aboutsummaryrefslogtreecommitdiffstats
path: root/net/core
diff options
context:
space:
mode:
authorSatyam Sharma <satyam@infradead.org>2007-08-10 18:35:05 -0400
committerDavid S. Miller <davem@sunset.davemloft.net>2007-10-10 19:48:06 -0400
commit0bcc1816188e570bde1d56a208996660f2633ae0 (patch)
tree8104c0b0c54a93a510b4b9b50a45cbaabad245f4 /net/core
parentb5427c27173e128dda1541bd9d3b05df79af5882 (diff)
[NET] netconsole: Support dynamic reconfiguration using configfs
Based upon initial work by Keiichi Kii <k-keiichi@bx.jp.nec.com>. This patch introduces support for dynamic reconfiguration (adding, removing and/or modifying parameters of netconsole targets at runtime) using a userspace interface exported via configfs. Documentation is also updated accordingly. Issues and brief design overview: (1) Kernel-initiated creation / destruction of kernel objects is not possible with configfs -- the lifetimes of the "config items" is managed exclusively from userspace. But netconsole must support boot/module params too, and these are parsed in kernel and hence netpolls must be setup from the kernel. Joel Becker suggested to separately manage the lifetimes of the two kinds of netconsole_target objects -- those created via configfs mkdir(2) from userspace and those specified from the boot/module option string. This adds complexity and some redundancy here and also means that boot/module param-created targets are not exposed through the configfs namespace (and hence cannot be updated / destroyed dynamically). However, this saves us from locking / refcounting complexities that would need to be introduced in configfs to support kernel-initiated item creation / destroy there. (2) In configfs, item creation takes place in the call chain of the mkdir(2) syscall in the driver subsystem. If we used an ioctl(2) to create / destroy objects from userspace, the special userspace program is able to fill out the structure to be passed into the ioctl and hence specify attributes such as local interface that are required at the time we set up the netpoll. For configfs, this information is not available at the time of mkdir(2). So, we keep all newly-created targets (via configfs) disabled by default. The user is expected to set various attributes appropriately (including the local network interface if required) and then write(2) "1" to the "enabled" attribute. Thus, netpoll_setup() is then called on the set parameters in the context of _this_ write(2) on the "enabled" attribute itself. This design enables the user to reconfigure existing netconsole targets at runtime to be attached to newly-come-up interfaces that may not have existed when netconsole was loaded or when the targets were actually created. All this effectively enables us to get rid of custom ioctls. (3) Ultra-paranoid configfs attribute show() and store() operations, with sanity and input range checking, using only safe string primitives, and compliant with the recommendations in Documentation/filesystems/sysfs.txt. (4) A new function netpoll_print_options() is created in the netpoll API, that just prints out the configured parameters for a netpoll structure. netpoll_parse_options() is modified to use that and it is also exported to be used from netconsole. Signed-off-by: Satyam Sharma <satyam@infradead.org> Acked-by: Keiichi Kii <k-keiichi@bx.jp.nec.com> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/core')
-rw-r--r--net/core/netpoll.c44
1 files changed, 25 insertions, 19 deletions
diff --git a/net/core/netpoll.c b/net/core/netpoll.c
index abe6e3a4cc44..0952f936b292 100644
--- a/net/core/netpoll.c
+++ b/net/core/netpoll.c
@@ -532,6 +532,29 @@ out:
532 return 0; 532 return 0;
533} 533}
534 534
535void netpoll_print_options(struct netpoll *np)
