]> git.proxmox.com Git - mirror_ubuntu-kernels.git/blame - net/ipv6/netfilter/ip6_queue.c
[AX25]: Switch to using ctl_paths.
[mirror_ubuntu-kernels.git] / net / ipv6 / netfilter / ip6_queue.c
CommitLineData
1da177e4
LT
1/*
2 * This is a module which is used for queueing IPv6 packets and
3 * communicating with userspace via netlink.
4 *
5 * (C) 2001 Fernando Anton, this code is GPL.
6 * IPv64 Project - Work based in IPv64 draft by Arturo Azcorra.
7 * Universidad Carlos III de Madrid - Leganes (Madrid) - Spain
8 * Universidad Politecnica de Alcala de Henares - Alcala de H. (Madrid) - Spain
9 * email: fanton@it.uc3m.es
10 *
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License version 2 as
13 * published by the Free Software Foundation.
1da177e4
LT
14 */
15#include <linux/module.h>
16#include <linux/skbuff.h>
17#include <linux/init.h>
18#include <linux/ipv6.h>
19#include <linux/notifier.h>
20#include <linux/netdevice.h>
21#include <linux/netfilter.h>
22#include <linux/netlink.h>
23#include <linux/spinlock.h>
24#include <linux/sysctl.h>
25#include <linux/proc_fs.h>
7351a22a 26#include <linux/seq_file.h>
4a3e2f71 27#include <linux/mutex.h>
457c4cbc 28#include <net/net_namespace.h>
1da177e4
LT
29#include <net/sock.h>
30#include <net/ipv6.h>
31#include <net/ip6_route.h>
c01cd429 32#include <net/netfilter/nf_queue.h>
1da177e4
LT
33#include <linux/netfilter_ipv4/ip_queue.h>
34#include <linux/netfilter_ipv4/ip_tables.h>
35#include <linux/netfilter_ipv6/ip6_tables.h>
36
37#define IPQ_QMAX_DEFAULT 1024
38#define IPQ_PROC_FS_NAME "ip6_queue"
39#define NET_IPQ_QMAX 2088
40#define NET_IPQ_QMAX_NAME "ip6_queue_maxlen"
41
02f014d8 42typedef int (*ipq_cmpfn)(struct nf_queue_entry *, unsigned long);
1da177e4 43
1192e403 44static unsigned char copy_mode __read_mostly = IPQ_COPY_NONE;
94aec08e 45static unsigned int queue_maxlen __read_mostly = IPQ_QMAX_DEFAULT;
1da177e4 46static DEFINE_RWLOCK(queue_lock);
1192e403
BH
47static int peer_pid __read_mostly;
48static unsigned int copy_range __read_mostly;
1da177e4
LT
49static unsigned int queue_total;
50static unsigned int queue_dropped = 0;
51static unsigned int queue_user_dropped = 0;
1192e403 52static struct sock *ipqnl __read_mostly;
1da177e4 53static LIST_HEAD(queue_list);
4a3e2f71 54static DEFINE_MUTEX(ipqnl_mutex);
1da177e4 55
1da177e4 56static inline void
02f014d8 57__ipq_enqueue_entry(struct nf_queue_entry *entry)
1da177e4 58{
0ac41e81 59 list_add_tail(&entry->list, &queue_list);
1da177e4
LT
60 queue_total++;
61}
62
1da177e4
LT
63static inline int
64__ipq_set_mode(unsigned char mode, unsigned int range)
65{
66 int status = 0;
1ab1457c 67
1da177e4
LT
68 switch(mode) {
69 case IPQ_COPY_NONE:
70 case IPQ_COPY_META:
