Revert "net/sched: flower: Fix wrong handle assignment during filter change"
[linux-block.git] / net / core / dev_ioctl.c
CommitLineData
b2441318 1// SPDX-License-Identifier: GPL-2.0
96b45cbd
CW
2#include <linux/kmod.h>
3#include <linux/netdevice.h>
b0e99d03 4#include <linux/inetdevice.h>
96b45cbd
CW
5#include <linux/etherdevice.h>
6#include <linux/rtnetlink.h>
7#include <linux/net_tstamp.h>
8#include <linux/wireless.h>
ad2f99ae 9#include <linux/if_bridge.h>
5a178186 10#include <net/dsa_stubs.h>
96b45cbd
CW
11#include <net/wext.h>
12
6264f58c
JK
13#include "dev.h"
14
96b45cbd
CW
15/*
16 * Map an interface index to its name (SIOCGIFNAME)
17 */
18
19/*
20 * We need this ioctl for efficient implementation of the
21 * if_indextoname() function required by the IPv6 API. Without
22 * it, we would have to search all the interfaces to find a
23 * match. --pb
24 */
25
44c02a2c 26static int dev_ifname(struct net *net, struct ifreq *ifr)
96b45cbd 27{
44c02a2c
AV
28 ifr->ifr_name[IFNAMSIZ-1] = 0;
29 return netdev_get_name(net, ifr->ifr_name, ifr->ifr_ifindex);
96b45cbd
CW
30}
31
96b45cbd
CW
32/*
33 * Perform a SIOCGIFCONF call. This structure will change
34 * size eventually, and there is nothing I can do about it.
35 * Thus we will need a 'compatibility mode'.
36 */
876f0bf9 37int dev_ifconf(struct net *net, struct ifconf __user *uifc)
96b45cbd 38{
96b45cbd 39 struct net_device *dev;
876f0bf9
AB
40 void __user *pos;
41 size_t size;
42 int len, total = 0, done;
96b45cbd 43
876f0bf9
AB
44 /* both the ifconf and the ifreq structures are slightly different */
45 if (in_compat_syscall()) {
46 struct compat_ifconf ifc32;
96b45cbd 47
876f0bf9
AB
48 if (copy_from_user(&ifc32, uifc, sizeof(struct compat_ifconf)))
49 return -EFAULT;
96b45cbd 50
876f0bf9
AB
51 pos = compat_ptr(ifc32.ifcbuf);
52 len = ifc32.ifc_len;
53 size = sizeof(struct compat_ifreq);
54 } else {
55 struct ifconf ifc;
56
57 if (copy_from_user(&ifc, uifc, sizeof(struct ifconf)))
58 return -EFAULT;
96b45cbd 59
876f0bf9
AB
60 pos = ifc.ifc_buf;
61 len = ifc.ifc_len;
62 size = sizeof(struct ifreq);
63 }
64
65 /* Loop over the interfaces, and write an info block for each. */
66 rtnl_lock();
96b45cbd 67 for_each_netdev(net, dev) {
b0e99d03
AB
68 if (!pos)
69 done = inet_gifconf(dev, NULL, 0, size);
70 else
71 done = inet_gifconf(dev, pos + total,
72 len - total, size);
876f0bf9
AB
73 if (done < 0) {
74 rtnl_unlock();
b0e99d03 75 return -EFAULT;
876f0bf9 76 }
b0e99d03 77 total += done;
96b45cbd 78 }
876f0bf9 79 rtnl_unlock();
96b45cbd 80
876f0bf9 81 return put_user(total, &uifc->ifc_len);
96b45cbd
CW
82}
83
709566d7
AB
84static int dev_getifmap(struct net_device *dev, struct ifreq *ifr)
85{
86 struct ifmap *ifmap = &ifr->ifr_map;
87
88 if (in_compat_syscall()) {
89 struct compat_ifmap *cifmap = (struct compat_ifmap *)ifmap;
90
91 cifmap->mem_start = dev->mem_start;
92 cifmap->mem_end = dev->mem_end;
93 cifmap->base_addr = dev->base_addr;
94 cifmap->irq = dev->irq;
95 cifmap->dma = dev->dma;
96 cifmap->port = dev->if_port;
