| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1 | /* | 
 | 2 |  *  linux/drivers/net/netconsole.c | 
 | 3 |  * | 
 | 4 |  *  Copyright (C) 2001  Ingo Molnar <mingo@redhat.com> | 
 | 5 |  * | 
 | 6 |  *  This file contains the implementation of an IRQ-safe, crash-safe | 
 | 7 |  *  kernel console implementation that outputs kernel messages to the | 
 | 8 |  *  network. | 
 | 9 |  * | 
 | 10 |  * Modification history: | 
 | 11 |  * | 
 | 12 |  * 2001-09-17    started by Ingo Molnar. | 
 | 13 |  * 2003-08-11    2.6 port by Matt Mackall | 
 | 14 |  *               simplified options | 
 | 15 |  *               generic card hooks | 
 | 16 |  *               works non-modular | 
 | 17 |  * 2003-09-07    rewritten with netpoll api | 
 | 18 |  */ | 
 | 19 |  | 
 | 20 | /**************************************************************** | 
 | 21 |  *      This program is free software; you can redistribute it and/or modify | 
 | 22 |  *      it under the terms of the GNU General Public License as published by | 
 | 23 |  *      the Free Software Foundation; either version 2, or (at your option) | 
 | 24 |  *      any later version. | 
 | 25 |  * | 
 | 26 |  *      This program is distributed in the hope that it will be useful, | 
 | 27 |  *      but WITHOUT ANY WARRANTY; without even the implied warranty of | 
 | 28 |  *      MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the | 
 | 29 |  *      GNU General Public License for more details. | 
 | 30 |  * | 
 | 31 |  *      You should have received a copy of the GNU General Public License | 
 | 32 |  *      along with this program; if not, write to the Free Software | 
 | 33 |  *      Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. | 
 | 34 |  * | 
 | 35 |  ****************************************************************/ | 
 | 36 |  | 
 | 37 | #include <linux/mm.h> | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 38 | #include <linux/init.h> | 
 | 39 | #include <linux/module.h> | 
| Tejun Heo | 5a0e3ad | 2010-03-24 17:04:11 +0900 | [diff] [blame] | 40 | #include <linux/slab.h> | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 41 | #include <linux/console.h> | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 42 | #include <linux/moduleparam.h> | 
 | 43 | #include <linux/string.h> | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 44 | #include <linux/netpoll.h> | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 45 | #include <linux/inet.h> | 
 | 46 | #include <linux/configfs.h> | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 47 |  | 
 | 48 | MODULE_AUTHOR("Maintainer: Matt Mackall <mpm@selenic.com>"); | 
 | 49 | MODULE_DESCRIPTION("Console driver for network interfaces"); | 
 | 50 | MODULE_LICENSE("GPL"); | 
 | 51 |  | 
| Satyam Sharma | d39badf | 2007-08-10 15:27:24 -0700 | [diff] [blame] | 52 | #define MAX_PARAM_LENGTH	256 | 
 | 53 | #define MAX_PRINT_CHUNK		1000 | 
 | 54 |  | 
 | 55 | static char config[MAX_PARAM_LENGTH]; | 
 | 56 | module_param_string(netconsole, config, MAX_PARAM_LENGTH, 0); | 
| Niels de Vos | 61a2d07 | 2008-07-31 00:07:23 -0700 | [diff] [blame] | 57 | MODULE_PARM_DESC(netconsole, " netconsole=[src-port]@[src-ip]/[dev],[tgt-port]@<tgt-ip>/[tgt-macaddr]"); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 58 |  | 
| Satyam Sharma | d2b6088 | 2007-08-10 15:29:47 -0700 | [diff] [blame] | 59 | #ifndef	MODULE | 
 | 60 | static int __init option_setup(char *opt) | 
 | 61 | { | 
 | 62 | 	strlcpy(config, opt, MAX_PARAM_LENGTH); | 
 | 63 | 	return 1; | 
 | 64 | } | 
 | 65 | __setup("netconsole=", option_setup); | 
 | 66 | #endif	/* MODULE */ | 
 | 67 |  | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 68 | /* Linked list of all configured targets */ | 
 | 69 | static LIST_HEAD(target_list); | 
 | 70 |  | 
 | 71 | /* This needs to be a spinlock because write_msg() cannot sleep */ | 
 | 72 | static DEFINE_SPINLOCK(target_list_lock); | 
 | 73 |  | 
| Satyam Sharma | df180e3 | 2007-08-10 15:32:14 -0700 | [diff] [blame] | 74 | /** | 
 | 75 |  * struct netconsole_target - Represents a configured netconsole target. | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 76 |  * @list:	Links this target into the target_list. | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 77 |  * @item:	Links us into the configfs subsystem hierarchy. | 
 | 78 |  * @enabled:	On / off knob to enable / disable target. | 
 | 79 |  *		Visible from userspace (read-write). | 
 | 80 |  *		We maintain a strict 1:1 correspondence between this and | 
 | 81 |  *		whether the corresponding netpoll is active or inactive. | 
 | 82 |  *		Also, other parameters of a target may be modified at | 
 | 83 |  *		runtime only when it is disabled (enabled == 0). | 
| Satyam Sharma | df180e3 | 2007-08-10 15:32:14 -0700 | [diff] [blame] | 84 |  * @np:		The netpoll structure for this target. | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 85 |  *		Contains the other userspace visible parameters: | 
 | 86 |  *		dev_name	(read-write) | 
