media: rockchip/rga: constify video_device structure
[linux-2.6-block.git] / net / ipv6 / addrlabel.c
CommitLineData
b2441318 1// SPDX-License-Identifier: GPL-2.0
2a8cc6c8
YH
2/*
3 * IPv6 Address Label subsystem
4 * for the IPv6 "Default" Source Address Selection
5 *
6 * Copyright (C)2007 USAGI/WIDE Project
7 */
8/*
9 * Author:
1c8669e0 10 * YOSHIFUJI Hideaki @ USAGI/WIDE Project <yoshfuji@linux-ipv6.org>
2a8cc6c8
YH
11 */
12
13#include <linux/kernel.h>
14#include <linux/list.h>
15#include <linux/rcupdate.h>
16#include <linux/in6.h>
5a0e3ad6 17#include <linux/slab.h>
2a8cc6c8
YH
18#include <net/addrconf.h>
19#include <linux/if_addrlabel.h>
20#include <linux/netlink.h>
21#include <linux/rtnetlink.h>
22
23#if 0
24#define ADDRLABEL(x...) printk(x)
25#else
1c8669e0 26#define ADDRLABEL(x...) do { ; } while (0)
2a8cc6c8
YH
27#endif
28
29/*
30 * Policy Table
31 */
22b285d6 32struct ip6addrlbl_entry {
2a8cc6c8
YH
33 struct in6_addr prefix;
34 int prefixlen;
35 int ifindex;
36 int addrtype;
37 u32 label;
38 struct hlist_node list;
2a8cc6c8
YH
39 struct rcu_head rcu;
40};
41
2a8cc6c8 42/*
417962a0 43 * Default policy table (RFC6724 + extensions)
2a8cc6c8
YH
44 *
45 * prefix addr_type label
46 * -------------------------------------------------------------------------
47 * ::1/128 LOOPBACK 0
48 * ::/0 N/A 1
49 * 2002::/16 N/A 2
50 * ::/96 COMPATv4 3
51 * ::ffff:0:0/96 V4MAPPED 4
52 * fc00::/7 N/A 5 ULA (RFC 4193)
53 * 2001::/32 N/A 6 Teredo (RFC 4380)
5fe47b8a 54 * 2001:10::/28 N/A 7 ORCHID (RFC 4843)
417962a0
YH
55 * fec0::/10 N/A 11 Site-local
56 * (deprecated by RFC3879)
57 * 3ffe::/16 N/A 12 6bone
2a8cc6c8
YH
58 *
59 * Note: 0xffffffff is used if we do not have any policies.
417962a0 60 * Note: Labels for ULA and 6to4 are different from labels listed in RFC6724.
2a8cc6c8
YH
61 */
62
63#define IPV6_ADDR_LABEL_DEFAULT 0xffffffffUL
64
04a6f82c 65static const __net_initconst struct ip6addrlbl_init_table
2a8cc6c8
YH
66{
67 const struct in6_addr *prefix;
68 int prefixlen;
69 u32 label;
70} ip6addrlbl_init_table[] = {
71 { /* ::/0 */
72 .prefix = &in6addr_any,
73 .label = 1,
1c8669e0
WY
74 }, { /* fc00::/7 */
75 .prefix = &(struct in6_addr){ { { 0xfc } } } ,
2a8cc6c8
YH
76 .prefixlen = 7,
77 .label = 5,
1c8669e0
WY
78 }, { /* fec0::/10 */
79 .prefix = &(struct in6_addr){ { { 0xfe, 0xc0 } } },
417962a0
YH
80 .prefixlen = 10,
81 .label = 11,
1c8669e0
WY
82 }, { /* 2002::/16 */
83 .prefix = &(struct in6_addr){ { { 0x20, 0x02 } } },
2a8cc6c8
YH
84 .prefixlen = 16,
85 .label = 2,
1c8669e0
WY
86 }, { /* 3ffe::/16 */
87 .prefix = &(struct in6_addr){ { { 0x3f, 0xfe } } },
417962a0
YH