97
98 return 0;
99 }
100
101 ifmap->mem_start = dev->mem_start;
102 ifmap->mem_end = dev->mem_end;
103 ifmap->base_addr = dev->base_addr;
104 ifmap->irq = dev->irq;
105 ifmap->dma = dev->dma;
106 ifmap->port = dev->if_port;
107
108 return 0;
109}
110
111static int dev_setifmap(struct net_device *dev, struct ifreq *ifr)
112{
113 struct compat_ifmap *cifmap = (struct compat_ifmap *)&ifr->ifr_map;
114
115 if (!dev->netdev_ops->ndo_set_config)
116 return -EOPNOTSUPP;
117
118 if (in_compat_syscall()) {
119 struct ifmap ifmap = {
120 .mem_start = cifmap->mem_start,
121 .mem_end = cifmap->mem_end,
122 .base_addr = cifmap->base_addr,
123 .irq = cifmap->irq,
124 .dma = cifmap->dma,
125 .port = cifmap->port,
126 };
127
128 return dev->netdev_ops->ndo_set_config(dev, &ifmap);
129 }
130
131 return dev->netdev_ops->ndo_set_config(dev, &ifr->ifr_map);
132}
133
96b45cbd
CW
134/*
135 * Perform the SIOCxIFxxx calls, inside rcu_read_lock()
136 */
137static int dev_ifsioc_locked(struct net *net, struct ifreq *ifr, unsigned int cmd)
138{
139 int err;
140 struct net_device *dev = dev_get_by_name_rcu(net, ifr->ifr_name);
141
142 if (!dev)
143 return -ENODEV;
144
145 switch (cmd) {
146 case SIOCGIFFLAGS: /* Get interface flags */
147 ifr->ifr_flags = (short) dev_get_flags(dev);
148 return 0;
149
150 case SIOCGIFMETRIC: /* Get the metric on the interface
151 (currently unused) */
152 ifr->ifr_metric = 0;
153 return 0;
154
155 case SIOCGIFMTU: /* Get the MTU of a device */
156 ifr->ifr_mtu = dev->mtu;
157 return 0;
158
96b45cbd
CW
159 case SIOCGIFSLAVE:
160 err = -EINVAL;
161 break;
162
163 case SIOCGIFMAP:
709566d7 164 return dev_getifmap(dev, ifr);
96b45cbd
CW
165
166 case SIOCGIFINDEX:
167 ifr->ifr_ifindex = dev->ifindex;
168 return 0;
169
170 case SIOCGIFTXQLEN:
171 ifr->ifr_qlen = dev->tx_queue_len;
172 return 0;
173
174 default:
175 /* dev_ioctl() should ensure this case
176 * is never reached
177 */
178 WARN_ON(1);
179 err = -ENOTTY;
180 break;
181
182 }
183 return err;
184}
185
c4bffeaa 186static int net_hwtstamp_validate(const struct kernel_hwtstamp_config *cfg)
96b45cbd 187{
96b45cbd
CW
188 enum hwtstamp_tx_types tx_type;
189 enum hwtstamp_rx_filters rx_filter;
190 int tx_type_valid = 0;
191 int rx_filter_valid = 0;
192
d5d5fd8f 193 if (cfg->flags & ~HWTSTAMP_FLAG_MASK)
96b45cbd
CW
194 return -EINVAL;
195
d5d5fd8f
VO
196 tx_type = cfg->tx_type;
197 rx_filter = cfg->rx_filter;
96b45cbd
CW
198
199 switch (tx_type) {
200 case HWTSTAMP_TX_OFF:
201 case HWTSTAMP_TX_ON:
202 case HWTSTAMP_TX_ONESTEP_SYNC:
b6fd7b96 203 case HWTSTAMP_TX_ONESTEP_P2P:
96b45cbd
CW
204 tx_type_valid = 1;
205 break;
f76510b4
MK
206 case __HWTSTAMP_TX_CNT:
207 /* not a real value */
208 break;
96b45cbd
CW
209 }
210
211 switch (rx_filter) {
212 case HWTSTAMP_FILTER_NONE:
213 case HWTSTAMP_FILTER_ALL:
214 case HWTSTAMP_FILTER_SOME:
215 case HWTSTAMP_FILTER_PTP_V1_L4_EVENT:
216 case HWTSTAMP_FILTER_PTP_V1_L4_SYNC:
217 case HWTSTAMP_FILTER_PTP_V1_L4_DELAY_REQ:
218 case HWTSTAMP_FILTER_PTP_V2_L4_EVENT:
219 case HWTSTAMP_FILTER_PTP_V2_L4_SYNC:
220 case HWTSTAMP_FILTER_PTP_V2_L4_DELAY_REQ:
221 case HWTSTAMP_FILTER_PTP_V2_L2_EVENT:
222 case HWTSTAMP_FILTER_PTP_V2_L2_SYNC:
223 case HWTSTAMP_FILTER_PTP_V2_L2_DELAY_REQ:
224 case HWTSTAMP_FILTER_PTP_V2_EVENT:
225 case HWTSTAMP_FILTER_PTP_V2_SYNC:
226 case HWTSTAMP_FILTER_PTP_V2_DELAY_REQ:
b8210a9e 227 case HWTSTAMP_FILTER_NTP_ALL:
e3412575 228 rx_filter_valid = 1;
b8210a9e 229 break;
f76510b4
MK
230 case __HWTSTAMP_FILTER_CNT:
231 /* not a real value */
232 break;
96b45cbd
CW
233 }
234
235 if (!tx_type_valid || !rx_filter_valid)
236 return -ERANGE;
237
238 return 0;
239}
240
a7605370
AB
241static int dev_eth_ioctl(struct net_device *dev,
242 struct ifreq *ifr, unsigned int cmd)
aad74d84
FF
243{
244 const struct net_device_ops *ops = dev->netdev_ops;
4ee58e1e
VO
245
246 if (!ops->ndo_eth_ioctl)
247 return -EOPNOTSUPP;
248
249 if (!netif_device_present(dev))
250 return -ENODEV;
251
252 return ops->ndo_eth_ioctl(dev, ifr, cmd);
253}
254
255static int dev_get_hwtstamp(struct net_device *dev, struct ifreq *ifr)
256{
257 return dev_eth_ioctl(dev, ifr, SIOCGHWTSTAMP);
258}
259
260static int dev_set_hwtstamp(struct net_device *dev, struct ifreq *ifr)
261{
c4bffeaa 262 struct kernel_hwtstamp_config kernel_cfg;
88c0a6b5 263 struct netlink_ext_ack extack = {};
d5d5fd8f 264 struct hwtstamp_config cfg;
1ca47431 265 int err;
aad74d84 266
d5d5fd8f
VO
267 if (copy_from_user(&cfg, ifr->ifr_data, sizeof(cfg)))
268 return -EFAULT;
269
c4bffeaa
VO
270 hwtstamp_config_to_kernel(&kernel_cfg, &cfg);
271
272 err = net_hwtstamp_validate(&kernel_cfg);
4ee58e1e 273 if (err)
3369afba
FF
274 return err;
275
5a178186 276 err = dsa_master_hwtstamp_validate(dev, &kernel_cfg, &extack);
88c0a6b5
VO
277 if (err) {
278 if (extack._msg)
279 netdev_err(dev, "%s\n", extack._msg);
4ee58e1e 280 return err;
88c0a6b5 281 }
aad74d84 282
4ee58e1e 283 return dev_eth_ioctl(dev, ifr, SIOCSHWTSTAMP);
aad74d84
FF
284}
285
3d9d00bd 286static int dev_siocbond(struct net_device *dev,
a7605370
AB
287 struct ifreq *ifr, unsigned int cmd)
288{
289 const struct net_device_ops *ops = dev->netdev_ops;
290
3d9d00bd 291 if (ops->ndo_siocbond) {
a7605370 292 if (netif_device_present(dev))
3d9d00bd 293 return ops->ndo_siocbond(dev, ifr, cmd);
a7605370
AB
294 else
295 return -ENODEV;
296 }
297
298 return -EOPNOTSUPP;
299}
300
a554bf96
AB
301static int dev_siocdevprivate(struct net_device *dev, struct ifreq *ifr,
302 void __user *data, unsigned int cmd)
b9067f5d
AB
303{
304 const struct net_device_ops *ops = dev->netdev_ops;
b9067f5d
AB
305
306 if (ops->ndo_siocdevprivate) {
307 if (netif_device_present(dev))
308 return ops->ndo_siocdevprivate(dev, ifr, data, cmd);
309 else
310 return -ENODEV;
311 }
312
88fc023f 313 return -EOPNOTSUPP;
b9067f5d
AB
314}
315
ad7eab2a
AB
316static int dev_siocwandev(struct net_device *dev, struct if_settings *ifs)
317{
318 const struct net_device_ops *ops = dev->netdev_ops;
319
320 if (ops->ndo_siocwandev) {
