11da177e4SLinus Torvalds /* 21da177e4SLinus Torvalds * linux/drivers/net/netconsole.c 31da177e4SLinus Torvalds * 41da177e4SLinus Torvalds * Copyright (C) 2001 Ingo Molnar <mingo@redhat.com> 51da177e4SLinus Torvalds * 61da177e4SLinus Torvalds * This file contains the implementation of an IRQ-safe, crash-safe 71da177e4SLinus Torvalds * kernel console implementation that outputs kernel messages to the 81da177e4SLinus Torvalds * network. 91da177e4SLinus Torvalds * 101da177e4SLinus Torvalds * Modification history: 111da177e4SLinus Torvalds * 121da177e4SLinus Torvalds * 2001-09-17 started by Ingo Molnar. 131da177e4SLinus Torvalds * 2003-08-11 2.6 port by Matt Mackall 141da177e4SLinus Torvalds * simplified options 151da177e4SLinus Torvalds * generic card hooks 161da177e4SLinus Torvalds * works non-modular 171da177e4SLinus Torvalds * 2003-09-07 rewritten with netpoll api 181da177e4SLinus Torvalds */ 191da177e4SLinus Torvalds 201da177e4SLinus Torvalds /**************************************************************** 211da177e4SLinus Torvalds * This program is free software; you can redistribute it and/or modify 221da177e4SLinus Torvalds * it under the terms of the GNU General Public License as published by 231da177e4SLinus Torvalds * the Free Software Foundation; either version 2, or (at your option) 241da177e4SLinus Torvalds * any later version. 251da177e4SLinus Torvalds * 261da177e4SLinus Torvalds * This program is distributed in the hope that it will be useful, 271da177e4SLinus Torvalds * but WITHOUT ANY WARRANTY; without even the implied warranty of 281da177e4SLinus Torvalds * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 291da177e4SLinus Torvalds * GNU General Public License for more details. 301da177e4SLinus Torvalds * 311da177e4SLinus Torvalds * You should have received a copy of the GNU General Public License 321da177e4SLinus Torvalds * along with this program; if not, write to the Free Software 331da177e4SLinus Torvalds * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. 341da177e4SLinus Torvalds * 351da177e4SLinus Torvalds ****************************************************************/ 361da177e4SLinus Torvalds 371da177e4SLinus Torvalds #include <linux/mm.h> 381da177e4SLinus Torvalds #include <linux/init.h> 391da177e4SLinus Torvalds #include <linux/module.h> 405a0e3ad6STejun Heo #include <linux/slab.h> 411da177e4SLinus Torvalds #include <linux/console.h> 421da177e4SLinus Torvalds #include <linux/moduleparam.h> 431da177e4SLinus Torvalds #include <linux/string.h> 441da177e4SLinus Torvalds #include <linux/netpoll.h> 450bcc1816SSatyam Sharma #include <linux/inet.h> 460bcc1816SSatyam Sharma #include <linux/configfs.h> 471da177e4SLinus Torvalds 481da177e4SLinus Torvalds MODULE_AUTHOR("Maintainer: Matt Mackall <mpm@selenic.com>"); 491da177e4SLinus Torvalds MODULE_DESCRIPTION("Console driver for network interfaces"); 501da177e4SLinus Torvalds MODULE_LICENSE("GPL"); 511da177e4SLinus Torvalds 52d39badf0SSatyam Sharma #define MAX_PARAM_LENGTH 256 53d39badf0SSatyam Sharma #define MAX_PRINT_CHUNK 1000 54d39badf0SSatyam Sharma 55d39badf0SSatyam Sharma static char config[MAX_PARAM_LENGTH]; 56d39badf0SSatyam Sharma module_param_string(netconsole, config, MAX_PARAM_LENGTH, 0); 5761a2d07dSNiels de Vos MODULE_PARM_DESC(netconsole, " netconsole=[src-port]@[src-ip]/[dev],[tgt-port]@<tgt-ip>/[tgt-macaddr]"); 581da177e4SLinus Torvalds 59d2b60881SSatyam Sharma #ifndef MODULE 60d2b60881SSatyam Sharma static int __init option_setup(char *opt) 61d2b60881SSatyam Sharma { 62d2b60881SSatyam Sharma strlcpy(config, opt, MAX_PARAM_LENGTH); 63d2b60881SSatyam Sharma return 1; 64d2b60881SSatyam Sharma } 65d2b60881SSatyam Sharma __setup("netconsole=", option_setup); 66d2b60881SSatyam Sharma #endif /* MODULE */ 67d2b60881SSatyam Sharma 68b5427c27SSatyam Sharma /* Linked list of all configured targets */ 69b5427c27SSatyam Sharma static LIST_HEAD(target_list); 70b5427c27SSatyam Sharma 71b5427c27SSatyam Sharma /* This needs to be a spinlock because write_msg() cannot sleep */ 72b5427c27SSatyam Sharma static DEFINE_SPINLOCK(target_list_lock); 73b5427c27SSatyam Sharma 74df180e36SSatyam Sharma /** 75df180e36SSatyam Sharma * struct netconsole_target - Represents a configured netconsole target. 76b5427c27SSatyam Sharma * @list: Links this target into the target_list. 770bcc1816SSatyam Sharma * @item: Links us into the configfs subsystem hierarchy. 780bcc1816SSatyam Sharma * @enabled: On / off knob to enable / disable target. 790bcc1816SSatyam Sharma * Visible from userspace (read-write). 800bcc1816SSatyam Sharma * We maintain a strict 1:1 correspondence between this and 810bcc1816SSatyam Sharma * whether the corresponding netpoll is active or inactive. 820bcc1816SSatyam Sharma * Also, other parameters of a target may be modified at 830bcc1816SSatyam Sharma * runtime only when it is disabled (enabled == 0). 84df180e36SSatyam Sharma * @np: The netpoll structure for this target. 