blob: 7df2ccb380d9bdf575e26fabb21c41cd30655c66 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * PF_INET6 socket protocol family
3 * Linux INET6 implementation
4 *
5 * Authors:
6 * Pedro Roque <roque@di.fc.ul.pt>
7 *
8 * Adapted from linux/net/ipv4/af_inet.c
9 *
10 * $Id: af_inet6.c,v 1.66 2002/02/01 22:01:04 davem Exp $
11 *
12 * Fixes:
13 * piggy, Karl Knutson : Socket protocol table
14 * Hideaki YOSHIFUJI : sin6_scope_id support
15 * Arnaldo Melo : check proc_net_create return, cleanups
16 *
17 * This program is free software; you can redistribute it and/or
18 * modify it under the terms of the GNU General Public License
19 * as published by the Free Software Foundation; either version
20 * 2 of the License, or (at your option) any later version.
21 */
22
23
24#include <linux/module.h>
25#include <linux/config.h>
26#include <linux/errno.h>
27#include <linux/types.h>
28#include <linux/socket.h>
29#include <linux/in.h>
30#include <linux/kernel.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070031#include <linux/sched.h>
32#include <linux/timer.h>
33#include <linux/string.h>
34#include <linux/sockios.h>
35#include <linux/net.h>
36#include <linux/fcntl.h>
37#include <linux/mm.h>
38#include <linux/interrupt.h>
39#include <linux/proc_fs.h>
40#include <linux/stat.h>
41#include <linux/init.h>
42
43#include <linux/inet.h>
44#include <linux/netdevice.h>
45#include <linux/icmpv6.h>
46#include <linux/smp_lock.h>
Harald Welte2cc7d572005-08-09 19:42:34 -070047#include <linux/netfilter_ipv6.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070048
49#include <net/ip.h>
50#include <net/ipv6.h>
51#include <net/udp.h>
52#include <net/tcp.h>
53#include <net/ipip.h>
54#include <net/protocol.h>
55#include <net/inet_common.h>
56#include <net/transp_v6.h>
57#include <net/ip6_route.h>
58#include <net/addrconf.h>
59#ifdef CONFIG_IPV6_TUNNEL
60#include <net/ip6_tunnel.h>
61#endif
62
63#include <asm/uaccess.h>
64#include <asm/system.h>
65
66MODULE_AUTHOR("Cast of dozens");
67MODULE_DESCRIPTION("IPv6 protocol stack for Linux");
68MODULE_LICENSE("GPL");
69
70/* IPv6 procfs goodies... */
71
72#ifdef CONFIG_PROC_FS
73extern int raw6_proc_init(void);
74extern void raw6_proc_exit(void);
75extern int tcp6_proc_init(void);
76extern void tcp6_proc_exit(void);
77extern int udp6_proc_init(void);
78extern void udp6_proc_exit(void);
79extern int ipv6_misc_proc_init(void);
80extern void ipv6_misc_proc_exit(void);
81extern int ac6_proc_init(void);
82extern void ac6_proc_exit(void);
83extern int if6_proc_init(void);
84extern void if6_proc_exit(void);
85#endif
86
87int sysctl_ipv6_bindv6only;
88
Linus Torvalds1da177e2005-04-16 15:20:36 -070089/* The inetsw table contains everything that inet_create needs to
90 * build a new socket.
