Blame view

net/netfilter/nf_conntrack_sip.c 47.6 KB
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
1
2
3
4
  /* SIP extension for IP connection tracking.
   *
   * (C) 2005 by Christian Hentschel <chentschel@arnet.com.ar>
   * based on RR's ip_conntrack_ftp.c and other modules.
f49e1aa13   Patrick McHardy   [NETFILTER]: nf_c...
5
6
   * (C) 2007 United Security Providers
   * (C) 2007, 2008 Patrick McHardy <kaber@trash.net>
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
7
8
9
10
11
12
13
14
15
16
17
18
   *
   * This program is free software; you can redistribute it and/or modify
   * it under the terms of the GNU General Public License version 2 as
   * published by the Free Software Foundation.
   */
  
  #include <linux/module.h>
  #include <linux/ctype.h>
  #include <linux/skbuff.h>
  #include <linux/inet.h>
  #include <linux/in.h>
  #include <linux/udp.h>
f5b321bd3   Patrick McHardy   netfilter: nf_con...
19
  #include <linux/tcp.h>
1863f0965   Yasuyuki Kozakai   [NETFILTER]: nf_c...
20
  #include <linux/netfilter.h>
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
21
22
  
  #include <net/netfilter/nf_conntrack.h>
9467ee380   Patrick McHardy   [NETFILTER]: nf_c...
23
  #include <net/netfilter/nf_conntrack_core.h>
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
24
25
  #include <net/netfilter/nf_conntrack_expect.h>
  #include <net/netfilter/nf_conntrack_helper.h>
5d0aa2ccd   Patrick McHardy   netfilter: nf_con...
26
  #include <net/netfilter/nf_conntrack_zones.h>
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
27
  #include <linux/netfilter/nf_conntrack_sip.h>
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
28
29
30
31
  MODULE_LICENSE("GPL");
  MODULE_AUTHOR("Christian Hentschel <chentschel@arnet.com.ar>");
  MODULE_DESCRIPTION("SIP connection tracking helper");
  MODULE_ALIAS("ip_conntrack_sip");
4dc06f963   Pablo Neira Ayuso   netfilter: nf_con...
32
  MODULE_ALIAS_NFCT_HELPER("sip");
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
33
34
35
  
  #define MAX_PORTS	8
  static unsigned short ports[MAX_PORTS];
2f0d2f103   Stephen Hemminger   [NETFILTER]: conn...
36
  static unsigned int ports_c;
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
37
38
39
40
41
42
  module_param_array(ports, ushort, &ports_c, 0400);
  MODULE_PARM_DESC(ports, "port numbers of SIP servers");
  
  static unsigned int sip_timeout __read_mostly = SIP_TIMEOUT;
  module_param(sip_timeout, uint, 0600);
  MODULE_PARM_DESC(sip_timeout, "timeout for the master SIP session");
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
43
44
45
46
  static int sip_direct_signalling __read_mostly = 1;
  module_param(sip_direct_signalling, int, 0600);
  MODULE_PARM_DESC(sip_direct_signalling, "expect incoming calls from registrar "
  					"only (default 1)");
d901a9369   Patrick McHardy   [NETFILTER]: nf_c...
47
48
49
50
  static int sip_direct_media __read_mostly = 1;
  module_param(sip_direct_media, int, 0600);
  MODULE_PARM_DESC(sip_direct_media, "Expect Media streams between signalling "
  				   "endpoints only (default 1)");
051966c0c   Patrick McHardy   netfilter: nf_nat...
51
52
  unsigned int (*nf_nat_sip_hook)(struct sk_buff *skb, unsigned int protoff,
  				unsigned int dataoff, const char **dptr,
2a6cfb22a   Patrick McHardy   [NETFILTER]: nf_c...
53
  				unsigned int *datalen) __read_mostly;
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
54
  EXPORT_SYMBOL_GPL(nf_nat_sip_hook);
9a6648210   Patrick McHardy   netfilter: nf_nat...
55
56
  void (*nf_nat_sip_seq_adjust_hook)(struct sk_buff *skb, unsigned int protoff,
  				   s16 off) __read_mostly;
48f8ac265   Patrick McHardy   netfilter: nf_nat...
57
  EXPORT_SYMBOL_GPL(nf_nat_sip_seq_adjust_hook);
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
58
  unsigned int (*nf_nat_sip_expect_hook)(struct sk_buff *skb,
051966c0c   Patrick McHardy   netfilter: nf_nat...
59
  				       unsigned int protoff,
3b6b9fab4   Patrick McHardy   netfilter: nf_con...
60
  				       unsigned int dataoff,
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
61
62
63
64
65
66
  				       const char **dptr,
  				       unsigned int *datalen,
  				       struct nf_conntrack_expect *exp,
  				       unsigned int matchoff,
  				       unsigned int matchlen) __read_mostly;
  EXPORT_SYMBOL_GPL(nf_nat_sip_expect_hook);
051966c0c   Patrick McHardy   netfilter: nf_nat...
67
68
  unsigned int (*nf_nat_sdp_addr_hook)(struct sk_buff *skb, unsigned int protoff,
  				     unsigned int dataoff,
4ab9e64e5   Patrick McHardy   [NETFILTER]: nf_n...
69
  				     const char **dptr,
4ab9e64e5   Patrick McHardy   [NETFILTER]: nf_n...
70
  				     unsigned int *datalen,
3b6b9fab4   Patrick McHardy   netfilter: nf_con...
71
  				     unsigned int sdpoff,
4ab9e64e5   Patrick McHardy   [NETFILTER]: nf_n...
72
73
74
75
76
  				     enum sdp_header_types type,
  				     enum sdp_header_types term,
  				     const union nf_inet_addr *addr)
  				     __read_mostly;
  EXPORT_SYMBOL_GPL(nf_nat_sdp_addr_hook);
051966c0c   Patrick McHardy   netfilter: nf_nat...
77
78
  unsigned int (*nf_nat_sdp_port_hook)(struct sk_buff *skb, unsigned int protoff,
  				     unsigned int dataoff,
c7f485abd   Patrick McHardy   [NETFILTER]: nf_c...
79
80
81
82
83
84
  				     const char **dptr,
  				     unsigned int *datalen,
  				     unsigned int matchoff,
  				     unsigned int matchlen,
  				     u_int16_t port) __read_mostly;
  EXPORT_SYMBOL_GPL(nf_nat_sdp_port_hook);
4ab9e64e5   Patrick McHardy   [NETFILTER]: nf_n...
85
  unsigned int (*nf_nat_sdp_session_hook)(struct sk_buff *skb,
051966c0c   Patrick McHardy   netfilter: nf_nat...
86
  					unsigned int protoff,
4ab9e64e5   Patrick McHardy   [NETFILTER]: nf_n...
87
  					unsigned int dataoff,
3b6b9fab4   Patrick McHardy   netfilter: nf_con...
88
  					const char **dptr,
4ab9e64e5   Patrick McHardy   [NETFILTER]: nf_n...
89
  					unsigned int *datalen,
3b6b9fab4   Patrick McHardy   netfilter: nf_con...
90
  					unsigned int sdpoff,
4ab9e64e5   Patrick McHardy   [NETFILTER]: nf_n...
91
92
93
  					const union nf_inet_addr *addr)
  					__read_mostly;
  EXPORT_SYMBOL_GPL(nf_nat_sdp_session_hook);
051966c0c   Patrick McHardy   netfilter: nf_nat...
94
95
  unsigned int (*nf_nat_sdp_media_hook)(struct sk_buff *skb, unsigned int protoff,
  				      unsigned int dataoff,
4ab9e64e5   Patrick McHardy   [NETFILTER]: nf_n...
96
97
98
99
100
101
102
103
104
  				      const char **dptr,
  				      unsigned int *datalen,
  				      struct nf_conntrack_expect *rtp_exp,
  				      struct nf_conntrack_expect *rtcp_exp,
  				      unsigned int mediaoff,
  				      unsigned int medialen,
  				      union nf_inet_addr *rtp_addr)
  				      __read_mostly;
  EXPORT_SYMBOL_GPL(nf_nat_sdp_media_hook);
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
105

ac3677406   Patrick McHardy   [NETFILTER]: nf_c...
106
107
108
109
110
111
112
113
114
115
116
  static int string_len(const struct nf_conn *ct, const char *dptr,
  		      const char *limit, int *shift)
  {
  	int len = 0;
  
  	while (dptr < limit && isalpha(*dptr)) {
  		dptr++;
  		len++;
  	}
  	return len;
  }
13f7d63c2   Jan Engelhardt   [NETFILTER]: nf_{...
117
  static int digits_len(const struct nf_conn *ct, const char *dptr,
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
118
119
120
  		      const char *limit, int *shift)
  {
  	int len = 0;
b1ec488b1   Patrick McHardy   [NETFILTER]: nf_c...
121
  	while (dptr < limit && isdigit(*dptr)) {
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
122
123
124
125
126
  		dptr++;
  		len++;
  	}
  	return len;
  }
001985b2c   Simon Horman   netfilter: nf_con...
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
  static int iswordc(const char c)
  {
  	if (isalnum(c) || c == '!' || c == '"' || c == '%' ||
  	    (c >= '(' && c <= '/') || c == ':' || c == '<' || c == '>' ||
  	    c == '?' || (c >= '[' && c <= ']') || c == '_' || c == '`' ||
  	    c == '{' || c == '}' || c == '~')
  		return 1;
  	return 0;
  }
  
  static int word_len(const char *dptr, const char *limit)
  {
  	int len = 0;
  	while (dptr < limit && iswordc(*dptr)) {
  		dptr++;
  		len++;
  	}
  	return len;
  }
  
  static int callid_len(const struct nf_conn *ct, const char *dptr,
  		      const char *limit, int *shift)
  {
  	int len, domain_len;
  
  	len = word_len(dptr, limit);
  	dptr += len;
  	if (!len || dptr == limit || *dptr != '@')
  		return len;
  	dptr++;
  	len++;
  
  	domain_len = word_len(dptr, limit);
  	if (!domain_len)
  		return 0;
  	return len + domain_len;
  }
0d0ab0378   Patrick McHardy   [NETFILTER]: nf_c...
164
165
166
167
168
169
170
171
172
173
174
175
176
177
  /* get media type + port length */
  static int media_len(const struct nf_conn *ct, const char *dptr,
  		     const char *limit, int *shift)
  {
  	int len = string_len(ct, dptr, limit, shift);
  
  	dptr += len;
  	if (dptr >= limit || *dptr != ' ')
  		return 0;
  	len++;
  	dptr++;
  
  	return len + digits_len(ct, dptr, limit, shift);
  }
02b69cbdc   Patrick McHardy   netfilter: nf_ct_...
178
179
180
  static int sip_parse_addr(const struct nf_conn *ct, const char *cp,
  			  const char **endp, union nf_inet_addr *addr,
  			  const char *limit, bool delim)
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
181
182
  {
  	const char *end;
02b69cbdc   Patrick McHardy   netfilter: nf_ct_...
183
  	int ret;
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
184

5adbb9fb0   Simon Horman   netfilter: nf_con...
185
186
  	if (!ct)
  		return 0;
fa913ddf6   Patrick McHardy   [NETFILTER]: nf_c...
187
  	memset(addr, 0, sizeof(*addr));
5e8fbe2ac   Patrick McHardy   [NETFILTER]: nf_c...
188
  	switch (nf_ct_l3num(ct)) {
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
189
190
  	case AF_INET:
  		ret = in4_pton(cp, limit - cp, (u8 *)&addr->ip, -1, &end);
02b69cbdc   Patrick McHardy   netfilter: nf_ct_...
191
192
  		if (ret == 0)
  			return 0;
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
193
194
  		break;
  	case AF_INET6:
02b69cbdc   Patrick McHardy   netfilter: nf_ct_...
195
196
197
198
  		if (cp < limit && *cp == '[')
  			cp++;
  		else if (delim)
  			return 0;
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
199
  		ret = in6_pton(cp, limit - cp, (u8 *)&addr->ip6, -1, &end);
02b69cbdc   Patrick McHardy   netfilter: nf_ct_...
200
201
202
203
204
205
206
  		if (ret == 0)
  			return 0;
  
  		if (end < limit && *end == ']')
  			end++;
  		else if (delim)
  			return 0;
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
207
208
209
210
  		break;
  	default:
  		BUG();
  	}
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
211
212
213
214
215
216
  	if (endp)
  		*endp = end;
  	return 1;
  }
  
