) | ||
182 | * sCG -> sCG Ack in CLOSING MAY be processed (8.3.) | ||
183 | * sTW -> sIV | ||
184 | * | ||
185 | * sNO, sRQ, sRS, sPO, sOP, sCR, sCG, sTW */ | ||
186 | sIV, sIV, sPO, sPO, sOP, sCR, sCG, sIV | ||
187 | }, | ||
188 | [DCCP_PKT_DATA] = { | ||
189 | /* | ||
190 | * sNO -> sIV No connection | ||
191 | * sRQ -> sIV No connection | ||
192 | * sRS -> sIV No connection | ||
193 | * sPO -> sIV MUST use DataAck in PARTOPEN state (8.1.5.) | ||
194 | * sOP -> sOP Regular Data packet | ||
195 | * sCR -> sCR Data in CLOSEREQ MAY be processed (8.3.) | ||
196 | * sCG -> sCG Data in CLOSING MAY be processed (8.3.) | ||
197 | * sTW -> sIV | ||
198 | * | ||
199 | * sNO, sRQ, sRS, sPO, sOP, sCR, sCG, sTW */ | ||
200 | sIV, sIV, sIV, sIV, sOP, sCR, sCG, sIV, | ||
201 | }, | ||
202 | [DCCP_PKT_DATAACK] = { | ||
203 | /* | ||
204 | * sNO -> sIV No connection | ||
205 | * sRQ -> sIV No connection | ||
206 | * sRS -> sPO Ack for Response, move to PARTOPEN (8.1.5.) | ||
207 | * sPO -> sPO Remain in PARTOPEN state | ||
208 | * sOP -> sOP Regular DataAck packet in OPEN state | ||
209 | * sCR -> sCR DataAck in CLOSEREQ MAY be processed (8.3.) | ||
210 | * sCG -> sCG DataAck in CLOSING MAY be processed (8.3.) | ||
211 | * sTW -> sIV | ||
212 | * | ||
213 | * sNO, sRQ, sRS, sPO, sOP, sCR, sCG, sTW */ | ||
214 | sIV, sIV, sPO, sPO, sOP, sCR, sCG, sIV | ||
215 | }, | ||
216 | [DCCP_PKT_CLOSEREQ] = { | ||
217 | /* | ||
218 | * CLOSEREQ may only be sent by the server. | ||
219 | * | ||
220 | * sNO, sRQ, sRS, sPO, sOP, sCR, sCG, sTW */ | ||
221 | sIV, sIV, sIV, sIV, sIV, sIV, sIV, sIV | ||
222 | }, | ||
223 | [DCCP_PKT_CLOSE] = { | ||
224 | /* | ||
225 | * sNO -> sIV No connection | ||
226 | * sRQ -> sIV No connection | ||
227 | * sRS -> sIV No connection | ||
228 | * sPO -> sCG Client-initiated close | ||
229 | * sOP -> sCG Client-initiated close | ||
230 | * sCR -> sCG Close in response to CloseReq (8.3.) | ||
231 | * sCG -> sCG Retransmit | ||
232 | * sTW -> sIV Late retransmit, already in TIME_WAIT | ||
233 | * | ||
234 | * sNO, sRQ, sRS, sPO, sOP, sCR, sCG, sTW */ | ||
235 | sIV, sIV, sIV, sCG, sCG, sCG, sIV, sIV | ||
236 | }, | ||
237 | [DCCP_PKT_RESET] = { | ||
238 | /* | ||
239 | * sNO -> sIV No connection | ||
240 | * sRQ -> sTW Sync received or timeout, SHOULD send Reset (8.1.1.) | ||
241 | * sRS -> sTW Response received without Request | ||
242 | * sPO -> sTW Timeout, SHOULD send Reset (8.1.5.) | ||
243 | * sOP -> sTW Connection reset | ||
244 | * sCR -> sTW Connection reset | ||
245 | * sCG -> sTW Connection reset | ||
246 | * sTW -> sIG Ignore (don't refresh timer) | ||
247 | * | ||
248 | * sNO, sRQ, sRS, sPO, sOP, sCR, sCG, sTW */ | ||
249 | sIV, sTW, sTW, sTW, sTW, sTW, sTW, sIG | ||
250 | }, | ||
251 | [DCCP_PKT_SYNC] = { | ||
252 | /* | ||
253 | * We currently ignore Sync packets | ||
254 | * | ||
255 | * sNO, sRQ, sRS, sPO, sOP, sCR, sCG, sTW */ | ||
256 | sIG, sIG, sIG, sIG, sIG, sIG, sIG, sIG, | ||
257 | }, | ||
