]>
Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * Common framework for low-level network console, dump, and debugger code | |
3 | * | |
4 | * Sep 8 2003 Matt Mackall <mpm@selenic.com> | |
5 | * | |
6 | * based on the netconsole code from: | |
7 | * | |
8 | * Copyright (C) 2001 Ingo Molnar <mingo@redhat.com> | |
9 | * Copyright (C) 2002 Red Hat, Inc. | |
10 | */ | |
11 | ||
e6ec2693 JP |
12 | #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt |
13 | ||
bff38771 | 14 | #include <linux/moduleparam.h> |
1da177e4 LT |
15 | #include <linux/netdevice.h> |
16 | #include <linux/etherdevice.h> | |
17 | #include <linux/string.h> | |
14c85021 | 18 | #include <linux/if_arp.h> |
1da177e4 LT |
19 | #include <linux/inetdevice.h> |
20 | #include <linux/inet.h> | |
21 | #include <linux/interrupt.h> | |
22 | #include <linux/netpoll.h> | |
23 | #include <linux/sched.h> | |
24 | #include <linux/delay.h> | |
25 | #include <linux/rcupdate.h> | |
26 | #include <linux/workqueue.h> | |
5a0e3ad6 | 27 | #include <linux/slab.h> |
bc3b2d7f | 28 | #include <linux/export.h> |
689971b4 | 29 | #include <linux/if_vlan.h> |
1da177e4 LT |
30 | #include <net/tcp.h> |
31 | #include <net/udp.h> | |
32 | #include <asm/unaligned.h> | |
9cbc1cb8 | 33 | #include <trace/events/napi.h> |
1da177e4 LT |
34 | |
35 | /* | |
36 | * We maintain a small pool of fully-sized skbs, to make sure the | |
37 | * message gets out even in extreme OOM situations. | |
38 | */ | |
39 | ||
40 | #define MAX_UDP_CHUNK 1460 | |
41 | #define MAX_SKBS 32 | |
1da177e4 | 42 | |
a1bcfacd | 43 | static struct sk_buff_head skb_pool; |
1da177e4 LT |
44 | |
45 | static atomic_t trapped; | |
46 | ||
2bdfe0ba | 47 | #define USEC_PER_POLL 50 |
d9452e9f DM |
48 | #define NETPOLL_RX_ENABLED 1 |
49 | #define NETPOLL_RX_DROP 2 | |
1da177e4 | 50 | |
6f706245 JP |
51 | #define MAX_SKB_SIZE \ |
52 | (sizeof(struct ethhdr) + \ | |
53 | sizeof(struct iphdr) + \ | |
54 | sizeof(struct udphdr) + \ | |
55 | MAX_UDP_CHUNK) | |
1da177e4 | 56 | |
3578b0c8 | 57 | static void zap_completion_queue(void); |
b7394d24 | 58 | static void netpoll_neigh_reply(struct sk_buff *skb, struct netpoll_info *npinfo); |
1da177e4 | 59 | |
bff38771 AV |
60 | static unsigned int carrier_timeout = 4; |
61 | module_param(carrier_timeout, uint, 0644); | |
62 | ||
e6ec2693 JP |
63 | #define np_info(np, fmt, ...) \ |
64 | pr_info("%s: " fmt, np->name, ##__VA_ARGS__) | |
65 | #define np_err(np, fmt, ...) \ | |
66 | pr_err("%s: " fmt, np->name, ##__VA_ARGS__) | |
67 | #define np_notice(np, fmt, ...) \ | |
68 | pr_notice("%s: " fmt, np->name, ##__VA_ARGS__) | |
69 | ||
c4028958 | 70 | static void queue_process(struct work_struct *work) |
1da177e4 | 71 | { |
4c1ac1b4 DH |
72 | struct netpoll_info *npinfo = |
73 | container_of(work, struct netpoll_info, tx_work.work); | |
1da177e4 | 74 | struct sk_buff *skb; |
3640543d | 75 | unsigned long flags; |
1da177e4 | 76 | |
6c43ff18 SH |
77 | while ((skb = skb_dequeue(&npinfo->txq))) { |
78 | struct net_device *dev = skb->dev; | |
00829823 | 79 | const struct net_device_ops *ops = dev->netdev_ops; |
fd2ea0a7 | 80 | struct netdev_queue *txq; |
1da177e4 | 81 | |
6c43ff18 SH |
82 | if (!netif_device_present(dev) || !netif_running(dev)) { |
83 | __kfree_skb(skb); | |
84 | continue; | |
85 | } | |
1da177e4 | 86 | |
fd2ea0a7 DM |
87 | txq = netdev_get_tx_queue(dev, skb_get_queue_mapping(skb)); |
88 | ||
3640543d | 89 | local_irq_save(flags); |
fd2ea0a7 | 90 | __netif_tx_lock(txq, smp_processor_id()); |
73466498 | 91 | if (netif_xmit_frozen_or_stopped(txq) || |
00829823 | 92 | ops->ndo_start_xmit(skb, dev) != NETDEV_TX_OK) { |
6c43ff18 | 93 | skb_queue_head(&npinfo->txq, skb); |
fd2ea0a7 | 94 | __netif_tx_unlock(txq); |
3640543d | 95 | local_irq_restore(flags); |
1da177e4 | 96 | |
25442caf | 97 | schedule_delayed_work(&npinfo->tx_work, HZ/10); |
6c43ff18 SH |
98 | return; |
99 | } | |
fd2ea0a7 | 100 | __netif_tx_unlock(txq); |
3640543d | 101 | local_irq_restore(flags); |
1da177e4 | 102 | } |
1da177e4 LT |
103 | } |
104 | ||
b51655b9 AV |
105 | static __sum16 checksum_udp(struct sk_buff *skb, struct udphdr *uh, |
106 | unsigned short ulen, __be32 saddr, __be32 daddr) | |
1da177e4 | 107 | { |
d6f5493c | 108 | __wsum psum; |
fb286bb2 | 109 | |
60476372 | 110 | if (uh->check == 0 || skb_csum_unnecessary(skb)) |
1da177e4 LT |
111 | return 0; |
112 | ||
fb286bb2 HX |
113 | psum = csum_tcpudp_nofold(saddr, daddr, ulen, IPPROTO_UDP, 0); |
114 | ||
84fa7933 | 115 | if (skb->ip_summed == CHECKSUM_COMPLETE && |
d3bc23e7 | 116 | !csum_fold(csum_add(psum, skb->csum))) |
fb286bb2 | 117 | return 0; |
1da177e4 | 118 | |