  /* skip ip address. returns its length. */
13f7d63c2   Jan Engelhardt   [NETFILTER]: nf_{...
217
  static int epaddr_len(const struct nf_conn *ct, const char *dptr,
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
218
219
  		      const char *limit, int *shift)
  {
643a2c15a   Jan Engelhardt   [NETFILTER]: Intr...
220
  	union nf_inet_addr addr;
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
221
  	const char *aux = dptr;
02b69cbdc   Patrick McHardy   netfilter: nf_ct_...
222
  	if (!sip_parse_addr(ct, dptr, &dptr, &addr, limit, true)) {
0d53778e8   Patrick McHardy   [NETFILTER]: Conv...
223
224
  		pr_debug("ip: %s parse failed.!
  ", dptr);
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
225
226
227
228
229
230
231
232
233
234
235
236
  		return 0;
  	}
  
  	/* Port number */
  	if (*dptr == ':') {
  		dptr++;
  		dptr += digits_len(ct, dptr, limit, shift);
  	}
  	return dptr - aux;
  }
  
  /* get address length, skiping user info. */
13f7d63c2   Jan Engelhardt   [NETFILTER]: nf_{...
237
  static int skp_epaddr_len(const struct nf_conn *ct, const char *dptr,
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
238
239
  			  const char *limit, int *shift)
  {
aa584eda5   Patrick McHardy   [NETFILTER]: nf_c...
240
  	const char *start = dptr;
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
241
  	int s = *shift;
7da5bfbb1   Lars Immisch   [NETFILTER]: SIP ...
242
243
244
  	/* Search for @, but stop at the end of the line.
  	 * We are inside a sip: URI, so we don't need to worry about
  	 * continuation lines. */
b1ec488b1   Patrick McHardy   [NETFILTER]: nf_c...
245
  	while (dptr < limit &&
7da5bfbb1   Lars Immisch   [NETFILTER]: SIP ...
246
247
  	       *dptr != '@' && *dptr != '\r' && *dptr != '
  ') {
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
248
  		(*shift)++;
7da5bfbb1   Lars Immisch   [NETFILTER]: SIP ...
249
250
  		dptr++;
  	}
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
251

b1ec488b1   Patrick McHardy   [NETFILTER]: nf_c...
252
  	if (dptr < limit && *dptr == '@') {
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
253
254
  		dptr++;
  		(*shift)++;
aa584eda5   Patrick McHardy   [NETFILTER]: nf_c...
255
256
  	} else {
  		dptr = start;
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
257
  		*shift = s;
aa584eda5   Patrick McHardy   [NETFILTER]: nf_c...
258
  	}
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
259
260
261
  
  	return epaddr_len(ct, dptr, limit, shift);
  }
ac3677406   Patrick McHardy   [NETFILTER]: nf_c...
262
263
264
265
266
267
268
269
  /* Parse a SIP request line of the form:
   *
   * Request-Line = Method SP Request-URI SP SIP-Version CRLF
   *
   * and return the offset and length of the address contained in the Request-URI.
   */
  int ct_sip_parse_request(const struct nf_conn *ct,
  			 const char *dptr, unsigned int datalen,
624f8b7bb   Patrick McHardy   [NETFILTER]: nf_n...
270
271
  			 unsigned int *matchoff, unsigned int *matchlen,
  			 union nf_inet_addr *addr, __be16 *port)
ac3677406   Patrick McHardy   [NETFILTER]: nf_c...
272
  {
624f8b7bb   Patrick McHardy   [NETFILTER]: nf_n...
273
  	const char *start = dptr, *limit = dptr + datalen, *end;
ac3677406   Patrick McHardy   [NETFILTER]: nf_c...
274
  	unsigned int mlen;
624f8b7bb   Patrick McHardy   [NETFILTER]: nf_n...
275
  	unsigned int p;
ac3677406   Patrick McHardy   [NETFILTER]: nf_c...
276
277
278
279
280
281
282
283
284
285
286
  	int shift = 0;
  
  	/* Skip method and following whitespace */
  	mlen = string_len(ct, dptr, limit, NULL);
  	if (!mlen)
  		return 0;
  	dptr += mlen;
  	if (++dptr >= limit)
  		return 0;
  
  	/* Find SIP URI */
54101f4f3   Patrick McHardy   netfilter: nf_con...
287
  	for (; dptr < limit - strlen("sip:"); dptr++) {
ac3677406   Patrick McHardy   [NETFILTER]: nf_c...
288
289
290
  		if (*dptr == '\r' || *dptr == '
  ')
  			return -1;
54101f4f3   Patrick McHardy   netfilter: nf_con...
291
292
  		if (strnicmp(dptr, "sip:", strlen("sip:")) == 0) {
  			dptr += strlen("sip:");
ac3677406   Patrick McHardy   [NETFILTER]: nf_c...
293
  			break;
54101f4f3   Patrick McHardy   netfilter: nf_con...
294
  		}
ac3677406   Patrick McHardy   [NETFILTER]: nf_c...
295
  	}
624f8b7bb   Patrick McHardy   [NETFILTER]: nf_n...
296
  	if (!skp_epaddr_len(ct, dptr, limit, &shift))
ac3677406   Patrick McHardy   [NETFILTER]: nf_c...
297
  		return 0;
624f8b7bb   Patrick McHardy   [NETFILTER]: nf_n...
298
  	dptr += shift;
02b69cbdc   Patrick McHardy   netfilter: nf_ct_...
299
  	if (!sip_parse_addr(ct, dptr, &end, addr, limit, true))
624f8b7bb   Patrick McHardy   [NETFILTER]: nf_n...
300
301
302
303
304
305
306
307
308
309
310
311
312
313
  		return -1;
  	if (end < limit && *end == ':') {
  		end++;
  		p = simple_strtoul(end, (char **)&end, 10);
  		if (p < 1024 || p > 65535)
  			return -1;
  		*port = htons(p);
  	} else
  		*port = htons(SIP_PORT);
  
  	if (end == dptr)
  		return 0;
  	*matchoff = dptr - start;
  	*matchlen = end - dptr;
ac3677406   Patrick McHardy   [NETFILTER]: nf_c...
314
315
316
  	return 1;
  }
  EXPORT_SYMBOL_GPL(ct_sip_parse_request);
ea45f12a2   Patrick McHardy   [NETFILTER]: nf_c...
317
318
319
320
321
322
323
324
325
  /* SIP header parsing: SIP headers are located at the beginning of a line, but
   * may span several lines, in which case the continuation lines begin with a
   * whitespace character. RFC 2543 allows lines to be terminated with CR, LF or
   * CRLF, RFC 3261 allows only CRLF, we support both.
   *
   * Headers are followed by (optionally) whitespace, a colon, again (optionally)
   * whitespace and the values. Whitespace in this context means any amount of
   * tabs, spaces and continuation lines, which are treated as a single whitespace
   * character.
05e3ced29   Patrick McHardy   [NETFILTER]: nf_c...
326
   *
3ad2f3fbb   Daniel Mack   tree-wide: Assort...
327
   * Some headers may appear multiple times. A comma separated list of values is
05e3ced29   Patrick McHardy   [NETFILTER]: nf_c...
328
   * equivalent to multiple headers.
ea45f12a2   Patrick McHardy   [NETFILTER]: nf_c...
329
330
   */
  static const struct sip_header ct_sip_hdrs[] = {
30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
331
  	[SIP_HDR_CSEQ]			= SIP_HDR("CSeq", NULL, NULL, digits_len),
ea45f12a2   Patrick McHardy   [NETFILTER]: nf_c...
332
333
334
  	[SIP_HDR_FROM]			= SIP_HDR("From", "f", "sip:", skp_epaddr_len),
  	[SIP_HDR_TO]			= SIP_HDR("To", "t", "sip:", skp_epaddr_len),
  	[SIP_HDR_CONTACT]		= SIP_HDR("Contact", "m", "sip:", skp_epaddr_len),
f5b321bd3   Patrick McHardy   netfilter: nf_con...
335
336
  	[SIP_HDR_VIA_UDP]		= SIP_HDR("Via", "v", "UDP ", epaddr_len),
  	[SIP_HDR_VIA_TCP]		= SIP_HDR("Via", "v", "TCP ", epaddr_len),
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
337
  	[SIP_HDR_EXPIRES]		= SIP_HDR("Expires", NULL, NULL, digits_len),
ea45f12a2   Patrick McHardy   [NETFILTER]: nf_c...
338
  	[SIP_HDR_CONTENT_LENGTH]	= SIP_HDR("Content-Length", "l", NULL, digits_len),
001985b2c   Simon Horman   netfilter: nf_con...
339
  	[SIP_HDR_CALL_ID]		= SIP_HDR("Call-Id", "i", NULL, callid_len),
ea45f12a2   Patrick McHardy   [NETFILTER]: nf_c...
340
341
342
  };
  
  static const char *sip_follow_continuation(const char *dptr, const char *limit)
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
343
  {
ea45f12a2   Patrick McHardy   [NETFILTER]: nf_c...
344
345
346
347
348
349
350
351
352
353
354
  	/* Walk past newline */
  	if (++dptr >= limit)
  		return NULL;
  
  	/* Skip '
  ' in CR LF */
  	if (*(dptr - 1) == '\r' && *dptr == '
  ') {
  		if (++dptr >= limit)
  			return NULL;
  	}
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
355

ea45f12a2   Patrick McHardy   [NETFILTER]: nf_c...
356
357
358
  	/* Continuation line? */
  	if (*dptr != ' ' && *dptr != '\t')
  		return NULL;
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
359

ea45f12a2   Patrick McHardy   [NETFILTER]: nf_c...
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
  	/* skip leading whitespace */
  	for (; dptr < limit; dptr++) {
  		if (*dptr != ' ' && *dptr != '\t')
  			break;
  	}
  	return dptr;
  }
  
  static const char *sip_skip_whitespace(const char *dptr, const char *limit)
  {
  	for (; dptr < limit; dptr++) {
  		if (*dptr == ' ')
  			continue;
  		if (*dptr != '\r' && *dptr != '
  ')
  			break;
  		dptr = sip_follow_continuation(dptr, limit);
  		if (dptr == NULL)
  			return NULL;
  	}
  	return dptr;
  }
  
  /* Search within a SIP header value, dealing with continuation lines */
  static const char *ct_sip_header_search(const char *dptr, const char *limit,
  					const char *needle, unsigned int len)
  {
  	for (limit -= len; dptr < limit; dptr++) {
  		if (*dptr == '\r' || *dptr == '
  ') {
  			dptr = sip_follow_continuation(dptr, limit);
  			if (dptr == NULL)
  				break;
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
393
394
  			continue;
  		}
ea45f12a2   Patrick McHardy   [NETFILTER]: nf_c...
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
  
  		if (strnicmp(dptr, needle, len) == 0)
  			return dptr;
  	}
  	return NULL;
  }
  
  int ct_sip_get_header(const struct nf_conn *ct, const char *dptr,
  		      unsigned int dataoff, unsigned int datalen,
  		      enum sip_header_types type,
  		      unsigned int *matchoff, unsigned int *matchlen)
  {
  	const struct sip_header *hdr = &ct_sip_hdrs[type];
  	const char *start = dptr, *limit = dptr + datalen;
  	int shift = 0;
  
  	for (dptr += dataoff; dptr < limit; dptr++) {
  		/* Find beginning of line */
  		if (*dptr != '\r' && *dptr != '
  ')
  			continue;
  		if (++dptr >= limit)
  			break;
  		if (*(dptr - 1) == '\r' && *dptr == '
  ') {
  			if (++dptr >= limit)
  				break;
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
422
  		}
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
423

ea45f12a2   Patrick McHardy   [NETFILTER]: nf_c...
424
425
426
  		/* Skip continuation lines */
  		if (*dptr == ' ' || *dptr == '\t')
  			continue;
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
427

ea45f12a2   Patrick McHardy   [NETFILTER]: nf_c...
428
429
430
431
432
433
434
  		/* Find header. Compact headers must be followed by a
  		 * non-alphabetic character to avoid mismatches. */
  		if (limit - dptr >= hdr->len &&
  		    strnicmp(dptr, hdr->name, hdr->len) == 0)
  			dptr += hdr->len;
  		else if (hdr->cname && limit - dptr >= hdr->clen + 1 &&
  			 strnicmp(dptr, hdr->cname, hdr->clen) == 0 &&
135d01899   Patrick McHardy   netfilter: nf_con...
435
  			 !isalpha(*(dptr + hdr->clen)))
ea45f12a2   Patrick McHardy   [NETFILTER]: nf_c...
436
437
438
  			dptr += hdr->clen;
  		else
  			continue;
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
439

ea45f12a2   Patrick McHardy   [NETFILTER]: nf_c...
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
  		/* Find and skip colon */
  		dptr = sip_skip_whitespace(dptr, limit);
  		if (dptr == NULL)
  			break;
  		if (*dptr != ':' || ++dptr >= limit)
  			break;
  