91 */
92static struct list_head inetsw6[SOCK_MAX];
93static DEFINE_SPINLOCK(inetsw6_lock);
94
Linus Torvalds1da177e2005-04-16 15:20:36 -070095static __inline__ struct ipv6_pinfo *inet6_sk_generic(struct sock *sk)
96{
97 const int offset = sk->sk_prot->obj_size - sizeof(struct ipv6_pinfo);
98
99 return (struct ipv6_pinfo *)(((u8 *)sk) + offset);
100}
101
102static int inet6_create(struct socket *sock, int protocol)
103{
104 struct inet_sock *inet;
105 struct ipv6_pinfo *np;
106 struct sock *sk;
107 struct list_head *p;
108 struct inet_protosw *answer;
109 struct proto *answer_prot;
110 unsigned char answer_flags;
111 char answer_no_check;
112 int rc;
113
114 /* Look for the requested type/protocol pair. */
115 answer = NULL;
116 rcu_read_lock();
117 list_for_each_rcu(p, &inetsw6[sock->type]) {
118 answer = list_entry(p, struct inet_protosw, list);
119
120 /* Check the non-wild match. */
121 if (protocol == answer->protocol) {
122 if (protocol != IPPROTO_IP)
123 break;
124 } else {
125 /* Check for the two wild cases. */
126 if (IPPROTO_IP == protocol) {
127 protocol = answer->protocol;
128 break;
129 }
130 if (IPPROTO_IP == answer->protocol)
131 break;
132 }
133 answer = NULL;
134 }
135
136 rc = -ESOCKTNOSUPPORT;
137 if (!answer)
138 goto out_rcu_unlock;
139 rc = -EPERM;
140 if (answer->capability > 0 && !capable(answer->capability))
141 goto out_rcu_unlock;
142 rc = -EPROTONOSUPPORT;
143 if (!protocol)
144 goto out_rcu_unlock;
145
146 sock->ops = answer->ops;
147
148 answer_prot = answer->prot;
149 answer_no_check = answer->no_check;
150 answer_flags = answer->flags;
151 rcu_read_unlock();
152
153 BUG_TRAP(answer_prot->slab != NULL);
154
155 rc = -ENOBUFS;
156 sk = sk_alloc(PF_INET6, GFP_KERNEL, answer_prot, 1);
157 if (sk == NULL)
158 goto out;
159
160 sock_init_data(sock, sk);
161
162 rc = 0;
163 sk->sk_no_check = answer_no_check;
164 if (INET_PROTOSW_REUSE & answer_flags)
165 sk->sk_reuse = 1;
166
167 inet = inet_sk(sk);
168
169 if (SOCK_RAW == sock->type) {
170 inet->num = protocol;
171 if (IPPROTO_RAW == protocol)
172 inet->hdrincl = 1;
173 }
174
Arnaldo Carvalho de Meloe6848972005-08-09 19:45:38 -0700175 sk->sk_destruct = inet_sock_destruct;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700176 sk->sk_family = PF_INET6;
177 sk->sk_protocol = protocol;
178
179 sk->sk_backlog_rcv = answer->prot->backlog_rcv;
180
181 inet_sk(sk)->pinet6 = np = inet6_sk_generic(sk);
182 np->hop_limit = -1;
183 np->mcast_hops = -1;
184 np->mc_loop = 1;
185 np->pmtudisc = IPV6_PMTUDISC_WANT;
186 np->ipv6only = sysctl_ipv6_bindv6only;
187
188 /* Init the ipv4 part of the socket since we can have sockets
189 * using v6 API for ipv4.
190 */
191 inet->uc_ttl = -1;
192
193 inet->mc_loop = 1;
194 inet->mc_ttl = 1;
195 inet->mc_index = 0;
196 inet->mc_list = NULL;
197
198 if (ipv4_config.no_pmtu_disc)
199 inet->pmtudisc = IP_PMTUDISC_DONT;
200 else
201 inet->pmtudisc = IP_PMTUDISC_WANT;
Arnaldo Carvalho de Meloe6848972005-08-09 19:45:38 -0700202 /*
203 * Increment only the relevant sk_prot->socks debug field, this changes
204 * the previous behaviour of incrementing both the equivalent to
205 * answer->prot->socks (inet6_sock_nr) and inet_sock_nr.
206 *
207 * This allows better debug granularity as we'll know exactly how many
208 * UDPv6, TCPv6, etc socks were allocated, not the sum of all IPv6
209 * transport protocol socks. -acme
210 */
211 sk_refcnt_debug_inc(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700212
Linus Torvalds1da177e2005-04-16 15:20:36 -0700213 if (inet->num) {
214 /* It assumes that any protocol which allows
215 * the user to assign a number at socket
216 * creation time automatically shares.
