macvlan.c 45 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792
  1. // SPDX-License-Identifier: GPL-2.0-or-later
  2. /*
  3. * Copyright (c) 2007 Patrick McHardy <kaber@trash.net>
  4. *
  5. * The code this is based on carried the following copyright notice:
  6. * ---
  7. * (C) Copyright 2001-2006
  8. * Alex Zeffertt, Cambridge Broadband Ltd, ajz@cambridgebroadband.com
  9. * Re-worked by Ben Greear <greearb@candelatech.com>
  10. * ---
  11. */
  12. #include <linux/kernel.h>
  13. #include <linux/types.h>
  14. #include <linux/module.h>
  15. #include <linux/init.h>
  16. #include <linux/errno.h>
  17. #include <linux/slab.h>
  18. #include <linux/string.h>
  19. #include <linux/rculist.h>
  20. #include <linux/notifier.h>
  21. #include <linux/netdevice.h>
  22. #include <linux/etherdevice.h>
  23. #include <linux/net_tstamp.h>
  24. #include <linux/ethtool.h>
  25. #include <linux/if_arp.h>
  26. #include <linux/if_vlan.h>
  27. #include <linux/if_link.h>
  28. #include <linux/if_macvlan.h>
  29. #include <linux/hash.h>
  30. #include <linux/workqueue.h>
  31. #include <net/rtnetlink.h>
  32. #include <net/xfrm.h>
  33. #include <linux/netpoll.h>
  34. #include <linux/phy.h>
  35. #define MACVLAN_HASH_BITS 8
  36. #define MACVLAN_HASH_SIZE (1<<MACVLAN_HASH_BITS)
  37. #define MACVLAN_BC_QUEUE_LEN 1000
  38. #define MACVLAN_F_PASSTHRU 1
  39. #define MACVLAN_F_ADDRCHANGE 2
  40. struct macvlan_port {
  41. struct net_device *dev;
  42. struct hlist_head vlan_hash[MACVLAN_HASH_SIZE];
  43. struct list_head vlans;
  44. struct sk_buff_head bc_queue;
  45. struct work_struct bc_work;
  46. u32 flags;
  47. int count;
  48. struct hlist_head vlan_source_hash[MACVLAN_HASH_SIZE];
  49. DECLARE_BITMAP(mc_filter, MACVLAN_MC_FILTER_SZ);
  50. unsigned char perm_addr[ETH_ALEN];
  51. };
  52. struct macvlan_source_entry {
  53. struct hlist_node hlist;
  54. struct macvlan_dev *vlan;
  55. unsigned char addr[6+2] __aligned(sizeof(u16));
  56. struct rcu_head rcu;
  57. };
  58. struct macvlan_skb_cb {
  59. const struct macvlan_dev *src;
  60. };
  61. #define MACVLAN_SKB_CB(__skb) ((struct macvlan_skb_cb *)&((__skb)->cb[0]))
  62. static void macvlan_port_destroy(struct net_device *dev);
  63. static inline bool macvlan_passthru(const struct macvlan_port *port)
  64. {
  65. return port->flags & MACVLAN_F_PASSTHRU;
  66. }
  67. static inline void macvlan_set_passthru(struct macvlan_port *port)
  68. {
  69. port->flags |= MACVLAN_F_PASSTHRU;
  70. }
  71. static inline bool macvlan_addr_change(const struct macvlan_port *port)
  72. {
  73. return port->flags & MACVLAN_F_ADDRCHANGE;
  74. }
  75. static inline void macvlan_set_addr_change(struct macvlan_port *port)
  76. {
  77. port->flags |= MACVLAN_F_ADDRCHANGE;
  78. }
  79. static inline void macvlan_clear_addr_change(struct macvlan_port *port)
  80. {
  81. port->flags &= ~MACVLAN_F_ADDRCHANGE;
  82. }
  83. /* Hash Ethernet address */
  84. static u32 macvlan_eth_hash(const unsigned char *addr)
  85. {
  86. u64 value = get_unaligned((u64 *)addr);
  87. /* only want 6 bytes */
  88. #ifdef __BIG_ENDIAN
  89. value >>= 16;
  90. #else
  91. value <<= 16;
  92. #endif
  93. return hash_64(value, MACVLAN_HASH_BITS);
  94. }
  95. static struct macvlan_port *macvlan_port_get_rcu(const struct net_device *dev)
  96. {
  97. return rcu_dereference(dev->rx_handler_data);
  98. }
  99. static struct macvlan_port *macvlan_port_get_rtnl(const struct net_device *dev)
  100. {
  101. return rtnl_dereference(dev->rx_handler_data);
  102. }
  103. static struct macvlan_dev *macvlan_hash_lookup(const struct macvlan_port *port,
  104. const unsigned char *addr)
  105. {
  106. struct macvlan_dev *vlan;
  107. u32 idx = macvlan_eth_hash(addr);
  108. hlist_for_each_entry_rcu(vlan, &port->vlan_hash[idx], hlist,
  109. lockdep_rtnl_is_held()) {
  110. if (ether_addr_equal_64bits(vlan->dev->dev_addr, addr))
  111. return vlan;
  112. }
  113. return NULL;
  114. }
  115. static struct macvlan_source_entry *macvlan_hash_lookup_source(
  116. const struct macvlan_dev *vlan,
  117. const unsigned char *addr)
  118. {
  119. struct macvlan_source_entry *entry;
  120. u32 idx = macvlan_eth_hash(addr);
  121. struct hlist_head *h = &vlan->port->vlan_source_hash[idx];
  122. hlist_for_each_entry_rcu(entry, h, hlist) {
  123. if (ether_addr_equal_64bits(entry->addr, addr) &&
  124. entry->vlan == vlan)
  125. return entry;
  126. }
  127. return NULL;
  128. }
  129. static int macvlan_hash_add_source(struct macvlan_dev *vlan,
  130. const unsigned char *addr)
  131. {
  132. struct macvlan_port *port = vlan->port;
  133. struct macvlan_source_entry *entry;
  134. struct hlist_head *h;
  135. entry = macvlan_hash_lookup_source(vlan, addr);
  136. if (entry)
  137. return 0;
  138. entry = kmalloc(sizeof(*entry), GFP_KERNEL);
  139. if (!entry)
  140. return -ENOMEM;
  141. ether_addr_copy(entry->addr, addr);
  142. entry->vlan = vlan;
  143. h = &port->vlan_source_hash[macvlan_eth_hash(addr)];
  144. hlist_add_head_rcu(&entry->hlist, h);
  145. vlan->macaddr_count++;
  146. return 0;
  147. }
  148. static void macvlan_hash_add(struct macvlan_dev *vlan)
  149. {
  150. struct macvlan_port *port = vlan->port;
  151. const unsigned char *addr = vlan->dev->dev_addr;
  152. u32 idx = macvlan_eth_hash(addr);
  153. hlist_add_head_rcu(&vlan->hlist, &port->vlan_hash[idx]);
  154. }
  155. static void macvlan_hash_del_source(struct macvlan_source_entry *entry)
  156. {
  157. hlist_del_rcu(&entry->hlist);
  158. kfree_rcu(entry, rcu);
  159. }
  160. static void macvlan_hash_del(struct macvlan_dev *vlan, bool sync)
  161. {
  162. hlist_del_rcu(&vlan->hlist);
  163. if (sync)
  164. synchronize_rcu();
  165. }
  166. static void macvlan_hash_change_addr(struct macvlan_dev *vlan,
  167. const unsigned char *addr)
  168. {
  169. macvlan_hash_del(vlan, true);
  170. /* Now that we are unhashed it is safe to change the device
  171. * address without confusing packet delivery.
  172. */
  173. memcpy(vlan->dev->dev_addr, addr, ETH_ALEN);
  174. macvlan_hash_add(vlan);
  175. }
  176. static bool macvlan_addr_busy(const struct macvlan_port *port,
  177. const unsigned char *addr)
  178. {
  179. /* Test to see if the specified address is
  180. * currently in use by the underlying device or
  181. * another macvlan.