258 | [DCCP_PKT_SYNCACK] = { | ||
259 | /* | ||
260 | * We currently ignore SyncAck packets | ||
261 | * | ||
262 | * sNO, sRQ, sRS, sPO, sOP, sCR, sCG, sTW */ | ||
263 | sIG, sIG, sIG, sIG, sIG, sIG, sIG, sIG, | ||
264 | }, | ||
265 | }, | ||
266 | [CT_DCCP_ROLE_SERVER] = { | ||
267 | [DCCP_PKT_REQUEST] = { | ||
268 | /* | ||
269 | * sNO -> sIV Invalid | ||
270 | * sRQ -> sIG Ignore, conntrack might be out of sync | ||
271 | * sRS -> sIG Ignore, conntrack might be out of sync | ||
272 | * sPO -> sIG Ignore, conntrack might be out of sync | ||
273 | * sOP -> sIG Ignore, conntrack might be out of sync | ||
274 | * sCR -> sIG Ignore, conntrack might be out of sync | ||
275 | * sCG -> sIG Ignore, conntrack might be out of sync | ||
276 | * sTW -> sRQ Reincarnation, must reverse roles | ||
277 | * | ||
278 | * sNO, sRQ, sRS, sPO, sOP, sCR, sCG, sTW */ | ||
279 | sIV, sIG, sIG, sIG, sIG, sIG, sIG, sRQ | ||
280 | }, | ||
281 | [DCCP_PKT_RESPONSE] = { | ||
282 | /* | ||
283 | * sNO -> sIV Response without Request | ||
284 | * sRQ -> sRS Response to clients Request | ||
285 | * sRS -> sRS Retransmitted Response (8.1.3. SHOULD NOT) | ||
286 | * sPO -> sIG Response to an ignored Request or late retransmit | ||
287 | * sOP -> sIG Ignore, might be response to ignored Request | ||
288 | * sCR -> sIG Ignore, might be response to ignored Request | ||
289 | * sCG -> sIG Ignore, might be response to ignored Request | ||
290 | * sTW -> sIV Invalid, Request from client in sTW moves to sRQ | ||
291 | * | ||
292 | * sNO, sRQ, sRS, sPO, sOP, sCR, sCG, sTW */ | ||
293 | sIV, sRS, sRS, sIG, sIG, sIG, sIG, sIV | ||
294 | }, | ||
295 | [DCCP_PKT_ACK] = { | ||
296 | /* | ||
297 | * sNO -> sIV No connection | ||
298 | * sRQ -> sIV No connection | ||
299 | * sRS -> sIV No connection | ||
300 | * sPO -> sOP Enter OPEN state (8.1.5.) | ||
301 | * sOP -> sOP Regular Ack in OPEN state | ||
302 | * sCR -> sIV Waiting for Close from client | ||
303 | * sCG -> sCG Ack in CLOSING MAY be processed (8.3.) | ||
304 | * sTW -> sIV | ||
305 | * | ||
306 | * sNO, sRQ, sRS, sPO, sOP, sCR, sCG, sTW */ | ||
307 | sIV, sIV, sIV, sOP, sOP, sIV, sCG, sIV | ||
308 | }, | ||
309 | [DCCP_PKT_DATA] = { | ||
310 | /* | ||
311 | * sNO -> sIV No connection | ||
312 | * sRQ -> sIV No connection | ||
313 | * sRS -> sIV No connection | ||
314 | * sPO -> sOP Enter OPEN state (8.1.5.) | ||
315 | * sOP -> sOP Regular Data packet in OPEN state | ||
316 | * sCR -> sIV Waiting for Close from client | ||
317 | * sCG -> sCG Data in CLOSING MAY be processed (8.3.) | ||
318 | * sTW -> sIV | ||
319 | * | ||
320 | * sNO, sRQ, sRS, sPO, sOP, sCR, sCG, sTW */ | ||
321 | sIV, sIV, sIV, sOP, sOP, sIV, sCG, sIV | ||
322 | }, | ||
323 | [DCCP_PKT_DATAACK] = { | ||
324 | /* | ||
325 | * sNO -> sIV No connection | ||
326 | * sRQ -> sIV No connection | ||
327 | * sRS -> sIV No connection | ||
328 | * sPO -> sOP Enter OPEN state (8.1.5.) | ||
329 | * sOP -> sOP Regular DataAck in OPEN state | ||
