2019-05-19 15:08:20 +03:00
// SPDX-License-Identifier: GPL-2.0-only
2005-04-17 02:20:36 +04:00
/* dummy.c: a dummy net driver
The purpose of this driver is to provide a device to point a
route through , but not to actually transmit packets .
Why ? If you have a machine whose only connection is an occasional
PPP / SLIP / PLIP link , you can only connect to your own hostname
when the link is up . Otherwise you have to use localhost .
This isn ' t very consistent .
One solution is to set up a dummy link using PPP / SLIP / PLIP ,
but this seems ( to me ) too much overhead for too little gain .
This driver provides a small alternative . Thus you can do
2006-09-13 21:24:59 +04:00
2005-04-17 02:20:36 +04:00
[ when not running slip ]
ifconfig dummy slip . addr . ess . here up
[ to go to slip ]
ifconfig dummy down
dip whatever
This was written by looking at Donald Becker ' s skeleton driver
and the loopback driver . I then threw away anything that didn ' t
apply ! Thanks to Alan Cox for the key clue on what to do with
misguided packets .
Nick Holloway , 27 th May 1994
[ I tweaked this explanation a little but that ' s all ]
Alan Cox , 30 th May 1994
*/
# include <linux/module.h>
# include <linux/kernel.h>
# include <linux/netdevice.h>
# include <linux/etherdevice.h>
2019-04-12 14:06:13 +03:00
# include <linux/ethtool.h>
2005-04-17 02:20:36 +04:00
# include <linux/init.h>
# include <linux/moduleparam.h>
2007-06-13 23:04:20 +04:00
# include <linux/rtnetlink.h>
2017-03-11 23:06:54 +03:00
# include <linux/net_tstamp.h>
2007-06-13 23:04:34 +04:00
# include <net/rtnetlink.h>
2010-09-28 00:50:33 +04:00
# include <linux/u64_stats_sync.h>
2007-06-13 23:04:20 +04:00
2014-12-06 03:13:24 +03:00
# define DRV_NAME "dummy"
2005-04-17 02:20:36 +04:00
static int numdummies = 1 ;
/* fake multicast ability */
static void set_multicast_list ( struct net_device * dev )
{
}
2017-01-07 06:12:52 +03:00
static void dummy_get_stats64 ( struct net_device * dev ,
struct rtnl_link_stats64 * stats )
2010-09-28 00:50:33 +04:00
{
2019-11-08 03:27:19 +03:00
dev_lstats_read ( dev , & stats - > tx_packets , & stats - > tx_bytes ) ;
2010-09-28 00:50:33 +04:00
}
2009-08-31 23:50:51 +04:00
static netdev_tx_t dummy_xmit ( struct sk_buff * skb , struct net_device * dev )
{
2019-11-08 03:27:19 +03:00
dev_lstats_add ( dev , skb - > len ) ;
2009-08-31 23:50:51 +04:00
2017-03-11 23:06:54 +03:00
skb_tx_timestamp ( skb ) ;
2009-08-31 23:50:51 +04:00
dev_kfree_skb ( skb ) ;
return NETDEV_TX_OK ;
}
2010-09-28 00:50:33 +04:00
static int dummy_dev_init ( struct net_device * dev )
{
2024-02-19 16:43:28 +03:00
dev - > pcpu_stat_type = NETDEV_PCPU_STAT_LSTATS ;
2010-09-28 00:50:33 +04:00
net: add netdev_lockdep_set_classes() to virtual drivers
Based on a syzbot report, it appears many virtual
drivers do not yet use netdev_lockdep_set_classes(),
triggerring lockdep false positives.