  182. */
  183. if (!macvlan_passthru(port) && !macvlan_addr_change(port) &&
  184. ether_addr_equal_64bits(port->dev->dev_addr, addr))
  185. return true;
  186. if (macvlan_hash_lookup(port, addr))
  187. return true;
  188. return false;
  189. }
  190. static int macvlan_broadcast_one(struct sk_buff *skb,
  191. const struct macvlan_dev *vlan,
  192. const struct ethhdr *eth, bool local)
  193. {
  194. struct net_device *dev = vlan->dev;
  195. if (local)
  196. return __dev_forward_skb(dev, skb);
  197. skb->dev = dev;
  198. if (ether_addr_equal_64bits(eth->h_dest, dev->broadcast))
  199. skb->pkt_type = PACKET_BROADCAST;
  200. else
  201. skb->pkt_type = PACKET_MULTICAST;
  202. return 0;
  203. }
  204. static u32 macvlan_hash_mix(const struct macvlan_dev *vlan)
  205. {
  206. return (u32)(((unsigned long)vlan) >> L1_CACHE_SHIFT);
  207. }
  208. static unsigned int mc_hash(const struct macvlan_dev *vlan,
  209. const unsigned char *addr)
  210. {
  211. u32 val = __get_unaligned_cpu32(addr + 2);
  212. val ^= macvlan_hash_mix(vlan);
  213. return hash_32(val, MACVLAN_MC_FILTER_BITS);
  214. }
  215. static void macvlan_broadcast(struct sk_buff *skb,
  216. const struct macvlan_port *port,
  217. struct net_device *src,
  218. enum macvlan_mode mode)
  219. {
  220. const struct ethhdr *eth = eth_hdr(skb);
  221. const struct macvlan_dev *vlan;
  222. struct sk_buff *nskb;
  223. unsigned int i;
  224. int err;
  225. unsigned int hash;
  226. if (skb->protocol == htons(ETH_P_PAUSE))
  227. return;
  228. for (i = 0; i < MACVLAN_HASH_SIZE; i++) {
  229. hlist_for_each_entry_rcu(vlan, &port->vlan_hash[i], hlist) {
  230. if (vlan->dev == src || !(vlan->mode & mode))
  231. continue;
  232. hash = mc_hash(vlan, eth->h_dest);
  233. if (!test_bit(hash, vlan->mc_filter))
  234. continue;
  235. err = NET_RX_DROP;
  236. nskb = skb_clone(skb, GFP_ATOMIC);
  237. if (likely(nskb))
  238. err = macvlan_broadcast_one(
  239. nskb, vlan, eth,
  240. mode == MACVLAN_MODE_BRIDGE) ?:
  241. netif_rx_ni(nskb);
  242. macvlan_count_rx(vlan, skb->len + ETH_HLEN,
  243. err == NET_RX_SUCCESS, true);
  244. }
  245. }
  246. }
  247. static void macvlan_process_broadcast(struct work_struct *w)
  248. {
  249. struct macvlan_port *port = container_of(w, struct macvlan_port,
  250. bc_work);
  251. struct sk_buff *skb;
  252. struct sk_buff_head list;
  253. __skb_queue_head_init(&list);
  254. spin_lock_bh(&port->bc_queue.lock);
  255. skb_queue_splice_tail_init(&port->bc_queue, &list);
  256. spin_unlock_bh(&port->bc_queue.lock);
  257. while ((skb = __skb_dequeue(&list))) {
  258. const struct macvlan_dev *src = MACVLAN_SKB_CB(skb)->src;
  259. rcu_read_lock();
  260. if (!src)
  261. /* frame comes from an external address */
  262. macvlan_broadcast(skb, port, NULL,
  263. MACVLAN_MODE_PRIVATE |
  264. MACVLAN_MODE_VEPA |
  265. MACVLAN_MODE_PASSTHRU|
  266. MACVLAN_MODE_BRIDGE);
  267. else if (src->mode == MACVLAN_MODE_VEPA)
  268. /* flood to everyone except source */
  269. macvlan_broadcast(skb, port, src->dev,
  270. MACVLAN_MODE_VEPA |
  271. MACVLAN_MODE_BRIDGE);
  272. else
  273. /*
  274. * flood only to VEPA ports, bridge ports
  275. * already saw the frame on the way out.
  276. */
  277. macvlan_broadcast(skb, port, src->dev,
  278. MACVLAN_MODE_VEPA);
  279. rcu_read_unlock();
  280. if (src)
  281. dev_put(src->dev);
  282. consume_skb(skb);
  283. cond_resched();
  284. }
  285. }
  286. static void macvlan_broadcast_enqueue(struct macvlan_port *port,
  287. const struct macvlan_dev *src,
  288. struct sk_buff *skb)
  289. {
  290. struct sk_buff *nskb;
  291. int err = -ENOMEM;
  292. nskb = skb_clone(skb, GFP_ATOMIC);
  293. if (!nskb)
  294. goto err;
  295. MACVLAN_SKB_CB(nskb)->src = src;
  296. spin_lock(&port->bc_queue.lock);
  297. if (skb_queue_len(&port->bc_queue) < MACVLAN_BC_QUEUE_LEN) {
  298. if (src)
  299. dev_hold(src->dev);
  300. __skb_queue_tail(&port->bc_queue, nskb);
  301. err = 0;
  302. }
  303. spin_unlock(&port->bc_queue.lock);
  304. schedule_work(&port->bc_work);
  305. if (err)
  306. goto free_nskb;
  307. return;
  308. free_nskb:
  309. kfree_skb(nskb);
  310. err:
  311. atomic_long_inc(&skb->dev->rx_dropped);
  312. }
  313. static void macvlan_flush_sources(struct macvlan_port *port,
  314. struct macvlan_dev *vlan)
  315. {
  316. int i;
  317. for (i = 0; i < MACVLAN_HASH_SIZE; i++) {
  318. struct hlist_node *h, *n;
  319. hlist_for_each_safe(h, n, &port->vlan_source_hash[i]) {
  320. struct macvlan_source_entry *entry;
  321. entry = hlist_entry(h, struct macvlan_source_entry,
  322. hlist);
  323. if (entry->vlan == vlan)
  324. macvlan_hash_del_source(entry);
  325. }
  326. }
  327. vlan->macaddr_count = 0;
  328. }
  329. static void macvlan_forward_source_one(struct sk_buff *skb,
  330. struct macvlan_dev *vlan)
  331. {
  332. struct sk_buff *nskb;
  333. struct net_device *dev;
  334. int len;
  335. int ret;
  336. dev = vlan->dev;
  337. if (unlikely(!(dev->flags & IFF_UP)))
  338. return;
  339. nskb = skb_clone(skb, GFP_ATOMIC);
  340. if (!nskb)
  341. return;
  342. len = nskb->len + ETH_HLEN;
  343. nskb->dev = dev;
  344. if (ether_addr_equal_64bits(eth_hdr(skb)->h_dest, dev->dev_addr))
  345. nskb->pkt_type = PACKET_HOST;
  346. ret = netif_rx(nskb);
  347. macvlan_count_rx(vlan, len, ret == NET_RX_SUCCESS, false);
  348. }
  349. static void macvlan_forward_source(struct sk_buff *skb,
  350. struct macvlan_port *port,
  351. const unsigned char *addr)
  352. {
  353. struct macvlan_source_entry *entry;
  354. u32 idx = macvlan_eth_hash(addr);
  355. struct hlist_head *h = &port->vlan_source_hash[idx];
  356. hlist_for_each_entry_rcu(entry, h, hlist) {
  357. if (ether_addr_equal_64bits(entry->addr, addr))
  358. macvlan_forward_source_one(skb, entry->vlan);
  359. }
  360. }
  361. /* called under rcu_read_lock() from netif_receive_skb */
  362. static rx_handler_result_t macvlan_handle_frame(struct sk_buff **pskb)
  363. {
  364. struct macvlan_port *port;
  365. struct sk_buff *skb = *pskb;
  366. const struct ethhdr *eth = eth_hdr(skb);
  367. const struct macvlan_dev *vlan;
  368. const struct macvlan_dev *src;
  369. struct net_device *dev;
  370. unsigned int len = 0;
  371. int ret;
  372. rx_handler_result_t handle_res;
  373. /* Packets from dev_loopback_xmit() do not have L2 header, bail out */
  374. if (unlikely(skb->pkt_type == PACKET_LOOPBACK))
  375. return RX_HANDLER_PASS;
  376. port = macvlan_port_get_rcu(skb->dev);
  377. if (is_multicast_ether_addr(eth->h_dest)) {
  378. unsigned int hash;
  379. skb = ip_check_defrag(dev_net(skb->dev), skb, IP_DEFRAG_MACVLAN);
  380. if (!skb)
  381. return RX_HANDLER_CONSUMED;
  382. *pskb = skb;
  383. eth = eth_hdr(skb);
  384. macvlan_forward_source(skb, port, eth->h_source);
  385. src = macvlan_hash_lookup(port, eth->h_source);
  386. if (src && src->mode != MACVLAN_MODE_VEPA &&
  387. src->mode != MACVLAN_MODE_BRIDGE) {
  388. /* forward to original port. */
  389. vlan = src;
  390. ret = macvlan_broadcast_one(skb, vlan, eth, 0) ?:
  391. netif_rx(skb);
  392. handle_res = RX_HANDLER_CONSUMED;
  393. goto out;
  394. }
  395. hash = mc_hash(NULL, eth->h_dest);
  396. if (test_bit(hash, port->mc_filter))
  397. macvlan_broadcast_enqueue(port, src, skb);
