[NETFILTER]: Add ctnetlink subsystem
[linux-2.6.git] / net / ipv4 / netfilter / ip_conntrack_proto_sctp.c
1 /*
2  * Connection tracking protocol helper module for SCTP.
3  * 
4  * SCTP is defined in RFC 2960. References to various sections in this code 
5  * are to this RFC.
6  * 
7  * This program is free software; you can redistribute it and/or modify
8  * it under the terms of the GNU General Public License version 2 as
9  * published by the Free Software Foundation.
10  */
11
12 /*
13  * Added support for proc manipulation of timeouts.
14  */
15
16 #include <linux/types.h>
17 #include <linux/sched.h>
18 #include <linux/timer.h>
19 #include <linux/netfilter.h>
20 #include <linux/module.h>
21 #include <linux/in.h>
22 #include <linux/ip.h>
23 #include <linux/sctp.h>
24 #include <linux/string.h>
25 #include <linux/seq_file.h>
26
27 #include <linux/netfilter_ipv4/ip_conntrack.h>
28 #include <linux/netfilter_ipv4/ip_conntrack_protocol.h>
29
30 #if 0
31 #define DEBUGP(format, ...) printk(format, ## __VA_ARGS__)
32 #else
33 #define DEBUGP(format, args...)
34 #endif
35
36 /* Protects conntrack->proto.sctp */
37 static DEFINE_RWLOCK(sctp_lock);
38
39 /* FIXME: Examine ipfilter's timeouts and conntrack transitions more
40    closely.  They're more complex. --RR 
41
42    And so for me for SCTP :D -Kiran */
43
44 static const char *sctp_conntrack_names[] = {
45         "NONE",
46         "CLOSED",
47         "COOKIE_WAIT",
48         "COOKIE_ECHOED",
49         "ESTABLISHED",
50         "SHUTDOWN_SENT",
51         "SHUTDOWN_RECD",
52         "SHUTDOWN_ACK_SENT",
53 };
54
55 #define SECS  * HZ
56 #define MINS  * 60 SECS
57 #define HOURS * 60 MINS
58 #define DAYS  * 24 HOURS
59
60 static unsigned long ip_ct_sctp_timeout_closed            =  10 SECS;
61 static unsigned long ip_ct_sctp_timeout_cookie_wait       =   3 SECS;
62 static unsigned long ip_ct_sctp_timeout_cookie_echoed     =   3 SECS;
63 static unsigned long ip_ct_sctp_timeout_established       =   5 DAYS;
64 static unsigned long ip_ct_sctp_timeout_shutdown_sent     = 300 SECS / 1000;
65 static unsigned long ip_ct_sctp_timeout_shutdown_recd     = 300 SECS / 1000;
66 static unsigned long ip_ct_sctp_timeout_shutdown_ack_sent =   3 SECS;
67
68 static unsigned long * sctp_timeouts[]
69 = { NULL,                                  /* SCTP_CONNTRACK_NONE  */
70     &ip_ct_sctp_timeout_closed,            /* SCTP_CONNTRACK_CLOSED */
71     &ip_ct_sctp_timeout_cookie_wait,       /* SCTP_CONNTRACK_COOKIE_WAIT */
72     &ip_ct_sctp_timeout_cookie_echoed,     /* SCTP_CONNTRACK_COOKIE_ECHOED */
73     &ip_ct_sctp_timeout_established,       /* SCTP_CONNTRACK_ESTABLISHED */
74     &ip_ct_sctp_timeout_shutdown_sent,     /* SCTP_CONNTRACK_SHUTDOWN_SENT */
75     &ip_ct_sctp_timeout_shutdown_recd,     /* SCTP_CONNTRACK_SHUTDOWN_RECD */
76     &ip_ct_sctp_timeout_shutdown_ack_sent  /* SCTP_CONNTRACK_SHUTDOWN_ACK_SENT */
77  };