  		/* Skip whitespace after colon */
  		dptr = sip_skip_whitespace(dptr, limit);
  		if (dptr == NULL)
  			break;
  
  		*matchoff = dptr - start;
  		if (hdr->search) {
  			dptr = ct_sip_header_search(dptr, limit, hdr->search,
  						    hdr->slen);
  			if (!dptr)
  				return -1;
  			dptr += hdr->slen;
  		}
  
  		*matchlen = hdr->match_len(ct, dptr, limit, &shift);
  		if (!*matchlen)
  			return -1;
  		*matchoff = dptr - start + shift;
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
465
466
  		return 1;
  	}
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
467
468
  	return 0;
  }
ea45f12a2   Patrick McHardy   [NETFILTER]: nf_c...
469
  EXPORT_SYMBOL_GPL(ct_sip_get_header);
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
470

3ad2f3fbb   Daniel Mack   tree-wide: Assort...
471
  /* Get next header field in a list of comma separated values */
05e3ced29   Patrick McHardy   [NETFILTER]: nf_c...
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
  static int ct_sip_next_header(const struct nf_conn *ct, const char *dptr,
  			      unsigned int dataoff, unsigned int datalen,
  			      enum sip_header_types type,
  			      unsigned int *matchoff, unsigned int *matchlen)
  {
  	const struct sip_header *hdr = &ct_sip_hdrs[type];
  	const char *start = dptr, *limit = dptr + datalen;
  	int shift = 0;
  
  	dptr += dataoff;
  
  	dptr = ct_sip_header_search(dptr, limit, ",", strlen(","));
  	if (!dptr)
  		return 0;
  
  	dptr = ct_sip_header_search(dptr, limit, hdr->search, hdr->slen);
  	if (!dptr)
  		return 0;
  	dptr += hdr->slen;
  
  	*matchoff = dptr - start;
  	*matchlen = hdr->match_len(ct, dptr, limit, &shift);
  	if (!*matchlen)
  		return -1;
  	*matchoff += shift;
  	return 1;
  }
  
  /* Walk through headers until a parsable one is found or no header of the
   * given type is left. */
  static int ct_sip_walk_headers(const struct nf_conn *ct, const char *dptr,
  			       unsigned int dataoff, unsigned int datalen,
  			       enum sip_header_types type, int *in_header,
  			       unsigned int *matchoff, unsigned int *matchlen)
  {
  	int ret;
  
  	if (in_header && *in_header) {
  		while (1) {
  			ret = ct_sip_next_header(ct, dptr, dataoff, datalen,
  						 type, matchoff, matchlen);
  			if (ret > 0)
  				return ret;
  			if (ret == 0)
  				break;
  			dataoff += *matchoff;
  		}
  		*in_header = 0;
  	}
  
  	while (1) {
  		ret = ct_sip_get_header(ct, dptr, dataoff, datalen,
  					type, matchoff, matchlen);
  		if (ret > 0)
  			break;
  		if (ret == 0)
  			return ret;
  		dataoff += *matchoff;
  	}
  
  	if (in_header)
  		*in_header = 1;
  	return 1;
  }
  
  /* Locate a SIP header, parse the URI and return the offset and length of
   * the address as well as the address and port themselves. A stream of
   * headers can be parsed by handing in a non-NULL datalen and in_header
   * pointer.
   */
  int ct_sip_parse_header_uri(const struct nf_conn *ct, const char *dptr,
  			    unsigned int *dataoff, unsigned int datalen,
  			    enum sip_header_types type, int *in_header,
  			    unsigned int *matchoff, unsigned int *matchlen,
  			    union nf_inet_addr *addr, __be16 *port)
  {
  	const char *c, *limit = dptr + datalen;
  	unsigned int p;
  	int ret;
  
  	ret = ct_sip_walk_headers(ct, dptr, dataoff ? *dataoff : 0, datalen,
  				  type, in_header, matchoff, matchlen);
  	WARN_ON(ret < 0);
  	if (ret == 0)
  		return ret;
02b69cbdc   Patrick McHardy   netfilter: nf_ct_...
557
  	if (!sip_parse_addr(ct, dptr + *matchoff, &c, addr, limit, true))
05e3ced29   Patrick McHardy   [NETFILTER]: nf_c...
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
  		return -1;
  	if (*c == ':') {
  		c++;
  		p = simple_strtoul(c, (char **)&c, 10);
  		if (p < 1024 || p > 65535)
  			return -1;
  		*port = htons(p);
  	} else
  		*port = htons(SIP_PORT);
  
  	if (dataoff)
  		*dataoff = c - dptr;
  	return 1;
  }
  EXPORT_SYMBOL_GPL(ct_sip_parse_header_uri);
f5b321bd3   Patrick McHardy   netfilter: nf_con...
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
  static int ct_sip_parse_param(const struct nf_conn *ct, const char *dptr,
  			      unsigned int dataoff, unsigned int datalen,
  			      const char *name,
  			      unsigned int *matchoff, unsigned int *matchlen)
  {
  	const char *limit = dptr + datalen;
  	const char *start;
  	const char *end;
  
  	limit = ct_sip_header_search(dptr + dataoff, limit, ",", strlen(","));
  	if (!limit)
  		limit = dptr + datalen;
  
  	start = ct_sip_header_search(dptr + dataoff, limit, name, strlen(name));
  	if (!start)
  		return 0;
  	start += strlen(name);
  
  	end = ct_sip_header_search(start, limit, ";", strlen(";"));
  	if (!end)
  		end = limit;
  
  	*matchoff = start - dptr;
  	*matchlen = end - start;
  	return 1;
  }
2bbb21168   Patrick McHardy   [NETFILTER]: nf_c...
599
600
601
602
603
  /* Parse address from header parameter and return address, offset and length */
  int ct_sip_parse_address_param(const struct nf_conn *ct, const char *dptr,
  			       unsigned int dataoff, unsigned int datalen,
  			       const char *name,
  			       unsigned int *matchoff, unsigned int *matchlen,
02b69cbdc   Patrick McHardy   netfilter: nf_ct_...
604
  			       union nf_inet_addr *addr, bool delim)
2bbb21168   Patrick McHardy   [NETFILTER]: nf_c...
605
606
607
608
609
610
611
612
613
614
615
616
617
  {
  	const char *limit = dptr + datalen;
  	const char *start, *end;
  
  	limit = ct_sip_header_search(dptr + dataoff, limit, ",", strlen(","));
  	if (!limit)
  		limit = dptr + datalen;
  
  	start = ct_sip_header_search(dptr + dataoff, limit, name, strlen(name));
  	if (!start)
  		return 0;
  
  	start += strlen(name);
02b69cbdc   Patrick McHardy   netfilter: nf_ct_...
618
  	if (!sip_parse_addr(ct, start, &end, addr, limit, delim))
2bbb21168   Patrick McHardy   [NETFILTER]: nf_c...
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
  		return 0;
  	*matchoff = start - dptr;
  	*matchlen = end - start;
  	return 1;
  }
  EXPORT_SYMBOL_GPL(ct_sip_parse_address_param);
  
  /* Parse numerical header parameter and return value, offset and length */
  int ct_sip_parse_numerical_param(const struct nf_conn *ct, const char *dptr,
  				 unsigned int dataoff, unsigned int datalen,
  				 const char *name,
  				 unsigned int *matchoff, unsigned int *matchlen,
  				 unsigned int *val)
  {
  	const char *limit = dptr + datalen;
  	const char *start;
  	char *end;
  
  	limit = ct_sip_header_search(dptr + dataoff, limit, ",", strlen(","));
  	if (!limit)
  		limit = dptr + datalen;
  
  	start = ct_sip_header_search(dptr + dataoff, limit, name, strlen(name));
  	if (!start)
  		return 0;
  
  	start += strlen(name);
  	*val = simple_strtoul(start, &end, 0);
  	if (start == end)
  		return 0;
  	if (matchoff && matchlen) {
  		*matchoff = start - dptr;
  		*matchlen = end - start;
  	}
  	return 1;
  }
  EXPORT_SYMBOL_GPL(ct_sip_parse_numerical_param);
f5b321bd3   Patrick McHardy   netfilter: nf_con...
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
  static int ct_sip_parse_transport(struct nf_conn *ct, const char *dptr,
  				  unsigned int dataoff, unsigned int datalen,
  				  u8 *proto)
  {
  	unsigned int matchoff, matchlen;
  
  	if (ct_sip_parse_param(ct, dptr, dataoff, datalen, "transport=",
  			       &matchoff, &matchlen)) {
  		if (!strnicmp(dptr + matchoff, "TCP", strlen("TCP")))
  			*proto = IPPROTO_TCP;
  		else if (!strnicmp(dptr + matchoff, "UDP", strlen("UDP")))
  			*proto = IPPROTO_UDP;
  		else
  			return 0;
  
  		if (*proto != nf_ct_protonum(ct))
  			return 0;
  	} else
  		*proto = nf_ct_protonum(ct);
  
  	return 1;
  }
02b69cbdc   Patrick McHardy   netfilter: nf_ct_...
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
  static int sdp_parse_addr(const struct nf_conn *ct, const char *cp,
  			  const char **endp, union nf_inet_addr *addr,
  			  const char *limit)
  {
  	const char *end;
  	int ret;
  
  	memset(addr, 0, sizeof(*addr));
  	switch (nf_ct_l3num(ct)) {
  	case AF_INET:
  		ret = in4_pton(cp, limit - cp, (u8 *)&addr->ip, -1, &end);
  		break;
  	case AF_INET6:
  		ret = in6_pton(cp, limit - cp, (u8 *)&addr->ip6, -1, &end);
  		break;
  	default:
  		BUG();
  	}
  
  	if (ret == 0)
  		return 0;
  	if (endp)
  		*endp = end;
  	return 1;
  }
  
  /* skip ip address. returns its length. */
  static int sdp_addr_len(const struct nf_conn *ct, const char *dptr,
  			const char *limit, int *shift)
  {
  	union nf_inet_addr addr;
  	const char *aux = dptr;
  
  	if (!sdp_parse_addr(ct, dptr, &dptr, &addr, limit)) {
  		pr_debug("ip: %s parse failed.!
  ", dptr);
  		return 0;
  	}
  
  	return dptr - aux;
  }
3e9b4600b   Patrick McHardy   [NETFILTER]: nf_c...
719
720
721
722
723
724
725
726
727
  /* SDP header parsing: a SDP session description contains an ordered set of
   * headers, starting with a section containing general session parameters,
   * optionally followed by multiple media descriptions.
   *
   * SDP headers always start at the beginning of a line. According to RFC 2327:
   * "The sequence CRLF (0x0d0a) is used to end a record, although parsers should
   * be tolerant and also accept records terminated with a single newline
   * character". We handle both cases.
   */
9a6648210   Patrick McHardy   netfilter: nf_nat...
728
729
730
731
732
733
734
735
736
737
738
739
  static const struct sip_header ct_sdp_hdrs_v4[] = {
  	[SDP_HDR_VERSION]	= SDP_HDR("v=", NULL, digits_len),
  	[SDP_HDR_OWNER]		= SDP_HDR("o=", "IN IP4 ", sdp_addr_len),
  	[SDP_HDR_CONNECTION]	= SDP_HDR("c=", "IN IP4 ", sdp_addr_len),
  	[SDP_HDR_MEDIA]		= SDP_HDR("m=", NULL, media_len),
  };
  
  static const struct sip_header ct_sdp_hdrs_v6[] = {
  	[SDP_HDR_VERSION]	= SDP_HDR("v=", NULL, digits_len),
  	[SDP_HDR_OWNER]		= SDP_HDR("o=", "IN IP6 ", sdp_addr_len),
  	[SDP_HDR_CONNECTION]	= SDP_HDR("c=", "IN IP6 ", sdp_addr_len),
  	[SDP_HDR_MEDIA]		= SDP_HDR("m=", NULL, media_len),
3e9b4600b   Patrick McHardy   [NETFILTER]: nf_c...
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
  };
  
  /* Linear string search within SDP header values */
  static const char *ct_sdp_header_search(const char *dptr, const char *limit,
  					const char *needle, unsigned int len)
  {
  	for (limit -= len; dptr < limit; dptr++) {
  		if (*dptr == '\r' || *dptr == '
  ')
  			break;
  		if (strncmp(dptr, needle, len) == 0)
  			return dptr;
  	}
  	return NULL;
  }
  