WARNING: possible recursive locking detected
6.8.0-rc4-next-20240212-syzkaller #0 Not tainted
syz-executor.0/19016 is trying to acquire lock:
ffff8880162cb298 (_xmit_ETHER#2){+.-.}-{2:2}, at: spin_lock include/linux/spinlock.h:351 [inline]
ffff8880162cb298 (_xmit_ETHER#2){+.-.}-{2:2}, at: __netif_tx_lock include/linux/netdevice.h:4452 [inline]
ffff8880162cb298 (_xmit_ETHER#2){+.-.}-{2:2}, at: sch_direct_xmit+0x1c4/0x5f0 net/sched/sch_generic.c:340
but task is already holding lock:
ffff8880223db4d8 (_xmit_ETHER#2){+.-.}-{2:2}, at: spin_lock include/linux/spinlock.h:351 [inline]
ffff8880223db4d8 (_xmit_ETHER#2){+.-.}-{2:2}, at: __netif_tx_lock include/linux/netdevice.h:4452 [inline]
ffff8880223db4d8 (_xmit_ETHER#2){+.-.}-{2:2}, at: sch_direct_xmit+0x1c4/0x5f0 net/sched/sch_generic.c:340
other info that might help us debug this:
Possible unsafe locking scenario:
CPU0
lock(_xmit_ETHER#2);
lock(_xmit_ETHER#2);
*** DEADLOCK ***
May be due to missing lock nesting notation
9 locks held by syz-executor.0/19016:
#0: ffffffff8f385208 (rtnl_mutex){+.+.}-{3:3}, at: rtnl_lock net/core/rtnetlink.c:79 [inline]
#0: ffffffff8f385208 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x82c/0x1040 net/core/rtnetlink.c:6603
#1: ffffc90000a08c00 ((&in_dev->mr_ifc_timer)){+.-.}-{0:0}, at: call_timer_fn+0xc0/0x600 kernel/time/timer.c:1697
#2: ffffffff8e131520 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:298 [inline]
#2: ffffffff8e131520 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:750 [inline]
#2: ffffffff8e131520 (rcu_read_lock){....}-{1:2}, at: ip_finish_output2+0x45f/0x1360 net/ipv4/ip_output.c:228
#3: ffffffff8e131580 (rcu_read_lock_bh){....}-{1:2}, at: local_bh_disable include/linux/bottom_half.h:20 [inline]
#3: ffffffff8e131580 (rcu_read_lock_bh){....}-{1:2}, at: rcu_read_lock_bh include/linux/rcupdate.h:802 [inline]
#3: ffffffff8e131580 (rcu_read_lock_bh){....}-{1:2}, at: __dev_queue_xmit+0x2c4/0x3b10 net/core/dev.c:4284
#4: ffff8880416e3258 (dev->qdisc_tx_busylock ?: &qdisc_tx_busylock){+...}-{2:2}, at: spin_trylock include/linux/spinlock.h:361 [inline]
#4: ffff8880416e3258 (dev->qdisc_tx_busylock ?: &qdisc_tx_busylock){+...}-{2:2}, at: qdisc_run_begin include/net/sch_generic.h:195 [inline]
#4: ffff8880416e3258 (dev->qdisc_tx_busylock ?: &qdisc_tx_busylock){+...}-{2:2}, at: __dev_xmit_skb net/core/dev.c:3771 [inline]
#4: ffff8880416e3258 (dev->qdisc_tx_busylock ?: &qdisc_tx_busylock){+...}-{2:2}, at: __dev_queue_xmit+0x1262/0x3b10 net/core/dev.c:4325
#5: ffff8880223db4d8 (_xmit_ETHER#2){+.-.}-{2:2}, at: spin_lock include/linux/spinlock.h:351 [inline]
#5: ffff8880223db4d8 (_xmit_ETHER#2){+.-.}-{2:2}, at: __netif_tx_lock include/linux/netdevice.h:4452 [inline]
#5: ffff8880223db4d8 (_xmit_ETHER#2){+.-.}-{2:2}, at: sch_direct_xmit+0x1c4/0x5f0 net/sched/sch_generic.c:340
#6: ffffffff8e131520 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:298 [inline]
#6: ffffffff8e131520 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:750 [inline]
#6: ffffffff8e131520 (rcu_read_lock){....}-{1:2}, at: ip_finish_output2+0x45f/0x1360 net/ipv4/ip_output.c:228
#7: ffffffff8e131580 (rcu_read_lock_bh){....}-{1:2}, at: local_bh_disable include/linux/bottom_half.h:20 [inline]
#7: ffffffff8e131580 (rcu_read_lock_bh){....}-{1:2}, at: rcu_read_lock_bh include/linux/rcupdate.h:802 [inline]
#7: ffffffff8e131580 (rcu_read_lock_bh){....}-{1:2}, at: __dev_queue_xmit+0x2c4/0x3b10 net/core/dev.c:4284