 | 87 |  *		local_port	(read-write) | 
 | 88 |  *		remote_port	(read-write) | 
 | 89 |  *		local_ip	(read-write) | 
 | 90 |  *		remote_ip	(read-write) | 
 | 91 |  *		local_mac	(read-only) | 
 | 92 |  *		remote_mac	(read-write) | 
| Satyam Sharma | df180e3 | 2007-08-10 15:32:14 -0700 | [diff] [blame] | 93 |  */ | 
 | 94 | struct netconsole_target { | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 95 | 	struct list_head	list; | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 96 | #ifdef	CONFIG_NETCONSOLE_DYNAMIC | 
 | 97 | 	struct config_item	item; | 
 | 98 | #endif | 
 | 99 | 	int			enabled; | 
| Satyam Sharma | df180e3 | 2007-08-10 15:32:14 -0700 | [diff] [blame] | 100 | 	struct netpoll		np; | 
 | 101 | }; | 
 | 102 |  | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 103 | #ifdef	CONFIG_NETCONSOLE_DYNAMIC | 
 | 104 |  | 
 | 105 | static struct configfs_subsystem netconsole_subsys; | 
 | 106 |  | 
 | 107 | static int __init dynamic_netconsole_init(void) | 
 | 108 | { | 
 | 109 | 	config_group_init(&netconsole_subsys.su_group); | 
 | 110 | 	mutex_init(&netconsole_subsys.su_mutex); | 
 | 111 | 	return configfs_register_subsystem(&netconsole_subsys); | 
 | 112 | } | 
 | 113 |  | 
 | 114 | static void __exit dynamic_netconsole_exit(void) | 
 | 115 | { | 
 | 116 | 	configfs_unregister_subsystem(&netconsole_subsys); | 
 | 117 | } | 
 | 118 |  | 
 | 119 | /* | 
 | 120 |  * Targets that were created by parsing the boot/module option string | 
 | 121 |  * do not exist in the configfs hierarchy (and have NULL names) and will | 
 | 122 |  * never go away, so make these a no-op for them. | 
 | 123 |  */ | 
 | 124 | static void netconsole_target_get(struct netconsole_target *nt) | 
 | 125 | { | 
 | 126 | 	if (config_item_name(&nt->item)) | 
 | 127 | 		config_item_get(&nt->item); | 
 | 128 | } | 
 | 129 |  | 
 | 130 | static void netconsole_target_put(struct netconsole_target *nt) | 
 | 131 | { | 
 | 132 | 	if (config_item_name(&nt->item)) | 
 | 133 | 		config_item_put(&nt->item); | 
 | 134 | } | 
 | 135 |  | 
 | 136 | #else	/* !CONFIG_NETCONSOLE_DYNAMIC */ | 
 | 137 |  | 
 | 138 | static int __init dynamic_netconsole_init(void) | 
 | 139 | { | 
 | 140 | 	return 0; | 
 | 141 | } | 
 | 142 |  | 
 | 143 | static void __exit dynamic_netconsole_exit(void) | 
 | 144 | { | 
 | 145 | } | 
 | 146 |  | 
 | 147 | /* | 
 | 148 |  * No danger of targets going away from under us when dynamic | 
 | 149 |  * reconfigurability is off. | 
 | 150 |  */ | 
 | 151 | static void netconsole_target_get(struct netconsole_target *nt) | 
 | 152 | { | 
 | 153 | } | 
 | 154 |  | 
 | 155 | static void netconsole_target_put(struct netconsole_target *nt) | 
 | 156 | { | 
 | 157 | } | 
 | 158 |  | 
 | 159 | #endif	/* CONFIG_NETCONSOLE_DYNAMIC */ | 
 | 160 |  | 
 | 161 | /* Allocate new target (from boot/module param) and setup netpoll for it */ | 
 | 162 | static struct netconsole_target *alloc_param_target(char *target_config) | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 163 | { | 
 | 164 | 	int err = -ENOMEM; | 
 | 165 | 	struct netconsole_target *nt; | 
 | 166 |  | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 167 | 	/* | 
 | 168 | 	 * Allocate and initialize with defaults. | 
 | 169 | 	 * Note that these targets get their config_item fields zeroed-out. | 
 | 170 | 	 */ | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 171 | 	nt = kzalloc(sizeof(*nt), GFP_KERNEL); | 
| Joe Perches | e404dec | 2012-01-29 12:56:23 +0000 | [diff] [blame] | 172 | 	if (!nt) | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 173 | 		goto fail; | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 174 |  | 
 | 175 | 	nt->np.name = "netconsole"; | 
 | 176 | 	strlcpy(nt->np.dev_name, "eth0", IFNAMSIZ); | 
 | 177 | 	nt->np.local_port = 6665; | 
 | 178 | 	nt->np.remote_port = 6666; | 
 | 179 | 	memset(nt->np.remote_mac, 0xff, ETH_ALEN); | 
 | 180 |  | 
 | 181 | 	/* Parse parameters and setup netpoll */ | 
 | 182 | 	err = netpoll_parse_options(&nt->np, target_config); | 
 | 183 | 	if (err) | 
 | 184 | 		goto fail; | 
 | 185 |  | 
 | 186 | 	err = netpoll_setup(&nt->np); | 
 | 187 | 	if (err) | 
 | 188 | 		goto fail; | 
 | 189 |  | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 190 | 	nt->enabled = 1; | 
 | 191 |  | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 192 | 	return nt; | 
 | 193 |  | 
 | 194 | fail: | 
 | 195 | 	kfree(nt); | 
 | 196 | 	return ERR_PTR(err); | 
 | 197 | } | 
 | 198 |  | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 199 | /* Cleanup netpoll for given target (from boot/module param) and free it */ | 
 | 200 | static void free_param_target(struct netconsole_target *nt) | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 201 | { | 
 | 202 | 	netpoll_cleanup(&nt->np); | 
 | 203 | 	kfree(nt); | 
 | 204 | } | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 205 |  | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 206 | #ifdef	CONFIG_NETCONSOLE_DYNAMIC | 
 | 207 |  | 
 | 208 | /* | 
 | 209 |  * Our subsystem hierarchy is: | 
