2007-06-14 02:07:54 +07:00
|
|
|
/*
|
|
|
|
* VLAN netlink control interface
|
|
|
|
*
|
|
|
|
* Copyright (c) 2007 Patrick McHardy <kaber@trash.net>
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU General Public License
|
|
|
|
* version 2 as published by the Free Software Foundation.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/kernel.h>
|
|
|
|
#include <linux/netdevice.h>
|
|
|
|
#include <linux/if_vlan.h>
|
2011-05-27 20:12:25 +07:00
|
|
|
#include <linux/module.h>
|
2007-09-18 01:56:21 +07:00
|
|
|
#include <net/net_namespace.h>
|
2007-06-14 02:07:54 +07:00
|
|
|
#include <net/netlink.h>
|
|
|
|
#include <net/rtnetlink.h>
|
|
|
|
#include "vlan.h"
|
|
|
|
|
|
|
|
|
|
|
|
static const struct nla_policy vlan_policy[IFLA_VLAN_MAX + 1] = {
|
|
|
|
[IFLA_VLAN_ID] = { .type = NLA_U16 },
|
|
|
|
[IFLA_VLAN_FLAGS] = { .len = sizeof(struct ifla_vlan_flags) },
|
|
|
|
[IFLA_VLAN_EGRESS_QOS] = { .type = NLA_NESTED },
|
|
|
|
[IFLA_VLAN_INGRESS_QOS] = { .type = NLA_NESTED },
|
net: vlan: add 802.1ad support
Add support for 802.1ad VLAN devices. This mainly consists of checking for
ETH_P_8021AD in addition to ETH_P_8021Q in a couple of places and check
offloading capabilities based on the used protocol.
Configuration is done using "ip link":
# ip link add link eth0 eth0.1000 \
type vlan proto 802.1ad id 1000
# ip link add link eth0.1000 eth0.1000.1000 \
type vlan proto 802.1q id 1000
52:54:00:12:34:56 > 92:b1:54:28:e4:8c, ethertype 802.1Q (0x8100), length 106: vlan 1000, p 0, ethertype 802.1Q, vlan 1000, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto ICMP (1), length 84)
20.1.0.2 > 20.1.0.1: ICMP echo request, id 3003, seq 8, length 64
92:b1:54:28:e4:8c > 52:54:00:12:34:56, ethertype 802.1Q-QinQ (0x88a8), length 106: vlan 1000, p 0, ethertype 802.1Q, vlan 1000, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 47944, offset 0, flags [none], proto ICMP (1), length 84)
20.1.0.1 > 20.1.0.2: ICMP echo reply, id 3003, seq 8, length 64
Signed-off-by: Patrick McHardy <kaber@trash.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-19 09:04:31 +07:00
|
|
|
[IFLA_VLAN_PROTOCOL] = { .type = NLA_U16 },
|
2007-06-14 02:07:54 +07:00
|
|
|
};
|
|
|
|
|
|
|
|
static const struct nla_policy vlan_map_policy[IFLA_VLAN_QOS_MAX + 1] = {
|
|
|
|
[IFLA_VLAN_QOS_MAPPING] = { .len = sizeof(struct ifla_vlan_qos_mapping) },
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
static inline int vlan_validate_qos_map(struct nlattr *attr)
|
|
|
|
{
|
|
|
|
if (!attr)
|
|
|
|
return 0;
|
|
|
|
return nla_validate_nested(attr, IFLA_VLAN_QOS_MAX, vlan_map_policy);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int vlan_validate(struct nlattr *tb[], struct nlattr *data[])
|
|
|
|
{
|
|
|
|
struct ifla_vlan_flags *flags;
|
|
|
|
u16 id;
|
|
|
|
int err;
|
|
|
|
|
2007-07-12 09:42:31 +07:00
|
|
|
if (tb[IFLA_ADDRESS]) {
|
|
|
|
if (nla_len(tb[IFLA_ADDRESS]) != ETH_ALEN)
|
|
|
|
return -EINVAL;
|
|
|
|
if (!is_valid_ether_addr(nla_data(tb[IFLA_ADDRESS])))
|
|
|
|
return -EADDRNOTAVAIL;
|
|
|
|
}
|
|
|
|
|
2007-06-14 02:07:54 +07:00
|
|
|
if (!data)
|
|
|
|
return -EINVAL;
|
|
|
|
|
net: vlan: add 802.1ad support
Add support for 802.1ad VLAN devices. This mainly consists of checking for
ETH_P_8021AD in addition to ETH_P_8021Q in a couple of places and check
offloading capabilities based on the used protocol.
