xref: /linux/net/ipv6/addrlabel.c (revision 1f2367a39f17bd553a75e179a747f9b257bc9478)
1 // SPDX-License-Identifier: GPL-2.0
2 /*
3  * IPv6 Address Label subsystem
4  * for the IPv6 "Default" Source Address Selection
5  *
6  * Copyright (C)2007 USAGI/WIDE Project
7  */
8 /*
9  * Author:
10  *	YOSHIFUJI Hideaki @ USAGI/WIDE Project <yoshfuji@linux-ipv6.org>
11  */
12 
13 #include <linux/kernel.h>
14 #include <linux/list.h>
15 #include <linux/rcupdate.h>
16 #include <linux/in6.h>
17 #include <linux/slab.h>
18 #include <net/addrconf.h>
19 #include <linux/if_addrlabel.h>
20 #include <linux/netlink.h>
21 #include <linux/rtnetlink.h>
22 
23 #if 0
24 #define ADDRLABEL(x...) printk(x)
25 #else
26 #define ADDRLABEL(x...) do { ; } while (0)
27 #endif
28 
29 /*
30  * Policy Table
31  */
32 struct ip6addrlbl_entry {
33 	struct in6_addr prefix;
34 	int prefixlen;
35 	int ifindex;
36 	int addrtype;
37 	u32 label;
38 	struct hlist_node list;
39 	struct rcu_head rcu;
40 };
41 
42 /*
43  * Default policy table (RFC6724 + extensions)
44  *
45  * prefix		addr_type	label
46  * -------------------------------------------------------------------------
47  * ::1/128		LOOPBACK	0
48  * ::/0			N/A		1
49  * 2002::/16		N/A		2
50  * ::/96		COMPATv4	3
51  * ::ffff:0:0/96	V4MAPPED	4
52  * fc00::/7		N/A		5		ULA (RFC 4193)
53  * 2001::/32		N/A		6		Teredo (RFC 4380)
54  * 2001:10::/28		N/A		7		ORCHID (RFC 4843)
55  * fec0::/10		N/A		11		Site-local
56  *							(deprecated by RFC3879)
57  * 3ffe::/16		N/A		12		6bone
58  *
59  * Note: 0xffffffff is used if we do not have any policies.
60  * Note: Labels for ULA and 6to4 are different from labels listed in RFC6724.
61  */
62 
63 #define IPV6_ADDR_LABEL_DEFAULT	0xffffffffUL
64 
65 static const __net_initconst struct ip6addrlbl_init_table
66 {
67 	const struct in6_addr *prefix;
68 	int prefixlen;
69 	u32 label;
70 } ip6addrlbl_init_table[] = {
71 	{	/* ::/0 */
72 		.prefix = &in6addr_any,
73 		.label = 1,
74 	}, {	/* fc00::/7 */
75 		.prefix = &(struct in6_addr){ { { 0xfc } } } ,
76 		.prefixlen = 7,
77 		.label = 5,
78 	}, {	/* fec0::/10 */
79 		.prefix = &(struct in6_addr){ { { 0xfe, 0xc0 } } },
80 		.prefixlen = 10,
81 		.label = 11,
82 	}, {	/* 2002::/16 */
83 		.prefix = &(struct in6_addr){ { { 0x20, 0x02 } } },
84 		.prefixlen = 16,
85 		.label = 2,
86 	}, {	/* 3ffe::/16 */
87 		.prefix = &(struct in6_addr){ { { 0x3f, 0xfe } } },
88 		.prefixlen = 16,
89 		.label = 12,
90 	}, {	/* 2001::/32 */
91 		.prefix = &(struct in6_addr){ { { 0x20, 0x01 } } },
92 		.prefixlen = 32,
93 		.label = 6,
94 	}, {	/* 2001:10::/28 */
95 		.prefix = &(struct in6_addr){ { { 0x20, 0x01, 0x00, 0x10 } } },
96 		.prefixlen = 28,
97 		.label = 7,
98 	}, {	/* ::ffff:0:0 */
99 		.prefix = &(struct in6_addr){ { { [10] = 0xff, [11] = 0xff } } },
100 		.prefixlen = 96,
101 		.label = 4,
102 	}, {	/* ::/96 */
103 		.prefix = &in6addr_any,
104 		.prefixlen = 96,
105 		.label = 3,
106 	}, {	/* ::1/128 */
107 		.prefix = &in6addr_loopback,
108 		.prefixlen = 128,
109 		.label = 0,
110 	}
111 };
112 
113 /* Find label */