 | 210 |  * | 
 | 211 |  * /sys/kernel/config/netconsole/ | 
 | 212 |  *				| | 
 | 213 |  *				<target>/ | 
 | 214 |  *				|	enabled | 
 | 215 |  *				|	dev_name | 
 | 216 |  *				|	local_port | 
 | 217 |  *				|	remote_port | 
 | 218 |  *				|	local_ip | 
 | 219 |  *				|	remote_ip | 
 | 220 |  *				|	local_mac | 
 | 221 |  *				|	remote_mac | 
 | 222 |  *				| | 
 | 223 |  *				<target>/... | 
 | 224 |  */ | 
 | 225 |  | 
 | 226 | struct netconsole_target_attr { | 
 | 227 | 	struct configfs_attribute	attr; | 
 | 228 | 	ssize_t				(*show)(struct netconsole_target *nt, | 
 | 229 | 						char *buf); | 
 | 230 | 	ssize_t				(*store)(struct netconsole_target *nt, | 
 | 231 | 						 const char *buf, | 
 | 232 | 						 size_t count); | 
 | 233 | }; | 
 | 234 |  | 
 | 235 | static struct netconsole_target *to_target(struct config_item *item) | 
 | 236 | { | 
 | 237 | 	return item ? | 
 | 238 | 		container_of(item, struct netconsole_target, item) : | 
 | 239 | 		NULL; | 
 | 240 | } | 
 | 241 |  | 
 | 242 | /* | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 243 |  * Attribute operations for netconsole_target. | 
 | 244 |  */ | 
 | 245 |  | 
 | 246 | static ssize_t show_enabled(struct netconsole_target *nt, char *buf) | 
 | 247 | { | 
 | 248 | 	return snprintf(buf, PAGE_SIZE, "%d\n", nt->enabled); | 
 | 249 | } | 
 | 250 |  | 
 | 251 | static ssize_t show_dev_name(struct netconsole_target *nt, char *buf) | 
 | 252 | { | 
 | 253 | 	return snprintf(buf, PAGE_SIZE, "%s\n", nt->np.dev_name); | 
 | 254 | } | 
 | 255 |  | 
 | 256 | static ssize_t show_local_port(struct netconsole_target *nt, char *buf) | 
 | 257 | { | 
 | 258 | 	return snprintf(buf, PAGE_SIZE, "%d\n", nt->np.local_port); | 
 | 259 | } | 
 | 260 |  | 
 | 261 | static ssize_t show_remote_port(struct netconsole_target *nt, char *buf) | 
 | 262 | { | 
 | 263 | 	return snprintf(buf, PAGE_SIZE, "%d\n", nt->np.remote_port); | 
 | 264 | } | 
 | 265 |  | 
 | 266 | static ssize_t show_local_ip(struct netconsole_target *nt, char *buf) | 
 | 267 | { | 
| Harvey Harrison | e7557af | 2009-03-28 15:38:31 +0000 | [diff] [blame] | 268 | 	return snprintf(buf, PAGE_SIZE, "%pI4\n", &nt->np.local_ip); | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 269 | } | 
 | 270 |  | 
 | 271 | static ssize_t show_remote_ip(struct netconsole_target *nt, char *buf) | 
 | 272 | { | 
| Harvey Harrison | e7557af | 2009-03-28 15:38:31 +0000 | [diff] [blame] | 273 | 	return snprintf(buf, PAGE_SIZE, "%pI4\n", &nt->np.remote_ip); | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 274 | } | 
 | 275 |  | 
 | 276 | static ssize_t show_local_mac(struct netconsole_target *nt, char *buf) | 
 | 277 | { | 
| Stephen Hemminger | 0953864 | 2007-11-19 19:23:29 -0800 | [diff] [blame] | 278 | 	struct net_device *dev = nt->np.dev; | 
| Johannes Berg | e174961 | 2008-10-27 15:59:26 -0700 | [diff] [blame] | 279 | 	static const u8 bcast[ETH_ALEN] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff }; | 
| Stephen Hemminger | 0953864 | 2007-11-19 19:23:29 -0800 | [diff] [blame] | 280 |  | 
| Johannes Berg | e174961 | 2008-10-27 15:59:26 -0700 | [diff] [blame] | 281 | 	return snprintf(buf, PAGE_SIZE, "%pM\n", dev ? dev->dev_addr : bcast); | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 282 | } | 
 | 283 |  | 
 | 284 | static ssize_t show_remote_mac(struct netconsole_target *nt, char *buf) | 
 | 285 | { | 
| Johannes Berg | e174961 | 2008-10-27 15:59:26 -0700 | [diff] [blame] | 286 | 	return snprintf(buf, PAGE_SIZE, "%pM\n", nt->np.remote_mac); | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 287 | } | 
 | 288 |  | 
 | 289 | /* | 
 | 290 |  * This one is special -- targets created through the configfs interface | 
 | 291 |  * are not enabled (and the corresponding netpoll activated) by default. | 
 | 292 |  * The user is expected to set the desired parameters first (which | 
 | 293 |  * would enable him to dynamically add new netpoll targets for new | 
 | 294 |  * network interfaces as and when they come up). | 
 | 295 |  */ | 
 | 296 | static ssize_t store_enabled(struct netconsole_target *nt, | 
 | 297 | 			     const char *buf, | 
 | 298 | 			     size_t count) | 
 | 299 | { | 
| Alexey Dobriyan | 99f823f | 2011-05-07 20:33:13 +0000 | [diff] [blame] | 300 | 	int enabled; | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 301 | 	int err; | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 302 |  | 
| Alexey Dobriyan | 99f823f | 2011-05-07 20:33:13 +0000 | [diff] [blame] | 303 | 	err = kstrtoint(buf, 10, &enabled); | 
 | 304 | 	if (err < 0) | 
 | 305 | 		return err; | 
 | 306 | 	if (enabled < 0 || enabled > 1) | 
 | 307 | 		return -EINVAL; | 
| Gao feng | d512348 | 2011-10-11 16:08:11 +0000 | [diff] [blame] | 308 | 	if (enabled == nt->enabled) { | 
 | 309 | 		printk(KERN_INFO "netconsole: network logging has already %s\n", | 
 | 310 | 				nt->enabled ? "started" : "stopped"); | 
 | 311 | 		return -EINVAL; | 
 | 312 | 	} | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 313 |  | 