78
79 #define sNO SCTP_CONNTRACK_NONE
80 #define sCL SCTP_CONNTRACK_CLOSED
81 #define sCW SCTP_CONNTRACK_COOKIE_WAIT
82 #define sCE SCTP_CONNTRACK_COOKIE_ECHOED
83 #define sES SCTP_CONNTRACK_ESTABLISHED
84 #define sSS SCTP_CONNTRACK_SHUTDOWN_SENT
85 #define sSR SCTP_CONNTRACK_SHUTDOWN_RECD
86 #define sSA SCTP_CONNTRACK_SHUTDOWN_ACK_SENT
87 #define sIV SCTP_CONNTRACK_MAX
88
89 /* 
90         These are the descriptions of the states:
91
92 NOTE: These state names are tantalizingly similar to the states of an 
93 SCTP endpoint. But the interpretation of the states is a little different,
94 considering that these are the states of the connection and not of an end 
95 point. Please note the subtleties. -Kiran
96
97 NONE              - Nothing so far.
98 COOKIE WAIT       - We have seen an INIT chunk in the original direction, or also 
99                     an INIT_ACK chunk in the reply direction.
100 COOKIE ECHOED     - We have seen a COOKIE_ECHO chunk in the original direction.
101 ESTABLISHED       - We have seen a COOKIE_ACK in the reply direction.
102 SHUTDOWN_SENT     - We have seen a SHUTDOWN chunk in the original direction.
103 SHUTDOWN_RECD     - We have seen a SHUTDOWN chunk in the reply directoin.
104 SHUTDOWN_ACK_SENT - We have seen a SHUTDOWN_ACK chunk in the direction opposite
105                     to that of the SHUTDOWN chunk.
106 CLOSED            - We have seen a SHUTDOWN_COMPLETE chunk in the direction of 
107                     the SHUTDOWN chunk. Connection is closed.
108 */
109
110 /* TODO
111  - I have assumed that the first INIT is in the original direction. 
112  This messes things when an INIT comes in the reply direction in CLOSED
113  state.
114  - Check the error type in the reply dir before transitioning from 
115 cookie echoed to closed.
116  - Sec 5.2.4 of RFC 2960
117  - Multi Homing support.
118 */
119
120 /* SCTP conntrack state transitions */
121 static enum sctp_conntrack sctp_conntracks[2][9][SCTP_CONNTRACK_MAX] = {
122         {
123 /*      ORIGINAL        */
124 /*                  sNO, sCL, sCW, sCE, sES, sSS, sSR, sSA */
125 /* init         */ {sCW, sCW, sCW, sCE, sES, sSS, sSR, sSA},
126 /* init_ack     */ {sCL, sCL, sCW, sCE, sES, sSS, sSR, sSA},
127 /* abort        */ {sCL, sCL, sCL, sCL, sCL, sCL, sCL, sCL},
128 /* shutdown     */ {sCL, sCL, sCW, sCE, sSS, sSS, sSR, sSA},
129 /* shutdown_ack */ {sSA, sCL, sCW, sCE, sES, sSA, sSA, sSA},
130 /* error        */ {sCL, sCL, sCW, sCE, sES, sSS, sSR, sSA},/* Cant have Stale cookie*/
131 /* cookie_echo  */ {sCL, sCL, sCE, sCE, sES, sSS, sSR, sSA},/* 5.2.4 - Big TODO */
132 /* cookie_ack   */ {sCL, sCL, sCW, sCE, sES, sSS, sSR, sSA},/* Cant come in orig dir */
133 /* shutdown_comp*/ {sCL, sCL, sCW, sCE, sES, sSS, sSR, sCL}
134         },
135         {
136 /*      REPLY   */
137 /*                  sNO, sCL, sCW, sCE, sES, sSS, sSR, sSA */
138 /* init         */ {sIV, sCL, sCW, sCE, sES, sSS, sSR, sSA},/* INIT in sCL Big TODO */
139 /* init_ack     */ {sIV, sCL, sCW, sCE, sES, sSS, sSR, sSA},
140 /* abort        */ {sIV, sCL, sCL, sCL, sCL, sCL, sCL, sCL},
141 /* shutdown     */ {sIV, sCL, sCW, sCE, sSR, sSS, sSR, sSA},
142 /* shutdown_ack */ {sIV, sCL, sCW, sCE, sES, sSA, sSA, sSA},
143 /* error        */ {sIV, sCL, sCW, sCL, sES, sSS, sSR, sSA},
144 /* cookie_echo  */ {sIV, sCL, sCW, sCE, sES, sSS, sSR, sSA},/* Cant come in reply dir */
145 /* cookie_ack   */ {sIV, sCL, sCW, sES, sES, sSS, sSR, sSA},
146 /* shutdown_comp*/ {sIV, sCL, sCW, sCE, sES, sSS, sSR, sCL}
147         }
148 };
149