114 static bool __ip6addrlbl_match(const struct ip6addrlbl_entry *p,
115 			       const struct in6_addr *addr,
116 			       int addrtype, int ifindex)
117 {
118 	if (p->ifindex && p->ifindex != ifindex)
119 		return false;
120 	if (p->addrtype && p->addrtype != addrtype)
121 		return false;
122 	if (!ipv6_prefix_equal(addr, &p->prefix, p->prefixlen))
123 		return false;
124 	return true;
125 }
126 
127 static struct ip6addrlbl_entry *__ipv6_addr_label(struct net *net,
128 						  const struct in6_addr *addr,
129 						  int type, int ifindex)
130 {
131 	struct ip6addrlbl_entry *p;
132 
133 	hlist_for_each_entry_rcu(p, &net->ipv6.ip6addrlbl_table.head, list) {
134 		if (__ip6addrlbl_match(p, addr, type, ifindex))
135 			return p;
136 	}
137 	return NULL;
138 }
139 
140 u32 ipv6_addr_label(struct net *net,
141 		    const struct in6_addr *addr, int type, int ifindex)
142 {
143 	u32 label;
144 	struct ip6addrlbl_entry *p;
145 
146 	type &= IPV6_ADDR_MAPPED | IPV6_ADDR_COMPATv4 | IPV6_ADDR_LOOPBACK;
147 
148 	rcu_read_lock();
149 	p = __ipv6_addr_label(net, addr, type, ifindex);
150 	label = p ? p->label : IPV6_ADDR_LABEL_DEFAULT;
151 	rcu_read_unlock();
152 
153 	ADDRLABEL(KERN_DEBUG "%s(addr=%pI6, type=%d, ifindex=%d) => %08x\n",
154 		  __func__, addr, type, ifindex, label);
155 
156 	return label;
157 }
158 
159 /* allocate one entry */
160 static struct ip6addrlbl_entry *ip6addrlbl_alloc(const struct in6_addr *prefix,
161 						 int prefixlen, int ifindex,
162 						 u32 label)
163 {
164 	struct ip6addrlbl_entry *newp;
165 	int addrtype;
166 
167 	ADDRLABEL(KERN_DEBUG "%s(prefix=%pI6, prefixlen=%d, ifindex=%d, label=%u)\n",
168 		  __func__, prefix, prefixlen, ifindex, (unsigned int)label);
169 
170 	addrtype = ipv6_addr_type(prefix) & (IPV6_ADDR_MAPPED | IPV6_ADDR_COMPATv4 | IPV6_ADDR_LOOPBACK);
171 
172 	switch (addrtype) {
173 	case IPV6_ADDR_MAPPED:
174 		if (prefixlen > 96)
175 			return ERR_PTR(-EINVAL);
176 		if (prefixlen < 96)
177 			addrtype = 0;
178 		break;
179 	case IPV6_ADDR_COMPATv4:
180 		if (prefixlen != 96)
181 			addrtype = 0;
182 		break;
183 	case IPV6_ADDR_LOOPBACK:
184 		if (prefixlen != 128)
185 			addrtype = 0;
186 		break;
187 	}
188 
189 	newp = kmalloc(sizeof(*newp), GFP_KERNEL);
190 	if (!newp)
191 		return ERR_PTR(-ENOMEM);
192 
193 	ipv6_addr_prefix(&newp->prefix, prefix, prefixlen);
194 	newp->prefixlen = prefixlen;
195 	newp->ifindex = ifindex;
196 	newp->addrtype = addrtype;
197 	newp->label = label;
198 	INIT_HLIST_NODE(&newp->list);
199 	return newp;
200 }
201 
202 /* add a label */
203 static int __ip6addrlbl_add(struct net *net, struct ip6addrlbl_entry *newp,
204 			    int replace)
205 {
206 	struct ip6addrlbl_entry *last = NULL, *p = NULL;
207 	struct hlist_node *n;
208 	int ret = 0;
209 
210 	ADDRLABEL(KERN_DEBUG "%s(newp=%p, replace=%d)\n", __func__, newp,
211 		  replace);
212 
213 	hlist_for_each_entry_safe(p, n,	&net->ipv6.ip6addrlbl_table.head, list) {
214 		if (p->prefixlen == newp->prefixlen &&
215 		    p->ifindex == newp->ifindex &&