 | 314 | 	if (enabled) {	/* 1 */ | 
 | 315 |  | 
 | 316 | 		/* | 
 | 317 | 		 * Skip netpoll_parse_options() -- all the attributes are | 
 | 318 | 		 * already configured via configfs. Just print them out. | 
 | 319 | 		 */ | 
 | 320 | 		netpoll_print_options(&nt->np); | 
 | 321 |  | 
 | 322 | 		err = netpoll_setup(&nt->np); | 
 | 323 | 		if (err) | 
 | 324 | 			return err; | 
 | 325 |  | 
 | 326 | 		printk(KERN_INFO "netconsole: network logging started\n"); | 
 | 327 |  | 
 | 328 | 	} else {	/* 0 */ | 
 | 329 | 		netpoll_cleanup(&nt->np); | 
 | 330 | 	} | 
 | 331 |  | 
 | 332 | 	nt->enabled = enabled; | 
 | 333 |  | 
 | 334 | 	return strnlen(buf, count); | 
 | 335 | } | 
 | 336 |  | 
 | 337 | static ssize_t store_dev_name(struct netconsole_target *nt, | 
 | 338 | 			      const char *buf, | 
 | 339 | 			      size_t count) | 
 | 340 | { | 
 | 341 | 	size_t len; | 
 | 342 |  | 
 | 343 | 	if (nt->enabled) { | 
 | 344 | 		printk(KERN_ERR "netconsole: target (%s) is enabled, " | 
 | 345 | 				"disable to update parameters\n", | 
 | 346 | 				config_item_name(&nt->item)); | 
 | 347 | 		return -EINVAL; | 
 | 348 | 	} | 
 | 349 |  | 
 | 350 | 	strlcpy(nt->np.dev_name, buf, IFNAMSIZ); | 
 | 351 |  | 
 | 352 | 	/* Get rid of possible trailing newline from echo(1) */ | 
 | 353 | 	len = strnlen(nt->np.dev_name, IFNAMSIZ); | 
 | 354 | 	if (nt->np.dev_name[len - 1] == '\n') | 
 | 355 | 		nt->np.dev_name[len - 1] = '\0'; | 
 | 356 |  | 
 | 357 | 	return strnlen(buf, count); | 
 | 358 | } | 
 | 359 |  | 
 | 360 | static ssize_t store_local_port(struct netconsole_target *nt, | 
 | 361 | 				const char *buf, | 
 | 362 | 				size_t count) | 
 | 363 | { | 
| Alexey Dobriyan | 99f823f | 2011-05-07 20:33:13 +0000 | [diff] [blame] | 364 | 	int rv; | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 365 |  | 
 | 366 | 	if (nt->enabled) { | 
 | 367 | 		printk(KERN_ERR "netconsole: target (%s) is enabled, " | 
 | 368 | 				"disable to update parameters\n", | 
 | 369 | 				config_item_name(&nt->item)); | 
 | 370 | 		return -EINVAL; | 
 | 371 | 	} | 
 | 372 |  | 
| Alexey Dobriyan | 99f823f | 2011-05-07 20:33:13 +0000 | [diff] [blame] | 373 | 	rv = kstrtou16(buf, 10, &nt->np.local_port); | 
 | 374 | 	if (rv < 0) | 
 | 375 | 		return rv; | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 376 | 	return strnlen(buf, count); | 
 | 377 | } | 
 | 378 |  | 
 | 379 | static ssize_t store_remote_port(struct netconsole_target *nt, | 
 | 380 | 				 const char *buf, | 
 | 381 | 				 size_t count) | 
 | 382 | { | 
| Alexey Dobriyan | 99f823f | 2011-05-07 20:33:13 +0000 | [diff] [blame] | 383 | 	int rv; | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 384 |  | 
 | 385 | 	if (nt->enabled) { | 
 | 386 | 		printk(KERN_ERR "netconsole: target (%s) is enabled, " | 
 | 387 | 				"disable to update parameters\n", | 
 | 388 | 				config_item_name(&nt->item)); | 
 | 389 | 		return -EINVAL; | 
 | 390 | 	} | 
 | 391 |  | 
| Alexey Dobriyan | 99f823f | 2011-05-07 20:33:13 +0000 | [diff] [blame] | 392 | 	rv = kstrtou16(buf, 10, &nt->np.remote_port); | 
 | 393 | 	if (rv < 0) | 
 | 394 | 		return rv; | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 395 | 	return strnlen(buf, count); | 
 | 396 | } | 
 | 397 |  | 
 | 398 | static ssize_t store_local_ip(struct netconsole_target *nt, | 
 | 399 | 			      const char *buf, | 
 | 400 | 			      size_t count) | 
 | 401 | { | 
 | 402 | 	if (nt->enabled) { | 
 | 403 | 		printk(KERN_ERR "netconsole: target (%s) is enabled, " | 
 | 404 | 				"disable to update parameters\n", | 
 | 405 | 				config_item_name(&nt->item)); | 
 | 406 | 		return -EINVAL; | 
 | 407 | 	} | 
 | 408 |  | 
| Harvey Harrison | e7557af | 2009-03-28 15:38:31 +0000 | [diff] [blame] | 409 | 	nt->np.local_ip = in_aton(buf); | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 410 |  | 
 | 411 | 	return strnlen(buf, count); | 
 | 412 | } | 
 | 413 |  | 
 | 414 | static ssize_t store_remote_ip(struct netconsole_target *nt, | 
 | 415 | 			       const char *buf, | 
 | 416 | 			       size_t count) | 
 | 417 | { | 
 | 418 | 	if (nt->enabled) { | 
 | 419 | 		printk(KERN_ERR "netconsole: target (%s) is enabled, " | 
 | 420 | 				"disable to update parameters\n", | 
 | 421 | 				config_item_name(&nt->item)); | 
 | 422 | 		return -EINVAL; | 
 | 423 | 	} | 
 | 424 |  | 
| Harvey Harrison | e7557af | 2009-03-28 15:38:31 +0000 | [diff] [blame] | 425 | 	nt->np.remote_ip = in_aton(buf); | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 426 |  | 
 | 427 | 	return strnlen(buf, count); | 
 | 428 | } | 
 | 429 |  | 
 | 430 | static ssize_t store_remote_mac(struct netconsole_target *nt, | 
 | 431 | 				const char *buf, | 
 | 432 | 				size_t count) | 
 | 433 | { | 
 | 434 | 	u8 remote_mac[ETH_ALEN]; | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 435 |  | 
 | 436 | 	if (nt->enabled) { | 
 | 437 | 		printk(KERN_ERR "netconsole: target (%s) is enabled, " | 
 | 438 | 				"disable to update parameters\n", | 
 | 439 | 				config_item_name(&nt->item)); | 