71 copy_mode = mode;
72 copy_range = 0;
73 break;
1ab1457c 74
1da177e4
LT
75 case IPQ_COPY_PACKET:
76 copy_mode = mode;
77 copy_range = range;
78 if (copy_range > 0xFFFF)
79 copy_range = 0xFFFF;
80 break;
1ab1457c 81
1da177e4
LT
82 default:
83 status = -EINVAL;
84
85 }
86 return status;
87}
88
171b7fc4
PM
89static void __ipq_flush(ipq_cmpfn cmpfn, unsigned long data);
90
1da177e4
LT
91static inline void
92__ipq_reset(void)
93{
94 peer_pid = 0;
95 net_disable_timestamp();
96 __ipq_set_mode(IPQ_COPY_NONE, 0);
171b7fc4 97 __ipq_flush(NULL, 0);
1da177e4
LT
98}
99
02f014d8 100static struct nf_queue_entry *
171b7fc4 101ipq_find_dequeue_entry(unsigned long id)
1da177e4 102{
02f014d8 103 struct nf_queue_entry *entry = NULL, *i;
1ab1457c 104
1da177e4 105 write_lock_bh(&queue_lock);
171b7fc4
PM
106
107 list_for_each_entry(i, &queue_list, list) {
108 if ((unsigned long)i == id) {
109 entry = i;
110 break;
111 }
112 }
113
114 if (entry) {
115 list_del(&entry->list);
116 queue_total--;
117 }
118
1da177e4
LT
119 write_unlock_bh(&queue_lock);
120 return entry;
121}
122
123static void
171b7fc4
PM
124__ipq_flush(ipq_cmpfn cmpfn, unsigned long data)
125{
02f014d8 126 struct nf_queue_entry *entry, *next;
171b7fc4
PM
127
128 list_for_each_entry_safe(entry, next, &queue_list, list) {
129 if (!cmpfn || cmpfn(entry, data)) {
130 list_del(&entry->list);
131 queue_total--;
4b3d15ef 132 nf_reinject(entry, NF_DROP);
171b7fc4
PM
133 }
134 }
135}
136
137static void
138ipq_flush(ipq_cmpfn cmpfn, unsigned long data)
1da177e4
LT
139{
140 write_lock_bh(&queue_lock);
171b7fc4 141 __ipq_flush(cmpfn, data);
1da177e4
LT
142 write_unlock_bh(&queue_lock);
143}
144
145static struct sk_buff *
02f014d8 146ipq_build_packet_message(struct nf_queue_entry *entry, int *errp)
1da177e4 147{
27a884dc 148 sk_buff_data_t old_tail;
1da177e4
LT
149 size_t size = 0;
150 size_t data_len = 0;
151 struct sk_buff *skb;
152 struct ipq_packet_msg *pmsg;
153 struct nlmsghdr *nlh;
b7aa0bf7 154 struct timeval tv;
1da177e4
LT
155
156 read_lock_bh(&queue_lock);
1ab1457c 157
1da177e4
LT
158 switch (copy_mode) {
159 case IPQ_COPY_META:
160 case IPQ_COPY_NONE:
161 size = NLMSG_SPACE(sizeof(*pmsg));
162 data_len = 0;
163 break;
1ab1457c 164
1da177e4 165 case IPQ_COPY_PACKET:
84fa7933
PM
166 if ((entry->skb->ip_summed == CHECKSUM_PARTIAL ||
167 entry->skb->ip_summed == CHECKSUM_COMPLETE) &&
168 (*errp = skb_checksum_help(entry->skb))) {
66a79a19
PM
169 read_unlock_bh(&queue_lock);
170 return NULL;
171 }
1da177e4
LT
172 if (copy_range == 0 || copy_range > entry->skb->len)
173 data_len = entry->skb->len;
174 else
175 data_len = copy_range;
1ab1457c 176
1da177e4
LT
177 size = NLMSG_SPACE(sizeof(*pmsg) + data_len);