Configuration is done using "ip link":
# ip link add link eth0 eth0.1000 \
type vlan proto 802.1ad id 1000
# ip link add link eth0.1000 eth0.1000.1000 \
type vlan proto 802.1q id 1000
52:54:00:12:34:56 > 92:b1:54:28:e4:8c, ethertype 802.1Q (0x8100), length 106: vlan 1000, p 0, ethertype 802.1Q, vlan 1000, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto ICMP (1), length 84)
20.1.0.2 > 20.1.0.1: ICMP echo request, id 3003, seq 8, length 64
92:b1:54:28:e4:8c > 52:54:00:12:34:56, ethertype 802.1Q-QinQ (0x88a8), length 106: vlan 1000, p 0, ethertype 802.1Q, vlan 1000, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 47944, offset 0, flags [none], proto ICMP (1), length 84)
20.1.0.1 > 20.1.0.2: ICMP echo reply, id 3003, seq 8, length 64
Signed-off-by: Patrick McHardy <kaber@trash.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-19 09:04:31 +07:00
|
|
|
if (data[IFLA_VLAN_PROTOCOL]) {
|
|
|
|
switch (nla_get_be16(data[IFLA_VLAN_PROTOCOL])) {
|
2014-03-13 00:04:15 +07:00
|
|
|
case htons(ETH_P_8021Q):
|
|
|
|
case htons(ETH_P_8021AD):
|
net: vlan: add 802.1ad support
Add support for 802.1ad VLAN devices. This mainly consists of checking for
ETH_P_8021AD in addition to ETH_P_8021Q in a couple of places and check
offloading capabilities based on the used protocol.
Configuration is done using "ip link":
# ip link add link eth0 eth0.1000 \
type vlan proto 802.1ad id 1000
# ip link add link eth0.1000 eth0.1000.1000 \
type vlan proto 802.1q id 1000
52:54:00:12:34:56 > 92:b1:54:28:e4:8c, ethertype 802.1Q (0x8100), length 106: vlan 1000, p 0, ethertype 802.1Q, vlan 1000, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto ICMP (1), length 84)
20.1.0.2 > 20.1.0.1: ICMP echo request, id 3003, seq 8, length 64
92:b1:54:28:e4:8c > 52:54:00:12:34:56, ethertype 802.1Q-QinQ (0x88a8), length 106: vlan 1000, p 0, ethertype 802.1Q, vlan 1000, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 47944, offset 0, flags [none], proto ICMP (1), length 84)
20.1.0.1 > 20.1.0.2: ICMP echo reply, id 3003, seq 8, length 64
Signed-off-by: Patrick McHardy <kaber@trash.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-19 09:04:31 +07:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return -EPROTONOSUPPORT;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2007-06-14 02:07:54 +07:00
|
|
|
if (data[IFLA_VLAN_ID]) {
|
|
|
|
id = nla_get_u16(data[IFLA_VLAN_ID]);
|
|
|
|
if (id >= VLAN_VID_MASK)
|
|
|
|
return -ERANGE;
|
|
|
|
}
|
|
|
|
if (data[IFLA_VLAN_FLAGS]) {
|
|
|
|
flags = nla_data(data[IFLA_VLAN_FLAGS]);
|
2008-07-06 11:26:57 +07:00
|
|
|
if ((flags->flags & flags->mask) &
|
2009-11-25 14:54:54 +07:00
|
|
|
~(VLAN_FLAG_REORDER_HDR | VLAN_FLAG_GVRP |
|
2013-02-09 00:17:07 +07:00
|
|
|
VLAN_FLAG_LOOSE_BINDING | VLAN_FLAG_MVRP))
|
2007-06-14 02:07:54 +07:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
err = vlan_validate_qos_map(data[IFLA_VLAN_INGRESS_QOS]);
|
|
|
|
if (err < 0)
|
|
|
|
return err;
|
|
|
|
err = vlan_validate_qos_map(data[IFLA_VLAN_EGRESS_QOS]);
|
|
|
|
if (err < 0)
|
|
|
|