850bcc1816SSatyam Sharma * Contains the other userspace visible parameters: 860bcc1816SSatyam Sharma * dev_name (read-write) 870bcc1816SSatyam Sharma * local_port (read-write) 880bcc1816SSatyam Sharma * remote_port (read-write) 890bcc1816SSatyam Sharma * local_ip (read-write) 900bcc1816SSatyam Sharma * remote_ip (read-write) 910bcc1816SSatyam Sharma * local_mac (read-only) 920bcc1816SSatyam Sharma * remote_mac (read-write) 93df180e36SSatyam Sharma */ 94df180e36SSatyam Sharma struct netconsole_target { 95b5427c27SSatyam Sharma struct list_head list; 960bcc1816SSatyam Sharma #ifdef CONFIG_NETCONSOLE_DYNAMIC 970bcc1816SSatyam Sharma struct config_item item; 980bcc1816SSatyam Sharma #endif 990bcc1816SSatyam Sharma int enabled; 100df180e36SSatyam Sharma struct netpoll np; 101df180e36SSatyam Sharma }; 102df180e36SSatyam Sharma 1030bcc1816SSatyam Sharma #ifdef CONFIG_NETCONSOLE_DYNAMIC 1040bcc1816SSatyam Sharma 1050bcc1816SSatyam Sharma static struct configfs_subsystem netconsole_subsys; 1060bcc1816SSatyam Sharma 1070bcc1816SSatyam Sharma static int __init dynamic_netconsole_init(void) 1080bcc1816SSatyam Sharma { 1090bcc1816SSatyam Sharma config_group_init(&netconsole_subsys.su_group); 1100bcc1816SSatyam Sharma mutex_init(&netconsole_subsys.su_mutex); 1110bcc1816SSatyam Sharma return configfs_register_subsystem(&netconsole_subsys); 1120bcc1816SSatyam Sharma } 1130bcc1816SSatyam Sharma 1140bcc1816SSatyam Sharma static void __exit dynamic_netconsole_exit(void) 1150bcc1816SSatyam Sharma { 1160bcc1816SSatyam Sharma configfs_unregister_subsystem(&netconsole_subsys); 1170bcc1816SSatyam Sharma } 1180bcc1816SSatyam Sharma 1190bcc1816SSatyam Sharma /* 1200bcc1816SSatyam Sharma * Targets that were created by parsing the boot/module option string 1210bcc1816SSatyam Sharma * do not exist in the configfs hierarchy (and have NULL names) and will 1220bcc1816SSatyam Sharma * never go away, so make these a no-op for them. 1230bcc1816SSatyam Sharma */ 1240bcc1816SSatyam Sharma static void netconsole_target_get(struct netconsole_target *nt) 1250bcc1816SSatyam Sharma { 1260bcc1816SSatyam Sharma if (config_item_name(&nt->item)) 1270bcc1816SSatyam Sharma config_item_get(&nt->item); 1280bcc1816SSatyam Sharma } 1290bcc1816SSatyam Sharma 1300bcc1816SSatyam Sharma static void netconsole_target_put(struct netconsole_target *nt) 1310bcc1816SSatyam Sharma { 1320bcc1816SSatyam Sharma if (config_item_name(&nt->item)) 1330bcc1816SSatyam Sharma config_item_put(&nt->item); 1340bcc1816SSatyam Sharma } 1350bcc1816SSatyam Sharma 1360bcc1816SSatyam Sharma #else /* !CONFIG_NETCONSOLE_DYNAMIC */ 1370bcc1816SSatyam Sharma 1380bcc1816SSatyam Sharma static int __init dynamic_netconsole_init(void) 1390bcc1816SSatyam Sharma { 1400bcc1816SSatyam Sharma return 0; 1410bcc1816SSatyam Sharma } 1420bcc1816SSatyam Sharma 1430bcc1816SSatyam Sharma static void __exit dynamic_netconsole_exit(void) 1440bcc1816SSatyam Sharma { 1450bcc1816SSatyam Sharma } 1460bcc1816SSatyam Sharma 1470bcc1816SSatyam Sharma /* 1480bcc1816SSatyam Sharma * No danger of targets going away from under us when dynamic 1490bcc1816SSatyam Sharma * reconfigurability is off. 1500bcc1816SSatyam Sharma */ 1510bcc1816SSatyam Sharma static void netconsole_target_get(struct netconsole_target *nt) 1520bcc1816SSatyam Sharma { 1530bcc1816SSatyam Sharma } 1540bcc1816SSatyam Sharma 1550bcc1816SSatyam Sharma static void netconsole_target_put(struct netconsole_target *nt) 1560bcc1816SSatyam Sharma { 1570bcc1816SSatyam Sharma } 1580bcc1816SSatyam Sharma 1590bcc1816SSatyam Sharma #endif /* CONFIG_NETCONSOLE_DYNAMIC */ 1600bcc1816SSatyam Sharma 1610bcc1816SSatyam Sharma /* Allocate new target (from boot/module param) and setup netpoll for it */ 1620bcc1816SSatyam Sharma static struct netconsole_target *alloc_param_target(char *target_config) 163b5427c27SSatyam Sharma { 164b5427c27SSatyam Sharma int err = -ENOMEM; 165b5427c27SSatyam Sharma struct netconsole_target *nt; 166b5427c27SSatyam Sharma 1670bcc1816SSatyam Sharma /* 1680bcc1816SSatyam Sharma * Allocate and initialize with defaults. 1690bcc1816SSatyam Sharma * Note that these targets get their config_item fields zeroed-out. 1700bcc1816SSatyam Sharma */ 171b5427c27SSatyam Sharma nt = kzalloc(sizeof(*nt), GFP_KERNEL); 172b5427c27SSatyam Sharma if (!nt) { 173b5427c27SSatyam Sharma printk(KERN_ERR "netconsole: failed to allocate memory\n"); 174b5427c27SSatyam Sharma goto fail; 175b5427c27SSatyam Sharma } 176b5427c27SSatyam Sharma 177b5427c27SSatyam Sharma nt->np.name = "netconsole"; 178b5427c27SSatyam Sharma strlcpy(nt->np.dev_name, "eth0", IFNAMSIZ); 179b5427c27SSatyam Sharma nt->np.local_port = 6665; 180b5427c27SSatyam Sharma nt->np.remote_port = 6666; 181b5427c27SSatyam Sharma memset(nt->np.remote_mac, 0xff, ETH_ALEN); 182b5427c27SSatyam Sharma 183b5427c27SSatyam Sharma /* Parse parameters and setup netpoll */ 184b5427c27SSatyam Sharma err = netpoll_parse_options(&nt->np, target_config); 185b5427c27SSatyam Sharma if (err) 186b5427c27SSatyam Sharma goto fail; 187b5427c27SSatyam Sharma 188b5427c27SSatyam Sharma err = netpoll_setup(&nt->np); 189b5427c27SSatyam Sharma if (err) 190b5427c27SSatyam Sharma goto fail; 191b5427c27SSatyam Sharma 1920bcc1816SSatyam Sharma nt->enabled = 1; 1930bcc1816SSatyam Sharma 194b5427c27SSatyam Sharma return nt; 195b5427c27SSatyam Sharma 196b5427c27SSatyam Sharma fail: 197b5427c27SSatyam Sharma kfree(nt); 198b5427c27SSatyam Sharma return ERR_PTR(err); 199b5427c27SSatyam Sharma } 200b5427c27SSatyam Sharma 2010bcc1816SSatyam Sharma /* Cleanup netpoll for given target (from boot/module param) and free it */ 2020bcc1816SSatyam Sharma static void free_param_target(struct netconsole_target *nt) 203b5427c27SSatyam Sharma { 204b5427c27SSatyam Sharma netpoll_cleanup(&nt->np); 205b5427c27SSatyam Sharma kfree(nt); 206b5427c27SSatyam Sharma } 2071da177e4SLinus Torvalds 2080bcc1816SSatyam Sharma #ifdef CONFIG_NETCONSOLE_DYNAMIC 2090bcc1816SSatyam Sharma 2100bcc1816SSatyam Sharma /* 2110bcc1816SSatyam Sharma * Our subsystem hierarchy is: 2120bcc1816SSatyam Sharma * 2130bcc1816SSatyam Sharma * /sys/kernel/config/netconsole/ 2140bcc1816SSatyam Sharma * | 2150bcc1816SSatyam Sharma * <target>/ 2160bcc1816SSatyam Sharma * | enabled 2170bcc1816SSatyam Sharma * | dev_name 2180bcc1816SSatyam Sharma * | local_port 2190bcc1816SSatyam Sharma * | remote_port 2200bcc1816SSatyam Sharma * | local_ip 2210bcc1816SSatyam Sharma * | remote_ip 2220bcc1816SSatyam Sharma * | local_mac 2230bcc1816SSatyam Sharma * | remote_mac 2240bcc1816SSatyam Sharma * | 2250bcc1816SSatyam Sharma * <target>/... 2260bcc1816SSatyam Sharma */ 2270bcc1816SSatyam Sharma 2280bcc1816SSatyam Sharma struct netconsole_target_attr { 2290bcc1816SSatyam Sharma struct configfs_attribute attr; 2300bcc1816SSatyam Sharma ssize_t (*show)(struct netconsole_target *nt, 2310bcc1816SSatyam Sharma char *buf); 2320bcc1816SSatyam Sharma ssize_t (*store)(struct netconsole_target *nt, 2330bcc1816SSatyam Sharma const char *buf, 2340bcc1816SSatyam Sharma size_t count); 2350bcc1816SSatyam Sharma }; 2360bcc1816SSatyam Sharma 2370bcc1816SSatyam Sharma static struct netconsole_target *to_target(struct config_item *item) 2380bcc1816SSatyam Sharma { 2390bcc1816SSatyam Sharma return item ? 2400bcc1816SSatyam Sharma container_of(item, struct netconsole_target, item) : 2410bcc1816SSatyam Sharma NULL; 2420bcc1816SSatyam Sharma } 2430bcc1816SSatyam Sharma 2440bcc1816SSatyam Sharma /* 2450bcc1816SSatyam Sharma * Wrapper over simple_strtol (base 10) with sanity and range checking. 2460bcc1816SSatyam Sharma * We return (signed) long only because we may want to return errors. 2470bcc1816SSatyam Sharma * Do not use this to convert numbers that are allowed to be negative. 2480bcc1816SSatyam Sharma */ 2490bcc1816SSatyam Sharma static long strtol10_check_range(const char *cp, long min, long max) 2500bcc1816SSatyam Sharma { 2510bcc1816SSatyam Sharma long ret; 2520bcc1816SSatyam Sharma char *p = (char *) cp; 2530bcc1816SSatyam Sharma 2540bcc1816SSatyam Sharma WARN_ON(min < 0); 2550bcc1816SSatyam Sharma WARN_ON(max < min); 2560bcc1816SSatyam Sharma 2570bcc1816SSatyam Sharma ret = simple_strtol(p, &p, 10); 2580bcc1816SSatyam Sharma 2590bcc1816SSatyam Sharma if (*p && (*p != '\n')) { 2600bcc1816SSatyam Sharma printk(KERN_ERR "netconsole: invalid input\n"); 2610bcc1816SSatyam Sharma return -EINVAL; 2620bcc1816SSatyam Sharma } 2630bcc1816SSatyam Sharma if ((ret < min) || (ret > max)) { 2640bcc1816SSatyam Sharma printk(KERN_ERR "netconsole: input %ld must be between " 2650bcc1816SSatyam Sharma "%ld and %ld\n", ret, min, max); 2660bcc1816SSatyam Sharma return -EINVAL; 2670bcc1816SSatyam Sharma } 2680bcc1816SSatyam Sharma 2690bcc1816SSatyam Sharma return ret; 2700bcc1816SSatyam Sharma } 2710bcc1816SSatyam Sharma 2720bcc1816SSatyam Sharma /* 2730bcc1816SSatyam Sharma * Attribute operations for netconsole_target. 2740bcc1816SSatyam Sharma */ 2750bcc1816SSatyam Sharma 2760bcc1816SSatyam Sharma static ssize_t show_enabled(struct netconsole_target *nt, char *buf) 2770bcc1816SSatyam Sharma { 2780bcc1816SSatyam Sharma return snprintf(buf, PAGE_SIZE, "%d\n", nt->enabled); 2790bcc1816SSatyam Sharma } 2800bcc1816SSatyam Sharma 2810bcc1816SSatyam Sharma static ssize_t show_dev_name(struct netconsole_target *nt, char *buf) 2820bcc1816SSatyam Sharma { 2830bcc1816SSatyam Sharma return snprintf(buf, PAGE_SIZE, "%s\n", nt->np.dev_name); 2840bcc1816SSatyam Sharma } 2850bcc1816SSatyam Sharma 2860bcc1816SSatyam Sharma static ssize_t show_local_port(struct netconsole_target *nt, char *buf) 2870bcc1816SSatyam Sharma { 2880bcc1816SSatyam Sharma return snprintf(buf, PAGE_SIZE, "%d\n", nt->np.local_port); 2890bcc1816SSatyam Sharma } 2900bcc1816SSatyam Sharma 2910bcc1816SSatyam Sharma static ssize_t show_remote_port(struct netconsole_target *nt, char *buf) 2920bcc1816SSatyam Sharma { 2930bcc1816SSatyam Sharma return snprintf(buf, PAGE_SIZE, "%d\n", nt->np.remote_port); 2940bcc1816SSatyam Sharma } 2950bcc1816SSatyam Sharma 2960bcc1816SSatyam Sharma static ssize_t show_local_ip(struct netconsole_target *nt, char *buf) 2970bcc1816SSatyam Sharma { 298e7557af5SHarvey Harrison return snprintf(buf, PAGE_SIZE, "%pI4\n", &nt->np.local_ip); 2990bcc1816SSatyam Sharma } 3000bcc1816SSatyam Sharma 3010bcc1816SSatyam Sharma static ssize_t show_remote_ip(struct netconsole_target *nt, char *buf) 3020bcc1816SSatyam Sharma { 303e7557af5SHarvey Harrison return snprintf(buf, PAGE_SIZE, "%pI4\n", &nt->np.remote_ip); 3040bcc1816SSatyam Sharma } 3050bcc1816SSatyam Sharma 3060bcc1816SSatyam Sharma static ssize_t show_local_mac(struct netconsole_target *nt, char *buf) 3070bcc1816SSatyam Sharma { 30809538641SStephen Hemminger struct net_device *dev = nt->np.dev; 309e174961cSJohannes Berg static const u8 bcast[ETH_ALEN] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff }; 31009538641SStephen Hemminger 311e174961cSJohannes Berg return snprintf(buf, PAGE_SIZE, "%pM\n", dev ? dev->dev_addr : bcast); 3120bcc1816SSatyam Sharma } 3130bcc1816SSatyam Sharma 3140bcc1816SSatyam Sharma static ssize_t show_remote_mac(struct netconsole_target *nt, char *buf) 3150bcc1816SSatyam Sharma { 316e174961cSJohannes Berg return snprintf(buf, PAGE_SIZE, "%pM\n", nt->np.remote_mac); 3170bcc1816SSatyam Sharma } 3180bcc1816SSatyam Sharma 3190bcc1816SSatyam Sharma /* 3200bcc1816SSatyam Sharma * This one is special -- targets created through the configfs interface 3210bcc1816SSatyam Sharma * are not enabled (and the corresponding netpoll activated) by default. 