From nobody Tue Dec 2 02:05:57 2025 Received: from mail-wm1-f44.google.com (mail-wm1-f44.google.com [209.85.128.44]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 5D7C3757EA for ; Thu, 20 Nov 2025 00:15:28 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.44 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763597731; cv=none; b=QyTAOWhy5jmmIoCYLo+Kr/KJqrQq09wqBeTmW2er/0XusBaWvtdA8N2JKg9RX4dX5Q43ZdLbCFbOlhByP10CvZIF6HeO8tuBk2jLJLp2JMZsHSkjOjMkDtqzF1MMxI0sx475peDgbSn4c/HYSPAy0L4h9YxsanA+4UWHuAqeW3Y= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763597731; c=relaxed/simple; bh=xCpkEYzNomcjUq2RBhM2Nj8mJD+qDxOUs76mrgKtjgc=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=ok+F5aoNQ5wh8a+rbZq/7jfVSKmwBhxVYOSV3K0I7eo8bnPxFQnRYfrn0fHcjr4RgI6hRQ38yfDtHPbCBaNyzx9ylPd9ebD7uEKEHgoK6MWraS2n1WpRGEYroPuiFTJcdACgmOGg0dFY4oly8At5otSxLwHdz21jkhtGuljdGRQ= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=ilcqdqx3; arc=none smtp.client-ip=209.85.128.44 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="ilcqdqx3" Received: by mail-wm1-f44.google.com with SMTP id 5b1f17b1804b1-4779ebfa91aso563475e9.3 for ; Wed, 19 Nov 2025 16:15:28 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1763597727; x=1764202527; darn=vger.kernel.org; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:from:to:cc:subject:date:message-id :reply-to; bh=trfVqswjg1NdlW9xJm6ysY3CFs26x2tsI+zzVlfdYrM=; b=ilcqdqx3DfVtObg3ADQ08riv07HVPT5l6fTbieMSfVIjZP/KYSdsP0CB8JKs8dZdzi mZFdHxcYQw2N3LG3a4bpzrYfCNAI/yYZFHRZHv4GuRF1tPHj/yi12MCRAckywJeR+dbc aihQBSMF5TlSvlpStPiwJAfbt72ADHVv2XjkLgCce8mbUUliwi1QkpGm/ErJvX67qJQg KpwOSLibOVjfzEh27M4tCwXOuZhGY10Awd3dtkE2iGRRlTOKsht6pr+FEltz0CMtYUy6 C0Cxsi0ABvZugEp7z2s0uihB5iGuRxArDWfgsjpblN+ZsTbIAPYSqr4WsDPZQAX81jHA wE+w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1763597727; x=1764202527; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=trfVqswjg1NdlW9xJm6ysY3CFs26x2tsI+zzVlfdYrM=; b=egNkQthzY8KYVuOS0G67YVwnPbxFlIozI/rO3oYXwbsXKIPQYpqBdKpw71M9ewkJkC s83XFYpBiM/Rw+vcUGAc8Mo9BS3dNnuPDAxGTkQUaN15F12OySxsoDB32Zq9dbfbPkUu e5wKMHK0lNh+2RU0xiGmbRVuW8k/6+jSv+MLpCNP4s0Y4lpJjUMnL2QsNHjCBXND0Ac0 9Tm+hs3XpdVPAdYhwyRPBXBf0OcIsKeTDl6OthO1bL+DB8jh+HcKhde+Wk7t9TKvzOIk +7r+lnMcJhssmKVaGH3IoK0/FrxVNc9AT7ndShvG/GYKWKwZpp8eWc4Pqo/ThuhpuqII f5Rg== X-Forwarded-Encrypted: i=1; AJvYcCWeIW0048cx/0tfL2vZQrad+qeoCY7Eq2rWJFEIsBncah45xBBjxZTlZ+aDprKrpGKw6FI0kkLaG1oh8BI=@vger.kernel.org X-Gm-Message-State: AOJu0YwPJl0A0rRcIL+me0MzwIFi0E+/aXBgmaDafQs15X5IWortLp3B OpD81X7Y7Na0Egs3hTNiCpYNueML+lfpaGlSOnKZxWQo6V7Vdz/CNfwp X-Gm-Gg: ASbGncvsbNbLO14xQCtqR2SiyJdvh2m/upN0hMygwye0wURCEKgnZWaffqJF8HGQ7fS EohOGuH9SO5DQ/v76F9F9uQprV1eXE/9aUqYq0P4vMeUhjIQ/04WZ1ser64FlNLF1uH1k8lp74A vXz05SjMrYHcTXBw+yO9ncf4Wu2V1zJlcDI0mEv6zEdoAzGf0b5O61ZBS/vHNL/oAnIToPegYSe N/AQlLd3gWEADja+mrDncUNd7t0SfSPw0efEUkRZ4fMsKaYjlbQBBGFX81bMCxawNfwQx9bbDQV +i+p8V2KsA5vMO0tK0mwEahlNRR0hru+A5kQhFC2bXA37/vFM6dM6oALR2zcugueENmAAcqf9Px 916acg37EfNrplRUhsPxlyvPEPpNr+zma+ogb+sFRVi+sdh/2XhSxE2ZEkO8SHwy68aFaKU9FSj WCv2x7uJ9jAhIbXnIhgzMI9kdfcfcTHFMv1vEiXg== X-Google-Smtp-Source: AGHT+IEiQxaxA/A54OsLoBVuiEEkFz+e6t06y8Ajf7M4vany3n7BtGT/D3/7t3IQL3xUNHYfHJZUQA== X-Received: by 2002:a05:600c:4f4f:b0:477:aed0:f402 with SMTP id 5b1f17b1804b1-477b8d8a7e2mr6219385e9.8.1763597726622; Wed, 19 Nov 2025 16:15:26 -0800 (PST) Received: from localhost ([2a03:2880:31ff:40::]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-42cb7f2e432sm1970904f8f.9.2025.11.19.16.15.25 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 19 Nov 2025 16:15:26 -0800 (PST) From: Gustavo Luiz Duarte Date: Wed, 19 Nov 2025 16:14:49 -0800 Subject: [PATCH net-next v3 1/4] netconsole: Simplify send_fragmented_body() Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20251119-netconsole_dynamic_extradata-v3-1-497ac3191707@meta.com> References: <20251119-netconsole_dynamic_extradata-v3-0-497ac3191707@meta.com> In-Reply-To: <20251119-netconsole_dynamic_extradata-v3-0-497ac3191707@meta.com> To: Breno Leitao , Andre Carvalho , Simon Horman , Andrew Lunn , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Shuah Khan Cc: netdev@vger.kernel.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, Gustavo Luiz Duarte X-Mailer: b4 0.13.0 Refactor send_fragmented_body() to use separate offset tracking for msgbody, and extradata instead of complex conditional logic. The previous implementation used boolean flags and calculated offsets which made the code harder to follow. The new implementation maintains independent offset counters (msgbody_offset, extradata_offset) and processes each section sequentially, making the data flow more straightforward and the code easier to maintain. This is a preparatory refactoring with no functional changes, which will allow easily splitting extradata_complete into separate userdata and sysdata buffers in the next patch. Signed-off-by: Gustavo Luiz Duarte Reviewed-by: Breno Leitao --- drivers/net/netconsole.c | 111 ++++++++++++++++++++-----------------------= ---- 1 file changed, 46 insertions(+), 65 deletions(-) diff --git a/drivers/net/netconsole.c b/drivers/net/netconsole.c index bb6e03a92956..5fe5896d6ff5 100644 --- a/drivers/net/netconsole.c +++ b/drivers/net/netconsole.c @@ -1560,89 +1560,70 @@ static void append_release(char *buf) } =20 static void send_fragmented_body(struct netconsole_target *nt, - const char *msgbody, int header_len, + const char *msgbody_ptr, int header_len, int msgbody_len, int extradata_len) { - int sent_extradata, preceding_bytes; - const char *extradata =3D NULL; - int body_len, offset =3D 0; + const char *extradata_ptr =3D NULL; + int data_len, data_sent =3D 0; + int extradata_offset =3D 0; + int msgbody_offset =3D 0; =20 #ifdef CONFIG_NETCONSOLE_DYNAMIC - extradata =3D nt->extradata_complete; + extradata_ptr =3D nt->extradata_complete; #endif + if (WARN_ON_ONCE(!extradata_ptr && extradata_len !