fb286bb2 | 119 | skb->csum = psum; |
1da177e4 | 120 | |
fb286bb2 | 121 | return __skb_checksum_complete(skb); |
1da177e4 LT |
122 | } |
123 | ||
124 | /* | |
125 | * Check whether delayed processing was scheduled for our NIC. If so, | |
126 | * we attempt to grab the poll lock and use ->poll() to pump the card. | |
127 | * If this fails, either we've recursed in ->poll() or it's already | |
128 | * running on another CPU. | |
129 | * | |
130 | * Note: we don't mask interrupts with this lock because we're using | |
131 | * trylock here and interrupts are already disabled in the softirq | |
132 | * case. Further, we test the poll_owner to avoid recursion on UP | |
133 | * systems where the lock doesn't exist. | |
134 | * | |
135 | * In cases where there is bi-directional communications, reading only | |
136 | * one message at a time can lead to packets being dropped by the | |
137 | * network adapter, forcing superfluous retries and possibly timeouts. | |
138 | * Thus, we set our budget to greater than 1. | |
139 | */ | |
0a7606c1 DM |
140 | static int poll_one_napi(struct netpoll_info *npinfo, |
141 | struct napi_struct *napi, int budget) | |
142 | { | |
143 | int work; | |
144 | ||
145 | /* net_rx_action's ->poll() invocations and our's are | |
146 | * synchronized by this test which is only made while | |
147 | * holding the napi->poll_lock. | |
148 | */ | |
149 | if (!test_bit(NAPI_STATE_SCHED, &napi->state)) | |
150 | return budget; | |
151 | ||
d9452e9f | 152 | npinfo->rx_flags |= NETPOLL_RX_DROP; |
0a7606c1 | 153 | atomic_inc(&trapped); |
7b363e44 | 154 | set_bit(NAPI_STATE_NPSVC, &napi->state); |
0a7606c1 DM |
155 | |
156 | work = napi->poll(napi, budget); | |
7d18f114 | 157 | trace_napi_poll(napi); |
0a7606c1 | 158 | |
7b363e44 | 159 | clear_bit(NAPI_STATE_NPSVC, &napi->state); |
0a7606c1 | 160 | atomic_dec(&trapped); |
d9452e9f | 161 | npinfo->rx_flags &= ~NETPOLL_RX_DROP; |
0a7606c1 DM |
162 | |
163 | return budget - work; | |
164 | } | |
165 | ||
5106930b | 166 | static void poll_napi(struct net_device *dev) |
1da177e4 | 167 | { |
bea3348e | 168 | struct napi_struct *napi; |
1da177e4 LT |
169 | int budget = 16; |
170 | ||
f13d493d | 171 | list_for_each_entry(napi, &dev->napi_list, dev_list) { |
0a7606c1 | 172 | if (napi->poll_owner != smp_processor_id() && |
bea3348e | 173 | spin_trylock(&napi->poll_lock)) { |
2899656b AW |
174 | budget = poll_one_napi(rcu_dereference_bh(dev->npinfo), |
175 | napi, budget); | |
bea3348e | 176 | spin_unlock(&napi->poll_lock); |
0a7606c1 | 177 | |
072a9c48 | 178 | if (!budget) |
0a7606c1 | 179 | break; |
bea3348e | 180 | } |
1da177e4 LT |
181 | } |
182 | } | |
183 | ||
b7394d24 | 184 | static void service_neigh_queue(struct netpoll_info *npi) |
068c6e98 | 185 | { |
5106930b SH |
186 | if (npi) { |
187 | struct sk_buff *skb; | |
068c6e98 | 188 | |
b7394d24 CW |
189 | while ((skb = skb_dequeue(&npi->neigh_tx))) |
190 | netpoll_neigh_reply(skb, npi); | |
068c6e98 | 191 | } |
068c6e98 NH |
192 | } |
193 | ||
234b921d | 194 | static void netpoll_poll_dev(struct net_device *dev) |
1da177e4 | 195 | { |
5e392739 | 196 | const struct net_device_ops *ops; |
2899656b | 197 | struct netpoll_info *ni = rcu_dereference_bh(dev->npinfo); |
5106930b | 198 | |
5e392739 PE |
199 | if (!dev || !netif_running(dev)) |
200 | return; | |
201 | ||
202 | ops = dev->netdev_ops; | |
203 | if (!ops->ndo_poll_controller) | |
1da177e4 LT |
204 | return; |
205 | ||
206 | /* Process pending work on NIC */ | |
d314774c | 207 | ops->ndo_poll_controller(dev); |
5106930b SH |
208 | |
209 | poll_napi(dev); | |
1da177e4 | 210 | |
58e05f35 | 211 | if (dev->flags & IFF_SLAVE) { |
2899656b | 212 | if (ni) { |
49bd8fb0 | 213 | struct net_device *bond_dev; |
5a698af5 | 214 | struct sk_buff *skb; |
49bd8fb0 JP |
215 | struct netpoll_info *bond_ni; |
216 | ||
217 | bond_dev = netdev_master_upper_dev_get_rcu(dev); | |
218 | bond_ni = rcu_dereference_bh(bond_dev->npinfo); | |
b7394d24 | 219 | while ((skb = skb_dequeue(&ni->neigh_tx))) { |
5a698af5 | 220 | skb->dev = bond_dev; |
b7394d24 | 221 | skb_queue_tail(&bond_ni->neigh_tx, skb); |
5a698af5 AW |
222 | } |
223 | } | |
224 | } | |
225 | ||
b7394d24 | 226 | service_neigh_queue(ni); |
068c6e98 | 227 | |
3578b0c8 | 228 | zap_completion_queue(); |
1da177e4 LT |
229 | } |
230 | ||
231 | static void refill_skbs(void) | |
232 | { | |
233 | struct sk_buff *skb; | |
234 | unsigned long flags; | |
235 | ||
a1bcfacd SH |
236 | spin_lock_irqsave(&skb_pool.lock, flags); |
237 | while (skb_pool.qlen < MAX_SKBS) { | |
1da177e4 LT |
238 | skb = alloc_skb(MAX_SKB_SIZE, GFP_ATOMIC); |