  /* Locate a SDP header (optionally a substring within the header value),
25985edce   Lucas De Marchi   Fix common misspe...
757
   * optionally stopping at the first occurrence of the term header, parse
3e9b4600b   Patrick McHardy   [NETFILTER]: nf_c...
758
759
760
761
762
763
764
765
   * it and return the offset and length of the data we're interested in.
   */
  int ct_sip_get_sdp_header(const struct nf_conn *ct, const char *dptr,
  			  unsigned int dataoff, unsigned int datalen,
  			  enum sdp_header_types type,
  			  enum sdp_header_types term,
  			  unsigned int *matchoff, unsigned int *matchlen)
  {
9a6648210   Patrick McHardy   netfilter: nf_nat...
766
  	const struct sip_header *hdrs, *hdr, *thdr;
3e9b4600b   Patrick McHardy   [NETFILTER]: nf_c...
767
768
  	const char *start = dptr, *limit = dptr + datalen;
  	int shift = 0;
9a6648210   Patrick McHardy   netfilter: nf_nat...
769
770
771
  	hdrs = nf_ct_l3num(ct) == NFPROTO_IPV4 ? ct_sdp_hdrs_v4 : ct_sdp_hdrs_v6;
  	hdr = &hdrs[type];
  	thdr = &hdrs[term];
3e9b4600b   Patrick McHardy   [NETFILTER]: nf_c...
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
  	for (dptr += dataoff; dptr < limit; dptr++) {
  		/* Find beginning of line */
  		if (*dptr != '\r' && *dptr != '
  ')
  			continue;
  		if (++dptr >= limit)
  			break;
  		if (*(dptr - 1) == '\r' && *dptr == '
  ') {
  			if (++dptr >= limit)
  				break;
  		}
  
  		if (term != SDP_HDR_UNSPEC &&
  		    limit - dptr >= thdr->len &&
  		    strnicmp(dptr, thdr->name, thdr->len) == 0)
  			break;
  		else if (limit - dptr >= hdr->len &&
  			 strnicmp(dptr, hdr->name, hdr->len) == 0)
  			dptr += hdr->len;
  		else
  			continue;
  
  		*matchoff = dptr - start;
  		if (hdr->search) {
  			dptr = ct_sdp_header_search(dptr, limit, hdr->search,
  						    hdr->slen);
  			if (!dptr)
  				return -1;
  			dptr += hdr->slen;
  		}
  
  		*matchlen = hdr->match_len(ct, dptr, limit, &shift);
  		if (!*matchlen)
  			return -1;
  		*matchoff = dptr - start + shift;
  		return 1;
  	}
  	return 0;
  }
  EXPORT_SYMBOL_GPL(ct_sip_get_sdp_header);
4ab9e64e5   Patrick McHardy   [NETFILTER]: nf_n...
813
814
815
816
817
818
819
820
821
822
823
824
825
  static int ct_sip_parse_sdp_addr(const struct nf_conn *ct, const char *dptr,
  				 unsigned int dataoff, unsigned int datalen,
  				 enum sdp_header_types type,
  				 enum sdp_header_types term,
  				 unsigned int *matchoff, unsigned int *matchlen,
  				 union nf_inet_addr *addr)
  {
  	int ret;
  
  	ret = ct_sip_get_sdp_header(ct, dptr, dataoff, datalen, type, term,
  				    matchoff, matchlen);
  	if (ret <= 0)
  		return ret;
02b69cbdc   Patrick McHardy   netfilter: nf_ct_...
826
827
  	if (!sdp_parse_addr(ct, dptr + *matchoff, NULL, addr,
  			    dptr + *matchoff + *matchlen))
4ab9e64e5   Patrick McHardy   [NETFILTER]: nf_n...
828
829
830
  		return -1;
  	return 1;
  }
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
831
832
  static int refresh_signalling_expectation(struct nf_conn *ct,
  					  union nf_inet_addr *addr,
f5b321bd3   Patrick McHardy   netfilter: nf_con...
833
  					  u8 proto, __be16 port,
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
834
  					  unsigned int expires)
9467ee380   Patrick McHardy   [NETFILTER]: nf_c...
835
836
837
  {
  	struct nf_conn_help *help = nfct_help(ct);
  	struct nf_conntrack_expect *exp;
b67bfe0d4   Sasha Levin   hlist: drop the n...
838
  	struct hlist_node *next;
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
839
  	int found = 0;
9467ee380   Patrick McHardy   [NETFILTER]: nf_c...
840
841
  
  	spin_lock_bh(&nf_conntrack_lock);
b67bfe0d4   Sasha Levin   hlist: drop the n...
842
  	hlist_for_each_entry_safe(exp, next, &help->expectations, lnode) {
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
843
844
  		if (exp->class != SIP_EXPECT_SIGNALLING ||
  		    !nf_inet_addr_cmp(&exp->tuple.dst.u3, addr) ||
f5b321bd3   Patrick McHardy   netfilter: nf_con...
845
  		    exp->tuple.dst.protonum != proto ||
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
  		    exp->tuple.dst.u.udp.port != port)
  			continue;
  		if (!del_timer(&exp->timeout))
  			continue;
  		exp->flags &= ~NF_CT_EXPECT_INACTIVE;
  		exp->timeout.expires = jiffies + expires * HZ;
  		add_timer(&exp->timeout);
  		found = 1;
  		break;
  	}
  	spin_unlock_bh(&nf_conntrack_lock);
  	return found;
  }
  
  static void flush_expectations(struct nf_conn *ct, bool media)
  {
  	struct nf_conn_help *help = nfct_help(ct);
  	struct nf_conntrack_expect *exp;
b67bfe0d4   Sasha Levin   hlist: drop the n...
864
  	struct hlist_node *next;
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
865
866
  
  	spin_lock_bh(&nf_conntrack_lock);
b67bfe0d4   Sasha Levin   hlist: drop the n...
867
  	hlist_for_each_entry_safe(exp, next, &help->expectations, lnode) {
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
868
869
  		if ((exp->class != SIP_EXPECT_SIGNALLING) ^ media)
  			continue;
9467ee380   Patrick McHardy   [NETFILTER]: nf_c...
870
871
872
873
  		if (!del_timer(&exp->timeout))
  			continue;
  		nf_ct_unlink_expect(exp);
  		nf_ct_expect_put(exp);
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
874
875
  		if (!media)
  			break;
9467ee380   Patrick McHardy   [NETFILTER]: nf_c...
876
877
878
  	}
  	spin_unlock_bh(&nf_conntrack_lock);
  }
051966c0c   Patrick McHardy   netfilter: nf_nat...
879
880
  static int set_expected_rtp_rtcp(struct sk_buff *skb, unsigned int protoff,
  				 unsigned int dataoff,
a9c1d3591   Patrick McHardy   [NETFILTER]: nf_c...
881
  				 const char **dptr, unsigned int *datalen,
4ab9e64e5   Patrick McHardy   [NETFILTER]: nf_n...
882
  				 union nf_inet_addr *daddr, __be16 port,
0d0ab0378   Patrick McHardy   [NETFILTER]: nf_c...
883
  				 enum sip_expectation_classes class,
4ab9e64e5   Patrick McHardy   [NETFILTER]: nf_n...
884
  				 unsigned int mediaoff, unsigned int medialen)
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
885
  {
a9c1d3591   Patrick McHardy   [NETFILTER]: nf_c...
886
  	struct nf_conntrack_expect *exp, *rtp_exp, *rtcp_exp;
212440a7d   Patrick McHardy   [NETFILTER]: nf_c...
887
888
  	enum ip_conntrack_info ctinfo;
  	struct nf_conn *ct = nf_ct_get(skb, &ctinfo);
a5c3a8005   Alexey Dobriyan   netfilter: netns ...
889
  	struct net *net = nf_ct_net(ct);
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
890
  	enum ip_conntrack_dir dir = CTINFO2DIR(ctinfo);
d901a9369   Patrick McHardy   [NETFILTER]: nf_c...
891
892
  	union nf_inet_addr *saddr;
  	struct nf_conntrack_tuple tuple;
c7f485abd   Patrick McHardy   [NETFILTER]: nf_c...
893
  	int direct_rtp = 0, skip_expect = 0, ret = NF_DROP;
a9c1d3591   Patrick McHardy   [NETFILTER]: nf_c...
894
895
  	u_int16_t base_port;
  	__be16 rtp_port, rtcp_port;
c7f485abd   Patrick McHardy   [NETFILTER]: nf_c...
896
  	typeof(nf_nat_sdp_port_hook) nf_nat_sdp_port;
4ab9e64e5   Patrick McHardy   [NETFILTER]: nf_n...
897
  	typeof(nf_nat_sdp_media_hook) nf_nat_sdp_media;
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
898

d901a9369   Patrick McHardy   [NETFILTER]: nf_c...
899
900
901
902
903
904
905
906
907
908
909
  	saddr = NULL;
  	if (sip_direct_media) {
  		if (!nf_inet_addr_cmp(daddr, &ct->tuplehash[dir].tuple.src.u3))
  			return NF_ACCEPT;
  		saddr = &ct->tuplehash[!dir].tuple.src.u3;
  	}
  
  	/* We need to check whether the registration exists before attempting
  	 * to register it since we can see the same media description multiple
  	 * times on different connections in case multiple endpoints receive
  	 * the same call.
c7f485abd   Patrick McHardy   [NETFILTER]: nf_c...
910
911
912
913
914
915
916
917
  	 *
  	 * RTP optimization: if we find a matching media channel expectation
  	 * and both the expectation and this connection are SNATed, we assume
  	 * both sides can reach each other directly and use the final
  	 * destination address from the expectation. We still need to keep
  	 * the NATed expectations for media that might arrive from the
  	 * outside, and additionally need to expect the direct RTP stream
  	 * in case it passes through us even without NAT.
d901a9369   Patrick McHardy   [NETFILTER]: nf_c...
918
919
920
921
  	 */
  	memset(&tuple, 0, sizeof(tuple));
  	if (saddr)
  		tuple.src.u3 = *saddr;
5e8fbe2ac   Patrick McHardy   [NETFILTER]: nf_c...
922
  	tuple.src.l3num		= nf_ct_l3num(ct);
d901a9369   Patrick McHardy   [NETFILTER]: nf_c...
923
924
925
926
927
  	tuple.dst.protonum	= IPPROTO_UDP;
  	tuple.dst.u3		= *daddr;
  	tuple.dst.u.udp.port	= port;
  
  	rcu_read_lock();
c7f485abd   Patrick McHardy   [NETFILTER]: nf_c...
928
  	do {
5d0aa2ccd   Patrick McHardy   netfilter: nf_con...
929
  		exp = __nf_ct_expect_find(net, nf_ct_zone(ct), &tuple);
d901a9369   Patrick McHardy   [NETFILTER]: nf_c...
930

c7f485abd   Patrick McHardy   [NETFILTER]: nf_c...
931
932
933
934
  		if (!exp || exp->master == ct ||
  		    nfct_help(exp->master)->helper != nfct_help(ct)->helper ||
  		    exp->class != class)
  			break;
e1f9a4640   Patrick McHardy   netfilter: Fix SI...
935
  #ifdef CONFIG_NF_NAT_NEEDED
9a6648210   Patrick McHardy   netfilter: nf_nat...
936
937
  		if (!direct_rtp &&
  		    (!nf_inet_addr_cmp(&exp->saved_addr, &exp->tuple.dst.u3) ||
c7f485abd   Patrick McHardy   [NETFILTER]: nf_c...
938
939
  		     exp->saved_proto.udp.port != exp->tuple.dst.u.udp.port) &&
  		    ct->status & IPS_NAT_MASK) {
9a6648210   Patrick McHardy   netfilter: nf_nat...
940
941
  			*daddr			= exp->saved_addr;
  			tuple.dst.u3		= exp->saved_addr;
c7f485abd   Patrick McHardy   [NETFILTER]: nf_c...
942
943
944
  			tuple.dst.u.udp.port	= exp->saved_proto.udp.port;
  			direct_rtp = 1;
  		} else
e1f9a4640   Patrick McHardy   netfilter: Fix SI...
945
  #endif
c7f485abd   Patrick McHardy   [NETFILTER]: nf_c...
946
947
948
  			skip_expect = 1;
  	} while (!skip_expect);
  	rcu_read_unlock();
d901a9369   Patrick McHardy   [NETFILTER]: nf_c...
949

a9c1d3591   Patrick McHardy   [NETFILTER]: nf_c...
950
951
952
  	base_port = ntohs(tuple.dst.u.udp.port) & ~1;
  	rtp_port = htons(base_port);
  	rtcp_port = htons(base_port + 1);
c7f485abd   Patrick McHardy   [NETFILTER]: nf_c...
953
954
955
  	if (direct_rtp) {
  		nf_nat_sdp_port = rcu_dereference(nf_nat_sdp_port_hook);
  		if (nf_nat_sdp_port &&
051966c0c   Patrick McHardy   netfilter: nf_nat...
956
  		    !nf_nat_sdp_port(skb, protoff, dataoff, dptr, datalen,
c7f485abd   Patrick McHardy   [NETFILTER]: nf_c...
957
958
959
960
961
962
  				     mediaoff, medialen, ntohs(rtp_port)))
  			goto err1;
  	}
  
  	if (skip_expect)
  		return NF_ACCEPT;
a9c1d3591   Patrick McHardy   [NETFILTER]: nf_c...
963
964
965
  	rtp_exp = nf_ct_expect_alloc(ct);
  	if (rtp_exp == NULL)
  		goto err1;
5e8fbe2ac   Patrick McHardy   [NETFILTER]: nf_c...
966
  	nf_ct_expect_init(rtp_exp, class, nf_ct_l3num(ct), saddr, daddr,
a9c1d3591   Patrick McHardy   [NETFILTER]: nf_c...
967
968
969
970
971
  			  IPPROTO_UDP, NULL, &rtp_port);
  
  	rtcp_exp = nf_ct_expect_alloc(ct);
  	if (rtcp_exp == NULL)
  		goto err2;
5e8fbe2ac   Patrick McHardy   [NETFILTER]: nf_c...
972
  	nf_ct_expect_init(rtcp_exp, class, nf_ct_l3num(ct), saddr, daddr,
a9c1d3591   Patrick McHardy   [NETFILTER]: nf_c...
973
  			  IPPROTO_UDP, NULL, &rtcp_port);
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
974