return err;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int vlan_changelink(struct net_device *dev,
|
|
|
|
struct nlattr *tb[], struct nlattr *data[])
|
|
|
|
{
|
|
|
|
struct ifla_vlan_flags *flags;
|
|
|
|
struct ifla_vlan_qos_mapping *m;
|
|
|
|
struct nlattr *attr;
|
|
|
|
int rem;
|
|
|
|
|
|
|
|
if (data[IFLA_VLAN_FLAGS]) {
|
|
|
|
flags = nla_data(data[IFLA_VLAN_FLAGS]);
|
2008-07-06 11:26:27 +07:00
|
|
|
vlan_dev_change_flags(dev, flags->flags, flags->mask);
|
2007-06-14 02:07:54 +07:00
|
|
|
}
|
|
|
|
if (data[IFLA_VLAN_INGRESS_QOS]) {
|
|
|
|
nla_for_each_nested(attr, data[IFLA_VLAN_INGRESS_QOS], rem) {
|
|
|
|
m = nla_data(attr);
|
|
|
|
vlan_dev_set_ingress_priority(dev, m->to, m->from);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (data[IFLA_VLAN_EGRESS_QOS]) {
|
|
|
|
nla_for_each_nested(attr, data[IFLA_VLAN_EGRESS_QOS], rem) {
|
|
|
|
m = nla_data(attr);
|
|
|
|
vlan_dev_set_egress_priority(dev, m->from, m->to);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2009-11-08 15:53:51 +07:00
|
|
|
static int vlan_newlink(struct net *src_net, struct net_device *dev,
|
2007-06-14 02:07:54 +07:00
|
|
|
struct nlattr *tb[], struct nlattr *data[])
|
|
|
|
{
|
2011-12-08 11:11:15 +07:00
|
|
|
struct vlan_dev_priv *vlan = vlan_dev_priv(dev);
|
2007-06-14 02:07:54 +07:00
|
|
|
struct net_device *real_dev;
|
2016-07-14 23:00:10 +07:00
|
|
|
unsigned int max_mtu;
|
net: vlan: add 802.1ad support
Add support for 802.1ad VLAN devices. This mainly consists of checking for
ETH_P_8021AD in addition to ETH_P_8021Q in a couple of places and check
offloading capabilities based on the used protocol.
Configuration is done using "ip link":
# ip link add link eth0 eth0.1000 \
type vlan proto 802.1ad id 1000
# ip link add link eth0.1000 eth0.1000.1000 \
type vlan proto 802.1q id 1000
52:54:00:12:34:56 > 92:b1:54:28:e4:8c, ethertype 802.1Q (0x8100), length 106: vlan 1000, p 0, ethertype 802.1Q, vlan 1000, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto ICMP (1), length 84)
20.1.0.2 > 20.1.0.1: ICMP echo request, id 3003, seq 8, length 64
92:b1:54:28:e4:8c > 52:54:00:12:34:56, ethertype 802.1Q-QinQ (0x88a8), length 106: vlan 1000, p 0, ethertype 802.1Q, vlan 1000, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 47944, offset 0, flags [none], proto ICMP (1), length 84)
20.1.0.1 > 20.1.0.2: ICMP echo reply, id 3003, seq 8, length 64
Signed-off-by: Patrick McHardy <kaber@trash.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-19 09:04:31 +07:00
|
|
|
__be16 proto;
|
2007-06-14 02:07:54 +07:00
|
|
|
int err;
|
|
|
|
|
|
|
|
if (!data[IFLA_VLAN_ID])
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (!tb[IFLA_LINK])
|
|
|
|
return -EINVAL;
|
2009-11-08 15:53:51 +07:00
|
|
|
real_dev = __dev_get_by_index(src_net, nla_get_u32(tb[IFLA_LINK]));
|
2007-06-14 02:07:54 +07:00
|
|
|
if (!real_dev)
|
|
|
|
return -ENODEV;
|
|
|
|
|
net: vlan: add 802.1ad support
Add support for 802.1ad VLAN devices. This mainly consists of checking for
ETH_P_8021AD in addition to ETH_P_8021Q in a couple of places and check
offloading capabilities based on the used protocol.