  398. return RX_HANDLER_PASS;
  399. }
  400. macvlan_forward_source(skb, port, eth->h_source);
  401. if (macvlan_passthru(port))
  402. vlan = list_first_or_null_rcu(&port->vlans,
  403. struct macvlan_dev, list);
  404. else
  405. vlan = macvlan_hash_lookup(port, eth->h_dest);
  406. if (!vlan || vlan->mode == MACVLAN_MODE_SOURCE)
  407. return RX_HANDLER_PASS;
  408. dev = vlan->dev;
  409. if (unlikely(!(dev->flags & IFF_UP))) {
  410. kfree_skb(skb);
  411. return RX_HANDLER_CONSUMED;
  412. }
  413. len = skb->len + ETH_HLEN;
  414. skb = skb_share_check(skb, GFP_ATOMIC);
  415. if (!skb) {
  416. ret = NET_RX_DROP;
  417. handle_res = RX_HANDLER_CONSUMED;
  418. goto out;
  419. }
  420. *pskb = skb;
  421. skb->dev = dev;
  422. skb->pkt_type = PACKET_HOST;
  423. ret = NET_RX_SUCCESS;
  424. handle_res = RX_HANDLER_ANOTHER;
  425. out:
  426. macvlan_count_rx(vlan, len, ret == NET_RX_SUCCESS, false);
  427. return handle_res;
  428. }
  429. static int macvlan_queue_xmit(struct sk_buff *skb, struct net_device *dev)
  430. {
  431. const struct macvlan_dev *vlan = netdev_priv(dev);
  432. const struct macvlan_port *port = vlan->port;
  433. const struct macvlan_dev *dest;
  434. if (vlan->mode == MACVLAN_MODE_BRIDGE) {
  435. const struct ethhdr *eth = skb_eth_hdr(skb);
  436. /* send to other bridge ports directly */
  437. if (is_multicast_ether_addr(eth->h_dest)) {
  438. skb_reset_mac_header(skb);
  439. macvlan_broadcast(skb, port, dev, MACVLAN_MODE_BRIDGE);
  440. goto xmit_world;
  441. }
  442. dest = macvlan_hash_lookup(port, eth->h_dest);
  443. if (dest && dest->mode == MACVLAN_MODE_BRIDGE) {
  444. /* send to lowerdev first for its network taps */
  445. dev_forward_skb(vlan->lowerdev, skb);
  446. return NET_XMIT_SUCCESS;
  447. }
  448. }
  449. xmit_world:
  450. skb->dev = vlan->lowerdev;
  451. return dev_queue_xmit_accel(skb,
  452. netdev_get_sb_channel(dev) ? dev : NULL);
  453. }
  454. static inline netdev_tx_t macvlan_netpoll_send_skb(struct macvlan_dev *vlan, struct sk_buff *skb)
  455. {
  456. #ifdef CONFIG_NET_POLL_CONTROLLER
  457. return netpoll_send_skb(vlan->netpoll, skb);
  458. #else
  459. BUG();
  460. return NETDEV_TX_OK;
  461. #endif
  462. }
  463. static netdev_tx_t macvlan_start_xmit(struct sk_buff *skb,
  464. struct net_device *dev)
  465. {
  466. struct macvlan_dev *vlan = netdev_priv(dev);
  467. unsigned int len = skb->len;
  468. int ret;
  469. if (unlikely(netpoll_tx_running(dev)))
  470. return macvlan_netpoll_send_skb(vlan, skb);
  471. ret = macvlan_queue_xmit(skb, dev);
  472. if (likely(ret == NET_XMIT_SUCCESS || ret == NET_XMIT_CN)) {
  473. struct vlan_pcpu_stats *pcpu_stats;
  474. pcpu_stats = this_cpu_ptr(vlan->pcpu_stats);
  475. u64_stats_update_begin(&pcpu_stats->syncp);
  476. pcpu_stats->tx_packets++;
  477. pcpu_stats->tx_bytes += len;
  478. u64_stats_update_end(&pcpu_stats->syncp);
  479. } else {
  480. this_cpu_inc(vlan->pcpu_stats->tx_dropped);
  481. }
  482. return ret;
  483. }
  484. static int macvlan_hard_header(struct sk_buff *skb, struct net_device *dev,
  485. unsigned short type, const void *daddr,
  486. const void *saddr, unsigned len)
  487. {
  488. const struct macvlan_dev *vlan = netdev_priv(dev);
  489. struct net_device *lowerdev = vlan->lowerdev;
  490. return dev_hard_header(skb, lowerdev, type, daddr,
  491. saddr ? : dev->dev_addr, len);
  492. }
  493. static const struct header_ops macvlan_hard_header_ops = {
  494. .create = macvlan_hard_header,
  495. .parse = eth_header_parse,
  496. .cache = eth_header_cache,
  497. .cache_update = eth_header_cache_update,
  498. };
  499. static int macvlan_open(struct net_device *dev)
  500. {
  501. struct macvlan_dev *vlan = netdev_priv(dev);
  502. struct net_device *lowerdev = vlan->lowerdev;
  503. int err;
  504. if (macvlan_passthru(vlan->port)) {
  505. if (!(vlan->flags & MACVLAN_FLAG_NOPROMISC)) {
  506. err = dev_set_promiscuity(lowerdev, 1);
  507. if (err < 0)
  508. goto out;
  509. }
  510. goto hash_add;
  511. }
  512. err = -EADDRINUSE;
  513. if (macvlan_addr_busy(vlan->port, dev->dev_addr))
  514. goto out;
  515. /* Attempt to populate accel_priv which is used to offload the L2
  516. * forwarding requests for unicast packets.
  517. */
  518. if (lowerdev->features & NETIF_F_HW_L2FW_DOFFLOAD)
  519. vlan->accel_priv =
  520. lowerdev->netdev_ops->ndo_dfwd_add_station(lowerdev, dev);
  521. /* If earlier attempt to offload failed, or accel_priv is not
  522. * populated we must add the unicast address to the lower device.
  523. */
  524. if (IS_ERR_OR_NULL(vlan->accel_priv)) {
  525. vlan->accel_priv = NULL;
  526. err = dev_uc_add(lowerdev, dev->dev_addr);
  527. if (err < 0)
  528. goto out;
  529. }
  530. if (dev->flags & IFF_ALLMULTI) {
  531. err = dev_set_allmulti(lowerdev, 1);
  532. if (err < 0)
  533. goto del_unicast;
  534. }
  535. if (dev->flags & IFF_PROMISC) {
  536. err = dev_set_promiscuity(lowerdev, 1);
  537. if (err < 0)
  538. goto clear_multi;
  539. }
  540. hash_add:
  541. macvlan_hash_add(vlan);
  542. return 0;
  543. clear_multi:
  544. if (dev->flags & IFF_ALLMULTI)
  545. dev_set_allmulti(lowerdev, -1);
  546. del_unicast:
  547. if (vlan->accel_priv) {
  548. lowerdev->netdev_ops->ndo_dfwd_del_station(lowerdev,
  549. vlan->accel_priv);
  550. vlan->accel_priv = NULL;
  551. } else {
  552. dev_uc_del(lowerdev, dev->dev_addr);
  553. }
  554. out:
  555. return err;
  556. }
  557. static int macvlan_stop(struct net_device *dev)
  558. {
  559. struct macvlan_dev *vlan = netdev_priv(dev);
  560. struct net_device *lowerdev = vlan->lowerdev;
  561. if (vlan->accel_priv) {
  562. lowerdev->netdev_ops->ndo_dfwd_del_station(lowerdev,
  563. vlan->accel_priv);
  564. vlan->accel_priv = NULL;
  565. }
  566. dev_uc_unsync(lowerdev, dev);
  567. dev_mc_unsync(lowerdev, dev);
  568. if (macvlan_passthru(vlan->port)) {
  569. if (!(vlan->flags & MACVLAN_FLAG_NOPROMISC))
  570. dev_set_promiscuity(lowerdev, -1);
  571. goto hash_del;
  572. }
  573. if (dev->flags & IFF_ALLMULTI)
  574. dev_set_allmulti(lowerdev, -1);
  575. if (dev->flags & IFF_PROMISC)
  576. dev_set_promiscuity(lowerdev, -1);
  577. dev_uc_del(lowerdev, dev->dev_addr);
  578. hash_del:
  579. macvlan_hash_del(vlan, !dev->dismantle);
  580. return 0;
  581. }
  582. static int macvlan_sync_address(struct net_device *dev, unsigned char *addr)
  583. {
  584. struct macvlan_dev *vlan = netdev_priv(dev);
  585. struct net_device *lowerdev = vlan->lowerdev;
  586. struct macvlan_port *port = vlan->port;
  587. int err;
  588. if (!(dev->flags & IFF_UP)) {
  589. /* Just copy in the new address */
  590. ether_addr_copy(dev->dev_addr, addr);
  591. } else {
  592. /* Rehash and update the device filters */
  593. if (macvlan_addr_busy(vlan->port, addr))
  594. return -EADDRINUSE;
  595. if (!macvlan_passthru(port)) {
  596. err = dev_uc_add(lowerdev, addr);
  597. if (err)
  598. return err;
  599. dev_uc_del(lowerdev, dev->dev_addr);
  600. }
  601. macvlan_hash_change_addr(vlan, addr);
  602. }
  603. if (macvlan_passthru(port) && !macvlan_addr_change(port)) {
  604. /* Since addr_change isn't set, we are here due to lower
  605. * device change. Save the lower-dev address so we can
  606. * restore it later.