321 if (netif_device_present(dev))
322 return ops->ndo_siocwandev(dev, ifs);
323 else
324 return -ENODEV;
325 }
326
327 return -EOPNOTSUPP;
328}
329
96b45cbd
CW
330/*
331 * Perform the SIOCxIFxxx calls, inside rtnl_lock()
332 */
a554bf96
AB
333static int dev_ifsioc(struct net *net, struct ifreq *ifr, void __user *data,
334 unsigned int cmd)
96b45cbd
CW
335{
336 int err;
337 struct net_device *dev = __dev_get_by_name(net, ifr->ifr_name);
338 const struct net_device_ops *ops;
14ed029b 339 netdevice_tracker dev_tracker;
96b45cbd
CW
340
341 if (!dev)
342 return -ENODEV;
343
344 ops = dev->netdev_ops;
345
346 switch (cmd) {
347 case SIOCSIFFLAGS: /* Set interface flags */
567c5e13 348 return dev_change_flags(dev, ifr->ifr_flags, NULL);
96b45cbd
CW
349
350 case SIOCSIFMETRIC: /* Set the metric on the interface
351 (currently unused) */
352 return -EOPNOTSUPP;
353
354 case SIOCSIFMTU: /* Set the MTU of a device */
355 return dev_set_mtu(dev, ifr->ifr_mtu);
356
357 case SIOCSIFHWADDR:
0254e0c6
WC
358 if (dev->addr_len > sizeof(struct sockaddr))
359 return -EINVAL;
3b23a32a 360 return dev_set_mac_address_user(dev, &ifr->ifr_hwaddr, NULL);
96b45cbd
CW
361
362 case SIOCSIFHWBROADCAST:
363 if (ifr->ifr_hwaddr.sa_family != dev->type)
364 return -EINVAL;
365 memcpy(dev->broadcast, ifr->ifr_hwaddr.sa_data,
b5f0de6d 366 min(sizeof(ifr->ifr_hwaddr.sa_data_min),
54aeba7f 367 (size_t)dev->addr_len));
96b45cbd
CW
368 call_netdevice_notifiers(NETDEV_CHANGEADDR, dev);
369 return 0;
370
371 case SIOCSIFMAP:
709566d7 372 return dev_setifmap(dev, ifr);
96b45cbd
CW
373
374 case SIOCADDMULTI:
375 if (!ops->ndo_set_rx_mode ||
376 ifr->ifr_hwaddr.sa_family != AF_UNSPEC)
377 return -EINVAL;
378 if (!netif_device_present(dev))
379 return -ENODEV;
380 return dev_mc_add_global(dev, ifr->ifr_hwaddr.sa_data);
381
382 case SIOCDELMULTI:
383 if (!ops->ndo_set_rx_mode ||
384 ifr->ifr_hwaddr.sa_family != AF_UNSPEC)
385 return -EINVAL;
386 if (!netif_device_present(dev))
387 return -ENODEV;
388 return dev_mc_del_global(dev, ifr->ifr_hwaddr.sa_data);
389
390 case SIOCSIFTXQLEN:
391 if (ifr->ifr_qlen < 0)
392 return -EINVAL;
8dd30201 393 return dev_change_tx_queue_len(dev, ifr->ifr_qlen);
96b45cbd
CW
394
395 case SIOCSIFNAME:
396 ifr->ifr_newname[IFNAMSIZ-1] = '\0';
397 return dev_change_name(dev, ifr->ifr_newname);
398
ad7eab2a
AB
399 case SIOCWANDEV:
400 return dev_siocwandev(dev, &ifr->ifr_settings);
401
ad2f99ae
AB
402 case SIOCBRADDIF:
403 case SIOCBRDELIF:
404 if (!netif_device_present(dev))
405 return -ENODEV;
9384eacd
NA
406 if (!netif_is_bridge_master(dev))
407 return -EOPNOTSUPP;
d62607c3 408 netdev_hold(dev, &dev_tracker, GFP_KERNEL);
893b1958
NA
409 rtnl_unlock();
410 err = br_ioctl_call(net, netdev_priv(dev), cmd, ifr, NULL);
d62607c3 411 netdev_put(dev, &dev_tracker);
893b1958
NA
412 rtnl_lock();
413 return err;
ad2f99ae 414
00d521b3
VO
415 case SIOCDEVPRIVATE ... SIOCDEVPRIVATE + 15:
416 return dev_siocdevprivate(dev, ifr, data, cmd);
417
96b45cbd 418 case SIOCSHWTSTAMP:
4ee58e1e 419 return dev_set_hwtstamp(dev, ifr);
96b45cbd 420
00d521b3 421 case SIOCGHWTSTAMP:
4ee58e1e
VO
422 return dev_get_hwtstamp(dev, ifr);
423
00d521b3
VO
424 case SIOCGMIIPHY:
425 case SIOCGMIIREG:
426 case SIOCSMIIREG:
427 return dev_eth_ioctl(dev, ifr, cmd);
428
429 case SIOCBONDENSLAVE:
430 case SIOCBONDRELEASE:
431 case SIOCBONDSETHWADDR:
432 case SIOCBONDSLAVEINFOQUERY:
433 case SIOCBONDINFOQUERY:
434 case SIOCBONDCHANGEACTIVE:
435 return dev_siocbond(dev, ifr, cmd);
436
437 /* Unknown ioctl */
96b45cbd 438 default:
00d521b3 439 err = -EINVAL;
96b45cbd
CW
440 }
441 return err;
442}
443
444/**
445 * dev_load - load a network module
446 * @net: the applicable net namespace
447 * @name: name of interface
448 *
449 * If a network interface is not present and the process has suitable
450 * privileges this function loads the module. If module loading is not
451 * available in this kernel then it becomes a nop.
452 */
453
454void dev_load(struct net *net, const char *name)
455{
456 struct net_device *dev;
457 int no_module;
458
459 rcu_read_lock();
460 dev = dev_get_by_name_rcu(net, name);
461 rcu_read_unlock();
462
463 no_module = !dev;
464 if (no_module && capable(CAP_NET_ADMIN))
465 no_module = request_module("netdev-%s", name);
e020836d
DB
466 if (no_module && capable(CAP_SYS_MODULE))
467 request_module("%s", name);
96b45cbd
CW
468}
469EXPORT_SYMBOL(dev_load);
470
471/*
472 * This function handles all "interface"-type I/O control requests. The actual
473 * 'doing' part of this is dev_ifsioc above.
474 */
475
476/**
477 * dev_ioctl - network device ioctl
478 * @net: the applicable net namespace
479 * @cmd: command to issue
b3c0fd61 480 * @ifr: pointer to a struct ifreq in user space
e5b42483 481 * @data: data exchanged with userspace
b3c0fd61 482 * @need_copyout: whether or not copy_to_user() should be called
96b45cbd
CW
483 *
484 * Issue ioctl functions to devices. This is normally called by the
485 * user space syscall interfaces but can sometimes be useful for
486 * other purposes. The return value is the return from the syscall if
487 * positive or a negative errno code on error.
488 */
489
a554bf96
AB
490int dev_ioctl(struct net *net, unsigned int cmd, struct ifreq *ifr,
491 void __user *data, bool *need_copyout)
96b45cbd 492{
96b45cbd
CW
493 int ret;
494 char *colon;
495
44c02a2c
AV
496 if (need_copyout)
497 *need_copyout = true;
96b45cbd 498 if (cmd == SIOCGIFNAME)
44c02a2c 499 return dev_ifname(net, ifr);
96b45cbd 500
44c02a2c 501 ifr->ifr_name[IFNAMSIZ-1] = 0;
96b45cbd 502
44c02a2c 503 colon = strchr(ifr->ifr_name, ':');
96b45cbd
CW
504 if (colon)
505 *colon = 0;
506
507 /*
508 * See which interface the caller is talking about.
509 */
510
511 switch (cmd) {
3b23a32a
CW
512 case SIOCGIFHWADDR:
513 dev_load(net, ifr->ifr_name);
514 ret = dev_get_mac_address(&ifr->ifr_hwaddr, net, ifr->ifr_name);
515 if (colon)
516 *colon = ':';
517 return ret;
96b45cbd
CW
518 /*
519 * These ioctl calls:
520 * - can be done by all.
521 * - atomic and do not require locking.