=3D 0)) + return; =20 - /* body_len represents the number of bytes that will be sent. This is + /* data_len represents the number of bytes that will be sent. This is * bigger than MAX_PRINT_CHUNK, thus, it will be split in multiple * packets */ - body_len =3D msgbody_len + extradata_len; + data_len =3D msgbody_len + extradata_len; =20 /* In each iteration of the while loop below, we send a packet - * containing the header and a portion of the body. The body is + * containing the header and a portion of the data. The data is * composed of two parts: msgbody and extradata. We keep track of how - * many bytes have been sent so far using the offset variable, which - * ranges from 0 to the total length of the body. + * many bytes have been sent so far using the data_sent variable, which + * ranges from 0 to the total bytes to be sent. */ - while (offset < body_len) { - int this_header =3D header_len; - bool msgbody_written =3D false; - int this_offset =3D 0; + while (data_sent < data_len) { + int extradata_left =3D extradata_len - extradata_offset; + int msgbody_left =3D msgbody_len - msgbody_offset; + int buf_offset =3D 0; int this_chunk =3D 0; =20 - this_header +=3D scnprintf(nt->buf + this_header, - MAX_PRINT_CHUNK - this_header, - ",ncfrag=3D%d/%d;", offset, - body_len); - - /* Not all msgbody data has been written yet */ - if (offset < msgbody_len) { - this_chunk =3D min(msgbody_len - offset, - MAX_PRINT_CHUNK - this_header); - if (WARN_ON_ONCE(this_chunk <=3D 0)) - return; - memcpy(nt->buf + this_header, msgbody + offset, - this_chunk); - this_offset +=3D this_chunk; + /* header is already populated in nt->buf, just append to it */ + buf_offset =3D header_len; + + buf_offset +=3D scnprintf(nt->buf + buf_offset, + MAX_PRINT_CHUNK - buf_offset, + ",ncfrag=3D%d/%d;", data_sent, + data_len); + + /* append msgbody first */ + this_chunk =3D min(msgbody_left, MAX_PRINT_CHUNK - buf_offset); + memcpy(nt->buf + buf_offset, msgbody_ptr + msgbody_offset, + this_chunk); + msgbody_offset +=3D this_chunk; + buf_offset +=3D this_chunk; + data_sent +=3D this_chunk; + + /* after msgbody, append extradata */ + if (extradata_ptr && extradata_left) { + this_chunk =3D min(extradata_left, + MAX_PRINT_CHUNK - buf_offset); + memcpy(nt->buf + buf_offset, + extradata_ptr + extradata_offset, this_chunk); + extradata_offset +=3D this_chunk; + buf_offset +=3D this_chunk; + data_sent +=3D this_chunk; } =20 - /* msgbody was finally written, either in the previous - * messages and/or in the current buf. Time to write - * the extradata. - */ - msgbody_written |=3D offset + this_offset >=3D msgbody_len; - - /* Msg body is fully written and there is pending extradata to - * write, append extradata in this chunk - */ - if (msgbody_written && offset + this_offset < body_len) { - /* Track how much user data was already sent. First - * time here, sent_userdata is zero - */ - sent_extradata =3D (offset + this_offset) - msgbody_len; - /* offset of bytes used in current buf */ - preceding_bytes =3D this_chunk + this_header; - - if (WARN_ON_ONCE(sent_extradata < 0)) - return; - - this_chunk =3D min(extradata_len - sent_extradata, - MAX_PRINT_CHUNK - preceding_bytes); - if (WARN_ON_ONCE(this_chunk < 0)) - /* this_chunk could be zero if all the previous - * message used all the buffer. This is not a - * problem, extradata will be sent in the next - * iteration - */ - return; - - memcpy(nt->buf + this_header + this_offset, - extradata + sent_extradata, - this_chunk); - this_offset +=3D this_chunk; - } + /* if all is good, send the packet out */ + if (WARN_ON_ONCE(data_sent > data_len)) + return; =20 - send_udp(nt, nt->buf, this_header + this_offset); - offset +=3D this_offset; + send_udp(nt, nt->buf, buf_offset); } } =20 --=20 2.47.3 From nobody Tue Dec 2 02:05:57 2025 Received: from mail-wm1-f48.google.com (mail-wm1-f48.google.com [209.85.128.48]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 88FA018C008 for ; Thu, 20 Nov 2025 00:15:30 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.48 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763597732; cv=none; b=kQlUIMqKxfido9f+0N6ZtSsCyD7QAAC+8J/hWUqQYYcvkyfDjPDhXVruUYiBMQjeWsdFdtNqyiqM3L1pRu2+lEdFmp7Pz6RSTVvY1Mx1mmWIBlwba8NpLDmBbuAuaCRYYY3NMgoleO4V5rLKwFF+IeaWfJhDeKp/C1GCbGGyFKg= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763597732; c=relaxed/simple; bh=A+e/nVOlaZ56zvXJcIRkAIZ5Y05NwOtvPotrfRVwvj0=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=mECTVDqfv9MHoZ5TvsKEUiIrC2TxHC/0IekYwtwxZJnpjniepyUSkZimMJEmZVsQ0nTKm4Dm6fcYd7U672wCrYRH67+MkQ1iusAdOran9bG/liLY8ds/FDYGrqT1Brvth/zbZpFtdqVVFzSd4xSSlxZ0Ny2oJbkQTOYupJb7gHI= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=klOomM+Y; arc=none smtp.client-ip=209.85.128.48 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="klOomM+Y" Received: by mail-wm1-f48.google.com with SMTP id 5b1f17b1804b1-4779fd615a3so432635e9.0 for ; Wed, 19 Nov 2025 16:15:30 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1763597729; x=1764202529; darn=vger.kernel.org; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:from:to:cc:subject:date:message-id :reply-to; bh=oSV3Qno4VTxKne3uQqV5TvNBdPmZLOl9DM1bseCRnBU=; b=klOomM+YhwoFXlyRjwFhEtCnCCSyft5LEprNremKGx+NoiZct6A2Ly7HO5ssSKX+ht 6pnmX0zEG0Fi6eFcJs+YsQa0IjVzDWo2jXTNRi4UkyQ0FKMrAG4gdAddtEWD36miAMlI nusStjVXLBbJo0jUkzQ9jSS7syWPEpGdeIyvYuJQaDTQOnIFNE6hg45fT47ILPXFKo4H joOU4DQfHSIwhgdxKoibF+sq6bhttEg4T1rdsQV3pEUVQ32VLJs5fLb2jPSpQFSIiMWe SypfXEATVvkn0a2zypM5b4TLPwZRvlQBQ6tVzOcVCqnCKiUeGJnTcfUhf0wEdVa0BRda Nwwg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1763597729; x=1764202529; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=oSV3Qno4VTxKne3uQqV5TvNBdPmZLOl9DM1bseCRnBU=; b=YyooquqOt1DiObAUwigGAQ1scBViOlEJfVUJmBqApjhBGpDgEdt2ajZ5C3hmu0pORP vU4JXxHzCrXaVWM78OZ6Cn/Dm0CbVtCM/Y1Y/2bPtGy//QGiKeWBybNwGSzlHST7I37O cNAOkg7WSH/2cTMqFQGwCTe+Kc7V9c+vZ2Pd7YC/8Zp4S/GH8d8l0T4OfNWBkQdE4Mtp