239 | if (!skb) | |
240 | break; | |
241 | ||
a1bcfacd | 242 | __skb_queue_tail(&skb_pool, skb); |
1da177e4 | 243 | } |
a1bcfacd | 244 | spin_unlock_irqrestore(&skb_pool.lock, flags); |
1da177e4 LT |
245 | } |
246 | ||
3578b0c8 DM |
247 | static void zap_completion_queue(void) |
248 | { | |
249 | unsigned long flags; | |
250 | struct softnet_data *sd = &get_cpu_var(softnet_data); | |
251 | ||
252 | if (sd->completion_queue) { | |
253 | struct sk_buff *clist; | |
254 | ||
255 | local_irq_save(flags); | |
256 | clist = sd->completion_queue; | |
257 | sd->completion_queue = NULL; | |
258 | local_irq_restore(flags); | |
259 | ||
260 | while (clist != NULL) { | |
261 | struct sk_buff *skb = clist; | |
262 | clist = clist->next; | |
263 | if (skb->destructor) { | |
264 | atomic_inc(&skb->users); | |
265 | dev_kfree_skb_any(skb); /* put this one back */ | |
266 | } else { | |
267 | __kfree_skb(skb); | |
268 | } | |
269 | } | |
270 | } | |
271 | ||
272 | put_cpu_var(softnet_data); | |
273 | } | |
274 | ||
a1bcfacd | 275 | static struct sk_buff *find_skb(struct netpoll *np, int len, int reserve) |
1da177e4 | 276 | { |
a1bcfacd SH |
277 | int count = 0; |
278 | struct sk_buff *skb; | |
1da177e4 | 279 | |
3578b0c8 | 280 | zap_completion_queue(); |
a1bcfacd | 281 | refill_skbs(); |
1da177e4 | 282 | repeat: |
1da177e4 LT |
283 | |
284 | skb = alloc_skb(len, GFP_ATOMIC); | |
a1bcfacd SH |
285 | if (!skb) |
286 | skb = skb_dequeue(&skb_pool); | |
1da177e4 LT |
287 | |
288 | if (!skb) { | |
a1bcfacd | 289 | if (++count < 10) { |
2a49e001 | 290 | netpoll_poll_dev(np->dev); |
a1bcfacd | 291 | goto repeat; |
1da177e4 | 292 | } |
a1bcfacd | 293 | return NULL; |
1da177e4 LT |
294 | } |
295 | ||
296 | atomic_set(&skb->users, 1); | |
297 | skb_reserve(skb, reserve); | |
298 | return skb; | |
299 | } | |
300 | ||
bea3348e SH |
301 | static int netpoll_owner_active(struct net_device *dev) |
302 | { | |
303 | struct napi_struct *napi; | |
304 | ||
305 | list_for_each_entry(napi, &dev->napi_list, dev_list) { | |
306 | if (napi->poll_owner == smp_processor_id()) | |
307 | return 1; | |
308 | } | |
309 | return 0; | |
310 | } | |
311 | ||
2899656b | 312 | /* call with IRQ disabled */ |
c2355e1a NH |
313 | void netpoll_send_skb_on_dev(struct netpoll *np, struct sk_buff *skb, |
314 | struct net_device *dev) | |
1da177e4 | 315 | { |
2bdfe0ba SH |
316 | int status = NETDEV_TX_BUSY; |
317 | unsigned long tries; | |
00829823 | 318 | const struct net_device_ops *ops = dev->netdev_ops; |
de85d99e | 319 | /* It is up to the caller to keep npinfo alive. */ |
2899656b | 320 | struct netpoll_info *npinfo; |
2bdfe0ba | 321 | |
2899656b AW |
322 | WARN_ON_ONCE(!irqs_disabled()); |
323 | ||
324 | npinfo = rcu_dereference_bh(np->dev->npinfo); | |
4ec93edb YH |
325 | if (!npinfo || !netif_running(dev) || !netif_device_present(dev)) { |
326 | __kfree_skb(skb); | |
327 | return; | |
328 | } | |
2bdfe0ba SH |
329 | |
330 | /* don't get messages out of order, and no recursion */ | |
bea3348e | 331 | if (skb_queue_len(&npinfo->txq) == 0 && !netpoll_owner_active(dev)) { |
fd2ea0a7 | 332 | struct netdev_queue *txq; |
a49f99ff | 333 | |
8c4c49df | 334 | txq = netdev_pick_tx(dev, skb); |
fd2ea0a7 | 335 | |
0db3dc73 SH |
336 | /* try until next clock tick */ |
337 | for (tries = jiffies_to_usecs(1)/USEC_PER_POLL; | |
338 | tries > 0; --tries) { | |
fd2ea0a7 | 339 | if (__netif_tx_trylock(txq)) { |
73466498 | 340 | if (!netif_xmit_stopped(txq)) { |
689971b4 AW |
341 | if (vlan_tx_tag_present(skb) && |
342 | !(netif_skb_features(skb) & NETIF_F_HW_VLAN_TX)) { | |
343 | skb = __vlan_put_tag(skb, vlan_tx_tag_get(skb)); | |
344 | if (unlikely(!skb)) | |
345 | break; | |
346 | skb->vlan_tci = 0; | |
347 | } | |
348 | ||
00829823 | 349 | status = ops->ndo_start_xmit(skb, dev); |
08baf561 ED |
350 | if (status == NETDEV_TX_OK) |
351 | txq_trans_update(txq); | |
352 | } | |
fd2ea0a7 | 353 | __netif_tx_unlock(txq); |
e37b8d93 AM |
354 | |
355 | if (status == NETDEV_TX_OK) | |
356 | break; | |
357 | ||
e37b8d93 | 358 | } |
0db3dc73 SH |
359 | |
360 | /* tickle device maybe there is some cleanup */ | |
2a49e001 | 361 | netpoll_poll_dev(np->dev); |
0db3dc73 SH |
362 | |
363 | udelay(USEC_PER_POLL); | |
0db1d6fc | 364 | } |
79b1bee8 DD |
365 | |
366 | WARN_ONCE(!irqs_disabled(), | |
2899656b | 367 | "netpoll_send_skb_on_dev(): %s enabled interrupts in poll (%pF)\n", |
79b1bee8 DD |
368 | dev->name, ops->ndo_start_xmit); |
369 | ||
1da177e4 | 370 | } |
1da177e4 | 371 | |
2bdfe0ba | 372 | if (status != NETDEV_TX_OK) { |
5de4a473 | 373 | skb_queue_tail(&npinfo->txq, skb); |
4c1ac1b4 | 374 | schedule_delayed_work(&npinfo->tx_work,0); |