  607. */
  608. ether_addr_copy(vlan->port->perm_addr,
  609. lowerdev->dev_addr);
  610. }
  611. macvlan_clear_addr_change(port);
  612. return 0;
  613. }
  614. static int macvlan_set_mac_address(struct net_device *dev, void *p)
  615. {
  616. struct macvlan_dev *vlan = netdev_priv(dev);
  617. struct sockaddr *addr = p;
  618. if (!is_valid_ether_addr(addr->sa_data))
  619. return -EADDRNOTAVAIL;
  620. /* If the addresses are the same, this is a no-op */
  621. if (ether_addr_equal(dev->dev_addr, addr->sa_data))
  622. return 0;
  623. if (vlan->mode == MACVLAN_MODE_PASSTHRU) {
  624. macvlan_set_addr_change(vlan->port);
  625. return dev_set_mac_address(vlan->lowerdev, addr, NULL);
  626. }
  627. if (macvlan_addr_busy(vlan->port, addr->sa_data))
  628. return -EADDRINUSE;
  629. return macvlan_sync_address(dev, addr->sa_data);
  630. }
  631. static void macvlan_change_rx_flags(struct net_device *dev, int change)
  632. {
  633. struct macvlan_dev *vlan = netdev_priv(dev);
  634. struct net_device *lowerdev = vlan->lowerdev;
  635. if (dev->flags & IFF_UP) {
  636. if (change & IFF_ALLMULTI)
  637. dev_set_allmulti(lowerdev, dev->flags & IFF_ALLMULTI ? 1 : -1);
  638. if (change & IFF_PROMISC)
  639. dev_set_promiscuity(lowerdev,
  640. dev->flags & IFF_PROMISC ? 1 : -1);
  641. }
  642. }
  643. static void macvlan_compute_filter(unsigned long *mc_filter,
  644. struct net_device *dev,
  645. struct macvlan_dev *vlan)
  646. {
  647. if (dev->flags & (IFF_PROMISC | IFF_ALLMULTI)) {
  648. bitmap_fill(mc_filter, MACVLAN_MC_FILTER_SZ);
  649. } else {
  650. struct netdev_hw_addr *ha;
  651. DECLARE_BITMAP(filter, MACVLAN_MC_FILTER_SZ);
  652. bitmap_zero(filter, MACVLAN_MC_FILTER_SZ);
  653. netdev_for_each_mc_addr(ha, dev) {
  654. __set_bit(mc_hash(vlan, ha->addr), filter);
  655. }
  656. __set_bit(mc_hash(vlan, dev->broadcast), filter);
  657. bitmap_copy(mc_filter, filter, MACVLAN_MC_FILTER_SZ);
  658. }
  659. }
  660. static void macvlan_set_mac_lists(struct net_device *dev)
  661. {
  662. struct macvlan_dev *vlan = netdev_priv(dev);
  663. macvlan_compute_filter(vlan->mc_filter, dev, vlan);
  664. dev_uc_sync(vlan->lowerdev, dev);
  665. dev_mc_sync(vlan->lowerdev, dev);
  666. /* This is slightly inaccurate as we're including the subscription
  667. * list of vlan->lowerdev too.
  668. *
  669. * Bug alert: This only works if everyone has the same broadcast
  670. * address as lowerdev. As soon as someone changes theirs this
  671. * will break.
  672. *
  673. * However, this is already broken as when you change your broadcast
  674. * address we don't get called.
  675. *
  676. * The solution is to maintain a list of broadcast addresses like
  677. * we do for uc/mc, if you care.
  678. */
  679. macvlan_compute_filter(vlan->port->mc_filter, vlan->lowerdev, NULL);
  680. }
  681. static int macvlan_change_mtu(struct net_device *dev, int new_mtu)
  682. {
  683. struct macvlan_dev *vlan = netdev_priv(dev);
  684. if (vlan->lowerdev->mtu < new_mtu)
  685. return -EINVAL;
  686. dev->mtu = new_mtu;
  687. return 0;
  688. }
  689. static int macvlan_do_ioctl(struct net_device *dev, struct ifreq *ifr, int cmd)
  690. {
  691. struct net_device *real_dev = macvlan_dev_real_dev(dev);
  692. const struct net_device_ops *ops = real_dev->netdev_ops;
  693. struct ifreq ifrr;
  694. int err = -EOPNOTSUPP;
  695. strscpy(ifrr.ifr_name, real_dev->name, IFNAMSIZ);
  696. ifrr.ifr_ifru = ifr->ifr_ifru;
  697. switch (cmd) {
  698. case SIOCSHWTSTAMP:
  699. if (!net_eq(dev_net(dev), &init_net))
  700. break;
  701. fallthrough;
  702. case SIOCGHWTSTAMP:
  703. if (netif_device_present(real_dev) && ops->ndo_do_ioctl)
  704. err = ops->ndo_do_ioctl(real_dev, &ifrr, cmd);
  705. break;
  706. }
  707. if (!err)
  708. ifr->ifr_ifru = ifrr.ifr_ifru;
  709. return err;
  710. }
  711. /*
  712. * macvlan network devices have devices nesting below it and are a special
  713. * "super class" of normal network devices; split their locks off into a
  714. * separate class since they always nest.
  715. */
  716. static struct lock_class_key macvlan_netdev_addr_lock_key;
  717. #define ALWAYS_ON_OFFLOADS \
  718. (NETIF_F_SG | NETIF_F_HW_CSUM | NETIF_F_GSO_SOFTWARE | \
  719. NETIF_F_GSO_ROBUST | NETIF_F_GSO_ENCAP_ALL)
  720. #define ALWAYS_ON_FEATURES (ALWAYS_ON_OFFLOADS | NETIF_F_LLTX)
  721. #define MACVLAN_FEATURES \
  722. (NETIF_F_SG | NETIF_F_HW_CSUM | NETIF_F_HIGHDMA | NETIF_F_FRAGLIST | \
  723. NETIF_F_GSO | NETIF_F_TSO | NETIF_F_LRO | \
  724. NETIF_F_TSO_ECN | NETIF_F_TSO6 | NETIF_F_GRO | NETIF_F_RXCSUM | \
  725. NETIF_F_HW_VLAN_CTAG_FILTER | NETIF_F_HW_VLAN_STAG_FILTER)
  726. #define MACVLAN_STATE_MASK \
  727. ((1<<__LINK_STATE_NOCARRIER) | (1<<__LINK_STATE_DORMANT))
  728. static void macvlan_set_lockdep_class(struct net_device *dev)
  729. {
  730. netdev_lockdep_set_classes(dev);
  731. lockdep_set_class(&dev->addr_list_lock,
  732. &macvlan_netdev_addr_lock_key);
  733. }
  734. static int macvlan_init(struct net_device *dev)
  735. {
  736. struct macvlan_dev *vlan = netdev_priv(dev);
  737. const struct net_device *lowerdev = vlan->lowerdev;
  738. struct macvlan_port *port = vlan->port;
  739. dev->state = (dev->state & ~MACVLAN_STATE_MASK) |
  740. (lowerdev->state & MACVLAN_STATE_MASK);
  741. dev->features = lowerdev->features & MACVLAN_FEATURES;
  742. dev->features |= ALWAYS_ON_FEATURES;
  743. dev->hw_features |= NETIF_F_LRO;
  744. dev->vlan_features = lowerdev->vlan_features & MACVLAN_FEATURES;
  745. dev->vlan_features |= ALWAYS_ON_OFFLOADS;
  746. dev->hw_enc_features |= dev->features;
  747. dev->gso_max_size = lowerdev->gso_max_size;
  748. dev->gso_max_segs = lowerdev->gso_max_segs;
  749. dev->hard_header_len = lowerdev->hard_header_len;
  750. macvlan_set_lockdep_class(dev);
  751. vlan->pcpu_stats = netdev_alloc_pcpu_stats(struct vlan_pcpu_stats);
  752. if (!vlan->pcpu_stats)
  753. return -ENOMEM;
  754. port->count += 1;
  755. return 0;
  756. }
  757. static void macvlan_uninit(struct net_device *dev)
  758. {
  759. struct macvlan_dev *vlan = netdev_priv(dev);
  760. struct macvlan_port *port = vlan->port;
  761. free_percpu(vlan->pcpu_stats);
  762. macvlan_flush_sources(port, vlan);
  763. port->count -= 1;
  764. if (!port->count)
  765. macvlan_port_destroy(port->dev);
  766. }
  767. static void macvlan_dev_get_stats64(struct net_device *dev,
  768. struct rtnl_link_stats64 *stats)
  769. {
  770. struct macvlan_dev *vlan = netdev_priv(dev);
  771. if (vlan->pcpu_stats) {
  772. struct vlan_pcpu_stats *p;
  773. u64 rx_packets, rx_bytes, rx_multicast, tx_packets, tx_bytes;
  774. u32 rx_errors = 0, tx_dropped = 0;
  775. unsigned int start;
  776. int i;
  777. for_each_possible_cpu(i) {
  778. p = per_cpu_ptr(vlan->pcpu_stats, i);
  779. do {
  780. start = u64_stats_fetch_begin_irq(&p->syncp);
  781. rx_packets = p->rx_packets;
  782. rx_bytes = p->rx_bytes;
  783. rx_multicast = p->rx_multicast;
  784. tx_packets = p->tx_packets;
  785. tx_bytes = p->tx_bytes;
  786. } while (u64_stats_fetch_retry_irq(&p->syncp, start));
  787. stats->rx_packets += rx_packets;
  788. stats->rx_bytes += rx_bytes;
  789. stats->multicast += rx_multicast;
  790. stats->tx_packets += tx_packets;
  791. stats->tx_bytes += tx_bytes;
  792. /* rx_errors & tx_dropped are u32, updated
  793. * without syncp protection.