4ab9e64e5   Patrick McHardy   [NETFILTER]: nf_n...
975
  	nf_nat_sdp_media = rcu_dereference(nf_nat_sdp_media_hook);
9a6648210   Patrick McHardy   netfilter: nf_nat...
976
  	if (nf_nat_sdp_media && ct->status & IPS_NAT_MASK && !direct_rtp)
051966c0c   Patrick McHardy   netfilter: nf_nat...
977
  		ret = nf_nat_sdp_media(skb, protoff, dataoff, dptr, datalen,
3b6b9fab4   Patrick McHardy   netfilter: nf_con...
978
  				       rtp_exp, rtcp_exp,
4ab9e64e5   Patrick McHardy   [NETFILTER]: nf_n...
979
  				       mediaoff, medialen, daddr);
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
980
  	else {
a9c1d3591   Patrick McHardy   [NETFILTER]: nf_c...
981
982
983
984
985
986
  		if (nf_ct_expect_related(rtp_exp) == 0) {
  			if (nf_ct_expect_related(rtcp_exp) != 0)
  				nf_ct_unexpect_related(rtp_exp);
  			else
  				ret = NF_ACCEPT;
  		}
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
987
  	}
a9c1d3591   Patrick McHardy   [NETFILTER]: nf_c...
988
989
990
991
  	nf_ct_expect_put(rtcp_exp);
  err2:
  	nf_ct_expect_put(rtp_exp);
  err1:
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
992
993
  	return ret;
  }
0d0ab0378   Patrick McHardy   [NETFILTER]: nf_c...
994
995
996
  static const struct sdp_media_type sdp_media_types[] = {
  	SDP_MEDIA_TYPE("audio ", SIP_EXPECT_AUDIO),
  	SDP_MEDIA_TYPE("video ", SIP_EXPECT_VIDEO),
9d288dffe   Patrick McHardy   netfilter: nf_con...
997
  	SDP_MEDIA_TYPE("image ", SIP_EXPECT_IMAGE),
0d0ab0378   Patrick McHardy   [NETFILTER]: nf_c...
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
  };
  
  static const struct sdp_media_type *sdp_media_type(const char *dptr,
  						   unsigned int matchoff,
  						   unsigned int matchlen)
  {
  	const struct sdp_media_type *t;
  	unsigned int i;
  
  	for (i = 0; i < ARRAY_SIZE(sdp_media_types); i++) {
  		t = &sdp_media_types[i];
  		if (matchlen < t->len ||
  		    strncmp(dptr + matchoff, t->name, t->len))
  			continue;
  		return t;
  	}
  	return NULL;
  }
051966c0c   Patrick McHardy   netfilter: nf_nat...
1016
1017
  static int process_sdp(struct sk_buff *skb, unsigned int protoff,
  		       unsigned int dataoff,
30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1018
1019
  		       const char **dptr, unsigned int *datalen,
  		       unsigned int cseq)
7d3dd043b   Patrick McHardy   [NETFILTER]: nf_c...
1020
1021
1022
  {
  	enum ip_conntrack_info ctinfo;
  	struct nf_conn *ct = nf_ct_get(skb, &ctinfo);
7d3dd043b   Patrick McHardy   [NETFILTER]: nf_c...
1023
  	unsigned int matchoff, matchlen;
4ab9e64e5   Patrick McHardy   [NETFILTER]: nf_n...
1024
1025
1026
  	unsigned int mediaoff, medialen;
  	unsigned int sdpoff;
  	unsigned int caddr_len, maddr_len;
0d0ab0378   Patrick McHardy   [NETFILTER]: nf_c...
1027
  	unsigned int i;
4ab9e64e5   Patrick McHardy   [NETFILTER]: nf_n...
1028
  	union nf_inet_addr caddr, maddr, rtp_addr;
7d3dd043b   Patrick McHardy   [NETFILTER]: nf_c...
1029
  	unsigned int port;
0d0ab0378   Patrick McHardy   [NETFILTER]: nf_c...
1030
1031
  	const struct sdp_media_type *t;
  	int ret = NF_ACCEPT;
4ab9e64e5   Patrick McHardy   [NETFILTER]: nf_n...
1032
1033
  	typeof(nf_nat_sdp_addr_hook) nf_nat_sdp_addr;
  	typeof(nf_nat_sdp_session_hook) nf_nat_sdp_session;
7d3dd043b   Patrick McHardy   [NETFILTER]: nf_c...
1034

0d0ab0378   Patrick McHardy   [NETFILTER]: nf_c...
1035
  	nf_nat_sdp_addr = rcu_dereference(nf_nat_sdp_addr_hook);
7d3dd043b   Patrick McHardy   [NETFILTER]: nf_c...
1036

4ab9e64e5   Patrick McHardy   [NETFILTER]: nf_n...
1037
  	/* Find beginning of session description */
7d3dd043b   Patrick McHardy   [NETFILTER]: nf_c...
1038
  	if (ct_sip_get_sdp_header(ct, *dptr, 0, *datalen,
4ab9e64e5   Patrick McHardy   [NETFILTER]: nf_n...
1039
  				  SDP_HDR_VERSION, SDP_HDR_UNSPEC,
7d3dd043b   Patrick McHardy   [NETFILTER]: nf_c...
1040
1041
  				  &matchoff, &matchlen) <= 0)
  		return NF_ACCEPT;
4ab9e64e5   Patrick McHardy   [NETFILTER]: nf_n...
1042
1043
1044
1045
1046
1047
1048
  	sdpoff = matchoff;
  
  	/* The connection information is contained in the session description
  	 * and/or once per media description. The first media description marks
  	 * the end of the session description. */
  	caddr_len = 0;
  	if (ct_sip_parse_sdp_addr(ct, *dptr, sdpoff, *datalen,
9a6648210   Patrick McHardy   netfilter: nf_nat...
1049
  				  SDP_HDR_CONNECTION, SDP_HDR_MEDIA,
4ab9e64e5   Patrick McHardy   [NETFILTER]: nf_n...
1050
1051
  				  &matchoff, &matchlen, &caddr) > 0)
  		caddr_len = matchlen;
0d0ab0378   Patrick McHardy   [NETFILTER]: nf_c...
1052
1053
1054
1055
1056
1057
  	mediaoff = sdpoff;
  	for (i = 0; i < ARRAY_SIZE(sdp_media_types); ) {
  		if (ct_sip_get_sdp_header(ct, *dptr, mediaoff, *datalen,
  					  SDP_HDR_MEDIA, SDP_HDR_UNSPEC,
  					  &mediaoff, &medialen) <= 0)
  			break;
7d3dd043b   Patrick McHardy   [NETFILTER]: nf_c...
1058

0d0ab0378   Patrick McHardy   [NETFILTER]: nf_c...
1059
1060
1061
1062
1063
1064
1065
1066
1067
  		/* Get media type and port number. A media port value of zero
  		 * indicates an inactive stream. */
  		t = sdp_media_type(*dptr, mediaoff, medialen);
  		if (!t) {
  			mediaoff += medialen;
  			continue;
  		}
  		mediaoff += t->len;
  		medialen -= t->len;
7d3dd043b   Patrick McHardy   [NETFILTER]: nf_c...
1068

0d0ab0378   Patrick McHardy   [NETFILTER]: nf_c...
1069
1070
1071
  		port = simple_strtoul(*dptr + mediaoff, NULL, 10);
  		if (port == 0)
  			continue;
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1072
1073
  		if (port < 1024 || port > 65535) {
  			nf_ct_helper_log(skb, ct, "wrong port %u", port);
0d0ab0378   Patrick McHardy   [NETFILTER]: nf_c...
1074
  			return NF_DROP;
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1075
  		}
4ab9e64e5   Patrick McHardy   [NETFILTER]: nf_n...
1076

0d0ab0378   Patrick McHardy   [NETFILTER]: nf_c...
1077
1078
1079
  		/* The media description overrides the session description. */
  		maddr_len = 0;
  		if (ct_sip_parse_sdp_addr(ct, *dptr, mediaoff, *datalen,
9a6648210   Patrick McHardy   netfilter: nf_nat...
1080
  					  SDP_HDR_CONNECTION, SDP_HDR_MEDIA,
0d0ab0378   Patrick McHardy   [NETFILTER]: nf_c...
1081
1082
1083
1084
1085
  					  &matchoff, &matchlen, &maddr) > 0) {
  			maddr_len = matchlen;
  			memcpy(&rtp_addr, &maddr, sizeof(rtp_addr));
  		} else if (caddr_len)
  			memcpy(&rtp_addr, &caddr, sizeof(rtp_addr));
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1086
1087
  		else {
  			nf_ct_helper_log(skb, ct, "cannot parse SDP message");
0d0ab0378   Patrick McHardy   [NETFILTER]: nf_c...
1088
  			return NF_DROP;
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1089
  		}
0d0ab0378   Patrick McHardy   [NETFILTER]: nf_c...
1090

051966c0c   Patrick McHardy   netfilter: nf_nat...
1091
1092
  		ret = set_expected_rtp_rtcp(skb, protoff, dataoff,
  					    dptr, datalen,
0d0ab0378   Patrick McHardy   [NETFILTER]: nf_c...
1093
1094
  					    &rtp_addr, htons(port), t->class,
  					    mediaoff, medialen);
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1095
1096
1097
  		if (ret != NF_ACCEPT) {
  			nf_ct_helper_log(skb, ct,
  					 "cannot add expectation for voice");
0d0ab0378   Patrick McHardy   [NETFILTER]: nf_c...
1098
  			return ret;
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1099
  		}
4ab9e64e5   Patrick McHardy   [NETFILTER]: nf_n...
1100

0d0ab0378   Patrick McHardy   [NETFILTER]: nf_c...
1101
  		/* Update media connection address if present */
9a6648210   Patrick McHardy   netfilter: nf_nat...
1102
  		if (maddr_len && nf_nat_sdp_addr && ct->status & IPS_NAT_MASK) {
051966c0c   Patrick McHardy   netfilter: nf_nat...
1103
  			ret = nf_nat_sdp_addr(skb, protoff, dataoff,
9a6648210   Patrick McHardy   netfilter: nf_nat...
1104
1105
  					      dptr, datalen, mediaoff,
  					      SDP_HDR_CONNECTION, SDP_HDR_MEDIA,
3b6b9fab4   Patrick McHardy   netfilter: nf_con...
1106
  					      &rtp_addr);
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1107
1108
  			if (ret != NF_ACCEPT) {
  				nf_ct_helper_log(skb, ct, "cannot mangle SDP");
4ab9e64e5   Patrick McHardy   [NETFILTER]: nf_n...
1109
  				return ret;
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1110
  			}
4ab9e64e5   Patrick McHardy   [NETFILTER]: nf_n...
1111
  		}
0d0ab0378   Patrick McHardy   [NETFILTER]: nf_c...
1112
  		i++;
4ab9e64e5   Patrick McHardy   [NETFILTER]: nf_n...
1113
1114
1115
1116
  	}
  