217 */
218 inet->sport = ntohs(inet->num);
219 sk->sk_prot->hash(sk);
220 }
221 if (sk->sk_prot->init) {
222 rc = sk->sk_prot->init(sk);
223 if (rc) {
224 sk_common_release(sk);
225 goto out;
226 }
227 }
228out:
229 return rc;
230out_rcu_unlock:
231 rcu_read_unlock();
232 goto out;
233}
234
235
236/* bind for INET6 API */
237int inet6_bind(struct socket *sock, struct sockaddr *uaddr, int addr_len)
238{
239 struct sockaddr_in6 *addr=(struct sockaddr_in6 *)uaddr;
240 struct sock *sk = sock->sk;
241 struct inet_sock *inet = inet_sk(sk);
242 struct ipv6_pinfo *np = inet6_sk(sk);
243 __u32 v4addr = 0;
244 unsigned short snum;
245 int addr_type = 0;
246 int err = 0;
247
248 /* If the socket has its own bind function then use it. */
249 if (sk->sk_prot->bind)
250 return sk->sk_prot->bind(sk, uaddr, addr_len);
251
252 if (addr_len < SIN6_LEN_RFC2133)
253 return -EINVAL;
254 addr_type = ipv6_addr_type(&addr->sin6_addr);
255 if ((addr_type & IPV6_ADDR_MULTICAST) && sock->type == SOCK_STREAM)
256 return -EINVAL;
257
258 snum = ntohs(addr->sin6_port);
259 if (snum && snum < PROT_SOCK && !capable(CAP_NET_BIND_SERVICE))
260 return -EACCES;
261
262 lock_sock(sk);
263
264 /* Check these errors (active socket, double bind). */
265 if (sk->sk_state != TCP_CLOSE || inet->num) {
266 err = -EINVAL;
267 goto out;
268 }
269
270 /* Check if the address belongs to the host. */
271 if (addr_type == IPV6_ADDR_MAPPED) {
272 v4addr = addr->sin6_addr.s6_addr32[3];
273 if (inet_addr_type(v4addr) != RTN_LOCAL) {
274 err = -EADDRNOTAVAIL;
275 goto out;
276 }
277 } else {
278 if (addr_type != IPV6_ADDR_ANY) {
279 struct net_device *dev = NULL;
280
281 if (addr_type & IPV6_ADDR_LINKLOCAL) {
282 if (addr_len >= sizeof(struct sockaddr_in6) &&
283 addr->sin6_scope_id) {
284 /* Override any existing binding, if another one
285 * is supplied by user.
286 */
287 sk->sk_bound_dev_if = addr->sin6_scope_id;
288 }
289
290 /* Binding to link-local address requires an interface */
291 if (!sk->sk_bound_dev_if) {
292 err = -EINVAL;
293 goto out;
294 }
295 dev = dev_get_by_index(sk->sk_bound_dev_if);
296 if (!dev) {
297 err = -ENODEV;
298 goto out;
299 }
300 }
301
302 /* ipv4 addr of the socket is invalid. Only the
303 * unspecified and mapped address have a v4 equivalent.
304 */
305 v4addr = LOOPBACK4_IPV6;
306 if (!(addr_type & IPV6_ADDR_MULTICAST)) {
307 if (!ipv6_chk_addr(&addr->sin6_addr, dev, 0)) {
308 if (dev)
309 dev_put(dev);
310 err = -EADDRNOTAVAIL;
311 goto out;
312 }
313 }
314 if (dev)
315 dev_put(dev);
316 }
317 }
318
319 inet->rcv_saddr = v4addr;
320 inet->saddr = v4addr;
321
322 ipv6_addr_copy(&np->rcv_saddr, &addr->sin6_addr);
323
324 if (!(addr_type & IPV6_ADDR_MULTICAST))
325 ipv6_addr_copy(&np->saddr, &addr->sin6_addr);
326
327 /* Make sure we are allowed to bind here. */
328 if (sk->sk_prot->get_port(sk, snum)) {
329 inet_reset_saddr(sk);
330 err = -EADDRINUSE;
331 goto out;
332 }
333
334 if (addr_type != IPV6_ADDR_ANY)
335 sk->sk_userlocks |= SOCK_BINDADDR_LOCK;
336 if (snum)
337 sk->sk_userlocks |= SOCK_BINDPORT_LOCK;
338 inet->sport = ntohs(inet->num);
339 inet->dport = 0;
340 inet->daddr = 0;
341out:
342 release_sock(sk);
343 return err;
344}
345
346int inet6_release(struct socket *sock)
347{
348 struct sock *sk = sock->sk;
349
350 if (sk == NULL)
351 return -EINVAL;
352
353 /* Free mc lists */
354 ipv6_sock_mc_close(sk);
355
356 /* Free ac lists */
357 ipv6_sock_ac_close(sk);
358
359 return inet_release(sock);
360}
361
362int inet6_destroy_sock(struct sock *sk)
363{
364 struct ipv6_pinfo *np = inet6_sk(sk);
365 struct sk_buff *skb;
366 struct ipv6_txoptions *opt;
367
368 /*
369 * Release destination entry
370 */
371
372 sk_dst_reset(sk);
373
374 /* Release rx options */
375
376 if ((skb = xchg(&np->pktoptions, NULL)) != NULL)
377 kfree_skb(skb);
378
379 /* Free flowlabels */
380 fl6_free_socklist(sk);
381
382 /* Free tx options */
383
384 if ((opt = xchg(&np->opt, NULL)) != NULL)
385 sock_kfree_s(sk, opt, opt->tot_len);
386
387 return 0;
388}
389
390/*
391 * This does both peername and sockname.