178 break;
1ab1457c 179
1da177e4
LT
180 default:
181 *errp = -EINVAL;
182 read_unlock_bh(&queue_lock);
183 return NULL;
184 }
185
186 read_unlock_bh(&queue_lock);
187
188 skb = alloc_skb(size, GFP_ATOMIC);
189 if (!skb)
190 goto nlmsg_failure;
1ab1457c 191
27a884dc 192 old_tail = skb->tail;
1da177e4
LT
193 nlh = NLMSG_PUT(skb, 0, 0, IPQM_PACKET, size - sizeof(*nlh));
194 pmsg = NLMSG_DATA(nlh);
195 memset(pmsg, 0, sizeof(*pmsg));
196
197 pmsg->packet_id = (unsigned long )entry;
198 pmsg->data_len = data_len;
b7aa0bf7
ED
199 tv = ktime_to_timeval(entry->skb->tstamp);
200 pmsg->timestamp_sec = tv.tv_sec;
201 pmsg->timestamp_usec = tv.tv_usec;
82e91ffe 202 pmsg->mark = entry->skb->mark;
02f014d8 203 pmsg->hook = entry->hook;
1da177e4 204 pmsg->hw_protocol = entry->skb->protocol;
1ab1457c 205
02f014d8
PM
206 if (entry->indev)
207 strcpy(pmsg->indev_name, entry->indev->name);
1da177e4
LT
208 else
209 pmsg->indev_name[0] = '\0';
1ab1457c 210
02f014d8
PM
211 if (entry->outdev)
212 strcpy(pmsg->outdev_name, entry->outdev->name);
1da177e4
LT
213 else
214 pmsg->outdev_name[0] = '\0';
1ab1457c 215
02f014d8 216 if (entry->indev && entry->skb->dev) {
1da177e4 217 pmsg->hw_type = entry->skb->dev->type;
b95cce35 218 pmsg->hw_addrlen = dev_parse_header(entry->skb, pmsg->hw_addr);
1da177e4 219 }
1ab1457c 220
1da177e4
LT
221 if (data_len)
222 if (skb_copy_bits(entry->skb, 0, pmsg->payload, data_len))
223 BUG();
1ab1457c 224
1da177e4
LT
225 nlh->nlmsg_len = skb->tail - old_tail;
226 return skb;
227
228nlmsg_failure:
229 if (skb)
230 kfree_skb(skb);
231 *errp = -EINVAL;
232 printk(KERN_ERR "ip6_queue: error creating packet message\n");
233 return NULL;
234}
235
236static int
02f014d8 237ipq_enqueue_packet(struct nf_queue_entry *entry, unsigned int queuenum)
1da177e4
LT
238{
239 int status = -EINVAL;
240 struct sk_buff *nskb;
1da177e4
LT
241
242 if (copy_mode == IPQ_COPY_NONE)
243 return -EAGAIN;
244
1da177e4
LT
245 nskb = ipq_build_packet_message(entry, &status);
246 if (nskb == NULL)
02f014d8 247 return status;
1ab1457c 248
1da177e4 249 write_lock_bh(&queue_lock);
1ab1457c 250
1da177e4 251 if (!peer_pid)
1ab1457c 252 goto err_out_free_nskb;
1da177e4
LT
253
254 if (queue_total >= queue_maxlen) {
1ab1457c 255 queue_dropped++;
1da177e4
LT
256 status = -ENOSPC;
257 if (net_ratelimit())
1ab1457c 258 printk (KERN_WARNING "ip6_queue: fill at %d entries, "
1da177e4
LT
259 "dropping packet(s). Dropped: %d\n", queue_total,
260 queue_dropped);
261 goto err_out_free_nskb;
262 }
263
1ab1457c 264 /* netlink_unicast will either free the nskb or attach it to a socket */
1da177e4
LT
265 status = netlink_unicast(ipqnl, nskb, peer_pid, MSG_DONTWAIT);
266 if (status < 0) {