#8: ffff888014d9d258 (dev->qdisc_tx_busylock ?: &qdisc_tx_busylock){+...}-{2:2}, at: spin_trylock include/linux/spinlock.h:361 [inline]
#8: ffff888014d9d258 (dev->qdisc_tx_busylock ?: &qdisc_tx_busylock){+...}-{2:2}, at: qdisc_run_begin include/net/sch_generic.h:195 [inline]
#8: ffff888014d9d258 (dev->qdisc_tx_busylock ?: &qdisc_tx_busylock){+...}-{2:2}, at: __dev_xmit_skb net/core/dev.c:3771 [inline]
#8: ffff888014d9d258 (dev->qdisc_tx_busylock ?: &qdisc_tx_busylock){+...}-{2:2}, at: __dev_queue_xmit+0x1262/0x3b10 net/core/dev.c:4325
stack backtrace:
CPU: 1 PID: 19016 Comm: syz-executor.0 Not tainted 6.8.0-rc4-next-20240212-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
Call Trace:
<IRQ>
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
check_deadlock kernel/locking/lockdep.c:3062 [inline]
validate_chain+0x15c1/0x58e0 kernel/locking/lockdep.c:3856
__lock_acquire+0x1346/0x1fd0 kernel/locking/lockdep.c:5137
lock_acquire+0x1e4/0x530 kernel/locking/lockdep.c:5754
__raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
_raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154
spin_lock include/linux/spinlock.h:351 [inline]
__netif_tx_lock include/linux/netdevice.h:4452 [inline]
sch_direct_xmit+0x1c4/0x5f0 net/sched/sch_generic.c:340
__dev_xmit_skb net/core/dev.c:3784 [inline]
__dev_queue_xmit+0x1912/0x3b10 net/core/dev.c:4325
neigh_output include/net/neighbour.h:542 [inline]
ip_finish_output2+0xe66/0x1360 net/ipv4/ip_output.c:235
iptunnel_xmit+0x540/0x9b0 net/ipv4/ip_tunnel_core.c:82
ip_tunnel_xmit+0x20ee/0x2960 net/ipv4/ip_tunnel.c:831
erspan_xmit+0x9de/0x1460 net/ipv4/ip_gre.c:720
__netdev_start_xmit include/linux/netdevice.h:4989 [inline]
netdev_start_xmit include/linux/netdevice.h:5003 [inline]
xmit_one net/core/dev.c:3555 [inline]
dev_hard_start_xmit+0x242/0x770 net/core/dev.c:3571
sch_direct_xmit+0x2b6/0x5f0 net/sched/sch_generic.c:342
__dev_xmit_skb net/core/dev.c:3784 [inline]
__dev_queue_xmit+0x1912/0x3b10 net/core/dev.c:4325
neigh_output include/net/neighbour.h:542 [inline]
ip_finish_output2+0xe66/0x1360 net/ipv4/ip_output.c:235
igmpv3_send_cr net/ipv4/igmp.c:723 [inline]
igmp_ifc_timer_expire+0xb71/0xd90 net/ipv4/igmp.c:813
call_timer_fn+0x17e/0x600 kernel/time/timer.c:1700
expire_timers kernel/time/timer.c:1751 [inline]
__run_timers+0x621/0x830 kernel/time/timer.c:2038
run_timer_softirq+0x67/0xf0 kernel/time/timer.c:2051
__do_softirq+0x2bc/0x943 kernel/softirq.c:554
invoke_softirq kernel/softirq.c:428 [inline]
__irq_exit_rcu+0xf2/0x1c0 kernel/softirq.c:633
irq_exit_rcu+0x9/0x30 kernel/softirq.c:645
instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1076 [inline]
sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1076
</IRQ>
<TASK>
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:resched_offsets_ok kernel/sched/core.c:10127 [inline]
RIP: 0010:__might_resched+0x16f/0x780 kernel/sched/core.c:10142
Code: 00 4c 89 e8 48 c1 e8 03 48 ba 00 00 00 00 00 fc ff df 48 89 44 24 38 0f b6 04 10 84 c0 0f 85 87 04 00 00 41 8b 45 00 c1 e0 08 <01> d8 44 39 e0 0f 85 d6 00 00 00 44 89 64 24 1c 48 8d bc 24 a0 00
RSP: 0018:ffffc9000ee069e0 EFLAGS: 00000246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff8880296a9e00
RDX: dffffc0000000000 RSI: ffff8880296a9e00 RDI: ffffffff8bfe8fa0
RBP: ffffc9000ee06b00 R08: ffffffff82326877 R09: 1ffff11002b5ad1b
R10: dffffc0000000000 R11: ffffed1002b5ad1c R12: 0000000000000000
R13: ffff8880296aa23c R14: 000000000000062a R15: 1ffff92001dc0d44
down_write+0x19/0x50 kernel/locking/rwsem.c:1578