216 		    ipv6_addr_equal(&p->prefix, &newp->prefix)) {
217 			if (!replace) {
218 				ret = -EEXIST;
219 				goto out;
220 			}
221 			hlist_replace_rcu(&p->list, &newp->list);
222 			kfree_rcu(p, rcu);
223 			goto out;
224 		} else if ((p->prefixlen == newp->prefixlen && !p->ifindex) ||
225 			   (p->prefixlen < newp->prefixlen)) {
226 			hlist_add_before_rcu(&newp->list, &p->list);
227 			goto out;
228 		}
229 		last = p;
230 	}
231 	if (last)
232 		hlist_add_behind_rcu(&newp->list, &last->list);
233 	else
234 		hlist_add_head_rcu(&newp->list, &net->ipv6.ip6addrlbl_table.head);
235 out:
236 	if (!ret)
237 		net->ipv6.ip6addrlbl_table.seq++;
238 	return ret;
239 }
240 
241 /* add a label */
242 static int ip6addrlbl_add(struct net *net,
243 			  const struct in6_addr *prefix, int prefixlen,
244 			  int ifindex, u32 label, int replace)
245 {
246 	struct ip6addrlbl_entry *newp;
247 	int ret = 0;
248 
249 	ADDRLABEL(KERN_DEBUG "%s(prefix=%pI6, prefixlen=%d, ifindex=%d, label=%u, replace=%d)\n",
250 		  __func__, prefix, prefixlen, ifindex, (unsigned int)label,
251 		  replace);
252 
253 	newp = ip6addrlbl_alloc(prefix, prefixlen, ifindex, label);
254 	if (IS_ERR(newp))
255 		return PTR_ERR(newp);
256 	spin_lock(&net->ipv6.ip6addrlbl_table.lock);
257 	ret = __ip6addrlbl_add(net, newp, replace);
258 	spin_unlock(&net->ipv6.ip6addrlbl_table.lock);
259 	if (ret)
260 		kfree(newp);
261 	return ret;
262 }
263 
264 /* remove a label */
265 static int __ip6addrlbl_del(struct net *net,
266 			    const struct in6_addr *prefix, int prefixlen,
267 			    int ifindex)
268 {
269 	struct ip6addrlbl_entry *p = NULL;
270 	struct hlist_node *n;
271 	int ret = -ESRCH;
272 
273 	ADDRLABEL(KERN_DEBUG "%s(prefix=%pI6, prefixlen=%d, ifindex=%d)\n",
274 		  __func__, prefix, prefixlen, ifindex);
275 
276 	hlist_for_each_entry_safe(p, n, &net->ipv6.ip6addrlbl_table.head, list) {
277 		if (p->prefixlen == prefixlen &&
278 		    p->ifindex == ifindex &&
279 		    ipv6_addr_equal(&p->prefix, prefix)) {
280 			hlist_del_rcu(&p->list);
281 			kfree_rcu(p, rcu);
282 			ret = 0;
283 			break;
284 		}
285 	}
286 	return ret;
287 }
288 
289 static int ip6addrlbl_del(struct net *net,
290 			  const struct in6_addr *prefix, int prefixlen,
291 			  int ifindex)
292 {
293 	struct in6_addr prefix_buf;
294 	int ret;
295 
296 	ADDRLABEL(KERN_DEBUG "%s(prefix=%pI6, prefixlen=%d, ifindex=%d)\n",
297 		  __func__, prefix, prefixlen, ifindex);
298 
299 	ipv6_addr_prefix(&prefix_buf, prefix, prefixlen);
300 	spin_lock(&net->ipv6.ip6addrlbl_table.lock);
301 	ret = __ip6addrlbl_del(net, &prefix_buf, prefixlen, ifindex);
302 	spin_unlock(&net->ipv6.ip6addrlbl_table.lock);
303 	return ret;
304 }
305 
306 /* add default label */
307 static int __net_init ip6addrlbl_net_init(struct net *net)
308 {
309 	int err = 0;
310 	int i;
311 
312 	ADDRLABEL(KERN_DEBUG "%s\n", __func__);
313 
314 	spin_lock_init(&net->ipv6.ip6addrlbl_table.lock);
315 	INIT_HLIST_HEAD(&net->ipv6.ip6addrlbl_table.head);
316 
317 	for (i = 0; i < ARRAY_SIZE(ip6addrlbl_init_table); i++) {