88 .prefixlen = 16,
89 .label = 12,
1c8669e0
WY
90 }, { /* 2001::/32 */
91 .prefix = &(struct in6_addr){ { { 0x20, 0x01 } } },
2a8cc6c8
YH
92 .prefixlen = 32,
93 .label = 6,
1c8669e0
WY
94 }, { /* 2001:10::/28 */
95 .prefix = &(struct in6_addr){ { { 0x20, 0x01, 0x00, 0x10 } } },
5fe47b8a
JMT
96 .prefixlen = 28,
97 .label = 7,
1c8669e0
WY
98 }, { /* ::ffff:0:0 */
99 .prefix = &(struct in6_addr){ { { [10] = 0xff, [11] = 0xff } } },
2a8cc6c8
YH
100 .prefixlen = 96,
101 .label = 4,
1c8669e0 102 }, { /* ::/96 */
2a8cc6c8
YH
103 .prefix = &in6addr_any,
104 .prefixlen = 96,
105 .label = 3,
1c8669e0 106 }, { /* ::1/128 */
2a8cc6c8
YH
107 .prefix = &in6addr_loopback,
108 .prefixlen = 128,
109 .label = 0,
110 }
111};
112
2a8cc6c8 113/* Find label */
a90c9347 114static bool __ip6addrlbl_match(const struct ip6addrlbl_entry *p,
a50feda5
ED
115 const struct in6_addr *addr,
116 int addrtype, int ifindex)
2a8cc6c8
YH
117{
118 if (p->ifindex && p->ifindex != ifindex)
a50feda5 119 return false;
2a8cc6c8 120 if (p->addrtype && p->addrtype != addrtype)
a50feda5 121 return false;
2a8cc6c8 122 if (!ipv6_prefix_equal(addr, &p->prefix, p->prefixlen))
a50feda5
ED
123 return false;
124 return true;
2a8cc6c8
YH
125}
126
3de23255
BT
127static struct ip6addrlbl_entry *__ipv6_addr_label(struct net *net,
128 const struct in6_addr *addr,
2a8cc6c8
YH
129 int type, int ifindex)
130{
2a8cc6c8 131 struct ip6addrlbl_entry *p;
a90c9347
ED
132
133 hlist_for_each_entry_rcu(p, &net->ipv6.ip6addrlbl_table.head, list) {
134 if (__ip6addrlbl_match(p, addr, type, ifindex))
2a8cc6c8
YH
135 return p;
136 }
137 return NULL;
138}
139
3de23255
BT
140u32 ipv6_addr_label(struct net *net,
141 const struct in6_addr *addr, int type, int ifindex)
2a8cc6c8
YH
142{
143 u32 label;
144 struct ip6addrlbl_entry *p;
145
146 type &= IPV6_ADDR_MAPPED | IPV6_ADDR_COMPATv4 | IPV6_ADDR_LOOPBACK;
147
148 rcu_read_lock();
3de23255 149 p = __ipv6_addr_label(net, addr, type, ifindex);
2a8cc6c8
YH
150 label = p ? p->label : IPV6_ADDR_LABEL_DEFAULT;
151 rcu_read_unlock();
152
5b095d98 153 ADDRLABEL(KERN_DEBUG "%s(addr=%pI6, type=%d, ifindex=%d) => %08x\n",
0c6ce78a 154 __func__, addr, type, ifindex, label);
2a8cc6c8
YH
155
156 return label;
157}
158
159/* allocate one entry */
a90c9347 160static struct ip6addrlbl_entry *ip6addrlbl_alloc(const struct in6_addr *prefix,
40fee36e
YH
161 int prefixlen, int ifindex,
162 u32 label)
2a8cc6c8
YH
163{
164 struct ip6addrlbl_entry *newp;
165 int addrtype;
166
5b095d98 167 ADDRLABEL(KERN_DEBUG "%s(prefix=%pI6, prefixlen=%d, ifindex=%d, label=%u)\n",
0c6ce78a 168 __func__, prefix, prefixlen, ifindex, (unsigned int)label);