1da177e4 | 375 | } |
1da177e4 | 376 | } |
c2355e1a | 377 | EXPORT_SYMBOL(netpoll_send_skb_on_dev); |
1da177e4 LT |
378 | |
379 | void netpoll_send_udp(struct netpoll *np, const char *msg, int len) | |
380 | { | |
954fba02 | 381 | int total_len, ip_len, udp_len; |
1da177e4 LT |
382 | struct sk_buff *skb; |
383 | struct udphdr *udph; | |
384 | struct iphdr *iph; | |
385 | struct ethhdr *eth; | |
ee130409 | 386 | static atomic_t ip_ident; |
1da177e4 LT |
387 | |
388 | udp_len = len + sizeof(*udph); | |
b7394d24 CW |
389 | if (!np->ipv6) |
390 | ip_len = udp_len + sizeof(*iph); | |
391 | ||
954fba02 | 392 | total_len = ip_len + LL_RESERVED_SPACE(np->dev); |
1da177e4 | 393 | |
954fba02 ED |
394 | skb = find_skb(np, total_len + np->dev->needed_tailroom, |
395 | total_len - len); | |
1da177e4 LT |
396 | if (!skb) |
397 | return; | |
398 | ||
27d7ff46 | 399 | skb_copy_to_linear_data(skb, msg, len); |
954fba02 | 400 | skb_put(skb, len); |
1da177e4 | 401 | |
4bedb452 ACM |
402 | skb_push(skb, sizeof(*udph)); |
403 | skb_reset_transport_header(skb); | |
404 | udph = udp_hdr(skb); | |
1da177e4 LT |
405 | udph->source = htons(np->local_port); |
406 | udph->dest = htons(np->remote_port); | |
407 | udph->len = htons(udp_len); | |
b7394d24 CW |
408 | |
409 | if (!np->ipv6) { | |
410 | udph->check = 0; | |
411 | udph->check = csum_tcpudp_magic(np->local_ip.ip, | |
412 | np->remote_ip.ip, | |
413 | udp_len, IPPROTO_UDP, | |
414 | csum_partial(udph, udp_len, 0)); | |
415 | if (udph->check == 0) | |
416 | udph->check = CSUM_MANGLED_0; | |
417 | ||
418 | skb_push(skb, sizeof(*iph)); | |
419 | skb_reset_network_header(skb); | |
420 | iph = ip_hdr(skb); | |
421 | ||
422 | /* iph->version = 4; iph->ihl = 5; */ | |
423 | put_unaligned(0x45, (unsigned char *)iph); | |
424 | iph->tos = 0; | |
425 | put_unaligned(htons(ip_len), &(iph->tot_len)); | |
426 | iph->id = htons(atomic_inc_return(&ip_ident)); | |
427 | iph->frag_off = 0; | |
428 | iph->ttl = 64; | |
429 | iph->protocol = IPPROTO_UDP; | |
430 | iph->check = 0; | |
431 | put_unaligned(np->local_ip.ip, &(iph->saddr)); | |
432 | put_unaligned(np->remote_ip.ip, &(iph->daddr)); | |
433 | iph->check = ip_fast_csum((unsigned char *)iph, iph->ihl); | |
434 | ||
435 | eth = (struct ethhdr *) skb_push(skb, ETH_HLEN); | |
436 | skb_reset_mac_header(skb); | |
437 | skb->protocol = eth->h_proto = htons(ETH_P_IP); | |
438 | } | |
439 | ||
09538641 SH |
440 | memcpy(eth->h_source, np->dev->dev_addr, ETH_ALEN); |
441 | memcpy(eth->h_dest, np->remote_mac, ETH_ALEN); | |
1da177e4 LT |
442 | |
443 | skb->dev = np->dev; | |
444 | ||
445 | netpoll_send_skb(np, skb); | |
446 | } | |
9e34a5b5 | 447 | EXPORT_SYMBOL(netpoll_send_udp); |
1da177e4 | 448 | |
b7394d24 | 449 | static void netpoll_neigh_reply(struct sk_buff *skb, struct netpoll_info *npinfo) |
1da177e4 LT |
450 | { |
451 | struct arphdr *arp; | |
452 | unsigned char *arp_ptr; | |
453 | int size, type = ARPOP_REPLY, ptype = ETH_P_ARP; | |
252e3346 | 454 | __be32 sip, tip; |
47bbec02 | 455 | unsigned char *sha; |
1da177e4 | 456 | struct sk_buff *send_skb; |
508e14b4 DB |
457 | struct netpoll *np, *tmp; |
458 | unsigned long flags; | |
ae641949 | 459 | int hlen, tlen; |
b7394d24 | 460 | int hits = 0, proto; |
508e14b4 DB |
461 | |
462 | if (list_empty(&npinfo->rx_np)) | |
463 | return; | |
464 | ||
465 | /* Before checking the packet, we do some early | |
466 | inspection whether this is interesting at all */ | |
467 | spin_lock_irqsave(&npinfo->rx_lock, flags); | |
468 | list_for_each_entry_safe(np, tmp, &npinfo->rx_np, rx) { | |
469 | if (np->dev == skb->dev) | |
470 | hits++; | |
471 | } | |
472 | spin_unlock_irqrestore(&npinfo->rx_lock, flags); | |
1da177e4 | 473 | |
508e14b4 DB |
474 | /* No netpoll struct is using this dev */ |
475 | if (!hits) | |
115c1d6e | 476 | return; |
1da177e4 | 477 | |
b7394d24 CW |
478 | proto = ntohs(eth_hdr(skb)->h_proto); |
479 | if (proto == ETH_P_IP) { | |
480 | /* No arp on this interface */ | |
481 | if (skb->dev->flags & IFF_NOARP) | |
482 | return; | |
1da177e4 | 483 | |
b7394d24 CW |
484 | if (!pskb_may_pull(skb, arp_hdr_len(skb->dev))) |
485 | return; | |
1da177e4 | 486 | |
b7394d24 CW |
487 | skb_reset_network_header(skb); |
488 | skb_reset_transport_header(skb); | |
489 | arp = arp_hdr(skb); | |
1da177e4 | 490 | |
b7394d24 CW |
491 | if ((arp->ar_hrd != htons(ARPHRD_ETHER) && |
492 | arp->ar_hrd != htons(ARPHRD_IEEE802)) || | |
493 | arp->ar_pro != htons(ETH_P_IP) || | |
494 | arp->ar_op != htons(ARPOP_REQUEST)) | |
495 | return; | |
1da177e4 | 496 | |
b7394d24 CW |
497 | arp_ptr = (unsigned char *)(arp+1); |