1ab1457c 267 queue_user_dropped++;
1da177e4
LT
268 goto err_out_unlock;
269 }
1ab1457c 270
1da177e4
LT
271 __ipq_enqueue_entry(entry);
272
273 write_unlock_bh(&queue_lock);
274 return status;
1ab1457c 275
1da177e4 276err_out_free_nskb:
1ab1457c
YH
277 kfree_skb(nskb);
278
1da177e4
LT
279err_out_unlock:
280 write_unlock_bh(&queue_lock);
1da177e4
LT
281 return status;
282}
283
284static int
02f014d8 285ipq_mangle_ipv6(ipq_verdict_msg_t *v, struct nf_queue_entry *e)
1da177e4
LT
286{
287 int diff;
2ca7b0ac 288 int err;
1da177e4
LT
289 struct ipv6hdr *user_iph = (struct ipv6hdr *)v->payload;
290
291 if (v->data_len < sizeof(*user_iph))
292 return 0;
293 diff = v->data_len - e->skb->len;
d8a585d7
PM
294 if (diff < 0) {
295 if (pskb_trim(e->skb, v->data_len))
296 return -ENOMEM;
297 } else if (diff > 0) {
1da177e4
LT
298 if (v->data_len > 0xFFFF)
299 return -EINVAL;
300 if (diff > skb_tailroom(e->skb)) {
2ca7b0ac
HX
301 err = pskb_expand_head(e->skb, 0,
302 diff - skb_tailroom(e->skb),
303 GFP_ATOMIC);
304 if (err) {
1da177e4
LT
305 printk(KERN_WARNING "ip6_queue: OOM "
306 "in mangle, dropping packet\n");
2ca7b0ac 307 return err;
1da177e4 308 }
1da177e4
LT
309 }
310 skb_put(e->skb, diff);
311 }
37d41879 312 if (!skb_make_writable(e->skb, v->data_len))
1da177e4 313 return -ENOMEM;
27d7ff46 314 skb_copy_to_linear_data(e->skb, v->payload, v->data_len);
66a79a19 315 e->skb->ip_summed = CHECKSUM_NONE;
1da177e4 316
1da177e4
LT
317 return 0;
318}
319
1da177e4
LT
320static int
321ipq_set_verdict(struct ipq_verdict_msg *vmsg, unsigned int len)
322{
02f014d8 323 struct nf_queue_entry *entry;
1da177e4
LT
324
325 if (vmsg->value > NF_MAX_VERDICT)
326 return -EINVAL;
327
171b7fc4 328 entry = ipq_find_dequeue_entry(vmsg->id);
1da177e4
LT
329 if (entry == NULL)
330 return -ENOENT;
331 else {
332 int verdict = vmsg->value;
1ab1457c 333
1da177e4
LT
334 if (vmsg->data_len && vmsg->data_len == len)
335 if (ipq_mangle_ipv6(vmsg, entry) < 0)
336 verdict = NF_DROP;
1ab1457c 337
4b3d15ef 338 nf_reinject(entry, verdict);
1da177e4
LT
339 return 0;
340 }
341}
342
343static int
344ipq_set_mode(unsigned char mode, unsigned int range)
345{
346 int status;
347
348 write_lock_bh(&queue_lock);
349 status = __ipq_set_mode(mode, range);
350 write_unlock_bh(&queue_lock);
351 return status;
352}
353
354static int
355ipq_receive_peer(struct ipq_peer_msg *pmsg,
1ab1457c 356 unsigned char type, unsigned int len)
1da177e4
LT
357{
358 int status = 0;
359
360 if (len < sizeof(*pmsg))
361 return -EINVAL;
362
363 switch (type) {
364 case IPQM_MODE:
365 status = ipq_set_mode(pmsg->msg.mode.value,
1ab1457c 366 pmsg->msg.mode.range);
1da177e4 367 break;
1ab1457c 368
1da177e4
LT
369 case IPQM_VERDICT:
370 if (pmsg->msg.verdict.value > NF_MAX_VERDICT)
371 status = -EINVAL;
372 else
373 status = ipq_set_verdict(&pmsg->msg.verdict,
1ab1457c 374 len - sizeof(*pmsg));
1da177e4
LT
375 break;
376 default:
377 status = -EINVAL;
378 }
379 return status;
380}
381
382static int
02f014d8 383dev_cmp(struct nf_queue_entry *entry, unsigned long ifindex)
1da177e4 384{
02f014d8
PM
385 if (entry->indev)
386 if (entry->indev->ifindex == ifindex)
1da177e4 387 return 1;
1ab1457c 388
02f014d8
PM
389 if (entry->outdev)
390 if (entry->outdev->ifindex == ifindex)
1da177e4 391 return 1;
7a6c6653
PM
392#ifdef CONFIG_BRIDGE_NETFILTER
393 if (entry->skb->nf_bridge) {
394 if (entry->skb->nf_bridge->physindev &&
395 entry->skb->nf_bridge->physindev->ifindex == ifindex)
396 return 1;
397 if (entry->skb->nf_bridge->physoutdev &&
398 entry->skb->nf_bridge->physoutdev->ifindex == ifindex)
399 return 1;
400 }
401#endif
1da177e4
LT
402 return 0;
403}
404
405static void
406ipq_dev_drop(int ifindex)
407{
171b7fc4 408 ipq_flush(dev_cmp, ifindex);
1da177e4
LT
409}
410
411#define RCV_SKB_FAIL(err) do { netlink_ack(skb, nlh, (err)); return; } while (0)
412
413static inline void
cd40b7d3 414__ipq_rcv_skb(struct sk_buff *skb)
1da177e4
LT
415{
416 int status, type, pid, flags, nlmsglen, skblen;
417 struct nlmsghdr *nlh;
418
419 skblen = skb->len;
420 if (skblen < sizeof(*nlh))
421 return;
422
b529ccf2 423 nlh = nlmsg_hdr(skb);
1da177e4
LT
424 nlmsglen = nlh->nlmsg_len;
425 if (nlmsglen < sizeof(*nlh) || skblen < nlmsglen)
426 return;
427
428 pid = nlh->nlmsg_pid;
429 flags = nlh->nlmsg_flags;
1ab1457c 430
1da177e4
LT
431 if(pid <= 0 || !(flags & NLM_F_REQUEST) || flags & NLM_F_MULTI)
432 RCV_SKB_FAIL(-EINVAL);
1ab1457c 433
1da177e4
LT
434 if (flags & MSG_TRUNC)
435 RCV_SKB_FAIL(-ECOMM);
1ab1457c 436
1da177e4
LT
437 type = nlh->nlmsg_type;
438 if (type < NLMSG_NOOP || type >= IPQM_MAX)
439 RCV_SKB_FAIL(-EINVAL);
1ab1457c 440
1da177e4
LT
441 if (type <= IPQM_BASE)
442 return;
1ab1457c 443
c7bdb545 444 if (security_netlink_recv(skb, CAP_NET_ADMIN))
1ab1457c 445 RCV_SKB_FAIL(-EPERM);
1da177e4
LT
446
447 write_lock_bh(&queue_lock);
1ab1457c 448
1da177e4
LT
449 if (peer_pid) {
450 if (peer_pid != pid) {
451 write_unlock_bh(&queue_lock);
452 RCV_SKB_FAIL(-EBUSY);
453 }
454 } else {
455 net_enable_timestamp();
456 peer_pid = pid;
457 }
1ab1457c 458
1da177e4 459 write_unlock_bh(&queue_lock);
1ab1457c 460
1da177e4 461 status = ipq_receive_peer(NLMSG_DATA(nlh), type,
1ab1457c 462 nlmsglen - NLMSG_LENGTH(0));
1da177e4
LT
463 if (status < 0)
464 RCV_SKB_FAIL(status);
1ab1457c 465
1da177e4
LT
466 if (flags & NLM_F_ACK)
467 netlink_ack(skb, nlh, 0);
1ab1457c 468 return;
1da177e4
LT
469}
470
471static void