2a8cc6c8
YH
169
170 addrtype = ipv6_addr_type(prefix) & (IPV6_ADDR_MAPPED | IPV6_ADDR_COMPATv4 | IPV6_ADDR_LOOPBACK);
171
172 switch (addrtype) {
173 case IPV6_ADDR_MAPPED:
174 if (prefixlen > 96)
175 return ERR_PTR(-EINVAL);
176 if (prefixlen < 96)
177 addrtype = 0;
178 break;
179 case IPV6_ADDR_COMPATv4:
180 if (prefixlen != 96)
181 addrtype = 0;
182 break;
183 case IPV6_ADDR_LOOPBACK:
184 if (prefixlen != 128)
185 addrtype = 0;
186 break;
187 }
188
189 newp = kmalloc(sizeof(*newp), GFP_KERNEL);
190 if (!newp)
191 return ERR_PTR(-ENOMEM);
192
193 ipv6_addr_prefix(&newp->prefix, prefix, prefixlen);
194 newp->prefixlen = prefixlen;
195 newp->ifindex = ifindex;
196 newp->addrtype = addrtype;
197 newp->label = label;
198 INIT_HLIST_NODE(&newp->list);
2a8cc6c8
YH
199 return newp;
200}
201
202/* add a label */
a90c9347
ED
203static int __ip6addrlbl_add(struct net *net, struct ip6addrlbl_entry *newp,
204 int replace)
2a8cc6c8 205{
639739b5 206 struct ip6addrlbl_entry *last = NULL, *p = NULL;
a90c9347 207 struct hlist_node *n;
2a8cc6c8
YH
208 int ret = 0;
209
639739b5
HFS
210 ADDRLABEL(KERN_DEBUG "%s(newp=%p, replace=%d)\n", __func__, newp,
211 replace);
2a8cc6c8 212
a90c9347 213 hlist_for_each_entry_safe(p, n, &net->ipv6.ip6addrlbl_table.head, list) {
639739b5 214 if (p->prefixlen == newp->prefixlen &&
639739b5
HFS
215 p->ifindex == newp->ifindex &&
216 ipv6_addr_equal(&p->prefix, &newp->prefix)) {
217 if (!replace) {
218 ret = -EEXIST;
2a8cc6c8
YH
219 goto out;
220 }
639739b5 221 hlist_replace_rcu(&p->list, &newp->list);
2809c095 222 kfree_rcu(p, rcu);
639739b5
HFS
223 goto out;
224 } else if ((p->prefixlen == newp->prefixlen && !p->ifindex) ||
225 (p->prefixlen < newp->prefixlen)) {
226 hlist_add_before_rcu(&newp->list, &p->list);
227 goto out;
2a8cc6c8 228 }
639739b5 229 last = p;
2a8cc6c8 230 }
639739b5 231 if (last)
1d023284 232 hlist_add_behind_rcu(&newp->list, &last->list);
639739b5 233 else
a90c9347 234 hlist_add_head_rcu(&newp->list, &net->ipv6.ip6addrlbl_table.head);
2a8cc6c8
YH
235out:
236 if (!ret)
a90c9347 237 net->ipv6.ip6addrlbl_table.seq++;
2a8cc6c8
YH
238 return ret;
239}
240
241/* add a label */
3de23255
BT
242static int ip6addrlbl_add(struct net *net,
243 const struct in6_addr *prefix, int prefixlen,
40fee36e 244 int ifindex, u32 label, int replace)
2a8cc6c8
YH
245{
246 struct ip6addrlbl_entry *newp;
247 int ret = 0;
248
5b095d98 249 ADDRLABEL(KERN_DEBUG "%s(prefix=%pI6, prefixlen=%d, ifindex=%d, label=%u, replace=%d)\n",
0c6ce78a
HH
250 __func__, prefix, prefixlen, ifindex, (unsigned int)label,
251 replace);
2a8cc6c8 252