150 static int sctp_pkt_to_tuple(const struct sk_buff *skb,
151                              unsigned int dataoff,
152                              struct ip_conntrack_tuple *tuple)
153 {
154         sctp_sctphdr_t _hdr, *hp;
155
156         DEBUGP(__FUNCTION__);
157         DEBUGP("\n");
158
159         /* Actually only need first 8 bytes. */
160         hp = skb_header_pointer(skb, dataoff, 8, &_hdr);
161         if (hp == NULL)
162                 return 0;
163
164         tuple->src.u.sctp.port = hp->source;
165         tuple->dst.u.sctp.port = hp->dest;
166         return 1;
167 }
168
169 static int sctp_invert_tuple(struct ip_conntrack_tuple *tuple,
170                              const struct ip_conntrack_tuple *orig)
171 {
172         DEBUGP(__FUNCTION__);
173         DEBUGP("\n");
174
175         tuple->src.u.sctp.port = orig->dst.u.sctp.port;
176         tuple->dst.u.sctp.port = orig->src.u.sctp.port;
177         return 1;
178 }
179
180 /* Print out the per-protocol part of the tuple. */
181 static int sctp_print_tuple(struct seq_file *s,
182                             const struct ip_conntrack_tuple *tuple)
183 {
184         DEBUGP(__FUNCTION__);
185         DEBUGP("\n");
186
187         return seq_printf(s, "sport=%hu dport=%hu ",
188                           ntohs(tuple->src.u.sctp.port),
189                           ntohs(tuple->dst.u.sctp.port));
190 }
191
192 /* Print out the private part of the conntrack. */
193 static int sctp_print_conntrack(struct seq_file *s,
194                                 const struct ip_conntrack *conntrack)
195 {
196         enum sctp_conntrack state;
197
198         DEBUGP(__FUNCTION__);
199         DEBUGP("\n");
200
201         read_lock_bh(&sctp_lock);
202         state = conntrack->proto.sctp.state;
203         read_unlock_bh(&sctp_lock);
204
205         return seq_printf(s, "%s ", sctp_conntrack_names[state]);
206 }
207
208 #define for_each_sctp_chunk(skb, sch, _sch, offset, count)              \
209 for (offset = skb->nh.iph->ihl * 4 + sizeof(sctp_sctphdr_t), count = 0; \
210         offset < skb->len &&                                            \
211         (sch = skb_header_pointer(skb, offset, sizeof(_sch), &_sch));   \
212         offset += (htons(sch->length) + 3) & ~3, count++)
213
214 /* Some validity checks to make sure the chunks are fine */
215 static int do_basic_checks(struct ip_conntrack *conntrack,
216                            const struct sk_buff *skb,
217                            char *map)
218 {
219         u_int32_t offset, count;
220         sctp_chunkhdr_t _sch, *sch;
221         int flag;
222
223         DEBUGP(__FUNCTION__);
224         DEBUGP("\n");
225
226         flag = 0;
227
228         for_each_sctp_chunk (skb, sch, _sch, offset, count) {
229                 DEBUGP("Chunk Num: %d  Type: %d\n", count, sch->type);
230
231                 if (sch->type == SCTP_CID_INIT 
232                         || sch->type == SCTP_CID_INIT_ACK
233                         || sch->type == SCTP_CID_SHUTDOWN_COMPLETE) {
234                         flag = 1;
235                 }
236
237                 /* Cookie Ack/Echo chunks not the first OR 
238                    Init / Init Ack / Shutdown compl chunks not the only chunks */
239                 if ((sch->type == SCTP_CID_COOKIE_ACK 
240                         || sch->type == SCTP_CID_COOKIE_ECHO
241                         || flag)
242                      && count !=0 ) {
243                         DEBUGP("Basic checks failed\n");
244                         return 1;
245                 }
246