  	/* Update session connection and owner addresses */
  	nf_nat_sdp_session = rcu_dereference(nf_nat_sdp_session_hook);
9a6648210   Patrick McHardy   netfilter: nf_nat...
1117
  	if (nf_nat_sdp_session && ct->status & IPS_NAT_MASK)
051966c0c   Patrick McHardy   netfilter: nf_nat...
1118
1119
  		ret = nf_nat_sdp_session(skb, protoff, dataoff,
  					 dptr, datalen, sdpoff, &rtp_addr);
4ab9e64e5   Patrick McHardy   [NETFILTER]: nf_n...
1120
1121
  
  	return ret;
7d3dd043b   Patrick McHardy   [NETFILTER]: nf_c...
1122
  }
051966c0c   Patrick McHardy   netfilter: nf_nat...
1123
1124
  static int process_invite_response(struct sk_buff *skb, unsigned int protoff,
  				   unsigned int dataoff,
30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1125
1126
1127
  				   const char **dptr, unsigned int *datalen,
  				   unsigned int cseq, unsigned int code)
  {
9467ee380   Patrick McHardy   [NETFILTER]: nf_c...
1128
1129
  	enum ip_conntrack_info ctinfo;
  	struct nf_conn *ct = nf_ct_get(skb, &ctinfo);
1afc56794   Pablo Neira Ayuso   netfilter: nf_ct_...
1130
  	struct nf_ct_sip_master *ct_sip_info = nfct_help_data(ct);
9467ee380   Patrick McHardy   [NETFILTER]: nf_c...
1131

30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1132
1133
  	if ((code >= 100 && code <= 199) ||
  	    (code >= 200 && code <= 299))
051966c0c   Patrick McHardy   netfilter: nf_nat...
1134
  		return process_sdp(skb, protoff, dataoff, dptr, datalen, cseq);
1afc56794   Pablo Neira Ayuso   netfilter: nf_ct_...
1135
  	else if (ct_sip_info->invite_cseq == cseq)
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1136
  		flush_expectations(ct, true);
ef75d49f1   Patrick McHardy   netfilter: nf_con...
1137
  	return NF_ACCEPT;
30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1138
  }
051966c0c   Patrick McHardy   netfilter: nf_nat...
1139
1140
  static int process_update_response(struct sk_buff *skb, unsigned int protoff,
  				   unsigned int dataoff,
30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1141
1142
1143
  				   const char **dptr, unsigned int *datalen,
  				   unsigned int cseq, unsigned int code)
  {
9467ee380   Patrick McHardy   [NETFILTER]: nf_c...
1144
1145
  	enum ip_conntrack_info ctinfo;
  	struct nf_conn *ct = nf_ct_get(skb, &ctinfo);
1afc56794   Pablo Neira Ayuso   netfilter: nf_ct_...
1146
  	struct nf_ct_sip_master *ct_sip_info = nfct_help_data(ct);
9467ee380   Patrick McHardy   [NETFILTER]: nf_c...
1147

30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1148
1149
  	if ((code >= 100 && code <= 199) ||
  	    (code >= 200 && code <= 299))
051966c0c   Patrick McHardy   netfilter: nf_nat...
1150
  		return process_sdp(skb, protoff, dataoff, dptr, datalen, cseq);
1afc56794   Pablo Neira Ayuso   netfilter: nf_ct_...
1151
  	else if (ct_sip_info->invite_cseq == cseq)
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1152
  		flush_expectations(ct, true);
ef75d49f1   Patrick McHardy   netfilter: nf_con...
1153
  	return NF_ACCEPT;
30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1154
  }
051966c0c   Patrick McHardy   netfilter: nf_nat...
1155
1156
  static int process_prack_response(struct sk_buff *skb, unsigned int protoff,
  				  unsigned int dataoff,
595a8ecb5   Patrick McHardy   [NETFILTER]: nf_c...
1157
1158
1159
  				  const char **dptr, unsigned int *datalen,
  				  unsigned int cseq, unsigned int code)
  {
9467ee380   Patrick McHardy   [NETFILTER]: nf_c...
1160
1161
  	enum ip_conntrack_info ctinfo;
  	struct nf_conn *ct = nf_ct_get(skb, &ctinfo);
1afc56794   Pablo Neira Ayuso   netfilter: nf_ct_...
1162
  	struct nf_ct_sip_master *ct_sip_info = nfct_help_data(ct);
9467ee380   Patrick McHardy   [NETFILTER]: nf_c...
1163

595a8ecb5   Patrick McHardy   [NETFILTER]: nf_c...
1164
1165
  	if ((code >= 100 && code <= 199) ||
  	    (code >= 200 && code <= 299))
051966c0c   Patrick McHardy   netfilter: nf_nat...
1166
  		return process_sdp(skb, protoff, dataoff, dptr, datalen, cseq);
1afc56794   Pablo Neira Ayuso   netfilter: nf_ct_...
1167
  	else if (ct_sip_info->invite_cseq == cseq)
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1168
  		flush_expectations(ct, true);
ef75d49f1   Patrick McHardy   netfilter: nf_con...
1169
  	return NF_ACCEPT;
9467ee380   Patrick McHardy   [NETFILTER]: nf_c...
1170
  }
051966c0c   Patrick McHardy   netfilter: nf_nat...
1171
1172
  static int process_invite_request(struct sk_buff *skb, unsigned int protoff,
  				  unsigned int dataoff,
9d288dffe   Patrick McHardy   netfilter: nf_con...
1173
1174
1175
1176
1177
  				  const char **dptr, unsigned int *datalen,
  				  unsigned int cseq)
  {
  	enum ip_conntrack_info ctinfo;
  	struct nf_conn *ct = nf_ct_get(skb, &ctinfo);
1afc56794   Pablo Neira Ayuso   netfilter: nf_ct_...
1178
  	struct nf_ct_sip_master *ct_sip_info = nfct_help_data(ct);
9d288dffe   Patrick McHardy   netfilter: nf_con...
1179
1180
1181
  	unsigned int ret;
  
  	flush_expectations(ct, true);
051966c0c   Patrick McHardy   netfilter: nf_nat...
1182
  	ret = process_sdp(skb, protoff, dataoff, dptr, datalen, cseq);
9d288dffe   Patrick McHardy   netfilter: nf_con...
1183
  	if (ret == NF_ACCEPT)
1afc56794   Pablo Neira Ayuso   netfilter: nf_ct_...
1184
  		ct_sip_info->invite_cseq = cseq;
9d288dffe   Patrick McHardy   netfilter: nf_con...
1185
1186
  	return ret;
  }
051966c0c   Patrick McHardy   netfilter: nf_nat...
1187
1188
  static int process_bye_request(struct sk_buff *skb, unsigned int protoff,
  			       unsigned int dataoff,
9467ee380   Patrick McHardy   [NETFILTER]: nf_c...
1189
1190
1191
1192
1193
  			       const char **dptr, unsigned int *datalen,
  			       unsigned int cseq)
  {
  	enum ip_conntrack_info ctinfo;
  	struct nf_conn *ct = nf_ct_get(skb, &ctinfo);
595a8ecb5   Patrick McHardy   [NETFILTER]: nf_c...
1194

0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1195
1196
1197
1198
1199
1200
1201
1202
  	flush_expectations(ct, true);
  	return NF_ACCEPT;
  }
  
  /* Parse a REGISTER request and create a permanent expectation for incoming
   * signalling connections. The expectation is marked inactive and is activated
   * when receiving a response indicating success from the registrar.
   */
051966c0c   Patrick McHardy   netfilter: nf_nat...
1203
1204
  static int process_register_request(struct sk_buff *skb, unsigned int protoff,
  				    unsigned int dataoff,
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1205
1206
1207
1208
1209
  				    const char **dptr, unsigned int *datalen,
  				    unsigned int cseq)
  {
  	enum ip_conntrack_info ctinfo;
  	struct nf_conn *ct = nf_ct_get(skb, &ctinfo);
1afc56794   Pablo Neira Ayuso   netfilter: nf_ct_...
1210
  	struct nf_ct_sip_master *ct_sip_info = nfct_help_data(ct);
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1211
  	enum ip_conntrack_dir dir = CTINFO2DIR(ctinfo);
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1212
1213
1214
1215
  	unsigned int matchoff, matchlen;
  	struct nf_conntrack_expect *exp;
  	union nf_inet_addr *saddr, daddr;
  	__be16 port;
f5b321bd3   Patrick McHardy   netfilter: nf_con...
1216
  	u8 proto;
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
  	unsigned int expires = 0;
  	int ret;
  	typeof(nf_nat_sip_expect_hook) nf_nat_sip_expect;
  
  	/* Expected connections can not register again. */
  	if (ct->status & IPS_EXPECTED)
  		return NF_ACCEPT;
  
  	/* We must check the expiration time: a value of zero signals the
  	 * registrar to release the binding. We'll remove our expectation
  	 * when receiving the new bindings in the response, but we don't
  	 * want to create new ones.
  	 *
  	 * The expiration time may be contained in Expires: header, the
  	 * Contact: header parameters or the URI parameters.
  	 */
  	if (ct_sip_get_header(ct, *dptr, 0, *datalen, SIP_HDR_EXPIRES,
  			      &matchoff, &matchlen) > 0)
  		expires = simple_strtoul(*dptr + matchoff, NULL, 10);
  
  	ret = ct_sip_parse_header_uri(ct, *dptr, NULL, *datalen,
  				      SIP_HDR_CONTACT, NULL,
  				      &matchoff, &matchlen, &daddr, &port);
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1240
1241
  	if (ret < 0) {
  		nf_ct_helper_log(skb, ct, "cannot parse contact");
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1242
  		return NF_DROP;
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1243
  	} else if (ret == 0)
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1244
1245
1246
1247
1248
  		return NF_ACCEPT;
  
  	/* We don't support third-party registrations */
  	if (!nf_inet_addr_cmp(&ct->tuplehash[dir].tuple.src.u3, &daddr))
  		return NF_ACCEPT;
f5b321bd3   Patrick McHardy   netfilter: nf_con...
1249
1250
1251
  	if (ct_sip_parse_transport(ct, *dptr, matchoff + matchlen, *datalen,
  				   &proto) == 0)
  		return NF_ACCEPT;
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1252
1253
  	if (ct_sip_parse_numerical_param(ct, *dptr,
  					 matchoff + matchlen, *datalen,
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1254
1255
  					 "expires=", NULL, NULL, &expires) < 0) {
  		nf_ct_helper_log(skb, ct, "cannot parse expires");
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1256
  		return NF_DROP;
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1257
  	}
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1258
1259
1260
1261
1262
1263
1264
  
  	if (expires == 0) {
  		ret = NF_ACCEPT;
  		goto store_cseq;
  	}
  
  	exp = nf_ct_expect_alloc(ct);
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1265
1266
  	if (!exp) {
  		nf_ct_helper_log(skb, ct, "cannot alloc expectation");
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1267
  		return NF_DROP;
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1268
  	}
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1269
1270
1271
1272
  
  	saddr = NULL;
  	if (sip_direct_signalling)
  		saddr = &ct->tuplehash[!dir].tuple.src.u3;
5e8fbe2ac   Patrick McHardy   [NETFILTER]: nf_c...
1273
  	nf_ct_expect_init(exp, SIP_EXPECT_SIGNALLING, nf_ct_l3num(ct),
f5b321bd3   Patrick McHardy   netfilter: nf_con...
1274
  			  saddr, &daddr, proto, NULL, &port);
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1275
1276
1277
1278
1279
  	exp->timeout.expires = sip_timeout * HZ;
  	exp->helper = nfct_help(ct)->helper;
  	exp->flags = NF_CT_EXPECT_PERMANENT | NF_CT_EXPECT_INACTIVE;
  
  	nf_nat_sip_expect = rcu_dereference(nf_nat_sip_expect_hook);
9a6648210   Patrick McHardy   netfilter: nf_nat...
1280
  	if (nf_nat_sip_expect && ct->status & IPS_NAT_MASK)
051966c0c   Patrick McHardy   netfilter: nf_nat...
1281
1282
  		ret = nf_nat_sip_expect(skb, protoff, dataoff, dptr, datalen,
  					exp, matchoff, matchlen);
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1283
  	else {
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1284
1285
  		if (nf_ct_expect_related(exp) != 0) {
  			nf_ct_helper_log(skb, ct, "cannot add expectation");
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1286
  			ret = NF_DROP;
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1287
  		} else
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1288
1289
1290
1291
1292
1293
  			ret = NF_ACCEPT;
  	}
  	nf_ct_expect_put(exp);
  
  store_cseq:
  	if (ret == NF_ACCEPT)
1afc56794   Pablo Neira Ayuso   netfilter: nf_ct_...
1294
  		ct_sip_info->register_cseq = cseq;
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1295
1296
  	return ret;
  }
051966c0c   Patrick McHardy   netfilter: nf_nat...
1297
1298
  static int process_register_response(struct sk_buff *skb, unsigned int protoff,
  				     unsigned int dataoff,
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1299
1300
1301
1302
1303
  				     const char **dptr, unsigned int *datalen,
  				     unsigned int cseq, unsigned int code)
  {
  	enum ip_conntrack_info ctinfo;
  	struct nf_conn *ct = nf_ct_get(skb, &ctinfo);
1afc56794   Pablo Neira Ayuso   netfilter: nf_ct_...
1304
  	struct nf_ct_sip_master *ct_sip_info = nfct_help_data(ct);
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1305
1306
1307
  	enum ip_conntrack_dir dir = CTINFO2DIR(ctinfo);
  	union nf_inet_addr addr;
  	__be16 port;
f5b321bd3   Patrick McHardy   netfilter: nf_con...
1308
  	u8 proto;
3b6b9fab4   Patrick McHardy   netfilter: nf_con...
1309
  	unsigned int matchoff, matchlen, coff = 0;
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
  	unsigned int expires = 0;
  	int in_contact = 0, ret;
  