a90c9347 253 newp = ip6addrlbl_alloc(prefix, prefixlen, ifindex, label);
2a8cc6c8
YH
254 if (IS_ERR(newp))
255 return PTR_ERR(newp);
a90c9347
ED
256 spin_lock(&net->ipv6.ip6addrlbl_table.lock);
257 ret = __ip6addrlbl_add(net, newp, replace);
258 spin_unlock(&net->ipv6.ip6addrlbl_table.lock);
2a8cc6c8 259 if (ret)
2809c095 260 kfree(newp);
2a8cc6c8
YH
261 return ret;
262}
263
264/* remove a label */
3de23255
BT
265static int __ip6addrlbl_del(struct net *net,
266 const struct in6_addr *prefix, int prefixlen,
40fee36e 267 int ifindex)
2a8cc6c8
YH
268{
269 struct ip6addrlbl_entry *p = NULL;
b67bfe0d 270 struct hlist_node *n;
2a8cc6c8
YH
271 int ret = -ESRCH;
272
5b095d98 273 ADDRLABEL(KERN_DEBUG "%s(prefix=%pI6, prefixlen=%d, ifindex=%d)\n",
0c6ce78a 274 __func__, prefix, prefixlen, ifindex);
2a8cc6c8 275
a90c9347 276 hlist_for_each_entry_safe(p, n, &net->ipv6.ip6addrlbl_table.head, list) {
2a8cc6c8
YH
277 if (p->prefixlen == prefixlen &&
278 p->ifindex == ifindex &&
279 ipv6_addr_equal(&p->prefix, prefix)) {
280 hlist_del_rcu(&p->list);
2809c095 281 kfree_rcu(p, rcu);
2a8cc6c8
YH
282 ret = 0;
283 break;
284 }
285 }
286 return ret;
287}
288
3de23255
BT
289static int ip6addrlbl_del(struct net *net,
290 const struct in6_addr *prefix, int prefixlen,
40fee36e 291 int ifindex)
2a8cc6c8
YH
292{
293 struct in6_addr prefix_buf;
294 int ret;
295
5b095d98 296 ADDRLABEL(KERN_DEBUG "%s(prefix=%pI6, prefixlen=%d, ifindex=%d)\n",
0c6ce78a 297 __func__, prefix, prefixlen, ifindex);
2a8cc6c8
YH
298
299 ipv6_addr_prefix(&prefix_buf, prefix, prefixlen);
a90c9347 300 spin_lock(&net->ipv6.ip6addrlbl_table.lock);
3de23255 301 ret = __ip6addrlbl_del(net, &prefix_buf, prefixlen, ifindex);
a90c9347 302 spin_unlock(&net->ipv6.ip6addrlbl_table.lock);
2a8cc6c8
YH
303 return ret;
304}
305
306/* add default label */
3de23255 307static int __net_init ip6addrlbl_net_init(struct net *net)
2a8cc6c8
YH
308{
309 int err = 0;
310 int i;
311
f3213831 312 ADDRLABEL(KERN_DEBUG "%s\n", __func__);
2a8cc6c8 313
a90c9347
ED
314 spin_lock_init(&net->ipv6.ip6addrlbl_table.lock);
315 INIT_HLIST_HEAD(&net->ipv6.ip6addrlbl_table.head);
316
2a8cc6c8 317 for (i = 0; i < ARRAY_SIZE(ip6addrlbl_init_table); i++) {
3de23255
BT
318 int ret = ip6addrlbl_add(net,
319 ip6addrlbl_init_table[i].prefix,
2a8cc6c8
YH
320 ip6addrlbl_init_table[i].prefixlen,
321 0,
322 ip6addrlbl_init_table[i].label, 0);
323 /* XXX: should we free all rules when we catch an error? */
324 if (ret && (!err || err != -ENOMEM))
325 err = ret;
326 }
327 return err;
328}
329
3de23255
BT
330static void __net_exit ip6addrlbl_net_exit(struct net *net)
331{
332 struct ip6addrlbl_entry *p = NULL;