XlNwIoKDI89+BmWWtZpluupR9OEXRyOZKu6bZuicqj21muWPlTSD639nX6hBcP3pZNQY Fbjhxi6vyh9PHcZnFWia8jo1EHCOzhQX6G0V0SScjnbFKT3sa+cvC4ZcmC7u97vS6o6+ 8EHA== X-Forwarded-Encrypted: i=1; AJvYcCVT4/l6EAyAcmMZ9yuT2z7wM23nPe+8Z1UBVT3ztxI0j8b1Ryb3NqdgM4Fg0ziWdDQQgLZwHwOydpwXC/U=@vger.kernel.org X-Gm-Message-State: AOJu0YzONW2ZKcJchwg7gTOWLD14bvgZ7DsRR6tICkNssyBArfWHCI8p U0DNfVbc7uBOTlIk1iaz4iWeaf+SQxCuf8DX17PweEL11stfN7ulz12H X-Gm-Gg: ASbGncutsugYGuGCiHvOPxdBCbY9fwUr+8Lv+6y/323NTBI0Nvl6dl7Ksco4oOsXA+k 2KF6vCUKstzdsozyUSpPsXCCLHBNQU/58XnbV/J4IMHSBVnR6J6wrTTSITXVtfrpzER38fxDKUA 4rVLOD5zkMAiOAv/Nj1cHsNg6Vtv1UGDjQ5oNessadkibUqKTkLjC0Jd4ndtyRUNN5qtpHifaHs cPEFC/Cip3WgNl6hZhyMRLLVvfPacofwZnbTGM53NTRq0D7RmdXM7TdZQsTSnziJM9Pkjc/VdZF 4E9VMI5D6IowL8Ypb+AxFuiNgvuRzX9fb/xfoqQFv7JY9io6MilPPDwcQC4cOHzY9Qo9NjWJqFL QGSHTpQVaqeuItlQGGILnmdPofJFYMEAuc+NsJnEPaOBuTYXNagJ2dlKswMchuxVo/HHxZrc49Y AZ1aBUU1l+TnW1oQ8PTW1is5g= X-Google-Smtp-Source: AGHT+IH6VRbTzJI8RtT9FoEPeKaOyeeGBeVhaYIRq1VvS5L2usOTAert7+MZWuTnflAua/VQeIG59A== X-Received: by 2002:a05:600c:1f0f:b0:45f:2c33:2731 with SMTP id 5b1f17b1804b1-477bab9c966mr50595e9.2.1763597728793; Wed, 19 Nov 2025 16:15:28 -0800 (PST) Received: from localhost ([2a03:2880:31ff::]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-477b106b10asm73859705e9.10.2025.11.19.16.15.27 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 19 Nov 2025 16:15:27 -0800 (PST) From: Gustavo Luiz Duarte Date: Wed, 19 Nov 2025 16:14:50 -0800 Subject: [PATCH net-next v3 2/4] netconsole: Split userdata and sysdata Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20251119-netconsole_dynamic_extradata-v3-2-497ac3191707@meta.com> References: <20251119-netconsole_dynamic_extradata-v3-0-497ac3191707@meta.com> In-Reply-To: <20251119-netconsole_dynamic_extradata-v3-0-497ac3191707@meta.com> To: Breno Leitao , Andre Carvalho , Simon Horman , Andrew Lunn , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Shuah Khan Cc: netdev@vger.kernel.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, Gustavo Luiz Duarte X-Mailer: b4 0.13.0 Separate userdata and sysdata into distinct buffers to enable independent management. Previously, both were stored in a single extradata_complete buffer with a fixed size that accommodated both types of data. This separation allows: - userdata to grow dynamically (in subsequent patch) - sysdata to remain in a small static buffer - removal of complex entry counting logic that tracked both types together The split also simplifies the code by eliminating the need to check total entry count across both userdata and sysdata when enabling features, which allows to drop holding su_mutex on sysdata_*_enabled_store(). No functional change in this patch, just structural preparation for dynamic userdata allocation. Signed-off-by: Gustavo Luiz Duarte Reviewed-by: Breno Leitao --- drivers/net/netconsole.c | 215 +++++++++++++++++++++----------------------= ---- 1 file changed, 98 insertions(+), 117 deletions(-) diff --git a/drivers/net/netconsole.c b/drivers/net/netconsole.c index 5fe5896d6ff5..1bd811714322 100644 --- a/drivers/net/netconsole.c +++ b/drivers/net/netconsole.c @@ -50,7 +50,7 @@ MODULE_LICENSE("GPL"); /* The number 3 comes from userdata entry format characters (' ', '=3D', '= \n') */ #define MAX_EXTRADATA_NAME_LEN (MAX_EXTRADATA_ENTRY_LEN - \ MAX_EXTRADATA_VALUE_LEN - 3) -#define MAX_EXTRADATA_ITEMS 16 +#define MAX_USERDATA_ITEMS 16 #define MAX_PRINT_CHUNK 1000 =20 static char config[MAX_PARAM_LENGTH]; @@ -115,6 +115,8 @@ enum sysdata_feature { SYSDATA_RELEASE =3D BIT(2), /* Include a per-target message ID as part of sysdata */ SYSDATA_MSGID =3D BIT(3), + /* Sentinel: highest bit position */ + MAX_SYSDATA_ITEMS =3D 4, }; =20 /** @@ -122,8 +124,9 @@ enum sysdata_feature { * @list: Links this target into the target_list. * @group: Links us into the configfs subsystem hierarchy. * @userdata_group: Links to the userdata configfs hierarchy - * @extradata_complete: Cached, formatted string of append - * @userdata_length: String length of usedata in extradata_complete. + * @userdata: Cached, formatted string of append + * @userdata_length: String length of userdata. + * @sysdata: Cached, formatted string of append * @sysdata_fields: Sysdata features enabled. * @msgcounter: Message sent counter. * @stats: Packet send stats for the target. Used for debugging. @@ -152,8 +155,10 @@ struct netconsole_target { #ifdef CONFIG_NETCONSOLE_DYNAMIC struct config_group group; struct config_group userdata_group; - char extradata_complete[MAX_EXTRADATA_ENTRY_LEN * MAX_EXTRADATA_ITEMS]; + char userdata[MAX_EXTRADATA_ENTRY_LEN * MAX_USERDATA_ITEMS]; size_t userdata_length; + char sysdata[MAX_EXTRADATA_ENTRY_LEN * MAX_SYSDATA_ITEMS]; + /* bit-wise with sysdata_feature bits */ u32 sysdata_fields; /* protected by target_list_lock */ @@ -802,28 +807,14 @@ static ssize_t remote_ip_store(struct config_item *it= em, const char *buf, return ret; } =20 -/* Count number of entries we have in extradata. - * This is important because the extradata_complete only supports - * MAX_EXTRADATA_ITEMS entries. Before enabling any new {user,sys}data - * feature, number of entries needs to checked for available space. +/* Count number of entries we have in userdata. + * This is important because userdata only supports MAX_USERDATA_ITEMS + * entries. Before enabling any new userdata feature, number of entries ne= eds + * to checked for available space. */ -static size_t count_extradata_entries(struct netconsole_target *nt) +static size_t count_userdata_entries(struct netconsole_target *nt) { - size_t entries; - - /* Userdata entries */ - entries =3D list_count_nodes(&nt->userdata_group.cg_children); - /* Plus sysdata entries */ - if (nt->sysdata_fields & SYSDATA_CPU_NR) - entries +=3D 1; - if (nt->sysdata_fields & SYSDATA_TASKNAME) - entries +=3D 1; - if (nt->sysdata_fields & SYSDATA_RELEASE) - entries +=3D 1; - if (nt->sysdata_fields & SYSDATA_MSGID) - entries +=3D 1; - - return entries; + return list_count_nodes(&nt->userdata_group.cg_children); } =20 static ssize_t remote_mac_store(struct config_item *item, const char *buf, @@ -894,13 +885,13 @@ static void update_userdata(struct netconsole_target = *nt) =20 /* Clear the current string in case the last userdatum was deleted */ nt->userdata_length =3D 0; - nt->extradata_complete[0] =3D 0; + nt->userdata[0] =3D 0; =20 list_for_each(entry, &nt->userdata_group.cg_children) { struct userdatum *udm_item; struct config_item *item; =20 - if (child_count >=3D MAX_EXTRADATA_ITEMS) { + if (child_count >=3D MAX_USERDATA_ITEMS) { spin_unlock_irqrestore(&target_list_lock, flags); WARN_ON_ONCE(1); return; @@ -914,11 +905,11 @@ static void update_userdata(struct netconsole_target = *nt) if (strnlen(udm_item->value, MAX_EXTRADATA_VALUE_LEN) =3D=3D 0) continue; =20 - /* This doesn't overflow extradata_complete since it will write - * one entry length (1/MAX_EXTRADATA_ITEMS long), entry count is + /* This doesn't overflow userdata since it will write + * one entry length (1/MAX_USERDATA_ITEMS long), entry count is * checked to not exceed MAX items with child_count above */ - nt->userdata_length +=3D scnprintf(&nt->extradata_complete[nt->userdata_= length], + nt->userdata_length +=3D scnprintf(&nt->userdata[nt->userdata_length], MAX_EXTRADATA_ENTRY_LEN, " %s=3D%s\n", item->ci_name, udm_item->value); } @@ -962,7 +953,7 @@ static void disable_sysdata_feature(struct netconsole_t= arget *nt, enum sysdata_feature feature) { nt->sysdata_fields &=3D ~feature; - nt->extradata_complete[nt->userdata_length] =3D 0; + nt->sysdata[0] =3D 0; } =20 static ssize_t sysdata_msgid_enabled_store(struct config_item *item, @@ -982,12 +973,6 @@ static ssize_t sysdata_msgid_enabled_store(struct conf= ig_item *item, if (msgid_enabled =3D=3D curr) goto unlock_ok; =20 - if (msgid_enabled && - count_extradata_entries(nt) >=3D MAX_EXTRADATA_ITEMS) { - ret =3D -ENOSPC; - goto unlock; - } - if (msgid_enabled) nt->sysdata_fields |=3D SYSDATA_MSGID; else @@ -995,7 +980,6 @@ static ssize_t sysdata_msgid_enabled_store(struct confi= g_item *item, =20 unlock_ok: ret =3D strnlen(buf, count); -unlock: mutex_unlock(&dynamic_netconsole_mutex); mutex_unlock(&netconsole_subsys.su_mutex); return ret; @@ -1018,12 +1002,6 @@ static ssize_t sysdata_release_enabled_store(struct = config_item *item, if (release_enabled =3D=3D curr) goto unlock_ok; =20 - if (release_enabled && - count_extradata_entries(nt) >=3D MAX_EXTRADATA_ITEMS) { - ret =3D -ENOSPC; - goto unlock; - } - if (release_enabled) nt->sysdata_fields |=3D SYSDATA_RELEASE; else @@ -1031,7 +1009,6 @@ static ssize_t sysdata_release_enabled_store(struct c= onfig_item *item, =20 unlock_ok: ret =3D strnlen(buf, count); -unlock: mutex_unlock(&dynamic_netconsole_mutex); mutex_unlock(&netconsole_subsys.su_mutex); return ret; @@ -1054,12 +1031,6 @@ static ssize_t sysdata_taskname_enabled_store(struct= config_item *item, if (taskname_enabled =3D=3D curr) goto unlock_ok; =20 - if (taskname_enabled && - count_extradata_entries(nt) >=3D MAX_EXTRADATA_ITEMS) { - ret =3D -ENOSPC; - goto unlock; - } - if (taskname_enabled) nt->sysdata_fields |=3D SYSDATA_TASKNAME; else @@ -1067,7 +1038,6 @@ static ssize_t sysdata_taskname_enabled_store(struct = config_item *item, =20 unlock_ok: ret =3D strnlen(buf, count); -unlock: mutex_unlock(&dynamic_netconsole_mutex); mutex_unlock(&netconsole_subsys.su_mutex); return ret; @@ -1092,27 +1062,16 @@ static ssize_t sysdata_cpu_nr_enabled_store(struct = config_item *item, /* no change requested */ goto unlock_ok; =20 - if (cpu_nr_enabled && - count_extradata_entries(nt) >=3D MAX_EXTRADATA_ITEMS) { - /* user wants the new feature, but there is no space in the - * buffer. - */ - ret =3D -ENOSPC; - goto unlock; - } - if (cpu_nr_enabled) nt->sysdata_fields |=3D SYSDATA_CPU_NR; else - /* This is special because extradata_complete might have - * remaining data from previous sysdata, and it needs to be - * cleaned. + /* This is special because sysdata might have remaining data + * from previous sysdata, and it needs to be cleaned. */ disable_sysdata_feature(nt, SYSDATA_CPU_NR); =20 unlock_ok: ret =3D strnlen(buf, count); -unlock: mutex_unlock(&dynamic_netconsole_mutex); mutex_unlock(&netconsole_subsys.su_mutex); return ret; @@ -1156,7 +1115,7 @@ static struct config_item *userdatum_make_item(struct= config_group *group, =20 ud =3D to_userdata(&group->cg_item); nt =3D userdata_to_target(ud); - if (count_extradata_entries(nt) >=3D MAX_EXTRADATA_ITEMS) + if (count_userdata_entries(nt) >=3D MAX_USERDATA_ITEMS) return ERR_PTR(-ENOSPC); =20 udm =3D kzalloc(sizeof(*udm), GFP_KERNEL); @@ -1363,22 +1322,21 @@ static void populate_configfs_item(struct netconsol= e_target *nt, =20 static int sysdata_append_cpu_nr(struct netconsole_target *nt, int offset) { - /* Append cpu=3D%d at extradata_complete after userdata str */ - return scnprintf(&nt->extradata_complete[offset], + return scnprintf(&nt->sysdata[offset], MAX_EXTRADATA_ENTRY_LEN, " cpu=3D%u\n", raw_smp_processor_id()); } =20 static int sysdata_append_taskname(struct netconsole_target *nt, int offse= t) { - return scnprintf(&nt->extradata_complete[offset], + return scnprintf(&nt->sysdata[offset], MAX_EXTRADATA_ENTRY_LEN, " taskname=3D%s\n", current->comm); } =20 static int sysdata_append_release(struct netconsole_target *nt, int offset) { - return scnprintf(&nt->extradata_complete[offset], + return scnprintf(&nt->sysdata[offset], MAX_EXTRADATA_ENTRY_LEN, " release=3D%s\n", init_utsname()->release); } @@ -1386,46 +1344,36 @@ static int sysdata_append_release(struct netconsole= _target *nt, int offset) static int sysdata_append_msgid(struct netconsole_target *nt, int offset) { wrapping_assign_add(nt->msgcounter, 1); - return scnprintf(&nt->extradata_complete[offset], + return