3220bcc1816SSatyam Sharma * The user is expected to set the desired parameters first (which 3230bcc1816SSatyam Sharma * would enable him to dynamically add new netpoll targets for new 3240bcc1816SSatyam Sharma * network interfaces as and when they come up). 3250bcc1816SSatyam Sharma */ 3260bcc1816SSatyam Sharma static ssize_t store_enabled(struct netconsole_target *nt, 3270bcc1816SSatyam Sharma const char *buf, 3280bcc1816SSatyam Sharma size_t count) 3290bcc1816SSatyam Sharma { 3300bcc1816SSatyam Sharma int err; 3310bcc1816SSatyam Sharma long enabled; 3320bcc1816SSatyam Sharma 3330bcc1816SSatyam Sharma enabled = strtol10_check_range(buf, 0, 1); 3340bcc1816SSatyam Sharma if (enabled < 0) 3350bcc1816SSatyam Sharma return enabled; 3360bcc1816SSatyam Sharma 3370bcc1816SSatyam Sharma if (enabled) { /* 1 */ 3380bcc1816SSatyam Sharma 3390bcc1816SSatyam Sharma /* 3400bcc1816SSatyam Sharma * Skip netpoll_parse_options() -- all the attributes are 3410bcc1816SSatyam Sharma * already configured via configfs. Just print them out. 3420bcc1816SSatyam Sharma */ 3430bcc1816SSatyam Sharma netpoll_print_options(&nt->np); 3440bcc1816SSatyam Sharma 3450bcc1816SSatyam Sharma err = netpoll_setup(&nt->np); 3460bcc1816SSatyam Sharma if (err) 3470bcc1816SSatyam Sharma return err; 3480bcc1816SSatyam Sharma 3490bcc1816SSatyam Sharma printk(KERN_INFO "netconsole: network logging started\n"); 3500bcc1816SSatyam Sharma 3510bcc1816SSatyam Sharma } else { /* 0 */ 3520bcc1816SSatyam Sharma netpoll_cleanup(&nt->np); 3530bcc1816SSatyam Sharma } 3540bcc1816SSatyam Sharma 3550bcc1816SSatyam Sharma nt->enabled = enabled; 3560bcc1816SSatyam Sharma 3570bcc1816SSatyam Sharma return strnlen(buf, count); 3580bcc1816SSatyam Sharma } 3590bcc1816SSatyam Sharma 3600bcc1816SSatyam Sharma static ssize_t store_dev_name(struct netconsole_target *nt, 3610bcc1816SSatyam Sharma const char *buf, 3620bcc1816SSatyam Sharma size_t count) 3630bcc1816SSatyam Sharma { 3640bcc1816SSatyam Sharma size_t len; 3650bcc1816SSatyam Sharma 3660bcc1816SSatyam Sharma if (nt->enabled) { 3670bcc1816SSatyam Sharma printk(KERN_ERR "netconsole: target (%s) is enabled, " 3680bcc1816SSatyam Sharma "disable to update parameters\n", 3690bcc1816SSatyam Sharma config_item_name(&nt->item)); 3700bcc1816SSatyam Sharma return -EINVAL; 3710bcc1816SSatyam Sharma } 3720bcc1816SSatyam Sharma 3730bcc1816SSatyam Sharma strlcpy(nt->np.dev_name, buf, IFNAMSIZ); 3740bcc1816SSatyam Sharma 3750bcc1816SSatyam Sharma /* Get rid of possible trailing newline from echo(1) */ 3760bcc1816SSatyam Sharma len = strnlen(nt->np.dev_name, IFNAMSIZ); 3770bcc1816SSatyam Sharma if (nt->np.dev_name[len - 1] == '\n') 3780bcc1816SSatyam Sharma nt->np.dev_name[len - 1] = '\0'; 3790bcc1816SSatyam Sharma 3800bcc1816SSatyam Sharma return strnlen(buf, count); 3810bcc1816SSatyam Sharma } 3820bcc1816SSatyam Sharma 3830bcc1816SSatyam Sharma static ssize_t store_local_port(struct netconsole_target *nt, 3840bcc1816SSatyam Sharma const char *buf, 3850bcc1816SSatyam Sharma size_t count) 3860bcc1816SSatyam Sharma { 3870bcc1816SSatyam Sharma long local_port; 3880bcc1816SSatyam Sharma #define __U16_MAX ((__u16) ~0U) 3890bcc1816SSatyam Sharma 3900bcc1816SSatyam Sharma if (nt->enabled) { 3910bcc1816SSatyam Sharma printk(KERN_ERR "netconsole: target (%s) is enabled, " 3920bcc1816SSatyam Sharma "disable to update parameters\n", 3930bcc1816SSatyam Sharma config_item_name(&nt->item)); 3940bcc1816SSatyam Sharma return -EINVAL; 3950bcc1816SSatyam Sharma } 3960bcc1816SSatyam Sharma 3970bcc1816SSatyam Sharma local_port = strtol10_check_range(buf, 0, __U16_MAX); 3980bcc1816SSatyam Sharma if (local_port < 0) 3990bcc1816SSatyam Sharma return local_port; 4000bcc1816SSatyam Sharma 4010bcc1816SSatyam Sharma nt->np.local_port = local_port; 4020bcc1816SSatyam Sharma 4030bcc1816SSatyam Sharma return strnlen(buf, count); 4040bcc1816SSatyam Sharma } 4050bcc1816SSatyam Sharma 4060bcc1816SSatyam Sharma static ssize_t store_remote_port(struct netconsole_target *nt, 4070bcc1816SSatyam Sharma const char *buf, 4080bcc1816SSatyam Sharma size_t count) 4090bcc1816SSatyam Sharma { 4100bcc1816SSatyam Sharma long remote_port; 4110bcc1816SSatyam Sharma #define __U16_MAX ((__u16) ~0U) 4120bcc1816SSatyam Sharma 4130bcc1816SSatyam Sharma if (nt->enabled) { 4140bcc1816SSatyam Sharma printk(KERN_ERR "netconsole: target (%s) is enabled, " 4150bcc1816SSatyam Sharma "disable to update parameters\n", 4160bcc1816SSatyam Sharma config_item_name(&nt->item)); 4170bcc1816SSatyam Sharma return -EINVAL; 4180bcc1816SSatyam Sharma } 4190bcc1816SSatyam