 | 440 | 		return -EINVAL; | 
 | 441 | 	} | 
 | 442 |  | 
| Alexey Dobriyan | 4940fc8 | 2011-05-07 23:00:07 +0000 | [diff] [blame] | 443 | 	if (!mac_pton(buf, remote_mac)) | 
 | 444 | 		return -EINVAL; | 
 | 445 | 	if (buf[3 * ETH_ALEN - 1] && buf[3 * ETH_ALEN - 1] != '\n') | 
 | 446 | 		return -EINVAL; | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 447 | 	memcpy(nt->np.remote_mac, remote_mac, ETH_ALEN); | 
 | 448 |  | 
 | 449 | 	return strnlen(buf, count); | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 450 | } | 
 | 451 |  | 
 | 452 | /* | 
 | 453 |  * Attribute definitions for netconsole_target. | 
 | 454 |  */ | 
 | 455 |  | 
 | 456 | #define NETCONSOLE_TARGET_ATTR_RO(_name)				\ | 
 | 457 | static struct netconsole_target_attr netconsole_target_##_name =	\ | 
 | 458 | 	__CONFIGFS_ATTR(_name, S_IRUGO, show_##_name, NULL) | 
 | 459 |  | 
 | 460 | #define NETCONSOLE_TARGET_ATTR_RW(_name)				\ | 
 | 461 | static struct netconsole_target_attr netconsole_target_##_name =	\ | 
 | 462 | 	__CONFIGFS_ATTR(_name, S_IRUGO | S_IWUSR, show_##_name, store_##_name) | 
 | 463 |  | 
 | 464 | NETCONSOLE_TARGET_ATTR_RW(enabled); | 
 | 465 | NETCONSOLE_TARGET_ATTR_RW(dev_name); | 
 | 466 | NETCONSOLE_TARGET_ATTR_RW(local_port); | 
 | 467 | NETCONSOLE_TARGET_ATTR_RW(remote_port); | 
 | 468 | NETCONSOLE_TARGET_ATTR_RW(local_ip); | 
 | 469 | NETCONSOLE_TARGET_ATTR_RW(remote_ip); | 
 | 470 | NETCONSOLE_TARGET_ATTR_RO(local_mac); | 
 | 471 | NETCONSOLE_TARGET_ATTR_RW(remote_mac); | 
 | 472 |  | 
 | 473 | static struct configfs_attribute *netconsole_target_attrs[] = { | 
 | 474 | 	&netconsole_target_enabled.attr, | 
 | 475 | 	&netconsole_target_dev_name.attr, | 
 | 476 | 	&netconsole_target_local_port.attr, | 
 | 477 | 	&netconsole_target_remote_port.attr, | 
 | 478 | 	&netconsole_target_local_ip.attr, | 
 | 479 | 	&netconsole_target_remote_ip.attr, | 
 | 480 | 	&netconsole_target_local_mac.attr, | 
 | 481 | 	&netconsole_target_remote_mac.attr, | 
 | 482 | 	NULL, | 
 | 483 | }; | 
 | 484 |  | 
 | 485 | /* | 
 | 486 |  * Item operations and type for netconsole_target. | 
 | 487 |  */ | 
 | 488 |  | 
 | 489 | static void netconsole_target_release(struct config_item *item) | 
 | 490 | { | 
 | 491 | 	kfree(to_target(item)); | 
 | 492 | } | 
 | 493 |  | 
 | 494 | static ssize_t netconsole_target_attr_show(struct config_item *item, | 
 | 495 | 					   struct configfs_attribute *attr, | 
 | 496 | 					   char *buf) | 
 | 497 | { | 
 | 498 | 	ssize_t ret = -EINVAL; | 
 | 499 | 	struct netconsole_target *nt = to_target(item); | 
 | 500 | 	struct netconsole_target_attr *na = | 
 | 501 | 		container_of(attr, struct netconsole_target_attr, attr); | 
 | 502 |  | 
 | 503 | 	if (na->show) | 
 | 504 | 		ret = na->show(nt, buf); | 
 | 505 |  | 
 | 506 | 	return ret; | 
 | 507 | } | 
 | 508 |  | 
 | 509 | static ssize_t netconsole_target_attr_store(struct config_item *item, | 
 | 510 | 					    struct configfs_attribute *attr, | 
 | 511 | 					    const char *buf, | 
 | 512 | 					    size_t count) | 
 | 513 | { | 
 | 514 | 	ssize_t ret = -EINVAL; | 
 | 515 | 	struct netconsole_target *nt = to_target(item); | 
 | 516 | 	struct netconsole_target_attr *na = | 
 | 517 | 		container_of(attr, struct netconsole_target_attr, attr); | 
 | 518 |  | 
 | 519 | 	if (na->store) | 
 | 520 | 		ret = na->store(nt, buf, count); | 
 | 521 |  | 
 | 522 | 	return ret; | 
 | 523 | } | 
 | 524 |  | 
 | 525 | static struct configfs_item_operations netconsole_target_item_ops = { | 
 | 526 | 	.release		= netconsole_target_release, | 
 | 527 | 	.show_attribute		= netconsole_target_attr_show, | 
 | 528 | 	.store_attribute	= netconsole_target_attr_store, | 
 | 529 | }; | 
 | 530 |  | 
 | 531 | static struct config_item_type netconsole_target_type = { | 
 | 532 | 	.ct_attrs		= netconsole_target_attrs, | 
 | 533 | 	.ct_item_ops		= &netconsole_target_item_ops, | 
 | 534 | 	.ct_owner		= THIS_MODULE, | 
 | 535 | }; | 
 | 536 |  | 
 | 537 | /* | 
 | 538 |  * Group operations and type for netconsole_subsys. | 
 | 539 |  */ | 
 | 540 |  | 
| Joel Becker | f89ab86 | 2008-07-17 14:53:48 -0700 | [diff] [blame] | 541 | static struct config_item *make_netconsole_target(struct config_group *group, | 
 | 542 | 						  const char *name) | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 543 | { | 
 | 544 | 	unsigned long flags; | 
 | 545 | 	struct netconsole_target *nt; | 
 | 546 |  | 
 | 547 | 	/* | 
 | 548 | 	 * Allocate and initialize with defaults. | 
 | 549 | 	 * Target is disabled at creation (enabled == 0). | 
 | 550 | 	 */ | 
 | 551 | 	nt = kzalloc(sizeof(*nt), GFP_KERNEL); | 
| Joe Perches | e404dec | 2012-01-29 12:56:23 +0000 | [diff] [blame] | 552 | 	if (!nt) | 
| Joel Becker | a6795e9 | 2008-07-17 15:21:29 -0700 | [diff] [blame] | 553 | 		return ERR_PTR(-ENOMEM); | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 554 |  | 
 | 555 | 	nt->np.name = "netconsole"; | 
 | 556 | 	strlcpy(nt->np.dev_name, "eth0", IFNAMSIZ); | 
 | 557 | 	nt->np.local_port = 6665; | 