330 | * sCR -> sIV Waiting for Close from client | ||
331 | * sCG -> sCG Data in CLOSING MAY be processed (8.3.) | ||
332 | * sTW -> sIV | ||
333 | * | ||
334 | * sNO, sRQ, sRS, sPO, sOP, sCR, sCG, sTW */ | ||
335 | sIV, sIV, sIV, sOP, sOP, sIV, sCG, sIV | ||
336 | }, | ||
337 | [DCCP_PKT_CLOSEREQ] = { | ||
338 | /* | ||
339 | * sNO -> sIV No connection | ||
340 | * sRQ -> sIV No connection | ||
341 | * sRS -> sIV No connection | ||
342 | * sPO -> sOP -> sCR Move directly to CLOSEREQ (8.1.5.) | ||
343 | * sOP -> sCR CloseReq in OPEN state | ||
344 | * sCR -> sCR Retransmit | ||
345 | * sCG -> sCR Simultaneous close, client sends another Close | ||
346 | * sTW -> sIV Already closed | ||
347 | * | ||
348 | * sNO, sRQ, sRS, sPO, sOP, sCR, sCG, sTW */ | ||
349 | sIV, sIV, sIV, sCR, sCR, sCR, sCR, sIV | ||
350 | }, | ||
351 | [DCCP_PKT_CLOSE] = { | ||
352 | /* | ||
353 | * sNO -> sIV No connection | ||
354 | * sRQ -> sIV No connection | ||
355 | * sRS -> sIV No connection | ||
356 | * sPO -> sOP -> sCG Move direcly to CLOSING | ||
357 | * sOP -> sCG Move to CLOSING | ||
358 | * sCR -> sIV Close after CloseReq is invalid | ||
359 | * sCG -> sCG Retransmit | ||
360 | * sTW -> sIV Already closed | ||
361 | * | ||
362 | * sNO, sRQ, sRS, sPO, sOP, sCR, sCG, sTW */ | ||
363 | sIV, sIV, sIV, sCG, sCG, sIV, sCG, sIV | ||
364 | }, | ||
365 | [DCCP_PKT_RESET] = { | ||
366 | /* | ||
367 | * sNO -> sIV No connection | ||
368 | * sRQ -> sTW Reset in response to Request | ||
369 | * sRS -> sTW Timeout, SHOULD send Reset (8.1.3.) | ||
370 | * sPO -> sTW Timeout, SHOULD send Reset (8.1.3.) | ||
371 | * sOP -> sTW | ||
372 | * sCR -> sTW | ||
373 | * sCG -> sTW | ||
374 | * sTW -> sIG Ignore (don't refresh timer) | ||
375 | * | ||
376 | * sNO, sRQ, sRS, sPO, sOP, sCR, sCG, sTW, sTW */ | ||
377 | sIV, sTW, sTW, sTW, sTW, sTW, sTW, sTW, sIG | ||
378 | }, | ||
379 | [DCCP_PKT_SYNC] = { | ||
380 | /* | ||
381 | * We currently ignore Sync packets | ||
382 | * | ||
383 | * sNO, sRQ, sRS, sPO, sOP, sCR, sCG, sTW */ | ||
384 | sIG, sIG, sIG, sIG, sIG, sIG, sIG, sIG, | ||
385 | }, | ||
386 | [DCCP_PKT_SYNCACK] = { | ||
387 | /* | ||
388 | * We currently ignore SyncAck packets | ||
389 | * | ||
390 | * sNO, sRQ, sRS, sPO, sOP, sCR, sCG, sTW */ | ||
391 | sIG, sIG, sIG, sIG, sIG, sIG, sIG, sIG, | ||
392 | }, | ||
393 | }, | ||
394 | }; | ||
395 | |||
396 | static int dccp_pkt_to_tuple(const struct sk_buff *skb, unsigned int dataoff, | ||
397 | struct nf_conntrack_tuple *tuple) | ||
398 | { | ||
399 | struct dccp_hdr _hdr, *dh; | ||
400 | |||
401 | dh = skb_header_pointer(skb, dataoff, sizeof(_hdr), &_hdr); | ||
402 | if (dh == NULL) | ||
403 | return 0; | ||
404 | |||
405 | tuple->src.u.dccp.port = dh->dccph_sport; | ||
406 | tuple->dst.u.dccp.port = dh->dccph_dport; | ||
407 | return 1; | ||
408 | } | ||
409 | |||
410 | static int dccp_invert_tuple(struct nf_conntrack_tuple *inv, | ||
411 | const struct nf_conntrack_tuple *tuple) | ||