  794. */
  795. rx_errors += p->rx_errors;
  796. tx_dropped += p->tx_dropped;
  797. }
  798. stats->rx_errors = rx_errors;
  799. stats->rx_dropped = rx_errors;
  800. stats->tx_dropped = tx_dropped;
  801. }
  802. }
  803. static int macvlan_vlan_rx_add_vid(struct net_device *dev,
  804. __be16 proto, u16 vid)
  805. {
  806. struct macvlan_dev *vlan = netdev_priv(dev);
  807. struct net_device *lowerdev = vlan->lowerdev;
  808. return vlan_vid_add(lowerdev, proto, vid);
  809. }
  810. static int macvlan_vlan_rx_kill_vid(struct net_device *dev,
  811. __be16 proto, u16 vid)
  812. {
  813. struct macvlan_dev *vlan = netdev_priv(dev);
  814. struct net_device *lowerdev = vlan->lowerdev;
  815. vlan_vid_del(lowerdev, proto, vid);
  816. return 0;
  817. }
  818. static int macvlan_fdb_add(struct ndmsg *ndm, struct nlattr *tb[],
  819. struct net_device *dev,
  820. const unsigned char *addr, u16 vid,
  821. u16 flags,
  822. struct netlink_ext_ack *extack)
  823. {
  824. struct macvlan_dev *vlan = netdev_priv(dev);
  825. int err = -EINVAL;
  826. /* Support unicast filter only on passthru devices.
  827. * Multicast filter should be allowed on all devices.
  828. */
  829. if (!macvlan_passthru(vlan->port) && is_unicast_ether_addr(addr))
  830. return -EOPNOTSUPP;
  831. if (flags & NLM_F_REPLACE)
  832. return -EOPNOTSUPP;
  833. if (is_unicast_ether_addr(addr))
  834. err = dev_uc_add_excl(dev, addr);
  835. else if (is_multicast_ether_addr(addr))
  836. err = dev_mc_add_excl(dev, addr);
  837. return err;
  838. }
  839. static int macvlan_fdb_del(struct ndmsg *ndm, struct nlattr *tb[],
  840. struct net_device *dev,
  841. const unsigned char *addr, u16 vid)
  842. {
  843. struct macvlan_dev *vlan = netdev_priv(dev);
  844. int err = -EINVAL;
  845. /* Support unicast filter only on passthru devices.
  846. * Multicast filter should be allowed on all devices.
  847. */
  848. if (!macvlan_passthru(vlan->port) && is_unicast_ether_addr(addr))
  849. return -EOPNOTSUPP;
  850. if (is_unicast_ether_addr(addr))
  851. err = dev_uc_del(dev, addr);
  852. else if (is_multicast_ether_addr(addr))
  853. err = dev_mc_del(dev, addr);
  854. return err;
  855. }
  856. static void macvlan_ethtool_get_drvinfo(struct net_device *dev,
  857. struct ethtool_drvinfo *drvinfo)
  858. {
  859. strlcpy(drvinfo->driver, "macvlan", sizeof(drvinfo->driver));
  860. strlcpy(drvinfo->version, "0.1", sizeof(drvinfo->version));
  861. }
  862. static int macvlan_ethtool_get_link_ksettings(struct net_device *dev,
  863. struct ethtool_link_ksettings *cmd)
  864. {
  865. const struct macvlan_dev *vlan = netdev_priv(dev);
  866. return __ethtool_get_link_ksettings(vlan->lowerdev, cmd);
  867. }
  868. static int macvlan_ethtool_get_ts_info(struct net_device *dev,
  869. struct ethtool_ts_info *info)
  870. {
  871. struct net_device *real_dev = macvlan_dev_real_dev(dev);
  872. const struct ethtool_ops *ops = real_dev->ethtool_ops;
  873. struct phy_device *phydev = real_dev->phydev;
  874. if (phy_has_tsinfo(phydev)) {
  875. return phy_ts_info(phydev, info);
  876. } else if (ops->get_ts_info) {
  877. return ops->get_ts_info(real_dev, info);
  878. } else {
  879. info->so_timestamping = SOF_TIMESTAMPING_RX_SOFTWARE |
  880. SOF_TIMESTAMPING_SOFTWARE;
  881. info->phc_index = -1;
  882. }
  883. return 0;
  884. }
  885. static netdev_features_t macvlan_fix_features(struct net_device *dev,
  886. netdev_features_t features)
  887. {
  888. struct macvlan_dev *vlan = netdev_priv(dev);
  889. netdev_features_t lowerdev_features = vlan->lowerdev->features;
  890. netdev_features_t mask;
  891. features |= NETIF_F_ALL_FOR_ALL;
  892. features &= (vlan->set_features | ~MACVLAN_FEATURES);
  893. mask = features;
  894. lowerdev_features &= (features | ~NETIF_F_LRO);
  895. features = netdev_increment_features(lowerdev_features, features, mask);
  896. features |= ALWAYS_ON_FEATURES;
  897. features &= (ALWAYS_ON_FEATURES | MACVLAN_FEATURES);
  898. return features;
  899. }
  900. #ifdef CONFIG_NET_POLL_CONTROLLER
  901. static void macvlan_dev_poll_controller(struct net_device *dev)
  902. {
  903. return;
  904. }
  905. static int macvlan_dev_netpoll_setup(struct net_device *dev, struct netpoll_info *npinfo)
  906. {
  907. struct macvlan_dev *vlan = netdev_priv(dev);
  908. struct net_device *real_dev = vlan->lowerdev;
  909. struct netpoll *netpoll;
  910. int err = 0;
  911. netpoll = kzalloc(sizeof(*netpoll), GFP_KERNEL);
  912. err = -ENOMEM;
  913. if (!netpoll)
  914. goto out;
  915. err = __netpoll_setup(netpoll, real_dev);
  916. if (err) {
  917. kfree(netpoll);
  918. goto out;
  919. }
  920. vlan->netpoll = netpoll;
  921. out:
  922. return err;
  923. }
  924. static void macvlan_dev_netpoll_cleanup(struct net_device *dev)
  925. {
  926. struct macvlan_dev *vlan = netdev_priv(dev);
  927. struct netpoll *netpoll = vlan->netpoll;
  928. if (!netpoll)
  929. return;
  930. vlan->netpoll = NULL;
  931. __netpoll_free(netpoll);
  932. }
  933. #endif /* CONFIG_NET_POLL_CONTROLLER */
  934. static int macvlan_dev_get_iflink(const struct net_device *dev)
  935. {
  936. struct macvlan_dev *vlan = netdev_priv(dev);
  937. return vlan->lowerdev->ifindex;
  938. }
  939. static const struct ethtool_ops macvlan_ethtool_ops = {
  940. .get_link = ethtool_op_get_link,
  941. .get_link_ksettings = macvlan_ethtool_get_link_ksettings,
  942. .get_drvinfo = macvlan_ethtool_get_drvinfo,
  943. .get_ts_info = macvlan_ethtool_get_ts_info,
  944. };
  945. static const struct net_device_ops macvlan_netdev_ops = {
  946. .ndo_init = macvlan_init,
  947. .ndo_uninit = macvlan_uninit,
  948. .ndo_open = macvlan_open,
  949. .ndo_stop = macvlan_stop,
  950. .ndo_start_xmit = macvlan_start_xmit,
  951. .ndo_change_mtu = macvlan_change_mtu,
  952. .ndo_do_ioctl = macvlan_do_ioctl,
  953. .ndo_fix_features = macvlan_fix_features,