Sharma 4200bcc1816SSatyam Sharma remote_port = strtol10_check_range(buf, 0, __U16_MAX); 4210bcc1816SSatyam Sharma if (remote_port < 0) 4220bcc1816SSatyam Sharma return remote_port; 4230bcc1816SSatyam Sharma 4240bcc1816SSatyam Sharma nt->np.remote_port = remote_port; 4250bcc1816SSatyam Sharma 4260bcc1816SSatyam Sharma return strnlen(buf, count); 4270bcc1816SSatyam Sharma } 4280bcc1816SSatyam Sharma 4290bcc1816SSatyam Sharma static ssize_t store_local_ip(struct netconsole_target *nt, 4300bcc1816SSatyam Sharma const char *buf, 4310bcc1816SSatyam Sharma size_t count) 4320bcc1816SSatyam Sharma { 4330bcc1816SSatyam Sharma if (nt->enabled) { 4340bcc1816SSatyam Sharma printk(KERN_ERR "netconsole: target (%s) is enabled, " 4350bcc1816SSatyam Sharma "disable to update parameters\n", 4360bcc1816SSatyam Sharma config_item_name(&nt->item)); 4370bcc1816SSatyam Sharma return -EINVAL; 4380bcc1816SSatyam Sharma } 4390bcc1816SSatyam Sharma 440e7557af5SHarvey Harrison nt->np.local_ip = in_aton(buf); 4410bcc1816SSatyam Sharma 4420bcc1816SSatyam Sharma return strnlen(buf, count); 4430bcc1816SSatyam Sharma } 4440bcc1816SSatyam Sharma 4450bcc1816SSatyam Sharma static ssize_t store_remote_ip(struct netconsole_target *nt, 4460bcc1816SSatyam Sharma const char *buf, 4470bcc1816SSatyam Sharma size_t count) 4480bcc1816SSatyam Sharma { 4490bcc1816SSatyam Sharma if (nt->enabled) { 4500bcc1816SSatyam Sharma printk(KERN_ERR "netconsole: target (%s) is enabled, " 4510bcc1816SSatyam Sharma "disable to update parameters\n", 4520bcc1816SSatyam Sharma config_item_name(&nt->item)); 4530bcc1816SSatyam Sharma return -EINVAL; 4540bcc1816SSatyam Sharma } 4550bcc1816SSatyam Sharma 456e7557af5SHarvey Harrison nt->np.remote_ip = in_aton(buf); 4570bcc1816SSatyam Sharma 4580bcc1816SSatyam Sharma return strnlen(buf, count); 4590bcc1816SSatyam Sharma } 4600bcc1816SSatyam Sharma 4610bcc1816SSatyam Sharma static ssize_t store_remote_mac(struct netconsole_target *nt, 4620bcc1816SSatyam Sharma const char *buf, 4630bcc1816SSatyam Sharma size_t count) 4640bcc1816SSatyam Sharma { 4650bcc1816SSatyam Sharma u8 remote_mac[ETH_ALEN]; 4660bcc1816SSatyam Sharma char *p = (char *) buf; 4670bcc1816SSatyam Sharma int i; 4680bcc1816SSatyam Sharma 4690bcc1816SSatyam Sharma if (nt->enabled) { 4700bcc1816SSatyam Sharma printk(KERN_ERR "netconsole: target (%s) is enabled, " 4710bcc1816SSatyam Sharma "disable to update parameters\n", 4720bcc1816SSatyam Sharma config_item_name(&nt->item)); 4730bcc1816SSatyam Sharma return -EINVAL; 4740bcc1816SSatyam Sharma } 4750bcc1816SSatyam Sharma 4760bcc1816SSatyam Sharma for (i = 0; i < ETH_ALEN - 1; i++) { 4770bcc1816SSatyam Sharma remote_mac[i] = simple_strtoul(p, &p, 16); 4780bcc1816SSatyam Sharma if (*p != ':') 4790bcc1816SSatyam Sharma goto invalid; 4800bcc1816SSatyam Sharma p++; 4810bcc1816SSatyam Sharma } 4820bcc1816SSatyam Sharma remote_mac[ETH_ALEN - 1] = simple_strtoul(p, &p, 16); 4830bcc1816SSatyam Sharma if (*p && (*p != '\n')) 4840bcc1816SSatyam Sharma goto invalid; 4850bcc1816SSatyam Sharma 4860bcc1816SSatyam Sharma memcpy(nt->np.remote_mac, remote_mac, ETH_ALEN); 4870bcc1816SSatyam Sharma 4880bcc1816SSatyam Sharma return strnlen(buf, count); 4890bcc1816SSatyam Sharma 4900bcc1816SSatyam Sharma invalid: 4910bcc1816SSatyam Sharma printk(KERN_ERR "netconsole: invalid input\n"); 4920bcc1816SSatyam Sharma return -EINVAL; 4930bcc1816SSatyam Sharma } 4940bcc1816SSatyam Sharma 4950bcc1816SSatyam Sharma /* 4960bcc1816SSatyam Sharma * Attribute definitions for netconsole_target. 4970bcc1816SSatyam Sharma */ 4980bcc1816SSatyam Sharma 4990bcc1816SSatyam Sharma #define NETCONSOLE_TARGET_ATTR_RO(_name) \ 5000bcc1816SSatyam Sharma static struct netconsole_target_attr netconsole_target_##_name = \ 5010bcc1816SSatyam Sharma __CONFIGFS_ATTR(_name, S_IRUGO, show_##_name, NULL) 5020bcc1816SSatyam Sharma 5030bcc1816SSatyam Sharma #define NETCONSOLE_TARGET_ATTR_RW(_name) \ 5040bcc1816SSatyam Sharma static struct netconsole_target_attr netconsole_target_##_name = \ 5050bcc1816SSatyam Sharma __CONFIGFS_ATTR(_name, S_IRUGO | S_IWUSR, show_##_name, store_##_name) 5060bcc1816SSatyam Sharma 5070bcc1816SSatyam Sharma NETCONSOLE_TARGET_ATTR_RW(enabled); 5080bcc1816SSatyam Sharma NETCONSOLE_TARGET_ATTR_RW(dev_name); 5090bcc1816SSatyam Sharma NETCONSOLE_TARGET_ATTR_RW(local_port); 5100bcc1816SSatyam Sharma NETCONSOLE_TARGET_ATTR_RW(remote_port); 5110bcc1816SSatyam Sharma NETCONSOLE_TARGET_ATTR_RW(local_ip); 5120bcc1816SSatyam Sharma NETCONSOLE_TARGET_ATTR_RW(remote_ip); 5130bcc1816SSatyam Sharma NETCONSOLE_TARGET_ATTR_RO(local_mac); 5140bcc1816SSatyam Sharma NETCONSOLE_TARGET_ATTR_RW(remote_mac); 5150bcc1816SSatyam Sharma 5160bcc1816SSatyam Sharma static struct configfs_attribute *netconsole_target_attrs[] = { 5170bcc1816SSatyam Sharma &netconsole_target_enabled.attr, 5180bcc1816SSatyam Sharma &netconsole_target_dev_name.attr, 5190bcc1816SSatyam Sharma &netconsole_target_local_port.attr, 5200bcc1816SSatyam Sharma &netconsole_target_remote_port.attr, 5210bcc1816SSatyam Sharma &netconsole_target_local_ip.attr, 5220bcc1816SSatyam Sharma &netconsole_target_remote_ip.attr, 5230bcc1816SSatyam Sharma &netconsole_target_local_mac.attr, 5240bcc1816SSatyam Sharma &netconsole_target_remote_mac.attr, 5250bcc1816SSatyam Sharma NULL, 5260bcc1816SSatyam Sharma }; 5270bcc1816SSatyam Sharma 5280bcc1816SSatyam Sharma /* 5290bcc1816SSatyam Sharma * Item operations and type for netconsole_target. 