cd40b7d3 472ipq_rcv_skb(struct sk_buff *skb)
1da177e4 473{
4a3e2f71 474 mutex_lock(&ipqnl_mutex);
cd40b7d3 475 __ipq_rcv_skb(skb);
4a3e2f71 476 mutex_unlock(&ipqnl_mutex);
1da177e4
LT
477}
478
479static int
480ipq_rcv_dev_event(struct notifier_block *this,
1ab1457c 481 unsigned long event, void *ptr)
1da177e4
LT
482{
483 struct net_device *dev = ptr;
484
e9dc8653
EB
485 if (dev->nd_net != &init_net)
486 return NOTIFY_DONE;
487
1da177e4
LT
488 /* Drop any packets associated with the downed device */
489 if (event == NETDEV_DOWN)
490 ipq_dev_drop(dev->ifindex);
491 return NOTIFY_DONE;
492}
493
494static struct notifier_block ipq_dev_notifier = {
495 .notifier_call = ipq_rcv_dev_event,
496};
497
498static int
499ipq_rcv_nl_event(struct notifier_block *this,
1ab1457c 500 unsigned long event, void *ptr)
1da177e4
LT
501{
502 struct netlink_notify *n = ptr;
503
504 if (event == NETLINK_URELEASE &&
505 n->protocol == NETLINK_IP6_FW && n->pid) {
506 write_lock_bh(&queue_lock);
b4b51029 507 if ((n->net == &init_net) && (n->pid == peer_pid))
1da177e4
LT
508 __ipq_reset();
509 write_unlock_bh(&queue_lock);
510 }
511 return NOTIFY_DONE;
512}
513
514static struct notifier_block ipq_nl_notifier = {
515 .notifier_call = ipq_rcv_nl_event,
516};
517
518static struct ctl_table_header *ipq_sysctl_header;
519
520static ctl_table ipq_table[] = {
521 {
522 .ctl_name = NET_IPQ_QMAX,
523 .procname = NET_IPQ_QMAX_NAME,
524 .data = &queue_maxlen,
525 .maxlen = sizeof(queue_maxlen),
526 .mode = 0644,
527 .proc_handler = proc_dointvec
528 },
1ab1457c 529 { .ctl_name = 0 }
1da177e4
LT
530};
531
532static ctl_table ipq_dir_table[] = {
533 {
534 .ctl_name = NET_IPV6,
535 .procname = "ipv6",
536 .mode = 0555,
537 .child = ipq_table
538 },
539 { .ctl_name = 0 }
540};
541
542static ctl_table ipq_root_table[] = {
543 {
544 .ctl_name = CTL_NET,
545 .procname = "net",
546 .mode = 0555,
547 .child = ipq_dir_table
548 },
549 { .ctl_name = 0 }
550};
551
7351a22a 552static int ip6_queue_show(struct seq_file *m, void *v)
1da177e4 553{
1da177e4 554 read_lock_bh(&queue_lock);
1ab1457c 555
7351a22a 556 seq_printf(m,
1ab1457c
YH
557 "Peer PID : %d\n"
558 "Copy mode : %hu\n"
559 "Copy range : %u\n"
560 "Queue length : %u\n"
561 "Queue max. length : %u\n"
1da177e4
LT
562 "Queue dropped : %u\n"
563 "Netfilter dropped : %u\n",
1ab1457c
YH
564 peer_pid,
565 copy_mode,
566 copy_range,
567 queue_total,
568 queue_maxlen,
1da177e4
LT
569 queue_dropped,
570 queue_user_dropped);
571
572 read_unlock_bh(&queue_lock);
7351a22a
AD
573 return 0;
574}
1ab1457c 575
7351a22a
AD
576static int ip6_queue_open(struct inode *inode, struct file *file)
577{
578 return single_open(file, ip6_queue_show, NULL);
1da177e4 579}
7351a22a