scnprintf(&nt->sysdata[offset], MAX_EXTRADATA_ENTRY_LEN, " msgid=3D%u\n", nt->msgcounter); } =20 /* - * prepare_extradata - append sysdata at extradata_complete in runtime + * prepare_sysdata - append sysdata in runtime * @nt: target to send message to */ -static int prepare_extradata(struct netconsole_target *nt) +static int prepare_sysdata(struct netconsole_target *nt) { - int extradata_len; - - /* userdata was appended when configfs write helper was called - * by update_userdata(). - */ - extradata_len =3D nt->userdata_length; + int sysdata_len =3D 0; =20 if (!nt->sysdata_fields) goto out; =20 if (nt->sysdata_fields & SYSDATA_CPU_NR) - extradata_len +=3D sysdata_append_cpu_nr(nt, extradata_len); + sysdata_len +=3D sysdata_append_cpu_nr(nt, sysdata_len); if (nt->sysdata_fields & SYSDATA_TASKNAME) - extradata_len +=3D sysdata_append_taskname(nt, extradata_len); + sysdata_len +=3D sysdata_append_taskname(nt, sysdata_len); if (nt->sysdata_fields & SYSDATA_RELEASE) - extradata_len +=3D sysdata_append_release(nt, extradata_len); + sysdata_len +=3D sysdata_append_release(nt, sysdata_len); if (nt->sysdata_fields & SYSDATA_MSGID) - extradata_len +=3D sysdata_append_msgid(nt, extradata_len); + sysdata_len +=3D sysdata_append_msgid(nt, sysdata_len); =20 - WARN_ON_ONCE(extradata_len > - MAX_EXTRADATA_ENTRY_LEN * MAX_EXTRADATA_ITEMS); + WARN_ON_ONCE(sysdata_len > + MAX_EXTRADATA_ENTRY_LEN * MAX_SYSDATA_ITEMS); =20 out: - return extradata_len; -} -#else /* CONFIG_NETCONSOLE_DYNAMIC not set */ -static int prepare_extradata(struct netconsole_target *nt) -{ - return 0; + return sysdata_len; } #endif /* CONFIG_NETCONSOLE_DYNAMIC */ =20 @@ -1527,11 +1475,13 @@ static void send_msg_no_fragmentation(struct netcon= sole_target *nt, int msg_len, int release_len) { - const char *extradata =3D NULL; + const char *userdata =3D NULL; + const char *sysdata =3D NULL; const char *release; =20 #ifdef CONFIG_NETCONSOLE_DYNAMIC - extradata =3D nt->extradata_complete; + userdata =3D nt->userdata; + sysdata =3D nt->sysdata; #endif =20 if (release_len) { @@ -1543,10 +1493,15 @@ static void send_msg_no_fragmentation(struct netcon= sole_target *nt, memcpy(nt->buf, msg, msg_len); } =20 - if (extradata) + if (userdata) msg_len +=3D scnprintf(&nt->buf[msg_len], - MAX_PRINT_CHUNK - msg_len, - "%s", extradata); + MAX_PRINT_CHUNK - msg_len, "%s", + userdata); + + if (sysdata) + msg_len +=3D scnprintf(&nt->buf[msg_len], + MAX_PRINT_CHUNK - msg_len, "%s", + sysdata); =20 send_udp(nt, nt->buf, msg_len); } @@ -1561,33 +1516,45 @@ static void append_release(char *buf) =20 static void send_fragmented_body(struct netconsole_target *nt, const char *msgbody_ptr, int header_len, - int msgbody_len, int extradata_len) + int msgbody_len, int sysdata_len) { - const char *extradata_ptr =3D NULL; + const char *userdata_ptr =3D NULL; + const char *sysdata_ptr =3D NULL; int data_len, data_sent =3D 0; - int extradata_offset =3D 0; + int userdata_offset =3D 0; + int sysdata_offset =3D 0; int msgbody_offset =3D 0; + int userdata_len =3D 0; =20 #ifdef CONFIG_NETCONSOLE_DYNAMIC - extradata_ptr =3D nt->extradata_complete; + userdata_ptr =3D nt->userdata; + sysdata_ptr =3D nt->sysdata; + userdata_len =3D nt->userdata_length; #endif - if (WARN_ON_ONCE(!extradata_ptr && extradata_len !=3D 0)) + if (WARN_ON_ONCE(!userdata_ptr && userdata_len !=3D 0)) + return; + + if (WARN_ON_ONCE(!sysdata_ptr && sysdata_len !=3D 0)) return; =20 /* data_len represents the number of bytes that will be sent. This is * bigger than MAX_PRINT_CHUNK, thus, it will be split in multiple * packets */ - data_len =3D msgbody_len + extradata_len; + data_len =3D msgbody_len + userdata_len + sysdata_len; =20 /* In each iteration of the while loop below, we send a packet * containing the header and a portion of the data. The data is - * composed of two parts: msgbody and extradata. We keep track of how - * many bytes have been sent so far using the data_sent variable, which - * ranges from 0 to the total bytes to be sent. + * composed of three parts: msgbody, userdata, and sysdata. + * We keep track of how many bytes have been sent from each part using + * the *_offset variables. + * We keep track of how many bytes have been sent overall using the + * data_sent variable, which ranges from 0 to the total bytes to be + * sent. */ while (data_sent < data_len) { - int extradata_left =3D extradata_len - extradata_offset; + int userdata_left =3D userdata_len - userdata_offset; + int sysdata_left =3D sysdata_len - sysdata_offset; int msgbody_left =3D msgbody_len - msgbody_offset; int buf_offset =3D 0; int this_chunk =3D 0; @@ -1608,13 +1575,24 @@ static void send_fragmented_body(struct netconsole_= target *nt, buf_offset +=3D this_chunk; data_sent +=3D this_chunk; =20 - /* after msgbody, append extradata */ - if (extradata_ptr && extradata_left) { - this_chunk =3D min(extradata_left, + /* after msgbody, append userdata */ + if (userdata_ptr && userdata_left) { + this_chunk =3D min(userdata_left, MAX_PRINT_CHUNK - buf_offset); memcpy(nt->buf + buf_offset, - extradata_ptr + extradata_offset, this_chunk); - extradata_offset +=3D this_chunk; + userdata_ptr + userdata_offset, this_chunk); + userdata_offset +=3D this_chunk; + buf_offset +=3D this_chunk; + data_sent +=3D this_chunk; + } + + /* after userdata, append sysdata */ + if (sysdata_ptr && sysdata_left) { + this_chunk =3D min(sysdata_left, + MAX_PRINT_CHUNK - buf_offset); + memcpy(nt->buf + buf_offset, + sysdata_ptr + sysdata_offset, this_chunk); + sysdata_offset +=3D this_chunk; buf_offset +=3D this_chunk; data_sent +=3D this_chunk; } @@ -1631,7 +1609,7 @@ static void send_msg_fragmented(struct netconsole_tar= get *nt, const char *msg, int msg_len, int release_len, - int extradata_len) + int sysdata_len) { int header_len, msgbody_len; const char *msgbody; @@ -1660,7 +1638,7 @@ static void