392 */
393
394int inet6_getname(struct socket *sock, struct sockaddr *uaddr,
395 int *uaddr_len, int peer)
396{
397 struct sockaddr_in6 *sin=(struct sockaddr_in6 *)uaddr;
398 struct sock *sk = sock->sk;
399 struct inet_sock *inet = inet_sk(sk);
400 struct ipv6_pinfo *np = inet6_sk(sk);
401
402 sin->sin6_family = AF_INET6;
403 sin->sin6_flowinfo = 0;
404 sin->sin6_scope_id = 0;
405 if (peer) {
406 if (!inet->dport)
407 return -ENOTCONN;
408 if (((1 << sk->sk_state) & (TCPF_CLOSE | TCPF_SYN_SENT)) &&
409 peer == 1)
410 return -ENOTCONN;
411 sin->sin6_port = inet->dport;
412 ipv6_addr_copy(&sin->sin6_addr, &np->daddr);
413 if (np->sndflow)
414 sin->sin6_flowinfo = np->flow_label;
415 } else {
416 if (ipv6_addr_any(&np->rcv_saddr))
417 ipv6_addr_copy(&sin->sin6_addr, &np->saddr);
418 else
419 ipv6_addr_copy(&sin->sin6_addr, &np->rcv_saddr);
420
421 sin->sin6_port = inet->sport;
422 }
423 if (ipv6_addr_type(&sin->sin6_addr) & IPV6_ADDR_LINKLOCAL)
424 sin->sin6_scope_id = sk->sk_bound_dev_if;
425 *uaddr_len = sizeof(*sin);
426 return(0);
427}
428
429int inet6_ioctl(struct socket *sock, unsigned int cmd, unsigned long arg)
430{
431 struct sock *sk = sock->sk;
432 int err = -EINVAL;
433
434 switch(cmd)
435 {
436 case SIOCGSTAMP:
437 return sock_get_timestamp(sk, (struct timeval __user *)arg);
438
439 case SIOCADDRT:
440 case SIOCDELRT:
441
442 return(ipv6_route_ioctl(cmd,(void __user *)arg));
443
444 case SIOCSIFADDR:
445 return addrconf_add_ifaddr((void __user *) arg);
446 case SIOCDIFADDR:
447 return addrconf_del_ifaddr((void __user *) arg);
448 case SIOCSIFDSTADDR:
449 return addrconf_set_dstaddr((void __user *) arg);
450 default:
451 if (!sk->sk_prot->ioctl ||
452 (err = sk->sk_prot->ioctl(sk, cmd, arg)) == -ENOIOCTLCMD)
453 return(dev_ioctl(cmd,(void __user *) arg));
454 return err;
455 }
456 /*NOTREACHED*/
457 return(0);
458}
459
460struct proto_ops inet6_stream_ops = {
461 .family = PF_INET6,
462 .owner = THIS_MODULE,
463 .release = inet6_release,
464 .bind = inet6_bind,
465 .connect = inet_stream_connect, /* ok */
466 .socketpair = sock_no_socketpair, /* a do nothing */
467 .accept = inet_accept, /* ok */
468 .getname = inet6_getname,
469 .poll = tcp_poll, /* ok */
470 .ioctl = inet6_ioctl, /* must change */
471 .listen = inet_listen, /* ok */
472 .shutdown = inet_shutdown, /* ok */
473 .setsockopt = sock_common_setsockopt, /* ok */
474 .getsockopt = sock_common_getsockopt, /* ok */
475 .sendmsg = inet_sendmsg, /* ok */
476 .recvmsg = sock_common_recvmsg, /* ok */
477 .mmap = sock_no_mmap,
478 .sendpage = tcp_sendpage
479};
480
481struct proto_ops inet6_dgram_ops = {
482 .family = PF_INET6,
483 .owner = THIS_MODULE,
484 .release = inet6_release,
485 .bind = inet6_bind,
486 .connect = inet_dgram_connect, /* ok */
487 .socketpair = sock_no_socketpair, /* a do nothing */
488 .accept = sock_no_accept, /* a do nothing */