5300bcc1816SSatyam Sharma */ 5310bcc1816SSatyam Sharma 5320bcc1816SSatyam Sharma static void netconsole_target_release(struct config_item *item) 5330bcc1816SSatyam Sharma { 5340bcc1816SSatyam Sharma kfree(to_target(item)); 5350bcc1816SSatyam Sharma } 5360bcc1816SSatyam Sharma 5370bcc1816SSatyam Sharma static ssize_t netconsole_target_attr_show(struct config_item *item, 5380bcc1816SSatyam Sharma struct configfs_attribute *attr, 5390bcc1816SSatyam Sharma char *buf) 5400bcc1816SSatyam Sharma { 5410bcc1816SSatyam Sharma ssize_t ret = -EINVAL; 5420bcc1816SSatyam Sharma struct netconsole_target *nt = to_target(item); 5430bcc1816SSatyam Sharma struct netconsole_target_attr *na = 5440bcc1816SSatyam Sharma container_of(attr, struct netconsole_target_attr, attr); 5450bcc1816SSatyam Sharma 5460bcc1816SSatyam Sharma if (na->show) 5470bcc1816SSatyam Sharma ret = na->show(nt, buf); 5480bcc1816SSatyam Sharma 5490bcc1816SSatyam Sharma return ret; 5500bcc1816SSatyam Sharma } 5510bcc1816SSatyam Sharma 5520bcc1816SSatyam Sharma static ssize_t netconsole_target_attr_store(struct config_item *item, 5530bcc1816SSatyam Sharma struct configfs_attribute *attr, 5540bcc1816SSatyam Sharma const char *buf, 5550bcc1816SSatyam Sharma size_t count) 5560bcc1816SSatyam Sharma { 5570bcc1816SSatyam Sharma ssize_t ret = -EINVAL; 5580bcc1816SSatyam Sharma struct netconsole_target *nt = to_target(item); 5590bcc1816SSatyam Sharma struct netconsole_target_attr *na = 5600bcc1816SSatyam Sharma container_of(attr, struct netconsole_target_attr, attr); 5610bcc1816SSatyam Sharma 5620bcc1816SSatyam Sharma if (na->store) 5630bcc1816SSatyam Sharma ret = na->store(nt, buf, count); 5640bcc1816SSatyam Sharma 5650bcc1816SSatyam Sharma return ret; 5660bcc1816SSatyam Sharma } 5670bcc1816SSatyam Sharma 5680bcc1816SSatyam Sharma static struct configfs_item_operations netconsole_target_item_ops = { 5690bcc1816SSatyam Sharma .release = netconsole_target_release, 5700bcc1816SSatyam Sharma .show_attribute = netconsole_target_attr_show, 5710bcc1816SSatyam Sharma .store_attribute = netconsole_target_attr_store, 5720bcc1816SSatyam Sharma }; 5730bcc1816SSatyam Sharma 5740bcc1816SSatyam Sharma static struct config_item_type netconsole_target_type = { 5750bcc1816SSatyam Sharma .ct_attrs = netconsole_target_attrs, 5760bcc1816SSatyam Sharma .ct_item_ops = &netconsole_target_item_ops, 5770bcc1816SSatyam Sharma .ct_owner = THIS_MODULE, 5780bcc1816SSatyam Sharma }; 5790bcc1816SSatyam Sharma 5800bcc1816SSatyam Sharma /* 5810bcc1816SSatyam Sharma * Group operations and type for netconsole_subsys. 5820bcc1816SSatyam Sharma */ 5830bcc1816SSatyam Sharma 584f89ab861SJoel Becker static struct config_item *make_netconsole_target(struct config_group *group, 585f89ab861SJoel Becker const char *name) 5860bcc1816SSatyam Sharma { 5870bcc1816SSatyam Sharma unsigned long flags; 5880bcc1816SSatyam Sharma struct netconsole_target *nt; 5890bcc1816SSatyam Sharma 5900bcc1816SSatyam Sharma /* 5910bcc1816SSatyam Sharma * Allocate and initialize with defaults. 5920bcc1816SSatyam Sharma * Target is disabled at creation (enabled == 0). 5930bcc1816SSatyam Sharma */ 5940bcc1816SSatyam Sharma nt = kzalloc(sizeof(*nt), GFP_KERNEL); 5950bcc1816SSatyam Sharma if (!nt) { 5960bcc1816SSatyam Sharma printk(KERN_ERR "netconsole: failed to allocate memory\n"); 597a6795e9eSJoel Becker return ERR_PTR(-ENOMEM); 5980bcc1816SSatyam Sharma } 5990bcc1816SSatyam Sharma 6000bcc1816SSatyam Sharma nt->np.name = "netconsole"; 6010bcc1816SSatyam Sharma strlcpy(nt->np.dev_name, "eth0", IFNAMSIZ); 6020bcc1816SSatyam Sharma nt->np.local_port = 6665; 6030bcc1816SSatyam Sharma nt->np.remote_port = 6666; 6040bcc1816SSatyam Sharma memset(nt->np.remote_mac, 0xff, ETH_ALEN); 6050bcc1816SSatyam Sharma 6060bcc1816SSatyam Sharma /* Initialize the config_item member */ 6070bcc1816SSatyam Sharma config_item_init_type_name(&nt->item, name, &netconsole_target_type); 6080bcc1816SSatyam Sharma 6090bcc1816SSatyam Sharma /* Adding, but it is disabled */ 6100bcc1816SSatyam Sharma spin_lock_irqsave(&target_list_lock, flags); 6110bcc1816SSatyam Sharma list_add(&nt->list, &target_list); 6120bcc1816SSatyam Sharma spin_unlock_irqrestore(&target_list_lock, flags); 6130bcc1816SSatyam Sharma 614f89ab861SJoel Becker return &nt->item; 6150bcc1816SSatyam Sharma } 6160bcc1816SSatyam Sharma 6170bcc1816SSatyam Sharma static void drop_netconsole_target(struct config_group *group, 6180bcc1816SSatyam Sharma struct config_item *item) 6190bcc1816SSatyam Sharma { 6200bcc1816SSatyam Sharma unsigned long flags; 6210bcc1816SSatyam Sharma struct netconsole_target *nt = to_target(item); 6220bcc1816SSatyam Sharma 6230bcc1816SSatyam Sharma spin_lock_irqsave(&target_list_lock, flags); 6240bcc1816SSatyam Sharma list_del(&nt->list); 6250bcc1816SSatyam Sharma spin_unlock_irqrestore(&target_list_lock, flags); 6260bcc1816SSatyam Sharma 6270bcc1816SSatyam Sharma /* 6280bcc1816SSatyam Sharma * The target may have never been enabled, or was manually disabled 6290bcc1816SSatyam Sharma * before being removed so netpoll may have already been