536{
537 printk(KERN_INFO "%s: local port %d\n",
538 np->name, np->local_port);
539 printk(KERN_INFO "%s: local IP %d.%d.%d.%d\n",
540 np->name, HIPQUAD(np->local_ip));
541 printk(KERN_INFO "%s: interface %s\n",
542 np->name, np->dev_name);
543 printk(KERN_INFO "%s: remote port %d\n",
544 np->name, np->remote_port);
545 printk(KERN_INFO "%s: remote IP %d.%d.%d.%d\n",
546 np->name, HIPQUAD(np->remote_ip));
547 printk(KERN_INFO "%s: remote ethernet address "
548 "%02x:%02x:%02x:%02x:%02x:%02x\n",
549 np->name,
550 np->remote_mac[0],
551 np->remote_mac[1],
552 np->remote_mac[2],
553 np->remote_mac[3],
554 np->remote_mac[4],
555 np->remote_mac[5]);
556}
557
535int netpoll_parse_options(struct netpoll *np, char *opt) 558int netpoll_parse_options(struct netpoll *np, char *opt)
536{ 559{
537 char *cur=opt, *delim; 560 char *cur=opt, *delim;
@@ -544,7 +567,6 @@ int netpoll_parse_options(struct netpoll *np, char *opt)
544 cur = delim; 567 cur = delim;
545 } 568 }
546 cur++; 569 cur++;
547 printk(KERN_INFO "%s: local port %d\n", np->name, np->local_port);
548 570
549 if (*cur != '/') { 571 if (*cur != '/') {
550 if ((delim = strchr(cur, '/')) == NULL) 572 if ((delim = strchr(cur, '/')) == NULL)
@@ -552,9 +574,6 @@ int netpoll_parse_options(struct netpoll *np, char *opt)
552 *delim = 0; 574 *delim = 0;
553 np->local_ip = ntohl(in_aton(cur)); 575 np->local_ip = ntohl(in_aton(cur));
554 cur = delim; 576 cur = delim;
555
556 printk(KERN_INFO "%s: local IP %d.%d.%d.%d\n",
557 np->name, HIPQUAD(np->local_ip));
558 } 577 }
559 cur++; 578 cur++;
560 579
@@ -568,8 +587,6 @@ int netpoll_parse_options(struct netpoll *np, char *opt)
568 } 587 }
569 cur++; 588 cur++;
570 589
571 printk(KERN_INFO "%s: interface %s\n", np->name, np->dev_name);
572
573 if (*cur != '@') { 590 if (*cur != '@') {
574 /* dst port */ 591 /* dst port */
575 if ((delim = strchr(cur, '@')) == NULL) 592 if ((delim = strchr(cur, '@')) == NULL)
@@ -579,7 +596,6 @@ int netpoll_parse_options(struct netpoll *np, char *opt)
579 cur = delim; 596 cur = delim;
580 } 597 }
581 cur++; 598 cur++;
582 printk(KERN_INFO "%s: remote port %d\n", np->name, np->remote_port);
583 599
584 /* dst ip */ 600 /* dst ip */
585 if ((delim = strchr(cur, '/')) == NULL) 601 if ((delim = strchr(cur, '/')) == NULL)
@@ -588,9 +604,6 @@ int netpoll_parse_options(struct netpoll *np, char *opt)
588 np->remote_ip = ntohl(in_aton(cur)); 604 np->remote_ip = ntohl(in_aton(cur));
589 cur = delim + 1; 605 cur = delim + 1;
590 606
591 printk(KERN_INFO "%s: remote IP %d.%d.%d.%d\n",
592 np->name, HIPQUAD(np->remote_ip));
593
594 if (*cur != 0) { 607 if (*cur != 0) {
595 /* MAC address */ 608 /* MAC address */
596 if ((delim = strchr(cur, ':')) == NULL) 609 if ((delim = strchr(cur, ':')) == NULL)
@@ -621,15 +634,7 @@ int netpoll_parse_options(struct netpoll *np, char *opt)
621 np->remote_mac[5] = simple_strtol(cur, NULL, 16); 634 np->remote_mac[5] = simple_strtol(cur, NULL, 16);
622 } 635 }
623 636
624 printk(KERN_INFO "%s: remote ethernet address " 637 netpoll_print_options(np);
625 "%02x:%02x:%02x:%02x:%02x:%02x\n",
626 np->name,
627 np->remote_mac[0],
628 np->remote_mac[1],
629 np->remote_mac[2],
630 np->remote_mac[3],
631 np->remote_mac[4],
632 np->remote_mac[5]);
633 638
634 return 0; 639 return 0;
635 640
@@ -831,6 +836,7 @@ void netpoll_set_trap(int trap)
831 836
832EXPORT_SYMBOL(netpoll_set_trap); 837EXPORT_SYMBOL(netpoll_set_trap);
833EXPORT_SYMBOL(netpoll_trap); 838EXPORT_SYMBOL(netpoll_trap);
839EXPORT_SYMBOL(netpoll_print_options);
834EXPORT_SYMBOL(netpoll_parse_options); 840EXPORT_SYMBOL(netpoll_parse_options);
835EXPORT_SYMBOL(netpoll_setup); 841EXPORT_SYMBOL(netpoll_setup);
836EXPORT_SYMBOL(netpoll_cleanup); 842EXPORT_SYMBOL(netpoll_cleanup);