412 | { | ||
413 | inv->src.u.dccp.port = tuple->dst.u.dccp.port; | ||
414 | inv->dst.u.dccp.port = tuple->src.u.dccp.port; | ||
415 | return 1; | ||
416 | } | ||
417 | |||
418 | static int dccp_new(struct nf_conn *ct, const struct sk_buff *skb, | ||
419 | unsigned int dataoff) | ||
420 | { | ||
421 | int pf = ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.src.l3num; | ||
422 | struct dccp_hdr _dh, *dh; | ||
423 | const char *msg; | ||
424 | u_int8_t state; | ||
425 | |||
426 | dh = skb_header_pointer(skb, dataoff, sizeof(_dh), &dh); | ||
427 | BUG_ON(dh == NULL); | ||
428 | |||
429 | state = dccp_state_table[CT_DCCP_ROLE_CLIENT][dh->dccph_type][CT_DCCP_NONE]; | ||
430 | switch (state) { | ||
431 | default: | ||
432 | if (nf_ct_dccp_loose == 0) { | ||
433 | msg = "nf_ct_dccp: not picking up existing connection "; | ||
434 | goto out_invalid; | ||
435 | } | ||
436 | case CT_DCCP_REQUEST: | ||
437 | break; | ||
438 | case CT_DCCP_INVALID: | ||
439 | msg = "nf_ct_dccp: invalid state transition "; | ||
440 | goto out_invalid; | ||
441 | } | ||
442 | |||
443 | ct->proto.dccp.role[IP_CT_DIR_ORIGINAL] = CT_DCCP_ROLE_CLIENT; | ||
444 | ct->proto.dccp.role[IP_CT_DIR_REPLY] = CT_DCCP_ROLE_SERVER; | ||
445 | ct->proto.dccp.state = CT_DCCP_NONE; | ||
446 | return 1; | ||
447 | |||
448 | out_invalid: | ||
449 | if (LOG_INVALID(IPPROTO_DCCP)) | ||
450 | nf_log_packet(pf, 0, skb, NULL, NULL, NULL, msg); | ||
451 | return 0; | ||
452 | } | ||
453 | |||
454 | static u64 dccp_ack_seq(const struct dccp_hdr *dh) | ||
455 | { | ||
456 | const struct dccp_hdr_ack_bits *dhack; | ||
457 | |||
458 | dhack = (void *)dh + __dccp_basic_hdr_len(dh); | ||
459 | return ((u64)ntohs(dhack->dccph_ack_nr_high) << 32) + | ||
460 | ntohl(dhack->dccph_ack_nr_low); | ||
461 | } | ||
462 | |||
463 | static int dccp_packet(struct nf_conn *ct, const struct sk_buff *skb, | ||
464 | unsigned int dataoff, enum ip_conntrack_info ctinfo, | ||
465 | int pf, unsigned int hooknum) | ||
466 | { | ||
467 | enum ip_conntrack_dir dir = CTINFO2DIR(ctinfo); | ||
468 | struct dccp_hdr _dh, *dh; | ||
469 | u_int8_t type, old_state, new_state; | ||
470 | enum ct_dccp_roles role; | ||
471 | |||
472 | dh = skb_header_pointer(skb, dataoff, sizeof(_dh), &dh); | ||
473 | BUG_ON(dh == NULL); | ||
474 | type = dh->dccph_type; | ||
475 | |||
476 | if (type == DCCP_PKT_RESET && | ||
477 | !test_bit(IPS_SEEN_REPLY_BIT, &ct->status)) { | ||
478 | /* Tear down connection immediately if only reply is a RESET */ | ||
479 | if (del_timer(&ct->timeout)) | ||
480 | ct->timeout.function((unsigned long)ct); | ||
481 | return NF_ACCEPT; | ||
482 | } | ||
483 | |||
484 | write_lock_bh(&dccp_lock); | ||
485 | |||
486 | role = ct->proto.dccp.role[dir]; | ||
487 | old_state = ct->proto.dccp.state; | ||
488 | new_state = dccp_state_table[role][type][old_state]; | ||
489 | |||
490 | switch (new_state) { | ||
491 | case CT_DCCP_REQUEST: | ||
492 | if (old_state == CT_DCCP_TIMEWAIT && | ||