kernfs_activate fs/kernfs/dir.c:1403 [inline]
kernfs_add_one+0x4af/0x8b0 fs/kernfs/dir.c:819
__kernfs_create_file+0x22e/0x2e0 fs/kernfs/file.c:1056
sysfs_add_file_mode_ns+0x24a/0x310 fs/sysfs/file.c:307
create_files fs/sysfs/group.c:64 [inline]
internal_create_group+0x4f4/0xf20 fs/sysfs/group.c:152
internal_create_groups fs/sysfs/group.c:192 [inline]
sysfs_create_groups+0x56/0x120 fs/sysfs/group.c:218
create_dir lib/kobject.c:78 [inline]
kobject_add_internal+0x472/0x8d0 lib/kobject.c:240
kobject_add_varg lib/kobject.c:374 [inline]
kobject_init_and_add+0x124/0x190 lib/kobject.c:457
netdev_queue_add_kobject net/core/net-sysfs.c:1706 [inline]
netdev_queue_update_kobjects+0x1f3/0x480 net/core/net-sysfs.c:1758
register_queue_kobjects net/core/net-sysfs.c:1819 [inline]
netdev_register_kobject+0x265/0x310 net/core/net-sysfs.c:2059
register_netdevice+0x1191/0x19c0 net/core/dev.c:10298
bond_newlink+0x3b/0x90 drivers/net/bonding/bond_netlink.c:576
rtnl_newlink_create net/core/rtnetlink.c:3506 [inline]
__rtnl_newlink net/core/rtnetlink.c:3726 [inline]
rtnl_newlink+0x158f/0x20a0 net/core/rtnetlink.c:3739
rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6606
netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543
netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]
netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367
netlink_sendmsg+0xa3c/0xd70 net/netlink/af_netlink.c:1908
sock_sendmsg_nosec net/socket.c:730 [inline]
__sock_sendmsg+0x221/0x270 net/socket.c:745
__sys_sendto+0x3a4/0x4f0 net/socket.c:2191
__do_sys_sendto net/socket.c:2203 [inline]
__se_sys_sendto net/socket.c:2199 [inline]
__x64_sys_sendto+0xde/0x100 net/socket.c:2199
do_syscall_64+0xfb/0x240
entry_SYSCALL_64_after_hwframe+0x6d/0x75
RIP: 0033:0x7fc3fa87fa9c
Reported-by: syzbot <syzkaller@googlegroups.com>
Signed-off-by: Eric Dumazet <edumazet@google.com>
Link: https://lore.kernel.org/r/20240212140700.2795436-4-edumazet@google.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
2024-02-12 17:07:00 +03:00
netdev_lockdep_set_classes ( dev ) ;
2010-09-28 00:50:33 +04:00
return 0 ;
}
2012-12-28 03:49:40 +04:00
static int dummy_change_carrier ( struct net_device * dev , bool new_carrier )
{
if ( new_carrier )
netif_carrier_on ( dev ) ;
else
netif_carrier_off ( dev ) ;
return 0 ;
}
2008-11-21 07:28:00 +03:00
static const struct net_device_ops dummy_netdev_ops = {
2010-09-28 00:50:33 +04:00
. ndo_init = dummy_dev_init ,
2008-11-21 07:28:00 +03:00
. ndo_start_xmit = dummy_xmit ,
. ndo_validate_addr = eth_validate_addr ,
2011-08-16 10:29:01 +04:00
. ndo_set_rx_mode = set_multicast_list ,
2012-06-29 09:10:08 +04:00
. ndo_set_mac_address = eth_mac_addr ,
2010-09-28 00:50:33 +04:00
. ndo_get_stats64 = dummy_get_stats64 ,
2012-12-28 03:49:40 +04:00
. ndo_change_carrier = dummy_change_carrier ,
2008-11-21 07:28:00 +03:00
} ;
2014-12-06 03:13:24 +03:00
static const struct ethtool_ops dummy_ethtool_ops = {
2019-04-12 14:06:13 +03:00
. get_ts_info = ethtool_op_get_ts_info ,
2014-12-06 03:13:24 +03:00
} ;
2007-06-13 23:04:34 +04:00
static void dummy_setup ( struct net_device * dev )
2005-04-17 02:20:36 +04:00
{
2008-11-21 07:28:00 +03:00
ether_setup ( dev ) ;
2005-04-17 02:20:36 +04:00
/* Initialize the device structure. */
2008-11-21 07:28:00 +03:00
dev - > netdev_ops = & dummy_netdev_ops ;
2014-12-06 03:13:24 +03:00
dev - > ethtool_ops = & dummy_ethtool_ops ;
net: Fix inconsistent teardown and release of private netdev state.