cleaned up. 6300bcc1816SSatyam Sharma */ 6310bcc1816SSatyam Sharma if (nt->enabled) 6320bcc1816SSatyam Sharma netpoll_cleanup(&nt->np); 6330bcc1816SSatyam Sharma 6340bcc1816SSatyam Sharma config_item_put(&nt->item); 6350bcc1816SSatyam Sharma } 6360bcc1816SSatyam Sharma 6370bcc1816SSatyam Sharma static struct configfs_group_operations netconsole_subsys_group_ops = { 6380bcc1816SSatyam Sharma .make_item = make_netconsole_target, 6390bcc1816SSatyam Sharma .drop_item = drop_netconsole_target, 6400bcc1816SSatyam Sharma }; 6410bcc1816SSatyam Sharma 6420bcc1816SSatyam Sharma static struct config_item_type netconsole_subsys_type = { 6430bcc1816SSatyam Sharma .ct_group_ops = &netconsole_subsys_group_ops, 6440bcc1816SSatyam Sharma .ct_owner = THIS_MODULE, 6450bcc1816SSatyam Sharma }; 6460bcc1816SSatyam Sharma 6470bcc1816SSatyam Sharma /* The netconsole configfs subsystem */ 6480bcc1816SSatyam Sharma static struct configfs_subsystem netconsole_subsys = { 6490bcc1816SSatyam Sharma .su_group = { 6500bcc1816SSatyam Sharma .cg_item = { 6510bcc1816SSatyam Sharma .ci_namebuf = "netconsole", 6520bcc1816SSatyam Sharma .ci_type = &netconsole_subsys_type, 6530bcc1816SSatyam Sharma }, 6540bcc1816SSatyam Sharma }, 6550bcc1816SSatyam Sharma }; 6560bcc1816SSatyam Sharma 6570bcc1816SSatyam Sharma #endif /* CONFIG_NETCONSOLE_DYNAMIC */ 6580bcc1816SSatyam Sharma 65917951f34SSatyam Sharma /* Handle network interface device notifications */ 66017951f34SSatyam Sharma static int netconsole_netdev_event(struct notifier_block *this, 66117951f34SSatyam Sharma unsigned long event, 66217951f34SSatyam Sharma void *ptr) 66317951f34SSatyam Sharma { 664b5427c27SSatyam Sharma unsigned long flags; 665b5427c27SSatyam Sharma struct netconsole_target *nt; 66617951f34SSatyam Sharma struct net_device *dev = ptr; 667141dfba3SFerenc Wagner bool stopped = false; 66817951f34SSatyam Sharma 6690e34e931SWANG Cong if (!(event == NETDEV_CHANGENAME || event == NETDEV_UNREGISTER || 6700e34e931SWANG Cong event == NETDEV_BONDING_DESLAVE || event == NETDEV_GOING_DOWN)) 671b5427c27SSatyam Sharma goto done; 672b5427c27SSatyam Sharma 673b5427c27SSatyam Sharma spin_lock_irqsave(&target_list_lock, flags); 67413f172ffSNeil Horman restart: 675b5427c27SSatyam Sharma list_for_each_entry(nt, &target_list, list) { 6760bcc1816SSatyam Sharma netconsole_target_get(nt); 67717951f34SSatyam Sharma if (nt->np.dev == dev) { 67817951f34SSatyam Sharma switch (event) { 67917951f34SSatyam Sharma case NETDEV_CHANGENAME: 68017951f34SSatyam Sharma strlcpy(nt->np.dev_name, dev->name, IFNAMSIZ); 68117951f34SSatyam Sharma break; 6822382b15bSBruno Prémont case NETDEV_UNREGISTER: 6833b410a31SNeil Horman /* 6843b410a31SNeil Horman * rtnl_lock already held 6853b410a31SNeil Horman */ 6863b410a31SNeil Horman if (nt->np.dev) { 68713f172ffSNeil Horman spin_unlock_irqrestore( 68813f172ffSNeil Horman &target_list_lock, 68913f172ffSNeil Horman flags); 6903b410a31SNeil Horman __netpoll_cleanup(&nt->np); 69113f172ffSNeil Horman spin_lock_irqsave(&target_list_lock, 69213f172ffSNeil Horman flags); 6933b410a31SNeil Horman dev_put(nt->np.dev); 6943b410a31SNeil Horman nt->np.dev = NULL; 69513f172ffSNeil Horman netconsole_target_put(nt); 69613f172ffSNeil Horman goto restart; 6973b410a31SNeil Horman } 6980e34e931SWANG Cong /* Fall through */ 6990e34e931SWANG Cong case NETDEV_GOING_DOWN: 7000e34e931SWANG Cong case NETDEV_BONDING_DESLAVE: 7012382b15bSBruno Prémont nt->enabled = 0; 702141dfba3SFerenc Wagner stopped = true; 7032382b15bSBruno Prémont break; 70417951f34SSatyam Sharma } 70517951f34SSatyam Sharma } 7060bcc1816SSatyam Sharma netconsole_target_put(nt); 707b5427c27SSatyam Sharma } 708b5427c27SSatyam Sharma spin_unlock_irqrestore(&target_list_lock, flags); 709141dfba3SFerenc Wagner if (stopped && (event == NETDEV_UNREGISTER || event == NETDEV_BONDING_DESLAVE)) 71038cfb907SFerenc Wagner printk(KERN_INFO "netconsole: network logging stopped on " 71138cfb907SFerenc Wagner "interface %s as it %s\n", dev->name, 7120e34e931SWANG Cong event == NETDEV_UNREGISTER ? "unregistered" : "released slaves"); 71317951f34SSatyam Sharma 714b5427c27SSatyam Sharma done: 71517951f34SSatyam Sharma return NOTIFY_DONE; 71617951f34SSatyam Sharma } 71717951f34SSatyam Sharma 71817951f34SSatyam Sharma static struct notifier_block netconsole_netdev_notifier = { 71917951f34SSatyam Sharma .notifier_call = netconsole_netdev_event, 72017951f34SSatyam Sharma }; 72117951f34SSatyam Sharma 7221da177e4SLinus Torvalds static void write_msg(struct console *con, const char *msg, unsigned int len) 7231da177e4SLinus Torvalds { 7241da177e4SLinus Torvalds int frag, left; 7251da177e4SLinus Torvalds unsigned long flags; 726b5427c27SSatyam Sharma struct netconsole_target *nt; 727b5427c27SSatyam Sharma const char *tmp; 7281da177e4SLinus Torvalds 729b5427c27SSatyam Sharma /* Avoid taking lock and disabling interrupts unnecessarily */ 730b5427c27SSatyam Sharma if (list_empty(&target_list)) 731b5427c27SSatyam Sharma return; 732b5427c27SSatyam Sharma 733b5427c27SSatyam Sharma spin_lock_irqsave(&target_list_lock, flags); 734b5427c27SSatyam Sharma list_for_each_entry(nt, &target_list, list) { 7350bcc1816SSatyam Sharma netconsole_target_get(nt); 7360bcc1816SSatyam Sharma if (nt->enabled && netif_running(nt->np.dev)) { 