  954. .ndo_change_rx_flags = macvlan_change_rx_flags,
  955. .ndo_set_mac_address = macvlan_set_mac_address,
  956. .ndo_set_rx_mode = macvlan_set_mac_lists,
  957. .ndo_get_stats64 = macvlan_dev_get_stats64,
  958. .ndo_validate_addr = eth_validate_addr,
  959. .ndo_vlan_rx_add_vid = macvlan_vlan_rx_add_vid,
  960. .ndo_vlan_rx_kill_vid = macvlan_vlan_rx_kill_vid,
  961. .ndo_fdb_add = macvlan_fdb_add,
  962. .ndo_fdb_del = macvlan_fdb_del,
  963. .ndo_fdb_dump = ndo_dflt_fdb_dump,
  964. #ifdef CONFIG_NET_POLL_CONTROLLER
  965. .ndo_poll_controller = macvlan_dev_poll_controller,
  966. .ndo_netpoll_setup = macvlan_dev_netpoll_setup,
  967. .ndo_netpoll_cleanup = macvlan_dev_netpoll_cleanup,
  968. #endif
  969. .ndo_get_iflink = macvlan_dev_get_iflink,
  970. .ndo_features_check = passthru_features_check,
  971. .ndo_change_proto_down = dev_change_proto_down_generic,
  972. };
  973. void macvlan_common_setup(struct net_device *dev)
  974. {
  975. ether_setup(dev);
  976. dev->min_mtu = 0;
  977. dev->max_mtu = ETH_MAX_MTU;
  978. dev->priv_flags &= ~IFF_TX_SKB_SHARING;
  979. netif_keep_dst(dev);
  980. dev->priv_flags |= IFF_UNICAST_FLT;
  981. dev->netdev_ops = &macvlan_netdev_ops;
  982. dev->needs_free_netdev = true;
  983. dev->header_ops = &macvlan_hard_header_ops;
  984. dev->ethtool_ops = &macvlan_ethtool_ops;
  985. }
  986. EXPORT_SYMBOL_GPL(macvlan_common_setup);
  987. static void macvlan_setup(struct net_device *dev)
  988. {
  989. macvlan_common_setup(dev);
  990. dev->priv_flags |= IFF_NO_QUEUE;
  991. }
  992. static int macvlan_port_create(struct net_device *dev)
  993. {
  994. struct macvlan_port *port;
  995. unsigned int i;
  996. int err;
  997. if (dev->type != ARPHRD_ETHER || dev->flags & IFF_LOOPBACK)
  998. return -EINVAL;
  999. if (netdev_is_rx_handler_busy(dev))
  1000. return -EBUSY;
  1001. port = kzalloc(sizeof(*port), GFP_KERNEL);
  1002. if (port == NULL)
  1003. return -ENOMEM;
  1004. port->dev = dev;
  1005. ether_addr_copy(port->perm_addr, dev->dev_addr);
  1006. INIT_LIST_HEAD(&port->vlans);
  1007. for (i = 0; i < MACVLAN_HASH_SIZE; i++)
  1008. INIT_HLIST_HEAD(&port->vlan_hash[i]);
  1009. for (i = 0; i < MACVLAN_HASH_SIZE; i++)
  1010. INIT_HLIST_HEAD(&port->vlan_source_hash[i]);
  1011. skb_queue_head_init(&port->bc_queue);
  1012. INIT_WORK(&port->bc_work, macvlan_process_broadcast);
  1013. err = netdev_rx_handler_register(dev, macvlan_handle_frame, port);
  1014. if (err)
  1015. kfree(port);
  1016. else
  1017. dev->priv_flags |= IFF_MACVLAN_PORT;
  1018. return err;
  1019. }
  1020. static void macvlan_port_destroy(struct net_device *dev)
  1021. {
  1022. struct macvlan_port *port = macvlan_port_get_rtnl(dev);
  1023. struct sk_buff *skb;
  1024. dev->priv_flags &= ~IFF_MACVLAN_PORT;
  1025. netdev_rx_handler_unregister(dev);
  1026. /* After this point, no packet can schedule bc_work anymore,
  1027. * but we need to cancel it and purge left skbs if any.
  1028. */
  1029. cancel_work_sync(&port->bc_work);
  1030. while ((skb = __skb_dequeue(&port->bc_queue))) {
  1031. const struct macvlan_dev *src = MACVLAN_SKB_CB(skb)->src;
  1032. if (src)
  1033. dev_put(src->dev);
  1034. kfree_skb(skb);
  1035. }
  1036. /* If the lower device address has been changed by passthru
  1037. * macvlan, put it back.
  1038. */
  1039. if (macvlan_passthru(port) &&
  1040. !ether_addr_equal(port->dev->dev_addr, port->perm_addr)) {
  1041. struct sockaddr sa;
  1042. sa.sa_family = port->dev->type;
  1043. memcpy(&sa.sa_data, port->perm_addr, port->dev->addr_len);
  1044. dev_set_mac_address(port->dev, &sa, NULL);
  1045. }
  1046. kfree(port);
  1047. }
  1048. static int macvlan_validate(struct nlattr *tb[], struct nlattr *data[],
  1049. struct netlink_ext_ack *extack)
  1050. {
  1051. struct nlattr *nla, *head;
  1052. int rem, len;
  1053. if (tb[IFLA_ADDRESS]) {
  1054. if (nla_len(tb[IFLA_ADDRESS]) != ETH_ALEN)
  1055. return -EINVAL;
  1056. if (!is_valid_ether_addr(nla_data(tb[IFLA_ADDRESS])))
  1057. return -EADDRNOTAVAIL;
  1058. }
  1059. if (!data)
  1060. return 0;
  1061. if (data[IFLA_MACVLAN_FLAGS] &&
  1062. nla_get_u16(data[IFLA_MACVLAN_FLAGS]) & ~MACVLAN_FLAG_NOPROMISC)
  1063. return -EINVAL;
  1064. if (data[IFLA_MACVLAN_MODE]) {
  1065. switch (nla_get_u32(data[IFLA_MACVLAN_MODE])) {
  1066. case MACVLAN_MODE_PRIVATE:
  1067. case MACVLAN_MODE_VEPA:
  1068. case MACVLAN_MODE_BRIDGE:
  1069. case MACVLAN_MODE_PASSTHRU:
  1070. case MACVLAN_MODE_SOURCE:
  1071. break;
  1072. default:
  1073. return -EINVAL;
  1074. }
  1075. }
  1076. if (data[IFLA_MACVLAN_MACADDR_MODE]) {
  1077. switch (nla_get_u32(data[IFLA_MACVLAN_MACADDR_MODE])) {
  1078. case MACVLAN_MACADDR_ADD:
  1079. case MACVLAN_MACADDR_DEL:
  1080. case MACVLAN_MACADDR_FLUSH:
  1081. case MACVLAN_MACADDR_SET:
  1082. break;
  1083. default:
  1084. return -EINVAL;
  1085. }
  1086. }
  1087. if (data[IFLA_MACVLAN_MACADDR]) {
  1088. if (nla_len(data[IFLA_MACVLAN_MACADDR]) != ETH_ALEN)
  1089. return -EINVAL;
  1090. if (!is_valid_ether_addr(nla_data(data[IFLA_MACVLAN_MACADDR])))
  1091. return -EADDRNOTAVAIL;
  1092. }
  1093. if (data[IFLA_MACVLAN_MACADDR_DATA]) {
  1094. head = nla_data(data[IFLA_MACVLAN_MACADDR_DATA]);
  1095. len = nla_len(data[IFLA_MACVLAN_MACADDR_DATA]);
  1096. nla_for_each_attr(nla, head, len, rem) {
  1097. if (nla_type(nla) != IFLA_MACVLAN_MACADDR ||
  1098. nla_len(nla) != ETH_ALEN)
  1099. return -EINVAL;
  1100. if (!is_valid_ether_addr(nla_data(nla)))
  1101. return -EADDRNOTAVAIL;
  1102. }
  1103. }
  1104. if (data[IFLA_MACVLAN_MACADDR_COUNT])
  1105. return -EINVAL;
  1106. return 0;
  1107. }
  1108. /**
  1109. * reconfigure list of remote source mac address
  1110. * (only for macvlan devices in source mode)
  1111. * Note regarding alignment: all netlink data is aligned to 4 Byte, which
  1112. * suffices for both ether_addr_copy and ether_addr_equal_64bits usage.