Configuration is done using "ip link":
# ip link add link eth0 eth0.1000 \
type vlan proto 802.1ad id 1000
# ip link add link eth0.1000 eth0.1000.1000 \
type vlan proto 802.1q id 1000
52:54:00:12:34:56 > 92:b1:54:28:e4:8c, ethertype 802.1Q (0x8100), length 106: vlan 1000, p 0, ethertype 802.1Q, vlan 1000, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto ICMP (1), length 84)
20.1.0.2 > 20.1.0.1: ICMP echo request, id 3003, seq 8, length 64
92:b1:54:28:e4:8c > 52:54:00:12:34:56, ethertype 802.1Q-QinQ (0x88a8), length 106: vlan 1000, p 0, ethertype 802.1Q, vlan 1000, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 47944, offset 0, flags [none], proto ICMP (1), length 84)
20.1.0.1 > 20.1.0.2: ICMP echo reply, id 3003, seq 8, length 64
Signed-off-by: Patrick McHardy <kaber@trash.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-19 09:04:31 +07:00
|
|
|
if (data[IFLA_VLAN_PROTOCOL])
|
|
|
|
proto = nla_get_be16(data[IFLA_VLAN_PROTOCOL]);
|
|
|
|
else
|
|
|
|
proto = htons(ETH_P_8021Q);
|
|
|
|
|
|
|
|
vlan->vlan_proto = proto;
|
2013-04-19 09:04:29 +07:00
|
|
|
vlan->vlan_id = nla_get_u16(data[IFLA_VLAN_ID]);
|
|
|
|
vlan->real_dev = real_dev;
|
|
|
|
vlan->flags = VLAN_FLAG_REORDER_HDR;
|
2007-06-14 02:07:54 +07:00
|
|
|
|
2013-04-19 09:04:29 +07:00
|
|
|
err = vlan_check_real_dev(real_dev, vlan->vlan_proto, vlan->vlan_id);
|
2007-06-14 02:07:54 +07:00
|
|
|
if (err < 0)
|
|
|
|
return err;
|
|
|
|
|
2016-07-14 23:00:10 +07:00
|
|
|
max_mtu = netif_reduces_vlan_mtu(real_dev) ? real_dev->mtu - VLAN_HLEN :
|
|
|
|
real_dev->mtu;
|
2007-06-14 02:07:54 +07:00
|
|
|
if (!tb[IFLA_MTU])
|
2016-07-14 23:00:10 +07:00
|
|
|
dev->mtu = max_mtu;
|
|
|
|
else if (dev->mtu > max_mtu)
|
2007-06-14 02:07:54 +07:00
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
err = vlan_changelink(dev, tb, data);
|
|
|
|
if (err < 0)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
return register_vlan_dev(dev);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline size_t vlan_qos_map_size(unsigned int n)
|
|
|
|
{
|
|
|
|
if (n == 0)
|
|
|
|
return 0;
|
|
|
|
/* IFLA_VLAN_{EGRESS,INGRESS}_QOS + n * IFLA_VLAN_QOS_MAPPING */
|
|
|
|
return nla_total_size(sizeof(struct nlattr)) +
|
|
|
|
nla_total_size(sizeof(struct ifla_vlan_qos_mapping)) * n;
|
|
|
|
}
|
|
|
|
|
|
|
|
static size_t vlan_get_size(const struct net_device *dev)
|
|
|
|
{
|
2011-12-08 11:11:15 +07:00
|
|
|
struct vlan_dev_priv *vlan = vlan_dev_priv(dev);
|
2007-06-14 02:07:54 +07:00
|
|
|
|
net: vlan: add 802.1ad support
Add support for 802.1ad VLAN devices. This mainly consists of checking for
ETH_P_8021AD in addition to ETH_P_8021Q in a couple of places and check
offloading capabilities based on the used protocol.