498 | /* save the location of the src hw addr */ | |
499 | sha = arp_ptr; | |
500 | arp_ptr += skb->dev->addr_len; | |
501 | memcpy(&sip, arp_ptr, 4); | |
502 | arp_ptr += 4; | |
503 | /* If we actually cared about dst hw addr, | |
504 | it would get copied here */ | |
505 | arp_ptr += skb->dev->addr_len; | |
506 | memcpy(&tip, arp_ptr, 4); | |
1da177e4 | 507 | |
b7394d24 CW |
508 | /* Should we ignore arp? */ |
509 | if (ipv4_is_loopback(tip) || ipv4_is_multicast(tip)) | |
510 | return; | |
1da177e4 | 511 | |
b7394d24 | 512 | size = arp_hdr_len(skb->dev); |
1da177e4 | 513 | |
b7394d24 CW |
514 | spin_lock_irqsave(&npinfo->rx_lock, flags); |
515 | list_for_each_entry_safe(np, tmp, &npinfo->rx_np, rx) { | |
516 | if (tip != np->local_ip.ip) | |
517 | continue; | |
518 | ||
519 | hlen = LL_RESERVED_SPACE(np->dev); | |
520 | tlen = np->dev->needed_tailroom; | |
521 | send_skb = find_skb(np, size + hlen + tlen, hlen); | |
522 | if (!send_skb) | |
523 | continue; | |
524 | ||
525 | skb_reset_network_header(send_skb); | |
526 | arp = (struct arphdr *) skb_put(send_skb, size); | |
527 | send_skb->dev = skb->dev; | |
528 | send_skb->protocol = htons(ETH_P_ARP); | |
529 | ||
530 | /* Fill the device header for the ARP frame */ | |
531 | if (dev_hard_header(send_skb, skb->dev, ptype, | |
532 | sha, np->dev->dev_addr, | |
533 | send_skb->len) < 0) { | |
534 | kfree_skb(send_skb); | |
535 | continue; | |
536 | } | |
1da177e4 | 537 | |
b7394d24 CW |
538 | /* |
539 | * Fill out the arp protocol part. | |
540 | * | |
541 | * we only support ethernet device type, | |
542 | * which (according to RFC 1390) should | |
543 | * always equal 1 (Ethernet). | |
544 | */ | |
545 | ||
546 | arp->ar_hrd = htons(np->dev->type); | |
547 | arp->ar_pro = htons(ETH_P_IP); | |
548 | arp->ar_hln = np->dev->addr_len; | |
549 | arp->ar_pln = 4; | |
550 | arp->ar_op = htons(type); | |
551 | ||
552 | arp_ptr = (unsigned char *)(arp + 1); | |
553 | memcpy(arp_ptr, np->dev->dev_addr, np->dev->addr_len); | |
554 | arp_ptr += np->dev->addr_len; | |
555 | memcpy(arp_ptr, &tip, 4); | |
556 | arp_ptr += 4; | |
557 | memcpy(arp_ptr, sha, np->dev->addr_len); | |
558 | arp_ptr += np->dev->addr_len; | |
559 | memcpy(arp_ptr, &sip, 4); | |
560 | ||
561 | netpoll_send_skb(np, send_skb); | |
562 | ||
563 | /* If there are several rx_hooks for the same address, | |
564 | we're fine by sending a single reply */ | |
565 | break; | |
508e14b4 | 566 | } |
b7394d24 | 567 | spin_unlock_irqrestore(&npinfo->rx_lock, flags); |
508e14b4 | 568 | } |
1da177e4 LT |
569 | } |
570 | ||
57c5d461 | 571 | int __netpoll_rx(struct sk_buff *skb, struct netpoll_info *npinfo) |
1da177e4 LT |
572 | { |
573 | int proto, len, ulen; | |
508e14b4 | 574 | int hits = 0; |
b71d1d42 | 575 | const struct iphdr *iph; |
1da177e4 | 576 | struct udphdr *uh; |
508e14b4 | 577 | struct netpoll *np, *tmp; |
068c6e98 | 578 | |
508e14b4 | 579 | if (list_empty(&npinfo->rx_np)) |
1da177e4 | 580 | goto out; |
508e14b4 | 581 | |
1da177e4 LT |
582 | if (skb->dev->type != ARPHRD_ETHER) |
583 | goto out; | |
584 | ||
d9452e9f | 585 | /* check if netpoll clients need ARP */ |
724800d6 | 586 | if (skb->protocol == htons(ETH_P_ARP) && |
1da177e4 | 587 | atomic_read(&trapped)) { |
b7394d24 | 588 | skb_queue_tail(&npinfo->neigh_tx, skb); |
1da177e4 LT |
589 | return 1; |
590 | } | |
591 | ||
689971b4 AW |
592 | if (skb->protocol == cpu_to_be16(ETH_P_8021Q)) { |
593 | skb = vlan_untag(skb); | |
594 | if (unlikely(!skb)) | |
595 | goto out; | |
596 | } | |
597 | ||
1da177e4 | 598 | proto = ntohs(eth_hdr(skb)->h_proto); |
b7394d24 | 599 | if (proto != ETH_P_IP && proto != ETH_P_IPV6) |
1da177e4 LT |
600 | goto out; |
601 | if (skb->pkt_type == PACKET_OTHERHOST) | |
602 | goto out; | |
603 | if (skb_shared(skb)) | |
604 | goto out; | |
605 | ||
b7394d24 CW |
606 | if (proto == ETH_P_IP) { |
607 | if (!pskb_may_pull(skb, sizeof(struct iphdr))) | |
608 | goto out; | |
609 | iph = (struct iphdr *)skb->data; | |
610 | if (iph->ihl < 5 || iph->version != 4) | |
611 | goto out; | |
612 | if (!pskb_may_pull(skb, iph->ihl*4)) | |
613 | goto out; | |
614 | iph = (struct iphdr *)skb->data; | |
615 | if (ip_fast_csum((u8 *)iph, iph->ihl) != 0) | |
616 | goto out; | |
5e7d7fa5 | 617 | |
b7394d24 CW |
618 | len = ntohs(iph->tot_len); |
619 | if (skb->len < len || len < iph->ihl*4) | |
620 | goto out; | |
1da177e4 | 621 | |
b7394d24 CW |
622 | /* |
623 | * Our transport medium may have padded the buffer out. | |
624 | * Now We trim to the true length of the frame. | |
625 | */ | |
626 | if (pskb_trim_rcsum(skb, len)) | |