b67bfe0d 333 struct hlist_node *n;
3de23255
BT
334
335 /* Remove all labels belonging to the exiting net */
a90c9347
ED
336 spin_lock(&net->ipv6.ip6addrlbl_table.lock);
337 hlist_for_each_entry_safe(p, n, &net->ipv6.ip6addrlbl_table.head, list) {
338 hlist_del_rcu(&p->list);
2809c095 339 kfree_rcu(p, rcu);
3de23255 340 }
a90c9347 341 spin_unlock(&net->ipv6.ip6addrlbl_table.lock);
3de23255
BT
342}
343
344static struct pernet_operations ipv6_addr_label_ops = {
345 .init = ip6addrlbl_net_init,
346 .exit = ip6addrlbl_net_exit,
347};
348
2a8cc6c8
YH
349int __init ipv6_addr_label_init(void)
350{
3de23255 351 return register_pernet_subsys(&ipv6_addr_label_ops);
2a8cc6c8
YH
352}
353
2cc6d2bf
NH
354void ipv6_addr_label_cleanup(void)
355{
356 unregister_pernet_subsys(&ipv6_addr_label_ops);
357}
358
2a8cc6c8
YH
359static const struct nla_policy ifal_policy[IFAL_MAX+1] = {
360 [IFAL_ADDRESS] = { .len = sizeof(struct in6_addr), },
361 [IFAL_LABEL] = { .len = sizeof(u32), },
362};
363
a6f57028
FW
364static bool addrlbl_ifindex_exists(struct net *net, int ifindex)
365{
366
367 struct net_device *dev;
368
369 rcu_read_lock();
370 dev = dev_get_by_index_rcu(net, ifindex);
371 rcu_read_unlock();
372
373 return dev != NULL;
374}
375
c21ef3e3
DA
376static int ip6addrlbl_newdel(struct sk_buff *skb, struct nlmsghdr *nlh,
377 struct netlink_ext_ack *extack)
2a8cc6c8 378{
3b1e0a65 379 struct net *net = sock_net(skb->sk);
2a8cc6c8
YH
380 struct ifaddrlblmsg *ifal;
381 struct nlattr *tb[IFAL_MAX+1];
382 struct in6_addr *pfx;
383 u32 label;
384 int err = 0;
385
c21ef3e3
DA
386 err = nlmsg_parse(nlh, sizeof(*ifal), tb, IFAL_MAX, ifal_policy,
387 extack);
2a8cc6c8
YH
388 if (err < 0)
389 return err;
390
391 ifal = nlmsg_data(nlh);
392
393 if (ifal->ifal_family != AF_INET6 ||
394 ifal->ifal_prefixlen > 128)
395 return -EINVAL;
396
2a8cc6c8
YH
397 if (!tb[IFAL_ADDRESS])
398 return -EINVAL;
2a8cc6c8 399 pfx = nla_data(tb[IFAL_ADDRESS]);
2a8cc6c8
YH
400
401 if (!tb[IFAL_LABEL])
402 return -EINVAL;
403 label = nla_get_u32(tb[IFAL_LABEL]);
404 if (label == IPV6_ADDR_LABEL_DEFAULT)
405 return -EINVAL;
406
1c8669e0 407 switch (nlh->nlmsg_type) {
2a8cc6c8 408 case RTM_NEWADDRLABEL:
0771275b 409 if (ifal->ifal_index &&
a6f57028 410 !addrlbl_ifindex_exists(net, ifal->ifal_index))
0771275b
FW
411 return -EINVAL;
412
3de23255 413 err = ip6addrlbl_add(net, pfx, ifal->ifal_prefixlen,
2a8cc6c8
YH
414 ifal->ifal_index, label,
415 nlh->nlmsg_flags & NLM_F_REPLACE);
416 break;
417 case RTM_DELADDRLABEL:
3de23255 418 err = ip6addrlbl_del(net, pfx, ifal->ifal_prefixlen,
2a8cc6c8
YH
419 ifal->ifal_index);
420 break;