AD
580
581static const struct file_operations ip6_queue_proc_fops = {
582 .open = ip6_queue_open,
583 .read = seq_read,
584 .llseek = seq_lseek,
585 .release = single_release,
586 .owner = THIS_MODULE,
587};
1da177e4 588
e3ac5298 589static const struct nf_queue_handler nfqh = {
bbd86b9f
HW
590 .name = "ip6_queue",
591 .outfn = &ipq_enqueue_packet,
592};
593
32292a7f 594static int __init ip6_queue_init(void)
1da177e4
LT
595{
596 int status = -ENOMEM;
597 struct proc_dir_entry *proc;
1ab1457c 598
1da177e4 599 netlink_register_notifier(&ipq_nl_notifier);
cd40b7d3
DL
600 ipqnl = netlink_kernel_create(&init_net, NETLINK_IP6_FW, 0,
601 ipq_rcv_skb, NULL, THIS_MODULE);
1da177e4
LT
602 if (ipqnl == NULL) {
603 printk(KERN_ERR "ip6_queue: failed to create netlink socket\n");
604 goto cleanup_netlink_notifier;
605 }
606
7351a22a
AD
607 proc = create_proc_entry(IPQ_PROC_FS_NAME, 0, init_net.proc_net);
608 if (proc) {
1da177e4 609 proc->owner = THIS_MODULE;
7351a22a
AD
610 proc->proc_fops = &ip6_queue_proc_fops;
611 } else {
1da177e4
LT
612 printk(KERN_ERR "ip6_queue: failed to create proc entry\n");
613 goto cleanup_ipqnl;
614 }
1ab1457c 615
1da177e4 616 register_netdevice_notifier(&ipq_dev_notifier);
0b4d4147 617 ipq_sysctl_header = register_sysctl_table(ipq_root_table);
1ab1457c 618
bbd86b9f 619 status = nf_register_queue_handler(PF_INET6, &nfqh);
1da177e4
LT
620 if (status < 0) {
621 printk(KERN_ERR "ip6_queue: failed to register queue handler\n");
622 goto cleanup_sysctl;
623 }
624 return status;
625
1da177e4
LT
626cleanup_sysctl:
627 unregister_sysctl_table(ipq_sysctl_header);
628 unregister_netdevice_notifier(&ipq_dev_notifier);
457c4cbc 629 proc_net_remove(&init_net, IPQ_PROC_FS_NAME);
1ab1457c 630
1da177e4
LT
631cleanup_ipqnl:
632 sock_release(ipqnl->sk_socket);
4a3e2f71
AV
633 mutex_lock(&ipqnl_mutex);
634 mutex_unlock(&ipqnl_mutex);
1ab1457c 635
1da177e4
LT
636cleanup_netlink_notifier:
637 netlink_unregister_notifier(&ipq_nl_notifier);
638 return status;
639}
640
65b4b4e8 641static void __exit ip6_queue_fini(void)
1da177e4 642{
32292a7f
PM
643 nf_unregister_queue_handlers(&nfqh);
644 synchronize_net();
171b7fc4 645 ipq_flush(NULL, 0);
32292a7f
PM
646
647 unregister_sysctl_table(ipq_sysctl_header);
648 unregister_netdevice_notifier(&ipq_dev_notifier);
457c4cbc 649 proc_net_remove(&init_net, IPQ_PROC_FS_NAME);
32292a7f
PM
650
651 sock_release(ipqnl->sk_socket);
652 mutex_lock(&ipqnl_mutex);
653 mutex_unlock(&ipqnl_mutex);
654
655 netlink_unregister_notifier(&ipq_nl_notifier);
1da177e4
LT
656}
657
658MODULE_DESCRIPTION("IPv6 packet queue handler");
659MODULE_LICENSE("GPL");
660
65b4b4e8
AM
661module_init(ip6_queue_init);
662module_exit(ip6_queue_fini);