627 | goto out; | |
1da177e4 | 628 | |
b7394d24 CW |
629 | iph = (struct iphdr *)skb->data; |
630 | if (iph->protocol != IPPROTO_UDP) | |
631 | goto out; | |
1da177e4 | 632 | |
b7394d24 CW |
633 | len -= iph->ihl*4; |
634 | uh = (struct udphdr *)(((char *)iph) + iph->ihl*4); | |
635 | ulen = ntohs(uh->len); | |
508e14b4 | 636 | |
b7394d24 CW |
637 | if (ulen != len) |
638 | goto out; | |
639 | if (checksum_udp(skb, uh, ulen, iph->saddr, iph->daddr)) | |
640 | goto out; | |
641 | list_for_each_entry_safe(np, tmp, &npinfo->rx_np, rx) { | |
642 | if (np->local_ip.ip && np->local_ip.ip != iph->daddr) | |
643 | continue; | |
644 | if (np->remote_ip.ip && np->remote_ip.ip != iph->saddr) | |
645 | continue; | |
646 | if (np->local_port && np->local_port != ntohs(uh->dest)) | |
647 | continue; | |
648 | ||
649 | np->rx_hook(np, ntohs(uh->source), | |
650 | (char *)(uh+1), | |
651 | ulen - sizeof(struct udphdr)); | |
652 | hits++; | |
653 | } | |
508e14b4 DB |
654 | } |
655 | ||
656 | if (!hits) | |
657 | goto out; | |
1da177e4 LT |
658 | |
659 | kfree_skb(skb); | |
660 | return 1; | |
661 | ||
662 | out: | |
663 | if (atomic_read(&trapped)) { | |
664 | kfree_skb(skb); | |
665 | return 1; | |
666 | } | |
667 | ||
668 | return 0; | |
669 | } | |
670 | ||
0bcc1816 SS |
671 | void netpoll_print_options(struct netpoll *np) |
672 | { | |
e6ec2693 | 673 | np_info(np, "local port %d\n", np->local_port); |
b7394d24 CW |
674 | if (!np->ipv6) |
675 | np_info(np, "local IPv4 address %pI4\n", &np->local_ip.ip); | |
e6ec2693 JP |
676 | np_info(np, "interface '%s'\n", np->dev_name); |
677 | np_info(np, "remote port %d\n", np->remote_port); | |
b7394d24 CW |
678 | if (!np->ipv6) |
679 | np_info(np, "remote IPv4 address %pI4\n", &np->remote_ip.ip); | |
e6ec2693 | 680 | np_info(np, "remote ethernet address %pM\n", np->remote_mac); |
0bcc1816 | 681 | } |
9e34a5b5 | 682 | EXPORT_SYMBOL(netpoll_print_options); |
0bcc1816 | 683 | |
b7394d24 CW |
684 | static int netpoll_parse_ip_addr(const char *str, union inet_addr *addr) |
685 | { | |
686 | const char *end; | |
687 | ||
688 | if (!strchr(str, ':') && | |
689 | in4_pton(str, -1, (void *)addr, -1, &end) > 0) { | |
690 | if (!*end) | |
691 | return 0; | |
692 | } | |
693 | if (in6_pton(str, -1, addr->in6.s6_addr, -1, &end) > 0) { | |
694 | #if IS_ENABLED(CONFIG_IPV6) | |
695 | if (!*end) | |
696 | return 1; | |
697 | #else | |
698 | return -1; | |
699 | #endif | |
700 | } | |
701 | return -1; | |
702 | } | |
703 | ||
1da177e4 LT |
704 | int netpoll_parse_options(struct netpoll *np, char *opt) |
705 | { | |
706 | char *cur=opt, *delim; | |
b7394d24 | 707 | int ipv6; |
1da177e4 | 708 | |
c68b9070 | 709 | if (*cur != '@') { |
1da177e4 LT |
710 | if ((delim = strchr(cur, '@')) == NULL) |
711 | goto parse_failed; | |
c68b9070 | 712 | *delim = 0; |
4b5511eb AP |
713 | if (kstrtou16(cur, 10, &np->local_port)) |
714 | goto parse_failed; | |
c68b9070 | 715 | cur = delim; |
1da177e4 LT |
716 | } |
717 | cur++; | |
1da177e4 | 718 | |
c68b9070 | 719 | if (*cur != '/') { |
1da177e4 LT |
720 | if ((delim = strchr(cur, '/')) == NULL) |
721 | goto parse_failed; | |
c68b9070 | 722 | *delim = 0; |
b7394d24 CW |
723 | ipv6 = netpoll_parse_ip_addr(cur, &np->local_ip); |
724 | if (ipv6 < 0) | |
725 | goto parse_failed; | |
726 | else | |
727 | np->ipv6 = (bool)ipv6; | |
c68b9070 | 728 | cur = delim; |
1da177e4 LT |
729 | } |
730 | cur++; | |
731 | ||
c68b9070 | 732 | if (*cur != ',') { |
1da177e4 LT |
733 | /* parse out dev name */ |
734 | if ((delim = strchr(cur, ',')) == NULL) | |
735 | goto parse_failed; | |
c68b9070 | 736 | *delim = 0; |
1da177e4 | 737 | strlcpy(np->dev_name, cur, sizeof(np->dev_name)); |
c68b9070 | 738 | cur = delim; |
1da177e4 LT |
739 | } |
740 | cur++; | |
741 | ||
c68b9070 | 742 | if (*cur != '@') { |
1da177e4 LT |
743 | /* dst port */ |
744 | if ((delim = strchr(cur, '@')) == NULL) | |
745 | goto parse_failed; | |
c68b9070 | 746 | *delim = 0; |
5fc05f87 | 747 | if (*cur == ' ' || *cur == '\t') |
e6ec2693 | 748 | np_info(np, "warning: whitespace is not allowed\n"); |
4b5511eb AP |
749 | if (kstrtou16(cur, 10, &np->remote_port)) |
750 | goto parse_failed; | |
c68b9070 | 751 | cur = delim; |
1da177e4 LT |
752 | } |
753 | cur++; | |
1da177e4 LT |
754 | |
755 | /* dst ip */ | |
756 | if ((delim = strchr(cur, '/')) == NULL) | |
757 | goto parse_failed; | |
c68b9070 | 758 | *delim = 0; |
b7394d24 CW |
759 | ipv6 = netpoll_parse_ip_addr(cur, &np->remote_ip); |
760 | if (ipv6 < 0) | |
761 | goto parse_failed; | |
762 | else if (np->ipv6 != (bool)ipv6) | |
763 | goto parse_failed; | |
764 | else | |
765 | np->ipv6 = (bool)ipv6; | |