493 | role == CT_DCCP_ROLE_SERVER) { | ||
494 | /* Reincarnation in the reverse direction: reopen and | ||
495 | * reverse client/server roles. */ | ||
496 | ct->proto.dccp.role[dir] = CT_DCCP_ROLE_CLIENT; | ||
497 | ct->proto.dccp.role[!dir] = CT_DCCP_ROLE_SERVER; | ||
498 | } | ||
499 | break; | ||
500 | case CT_DCCP_RESPOND: | ||
501 | if (old_state == CT_DCCP_REQUEST) | ||
502 | ct->proto.dccp.handshake_seq = dccp_hdr_seq(dh); | ||
503 | break; | ||
504 | case CT_DCCP_PARTOPEN: | ||
505 | if (old_state == CT_DCCP_RESPOND && | ||
506 | type == DCCP_PKT_ACK && | ||
507 | dccp_ack_seq(dh) == ct->proto.dccp.handshake_seq) | ||
508 | set_bit(IPS_ASSURED_BIT, &ct->status); | ||
509 | break; | ||
510 | case CT_DCCP_IGNORE: | ||
511 | /* | ||
512 | * Connection tracking might be out of sync, so we ignore | ||
513 | * packets that might establish a new connection and resync | ||
514 | * if the server responds with a valid Response. | ||
515 | */ | ||
516 | if (ct->proto.dccp.last_dir == !dir && | ||
517 | ct->proto.dccp.last_pkt == DCCP_PKT_REQUEST && | ||
518 | type == DCCP_PKT_RESPONSE) { | ||
519 | ct->proto.dccp.role[!dir] = CT_DCCP_ROLE_CLIENT; | ||
520 | ct->proto.dccp.role[dir] = CT_DCCP_ROLE_SERVER; | ||
521 | ct->proto.dccp.handshake_seq = dccp_hdr_seq(dh); | ||
522 | new_state = CT_DCCP_RESPOND; | ||
523 | break; | ||
524 | } | ||
525 | ct->proto.dccp.last_dir = dir; | ||
526 | ct->proto.dccp.last_pkt = type; | ||
527 | |||
528 | write_unlock_bh(&dccp_lock); | ||
529 | if (LOG_INVALID(IPPROTO_DCCP)) | ||
530 | nf_log_packet(pf, 0, skb, NULL, NULL, NULL, | ||
531 | "nf_ct_dccp: invalid packet ignored "); | ||
532 | return NF_ACCEPT; | ||
533 | case CT_DCCP_INVALID: | ||
534 | write_unlock_bh(&dccp_lock); | ||
535 | if (LOG_INVALID(IPPROTO_DCCP)) | ||
536 | nf_log_packet(pf, 0, skb, NULL, NULL, NULL, | ||
537 | "nf_ct_dccp: invalid state transition "); | ||
538 | return -NF_ACCEPT; | ||
539 | } | ||
540 | |||
541 | ct->proto.dccp.last_dir = dir; | ||
542 | ct->proto.dccp.last_pkt = type; | ||
543 | ct->proto.dccp.state = new_state; | ||
544 | write_unlock_bh(&dccp_lock); | ||
545 | nf_ct_refresh_acct(ct, ctinfo, skb, dccp_timeout[new_state]); | ||
546 | |||
547 | return NF_ACCEPT; | ||
548 | } | ||
549 | |||
550 | static int dccp_error(struct sk_buff *skb, unsigned int dataoff, | ||
551 | enum ip_conntrack_info *ctinfo, int pf, | ||
552 | unsigned int hooknum) | ||
553 | { | ||
554 | struct dccp_hdr _dh, *dh; | ||
555 | unsigned int dccp_len = skb->len - dataoff; | ||
556 | unsigned int cscov; | ||
557 | const char *msg; | ||
558 | |||
559 | dh = skb_header_pointer(skb, dataoff, sizeof(_dh), &dh); | ||
560 | if (dh == NULL) { | ||
561 | msg = "nf_ct_dccp: short packet "; | ||
562 | goto out_invalid; | ||
563 | } | ||
564 | |||
565 | if (dh->dccph_doff * 4 < sizeof(struct dccp_hdr) || | ||
566 | dh->dccph_doff * 4 > dccp_len) { | ||
567 | msg = "nf_ct_dccp: truncated/malformed packet "; | ||