247                 if (map) {
248                         set_bit(sch->type, (void *)map);
249                 }
250         }
251
252         DEBUGP("Basic checks passed\n");
253         return 0;
254 }
255
256 static int new_state(enum ip_conntrack_dir dir,
257                      enum sctp_conntrack cur_state,
258                      int chunk_type)
259 {
260         int i;
261
262         DEBUGP(__FUNCTION__);
263         DEBUGP("\n");
264
265         DEBUGP("Chunk type: %d\n", chunk_type);
266
267         switch (chunk_type) {
268                 case SCTP_CID_INIT: 
269                         DEBUGP("SCTP_CID_INIT\n");
270                         i = 0; break;
271                 case SCTP_CID_INIT_ACK: 
272                         DEBUGP("SCTP_CID_INIT_ACK\n");
273                         i = 1; break;
274                 case SCTP_CID_ABORT: 
275                         DEBUGP("SCTP_CID_ABORT\n");
276                         i = 2; break;
277                 case SCTP_CID_SHUTDOWN: 
278                         DEBUGP("SCTP_CID_SHUTDOWN\n");
279                         i = 3; break;
280                 case SCTP_CID_SHUTDOWN_ACK: 
281                         DEBUGP("SCTP_CID_SHUTDOWN_ACK\n");
282                         i = 4; break;
283                 case SCTP_CID_ERROR: 
284                         DEBUGP("SCTP_CID_ERROR\n");
285                         i = 5; break;
286                 case SCTP_CID_COOKIE_ECHO: 
287                         DEBUGP("SCTP_CID_COOKIE_ECHO\n");
288                         i = 6; break;
289                 case SCTP_CID_COOKIE_ACK: 
290                         DEBUGP("SCTP_CID_COOKIE_ACK\n");
291                         i = 7; break;
292                 case SCTP_CID_SHUTDOWN_COMPLETE: 
293                         DEBUGP("SCTP_CID_SHUTDOWN_COMPLETE\n");
294                         i = 8; break;
295                 default:
296                         /* Other chunks like DATA, SACK, HEARTBEAT and
297                         its ACK do not cause a change in state */
298                         DEBUGP("Unknown chunk type, Will stay in %s\n", 
299                                                 sctp_conntrack_names[cur_state]);
300                         return cur_state;
301         }
302
303         DEBUGP("dir: %d   cur_state: %s  chunk_type: %d  new_state: %s\n", 
304                         dir, sctp_conntrack_names[cur_state], chunk_type,
305                         sctp_conntrack_names[sctp_conntracks[dir][i][cur_state]]);
306
307         return sctp_conntracks[dir][i][cur_state];
308 }
309
310 /* Returns verdict for packet, or -1 for invalid. */
311 static int sctp_packet(struct ip_conntrack *conntrack,
312                        const struct sk_buff *skb,
313                        enum ip_conntrack_info ctinfo)
314 {
315         enum sctp_conntrack newconntrack, oldsctpstate;
316         struct iphdr *iph = skb->nh.iph;
317         sctp_sctphdr_t _sctph, *sh;
318         sctp_chunkhdr_t _sch, *sch;
319         u_int32_t offset, count;
320         char map[256 / sizeof (char)] = {0};
321
322         DEBUGP(__FUNCTION__);
323         DEBUGP("\n");
324
325         sh = skb_header_pointer(skb, iph->ihl * 4, sizeof(_sctph), &_sctph);
326         if (sh == NULL)
327                 return -1;
328
329         if (do_basic_checks(conntrack, skb, map) != 0)
330                 return -1;
331
332         /* Check the verification tag (Sec 8.5) */
333         if (!test_bit(SCTP_CID_INIT, (void *)map)
334                 && !test_bit(SCTP_CID_SHUTDOWN_COMPLETE, (void *)map)