421 default:
422 err = -EOPNOTSUPP;
423 }
424 return err;
425}
426
a50feda5
ED
427static void ip6addrlbl_putmsg(struct nlmsghdr *nlh,
428 int prefixlen, int ifindex, u32 lseq)
2a8cc6c8
YH
429{
430 struct ifaddrlblmsg *ifal = nlmsg_data(nlh);
431 ifal->ifal_family = AF_INET6;
432 ifal->ifal_prefixlen = prefixlen;
433 ifal->ifal_flags = 0;
434 ifal->ifal_index = ifindex;
435 ifal->ifal_seq = lseq;
436};
437
438static int ip6addrlbl_fill(struct sk_buff *skb,
439 struct ip6addrlbl_entry *p,
440 u32 lseq,
15e47304 441 u32 portid, u32 seq, int event,
2a8cc6c8
YH
442 unsigned int flags)
443{
15e47304 444 struct nlmsghdr *nlh = nlmsg_put(skb, portid, seq, event,
2a8cc6c8
YH
445 sizeof(struct ifaddrlblmsg), flags);
446 if (!nlh)
447 return -EMSGSIZE;
448
449 ip6addrlbl_putmsg(nlh, p->prefixlen, p->ifindex, lseq);
450
930345ea 451 if (nla_put_in6_addr(skb, IFAL_ADDRESS, &p->prefix) < 0 ||
2a8cc6c8
YH
452 nla_put_u32(skb, IFAL_LABEL, p->label) < 0) {
453 nlmsg_cancel(skb, nlh);
454 return -EMSGSIZE;
455 }
456
053c095a
JB
457 nlmsg_end(skb, nlh);
458 return 0;
2a8cc6c8
YH
459}
460
f2ae64bb
DA
461static int ip6addrlbl_valid_dump_req(const struct nlmsghdr *nlh,
462 struct netlink_ext_ack *extack)
463{
464 struct ifaddrlblmsg *ifal;
465
466 if (nlh->nlmsg_len < nlmsg_msg_size(sizeof(*ifal))) {
467 NL_SET_ERR_MSG_MOD(extack, "Invalid header for address label dump request");
468 return -EINVAL;
469 }
470
471 ifal = nlmsg_data(nlh);
472 if (ifal->__ifal_reserved || ifal->ifal_prefixlen ||
473 ifal->ifal_flags || ifal->ifal_index || ifal->ifal_seq) {
474 NL_SET_ERR_MSG_MOD(extack, "Invalid values in header for address label dump request");
475 return -EINVAL;
476 }
477
478 if (nlmsg_attrlen(nlh, sizeof(*ifal))) {
479 NL_SET_ERR_MSG_MOD(extack, "Invalid data after header for address label dump requewst");
480 return -EINVAL;
481 }
482
483 return 0;
484}
485
2a8cc6c8
YH
486static int ip6addrlbl_dump(struct sk_buff *skb, struct netlink_callback *cb)
487{
f2ae64bb 488 const struct nlmsghdr *nlh = cb->nlh;
3b1e0a65 489 struct net *net = sock_net(skb->sk);
2a8cc6c8 490 struct ip6addrlbl_entry *p;
2a8cc6c8
YH
491 int idx = 0, s_idx = cb->args[0];
492 int err;
493
f2ae64bb
DA
494 if (cb->strict_check) {
495 err = ip6addrlbl_valid_dump_req(nlh, cb->extack);
496 if (err < 0)
497 return err;
498 }
499
2a8cc6c8 500 rcu_read_lock();
a90c9347
ED
501 hlist_for_each_entry_rcu(p, &net->ipv6.ip6addrlbl_table.head, list) {
502 if (idx >= s_idx) {
cb6e926e 503 err = ip6addrlbl_fill(skb, p,
a90c9347 504 net->ipv6.ip6addrlbl_table.seq,
cb6e926e 505 NETLINK_CB(cb->skb).portid,
f2ae64bb 506 nlh->nlmsg_seq,
cb6e926e