318 		int ret = ip6addrlbl_add(net,
319 					 ip6addrlbl_init_table[i].prefix,
320 					 ip6addrlbl_init_table[i].prefixlen,
321 					 0,
322 					 ip6addrlbl_init_table[i].label, 0);
323 		/* XXX: should we free all rules when we catch an error? */
324 		if (ret && (!err || err != -ENOMEM))
325 			err = ret;
326 	}
327 	return err;
328 }
329 
330 static void __net_exit ip6addrlbl_net_exit(struct net *net)
331 {
332 	struct ip6addrlbl_entry *p = NULL;
333 	struct hlist_node *n;
334 
335 	/* Remove all labels belonging to the exiting net */
336 	spin_lock(&net->ipv6.ip6addrlbl_table.lock);
337 	hlist_for_each_entry_safe(p, n, &net->ipv6.ip6addrlbl_table.head, list) {
338 		hlist_del_rcu(&p->list);
339 		kfree_rcu(p, rcu);
340 	}
341 	spin_unlock(&net->ipv6.ip6addrlbl_table.lock);
342 }
343 
344 static struct pernet_operations ipv6_addr_label_ops = {
345 	.init = ip6addrlbl_net_init,
346 	.exit = ip6addrlbl_net_exit,
347 };
348 
349 int __init ipv6_addr_label_init(void)
350 {
351 	return register_pernet_subsys(&ipv6_addr_label_ops);
352 }
353 
354 void ipv6_addr_label_cleanup(void)
355 {
356 	unregister_pernet_subsys(&ipv6_addr_label_ops);
357 }
358 
359 static const struct nla_policy ifal_policy[IFAL_MAX+1] = {
360 	[IFAL_ADDRESS]		= { .len = sizeof(struct in6_addr), },
361 	[IFAL_LABEL]		= { .len = sizeof(u32), },
362 };
363 
364 static bool addrlbl_ifindex_exists(struct net *net, int ifindex)
365 {
366 
367 	struct net_device *dev;
368 
369 	rcu_read_lock();
370 	dev = dev_get_by_index_rcu(net, ifindex);
371 	rcu_read_unlock();
372 
373 	return dev != NULL;
374 }
375 
376 static int ip6addrlbl_newdel(struct sk_buff *skb, struct nlmsghdr *nlh,
377 			     struct netlink_ext_ack *extack)
378 {
379 	struct net *net = sock_net(skb->sk);
380 	struct ifaddrlblmsg *ifal;
381 	struct nlattr *tb[IFAL_MAX+1];
382 	struct in6_addr *pfx;
383 	u32 label;
384 	int err = 0;
385 
386 	err = nlmsg_parse(nlh, sizeof(*ifal), tb, IFAL_MAX, ifal_policy,
387 			  extack);
388 	if (err < 0)
389 		return err;
390 
391 	ifal = nlmsg_data(nlh);
392 
393 	if (ifal->ifal_family != AF_INET6 ||
394 	    ifal->ifal_prefixlen > 128)
395 		return -EINVAL;
396 
397 	if (!tb[IFAL_ADDRESS])
398 		return -EINVAL;
399 	pfx = nla_data(tb[IFAL_ADDRESS]);
400 
401 	if (!tb[IFAL_LABEL])
402 		return -EINVAL;
403 	label = nla_get_u32(tb[IFAL_LABEL]);
404 	if (label == IPV6_ADDR_LABEL_DEFAULT)
405 		return -EINVAL;
406 
407 	switch (nlh->nlmsg_type) {
408 	case RTM_NEWADDRLABEL:
409 		if (ifal->ifal_index &&
410 		    !addrlbl_ifindex_exists(net, ifal->ifal_index))
411 			return -EINVAL;
412 
413 		err = ip6addrlbl_add(net, pfx, ifal->ifal_prefixlen,
414 				     ifal->ifal_index, label,
415 				     nlh->nlmsg_flags & NLM_F_REPLACE);
416 		break;
417 	case RTM_DELADDRLABEL:
418 		err = ip6addrlbl_del(net, pfx, ifal->ifal_prefixlen,
419 				     ifal->ifal_index);
420 		break;
421 	default:
422 		err = -EOPNOTSUPP;
423 	}
424 	return err;
425 }
426 
427 static void ip6addrlbl_putmsg(struct nlmsghdr *nlh,