  1113. */
  1114. static int macvlan_changelink_sources(struct macvlan_dev *vlan, u32 mode,
  1115. struct nlattr *data[])
  1116. {
  1117. char *addr = NULL;
  1118. int ret, rem, len;
  1119. struct nlattr *nla, *head;
  1120. struct macvlan_source_entry *entry;
  1121. if (data[IFLA_MACVLAN_MACADDR])
  1122. addr = nla_data(data[IFLA_MACVLAN_MACADDR]);
  1123. if (mode == MACVLAN_MACADDR_ADD) {
  1124. if (!addr)
  1125. return -EINVAL;
  1126. return macvlan_hash_add_source(vlan, addr);
  1127. } else if (mode == MACVLAN_MACADDR_DEL) {
  1128. if (!addr)
  1129. return -EINVAL;
  1130. entry = macvlan_hash_lookup_source(vlan, addr);
  1131. if (entry) {
  1132. macvlan_hash_del_source(entry);
  1133. vlan->macaddr_count--;
  1134. }
  1135. } else if (mode == MACVLAN_MACADDR_FLUSH) {
  1136. macvlan_flush_sources(vlan->port, vlan);
  1137. } else if (mode == MACVLAN_MACADDR_SET) {
  1138. macvlan_flush_sources(vlan->port, vlan);
  1139. if (addr) {
  1140. ret = macvlan_hash_add_source(vlan, addr);
  1141. if (ret)
  1142. return ret;
  1143. }
  1144. if (!data || !data[IFLA_MACVLAN_MACADDR_DATA])
  1145. return 0;
  1146. head = nla_data(data[IFLA_MACVLAN_MACADDR_DATA]);
  1147. len = nla_len(data[IFLA_MACVLAN_MACADDR_DATA]);
  1148. nla_for_each_attr(nla, head, len, rem) {
  1149. addr = nla_data(nla);
  1150. ret = macvlan_hash_add_source(vlan, addr);
  1151. if (ret)
  1152. return ret;
  1153. }
  1154. } else {
  1155. return -EINVAL;
  1156. }
  1157. return 0;
  1158. }
  1159. int macvlan_common_newlink(struct net *src_net, struct net_device *dev,
  1160. struct nlattr *tb[], struct nlattr *data[],
  1161. struct netlink_ext_ack *extack)
  1162. {
  1163. struct macvlan_dev *vlan = netdev_priv(dev);
  1164. struct macvlan_port *port;
  1165. struct net_device *lowerdev;
  1166. int err;
  1167. int macmode;
  1168. bool create = false;
  1169. if (!tb[IFLA_LINK])
  1170. return -EINVAL;
  1171. lowerdev = __dev_get_by_index(src_net, nla_get_u32(tb[IFLA_LINK]));
  1172. if (lowerdev == NULL)
  1173. return -ENODEV;
  1174. /* When creating macvlans or macvtaps on top of other macvlans - use
  1175. * the real device as the lowerdev.
  1176. */
  1177. if (netif_is_macvlan(lowerdev))
  1178. lowerdev = macvlan_dev_real_dev(lowerdev);
  1179. if (!tb[IFLA_MTU])
  1180. dev->mtu = lowerdev->mtu;
  1181. else if (dev->mtu > lowerdev->mtu)
  1182. return -EINVAL;
  1183. /* MTU range: 68 - lowerdev->max_mtu */
  1184. dev->min_mtu = ETH_MIN_MTU;
  1185. dev->max_mtu = lowerdev->max_mtu;
  1186. if (!tb[IFLA_ADDRESS])
  1187. eth_hw_addr_random(dev);
  1188. if (!netif_is_macvlan_port(lowerdev)) {
  1189. err = macvlan_port_create(lowerdev);
  1190. if (err < 0)
  1191. return err;
  1192. create = true;
  1193. }
  1194. port = macvlan_port_get_rtnl(lowerdev);
  1195. /* Only 1 macvlan device can be created in passthru mode */
  1196. if (macvlan_passthru(port)) {
  1197. /* The macvlan port must be not created this time,
  1198. * still goto destroy_macvlan_port for readability.
  1199. */
  1200. err = -EINVAL;
  1201. goto destroy_macvlan_port;
  1202. }
  1203. vlan->lowerdev = lowerdev;
  1204. vlan->dev = dev;
  1205. vlan->port = port;
  1206. vlan->set_features = MACVLAN_FEATURES;
  1207. vlan->mode = MACVLAN_MODE_VEPA;
  1208. if (data && data[IFLA_MACVLAN_MODE])
  1209. vlan->mode = nla_get_u32(data[IFLA_MACVLAN_MODE]);
  1210. if (data && data[IFLA_MACVLAN_FLAGS])
  1211. vlan->flags = nla_get_u16(data[IFLA_MACVLAN_FLAGS]);
  1212. if (vlan->mode == MACVLAN_MODE_PASSTHRU) {
  1213. if (port->count) {
  1214. err = -EINVAL;
  1215. goto destroy_macvlan_port;
  1216. }
  1217. macvlan_set_passthru(port);
  1218. eth_hw_addr_inherit(dev, lowerdev);
  1219. }
  1220. if (data && data[IFLA_MACVLAN_MACADDR_MODE]) {
  1221. if (vlan->mode != MACVLAN_MODE_SOURCE) {
  1222. err = -EINVAL;
  1223. goto destroy_macvlan_port;
  1224. }
  1225. macmode = nla_get_u32(data[IFLA_MACVLAN_MACADDR_MODE]);
  1226. err = macvlan_changelink_sources(vlan, macmode, data);
  1227. if (err)
  1228. goto destroy_macvlan_port;
  1229. }
  1230. err = register_netdevice(dev);
  1231. if (err < 0)
  1232. goto destroy_macvlan_port;
  1233. dev->priv_flags |= IFF_MACVLAN;
  1234. err = netdev_upper_dev_link(lowerdev, dev, extack);
  1235. if (err)
  1236. goto unregister_netdev;
  1237. list_add_tail_rcu(&vlan->list, &port->vlans);
  1238. netif_stacked_transfer_operstate(lowerdev, dev);
  1239. linkwatch_fire_event(dev);
  1240. return 0;
  1241. unregister_netdev:
  1242. /* macvlan_uninit would free the macvlan port */
  1243. unregister_netdevice(dev);
  1244. return err;
  1245. destroy_macvlan_port:
  1246. /* the macvlan port may be freed by macvlan_uninit when fail to register.
  1247. * so we destroy the macvlan port only when it's valid.
  1248. */
  1249. if (create && macvlan_port_get_rtnl(lowerdev))
  1250. macvlan_port_destroy(port->dev);
  1251. return err;
  1252. }
  1253. EXPORT_SYMBOL_GPL(macvlan_common_newlink);
  1254. static int macvlan_newlink(struct net *src_net, struct net_device *dev,
  1255. struct nlattr *tb[], struct nlattr *data[],
  1256. struct netlink_ext_ack *extack)
  1257. {
  1258. return macvlan_common_newlink(src_net, dev, tb, data, extack);
  1259. }
  1260. void macvlan_dellink(struct net_device *dev, struct list_head *head)
  1261. {
  1262. struct macvlan_dev *vlan = netdev_priv(dev);
  1263. if (vlan->mode == MACVLAN_MODE_SOURCE)
  1264. macvlan_flush_sources(vlan->port, vlan);
  1265. list_del_rcu(&vlan->list);
  1266. unregister_netdevice_queue(dev, head);
  1267. netdev_upper_dev_unlink(vlan->lowerdev, dev);
  1268. }
  1269. EXPORT_SYMBOL_GPL(macvlan_dellink);
  1270. static int macvlan_changelink(struct net_device *dev,
  1271. struct nlattr *tb[], struct nlattr *data[],
  1272. struct netlink_ext_ack *extack)
  1273. {
  1274. struct macvlan_dev *vlan = netdev_priv(dev);
  1275. enum macvlan_mode mode;
  1276. bool set_mode = false;
  1277. enum macvlan_macaddr_mode macmode;
  1278. int ret;
  1279. /* Validate mode, but don't set yet: setting flags may fail. */
  1280. if (data && data[IFLA_MACVLAN_MODE]) {
  1281. set_mode = true;
  1282. mode = nla_get_u32(data[IFLA_MACVLAN_MODE]);
  1283. /* Passthrough mode can't be set or cleared dynamically */
  1284. if ((mode == MACVLAN_MODE_PASSTHRU) !=
  1285. (vlan->mode == MACVLAN_MODE_PASSTHRU))
  1286. return -EINVAL;
  1287. if (vlan->mode == MACVLAN_MODE_SOURCE &&
  1288. vlan->mode != mode)
  1289. macvlan_flush_sources(vlan->port, vlan);
  1290. }
  1291. if (data && data[IFLA_MACVLAN_FLAGS]) {
  1292. __u16 flags = nla_get_u16(data[IFLA_MACVLAN_FLAGS]);
  1293. bool promisc = (flags ^ vlan->flags) & MACVLAN_FLAG_NOPROMISC;
  1294. if (macvlan_passthru(vlan->port) && promisc) {
  1295. int err;
  1296. if (flags & MACVLAN_FLAG_NOPROMISC)
  1297. err = dev_set_promiscuity(vlan->lowerdev, -1);
  1298. else
  1299. err = dev_set_promiscuity(vlan->lowerdev, 1);
  1300. if (err < 0)
  1301. return err;
  1302. }