  	/* According to RFC 3261, "UAs MUST NOT send a new registration until
  	 * they have received a final response from the registrar for the
  	 * previous one or the previous REGISTER request has timed out".
  	 *
  	 * However, some servers fail to detect retransmissions and send late
  	 * responses, so we store the sequence number of the last valid
  	 * request and compare it here.
  	 */
1afc56794   Pablo Neira Ayuso   netfilter: nf_ct_...
1321
  	if (ct_sip_info->register_cseq != cseq)
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
  		return NF_ACCEPT;
  
  	if (code >= 100 && code <= 199)
  		return NF_ACCEPT;
  	if (code < 200 || code > 299)
  		goto flush;
  
  	if (ct_sip_get_header(ct, *dptr, 0, *datalen, SIP_HDR_EXPIRES,
  			      &matchoff, &matchlen) > 0)
  		expires = simple_strtoul(*dptr + matchoff, NULL, 10);
  
  	while (1) {
  		unsigned int c_expires = expires;
3b6b9fab4   Patrick McHardy   netfilter: nf_con...
1335
  		ret = ct_sip_parse_header_uri(ct, *dptr, &coff, *datalen,
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1336
1337
1338
  					      SIP_HDR_CONTACT, &in_contact,
  					      &matchoff, &matchlen,
  					      &addr, &port);
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1339
1340
  		if (ret < 0) {
  			nf_ct_helper_log(skb, ct, "cannot parse contact");
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1341
  			return NF_DROP;
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1342
  		} else if (ret == 0)
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1343
1344
1345
1346
1347
  			break;
  
  		/* We don't support third-party registrations */
  		if (!nf_inet_addr_cmp(&ct->tuplehash[dir].tuple.dst.u3, &addr))
  			continue;
f5b321bd3   Patrick McHardy   netfilter: nf_con...
1348
1349
1350
  		if (ct_sip_parse_transport(ct, *dptr, matchoff + matchlen,
  					   *datalen, &proto) == 0)
  			continue;
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1351
1352
1353
1354
  		ret = ct_sip_parse_numerical_param(ct, *dptr,
  						   matchoff + matchlen,
  						   *datalen, "expires=",
  						   NULL, NULL, &c_expires);
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1355
1356
  		if (ret < 0) {
  			nf_ct_helper_log(skb, ct, "cannot parse expires");
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1357
  			return NF_DROP;
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1358
  		}
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1359
1360
  		if (c_expires == 0)
  			break;
f5b321bd3   Patrick McHardy   netfilter: nf_con...
1361
1362
  		if (refresh_signalling_expectation(ct, &addr, proto, port,
  						   c_expires))
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1363
1364
1365
1366
1367
  			return NF_ACCEPT;
  	}
  
  flush:
  	flush_expectations(ct, false);
595a8ecb5   Patrick McHardy   [NETFILTER]: nf_c...
1368
1369
  	return NF_ACCEPT;
  }
30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1370
  static const struct sip_handler sip_handlers[] = {
9d288dffe   Patrick McHardy   netfilter: nf_con...
1371
  	SIP_HANDLER("INVITE", process_invite_request, process_invite_response),
30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1372
  	SIP_HANDLER("UPDATE", process_sdp, process_update_response),
595a8ecb5   Patrick McHardy   [NETFILTER]: nf_c...
1373
1374
  	SIP_HANDLER("ACK", process_sdp, NULL),
  	SIP_HANDLER("PRACK", process_sdp, process_prack_response),
9467ee380   Patrick McHardy   [NETFILTER]: nf_c...
1375
  	SIP_HANDLER("BYE", process_bye_request, NULL),
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1376
  	SIP_HANDLER("REGISTER", process_register_request, process_register_response),
30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1377
  };
051966c0c   Patrick McHardy   netfilter: nf_nat...
1378
1379
  static int process_sip_response(struct sk_buff *skb, unsigned int protoff,
  				unsigned int dataoff,
30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1380
1381
  				const char **dptr, unsigned int *datalen)
  {
30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1382
1383
  	enum ip_conntrack_info ctinfo;
  	struct nf_conn *ct = nf_ct_get(skb, &ctinfo);
3b6b9fab4   Patrick McHardy   netfilter: nf_con...
1384
1385
  	unsigned int matchoff, matchlen, matchend;
  	unsigned int code, cseq, i;
30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1386
1387
1388
1389
  
  	if (*datalen < strlen("SIP/2.0 200"))
  		return NF_ACCEPT;
  	code = simple_strtoul(*dptr + strlen("SIP/2.0 "), NULL, 10);
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1390
1391
  	if (!code) {
  		nf_ct_helper_log(skb, ct, "cannot get code");
30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1392
  		return NF_DROP;
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1393
  	}
30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1394
1395
  
  	if (ct_sip_get_header(ct, *dptr, 0, *datalen, SIP_HDR_CSEQ,
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1396
1397
  			      &matchoff, &matchlen) <= 0) {
  		nf_ct_helper_log(skb, ct, "cannot parse cseq");
30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1398
  		return NF_DROP;
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1399
  	}
30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1400
  	cseq = simple_strtoul(*dptr + matchoff, NULL, 10);
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1401
1402
  	if (!cseq) {
  		nf_ct_helper_log(skb, ct, "cannot get cseq");
30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1403
  		return NF_DROP;
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1404
  	}
3b6b9fab4   Patrick McHardy   netfilter: nf_con...
1405
  	matchend = matchoff + matchlen + 1;
30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1406
1407
  
  	for (i = 0; i < ARRAY_SIZE(sip_handlers); i++) {
66bf79182   Alexey Dobriyan   netfilter: nf_con...
1408
  		const struct sip_handler *handler;
30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1409
1410
1411
  		handler = &sip_handlers[i];
  		if (handler->response == NULL)
  			continue;
3b6b9fab4   Patrick McHardy   netfilter: nf_con...
1412
1413
  		if (*datalen < matchend + handler->len ||
  		    strnicmp(*dptr + matchend, handler->method, handler->len))
30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1414
  			continue;
051966c0c   Patrick McHardy   netfilter: nf_nat...
1415
  		return handler->response(skb, protoff, dataoff, dptr, datalen,
3b6b9fab4   Patrick McHardy   netfilter: nf_con...
1416
  					 cseq, code);
30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1417
1418
1419
  	}
  	return NF_ACCEPT;
  }
051966c0c   Patrick McHardy   netfilter: nf_nat...
1420
1421
  static int process_sip_request(struct sk_buff *skb, unsigned int protoff,
  			       unsigned int dataoff,
30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1422
1423
  			       const char **dptr, unsigned int *datalen)
  {
30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1424
1425
  	enum ip_conntrack_info ctinfo;
  	struct nf_conn *ct = nf_ct_get(skb, &ctinfo);
7266507d8   Kevin Cernekee   netfilter: nf_ct_...
1426
1427
  	struct nf_ct_sip_master *ct_sip_info = nfct_help_data(ct);
  	enum ip_conntrack_dir dir = CTINFO2DIR(ctinfo);
30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1428
1429
  	unsigned int matchoff, matchlen;
  	unsigned int cseq, i;
7266507d8   Kevin Cernekee   netfilter: nf_ct_...
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
  	union nf_inet_addr addr;
  	__be16 port;
  
  	/* Many Cisco IP phones use a high source port for SIP requests, but
  	 * listen for the response on port 5060.  If we are the local
  	 * router for one of these phones, save the port number from the
  	 * Via: header so that nf_nat_sip can redirect the responses to
  	 * the correct port.
  	 */
  	if (ct_sip_parse_header_uri(ct, *dptr, NULL, *datalen,
  				    SIP_HDR_VIA_UDP, NULL, &matchoff,
  				    &matchlen, &addr, &port) > 0 &&
  	    port != ct->tuplehash[dir].tuple.src.u.udp.port &&
  	    nf_inet_addr_cmp(&addr, &ct->tuplehash[dir].tuple.src.u3))
  		ct_sip_info->forced_dport = port;
30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1445
1446
  
  	for (i = 0; i < ARRAY_SIZE(sip_handlers); i++) {
66bf79182   Alexey Dobriyan   netfilter: nf_con...
1447
  		const struct sip_handler *handler;
30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1448
1449
1450
1451
1452
1453
1454
1455
  		handler = &sip_handlers[i];
  		if (handler->request == NULL)
  			continue;
  		if (*datalen < handler->len ||
  		    strnicmp(*dptr, handler->method, handler->len))
  			continue;
  
  		if (ct_sip_get_header(ct, *dptr, 0, *datalen, SIP_HDR_CSEQ,
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1456
1457
  				      &matchoff, &matchlen) <= 0) {
  			nf_ct_helper_log(skb, ct, "cannot parse cseq");
30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1458
  			return NF_DROP;
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1459
  		}
30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1460
  		cseq = simple_strtoul(*dptr + matchoff, NULL, 10);
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1461
1462
  		if (!cseq) {
  			nf_ct_helper_log(skb, ct, "cannot get cseq");
30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1463
  			return NF_DROP;
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1464
  		}
30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1465

051966c0c   Patrick McHardy   netfilter: nf_nat...
1466
1467
  		return handler->request(skb, protoff, dataoff, dptr, datalen,
  					cseq);
30f33e6de   Patrick McHardy   [NETFILTER]: nf_c...
1468
1469
1470
  	}
  	return NF_ACCEPT;
  }
7d3dd043b   Patrick McHardy   [NETFILTER]: nf_c...
1471

f5b321bd3   Patrick McHardy   netfilter: nf_con...
1472
  static int process_sip_msg(struct sk_buff *skb, struct nf_conn *ct,
051966c0c   Patrick McHardy   netfilter: nf_nat...
1473
1474
  			   unsigned int protoff, unsigned int dataoff,
  			   const char **dptr, unsigned int *datalen)
f5b321bd3   Patrick McHardy   netfilter: nf_con...
1475
1476
1477
1478
1479
  {
  	typeof(nf_nat_sip_hook) nf_nat_sip;
  	int ret;
  
  	if (strnicmp(*dptr, "SIP/2.0 ", strlen("SIP/2.0 ")) != 0)
051966c0c   Patrick McHardy   netfilter: nf_nat...
1480
  		ret = process_sip_request(skb, protoff, dataoff, dptr, datalen);
f5b321bd3   Patrick McHardy   netfilter: nf_con...
1481
  	else
051966c0c   Patrick McHardy   netfilter: nf_nat...
1482
  		ret = process_sip_response(skb, protoff, dataoff, dptr, datalen);
f5b321bd3   Patrick McHardy   netfilter: nf_con...
1483