Configuration is done using "ip link":
# ip link add link eth0 eth0.1000 \
type vlan proto 802.1ad id 1000
# ip link add link eth0.1000 eth0.1000.1000 \
type vlan proto 802.1q id 1000
52:54:00:12:34:56 > 92:b1:54:28:e4:8c, ethertype 802.1Q (0x8100), length 106: vlan 1000, p 0, ethertype 802.1Q, vlan 1000, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto ICMP (1), length 84)
20.1.0.2 > 20.1.0.1: ICMP echo request, id 3003, seq 8, length 64
92:b1:54:28:e4:8c > 52:54:00:12:34:56, ethertype 802.1Q-QinQ (0x88a8), length 106: vlan 1000, p 0, ethertype 802.1Q, vlan 1000, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 47944, offset 0, flags [none], proto ICMP (1), length 84)
20.1.0.1 > 20.1.0.2: ICMP echo reply, id 3003, seq 8, length 64
Signed-off-by: Patrick McHardy <kaber@trash.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-19 09:04:31 +07:00
|
|
|
return nla_total_size(2) + /* IFLA_VLAN_PROTOCOL */
|
|
|
|
nla_total_size(2) + /* IFLA_VLAN_ID */
|
2013-10-08 04:19:58 +07:00
|
|
|
nla_total_size(sizeof(struct ifla_vlan_flags)) + /* IFLA_VLAN_FLAGS */
|
2007-06-14 02:07:54 +07:00
|
|
|
vlan_qos_map_size(vlan->nr_ingress_mappings) +
|
|
|
|
vlan_qos_map_size(vlan->nr_egress_mappings);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int vlan_fill_info(struct sk_buff *skb, const struct net_device *dev)
|
|
|
|
{
|
2011-12-08 11:11:15 +07:00
|
|
|
struct vlan_dev_priv *vlan = vlan_dev_priv(dev);
|
2007-06-14 02:07:54 +07:00
|
|
|
struct vlan_priority_tci_mapping *pm;
|
|
|
|
struct ifla_vlan_flags f;
|
|
|
|
struct ifla_vlan_qos_mapping m;
|
|
|
|
struct nlattr *nest;
|
|
|
|
unsigned int i;
|
|
|
|
|
net: vlan: add 802.1ad support
Add support for 802.1ad VLAN devices. This mainly consists of checking for
ETH_P_8021AD in addition to ETH_P_8021Q in a couple of places and check
offloading capabilities based on the used protocol.
Configuration is done using "ip link":
# ip link add link eth0 eth0.1000 \
type vlan proto 802.1ad id 1000
# ip link add link eth0.1000 eth0.1000.1000 \
type vlan proto 802.1q id 1000
52:54:00:12:34:56 > 92:b1:54:28:e4:8c, ethertype 802.1Q (0x8100), length 106: vlan 1000, p 0, ethertype 802.1Q, vlan 1000, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto ICMP (1), length 84)
20.1.0.2 > 20.1.0.1: ICMP echo request, id 3003, seq 8, length 64
92:b1:54:28:e4:8c > 52:54:00:12:34:56, ethertype 802.1Q-QinQ (0x88a8), length 106: vlan 1000, p 0, ethertype 802.1Q, vlan 1000, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 47944, offset 0, flags [none], proto ICMP (1), length 84)
20.1.0.1 > 20.1.0.2: ICMP echo reply, id 3003, seq 8, length 64
Signed-off-by: Patrick McHardy <kaber@trash.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-19 09:04:31 +07:00
|
|
|
if (nla_put_be16(skb, IFLA_VLAN_PROTOCOL, vlan->vlan_proto) ||
|
|
|
|
nla_put_u16(skb, IFLA_VLAN_ID, vlan->vlan_id))
|