Network devices can allocate reasources and private memory using
netdev_ops->ndo_init(). However, the release of these resources
can occur in one of two different places.
Either netdev_ops->ndo_uninit() or netdev->destructor().
The decision of which operation frees the resources depends upon
whether it is necessary for all netdev refs to be released before it
is safe to perform the freeing.
netdev_ops->ndo_uninit() presumably can occur right after the
NETDEV_UNREGISTER notifier completes and the unicast and multicast
address lists are flushed.
netdev->destructor(), on the other hand, does not run until the
netdev references all go away.
Further complicating the situation is that netdev->destructor()
almost universally does also a free_netdev().
This creates a problem for the logic in register_netdevice().
Because all callers of register_netdevice() manage the freeing
of the netdev, and invoke free_netdev(dev) if register_netdevice()
fails.
If netdev_ops->ndo_init() succeeds, but something else fails inside
of register_netdevice(), it does call ndo_ops->ndo_uninit(). But
it is not able to invoke netdev->destructor().
This is because netdev->destructor() will do a free_netdev() and
then the caller of register_netdevice() will do the same.
However, this means that the resources that would normally be released
by netdev->destructor() will not be.
Over the years drivers have added local hacks to deal with this, by
invoking their destructor parts by hand when register_netdevice()
fails.
Many drivers do not try to deal with this, and instead we have leaks.
Let's close this hole by formalizing the distinction between what
private things need to be freed up by netdev->destructor() and whether
the driver needs unregister_netdevice() to perform the free_netdev().
netdev->priv_destructor() performs all actions to free up the private
resources that used to be freed by netdev->destructor(), except for
free_netdev().
netdev->needs_free_netdev is a boolean that indicates whether
free_netdev() should be done at the end of unregister_netdevice().
Now, register_netdevice() can sanely release all resources after
ndo_ops->ndo_init() succeeds, by invoking both ndo_ops->ndo_uninit()
and netdev->priv_destructor().
And at the end of unregister_netdevice(), we invoke
netdev->priv_destructor() and optionally call free_netdev().
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-05-08 19:52:56 +03:00
dev - > needs_free_netdev = true ;
2005-04-17 02:20:36 +04:00
/* Fill in device structure with ethernet-generic values. */
dev - > flags | = IFF_NOARP ;
dev - > flags & = ~ IFF_MULTICAST ;
2015-08-18 11:30:30 +03:00
dev - > priv_flags | = IFF_LIVE_ADDR_CHANGE | IFF_NO_QUEUE ;
2015-10-20 06:17:59 +03:00
dev - > features | = NETIF_F_SG | NETIF_F_FRAGLIST ;
2020-11-01 16:17:17 +03:00
dev - > features | = NETIF_F_GSO_SOFTWARE ;
2011-11-15 19:29:55 +04:00
dev - > features | = NETIF_F_HW_CSUM | NETIF_F_HIGHDMA | NETIF_F_LLTX ;
2015-10-20 06:17:59 +03:00
dev - > features | = NETIF_F_GSO_ENCAP_ALL ;
dev - > hw_features | = dev - > features ;