WY
507 RTM_NEWADDRLABEL,
508 NLM_F_MULTI);
053c095a 509 if (err < 0)
2a8cc6c8
YH
510 break;
511 }
512 idx++;
513 }
514 rcu_read_unlock();
515 cb->args[0] = idx;
516 return skb->len;
517}
518
519static inline int ip6addrlbl_msgsize(void)
520{
a02cec21 521 return NLMSG_ALIGN(sizeof(struct ifaddrlblmsg))
2a8cc6c8 522 + nla_total_size(16) /* IFAL_ADDRESS */
a02cec21 523 + nla_total_size(4); /* IFAL_LABEL */
2a8cc6c8
YH
524}
525
c21ef3e3
DA
526static int ip6addrlbl_get(struct sk_buff *in_skb, struct nlmsghdr *nlh,
527 struct netlink_ext_ack *extack)
2a8cc6c8 528{
3b1e0a65 529 struct net *net = sock_net(in_skb->sk);
2a8cc6c8
YH
530 struct ifaddrlblmsg *ifal;
531 struct nlattr *tb[IFAL_MAX+1];
532 struct in6_addr *addr;
533 u32 lseq;
534 int err = 0;
535 struct ip6addrlbl_entry *p;
536 struct sk_buff *skb;
537
c21ef3e3
DA
538 err = nlmsg_parse(nlh, sizeof(*ifal), tb, IFAL_MAX, ifal_policy,
539 extack);
2a8cc6c8
YH
540 if (err < 0)
541 return err;
542
543 ifal = nlmsg_data(nlh);
544
545 if (ifal->ifal_family != AF_INET6 ||
546 ifal->ifal_prefixlen != 128)
547 return -EINVAL;
548
549 if (ifal->ifal_index &&
a6f57028 550 !addrlbl_ifindex_exists(net, ifal->ifal_index))
2a8cc6c8
YH
551 return -EINVAL;
552
553 if (!tb[IFAL_ADDRESS])
554 return -EINVAL;
2a8cc6c8 555 addr = nla_data(tb[IFAL_ADDRESS]);
2a8cc6c8 556
cb6e926e 557 skb = nlmsg_new(ip6addrlbl_msgsize(), GFP_KERNEL);
66c77ff3 558 if (!skb)
2a8cc6c8 559 return -ENOBUFS;
2a8cc6c8 560
66c77ff3 561 err = -ESRCH;
2a8cc6c8 562
66c77ff3
ED
563 rcu_read_lock();
564 p = __ipv6_addr_label(net, addr, ipv6_addr_type(addr), ifal->ifal_index);
565 lseq = net->ipv6.ip6addrlbl_table.seq;
566 if (p)
567 err = ip6addrlbl_fill(skb, p, lseq,
568 NETLINK_CB(in_skb).portid,
569 nlh->nlmsg_seq,
570 RTM_NEWADDRLABEL, 0);
571 rcu_read_unlock();
2a8cc6c8
YH
572
573 if (err < 0) {
574 WARN_ON(err == -EMSGSIZE);
575 kfree_skb(skb);
66c77ff3
ED
576 } else {
577 err = rtnl_unicast(skb, net, NETLINK_CB(in_skb).portid);
2a8cc6c8 578 }
2a8cc6c8
YH
579 return err;
580}
581
a3fde2ad 582int __init ipv6_addr_label_rtnl_register(void)
2a8cc6c8 583{
a3fde2ad
FW
584 int ret;
585
586 ret = rtnl_register_module(THIS_MODULE, PF_INET6, RTM_NEWADDRLABEL,
587 ip6addrlbl_newdel,
588 NULL, RTNL_FLAG_DOIT_UNLOCKED);
589 if (ret < 0)
590 return ret;
591 ret = rtnl_register_module(THIS_MODULE, PF_INET6, RTM_DELADDRLABEL,
592 ip6addrlbl_newdel,
593 NULL, RTNL_FLAG_DOIT_UNLOCKED);
594 if (ret < 0)
595 return ret;
596 ret = rtnl_register_module(THIS_MODULE, PF_INET6, RTM_GETADDRLABEL,
597 ip6addrlbl_get,
598 ip6addrlbl_dump, RTNL_FLAG_DOIT_UNLOCKED);
599 return ret;
2a8cc6c8 600}