mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git
synced 2025-01-16 13:34:30 +00:00
r8152: Set NET_ADDR_STOLEN if using passthru MAC
Some docks support MAC pass-through - MAC address is taken from another device. Driver should indicate that with NET_ADDR_STOLEN flag. This should help to avoid collisions if network interface names are generated with MAC policy. Reported and discussed here https://github.com/systemd/systemd/issues/33104 Signed-off-by: Milan Broz <gmazyland@gmail.com> Reviewed-by: Andrew Lunn <andrew@lunn.ch> Link: https://lore.kernel.org/r/20240605153340.25694-1-gmazyland@gmail.com Signed-off-by: Jakub Kicinski <kuba@kernel.org>
This commit is contained in:
parent
62b5bf58b9
commit
cb6cf0820f
@ -1774,6 +1774,7 @@ static int vendor_mac_passthru_addr_read(struct r8152 *tp, struct sockaddr *sa)
|
||||
goto amacout;
|
||||
}
|
||||
memcpy(sa->sa_data, buf, 6);
|
||||
tp->netdev->addr_assign_type = NET_ADDR_STOLEN;
|
||||
netif_info(tp, probe, tp->netdev,
|
||||
"Using pass-thru MAC addr %pM\n", sa->sa_data);
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user