568 | goto out_invalid; | ||
569 | } | ||
570 | |||
571 | cscov = dccp_len; | ||
572 | if (dh->dccph_cscov) { | ||
573 | cscov = (dh->dccph_cscov - 1) * 4; | ||
574 | if (cscov > dccp_len) { | ||
575 | msg = "nf_ct_dccp: bad checksum coverage "; | ||
576 | goto out_invalid; | ||
577 | } | ||
578 | } | ||
579 | |||
580 | if (nf_conntrack_checksum && hooknum == NF_INET_PRE_ROUTING && | ||
581 | nf_checksum_partial(skb, hooknum, dataoff, cscov, IPPROTO_DCCP, | ||
582 | pf)) { | ||
583 | msg = "nf_ct_dccp: bad checksum "; | ||
584 | goto out_invalid; | ||
585 | } | ||
586 | |||
587 | if (dh->dccph_type >= DCCP_PKT_INVALID) { | ||
588 | msg = "nf_ct_dccp: reserved packet type "; | ||
589 | goto out_invalid; | ||
590 | } | ||
591 | |||
592 | return NF_ACCEPT; | ||
593 | |||
594 | out_invalid: | ||
595 | if (LOG_INVALID(IPPROTO_DCCP)) | ||
596 | nf_log_packet(pf, 0, skb, NULL, NULL, NULL, msg); | ||
597 | return -NF_ACCEPT; | ||
598 | } | ||
599 | |||
600 | static int dccp_print_tuple(struct seq_file *s, | ||
601 | const struct nf_conntrack_tuple *tuple) | ||
602 | { | ||
603 | return seq_printf(s, "sport=%hu dport=%hu ", | ||
604 | ntohs(tuple->src.u.dccp.port), | ||
605 | ntohs(tuple->dst.u.dccp.port)); | ||
606 | } | ||
607 | |||
608 | static int dccp_print_conntrack(struct seq_file *s, const struct nf_conn *ct) | ||
609 | { | ||
610 | return seq_printf(s, "%s ", dccp_state_names[ct->proto.dccp.state]); | ||
611 | } | ||
612 | |||
613 | #if defined(CONFIG_NF_CT_NETLINK) || defined(CONFIG_NF_CT_NETLINK_MODULE) | ||
614 | static int dccp_to_nlattr(struct sk_buff *skb, struct nlattr *nla, | ||
615 | const struct nf_conn *ct) | ||
616 | { | ||
617 | struct nlattr *nest_parms; | ||
618 | |||
619 | read_lock_bh(&dccp_lock); | ||
620 | nest_parms = nla_nest_start(skb, CTA_PROTOINFO_DCCP | NLA_F_NESTED); | ||
621 | if (!nest_parms) | ||
622 | goto nla_put_failure; | ||
623 | NLA_PUT_U8(skb, CTA_PROTOINFO_DCCP_STATE, ct->proto.dccp.state); | ||
624 | nla_nest_end(skb, nest_parms); | ||
625 | read_unlock_bh(&dccp_lock); | ||
626 | return 0; | ||
627 | |||
628 | nla_put_failure: | ||
629 | read_unlock_bh(&dccp_lock); | ||
630 | return -1; | ||
631 | } | ||
632 | |||
633 | static const struct nla_policy dccp_nla_policy[CTA_PROTOINFO_DCCP_MAX + 1] = { | ||
634 | [CTA_PROTOINFO_DCCP_STATE] = { .type = NLA_U8 }, | ||
635 | }; | ||
636 | |||
637 | static int nlattr_to_dccp(struct nlattr *cda[], struct nf_conn *ct) | ||
638 | { | ||
639 | struct nlattr *attr = cda[CTA_PROTOINFO_DCCP]; | ||
640 | struct nlattr *tb[CTA_PROTOINFO_DCCP_MAX + 1]; | ||
641 | int err; | ||
642 | |||
643 | if (!attr) | ||
644 | return 0; | ||
645 | |||
646 | err = nla_parse_nested(tb, CTA_PROTOINFO_DCCP_MAX, attr, | ||
647 | dccp_nla_policy); | ||
648 | if (err < 0) | ||
649 | return err; | ||
650 | |||
651 | if (!tb[CTA_PROTOINFO_DCCP_STATE] || | ||
652 | nla_get_u8(tb[CTA_PROTOINFO_DCCP_STATE]) >= CT_DCCP_IGNORE) | ||
653 | return -EINVAL; | ||
654 | |||