428 			      int prefixlen, int ifindex, u32 lseq)
429 {
430 	struct ifaddrlblmsg *ifal = nlmsg_data(nlh);
431 	ifal->ifal_family = AF_INET6;
432 	ifal->ifal_prefixlen = prefixlen;
433 	ifal->ifal_flags = 0;
434 	ifal->ifal_index = ifindex;
435 	ifal->ifal_seq = lseq;
436 };
437 
438 static int ip6addrlbl_fill(struct sk_buff *skb,
439 			   struct ip6addrlbl_entry *p,
440 			   u32 lseq,
441 			   u32 portid, u32 seq, int event,
442 			   unsigned int flags)
443 {
444 	struct nlmsghdr *nlh = nlmsg_put(skb, portid, seq, event,
445 					 sizeof(struct ifaddrlblmsg), flags);
446 	if (!nlh)
447 		return -EMSGSIZE;
448 
449 	ip6addrlbl_putmsg(nlh, p->prefixlen, p->ifindex, lseq);
450 
451 	if (nla_put_in6_addr(skb, IFAL_ADDRESS, &p->prefix) < 0 ||
452 	    nla_put_u32(skb, IFAL_LABEL, p->label) < 0) {
453 		nlmsg_cancel(skb, nlh);
454 		return -EMSGSIZE;
455 	}
456 
457 	nlmsg_end(skb, nlh);
458 	return 0;
459 }
460 
461 static int ip6addrlbl_valid_dump_req(const struct nlmsghdr *nlh,
462 				     struct netlink_ext_ack *extack)
463 {
464 	struct ifaddrlblmsg *ifal;
465 
466 	if (nlh->nlmsg_len < nlmsg_msg_size(sizeof(*ifal))) {
467 		NL_SET_ERR_MSG_MOD(extack, "Invalid header for address label dump request");
468 		return -EINVAL;
469 	}
470 
471 	ifal = nlmsg_data(nlh);
472 	if (ifal->__ifal_reserved || ifal->ifal_prefixlen ||
473 	    ifal->ifal_flags || ifal->ifal_index || ifal->ifal_seq) {
474 		NL_SET_ERR_MSG_MOD(extack, "Invalid values in header for address label dump request");
475 		return -EINVAL;
476 	}
477 
478 	if (nlmsg_attrlen(nlh, sizeof(*ifal))) {
479 		NL_SET_ERR_MSG_MOD(extack, "Invalid data after header for address label dump requewst");
480 		return -EINVAL;
481 	}
482 
483 	return 0;
484 }
485 
486 static int ip6addrlbl_dump(struct sk_buff *skb, struct netlink_callback *cb)
487 {
488 	const struct nlmsghdr *nlh = cb->nlh;
489 	struct net *net = sock_net(skb->sk);
490 	struct ip6addrlbl_entry *p;
491 	int idx = 0, s_idx = cb->args[0];
492 	int err;
493 
494 	if (cb->strict_check) {
495 		err = ip6addrlbl_valid_dump_req(nlh, cb->extack);
496 		if (err < 0)
497 			return err;
498 	}
499 
500 	rcu_read_lock();
501 	hlist_for_each_entry_rcu(p, &net->ipv6.ip6addrlbl_table.head, list) {
502 		if (idx >= s_idx) {
503 			err = ip6addrlbl_fill(skb, p,
504 					      net->ipv6.ip6addrlbl_table.seq,
505 					      NETLINK_CB(cb->skb).portid,
506 					      nlh->nlmsg_seq,
507 					      RTM_NEWADDRLABEL,
508 					      NLM_F_MULTI);
509 			if (err < 0)
510 				break;
511 		}
512 		idx++;
513 	}
514 	rcu_read_unlock();
515 	cb->args[0] = idx;
516 	return skb->len;
517 }
518 
519 static inline int ip6addrlbl_msgsize(void)
520 {
521 	return NLMSG_ALIGN(sizeof(struct ifaddrlblmsg))
522 		+ nla_total_size(16)	/* IFAL_ADDRESS */
523 		+ nla_total_size(4);	/* IFAL_LABEL */
524 }
525 
526 static int ip6addrlbl_valid_get_req(struct sk_buff *skb,
527 				    const struct nlmsghdr *nlh,
528 				    struct nlattr **tb,
529 				    struct netlink_ext_ack *extack)
530 {
531 	struct ifaddrlblmsg *ifal;
532 	int i, err;
533 