335                 && !test_bit(SCTP_CID_COOKIE_ECHO, (void *)map)
336                 && !test_bit(SCTP_CID_ABORT, (void *)map)
337                 && !test_bit(SCTP_CID_SHUTDOWN_ACK, (void *)map)
338                 && (sh->vtag != conntrack->proto.sctp.vtag[CTINFO2DIR(ctinfo)])) {
339                 DEBUGP("Verification tag check failed\n");
340                 return -1;
341         }
342
343         oldsctpstate = newconntrack = SCTP_CONNTRACK_MAX;
344         for_each_sctp_chunk (skb, sch, _sch, offset, count) {
345                 write_lock_bh(&sctp_lock);
346
347                 /* Special cases of Verification tag check (Sec 8.5.1) */
348                 if (sch->type == SCTP_CID_INIT) {
349                         /* Sec 8.5.1 (A) */
350                         if (sh->vtag != 0) {
351                                 write_unlock_bh(&sctp_lock);
352                                 return -1;
353                         }
354                 } else if (sch->type == SCTP_CID_ABORT) {
355                         /* Sec 8.5.1 (B) */
356                         if (!(sh->vtag == conntrack->proto.sctp.vtag[CTINFO2DIR(ctinfo)])
357                                 && !(sh->vtag == conntrack->proto.sctp.vtag
358                                                         [1 - CTINFO2DIR(ctinfo)])) {
359                                 write_unlock_bh(&sctp_lock);
360                                 return -1;
361                         }
362                 } else if (sch->type == SCTP_CID_SHUTDOWN_COMPLETE) {
363                         /* Sec 8.5.1 (C) */
364                         if (!(sh->vtag == conntrack->proto.sctp.vtag[CTINFO2DIR(ctinfo)])
365                                 && !(sh->vtag == conntrack->proto.sctp.vtag
366                                                         [1 - CTINFO2DIR(ctinfo)] 
367                                         && (sch->flags & 1))) {
368                                 write_unlock_bh(&sctp_lock);
369                                 return -1;
370                         }
371                 } else if (sch->type == SCTP_CID_COOKIE_ECHO) {
372                         /* Sec 8.5.1 (D) */
373                         if (!(sh->vtag == conntrack->proto.sctp.vtag[CTINFO2DIR(ctinfo)])) {
374                                 write_unlock_bh(&sctp_lock);
375                                 return -1;
376                         }
377                 }
378
379                 oldsctpstate = conntrack->proto.sctp.state;
380                 newconntrack = new_state(CTINFO2DIR(ctinfo), oldsctpstate, sch->type);
381
382                 /* Invalid */
383                 if (newconntrack == SCTP_CONNTRACK_MAX) {
384                         DEBUGP("ip_conntrack_sctp: Invalid dir=%i ctype=%u conntrack=%u\n",
385                                CTINFO2DIR(ctinfo), sch->type, oldsctpstate);
386                         write_unlock_bh(&sctp_lock);
387                         return -1;
388                 }
389
390                 /* If it is an INIT or an INIT ACK note down the vtag */
391                 if (sch->type == SCTP_CID_INIT 
392                         || sch->type == SCTP_CID_INIT_ACK) {
393                         sctp_inithdr_t _inithdr, *ih;
394
395                         ih = skb_header_pointer(skb, offset + sizeof(sctp_chunkhdr_t),
396                                                 sizeof(_inithdr), &_inithdr);
397                         if (ih == NULL) {
398                                         write_unlock_bh(&sctp_lock);