c68b9070 | 766 | cur = delim + 1; |
1da177e4 | 767 | |
c68b9070 | 768 | if (*cur != 0) { |
1da177e4 | 769 | /* MAC address */ |
4940fc88 | 770 | if (!mac_pton(cur, np->remote_mac)) |
1da177e4 | 771 | goto parse_failed; |
1da177e4 LT |
772 | } |
773 | ||
0bcc1816 | 774 | netpoll_print_options(np); |
1da177e4 LT |
775 | |
776 | return 0; | |
777 | ||
778 | parse_failed: | |
e6ec2693 | 779 | np_info(np, "couldn't parse config at '%s'!\n", cur); |
1da177e4 LT |
780 | return -1; |
781 | } | |
9e34a5b5 | 782 | EXPORT_SYMBOL(netpoll_parse_options); |
1da177e4 | 783 | |
47be03a2 | 784 | int __netpoll_setup(struct netpoll *np, struct net_device *ndev, gfp_t gfp) |
1da177e4 | 785 | { |
115c1d6e | 786 | struct netpoll_info *npinfo; |
4247e161 | 787 | const struct net_device_ops *ops; |
fbeec2e1 | 788 | unsigned long flags; |
b41848b6 | 789 | int err; |
1da177e4 | 790 | |
30fdd8a0 JP |
791 | np->dev = ndev; |
792 | strlcpy(np->dev_name, ndev->name, IFNAMSIZ); | |
793 | ||
8fdd95ec HX |
794 | if ((ndev->priv_flags & IFF_DISABLE_NETPOLL) || |
795 | !ndev->netdev_ops->ndo_poll_controller) { | |
e6ec2693 JP |
796 | np_err(np, "%s doesn't support polling, aborting\n", |
797 | np->dev_name); | |
8fdd95ec HX |
798 | err = -ENOTSUPP; |
799 | goto out; | |
800 | } | |
801 | ||
802 | if (!ndev->npinfo) { | |
47be03a2 | 803 | npinfo = kmalloc(sizeof(*npinfo), gfp); |
8fdd95ec HX |
804 | if (!npinfo) { |
805 | err = -ENOMEM; | |
806 | goto out; | |
807 | } | |
808 | ||
809 | npinfo->rx_flags = 0; | |
810 | INIT_LIST_HEAD(&npinfo->rx_np); | |
811 | ||
812 | spin_lock_init(&npinfo->rx_lock); | |
b7394d24 | 813 | skb_queue_head_init(&npinfo->neigh_tx); |
8fdd95ec HX |
814 | skb_queue_head_init(&npinfo->txq); |
815 | INIT_DELAYED_WORK(&npinfo->tx_work, queue_process); | |
816 | ||
817 | atomic_set(&npinfo->refcnt, 1); | |
818 | ||
819 | ops = np->dev->netdev_ops; | |
820 | if (ops->ndo_netpoll_setup) { | |
47be03a2 | 821 | err = ops->ndo_netpoll_setup(ndev, npinfo, gfp); |
8fdd95ec HX |
822 | if (err) |
823 | goto free_npinfo; | |
824 | } | |
825 | } else { | |
826 | npinfo = ndev->npinfo; | |
827 | atomic_inc(&npinfo->refcnt); | |
828 | } | |
829 | ||
830 | npinfo->netpoll = np; | |
831 | ||
832 | if (np->rx_hook) { | |
833 | spin_lock_irqsave(&npinfo->rx_lock, flags); | |
834 | npinfo->rx_flags |= NETPOLL_RX_ENABLED; | |
835 | list_add_tail(&np->rx, &npinfo->rx_np); | |
836 | spin_unlock_irqrestore(&npinfo->rx_lock, flags); | |
837 | } | |
838 | ||
839 | /* last thing to do is link it to the net device structure */ | |
cf778b00 | 840 | rcu_assign_pointer(ndev->npinfo, npinfo); |
8fdd95ec HX |
841 | |
842 | return 0; | |
843 | ||
844 | free_npinfo: | |
845 | kfree(npinfo); | |
846 | out: | |
847 | return err; | |
848 | } | |
849 | EXPORT_SYMBOL_GPL(__netpoll_setup); | |
850 | ||
851 | int netpoll_setup(struct netpoll *np) | |
852 | { | |
853 | struct net_device *ndev = NULL; | |
854 | struct in_device *in_dev; | |
855 | int err; | |
856 | ||
1da177e4 | 857 | if (np->dev_name) |
881d966b | 858 | ndev = dev_get_by_name(&init_net, np->dev_name); |
1da177e4 | 859 | if (!ndev) { |
e6ec2693 | 860 | np_err(np, "%s doesn't exist, aborting\n", np->dev_name); |
b41848b6 | 861 | return -ENODEV; |
1da177e4 LT |
862 | } |
863 | ||
49bd8fb0 | 864 | if (netdev_master_upper_dev_get(ndev)) { |
e6ec2693 | 865 | np_err(np, "%s is a slave device, aborting\n", np->dev_name); |
83fe32de DC |
866 | err = -EBUSY; |
867 | goto put; | |
0c1ad04a WC |
868 | } |
869 | ||
1da177e4 LT |
870 | if (!netif_running(ndev)) { |
871 | unsigned long atmost, atleast; | |
872 | ||
e6ec2693 | 873 | np_info(np, "device %s not up yet, forcing it\n", np->dev_name); |
1da177e4 | 874 | |
6756ae4b | 875 | rtnl_lock(); |
b41848b6 SH |
876 | err = dev_open(ndev); |
877 | rtnl_unlock(); | |
878 | ||
879 | if (err) { | |
e6ec2693 | 880 | np_err(np, "failed to open %s\n", ndev->name); |
dbaa1541 | 881 | goto put; |
1da177e4 | 882 | } |
1da177e4 LT |
883 | |
884 | atleast = jiffies + HZ/10; | |
bff38771 | 885 | atmost = jiffies + carrier_timeout * HZ; |
1da177e4 LT |
886 | while (!netif_carrier_ok(ndev)) { |
887 | if (time_after(jiffies, atmost)) { | |
e6ec2693 | 888 | np_notice(np, "timeout waiting for carrier\n"); |
1da177e4 LT |
889 | break; |
890 | } | |
1b614fb9 | 891 | msleep(1); |
1da177e4 LT |
892 | } |
893 | ||
894 | /* If carrier appears to come up instantly, we don't | |
895 | * trust it and pause so that we don't pump all our | |
896 | * queued console messages into the bitbucket. | |
897 | */ | |
898 | ||
899 | if (time_before(jiffies, atleast)) { | |