 | 558 | 	nt->np.remote_port = 6666; | 
 | 559 | 	memset(nt->np.remote_mac, 0xff, ETH_ALEN); | 
 | 560 |  | 
 | 561 | 	/* Initialize the config_item member */ | 
 | 562 | 	config_item_init_type_name(&nt->item, name, &netconsole_target_type); | 
 | 563 |  | 
 | 564 | 	/* Adding, but it is disabled */ | 
 | 565 | 	spin_lock_irqsave(&target_list_lock, flags); | 
 | 566 | 	list_add(&nt->list, &target_list); | 
 | 567 | 	spin_unlock_irqrestore(&target_list_lock, flags); | 
 | 568 |  | 
| Joel Becker | f89ab86 | 2008-07-17 14:53:48 -0700 | [diff] [blame] | 569 | 	return &nt->item; | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 570 | } | 
 | 571 |  | 
 | 572 | static void drop_netconsole_target(struct config_group *group, | 
 | 573 | 				   struct config_item *item) | 
 | 574 | { | 
 | 575 | 	unsigned long flags; | 
 | 576 | 	struct netconsole_target *nt = to_target(item); | 
 | 577 |  | 
 | 578 | 	spin_lock_irqsave(&target_list_lock, flags); | 
 | 579 | 	list_del(&nt->list); | 
 | 580 | 	spin_unlock_irqrestore(&target_list_lock, flags); | 
 | 581 |  | 
 | 582 | 	/* | 
 | 583 | 	 * The target may have never been enabled, or was manually disabled | 
 | 584 | 	 * before being removed so netpoll may have already been cleaned up. | 
 | 585 | 	 */ | 
 | 586 | 	if (nt->enabled) | 
 | 587 | 		netpoll_cleanup(&nt->np); | 
 | 588 |  | 
 | 589 | 	config_item_put(&nt->item); | 
 | 590 | } | 
 | 591 |  | 
 | 592 | static struct configfs_group_operations netconsole_subsys_group_ops = { | 
 | 593 | 	.make_item	= make_netconsole_target, | 
 | 594 | 	.drop_item	= drop_netconsole_target, | 
 | 595 | }; | 
 | 596 |  | 
 | 597 | static struct config_item_type netconsole_subsys_type = { | 
 | 598 | 	.ct_group_ops	= &netconsole_subsys_group_ops, | 
 | 599 | 	.ct_owner	= THIS_MODULE, | 
 | 600 | }; | 
 | 601 |  | 
 | 602 | /* The netconsole configfs subsystem */ | 
 | 603 | static struct configfs_subsystem netconsole_subsys = { | 
 | 604 | 	.su_group	= { | 
 | 605 | 		.cg_item	= { | 
 | 606 | 			.ci_namebuf	= "netconsole", | 
 | 607 | 			.ci_type	= &netconsole_subsys_type, | 
 | 608 | 		}, | 
 | 609 | 	}, | 
 | 610 | }; | 
 | 611 |  | 
 | 612 | #endif	/* CONFIG_NETCONSOLE_DYNAMIC */ | 
 | 613 |  | 
| Satyam Sharma | 17951f3 | 2007-08-10 15:33:01 -0700 | [diff] [blame] | 614 | /* Handle network interface device notifications */ | 
 | 615 | static int netconsole_netdev_event(struct notifier_block *this, | 
 | 616 | 				   unsigned long event, | 
 | 617 | 				   void *ptr) | 
 | 618 | { | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 619 | 	unsigned long flags; | 
 | 620 | 	struct netconsole_target *nt; | 
| Satyam Sharma | 17951f3 | 2007-08-10 15:33:01 -0700 | [diff] [blame] | 621 | 	struct net_device *dev = ptr; | 
| Ferenc Wagner | 141dfba | 2011-01-06 05:11:19 +0000 | [diff] [blame] | 622 | 	bool stopped = false; | 
| Satyam Sharma | 17951f3 | 2007-08-10 15:33:01 -0700 | [diff] [blame] | 623 |  | 
| WANG Cong | 0e34e93 | 2010-05-06 00:47:21 -0700 | [diff] [blame] | 624 | 	if (!(event == NETDEV_CHANGENAME || event == NETDEV_UNREGISTER || | 
| Amerigo Wang | daf9209 | 2011-05-19 21:39:12 +0000 | [diff] [blame] | 625 | 	      event == NETDEV_RELEASE || event == NETDEV_JOIN)) | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 626 | 		goto done; | 
| Satyam Sharma | 17951f3 | 2007-08-10 15:33:01 -0700 | [diff] [blame] | 627 |  | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 628 | 	spin_lock_irqsave(&target_list_lock, flags); | 
| Veaceslav Falico | b52f067 | 2013-03-11 00:21:48 +0000 | [diff] [blame] | 629 | restart: | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 630 | 	list_for_each_entry(nt, &target_list, list) { | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 631 | 		netconsole_target_get(nt); | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 632 | 		if (nt->np.dev == dev) { | 
 | 633 | 			switch (event) { | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 634 | 			case NETDEV_CHANGENAME: | 
 | 635 | 				strlcpy(nt->np.dev_name, dev->name, IFNAMSIZ); | 
 | 636 | 				break; | 
| Amerigo Wang | daf9209 | 2011-05-19 21:39:12 +0000 | [diff] [blame] | 637 | 			case NETDEV_RELEASE: | 
| Amerigo Wang | 8d8fc29 | 2011-05-19 21:39:10 +0000 | [diff] [blame] | 638 | 			case NETDEV_JOIN: | 
| Bruno Prémont | 2382b15 | 2009-04-29 20:45:17 +0000 | [diff] [blame] | 639 | 			case NETDEV_UNREGISTER: | 
| Neil Horman | 3b410a3 | 2010-10-13 16:01:52 +0000 | [diff] [blame] | 640 | 				/* | 
| Veaceslav Falico | b52f067 | 2013-03-11 00:21:48 +0000 | [diff] [blame] | 641 | 				 * we might sleep in __netpoll_cleanup() | 
| Neil Horman | 3b410a3 | 2010-10-13 16:01:52 +0000 | [diff] [blame] | 642 | 				 * rtnl_lock already held | 
 | 643 | 				 */ | 
| Veaceslav Falico | b52f067 | 2013-03-11 00:21:48 +0000 | [diff] [blame] | 644 | 				spin_unlock_irqrestore(&target_list_lock, flags); | 
 | 645 | 				__netpoll_cleanup(&nt->np); | 
 | 646 | 				spin_lock_irqsave(&target_list_lock, flags); | 
 | 647 | 				dev_put(nt->np.dev); | 