399                                         return -1;
400                         }
401                         DEBUGP("Setting vtag %x for dir %d\n", 
402                                         ih->init_tag, !CTINFO2DIR(ctinfo));
403                         conntrack->proto.sctp.vtag[!CTINFO2DIR(ctinfo)] = ih->init_tag;
404                 }
405
406                 conntrack->proto.sctp.state = newconntrack;
407                 if (oldsctpstate != newconntrack)
408                         ip_conntrack_event_cache(IPCT_PROTOINFO, skb);
409                 write_unlock_bh(&sctp_lock);
410         }
411
412         ip_ct_refresh_acct(conntrack, ctinfo, skb, *sctp_timeouts[newconntrack]);
413
414         if (oldsctpstate == SCTP_CONNTRACK_COOKIE_ECHOED
415                 && CTINFO2DIR(ctinfo) == IP_CT_DIR_REPLY
416                 && newconntrack == SCTP_CONNTRACK_ESTABLISHED) {
417                 DEBUGP("Setting assured bit\n");
418                 set_bit(IPS_ASSURED_BIT, &conntrack->status);
419         }
420
421         return NF_ACCEPT;
422 }
423
424 /* Called when a new connection for this protocol found. */
425 static int sctp_new(struct ip_conntrack *conntrack, 
426                     const struct sk_buff *skb)
427 {
428         enum sctp_conntrack newconntrack;
429         struct iphdr *iph = skb->nh.iph;
430         sctp_sctphdr_t _sctph, *sh;
431         sctp_chunkhdr_t _sch, *sch;
432         u_int32_t offset, count;
433         char map[256 / sizeof (char)] = {0};
434
435         DEBUGP(__FUNCTION__);
436         DEBUGP("\n");
437
438         sh = skb_header_pointer(skb, iph->ihl * 4, sizeof(_sctph), &_sctph);
439         if (sh == NULL)
440                 return 0;
441
442         if (do_basic_checks(conntrack, skb, map) != 0)
443                 return 0;
444
445         /* If an OOTB packet has any of these chunks discard (Sec 8.4) */
446         if ((test_bit (SCTP_CID_ABORT, (void *)map))
447                 || (test_bit (SCTP_CID_SHUTDOWN_COMPLETE, (void *)map))
448                 || (test_bit (SCTP_CID_COOKIE_ACK, (void *)map))) {
449                 return 0;
450         }
451
452         newconntrack = SCTP_CONNTRACK_MAX;
453         for_each_sctp_chunk (skb, sch, _sch, offset, count) {
454                 /* Don't need lock here: this conntrack not in circulation yet */
455                 newconntrack = new_state (IP_CT_DIR_ORIGINAL, 
456                                                 SCTP_CONNTRACK_NONE, sch->type);
457
458                 /* Invalid: delete conntrack */
459                 if (newconntrack == SCTP_CONNTRACK_MAX) {
460                         DEBUGP("ip_conntrack_sctp: invalid new deleting.\n");
461                         return 0;
462                 }
463
464                 /* Copy the vtag into the state info */
465                 if (sch->type == SCTP_CID_INIT) {
466                         if (sh->vtag == 0) {
467                                 sctp_inithdr_t _inithdr, *ih;
468
469                                 ih = skb_header_pointer(skb, offset + sizeof(sctp_chunkhdr_t),
470                                                         sizeof(_inithdr), &_inithdr);
471                                 if (ih == NULL)
472                                         return 0;
473
474                                 DEBUGP("Setting vtag %x for new conn\n", 
475                                         ih->init_tag);
476
477                                 conntrack->proto.sctp.vtag[IP_CT_DIR_REPLY] = 
478                                                                 ih->init_tag;