  1303. vlan->flags = flags;
  1304. }
  1305. if (set_mode)
  1306. vlan->mode = mode;
  1307. if (data && data[IFLA_MACVLAN_MACADDR_MODE]) {
  1308. if (vlan->mode != MACVLAN_MODE_SOURCE)
  1309. return -EINVAL;
  1310. macmode = nla_get_u32(data[IFLA_MACVLAN_MACADDR_MODE]);
  1311. ret = macvlan_changelink_sources(vlan, macmode, data);
  1312. if (ret)
  1313. return ret;
  1314. }
  1315. return 0;
  1316. }
  1317. static size_t macvlan_get_size_mac(const struct macvlan_dev *vlan)
  1318. {
  1319. if (vlan->macaddr_count == 0)
  1320. return 0;
  1321. return nla_total_size(0) /* IFLA_MACVLAN_MACADDR_DATA */
  1322. + vlan->macaddr_count * nla_total_size(sizeof(u8) * ETH_ALEN);
  1323. }
  1324. static size_t macvlan_get_size(const struct net_device *dev)
  1325. {
  1326. struct macvlan_dev *vlan = netdev_priv(dev);
  1327. return (0
  1328. + nla_total_size(4) /* IFLA_MACVLAN_MODE */
  1329. + nla_total_size(2) /* IFLA_MACVLAN_FLAGS */
  1330. + nla_total_size(4) /* IFLA_MACVLAN_MACADDR_COUNT */
  1331. + macvlan_get_size_mac(vlan) /* IFLA_MACVLAN_MACADDR */
  1332. );
  1333. }
  1334. static int macvlan_fill_info_macaddr(struct sk_buff *skb,
  1335. const struct macvlan_dev *vlan,
  1336. const int i)
  1337. {
  1338. struct hlist_head *h = &vlan->port->vlan_source_hash[i];
  1339. struct macvlan_source_entry *entry;
  1340. hlist_for_each_entry_rcu(entry, h, hlist) {
  1341. if (entry->vlan != vlan)
  1342. continue;
  1343. if (nla_put(skb, IFLA_MACVLAN_MACADDR, ETH_ALEN, entry->addr))
  1344. return 1;
  1345. }
  1346. return 0;
  1347. }
  1348. static int macvlan_fill_info(struct sk_buff *skb,
  1349. const struct net_device *dev)
  1350. {
  1351. struct macvlan_dev *vlan = netdev_priv(dev);
  1352. int i;
  1353. struct nlattr *nest;
  1354. if (nla_put_u32(skb, IFLA_MACVLAN_MODE, vlan->mode))
  1355. goto nla_put_failure;
  1356. if (nla_put_u16(skb, IFLA_MACVLAN_FLAGS, vlan->flags))
  1357. goto nla_put_failure;
  1358. if (nla_put_u32(skb, IFLA_MACVLAN_MACADDR_COUNT, vlan->macaddr_count))
  1359. goto nla_put_failure;
  1360. if (vlan->macaddr_count > 0) {
  1361. nest = nla_nest_start_noflag(skb, IFLA_MACVLAN_MACADDR_DATA);
  1362. if (nest == NULL)
  1363. goto nla_put_failure;
  1364. for (i = 0; i < MACVLAN_HASH_SIZE; i++) {
  1365. if (macvlan_fill_info_macaddr(skb, vlan, i))
  1366. goto nla_put_failure;
  1367. }
  1368. nla_nest_end(skb, nest);
  1369. }
  1370. return 0;
  1371. nla_put_failure:
  1372. return -EMSGSIZE;
  1373. }
  1374. static const struct nla_policy macvlan_policy[IFLA_MACVLAN_MAX + 1] = {
  1375. [IFLA_MACVLAN_MODE] = { .type = NLA_U32 },
  1376. [IFLA_MACVLAN_FLAGS] = { .type = NLA_U16 },
  1377. [IFLA_MACVLAN_MACADDR_MODE] = { .type = NLA_U32 },
  1378. [IFLA_MACVLAN_MACADDR] = { .type = NLA_BINARY, .len = MAX_ADDR_LEN },
  1379. [IFLA_MACVLAN_MACADDR_DATA] = { .type = NLA_NESTED },
  1380. [IFLA_MACVLAN_MACADDR_COUNT] = { .type = NLA_U32 },
  1381. };
  1382. int macvlan_link_register(struct rtnl_link_ops *ops)
  1383. {
  1384. /* common fields */
  1385. ops->validate = macvlan_validate;
  1386. ops->maxtype = IFLA_MACVLAN_MAX;
  1387. ops->policy = macvlan_policy;
  1388. ops->changelink = macvlan_changelink;
  1389. ops->get_size = macvlan_get_size;
  1390. ops->fill_info = macvlan_fill_info;
  1391. return rtnl_link_register(ops);
  1392. };
  1393. EXPORT_SYMBOL_GPL(macvlan_link_register);
  1394. static struct net *macvlan_get_link_net(const struct net_device *dev)
  1395. {
  1396. return dev_net(macvlan_dev_real_dev(dev));
  1397. }
  1398. static struct rtnl_link_ops macvlan_link_ops = {
  1399. .kind = "macvlan",
  1400. .setup = macvlan_setup,
  1401. .newlink = macvlan_newlink,
  1402. .dellink = macvlan_dellink,
  1403. .get_link_net = macvlan_get_link_net,
  1404. .priv_size = sizeof(struct macvlan_dev),
  1405. };
  1406. static int macvlan_device_event(struct notifier_block *unused,
  1407. unsigned long event, void *ptr)
  1408. {
  1409. struct net_device *dev = netdev_notifier_info_to_dev(ptr);
  1410. struct macvlan_dev *vlan, *next;
  1411. struct macvlan_port *port;
  1412. LIST_HEAD(list_kill);
  1413. if (!netif_is_macvlan_port(dev))
  1414. return NOTIFY_DONE;
  1415. port = macvlan_port_get_rtnl(dev);
  1416. switch (event) {
  1417. case NETDEV_UP:
  1418. case NETDEV_DOWN:
  1419. case NETDEV_CHANGE:
  1420. list_for_each_entry(vlan, &port->vlans, list)
  1421. netif_stacked_transfer_operstate(vlan->lowerdev,
  1422. vlan->dev);
  1423. break;
  1424. case NETDEV_FEAT_CHANGE:
  1425. list_for_each_entry(vlan, &port->vlans, list) {
  1426. vlan->dev->gso_max_size = dev->gso_max_size;
  1427. vlan->dev->gso_max_segs = dev->gso_max_segs;
  1428. netdev_update_features(vlan->dev);
  1429. }
  1430. break;
  1431. case NETDEV_CHANGEMTU:
  1432. list_for_each_entry(vlan, &port->vlans, list) {
  1433. if (vlan->dev->mtu <= dev->mtu)
  1434. continue;
  1435. dev_set_mtu(vlan->dev, dev->mtu);
  1436. }
  1437. break;
  1438. case NETDEV_CHANGEADDR:
  1439. if (!macvlan_passthru(port))
  1440. return NOTIFY_DONE;
  1441. vlan = list_first_entry_or_null(&port->vlans,
  1442. struct macvlan_dev,
  1443. list);
  1444. if (vlan && macvlan_sync_address(vlan->dev, dev->dev_addr))
  1445. return NOTIFY_BAD;
  1446. break;
  1447. case NETDEV_UNREGISTER:
  1448. /* twiddle thumbs on netns device moves */
  1449. if (dev->reg_state != NETREG_UNREGISTERING)
  1450. break;
  1451. list_for_each_entry_safe(vlan, next, &port->vlans, list)
  1452. vlan->dev->rtnl_link_ops->dellink(vlan->dev, &list_kill);
  1453. unregister_netdevice_many(&list_kill);
  1454. break;
  1455. case NETDEV_PRE_TYPE_CHANGE:
  1456. /* Forbid underlaying device to change its type. */
  1457. return NOTIFY_BAD;
  1458. case NETDEV_NOTIFY_PEERS:
  1459. case NETDEV_BONDING_FAILOVER:
  1460. case NETDEV_RESEND_IGMP:
  1461. /* Propagate to all vlans */
  1462. list_for_each_entry(vlan, &port->vlans, list)
  1463. call_netdevice_notifiers(event, vlan->dev);
  1464. }
  1465. return NOTIFY_DONE;
  1466. }
  1467. static struct notifier_block macvlan_notifier_block __read_mostly = {
  1468. .notifier_call = macvlan_device_event,
  1469. };
  1470. static int __init macvlan_init_module(void)
  1471. {
  1472. int err;
  1473. register_netdevice_notifier(&macvlan_notifier_block);
  1474. err = macvlan_link_register(&macvlan_link_ops);
  1475. if (err < 0)
  1476. goto err1;
  1477. return 0;
  1478. err1:
  1479. unregister_netdevice_notifier(&macvlan_notifier_block);
  1480. return err;
  1481. }
  1482. static void __exit macvlan_cleanup_module(void)
  1483. {
  1484. rtnl_link_unregister(&macvlan_link_ops);
  1485. unregister_netdevice_notifier(&macvlan_notifier_block);
  1486. }
  1487. module_init(macvlan_init_module);
  1488. module_exit(macvlan_cleanup_module);
  1489. MODULE_LICENSE("GPL");
  1490. MODULE_AUTHOR("Patrick McHardy <kaber@trash.net>");
  1491. MODULE_DESCRIPTION("Driver for MAC address based VLANs");
  1492. MODULE_ALIAS_RTNL_LINK("macvlan");