489 .getname = inet6_getname,
490 .poll = udp_poll, /* ok */
491 .ioctl = inet6_ioctl, /* must change */
492 .listen = sock_no_listen, /* ok */
493 .shutdown = inet_shutdown, /* ok */
494 .setsockopt = sock_common_setsockopt, /* ok */
495 .getsockopt = sock_common_getsockopt, /* ok */
496 .sendmsg = inet_sendmsg, /* ok */
497 .recvmsg = sock_common_recvmsg, /* ok */
498 .mmap = sock_no_mmap,
499 .sendpage = sock_no_sendpage,
500};
501
502static struct net_proto_family inet6_family_ops = {
503 .family = PF_INET6,
504 .create = inet6_create,
505 .owner = THIS_MODULE,
506};
507
508#ifdef CONFIG_SYSCTL
509extern void ipv6_sysctl_register(void);
510extern void ipv6_sysctl_unregister(void);
511#endif
512
513/* Same as inet6_dgram_ops, sans udp_poll. */
514static struct proto_ops inet6_sockraw_ops = {
515 .family = PF_INET6,
516 .owner = THIS_MODULE,
517 .release = inet6_release,
518 .bind = inet6_bind,
519 .connect = inet_dgram_connect, /* ok */
520 .socketpair = sock_no_socketpair, /* a do nothing */
521 .accept = sock_no_accept, /* a do nothing */
522 .getname = inet6_getname,
523 .poll = datagram_poll, /* ok */
524 .ioctl = inet6_ioctl, /* must change */
525 .listen = sock_no_listen, /* ok */
526 .shutdown = inet_shutdown, /* ok */
527 .setsockopt = sock_common_setsockopt, /* ok */
528 .getsockopt = sock_common_getsockopt, /* ok */
529 .sendmsg = inet_sendmsg, /* ok */
530 .recvmsg = sock_common_recvmsg, /* ok */
531 .mmap = sock_no_mmap,
532 .sendpage = sock_no_sendpage,
533};
534
535static struct inet_protosw rawv6_protosw = {
536 .type = SOCK_RAW,
537 .protocol = IPPROTO_IP, /* wild card */
538 .prot = &rawv6_prot,
539 .ops = &inet6_sockraw_ops,
540 .capability = CAP_NET_RAW,
541 .no_check = UDP_CSUM_DEFAULT,
542 .flags = INET_PROTOSW_REUSE,
543};
544
545void
546inet6_register_protosw(struct inet_protosw *p)
547{
548 struct list_head *lh;
549 struct inet_protosw *answer;
550 int protocol = p->protocol;
551 struct list_head *last_perm;
552
553 spin_lock_bh(&inetsw6_lock);
554
555 if (p->type >= SOCK_MAX)
556 goto out_illegal;
557
558 /* If we are trying to override a permanent protocol, bail. */
559 answer = NULL;
560 last_perm = &inetsw6[p->type];
561 list_for_each(lh, &inetsw6[p->type]) {
562 answer = list_entry(lh, struct inet_protosw, list);
563
564 /* Check only the non-wild match. */
565 if (INET_PROTOSW_PERMANENT & answer->flags) {
566 if (protocol == answer->protocol)
567 break;
568 last_perm = lh;
569 }
570
571 answer = NULL;
572 }
573 if (answer)
574 goto out_permanent;
575
576 /* Add the new entry after the last permanent entry if any, so that
577 * the new entry does not override a permanent entry when matched with
578 * a wild-card protocol. But it is allowed to override any existing
579 * non-permanent entry. This means that when we remove this entry, the
580 * system automatically returns to the old behavior.