479                         } else {
480                                 /* Sec 8.5.1 (A) */
481                                 return 0;
482                         }
483                 }
484                 /* If it is a shutdown ack OOTB packet, we expect a return
485                    shutdown complete, otherwise an ABORT Sec 8.4 (5) and (8) */
486                 else {
487                         DEBUGP("Setting vtag %x for new conn OOTB\n", 
488                                 sh->vtag);
489                         conntrack->proto.sctp.vtag[IP_CT_DIR_REPLY] = sh->vtag;
490                 }
491
492                 conntrack->proto.sctp.state = newconntrack;
493         }
494
495         return 1;
496 }
497
498 static struct ip_conntrack_protocol ip_conntrack_protocol_sctp = { 
499         .proto           = IPPROTO_SCTP, 
500         .name            = "sctp",
501         .pkt_to_tuple    = sctp_pkt_to_tuple, 
502         .invert_tuple    = sctp_invert_tuple, 
503         .print_tuple     = sctp_print_tuple, 
504         .print_conntrack = sctp_print_conntrack,
505         .packet          = sctp_packet, 
506         .new             = sctp_new, 
507         .destroy         = NULL, 
508         .me              = THIS_MODULE,
509 #if defined(CONFIG_IP_NF_CONNTRACK_NETLINK) || \
510     defined(CONFIG_IP_NF_CONNTRACK_NETLINK_MODULE)
511         .tuple_to_nfattr = ip_ct_port_tuple_to_nfattr,
512         .nfattr_to_tuple = ip_ct_port_nfattr_to_tuple,
513 #endif
514 };
515
516 #ifdef CONFIG_SYSCTL
517 static ctl_table ip_ct_sysctl_table[] = {
518         {
519                 .ctl_name       = NET_IPV4_NF_CONNTRACK_SCTP_TIMEOUT_CLOSED,
520                 .procname       = "ip_conntrack_sctp_timeout_closed",
521                 .data           = &ip_ct_sctp_timeout_closed,
522                 .maxlen         = sizeof(unsigned int),
523                 .mode           = 0644,
524                 .proc_handler   = &proc_dointvec_jiffies,
525         },
526         {
527                 .ctl_name       = NET_IPV4_NF_CONNTRACK_SCTP_TIMEOUT_COOKIE_WAIT,
528                 .procname       = "ip_conntrack_sctp_timeout_cookie_wait",
529                 .data           = &ip_ct_sctp_timeout_cookie_wait,
530                 .maxlen         = sizeof(unsigned int),
531                 .mode           = 0644,
532                 .proc_handler   = &proc_dointvec_jiffies,
533         },
534         {
535                 .ctl_name       = NET_IPV4_NF_CONNTRACK_SCTP_TIMEOUT_COOKIE_ECHOED,
536                 .procname       = "ip_conntrack_sctp_timeout_cookie_echoed",
537                 .data           = &ip_ct_sctp_timeout_cookie_echoed,
538                 .maxlen         = sizeof(unsigned int),
539                 .mode           = 0644,
540                 .proc_handler   = &proc_dointvec_jiffies,
541         },
542         {
543                 .ctl_name       = NET_IPV4_NF_CONNTRACK_SCTP_TIMEOUT_ESTABLISHED,
544                 .procname       = "ip_conntrack_sctp_timeout_established",
545                 .data           = &ip_ct_sctp_timeout_established,
546                 .maxlen         = sizeof(unsigned int),
547                 .mode           = 0644,
548                 .proc_handler   = &proc_dointvec_jiffies,
549         },
550         {
551                 .ctl_name       = NET_IPV4_NF_CONNTRACK_SCTP_TIMEOUT_SHUTDOWN_SENT,
552                 .procname       = "ip_conntrack_sctp_timeout_shutdown_sent",
553                 .data           = &ip_ct_sctp_timeout_shutdown_sent,