534 	if (nlh->nlmsg_len < nlmsg_msg_size(sizeof(*ifal))) {
535 		NL_SET_ERR_MSG_MOD(extack, "Invalid header for addrlabel get request");
536 		return -EINVAL;
537 	}
538 
539 	if (!netlink_strict_get_check(skb))
540 		return nlmsg_parse(nlh, sizeof(*ifal), tb, IFAL_MAX,
541 				   ifal_policy, extack);
542 
543 	ifal = nlmsg_data(nlh);
544 	if (ifal->__ifal_reserved || ifal->ifal_flags || ifal->ifal_seq) {
545 		NL_SET_ERR_MSG_MOD(extack, "Invalid values in header for addrlabel get request");
546 		return -EINVAL;
547 	}
548 
549 	err = nlmsg_parse_strict(nlh, sizeof(*ifal), tb, IFAL_MAX,
550 				 ifal_policy, extack);
551 	if (err)
552 		return err;
553 
554 	for (i = 0; i <= IFAL_MAX; i++) {
555 		if (!tb[i])
556 			continue;
557 
558 		switch (i) {
559 		case IFAL_ADDRESS:
560 			break;
561 		default:
562 			NL_SET_ERR_MSG_MOD(extack, "Unsupported attribute in addrlabel get request");
563 			return -EINVAL;
564 		}
565 	}
566 
567 	return 0;
568 }
569 
570 static int ip6addrlbl_get(struct sk_buff *in_skb, struct nlmsghdr *nlh,
571 			  struct netlink_ext_ack *extack)
572 {
573 	struct net *net = sock_net(in_skb->sk);
574 	struct ifaddrlblmsg *ifal;
575 	struct nlattr *tb[IFAL_MAX+1];
576 	struct in6_addr *addr;
577 	u32 lseq;
578 	int err = 0;
579 	struct ip6addrlbl_entry *p;
580 	struct sk_buff *skb;
581 
582 	err = ip6addrlbl_valid_get_req(in_skb, nlh, tb, extack);
583 	if (err < 0)
584 		return err;
585 
586 	ifal = nlmsg_data(nlh);
587 
588 	if (ifal->ifal_family != AF_INET6 ||
589 	    ifal->ifal_prefixlen != 128)
590 		return -EINVAL;
591 
592 	if (ifal->ifal_index &&
593 	    !addrlbl_ifindex_exists(net, ifal->ifal_index))
594 		return -EINVAL;
595 
596 	if (!tb[IFAL_ADDRESS])
597 		return -EINVAL;
598 	addr = nla_data(tb[IFAL_ADDRESS]);
599 
600 	skb = nlmsg_new(ip6addrlbl_msgsize(), GFP_KERNEL);
601 	if (!skb)
602 		return -ENOBUFS;
603 
604 	err = -ESRCH;
605 
606 	rcu_read_lock();
607 	p = __ipv6_addr_label(net, addr, ipv6_addr_type(addr), ifal->ifal_index);
608 	lseq = net->ipv6.ip6addrlbl_table.seq;
609 	if (p)
610 		err = ip6addrlbl_fill(skb, p, lseq,
611 				      NETLINK_CB(in_skb).portid,
612 				      nlh->nlmsg_seq,
613 				      RTM_NEWADDRLABEL, 0);
614 	rcu_read_unlock();
615 
616 	if (err < 0) {
617 		WARN_ON(err == -EMSGSIZE);
618 		kfree_skb(skb);
619 	} else {
620 		err = rtnl_unicast(skb, net, NETLINK_CB(in_skb).portid);
621 	}
622 	return err;
623 }
624 
625 int __init ipv6_addr_label_rtnl_register(void)
626 {
627 	int ret;
628 
629 	ret = rtnl_register_module(THIS_MODULE, PF_INET6, RTM_NEWADDRLABEL,
630 				   ip6addrlbl_newdel,
631 				   NULL, RTNL_FLAG_DOIT_UNLOCKED);
632 	if (ret < 0)
633 		return ret;
634 	ret = rtnl_register_module(THIS_MODULE, PF_INET6, RTM_DELADDRLABEL,
635 				   ip6addrlbl_newdel,
636 				   NULL, RTNL_FLAG_DOIT_UNLOCKED);
637 	if (ret < 0)
638 		return ret;
639 	ret = rtnl_register_module(THIS_MODULE, PF_INET6, RTM_GETADDRLABEL,
640 				   ip6addrlbl_get,
641 				   ip6addrlbl_dump, RTNL_FLAG_DOIT_UNLOCKED);
642 	return ret;
643 }
644