655 | write_lock_bh(&dccp_lock); | ||
656 | ct->proto.dccp.state = nla_get_u8(tb[CTA_PROTOINFO_DCCP_STATE]); | ||
657 | write_unlock_bh(&dccp_lock); | ||
658 | return 0; | ||
659 | } | ||
660 | #endif | ||
661 | |||
662 | #ifdef CONFIG_SYSCTL | ||
663 | static unsigned int dccp_sysctl_table_users; | ||
664 | static struct ctl_table_header *dccp_sysctl_header; | ||
665 | static ctl_table dccp_sysctl_table[] = { | ||
666 | { | ||
667 | .ctl_name = CTL_UNNUMBERED, | ||
668 | .procname = "nf_conntrack_dccp_timeout_request", | ||
669 | .data = &dccp_timeout[CT_DCCP_REQUEST], | ||
670 | .maxlen = sizeof(unsigned int), | ||
671 | .mode = 0644, | ||
672 | .proc_handler = proc_dointvec_jiffies, | ||
673 | }, | ||
674 | { | ||
675 | .ctl_name = CTL_UNNUMBERED, | ||
676 | .procname = "nf_conntrack_dccp_timeout_respond", | ||
677 | .data = &dccp_timeout[CT_DCCP_RESPOND], | ||
678 | .maxlen = sizeof(unsigned int), | ||
679 | .mode = 0644, | ||
680 | .proc_handler = proc_dointvec_jiffies, | ||
681 | }, | ||
682 | { | ||
683 | .ctl_name = CTL_UNNUMBERED, | ||
684 | .procname = "nf_conntrack_dccp_timeout_partopen", | ||
685 | .data = &dccp_timeout[CT_DCCP_PARTOPEN], | ||
686 | .maxlen = sizeof(unsigned int), | ||
687 | .mode = 0644, | ||
688 | .proc_handler = proc_dointvec_jiffies, | ||
689 | }, | ||
690 | { | ||
691 | .ctl_name = CTL_UNNUMBERED, | ||
692 | .procname = "nf_conntrack_dccp_timeout_open", | ||
693 | .data = &dccp_timeout[CT_DCCP_OPEN], | ||
694 | .maxlen = sizeof(unsigned int), | ||
695 | .mode = 0644, | ||
696 | .proc_handler = proc_dointvec_jiffies, | ||
697 | }, | ||
698 | { | ||
699 | .ctl_name = CTL_UNNUMBERED, | ||
700 | .procname = "nf_conntrack_dccp_timeout_closereq", | ||
701 | .data = &dccp_timeout[CT_DCCP_CLOSEREQ], | ||
702 | .maxlen = sizeof(unsigned int), | ||
703 | .mode = 0644, | ||
704 | .proc_handler = proc_dointvec_jiffies, | ||
705 | }, | ||
706 | { | ||
707 | .ctl_name = CTL_UNNUMBERED, | ||
708 | .procname = "nf_conntrack_dccp_timeout_closing", | ||
709 | .data = &dccp_timeout[CT_DCCP_CLOSING], | ||
710 | .maxlen = sizeof(unsigned int), | ||
711 | .mode = 0644, | ||
712 | .proc_handler = proc_dointvec_jiffies, | ||
713 | }, | ||
714 | { | ||
715 | .ctl_name = CTL_UNNUMBERED, | ||
716 | .procname = "nf_conntrack_dccp_timeout_timewait", | ||
717 | .data = &dccp_timeout[CT_DCCP_TIMEWAIT], | ||
718 | .maxlen = sizeof(unsigned int), | ||
719 | .mode = 0644, | ||
720 | .proc_handler = proc_dointvec_jiffies, | ||
721 | }, | ||
722 | { | ||
723 | .ctl_name = CTL_UNNUMBERED, | ||
724 | .procname = "nf_conntrack_dccp_loose", | ||
725 | .data = &nf_ct_dccp_loose, | ||
726 | .maxlen = sizeof(nf_ct_dccp_loose), | ||
727 | .mode = 0644, | ||
728 | .proc_handler = proc_dointvec, | ||
729 | }, | ||
730 | { | ||
731 | .ctl_name = 0, | ||
732 | } | ||
733 | }; | ||
734 | #endif /* CONFIG_SYSCTL */ | ||
735 | |||
736 | static struct nf_conntrack_l4proto dccp_proto4 __read_mostly = { | ||
737 | .l3proto = AF_INET, | ||