522 * - return a value
523 */
524 case SIOCGIFFLAGS:
525 case SIOCGIFMETRIC:
526 case SIOCGIFMTU:
96b45cbd
CW
527 case SIOCGIFSLAVE:
528 case SIOCGIFMAP:
529 case SIOCGIFINDEX:
530 case SIOCGIFTXQLEN:
b51f26b1 531 dev_load(net, ifr->ifr_name);
96b45cbd 532 rcu_read_lock();
44c02a2c 533 ret = dev_ifsioc_locked(net, ifr, cmd);
96b45cbd 534 rcu_read_unlock();
44c02a2c
AV
535 if (colon)
536 *colon = ':';
96b45cbd
CW
537 return ret;
538
539 case SIOCETHTOOL:
b51f26b1 540 dev_load(net, ifr->ifr_name);
a554bf96 541 ret = dev_ethtool(net, ifr, data);
44c02a2c
AV
542 if (colon)
543 *colon = ':';
96b45cbd
CW
544 return ret;
545
546 /*
547 * These ioctl calls:
548 * - require superuser power.
549 * - require strict serialization.
550 * - return a value
551 */
552 case SIOCGMIIPHY:
553 case SIOCGMIIREG:
554 case SIOCSIFNAME:
b51f26b1 555 dev_load(net, ifr->ifr_name);
96b45cbd
CW
556 if (!ns_capable(net->user_ns, CAP_NET_ADMIN))
557 return -EPERM;
96b45cbd 558 rtnl_lock();
a554bf96 559 ret = dev_ifsioc(net, ifr, data, cmd);
96b45cbd 560 rtnl_unlock();
44c02a2c
AV
561 if (colon)
562 *colon = ':';
96b45cbd
CW
563 return ret;
564
565 /*
566 * These ioctl calls:
567 * - require superuser power.
568 * - require strict serialization.
569 * - do not return a value
570 */
571 case SIOCSIFMAP:
572 case SIOCSIFTXQLEN:
573 if (!capable(CAP_NET_ADMIN))
574 return -EPERM;
df561f66 575 fallthrough;
96b45cbd
CW
576 /*
577 * These ioctl calls:
578 * - require local superuser power.
579 * - require strict serialization.
580 * - do not return a value
581 */
582 case SIOCSIFFLAGS:
583 case SIOCSIFMETRIC:
584 case SIOCSIFMTU:
585 case SIOCSIFHWADDR:
586 case SIOCSIFSLAVE:
587 case SIOCADDMULTI:
588 case SIOCDELMULTI:
589 case SIOCSIFHWBROADCAST:
590 case SIOCSMIIREG:
591 case SIOCBONDENSLAVE:
592 case SIOCBONDRELEASE:
593 case SIOCBONDSETHWADDR:
594 case SIOCBONDCHANGEACTIVE:
595 case SIOCBRADDIF:
596 case SIOCBRDELIF:
597 case SIOCSHWTSTAMP:
598 if (!ns_capable(net->user_ns, CAP_NET_ADMIN))
599 return -EPERM;
df561f66 600 fallthrough;
96b45cbd
CW
601 case SIOCBONDSLAVEINFOQUERY:
602 case SIOCBONDINFOQUERY:
b51f26b1 603 dev_load(net, ifr->ifr_name);
96b45cbd 604 rtnl_lock();
a554bf96 605 ret = dev_ifsioc(net, ifr, data, cmd);
96b45cbd 606 rtnl_unlock();
44c02a2c
AV
607 if (need_copyout)
608 *need_copyout = false;
96b45cbd
CW
609 return ret;
610
611 case SIOCGIFMEM:
612 /* Get the per device memory space. We can add this but
613 * currently do not support it */
614 case SIOCSIFMEM:
615 /* Set the per device memory buffer space.
616 * Not applicable in our case */
617 case SIOCSIFLINK:
618 return -ENOTTY;
619
620 /*
621 * Unknown or private ioctl.
622 */
623 default:
624 if (cmd == SIOCWANDEV ||
fd468c74 625 cmd == SIOCGHWTSTAMP ||
96b45cbd
CW
626 (cmd >= SIOCDEVPRIVATE &&
627 cmd <= SIOCDEVPRIVATE + 15)) {
b51f26b1 628 dev_load(net, ifr->ifr_name);
96b45cbd 629 rtnl_lock();
a554bf96 630 ret = dev_ifsioc(net, ifr, data, cmd);
96b45cbd 631 rtnl_unlock();
96b45cbd
CW
632 return ret;
633 }
96b45cbd
CW
634 return -ENOTTY;
635 }
636}