2012-04-02 07:50:45 +07:00
|
|
|
goto nla_put_failure;
|
2007-06-14 02:07:54 +07:00
|
|
|
if (vlan->flags) {
|
|
|
|
f.flags = vlan->flags;
|
|
|
|
f.mask = ~0;
|
2012-04-02 07:50:45 +07:00
|
|
|
if (nla_put(skb, IFLA_VLAN_FLAGS, sizeof(f), &f))
|
|
|
|
goto nla_put_failure;
|
2007-06-14 02:07:54 +07:00
|
|
|
}
|
|
|
|
if (vlan->nr_ingress_mappings) {
|
|
|
|
nest = nla_nest_start(skb, IFLA_VLAN_INGRESS_QOS);
|
|
|
|
if (nest == NULL)
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(vlan->ingress_priority_map); i++) {
|
|
|
|
if (!vlan->ingress_priority_map[i])
|
|
|
|
continue;
|
|
|
|
|
|
|
|
m.from = i;
|
|
|
|
m.to = vlan->ingress_priority_map[i];
|
2012-04-02 07:50:45 +07:00
|
|
|
if (nla_put(skb, IFLA_VLAN_QOS_MAPPING,
|
|
|
|
sizeof(m), &m))
|
|
|
|
goto nla_put_failure;
|
2007-06-14 02:07:54 +07:00
|
|
|
}
|
|
|
|
nla_nest_end(skb, nest);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (vlan->nr_egress_mappings) {
|
|
|
|
nest = nla_nest_start(skb, IFLA_VLAN_EGRESS_QOS);
|
|
|
|
if (nest == NULL)
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(vlan->egress_priority_map); i++) {
|
|
|
|
for (pm = vlan->egress_priority_map[i]; pm;
|
|
|
|
pm = pm->next) {
|
|
|
|
if (!pm->vlan_qos)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
m.from = pm->priority;
|
|
|
|
m.to = (pm->vlan_qos >> 13) & 0x7;
|
2012-04-02 07:50:45 +07:00
|
|
|
if (nla_put(skb, IFLA_VLAN_QOS_MAPPING,
|
|
|
|
sizeof(m), &m))
|
|
|
|
goto nla_put_failure;
|
2007-06-14 02:07:54 +07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
nla_nest_end(skb, nest);
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
return -EMSGSIZE;
|
|
|
|
}
|
|
|
|
|
2015-01-20 21:15:44 +07:00
|
|
|
static struct net *vlan_get_link_net(const struct net_device *dev)
|
|
|
|
{
|
|
|
|
struct net_device *real_dev = vlan_dev_priv(dev)->real_dev;
|
|
|
|
|
|
|
|
return dev_net(real_dev);
|
|
|
|
}
|
|
|
|
|
2007-06-14 02:07:54 +07:00
|
|
|
struct rtnl_link_ops vlan_link_ops __read_mostly = {
|
|
|
|
.kind = "vlan",
|
|
|
|
.maxtype = IFLA_VLAN_MAX,
|
|
|
|
.policy = vlan_policy,
|
2011-12-08 11:11:15 +07:00
|
|
|
.priv_size = sizeof(struct vlan_dev_priv),
|
2007-06-14 02:07:54 +07:00
|
|
|
.setup = vlan_setup,
|
|
|
|
.validate = vlan_validate,
|
|
|
|
.newlink = vlan_newlink,
|
|
|
|
.changelink = vlan_changelink,
|
2008-01-21 15:25:50 +07:00
|
|
|
.dellink = unregister_vlan_dev,
|
2007-06-14 02:07:54 +07:00
|
|
|
.get_size = vlan_get_size,
|
|
|
|
.fill_info = vlan_fill_info,
|
2015-01-20 21:15:44 +07:00
|
|
|
.get_link_net = vlan_get_link_net,
|
2007-06-14 02:07:54 +07:00
|
|
|
};
|
|
|
|
|
|
|
|
int __init vlan_netlink_init(void)
|
|
|
|
{
|
|
|
|
return rtnl_link_register(&vlan_link_ops);
|
|
|
|
}
|
|
|
|
|
|
|
|
void __exit vlan_netlink_fini(void)
|
|
|
|
{
|
|
|
|
rtnl_link_unregister(&vlan_link_ops);
|
|
|
|
}
|
|
|
|
|
|
|
|
MODULE_ALIAS_RTNL_LINK("vlan");
|