 | 648 | 				nt->np.dev = NULL; | 
| Bruno Prémont | 2382b15 | 2009-04-29 20:45:17 +0000 | [diff] [blame] | 649 | 				nt->enabled = 0; | 
| Ferenc Wagner | 141dfba | 2011-01-06 05:11:19 +0000 | [diff] [blame] | 650 | 				stopped = true; | 
| Veaceslav Falico | b52f067 | 2013-03-11 00:21:48 +0000 | [diff] [blame] | 651 | 				netconsole_target_put(nt); | 
 | 652 | 				goto restart; | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 653 | 			} | 
| Satyam Sharma | 17951f3 | 2007-08-10 15:33:01 -0700 | [diff] [blame] | 654 | 		} | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 655 | 		netconsole_target_put(nt); | 
| Satyam Sharma | 17951f3 | 2007-08-10 15:33:01 -0700 | [diff] [blame] | 656 | 	} | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 657 | 	spin_unlock_irqrestore(&target_list_lock, flags); | 
| Amerigo Wang | 8d8fc29 | 2011-05-19 21:39:10 +0000 | [diff] [blame] | 658 | 	if (stopped) { | 
| Ferenc Wagner | 38cfb90 | 2011-01-06 05:11:20 +0000 | [diff] [blame] | 659 | 		printk(KERN_INFO "netconsole: network logging stopped on " | 
| Amerigo Wang | 8d8fc29 | 2011-05-19 21:39:10 +0000 | [diff] [blame] | 660 | 		       "interface %s as it ", dev->name); | 
 | 661 | 		switch (event) { | 
 | 662 | 		case NETDEV_UNREGISTER: | 
 | 663 | 			printk(KERN_CONT "unregistered\n"); | 
 | 664 | 			break; | 
| Amerigo Wang | daf9209 | 2011-05-19 21:39:12 +0000 | [diff] [blame] | 665 | 		case NETDEV_RELEASE: | 
| Amerigo Wang | 8d8fc29 | 2011-05-19 21:39:10 +0000 | [diff] [blame] | 666 | 			printk(KERN_CONT "released slaves\n"); | 
 | 667 | 			break; | 
 | 668 | 		case NETDEV_JOIN: | 
 | 669 | 			printk(KERN_CONT "is joining a master device\n"); | 
 | 670 | 			break; | 
 | 671 | 		} | 
 | 672 | 	} | 
| Satyam Sharma | 17951f3 | 2007-08-10 15:33:01 -0700 | [diff] [blame] | 673 |  | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 674 | done: | 
| Satyam Sharma | 17951f3 | 2007-08-10 15:33:01 -0700 | [diff] [blame] | 675 | 	return NOTIFY_DONE; | 
 | 676 | } | 
 | 677 |  | 
 | 678 | static struct notifier_block netconsole_netdev_notifier = { | 
 | 679 | 	.notifier_call  = netconsole_netdev_event, | 
 | 680 | }; | 
 | 681 |  | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 682 | static void write_msg(struct console *con, const char *msg, unsigned int len) | 
 | 683 | { | 
 | 684 | 	int frag, left; | 
 | 685 | 	unsigned long flags; | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 686 | 	struct netconsole_target *nt; | 
 | 687 | 	const char *tmp; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 688 |  | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 689 | 	/* Avoid taking lock and disabling interrupts unnecessarily */ | 
 | 690 | 	if (list_empty(&target_list)) | 
 | 691 | 		return; | 
 | 692 |  | 
 | 693 | 	spin_lock_irqsave(&target_list_lock, flags); | 
 | 694 | 	list_for_each_entry(nt, &target_list, list) { | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 695 | 		netconsole_target_get(nt); | 
 | 696 | 		if (nt->enabled && netif_running(nt->np.dev)) { | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 697 | 			/* | 
 | 698 | 			 * We nest this inside the for-each-target loop above | 
 | 699 | 			 * so that we're able to get as much logging out to | 
 | 700 | 			 * at least one target if we die inside here, instead | 
 | 701 | 			 * of unnecessarily keeping all targets in lock-step. | 
 | 702 | 			 */ | 
 | 703 | 			tmp = msg; | 
 | 704 | 			for (left = len; left;) { | 
 | 705 | 				frag = min(left, MAX_PRINT_CHUNK); | 
 | 706 | 				netpoll_send_udp(&nt->np, tmp, frag); | 
 | 707 | 				tmp += frag; | 
 | 708 | 				left -= frag; | 
 | 709 | 			} | 
| Satyam Sharma | 0cc120b | 2007-08-10 15:30:31 -0700 | [diff] [blame] | 710 | 		} | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 711 | 		netconsole_target_put(nt); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 712 | 	} | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 713 | 	spin_unlock_irqrestore(&target_list_lock, flags); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 714 | } | 
 | 715 |  | 
 | 716 | static struct console netconsole = { | 
| Satyam Sharma | d39badf | 2007-08-10 15:27:24 -0700 | [diff] [blame] | 717 | 	.name	= "netcon", | 
| Michael Ellerman | 0517dee | 2008-04-15 00:49:04 -0700 | [diff] [blame] | 718 | 	.flags	= CON_ENABLED, | 
| Satyam Sharma | d39badf | 2007-08-10 15:27:24 -0700 | [diff] [blame] | 719 | 	.write	= write_msg, | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 720 | }; | 
 | 721 |  | 
| Satyam Sharma | d39badf | 2007-08-10 15:27:24 -0700 | [diff] [blame] | 722 | static int __init init_netconsole(void) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 723 | { | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 724 | 	int err; | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 725 | 	struct netconsole_target *nt, *tmp; | 
 | 726 | 	unsigned long flags; | 
 | 727 | 	char *target_config; | 
 | 728 | 	char *input = config; | 