send_msg_fragmented(struct netconsole_tar= get *nt, * will be replaced */ send_fragmented_body(nt, msgbody, header_len, msgbody_len, - extradata_len); + sysdata_len); } =20 /** @@ -1676,19 +1654,22 @@ static void send_msg_fragmented(struct netconsole_t= arget *nt, static void send_ext_msg_udp(struct netconsole_target *nt, const char *msg, int msg_len) { + int userdata_len =3D 0; int release_len =3D 0; - int extradata_len; - - extradata_len =3D prepare_extradata(nt); + int sysdata_len =3D 0; =20 +#ifdef CONFIG_NETCONSOLE_DYNAMIC + sysdata_len =3D prepare_sysdata(nt); + userdata_len =3D nt->userdata_length; +#endif if (nt->release) release_len =3D strlen(init_utsname()->release) + 1; =20 - if (msg_len + release_len + extradata_len <=3D MAX_PRINT_CHUNK) + if (msg_len + release_len + sysdata_len + userdata_len <=3D MAX_PRINT_CHU= NK) return send_msg_no_fragmentation(nt, msg, msg_len, release_len); =20 return send_msg_fragmented(nt, msg, msg_len, release_len, - extradata_len); + sysdata_len); } =20 static void write_ext_msg(struct console *con, const char *msg, --=20 2.47.3 From nobody Tue Dec 2 02:05:57 2025 Received: from mail-wm1-f53.google.com (mail-wm1-f53.google.com [209.85.128.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id A7E5C1A9F86 for ; Thu, 20 Nov 2025 00:15:32 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.53 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763597735; cv=none; b=Ys68NmF/wTbd3DXbeEcbbCYAC8tByr2C8zMfQrfyKnorRy1zkzOLUGe2spI4CEZn6+dtbwPB3x4Z52++HQKnNx8zTRBgteNh41aa2I0OtAKuzYy1WrrlZzp/NWHCJ7/YBnXkM4JPEX4ZcXH4z/RR+xWszLm6AkzwCO3WxQqHc3k= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763597735; c=relaxed/simple; bh=kiLZnB7V3oRRKyDtpxL+bmJ91OS8alTGnIrM+Xg3Y10=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=dpkgjmuzgjxWxLdsqM9oWUaYsdexwwonUdjo32+lX7XWVkGDPfYN2BoXCIpoEtX8G2FgK8OG7ZdQvZrKGOn0dbEtvuOqqVohBAg4MdSb6mBwI46CXzbXF6377ZrnipgzH+GexpZYmn8wlEYsvBX/neFNlDHPaqMJZLOsSVOnFEg= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=PVdymMPL; arc=none smtp.client-ip=209.85.128.53 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="PVdymMPL" Received: by mail-wm1-f53.google.com with SMTP id 5b1f17b1804b1-47798089d30so41775e9.1 for ; Wed, 19 Nov 2025 16:15:32 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1763597731; x=1764202531; darn=vger.kernel.org; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:from:to:cc:subject:date:message-id :reply-to; bh=2vhVpii8LgsowqvzzxuLZsno7LX3ZQOMIJUlQ5i2ZhQ=; b=PVdymMPLRK3rYHMgVA9zo1XHncyicNba6T0wenwrtTxWfhMCp4XvccL6+u4W8ytXTb ocR5l8dFA1CR4phfYE/xnfI8gVI/LuoOZfvlHFu0LKWezunf51XyOT06YZj0bx6ELh2U oPikoXEuQ+P2x8j5mIEBM6+Uc6493o8UEOfkC8O9gOWgGkxKrliq39cKu/9yHVLnuiyY sYPDPeq/miTkO76B9G/xFUV5XYSiubfEl3vAsolQ4fxx2R2YYD+G1BvGDApOPHfhdSh0 9RFJsCcarfogSOeukRqwGdZnN+SJDVoEh+l9RKiRQeEZyx1vWUFSvqlBI6M6ARB2Yijx 9ZFg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1763597731; x=1764202531; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=2vhVpii8LgsowqvzzxuLZsno7LX3ZQOMIJUlQ5i2ZhQ=; b=PqasvckjAGaWU35oekXcR9kIui/Pa1OE/Sl0dfCZ0WzadctqKG82bhUZdf/o9WCWZY +xjHDaImV91KamI13Hklx/e/HI9W+ZmhsHLcH1WYCV+SM68dIEh/hXdK0CV7TdtYt6Az vb0DUxvtgARpgr6UziLKVHP9ONNph7QJZ4jj5HmpKqqIVENg0pPGCV1lAaTHgsxhb7sL ihFWwOxvxQ7PVFa1fN/ypcPd4inEjgRBWw8JeHUh5q778CkB3bL9MHGZ3YPCY05vVwZ7 9xCpWn/SIIvTrDWOGOdruPXM/oMjXF2cclJb8VLJcL+1DK06rojocS1V9b95rnUXKHMR n35Q== X-Forwarded-Encrypted: i=1; AJvYcCWirK6cnB/5/wCMYAe++ypbctpE0crjiQsU25NS5+n72BkxbKNmdhmV1i5GApC1PwldLSXV7zgny9XPA2g=@vger.kernel.org X-Gm-Message-State: AOJu0YwT5Sp4QY3XEojvJwFgbu6xB83E5pak2n3iBTdOMo69t8X/aLoX f7+JXw6ZlKDpRVMs2TPjMOOIfFRJwtzDTfzuNcXdXULB5zdSY8u/pk1j X-Gm-Gg: ASbGncvXgzqAy08fO0KV2TQ88D0MtAvxFzrYPv8TX78cC9/RFMryeIgJr6+olIgb56F UIWplmGzdV4eGpu7XVDiShD261ZlkaMLJUp0M35KMaESi8A/sKXXJ8XBIY9rwGObKCBi/Ur7fcM zhMroIGEgIktyVJo6+Xkfd8lqaubX7Ye8NJUudReuqX9vZqbrmH1QizM+4sppNEYxYkxidiGIav dfaqtDUgN7hzBNok1rpUZjlVU7UM9+/FD5VwKQ+ShtBXGCoyajmkg//moTw06EQ+HxCBb6pKKIO Dtwj924eCGRYOiiRbrJ3MMawAvL7rzN5zdLoV9FlKaJkpDHNl/DITof7nAhyCjFj7d8LtM6CONN B2g8mrnDcYpQpnJWS7K9TiYGNp97UByhH7GUdUbuwcIW/pc1R4uSX3+7nkMjF7f2tIeA+Q6kn7H 7BiZP0Ik/nmoUerEODCw/v4TfzlozLTUYjtRRZ X-Google-Smtp-Source: AGHT+IF2MRiH1UMlf7EeKR28jq1KCEB+qNGWKKavy66pwwS77hnOtqSMicugRf/j58+WJYPncLzdPQ== X-Received: by 2002:a05:600c:1d1d:b0:477:7a78:3000 with SMTP id 5b1f17b1804b1-477b8da2349mr5176775e9.6.1763597730861; Wed, 19 Nov 2025 16:15:30 -0800 (PST) Received: from localhost ([2a03:2880:31ff:5::]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-477b10804c8sm76579615e9.15.2025.11.19.16.15.29 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 19 Nov 2025 16:15:30 -0800 (PST) From: Gustavo Luiz Duarte Date: Wed, 19 Nov 2025 16:14:51 -0800 Subject: [PATCH net-next v3 3/4] netconsole: Dynamic allocation of userdata buffer Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20251119-netconsole_dynamic_extradata-v3-3-497ac3191707@meta.com> References: <20251119-netconsole_dynamic_extradata-v3-0-497ac3191707@meta.com> In-Reply-To: <20251119-netconsole_dynamic_extradata-v3-0-497ac3191707@meta.com> To: Breno Leitao , Andre Carvalho , Simon Horman , Andrew Lunn , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Shuah Khan Cc: netdev@vger.kernel.