738 | .l4proto = IPPROTO_DCCP, | ||
739 | .name = "dccp", | ||
740 | .pkt_to_tuple = dccp_pkt_to_tuple, | ||
741 | .invert_tuple = dccp_invert_tuple, | ||
742 | .new = dccp_new, | ||
743 | .packet = dccp_packet, | ||
744 | .error = dccp_error, | ||
745 | .print_tuple = dccp_print_tuple, | ||
746 | .print_conntrack = dccp_print_conntrack, | ||
747 | #if defined(CONFIG_NF_CT_NETLINK) || defined(CONFIG_NF_CT_NETLINK_MODULE) | ||
748 | .to_nlattr = dccp_to_nlattr, | ||
749 | .from_nlattr = nlattr_to_dccp, | ||
750 | .tuple_to_nlattr = nf_ct_port_tuple_to_nlattr, | ||
751 | .nlattr_to_tuple = nf_ct_port_nlattr_to_tuple, | ||
752 | .nla_policy = nf_ct_port_nla_policy, | ||
753 | #endif | ||
754 | #ifdef CONFIG_SYSCTL | ||
755 | .ctl_table_users = &dccp_sysctl_table_users, | ||
756 | .ctl_table_header = &dccp_sysctl_header, | ||
757 | .ctl_table = dccp_sysctl_table, | ||
758 | #endif | ||
759 | }; | ||
760 | |||
761 | static struct nf_conntrack_l4proto dccp_proto6 __read_mostly = { | ||
762 | .l3proto = AF_INET6, | ||
763 | .l4proto = IPPROTO_DCCP, | ||
764 | .name = "dccp", | ||
765 | .pkt_to_tuple = dccp_pkt_to_tuple, | ||
766 | .invert_tuple = dccp_invert_tuple, | ||
767 | .new = dccp_new, | ||
768 | .packet = dccp_packet, | ||
769 | .error = dccp_error, | ||
770 | .print_tuple = dccp_print_tuple, | ||
771 | .print_conntrack = dccp_print_conntrack, | ||
772 | #if defined(CONFIG_NF_CT_NETLINK) || defined(CONFIG_NF_CT_NETLINK_MODULE) | ||
773 | .to_nlattr = dccp_to_nlattr, | ||
774 | .from_nlattr = nlattr_to_dccp, | ||
775 | .tuple_to_nlattr = nf_ct_port_tuple_to_nlattr, | ||
776 | .nlattr_to_tuple = nf_ct_port_nlattr_to_tuple, | ||
777 | .nla_policy = nf_ct_port_nla_policy, | ||
778 | #endif | ||
779 | #ifdef CONFIG_SYSCTL | ||
780 | .ctl_table_users = &dccp_sysctl_table_users, | ||
781 | .ctl_table_header = &dccp_sysctl_header, | ||
782 | .ctl_table = dccp_sysctl_table, | ||
783 | #endif | ||
784 | }; | ||
785 | |||
786 | static int __init nf_conntrack_proto_dccp_init(void) | ||
787 | { | ||
788 | int err; | ||
789 | |||
790 | err = nf_conntrack_l4proto_register(&dccp_proto4); | ||
791 | if (err < 0) | ||
792 | goto err1; | ||
793 | |||
794 | err = nf_conntrack_l4proto_register(&dccp_proto6); | ||
795 | if (err < 0) | ||
796 | goto err2; | ||
797 | return 0; | ||
798 | |||
799 | err2: | ||
800 | nf_conntrack_l4proto_unregister(&dccp_proto4); | ||
801 | err1: | ||
802 | return err; | ||
803 | } | ||
804 | |||
805 | static void __exit nf_conntrack_proto_dccp_fini(void) | ||
806 | { | ||
807 | nf_conntrack_l4proto_unregister(&dccp_proto6); | ||
808 | nf_conntrack_l4proto_unregister(&dccp_proto4); | ||
809 | } | ||
810 | |||
811 | module_init(nf_conntrack_proto_dccp_init); | ||
812 | module_exit(nf_conntrack_proto_dccp_fini); | ||
813 | |||
814 | MODULE_AUTHOR("Patrick McHardy <kaber@trash.net>"); | ||
815 | MODULE_DESCRIPTION("DCCP connection tracking protocol helper"); | ||
816 | MODULE_LICENSE("GPL"); | ||