581 */
582 list_add_rcu(&p->list, last_perm);
583out:
584 spin_unlock_bh(&inetsw6_lock);
585 return;
586
587out_permanent:
588 printk(KERN_ERR "Attempt to override permanent protocol %d.\n",
589 protocol);
590 goto out;
591
592out_illegal:
593 printk(KERN_ERR
594 "Ignoring attempt to register invalid socket type %d.\n",
595 p->type);
596 goto out;
597}
598
599void
600inet6_unregister_protosw(struct inet_protosw *p)
601{
602 if (INET_PROTOSW_PERMANENT & p->flags) {
603 printk(KERN_ERR
604 "Attempt to unregister permanent protocol %d.\n",
605 p->protocol);
606 } else {
607 spin_lock_bh(&inetsw6_lock);
608 list_del_rcu(&p->list);
609 spin_unlock_bh(&inetsw6_lock);
610
611 synchronize_net();
612 }
613}
614
615int
616snmp6_mib_init(void *ptr[2], size_t mibsize, size_t mibalign)
617{
618 if (ptr == NULL)
619 return -EINVAL;
620
621 ptr[0] = __alloc_percpu(mibsize, mibalign);
622 if (!ptr[0])
623 goto err0;
624
625 ptr[1] = __alloc_percpu(mibsize, mibalign);
626 if (!ptr[1])
627 goto err1;
628
629 return 0;
630
631err1:
632 free_percpu(ptr[0]);
633 ptr[0] = NULL;
634err0:
635 return -ENOMEM;
636}
637
638void
639snmp6_mib_free(void *ptr[2])
640{
641 if (ptr == NULL)
642 return;
643 if (ptr[0])
644 free_percpu(ptr[0]);
645 if (ptr[1])
646 free_percpu(ptr[1]);
647 ptr[0] = ptr[1] = NULL;
648}
649
650static int __init init_ipv6_mibs(void)
651{
652 if (snmp6_mib_init((void **)ipv6_statistics, sizeof (struct ipstats_mib),
653 __alignof__(struct ipstats_mib)) < 0)
654 goto err_ip_mib;
655 if (snmp6_mib_init((void **)icmpv6_statistics, sizeof (struct icmpv6_mib),
656 __alignof__(struct icmpv6_mib)) < 0)
657 goto err_icmp_mib;
658 if (snmp6_mib_init((void **)udp_stats_in6, sizeof (struct udp_mib),
659 __alignof__(struct udp_mib)) < 0)
660 goto err_udp_mib;
661 return 0;
662
663err_udp_mib:
664 snmp6_mib_free((void **)icmpv6_statistics);
665err_icmp_mib:
666 snmp6_mib_free((void **)ipv6_statistics);
667err_ip_mib:
668 return -ENOMEM;
669
670}
671
672static void cleanup_ipv6_mibs(void)
673{
674 snmp6_mib_free((void **)ipv6_statistics);
675 snmp6_mib_free((void **)icmpv6_statistics);
676 snmp6_mib_free((void **)udp_stats_in6);
677}
678
679extern int ipv6_misc_proc_init(void);
680
681static int __init inet6_init(void)
682{
683 struct sk_buff *dummy_skb;
684 struct list_head *r;
685 int err;
686
687#ifdef MODULE
688#if 0 /* FIXME --RR */
689 if (!mod_member_present(&__this_module, can_unload))
690 return -EINVAL;
691
692 __this_module.can_unload = &ipv6_unload;
693#endif
694#endif
695
696 if (sizeof(struct inet6_skb_parm) > sizeof(dummy_skb->cb)) {
697 printk(KERN_CRIT "inet6_proto_init: size fault\n");
698 return -EINVAL;
699 }
700
701 err = proto_register(&tcpv6_prot, 1);
702 if (err)
703 goto out;
704
705 err = proto_register(&udpv6_prot, 1);
706 if (err)
707 goto out_unregister_tcp_proto;
708
709 err = proto_register(&rawv6_prot, 1);
710 if (err)
711 goto out_unregister_udp_proto;
712
713
714 /* Register the socket-side information for inet6_create. */
715 for(r = &inetsw6[0]; r < &inetsw6[SOCK_MAX]; ++r)
716 INIT_LIST_HEAD(r);
717
718 /* We MUST register RAW sockets before we create the ICMP6,
719 * IGMP6, or NDISC control sockets.
720 */
721 inet6_register_protosw(&rawv6_protosw);
722
723 /* Register the family here so that the init calls below will
724 * be able to create sockets. (?? is this dangerous ??)
725 */
726 (void) sock_register(&inet6_family_ops);
727
728 /* Initialise ipv6 mibs */
729 err = init_ipv6_mibs();
730 if (err)
731 goto out_unregister_raw_proto;
732
733 /*
734 * ipngwg API draft makes clear that the correct semantics
735 * for TCP and UDP is to consider one TCP and UDP instance
736 * in a host availiable by both INET and INET6 APIs and
737 * able to communicate via both network protocols.