9a6648210   Patrick McHardy   netfilter: nf_nat...
1484
  	if (ret == NF_ACCEPT && ct->status & IPS_NAT_MASK) {
f5b321bd3   Patrick McHardy   netfilter: nf_con...
1485
  		nf_nat_sip = rcu_dereference(nf_nat_sip_hook);
051966c0c   Patrick McHardy   netfilter: nf_nat...
1486
  		if (nf_nat_sip && !nf_nat_sip(skb, protoff, dataoff,
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1487
1488
  					      dptr, datalen)) {
  			nf_ct_helper_log(skb, ct, "cannot NAT SIP message");
f5b321bd3   Patrick McHardy   netfilter: nf_con...
1489
  			ret = NF_DROP;
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1490
  		}
f5b321bd3   Patrick McHardy   netfilter: nf_con...
1491
1492
1493
1494
1495
1496
1497
  	}
  
  	return ret;
  }
  
  static int sip_help_tcp(struct sk_buff *skb, unsigned int protoff,
  			struct nf_conn *ct, enum ip_conntrack_info ctinfo)
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
1498
  {
f5b321bd3   Patrick McHardy   netfilter: nf_con...
1499
  	struct tcphdr *th, _tcph;
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
1500
  	unsigned int dataoff, datalen;
f5b321bd3   Patrick McHardy   netfilter: nf_con...
1501
1502
1503
1504
  	unsigned int matchoff, matchlen, clen;
  	unsigned int msglen, origlen;
  	const char *dptr, *end;
  	s16 diff, tdiff = 0;
7874896a2   Simon Horman   netfilter: nf_ct_...
1505
  	int ret = NF_ACCEPT;
e6e4d9ed1   Patrick McHardy   netfilter: nf_ct_...
1506
  	bool term;
48f8ac265   Patrick McHardy   netfilter: nf_nat...
1507
  	typeof(nf_nat_sip_seq_adjust_hook) nf_nat_sip_seq_adjust;
f5b321bd3   Patrick McHardy   netfilter: nf_con...
1508
1509
  
  	if (ctinfo != IP_CT_ESTABLISHED &&
fb0488337   Eric Dumazet   netfilter: add mo...
1510
  	    ctinfo != IP_CT_ESTABLISHED_REPLY)
f5b321bd3   Patrick McHardy   netfilter: nf_con...
1511
  		return NF_ACCEPT;
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
1512
1513
  
  	/* No Data ? */
f5b321bd3   Patrick McHardy   netfilter: nf_con...
1514
1515
1516
1517
  	th = skb_header_pointer(skb, protoff, sizeof(_tcph), &_tcph);
  	if (th == NULL)
  		return NF_ACCEPT;
  	dataoff = protoff + th->doff * 4;
3db05fea5   Herbert Xu   [NETFILTER]: Repl...
1518
  	if (dataoff >= skb->len)
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
1519
  		return NF_ACCEPT;
3db05fea5   Herbert Xu   [NETFILTER]: Repl...
1520
  	nf_ct_refresh(ct, skb, sip_timeout * HZ);
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
1521

a1d7c1b4b   Patrick McHardy   netfilter: nf_ct_...
1522
1523
  	if (unlikely(skb_linearize(skb)))
  		return NF_DROP;
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
1524

f5b321bd3   Patrick McHardy   netfilter: nf_con...
1525
  	dptr = skb->data + dataoff;
3db05fea5   Herbert Xu   [NETFILTER]: Repl...
1526
  	datalen = skb->len - dataoff;
779382eb3   Patrick McHardy   [NETFILTER]: nf_c...
1527
  	if (datalen < strlen("SIP/2.0 200"))
7d3dd043b   Patrick McHardy   [NETFILTER]: nf_c...
1528
  		return NF_ACCEPT;
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
1529

f5b321bd3   Patrick McHardy   netfilter: nf_con...
1530
1531
1532
1533
1534
  	while (1) {
  		if (ct_sip_get_header(ct, dptr, 0, datalen,
  				      SIP_HDR_CONTENT_LENGTH,
  				      &matchoff, &matchlen) <= 0)
  			break;
33cb1e9a9   Patrick McHardy   [NETFILTER]: nf_c...
1535

f5b321bd3   Patrick McHardy   netfilter: nf_con...
1536
1537
1538
  		clen = simple_strtoul(dptr + matchoff, (char **)&end, 10);
  		if (dptr + matchoff == end)
  			break;
e6e4d9ed1   Patrick McHardy   netfilter: nf_ct_...
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
  		term = false;
  		for (; end + strlen("\r
  \r
  ") <= dptr + datalen; end++) {
  			if (end[0] == '\r' && end[1] == '
  ' &&
  			    end[2] == '\r' && end[3] == '
  ') {
  				term = true;
  				break;
  			}
  		}
  		if (!term)
f5b321bd3   Patrick McHardy   netfilter: nf_con...
1552
1553
1554
1555
1556
1557
  			break;
  		end += strlen("\r
  \r
  ") + clen;
  
  		msglen = origlen = end - dptr;
3a7b21eaf   Patrick McHardy   netfilter: nf_ct_...
1558
1559
  		if (msglen > datalen)
  			return NF_ACCEPT;
f5b321bd3   Patrick McHardy   netfilter: nf_con...
1560

051966c0c   Patrick McHardy   netfilter: nf_nat...
1561
1562
  		ret = process_sip_msg(skb, ct, protoff, dataoff,
  				      &dptr, &msglen);
b20ab9cc6   Pablo Neira Ayuso   netfilter: nf_ct_...
1563
  		/* process_sip_* functions report why this packet is dropped */
f5b321bd3   Patrick McHardy   netfilter: nf_con...
1564
1565
1566
1567
1568
1569
1570
1571
  		if (ret != NF_ACCEPT)
  			break;
  		diff     = msglen - origlen;
  		tdiff   += diff;
  
  		dataoff += msglen;
  		dptr    += msglen;
  		datalen  = datalen + diff - msglen;
33cb1e9a9   Patrick McHardy   [NETFILTER]: nf_c...
1572
  	}
9a6648210   Patrick McHardy   netfilter: nf_nat...
1573
  	if (ret == NF_ACCEPT && ct->status & IPS_NAT_MASK) {
48f8ac265   Patrick McHardy   netfilter: nf_nat...
1574
1575
  		nf_nat_sip_seq_adjust = rcu_dereference(nf_nat_sip_seq_adjust_hook);
  		if (nf_nat_sip_seq_adjust)
9a6648210   Patrick McHardy   netfilter: nf_nat...
1576
  			nf_nat_sip_seq_adjust(skb, protoff, tdiff);
48f8ac265   Patrick McHardy   netfilter: nf_nat...
1577
  	}
33cb1e9a9   Patrick McHardy   [NETFILTER]: nf_c...
1578
  	return ret;
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
1579
  }
f5b321bd3   Patrick McHardy   netfilter: nf_con...
1580
1581
1582
1583
1584
1585
1586
1587
1588
1589
1590
1591
  static int sip_help_udp(struct sk_buff *skb, unsigned int protoff,
  			struct nf_conn *ct, enum ip_conntrack_info ctinfo)
  {
  	unsigned int dataoff, datalen;
  	const char *dptr;
  
  	/* No Data ? */
  	dataoff = protoff + sizeof(struct udphdr);
  	if (dataoff >= skb->len)
  		return NF_ACCEPT;
  
  	nf_ct_refresh(ct, skb, sip_timeout * HZ);
a1d7c1b4b   Patrick McHardy   netfilter: nf_ct_...
1592
1593
  	if (unlikely(skb_linearize(skb)))
  		return NF_DROP;
f5b321bd3   Patrick McHardy   netfilter: nf_con...
1594
1595
1596
1597
1598
  
  	dptr = skb->data + dataoff;
  	datalen = skb->len - dataoff;
  	if (datalen < strlen("SIP/2.0 200"))
  		return NF_ACCEPT;
051966c0c   Patrick McHardy   netfilter: nf_nat...
1599
  	return process_sip_msg(skb, ct, protoff, dataoff, &dptr, &datalen);
f5b321bd3   Patrick McHardy   netfilter: nf_con...
1600
1601
1602
  }
  
  static struct nf_conntrack_helper sip[MAX_PORTS][4] __read_mostly;
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
1603

0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1604
1605
  static const struct nf_conntrack_expect_policy sip_exp_policy[SIP_EXPECT_MAX + 1] = {
  	[SIP_EXPECT_SIGNALLING] = {
b87921bdf   Patrick McHardy   netfilter: nf_con...
1606
  		.name		= "signalling",
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1607
1608
1609
1610
  		.max_expected	= 1,
  		.timeout	= 3 * 60,
  	},
  	[SIP_EXPECT_AUDIO] = {
b87921bdf   Patrick McHardy   netfilter: nf_con...
1611
  		.name		= "audio",
a9c1d3591   Patrick McHardy   [NETFILTER]: nf_c...
1612
  		.max_expected	= 2 * IP_CT_DIR_MAX,
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1613
1614
  		.timeout	= 3 * 60,
  	},
0d0ab0378   Patrick McHardy   [NETFILTER]: nf_c...
1615
  	[SIP_EXPECT_VIDEO] = {
b87921bdf   Patrick McHardy   netfilter: nf_con...
1616
  		.name		= "video",
0d0ab0378   Patrick McHardy   [NETFILTER]: nf_c...
1617
1618
1619
  		.max_expected	= 2 * IP_CT_DIR_MAX,
  		.timeout	= 3 * 60,
  	},
9d288dffe   Patrick McHardy   netfilter: nf_con...
1620
1621
1622
1623
1624
  	[SIP_EXPECT_IMAGE] = {
  		.name		= "image",
  		.max_expected	= IP_CT_DIR_MAX,
  		.timeout	= 3 * 60,
  	},
6002f266b   Patrick McHardy   [NETFILTER]: nf_c...
1625
  };
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
1626
1627
1628
1629
1630
  static void nf_conntrack_sip_fini(void)
  {
  	int i, j;
  
  	for (i = 0; i < ports_c; i++) {
f5b321bd3   Patrick McHardy   netfilter: nf_con...
1631
  		for (j = 0; j < ARRAY_SIZE(sip[i]); j++) {
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
  			if (sip[i][j].me == NULL)
  				continue;
  			nf_conntrack_helper_unregister(&sip[i][j]);
  		}
  	}
  }
  
  static int __init nf_conntrack_sip_init(void)
  {
  	int i, j, ret;
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
1642
1643
1644
1645
1646
1647
1648
1649
  
  	if (ports_c == 0)
  		ports[ports_c++] = SIP_PORT;
  
  	for (i = 0; i < ports_c; i++) {
  		memset(&sip[i], 0, sizeof(sip[i]));
  
  		sip[i][0].tuple.src.l3num = AF_INET;
f5b321bd3   Patrick McHardy   netfilter: nf_con...
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
  		sip[i][0].tuple.dst.protonum = IPPROTO_UDP;
  		sip[i][0].help = sip_help_udp;
  		sip[i][1].tuple.src.l3num = AF_INET;
  		sip[i][1].tuple.dst.protonum = IPPROTO_TCP;
  		sip[i][1].help = sip_help_tcp;
  
  		sip[i][2].tuple.src.l3num = AF_INET6;
  		sip[i][2].tuple.dst.protonum = IPPROTO_UDP;
  		sip[i][2].help = sip_help_udp;
  		sip[i][3].tuple.src.l3num = AF_INET6;
  		sip[i][3].tuple.dst.protonum = IPPROTO_TCP;
  		sip[i][3].help = sip_help_tcp;
  
  		for (j = 0; j < ARRAY_SIZE(sip[i]); j++) {
1afc56794   Pablo Neira Ayuso   netfilter: nf_ct_...
1664
  			sip[i][j].data_len = sizeof(struct nf_ct_sip_master);
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
1665
  			sip[i][j].tuple.src.u.udp.port = htons(ports[i]);
0f32a40fc   Patrick McHardy   [NETFILTER]: nf_c...
1666
1667
  			sip[i][j].expect_policy = sip_exp_policy;
  			sip[i][j].expect_class_max = SIP_EXPECT_MAX;
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
1668
  			sip[i][j].me = THIS_MODULE;
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
1669

9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
1670
  			if (ports[i] == SIP_PORT)
e9324b2ce   Patrick McHardy   netfilter: nf_ct_...
1671
  				sprintf(sip[i][j].name, "sip");
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
1672
  			else
e9324b2ce   Patrick McHardy   netfilter: nf_ct_...
1673
  				sprintf(sip[i][j].name, "sip-%u", i);
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
1674

0d53778e8   Patrick McHardy   [NETFILTER]: Conv...
1675
1676
  			pr_debug("port #%u: %u
  ", i, ports[i]);
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
1677
1678
1679
  
  			ret = nf_conntrack_helper_register(&sip[i][j]);
  			if (ret) {
654d0fbdc   Stephen Hemminger   netfilter: cleanu...
1680
1681
1682
  				printk(KERN_ERR "nf_ct_sip: failed to register"
  				       " helper for pf: %u port: %u
  ",
9fafcd7b2   Patrick McHardy   [NETFILTER]: nf_c...
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
  				       sip[i][j].tuple.src.l3num, ports[i]);
  				nf_conntrack_sip_fini();
  				return ret;
  			}
  		}
  	}
  	return 0;
  }
  
  module_init(nf_conntrack_sip_init);
  module_exit(nf_conntrack_sip_fini);