static void __exit owner_mt_exit(void) { xt_unregister_match(&owner_mt_reg); }
void xtnu_unregister_match(struct xtnu_match *nt) { xt_unregister_match(nt->__compat_match); kfree(nt->__compat_match); }
static void __exit xt_rateest_mt_fini(void) { xt_unregister_match(&xt_rateest_mt_reg); }
static void __exit mac_mt_exit(void) { xt_unregister_match(&mac_mt_reg); }
static void __exit comment_mt_exit(void) { xt_unregister_match(&comment_mt_reg); }
static void __exit devgroup_mt_exit(void) { xt_unregister_match(&devgroup_mt_reg); }
static void __exit ipv6header_mt6_exit(void) { xt_unregister_match(&ipv6header_mt6_reg); }
static void __exit statistic_mt_exit(void) { xt_unregister_match(&xt_statistic_mt_reg); }
static void __exit mark_mt_exit(void) { xt_unregister_match(&mark_mt_reg); xt_unregister_target(&mark_tg_reg); }
static void __exit pkttype_mt_exit(void) { xt_unregister_match(&pkttype_mt_reg); }
static void __exit realm_mt_exit(void) { xt_unregister_match(&realm_mt_reg); }
static void __exit state_mt_exit(void) { xt_unregister_match(&state_mt_reg); }
static void __exit time_mt_exit(void) { xt_unregister_match(&xt_time_mt_reg); }
static void __exit ttl_mt_exit(void) { xt_unregister_match(&ttl_mt_reg); }
static void __exit helper_mt_exit(void) { xt_unregister_match(&helper_mt_reg); }
static void __exit rt_mt6_exit(void) { xt_unregister_match(&rt_mt6_reg); }
static void __exit ebt_pkttype_fini(void) { xt_unregister_match(&ebt_pkttype_mt_reg); }
static void __exit physdev_mt_exit(void) { xt_unregister_match(&physdev_mt_reg); }
static void __exit bpf_mt_exit(void) { xt_unregister_match(&bpf_mt_reg); }
static void __exit xt_realm_fini(void) { xt_unregister_match(&realm_match); }
static void __exit quota_mt_exit(void) { xt_unregister_match("a_mt_reg); }
static void __exit u32_mt_exit(void) { xt_unregister_match(&xt_u32_mt_reg); }
static bool rpfilter_lookup_reverse6(const struct sk_buff *skb, const struct net_device *dev, u8 flags) { struct rt6_info *rt; struct ipv6hdr *iph = ipv6_hdr(skb); bool ret = false; struct flowi6 fl6 = { .flowi6_iif = LOOPBACK_IFINDEX, .flowlabel = (* (__be32 *) iph) & IPV6_FLOWINFO_MASK, .flowi6_proto = iph->nexthdr, .daddr = iph->saddr, }; int lookup_flags; if (rpfilter_addr_unicast(&iph->daddr)) { memcpy(&fl6.saddr, &iph->daddr, sizeof(struct in6_addr)); lookup_flags = RT6_LOOKUP_F_HAS_SADDR; } else { lookup_flags = 0; } fl6.flowi6_mark = flags & XT_RPFILTER_VALID_MARK ? skb->mark : 0; if ((flags & XT_RPFILTER_LOOSE) == 0) { fl6.flowi6_oif = dev->ifindex; lookup_flags |= RT6_LOOKUP_F_IFACE; } rt = (void *) ip6_route_lookup(dev_net(dev), &fl6, lookup_flags); if (rt->dst.error) goto out; if (rt->rt6i_flags & (RTF_REJECT|RTF_ANYCAST)) goto out; if (rt->rt6i_flags & RTF_LOCAL) { ret = flags & XT_RPFILTER_ACCEPT_LOCAL; goto out; } if (rt->rt6i_idev->dev == dev || (flags & XT_RPFILTER_LOOSE)) ret = true; out: ip6_rt_put(rt); return ret; } static bool rpfilter_is_local(const struct sk_buff *skb) { const struct rt6_info *rt = (const void *) skb_dst(skb); return rt && (rt->rt6i_flags & RTF_LOCAL); } static bool rpfilter_mt(const struct sk_buff *skb, struct xt_action_param *par) { const struct xt_rpfilter_info *info = par->matchinfo; int saddrtype; struct ipv6hdr *iph; bool invert = info->flags & XT_RPFILTER_INVERT; if (rpfilter_is_local(skb)) return true ^ invert; iph = ipv6_hdr(skb); saddrtype = ipv6_addr_type(&iph->saddr); if (unlikely(saddrtype == IPV6_ADDR_ANY)) return true ^ invert; /* not routable: forward path will drop it */ return rpfilter_lookup_reverse6(skb, par->in, info->flags) ^ invert; } static int rpfilter_check(const struct xt_mtchk_param *par) { const struct xt_rpfilter_info *info = par->matchinfo; unsigned int options = ~XT_RPFILTER_OPTION_MASK; if (info->flags & options) { pr_info("unknown options encountered"); return -EINVAL; } if (strcmp(par->table, "mangle") != 0 && strcmp(par->table, "raw") != 0) { pr_info("match only valid in the \'raw\' " "or \'mangle\' tables, not \'%s\'.\n", par->table); return -EINVAL; } return 0; } static struct xt_match rpfilter_mt_reg __read_mostly = { .name = "rpfilter", .family = NFPROTO_IPV6, .checkentry = rpfilter_check, .match = rpfilter_mt, .matchsize = sizeof(struct xt_rpfilter_info), .hooks = (1 << NF_INET_PRE_ROUTING), .me = THIS_MODULE }; static int __init rpfilter_mt_init(void) { return xt_register_match(&rpfilter_mt_reg); } static void __exit rpfilter_mt_exit(void) { xt_unregister_match(&rpfilter_mt_reg); } module_init(rpfilter_mt_init); module_exit(rpfilter_mt_exit);
static void __exit fini(void) { xt_unregister_match(AF_INET, &state_match); xt_unregister_match(AF_INET6, &state6_match); }
static void __exit ebt_mark_m_fini(void) { xt_unregister_match(&ebt_mark_mt_reg); }
static void __exit ipt_iprange_fini(void) { xt_unregister_match(&iprange_match); }
static void __exit fini(void) { printk(KERN_INFO "exp fini\n"); xt_unregister_match(&exp_match); }
static void __exit frag_mt6_exit(void) { xt_unregister_match(&frag_mt6_reg); }
static void __exit ip6t_eui64_fini(void) { xt_unregister_match(&eui64_match); }
static void __exit xt_pkttype_fini(void) { xt_unregister_match(&pkttype_match); xt_unregister_match(&pkttype6_match); }