1998-09-12 22:03:21 +00:00
|
|
|
/*
|
The new ipfw code.
This code makes use of variable-size kernel representation of rules
(exactly the same concept of BPF instructions, as used in the BSDI's
firewall), which makes firewall operation a lot faster, and the
code more readable and easier to extend and debug.
The interface with the rest of the system is unchanged, as witnessed
by this commit. The only extra kernel files that I am touching
are if_fw.h and ip_dummynet.c, which is quite tied to ipfw. In
userland I only had to touch those programs which manipulate the
internal representation of firewall rules).
The code is almost entirely new (and I believe I have written the
vast majority of those sections which were taken from the former
ip_fw.c), so rather than modifying the old ip_fw.c I decided to
create a new file, sys/netinet/ip_fw2.c . Same for the user
interface, which is in sbin/ipfw/ipfw2.c (it still compiles to
/sbin/ipfw). The old files are still there, and will be removed
in due time.
I have not renamed the header file because it would have required
touching a one-line change to a number of kernel files.
In terms of user interface, the new "ipfw" is supposed to accepts
the old syntax for ipfw rules (and produce the same output with
"ipfw show". Only a couple of the old options (out of some 30 of
them) has not been implemented, but they will be soon.
On the other hand, the new code has some very powerful extensions.
First, you can put "or" connectives between match fields (and soon
also between options), and write things like
ipfw add allow ip from { 1.2.3.4/27 or 5.6.7.8/30 } 10-23,25,1024-3000 to any
This should make rulesets slightly more compact (and lines longer!),
by condensing 2 or more of the old rules into single ones.
Also, as an example of how easy the rules can be extended, I have
implemented an 'address set' match pattern, where you can specify
an IP address in a format like this:
10.20.30.0/26{18,44,33,22,9}
which will match the set of hosts listed in braces belonging to the
subnet 10.20.30.0/26 . The match is done using a bitmap, so it is
essentially a constant time operation requiring a handful of CPU
instructions (and a very small amount of memmory -- for a full /24
subnet, the instruction only consumes 40 bytes).
Again, in this commit I have focused on functionality and tried
to minimize changes to the other parts of the system. Some performance
improvement can be achieved with minor changes to the interface of
ip_fw_chk_t. This will be done later when this code is settled.
The code is meant to compile unmodified on RELENG_4 (once the
PACKET_TAG_* changes have been merged), for this reason
you will see #ifdef __FreeBSD_version in a couple of places.
This should minimize errors when (hopefully soon) it will be time
to do the MFC.
2002-06-27 23:02:18 +00:00
|
|
|
* Copyright (c) 1998-2002 Luigi Rizzo, Universita` di Pisa
|
2000-01-08 11:24:46 +00:00
|
|
|
* Portions Copyright (c) 2000 Akamba Corp.
|
|
|
|
* All rights reserved
|
1998-09-12 22:03:21 +00:00
|
|
|
*
|
2000-01-08 11:24:46 +00:00
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
1998-09-12 22:03:21 +00:00
|
|
|
*
|
2000-01-08 11:24:46 +00:00
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
1998-09-12 22:03:21 +00:00
|
|
|
*
|
1999-08-28 01:08:13 +00:00
|
|
|
* $FreeBSD$
|
1998-09-12 22:03:21 +00:00
|
|
|
*/
|
|
|
|
|
2000-01-08 11:24:46 +00:00
|
|
|
#define DEB(x)
|
|
|
|
#define DDB(x) x
|
|
|
|
|
1998-09-12 22:03:21 +00:00
|
|
|
/*
|
|
|
|
* This module implements IP dummynet, a bandwidth limiter/delay emulator
|
|
|
|
* used in conjunction with the ipfw package.
|
2001-01-22 23:04:13 +00:00
|
|
|
* Description of the data structures used is in ip_dummynet.h
|
|
|
|
* Here you mainly find the following blocks of code:
|
|
|
|
* + variable declarations;
|
|
|
|
* + heap management functions;
|
|
|
|
* + scheduler and dummynet functions;
|
|
|
|
* + configuration and initialization.