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, Gustavo Luiz Duarte X-Mailer: b4 0.13.0 The userdata buffer in struct netconsole_target is currently statically allocated with a size of MAX_USERDATA_ITEMS * MAX_EXTRADATA_ENTRY_LEN (16 * 256 =3D 4096 bytes). This wastes memory when userdata entries are not used or when only a few entries are configured, which is common in typical usage scenarios. It also forces us to keep MAX_USERDATA_ITEMS small to limit the memory wasted. Change the userdata buffer from a static array to a dynamically allocated pointer. The buffer is now allocated on-demand in update_userdata() whenever userdata entries are added, modified, or removed via configfs. The implementation calculates the exact size needed for all current userdata entries, allocates a new buffer of that size, formats the entries into it, and atomically swaps it with the old buffer. This approach provides several benefits: - Memory efficiency: Targets with no userdata use zero bytes instead of 4KB, and targets with userdata only allocate what they need; - Scalability: Makes it practical to increase MAX_USERDATA_ITEMS to a much larger value without imposing a fixed memory cost on every target; - No hot-path overhead: Allocation occurs during configuration (write to configfs), not during message transmission If memory allocation fails during userdata update, -ENOMEM is returned to userspace through the configfs attribute write operation. The sysdata buffer remains statically allocated since it has a smaller fixed size (MAX_SYSDATA_ITEMS * MAX_EXTRADATA_ENTRY_LEN =3D 4 * 256 =3D 1024 bytes) and its content length is less predictable. Signed-off-by: Gustavo Luiz Duarte --- drivers/net/netconsole.c | 100 +++++++++++++++++++++++++++++++++----------= ---- 1 file changed, 70 insertions(+), 30 deletions(-) diff --git a/drivers/net/netconsole.c b/drivers/net/netconsole.c index 1bd811714322..0b350f82d915 100644 --- a/drivers/net/netconsole.c +++ b/drivers/net/netconsole.c @@ -155,7 +155,7 @@ struct netconsole_target { #ifdef CONFIG_NETCONSOLE_DYNAMIC struct config_group group; struct config_group userdata_group; - char userdata[MAX_EXTRADATA_ENTRY_LEN * MAX_USERDATA_ITEMS]; + char *userdata; size_t userdata_length; char sysdata[MAX_EXTRADATA_ENTRY_LEN * MAX_SYSDATA_ITEMS]; =20 @@ -875,45 +875,77 @@ static ssize_t userdatum_value_show(struct config_ite= m *item, char *buf) return sysfs_emit(buf, "%s\n", &(to_userdatum(item)->value[0])); } =20 -static void update_userdata(struct netconsole_target *nt) +/* Navigate configfs and calculate the lentgh of the formatted string + * representing userdata. + * Must be called holding netconsole_subsys.su_mutex + */ +static int calc_userdata_len(struct netconsole_target *nt) { + struct userdatum *udm_item; + struct config_item *item; struct list_head *entry; - int child_count =3D 0; - unsigned long flags; + int len =3D 0; =20 - spin_lock_irqsave(&target_list_lock, flags); + list_for_each(entry, &nt->userdata_group.cg_children) { + item =3D container_of(entry, struct config_item, ci_entry); + udm_item =3D to_userdatum(item); + /* Skip userdata with no value set */ + if (udm_item->value[0]) { + len +=3D snprintf(NULL, 0, " %s=3D%s\n", item->ci_name, + udm_item->value); + } + } + return len; +} =20 - /* Clear the current string in case the last userdatum was deleted */ - nt->userdata_length =3D 0; - nt->userdata[0] =3D 0; +static int update_userdata(struct netconsole_target *nt) +{ + struct userdatum *udm_item; + struct config_item *item; + struct list_head *entry; + char *old_buf =3D NULL; + char *new_buf =3D NULL; + unsigned long flags; + int offset =3D 0; + int len; =20 - list_for_each(entry, &nt->userdata_group.cg_children) { - struct userdatum *udm_item; - struct config_item *item; + /* Calculate required buffer size */ + len =3D calc_userdata_len(nt); =20 - if (child_count >=3D MAX_USERDATA_ITEMS) { - spin_unlock_irqrestore(&target_list_lock, flags); - WARN_ON_ONCE(1); - return; - } - child_count++; + if (WARN_ON_ONCE(len > MAX_EXTRADATA_ENTRY_LEN * MAX_USERDATA_ITEMS)) + return -ENOSPC; + + /* Allocate new buffer */ + if (len) { + new_buf =3D kmalloc(len + 1, GFP_KERNEL); + if (!new_buf) + return -ENOMEM; + } =20 + /* Write userdata to new buffer */ + list_for_each(entry, &nt->userdata_group.cg_children) { item =3D container_of(entry, struct config_item, ci_entry); udm_item =3D to_userdatum(item); - /* Skip userdata with no value set */ - if (strnlen(udm_item->value, MAX_EXTRADATA_VALUE_LEN) =3D=3D 0) - continue; - - /* This doesn't overflow userdata since it will write - * one entry length (1/MAX_USERDATA_ITEMS long), entry count is - * checked to not exceed MAX items with child_count above - */ - nt->userdata_length +=3D scnprintf(&nt->userdata[nt->userdata_length], - MAX_EXTRADATA_ENTRY_LEN, " %s=3D%s\n", - item->ci_name, udm_item->value); + if (udm_item->value[0]) { + offset +=3D scnprintf(&new_buf[offset], len + 1 - offset, + " %s=3D%s\n", item->ci_name, + udm_item->value); + } } + + WARN_ON_ONCE(offset !=3D len); + + /* Switch to new buffer and free old buffer */ + spin_lock_irqsave(&target_list_lock, flags); + old_buf =3D nt->userdata; + nt->userdata =3D new_buf; + nt->userdata_length =3D offset; spin_unlock_irqrestore(&target_list_lock, flags); + + kfree(old_buf); + + return 0; } =20 static ssize_t userdatum_value_store(struct config_item *item, const char = *buf, @@ -937,7 +969,9 @@ static ssize_t userdatum_value_store(struct config_item= *item, const char *buf, =20 ud =3D to_userdata(item->ci_parent); nt =3D userdata_to_target(ud); - update_userdata(nt); + ret =3D update_userdata(nt); + if (ret < 0) + goto out_unlock; ret =3D count; out_unlock: mutex_unlock(&dynamic_netconsole_mutex); @@ -1193,7 +1227,10 @@ static struct configfs_attribute *netconsole_target_= attrs[] =3D { =20 static void netconsole_target_release(struct config_item *item) { - kfree(to_target(item)); + struct netconsole_target *nt =3D to_target(item); + + kfree(nt->userdata); + kfree(nt); } =20 static struct configfs_item_operations netconsole_target_item_ops =3D { @@ -1874,6 +1911,9 @@ static struct netconsole_target *alloc_param_target(c= har *target_config, static void free_param_target(struct netconsole_target *nt) { netpoll_cleanup(&nt->np); +#ifdef CONFIG_NETCONSOLE_DYNAMIC + kfree(nt->userdata); +#endif kfree(nt); } =20 --=20 2.47.3 From nobody Tue Dec 2 02:05:57 2025 Received: from mail-wm1-f47.google.com (mail-wm1-f47.google.com [209.85.128.47]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 1051D1ADC7E