| Stephen Hemminger | b41848b | 2006-10-26 15:46:52 -0700 | [diff] [blame] | 729 |  | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 730 | 	if (strnlen(input, MAX_PARAM_LENGTH)) { | 
 | 731 | 		while ((target_config = strsep(&input, ";"))) { | 
 | 732 | 			nt = alloc_param_target(target_config); | 
 | 733 | 			if (IS_ERR(nt)) { | 
 | 734 | 				err = PTR_ERR(nt); | 
 | 735 | 				goto fail; | 
 | 736 | 			} | 
| Michael Ellerman | 0517dee | 2008-04-15 00:49:04 -0700 | [diff] [blame] | 737 | 			/* Dump existing printks when we register */ | 
 | 738 | 			netconsole.flags |= CON_PRINTBUFFER; | 
 | 739 |  | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 740 | 			spin_lock_irqsave(&target_list_lock, flags); | 
 | 741 | 			list_add(&nt->list, &target_list); | 
 | 742 | 			spin_unlock_irqrestore(&target_list_lock, flags); | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 743 | 		} | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 744 | 	} | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 745 |  | 
| Satyam Sharma | 17951f3 | 2007-08-10 15:33:01 -0700 | [diff] [blame] | 746 | 	err = register_netdevice_notifier(&netconsole_netdev_notifier); | 
 | 747 | 	if (err) | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 748 | 		goto fail; | 
| Satyam Sharma | 17951f3 | 2007-08-10 15:33:01 -0700 | [diff] [blame] | 749 |  | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 750 | 	err = dynamic_netconsole_init(); | 
 | 751 | 	if (err) | 
 | 752 | 		goto undonotifier; | 
 | 753 |  | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 754 | 	register_console(&netconsole); | 
 | 755 | 	printk(KERN_INFO "netconsole: network logging started\n"); | 
| Satyam Sharma | d39badf | 2007-08-10 15:27:24 -0700 | [diff] [blame] | 756 |  | 
| Satyam Sharma | d39badf | 2007-08-10 15:27:24 -0700 | [diff] [blame] | 757 | 	return err; | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 758 |  | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 759 | undonotifier: | 
 | 760 | 	unregister_netdevice_notifier(&netconsole_netdev_notifier); | 
 | 761 |  | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 762 | fail: | 
 | 763 | 	printk(KERN_ERR "netconsole: cleaning up\n"); | 
 | 764 |  | 
 | 765 | 	/* | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 766 | 	 * Remove all targets and destroy them (only targets created | 
 | 767 | 	 * from the boot/module option exist here). Skipping the list | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 768 | 	 * lock is safe here, and netpoll_cleanup() will sleep. | 
 | 769 | 	 */ | 
 | 770 | 	list_for_each_entry_safe(nt, tmp, &target_list, list) { | 
 | 771 | 		list_del(&nt->list); | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 772 | 		free_param_target(nt); | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 773 | 	} | 
 | 774 |  | 
 | 775 | 	return err; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 776 | } | 
 | 777 |  | 
| Satyam Sharma | d39badf | 2007-08-10 15:27:24 -0700 | [diff] [blame] | 778 | static void __exit cleanup_netconsole(void) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 779 | { | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 780 | 	struct netconsole_target *nt, *tmp; | 
| Satyam Sharma | df180e3 | 2007-08-10 15:32:14 -0700 | [diff] [blame] | 781 |  | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 782 | 	unregister_console(&netconsole); | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 783 | 	dynamic_netconsole_exit(); | 
| Satyam Sharma | 17951f3 | 2007-08-10 15:33:01 -0700 | [diff] [blame] | 784 | 	unregister_netdevice_notifier(&netconsole_netdev_notifier); | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 785 |  | 
 | 786 | 	/* | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 787 | 	 * Targets created via configfs pin references on our module | 
 | 788 | 	 * and would first be rmdir(2)'ed from userspace. We reach | 
 | 789 | 	 * here only when they are already destroyed, and only those | 
 | 790 | 	 * created from the boot/module option are left, so remove and | 
 | 791 | 	 * destroy them. Skipping the list lock is safe here, and | 
 | 792 | 	 * netpoll_cleanup() will sleep. | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 793 | 	 */ | 
 | 794 | 	list_for_each_entry_safe(nt, tmp, &target_list, list) { | 
 | 795 | 		list_del(&nt->list); | 
| Satyam Sharma | 0bcc181 | 2007-08-10 15:35:05 -0700 | [diff] [blame] | 796 | 		free_param_target(nt); | 
| Satyam Sharma | b5427c2 | 2007-08-10 15:33:40 -0700 | [diff] [blame] | 797 | 	} | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 798 | } | 
 | 799 |  | 
| Lin Ming | 97c7de0 | 2011-09-20 15:45:07 -0400 | [diff] [blame] | 800 | /* | 
 | 801 |  * Use late_initcall to ensure netconsole is | 
 | 802 |  * initialized after network device driver if built-in. | 
 | 803 |  * | 
 | 804 |  * late_initcall() and module_init() are identical if built as module. | 
 | 805 |  */ | 
 | 806 | late_initcall(init_netconsole); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 807 | module_exit(cleanup_netconsole); |