554                 .maxlen         = sizeof(unsigned int),
555                 .mode           = 0644,
556                 .proc_handler   = &proc_dointvec_jiffies,
557         },
558         {
559                 .ctl_name       = NET_IPV4_NF_CONNTRACK_SCTP_TIMEOUT_SHUTDOWN_RECD,
560                 .procname       = "ip_conntrack_sctp_timeout_shutdown_recd",
561                 .data           = &ip_ct_sctp_timeout_shutdown_recd,
562                 .maxlen         = sizeof(unsigned int),
563                 .mode           = 0644,
564                 .proc_handler   = &proc_dointvec_jiffies,
565         },
566         {
567                 .ctl_name       = NET_IPV4_NF_CONNTRACK_SCTP_TIMEOUT_SHUTDOWN_ACK_SENT,
568                 .procname       = "ip_conntrack_sctp_timeout_shutdown_ack_sent",
569                 .data           = &ip_ct_sctp_timeout_shutdown_ack_sent,
570                 .maxlen         = sizeof(unsigned int),
571                 .mode           = 0644,
572                 .proc_handler   = &proc_dointvec_jiffies,
573         },
574         { .ctl_name = 0 }
575 };
576
577 static ctl_table ip_ct_netfilter_table[] = {
578         {
579                 .ctl_name       = NET_IPV4_NETFILTER,
580                 .procname       = "netfilter",
581                 .mode           = 0555,
582                 .child          = ip_ct_sysctl_table,
583         },
584         { .ctl_name = 0 }
585 };
586
587 static ctl_table ip_ct_ipv4_table[] = {
588         {
589                 .ctl_name       = NET_IPV4,
590                 .procname       = "ipv4",
591                 .mode           = 0555,
592                 .child          = ip_ct_netfilter_table,
593         },
594         { .ctl_name = 0 }
595 };
596
597 static ctl_table ip_ct_net_table[] = {
598         {
599                 .ctl_name       = CTL_NET,
600                 .procname       = "net",
601                 .mode           = 0555, 
602                 .child          = ip_ct_ipv4_table,
603         },
604         { .ctl_name = 0 }
605 };
606
607 static struct ctl_table_header *ip_ct_sysctl_header;
608 #endif
609
610 static int __init init(void)
611 {
612         int ret;
613
614         ret = ip_conntrack_protocol_register(&ip_conntrack_protocol_sctp);
615         if (ret) {
616                 printk("ip_conntrack_proto_sctp: protocol register failed\n");
617                 goto out;
618         }
619
620 #ifdef CONFIG_SYSCTL
621         ip_ct_sysctl_header = register_sysctl_table(ip_ct_net_table, 0);
622         if (ip_ct_sysctl_header == NULL) {
623                 ret = -ENOMEM;
624                 printk("ip_conntrack_proto_sctp: can't register to sysctl.\n");
625                 goto cleanup;
626         }
627 #endif
628
629         return ret;
630
631 #ifdef CONFIG_SYSCTL
632  cleanup:
633         ip_conntrack_protocol_unregister(&ip_conntrack_protocol_sctp);
634 #endif
635  out:
636         DEBUGP("SCTP conntrack module loading %s\n", 
637                                         ret ? "failed": "succeeded");
638         return ret;
639 }
640
641 static void __exit fini(void)
642 {
643         ip_conntrack_protocol_unregister(&ip_conntrack_protocol_sctp);
644 #ifdef CONFIG_SYSCTL
645         unregister_sysctl_table(ip_ct_sysctl_header);
646 #endif
647         DEBUGP("SCTP conntrack module unloaded\n");
648 }
649
650 module_init(init);
651 module_exit(fini);
652
653 MODULE_LICENSE("GPL");
654 MODULE_AUTHOR("Kiran Kumar Immidi");
655 MODULE_DESCRIPTION("Netfilter connection tracking protocol helper for SCTP");