738 */
739
740#ifdef CONFIG_SYSCTL
741 ipv6_sysctl_register();
742#endif
743 err = icmpv6_init(&inet6_family_ops);
744 if (err)
745 goto icmp_fail;
746 err = ndisc_init(&inet6_family_ops);
747 if (err)
748 goto ndisc_fail;
749 err = igmp6_init(&inet6_family_ops);
750 if (err)
751 goto igmp_fail;
Harald Welte2cc7d572005-08-09 19:42:34 -0700752 err = ipv6_netfilter_init();
753 if (err)
754 goto netfilter_fail;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700755 /* Create /proc/foo6 entries. */
756#ifdef CONFIG_PROC_FS
757 err = -ENOMEM;
758 if (raw6_proc_init())
759 goto proc_raw6_fail;
760 if (tcp6_proc_init())
761 goto proc_tcp6_fail;
762 if (udp6_proc_init())
763 goto proc_udp6_fail;
764 if (ipv6_misc_proc_init())
765 goto proc_misc6_fail;
766
767 if (ac6_proc_init())
768 goto proc_anycast6_fail;
769 if (if6_proc_init())
770 goto proc_if6_fail;
771#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700772 ip6_route_init();
773 ip6_flowlabel_init();
774 err = addrconf_init();
775 if (err)
776 goto addrconf_fail;
777 sit_init();
778
779 /* Init v6 extension headers. */
780 ipv6_rthdr_init();
781 ipv6_frag_init();
782 ipv6_nodata_init();
783 ipv6_destopt_init();
784
785 /* Init v6 transport protocols. */
786 udpv6_init();
787 tcpv6_init();
Herbert Xue2ed4052005-07-05 14:41:20 -0700788
789 ipv6_packet_init();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700790 err = 0;
791out:
792 return err;
793
794addrconf_fail:
795 ip6_flowlabel_cleanup();
796 ip6_route_cleanup();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700797#ifdef CONFIG_PROC_FS
798 if6_proc_exit();
799proc_if6_fail:
800 ac6_proc_exit();
801proc_anycast6_fail:
802 ipv6_misc_proc_exit();
803proc_misc6_fail:
804 udp6_proc_exit();
805proc_udp6_fail:
806 tcp6_proc_exit();
807proc_tcp6_fail:
808 raw6_proc_exit();
809proc_raw6_fail:
810#endif
Harald Welte2cc7d572005-08-09 19:42:34 -0700811 ipv6_netfilter_fini();
812netfilter_fail:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700813 igmp6_cleanup();
814igmp_fail:
815 ndisc_cleanup();
816ndisc_fail:
817 icmpv6_cleanup();
818icmp_fail:
819#ifdef CONFIG_SYSCTL
820 ipv6_sysctl_unregister();
821#endif
822 cleanup_ipv6_mibs();
823out_unregister_raw_proto:
824 proto_unregister(&rawv6_prot);
825out_unregister_udp_proto:
826 proto_unregister(&udpv6_prot);
827out_unregister_tcp_proto:
828 proto_unregister(&tcpv6_prot);
829 goto out;
830}
831module_init(inet6_init);
832
833static void __exit inet6_exit(void)
834{
835 /* First of all disallow new sockets creation. */
836 sock_unregister(PF_INET6);
837#ifdef CONFIG_PROC_FS
838 if6_proc_exit();
839 ac6_proc_exit();
840 ipv6_misc_proc_exit();
841 udp6_proc_exit();
842 tcp6_proc_exit();
843 raw6_proc_exit();
844#endif
845 /* Cleanup code parts. */
846 sit_cleanup();
847 ip6_flowlabel_cleanup();
848 addrconf_cleanup();
849 ip6_route_cleanup();
850 ipv6_packet_cleanup();
851 igmp6_cleanup();
Harald Welte2cc7d572005-08-09 19:42:34 -0700852 ipv6_netfilter_fini();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700853 ndisc_cleanup();
854 icmpv6_cleanup();
855#ifdef CONFIG_SYSCTL
856 ipv6_sysctl_unregister();
857#endif
858 cleanup_ipv6_mibs();
859 proto_unregister(&rawv6_prot);
860 proto_unregister(&udpv6_prot);
861 proto_unregister(&tcpv6_prot);
862}
863module_exit(inet6_exit);
864
865MODULE_ALIAS_NETPROTO(PF_INET6);