e6ec2693 | 900 | np_notice(np, "carrier detect appears untrustworthy, waiting 4 seconds\n"); |
1da177e4 LT |
901 | msleep(4000); |
902 | } | |
903 | } | |
904 | ||
b7394d24 CW |
905 | if (!np->local_ip.ip) { |
906 | if (!np->ipv6) { | |
907 | rcu_read_lock(); | |
908 | in_dev = __in_dev_get_rcu(ndev); | |
1da177e4 | 909 | |
b7394d24 CW |
910 | |
911 | if (!in_dev || !in_dev->ifa_list) { | |
912 | rcu_read_unlock(); | |
913 | np_err(np, "no IP address for %s, aborting\n", | |
914 | np->dev_name); | |
915 | err = -EDESTADDRREQ; | |
916 | goto put; | |
917 | } | |
918 | ||
919 | np->local_ip.ip = in_dev->ifa_list->ifa_local; | |
1da177e4 | 920 | rcu_read_unlock(); |
b7394d24 | 921 | np_info(np, "local IP %pI4\n", &np->local_ip.ip); |
1da177e4 | 922 | } |
1da177e4 LT |
923 | } |
924 | ||
dbaa1541 HX |
925 | /* fill up the skb queue */ |
926 | refill_skbs(); | |
927 | ||
928 | rtnl_lock(); | |
47be03a2 | 929 | err = __netpoll_setup(np, ndev, GFP_KERNEL); |
dbaa1541 | 930 | rtnl_unlock(); |
53fb95d3 | 931 | |
8fdd95ec HX |
932 | if (err) |
933 | goto put; | |
934 | ||
1da177e4 LT |
935 | return 0; |
936 | ||
21edbb22 | 937 | put: |
1da177e4 | 938 | dev_put(ndev); |
b41848b6 | 939 | return err; |
1da177e4 | 940 | } |
9e34a5b5 | 941 | EXPORT_SYMBOL(netpoll_setup); |
1da177e4 | 942 | |
c68b9070 DM |
943 | static int __init netpoll_init(void) |
944 | { | |
a1bcfacd SH |
945 | skb_queue_head_init(&skb_pool); |
946 | return 0; | |
947 | } | |
948 | core_initcall(netpoll_init); | |
949 | ||
38e6bc18 AW |
950 | static void rcu_cleanup_netpoll_info(struct rcu_head *rcu_head) |
951 | { | |
952 | struct netpoll_info *npinfo = | |
953 | container_of(rcu_head, struct netpoll_info, rcu); | |
954 | ||
b7394d24 | 955 | skb_queue_purge(&npinfo->neigh_tx); |
38e6bc18 AW |
956 | skb_queue_purge(&npinfo->txq); |
957 | ||
958 | /* we can't call cancel_delayed_work_sync here, as we are in softirq */ | |
959 | cancel_delayed_work(&npinfo->tx_work); | |
960 | ||
961 | /* clean after last, unfinished work */ | |
962 | __skb_queue_purge(&npinfo->txq); | |
963 | /* now cancel it again */ | |
964 | cancel_delayed_work(&npinfo->tx_work); | |
965 | kfree(npinfo); | |
966 | } | |
967 | ||
8fdd95ec | 968 | void __netpoll_cleanup(struct netpoll *np) |
1da177e4 | 969 | { |
fbeec2e1 JM |
970 | struct netpoll_info *npinfo; |
971 | unsigned long flags; | |
972 | ||
8fdd95ec HX |
973 | npinfo = np->dev->npinfo; |
974 | if (!npinfo) | |
dbaa1541 | 975 | return; |
93ec2c72 | 976 | |
8fdd95ec HX |
977 | if (!list_empty(&npinfo->rx_np)) { |
978 | spin_lock_irqsave(&npinfo->rx_lock, flags); | |
979 | list_del(&np->rx); | |
980 | if (list_empty(&npinfo->rx_np)) | |
981 | npinfo->rx_flags &= ~NETPOLL_RX_ENABLED; | |
982 | spin_unlock_irqrestore(&npinfo->rx_lock, flags); | |
983 | } | |
de85d99e | 984 | |
8fdd95ec HX |
985 | if (atomic_dec_and_test(&npinfo->refcnt)) { |
986 | const struct net_device_ops *ops; | |
de85d99e | 987 | |
8fdd95ec HX |
988 | ops = np->dev->netdev_ops; |
989 | if (ops->ndo_netpoll_cleanup) | |
990 | ops->ndo_netpoll_cleanup(np->dev); | |
de85d99e | 991 | |
a9b3cd7f | 992 | RCU_INIT_POINTER(np->dev->npinfo, NULL); |
38e6bc18 AW |
993 | call_rcu_bh(&npinfo->rcu, rcu_cleanup_netpoll_info); |
994 | } | |
995 | } | |
996 | EXPORT_SYMBOL_GPL(__netpoll_cleanup); | |
de85d99e | 997 | |
38e6bc18 AW |
998 | static void rcu_cleanup_netpoll(struct rcu_head *rcu_head) |
999 | { | |
1000 | struct netpoll *np = container_of(rcu_head, struct netpoll, rcu); | |
93ec2c72 | 1001 | |
38e6bc18 AW |
1002 | __netpoll_cleanup(np); |
1003 | kfree(np); | |
1004 | } | |
93ec2c72 | 1005 | |
38e6bc18 AW |
1006 | void __netpoll_free_rcu(struct netpoll *np) |
1007 | { | |
1008 | call_rcu_bh(&np->rcu, rcu_cleanup_netpoll); | |
8fdd95ec | 1009 | } |
38e6bc18 | 1010 | EXPORT_SYMBOL_GPL(__netpoll_free_rcu); |
fbeec2e1 | 1011 | |
8fdd95ec HX |
1012 | void netpoll_cleanup(struct netpoll *np) |
1013 | { | |
1014 | if (!np->dev) | |
1015 | return; | |
dbaa1541 | 1016 | |
8fdd95ec HX |
1017 | rtnl_lock(); |
1018 | __netpoll_cleanup(np); | |
1019 | rtnl_unlock(); | |
1020 | ||
1021 | dev_put(np->dev); | |
1da177e4 LT |
1022 | np->dev = NULL; |
1023 | } | |
9e34a5b5 | 1024 | EXPORT_SYMBOL(netpoll_cleanup); |
1da177e4 LT |
1025 | |
1026 | int netpoll_trap(void) | |
1027 | { | |
1028 | return atomic_read(&trapped); | |
1029 | } | |
9e34a5b5 | 1030 | EXPORT_SYMBOL(netpoll_trap); |
1da177e4 LT |
1031 | |
1032 | void netpoll_set_trap(int trap) | |
1033 | { | |
1034 | if (trap) | |
1035 | atomic_inc(&trapped); | |
1036 | else | |
1037 | atomic_dec(&trapped); | |
1038 | } | |
1da177e4 | 1039 | EXPORT_SYMBOL(netpoll_set_trap); |