737b5427c27SSatyam Sharma /* 738b5427c27SSatyam Sharma * We nest this inside the for-each-target loop above 739b5427c27SSatyam Sharma * so that we're able to get as much logging out to 740b5427c27SSatyam Sharma * at least one target if we die inside here, instead 741b5427c27SSatyam Sharma * of unnecessarily keeping all targets in lock-step. 742b5427c27SSatyam Sharma */ 743b5427c27SSatyam Sharma tmp = msg; 7441da177e4SLinus Torvalds for (left = len; left;) { 7451da177e4SLinus Torvalds frag = min(left, MAX_PRINT_CHUNK); 746b5427c27SSatyam Sharma netpoll_send_udp(&nt->np, tmp, frag); 747b5427c27SSatyam Sharma tmp += frag; 7481da177e4SLinus Torvalds left -= frag; 7491da177e4SLinus Torvalds } 7501da177e4SLinus Torvalds } 7510bcc1816SSatyam Sharma netconsole_target_put(nt); 7520cc120beSSatyam Sharma } 753b5427c27SSatyam Sharma spin_unlock_irqrestore(&target_list_lock, flags); 754b5427c27SSatyam Sharma } 7551da177e4SLinus Torvalds 7561da177e4SLinus Torvalds static struct console netconsole = { 757d938ab44SRandy Dunlap .name = "netcon", 7580517deedSMichael Ellerman .flags = CON_ENABLED, 759d39badf0SSatyam Sharma .write = write_msg, 7601da177e4SLinus Torvalds }; 7611da177e4SLinus Torvalds 762d39badf0SSatyam Sharma static int __init init_netconsole(void) 7631da177e4SLinus Torvalds { 7640bcc1816SSatyam Sharma int err; 765b5427c27SSatyam Sharma struct netconsole_target *nt, *tmp; 766b5427c27SSatyam Sharma unsigned long flags; 767b5427c27SSatyam Sharma char *target_config; 768b5427c27SSatyam Sharma char *input = config; 769b41848b6SStephen Hemminger 7700bcc1816SSatyam Sharma if (strnlen(input, MAX_PARAM_LENGTH)) { 771b5427c27SSatyam Sharma while ((target_config = strsep(&input, ";"))) { 7720bcc1816SSatyam Sharma nt = alloc_param_target(target_config); 773b5427c27SSatyam Sharma if (IS_ERR(nt)) { 774b5427c27SSatyam Sharma err = PTR_ERR(nt); 775b5427c27SSatyam Sharma goto fail; 776b5427c27SSatyam Sharma } 7770517deedSMichael Ellerman /* Dump existing printks when we register */ 7780517deedSMichael Ellerman netconsole.flags |= CON_PRINTBUFFER; 7790517deedSMichael Ellerman 780b5427c27SSatyam Sharma spin_lock_irqsave(&target_list_lock, flags); 781b5427c27SSatyam Sharma list_add(&nt->list, &target_list); 782b5427c27SSatyam Sharma spin_unlock_irqrestore(&target_list_lock, flags); 783b5427c27SSatyam Sharma } 7840bcc1816SSatyam Sharma } 7851da177e4SLinus Torvalds 78617951f34SSatyam Sharma err = register_netdevice_notifier(&netconsole_netdev_notifier); 78717951f34SSatyam Sharma if (err) 788b5427c27SSatyam Sharma goto fail; 78917951f34SSatyam Sharma 7900bcc1816SSatyam Sharma err = dynamic_netconsole_init(); 7910bcc1816SSatyam Sharma if (err) 7920bcc1816SSatyam Sharma goto undonotifier; 7930bcc1816SSatyam Sharma 7941da177e4SLinus Torvalds register_console(&netconsole); 7951da177e4SLinus Torvalds printk(KERN_INFO "netconsole: network logging started\n"); 796d39badf0SSatyam Sharma 797d39badf0SSatyam Sharma return err; 798b5427c27SSatyam Sharma 7990bcc1816SSatyam Sharma undonotifier: 8000bcc1816SSatyam Sharma unregister_netdevice_notifier(&netconsole_netdev_notifier); 8010bcc1816SSatyam Sharma 802b5427c27SSatyam Sharma fail: 803b5427c27SSatyam Sharma printk(KERN_ERR "netconsole: cleaning up\n"); 804b5427c27SSatyam Sharma 805b5427c27SSatyam Sharma /* 8060bcc1816SSatyam Sharma * Remove all targets and destroy them (only targets created 8070bcc1816SSatyam Sharma * from the boot/module option exist here). Skipping the list 808b5427c27SSatyam Sharma * lock is safe here, and netpoll_cleanup() will sleep. 809b5427c27SSatyam Sharma */ 810b5427c27SSatyam Sharma list_for_each_entry_safe(nt, tmp, &target_list, list) { 811b5427c27SSatyam Sharma list_del(&nt->list); 8120bcc1816SSatyam Sharma free_param_target(nt); 813b5427c27SSatyam Sharma } 814b5427c27SSatyam Sharma 815b5427c27SSatyam Sharma return err; 8161da177e4SLinus Torvalds } 8171da177e4SLinus Torvalds 818d39badf0SSatyam Sharma static void __exit cleanup_netconsole(void) 8191da177e4SLinus Torvalds { 820b5427c27SSatyam Sharma struct netconsole_target *nt, *tmp; 821df180e36SSatyam Sharma 8221da177e4SLinus Torvalds unregister_console(&netconsole); 8230bcc1816SSatyam Sharma dynamic_netconsole_exit(); 82417951f34SSatyam Sharma unregister_netdevice_notifier(&netconsole_netdev_notifier); 825b5427c27SSatyam Sharma 826b5427c27SSatyam Sharma /* 8270bcc1816SSatyam Sharma * Targets created via configfs pin references on our module 8280bcc1816SSatyam Sharma * and would first be rmdir(2)'ed from userspace. We reach 8290bcc1816SSatyam Sharma * here only when they are already destroyed, and only those 8300bcc1816SSatyam Sharma * created from the boot/module option are left, so remove and 8310bcc1816SSatyam Sharma * destroy them. Skipping the list lock is safe here, and 8320bcc1816SSatyam Sharma * netpoll_cleanup() will sleep. 833b5427c27SSatyam Sharma */ 834b5427c27SSatyam Sharma list_for_each_entry_safe(nt, tmp, &target_list, list) { 835b5427c27SSatyam Sharma list_del(&nt->list); 8360bcc1816SSatyam Sharma free_param_target(nt); 837b5427c27SSatyam Sharma } 8381da177e4SLinus Torvalds } 8391da177e4SLinus Torvalds 8401da177e4SLinus Torvalds module_init(init_netconsole); 8411da177e4SLinus Torvalds module_exit(cleanup_netconsole); 842