dev - > hw_enc_features | = dev - > features ;
2012-02-15 10:45:40 +04:00
eth_hw_addr_random ( dev ) ;
2016-12-07 12:41:33 +03:00
dev - > min_mtu = 0 ;
2017-09-22 18:57:49 +03:00
dev - > max_mtu = 0 ;
2005-04-17 02:20:36 +04:00
}
2010-09-28 00:50:33 +04:00
2017-06-26 00:56:01 +03:00
static int dummy_validate ( struct nlattr * tb [ ] , struct nlattr * data [ ] ,
struct netlink_ext_ack * extack )
2007-07-12 06:42:31 +04:00
{
if ( tb [ IFLA_ADDRESS ] ) {
if ( nla_len ( tb [ IFLA_ADDRESS ] ) ! = ETH_ALEN )
return - EINVAL ;
if ( ! is_valid_ether_addr ( nla_data ( tb [ IFLA_ADDRESS ] ) ) )
return - EADDRNOTAVAIL ;
}
return 0 ;
}
2007-06-13 23:04:34 +04:00
static struct rtnl_link_ops dummy_link_ops __read_mostly = {
2014-12-06 03:13:24 +03:00
. kind = DRV_NAME ,
2007-06-13 23:04:34 +04:00
. setup = dummy_setup ,
2007-07-12 06:42:31 +04:00
. validate = dummy_validate ,
2007-06-13 23:04:34 +04:00
} ;
2005-04-17 02:20:36 +04:00
/* Number of dummy devices to be set up by this module. */
module_param ( numdummies , int , 0 ) ;
MODULE_PARM_DESC ( numdummies , " Number of dummy pseudo devices " ) ;
2007-06-13 23:04:20 +04:00
static int __init dummy_init_one ( void )
2005-04-17 02:20:36 +04:00
{
struct net_device * dev_dummy ;
int err ;
2017-12-02 02:09:02 +03:00
dev_dummy = alloc_netdev ( 0 , " dummy%d " , NET_NAME_ENUM , dummy_setup ) ;
2005-04-17 02:20:36 +04:00
if ( ! dev_dummy )
return - ENOMEM ;
2007-06-13 23:04:34 +04:00
dev_dummy - > rtnl_link_ops = & dummy_link_ops ;
err = register_netdevice ( dev_dummy ) ;
if ( err < 0 )
goto err ;
return 0 ;
2007-06-13 23:04:20 +04:00
2007-06-13 23:04:34 +04:00
err :
free_netdev ( dev_dummy ) ;
return err ;
2006-09-13 21:24:59 +04:00
}
2005-04-17 02:20:36 +04:00
static int __init dummy_init_module ( void )
2006-09-13 21:24:59 +04:00
{
2005-04-17 02:20:36 +04:00
int i , err = 0 ;
2007-06-13 23:04:20 +04:00
2018-03-30 19:38:37 +03:00
down_write ( & pernet_ops_rwsem ) ;
2007-06-13 23:04:34 +04:00
rtnl_lock ( ) ;
err = __rtnl_link_register ( & dummy_link_ops ) ;
2013-07-11 15:04:02 +04:00
if ( err < 0 )
goto out ;
2007-06-13 23:04:34 +04:00
2012-06-11 01:11:57 +04:00
for ( i = 0 ; i < numdummies & & ! err ; i + + ) {
2007-06-13 23:04:20 +04:00
err = dummy_init_one ( ) ;
2012-06-11 01:11:57 +04:00
cond_resched ( ) ;
}
2007-07-12 06:42:13 +04:00
if ( err < 0 )
2007-06-13 23:04:34 +04:00
__rtnl_link_unregister ( & dummy_link_ops ) ;
2013-07-11 15:04:02 +04:00
out :
2007-06-13 23:04:34 +04:00
rtnl_unlock ( ) ;
2018-03-30 19:38:37 +03:00
up_write ( & pernet_ops_rwsem ) ;
2007-06-13 23:04:34 +04:00
2005-04-17 02:20:36 +04:00
return err ;
2006-09-13 21:24:59 +04:00
}
2005-04-17 02:20:36 +04:00
static void __exit dummy_cleanup_module ( void )
{
2007-07-12 06:42:13 +04:00
rtnl_link_unregister ( & dummy_link_ops ) ;
2005-04-17 02:20:36 +04:00
}
module_init ( dummy_init_module ) ;
module_exit ( dummy_cleanup_module ) ;
MODULE_LICENSE ( " GPL " ) ;
2023-10-28 00:13:11 +03:00
MODULE_DESCRIPTION ( " Dummy netdevice driver which discards all packets sent to it " ) ;
2014-12-06 03:13:24 +03:00
MODULE_ALIAS_RTNL_LINK ( DRV_NAME ) ;