for ; Thu, 20 Nov 2025 00:15:33 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.47 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763597735; cv=none; b=Vmyg4QfJlws5LsAgHFLLN2H7wGVTO4jDm9FCZwnd4EKh0jzG6EY+WJ2IzScE6jB7dc29a9Dt+7qPdqVxyW9b4apfbX/uLJoeOpz072ETaJiBx0hoUGThFOmHv/PU2jmX1rknMS2hNYUdC4kjm3UezM3qEQ3Tsn7pWBolC69lJSY= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763597735; c=relaxed/simple; bh=OJ5QWhtiskGythM7vc6Jd6M853ak+vqQdxx02P1aSSg=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=f7+r32gFA+8eFwArmEvvKI2+P/E1laEEuQbYz2aGZkLJ1zv7lABWVhxeKFc0K1r5ucfs3n5udnNl+Dm5ooVN+l8Wd+WeztwkOCTcR9RNXNJOyTWbKOl55XQDKz+64l/iGM3cC9O/8vCdVz1Wquxg1pAPa6BaIpkIFEZqHMuz3NE= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=MDyG4RTk; arc=none smtp.client-ip=209.85.128.47 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="MDyG4RTk" Received: by mail-wm1-f47.google.com with SMTP id 5b1f17b1804b1-4779b49d724so561125e9.0 for ; Wed, 19 Nov 2025 16:15:33 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1763597732; x=1764202532; darn=vger.kernel.org; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:from:to:cc:subject:date:message-id :reply-to; bh=SayxfPvE/g0bojag9Jh1IjbEk4cTOITTJ9rniJCmzdw=; b=MDyG4RTkla1NVM2/ZkWxecCIwg68QHNaq5SRT2t3FXNxMMC92WvTSSGn1hgcz68pCl 7q1tmID5BPsVDC8Dy6yG9tdClOV+c6LjwNAr4DkSyCr1arey10jrRVcASfJAMNh3YLed VwWFVph2PH6I7BWQZDmQhWYT9/vWS3kBE0q5c/sagrGv+WJc5h98bW7MlYBmN9PDAR+C /2NkFmgdlIKPfLv7HgZqaYjMK4FcpB7kKC9JEfzx5WaXRLhhnCIE9H+rZwlM90LceYvh 42aCqzSrAwxG30cp1dzNFiHlJpgHtbMcHGSmyVVGdj5HAJlwFsug/ZE1CoAL88FEFEIJ Kfaw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1763597732; x=1764202532; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=SayxfPvE/g0bojag9Jh1IjbEk4cTOITTJ9rniJCmzdw=; b=lO1njXsU8hbUgszgp+c2P9u/xGPKiVlM9gJ7qbMbcsLyfsbejoRmbFSq70FkIMrMKF BZBL95/BKptkR6nJaUj7lAtmoOw9nHlSwY9fZpM0/QNv9+d564ouNb7Eg6DdIJVeETjD OWucHPZv+ZJQEEj+6jqCOpwy8MDuJlaeTKSKBi4xOgg5HlZWf+krrpWLvCnNcTRZ9C24 GVWDT4/JxIwur2DLZE1w208GElndC3BpaxcpEQ6itzUg+suGpMI+2VefhnnuxRKwiAUp P/qlrPmGOxYqqL84FPB8409oWHtXjtSIkqAi/5M8wYpoDkY1RGVWRjzuRWr2zfS4kXd8 NrQw== X-Forwarded-Encrypted: i=1; AJvYcCU0edYi9h3BHcLwhUwPQSnl+tBX5Wz0Q8PdNbrhSSdYdu+AlbOhzrlnRXDTIGCQPOIfIeUotG2EPjvhgu8=@vger.kernel.org X-Gm-Message-State: AOJu0Yx0XTUur6/iuxM38ixSPOpoR4YRiIAPqxiJOhmTHhnqyID5iTgF C8T0fjIFi0cLgF8pqBLlyn6bnAfn9MBKQcEr76o75KT50vKApcU0+T0e X-Gm-Gg: ASbGnctPJcKCET6KSZmhYmxiXC9Ey73Ic0HufMcz+pfiCEx9DBub5N8CXjTEuTTOFLG BbbtWn++QdZX8ltODu6tgHWYU2CzKaGJa6WEwz4LxZH/1WOsHBOa0TNaPD25JdqqWOqFLS9apd5 qQSDT52AksYakgwxXFqilTxcmqlL7rOUaHxzqE6u0fZ3P46vVbloHnu/4Xc0EwxNluE8f+AV3yz fDIILftOdr4vDLM55znvwnk2GzfFGcLHeiEErTP9OyOZmylDGeimkgPrb2lpQg9eg+kxOiQX3f7 dh/0t7oeyUTp0fl75WLuVjkOcbNgG8DQ43O8UfjB+0VCEwxxCrSJ7TErg0tZTQBKNlTQn8qV9oN Rbm0PtQ6D5we2iBeRS2gdreHBQU20191jPovVzE/LFWnhmH5rOoFZ+QEE3d0re7wYsdnsIwcqho /rIUSv5L5MAZ8vnVex82z21C1/5smWMD7ROAzeOg== X-Google-Smtp-Source: AGHT+IEzBZnPtD+MWg+C98wu/ohpL3j6Un+ABjFCUid0HHBT6AkRjqh+tjh65yJWqV45+5XdzYdJ2Q== X-Received: by 2002:a5d:584f:0:b0:429:bc3b:499d with SMTP id ffacd0b85a97d-42cb9a6a91emr262740f8f.6.1763597732189; Wed, 19 Nov 2025 16:15:32 -0800 (PST) Received: from localhost ([2a03:2880:31ff:43::]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-42cb7f2e574sm1897907f8f.3.2025.11.19.16.15.31 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 19 Nov 2025 16:15:31 -0800 (PST) From: Gustavo Luiz Duarte Date: Wed, 19 Nov 2025 16:14:52 -0800 Subject: [PATCH net-next v3 4/4] netconsole: Increase MAX_USERDATA_ITEMS Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20251119-netconsole_dynamic_extradata-v3-4-497ac3191707@meta.com> References: <20251119-netconsole_dynamic_extradata-v3-0-497ac3191707@meta.com> In-Reply-To: <20251119-netconsole_dynamic_extradata-v3-0-497ac3191707@meta.com> To: Breno Leitao , Andre Carvalho , Simon Horman , Andrew Lunn , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Shuah Khan Cc: netdev@vger.kernel.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, Gustavo Luiz Duarte X-Mailer: b4 0.13.0 Increase MAX_USERDATA_ITEMS from 16 to 256 entries now that the userdata buffer is allocated dynamically. The previous limit of 16 was necessary because the buffer was statically allocated for all targets. With dynamic allocation, we can support more entries without wasting memory on targets that don't use userdata. This allows users to attach more metadata to their netconsole messages, which is useful for complex debugging and logging scenarios. Also update the testcase accordingly. Signed-off-by: Gustavo Luiz Duarte Reviewed-by: Breno Leitao --- drivers/net/netconsole.c | 2 +- tools/testing/selftests/drivers/net/netcons_overflow.sh | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/drivers/net/netconsole.c b/drivers/net/netconsole.c index 0b350f82d9156..9cb4dfc242f5f 100644 --- a/drivers/net/netconsole.c +++ b/drivers/net/netconsole.c @@ -50,7 +50,7 @@ MODULE_LICENSE("GPL"); /* The number 3 comes from userdata entry format characters (' ', '=3D', '= \n') */ #define MAX_EXTRADATA_NAME_LEN (MAX_EXTRADATA_ENTRY_LEN - \ MAX_EXTRADATA_VALUE_LEN - 3) -#define MAX_USERDATA_ITEMS 16 +#define MAX_USERDATA_ITEMS 256 #define MAX_PRINT_CHUNK 1000 =20 static char config[MAX_PARAM_LENGTH]; diff --git a/tools/testing/selftests/drivers/net/netcons_overflow.sh b/tool= s/testing/selftests/drivers/net/netcons_overflow.sh index 29bad56448a24..06089643b7716 100755 --- a/tools/testing/selftests/drivers/net/netcons_overflow.sh +++ b/tools/testing/selftests/drivers/net/netcons_overflow.sh @@ -15,7 +15,7 @@ SCRIPTDIR=3D$(dirname "$(readlink -e "${BASH_SOURCE[0]}")= ") =20 source "${SCRIPTDIR}"/lib/sh/lib_netcons.sh # This is coming from netconsole code. Check for it in drivers/net/netcons= ole.c -MAX_USERDATA_ITEMS=3D16 +MAX_USERDATA_ITEMS=3D256 =20 # Function to create userdata entries function create_userdata_max_entries() { --=20 2.47.3