|
|
|
|
*
|
|
|
|
* NOTA BENE: critical sections are protected by splimp()/splx()
|
|
|
|
* pairs. One would think that splnet() is enough as for most of
|
|
|
|
* the netinet code, but it is not so because when used with
|
|
|
|
* bridging, dummynet is invoked at splimp().
|
1998-09-12 22:03:21 +00:00
|
|
|
*
|
2000-01-08 11:24:46 +00:00
|
|
|
* Most important Changes:
|
1998-09-12 22:03:21 +00:00
|
|
|
*
|
2001-10-05 05:45:27 +00:00
|
|
|
* 011004: KLDable
|
2001-01-26 06:49:34 +00:00
|
|
|
* 010124: Fixed WF2Q behaviour
|
2001-01-22 23:04:13 +00:00
|
|
|
* 010122: Fixed spl protection.
|
2001-01-26 06:49:34 +00:00
|
|
|
* 000601: WF2Q support
|
2000-01-08 11:24:46 +00:00
|
|
|
* 000106: large rewrite, use heaps to handle very many pipes.
|
1998-09-12 22:03:21 +00:00
|
|
|
* 980513: initial release
|
2000-01-08 11:24:46 +00:00
|
|
|
*
|
|
|
|
* include files marked with XXX are probably not needed
|
1998-09-12 22:03:21 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/systm.h>
|
|
|
|
#include <sys/malloc.h>
|
|
|
|
#include <sys/mbuf.h>
|
|
|
|
#include <sys/kernel.h>
|
1999-04-20 13:32:06 +00:00
|
|
|
#include <sys/module.h>
|
2001-09-26 21:53:20 +00:00
|
|
|
#include <sys/proc.h>
|
1998-09-12 22:03:21 +00:00
|
|
|
#include <sys/socket.h>
|
1998-12-14 18:09:13 +00:00
|
|
|
#include <sys/socketvar.h>
|
1998-09-12 22:03:21 +00:00
|
|
|
#include <sys/time.h>
|
|
|
|
#include <sys/sysctl.h>
|
|
|
|
#include <net/if.h>
|
|
|
|
#include <net/route.h>
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <netinet/in_systm.h>
|
|
|
|
#include <netinet/in_var.h>
|
|
|
|
#include <netinet/ip.h>
|
|
|
|
#include <netinet/ip_fw.h>
|
|
|
|
#include <netinet/ip_dummynet.h>
|
1999-01-12 12:27:54 +00:00
|
|
|
#include <netinet/ip_var.h>
|
1998-09-12 22:03:21 +00:00
|
|
|
|
|
|
|
#include <netinet/if_ether.h> /* for struct arpcom */
|
|
|
|
#include <net/bridge.h>
|
|
|
|
|
2000-01-08 11:24:46 +00:00
|
|
|
/*
|
2000-06-08 09:45:23 +00:00
|
|
|
* We keep a private variable for the simulation time, but we could
|
|
|
|
* probably use an existing one ("softticks" in sys/kern/kern_timer.c)
|
2000-01-08 11:24:46 +00:00
|
|
|
*/
|
|
|
|
static dn_key curr_time = 0 ; /* current simulation time */
|
|
|
|
|
|
|
|
static int dn_hash_size = 64 ; /* default hash size */
|
|
|
|
|
|
|
|
/* statistics on number of queue searches and search steps */
|
|
|
|
static int searches, search_steps ;
|
2001-01-26 06:49:34 +00:00
|
|
|
static int pipe_expire = 1 ; /* expire queue if empty */
|
2000-06-08 09:45:23 +00:00
|
|
|
static int dn_max_ratio = 16 ; /* max queues/buckets ratio */
|
2000-01-08 11:24:46 +00:00
|
|
|
|
2000-06-08 09:45:23 +00:00
|
|
|
static int red_lookup_depth = 256; /* RED - default lookup table depth */
|
|
|
|
static int red_avg_pkt_size = 512; /* RED - default medium packet size */
|
|
|
|
static int red_max_pkt_size = 1500; /* RED - default max packet size */
|
|
|
|
|
|
|
|
/*
|
2001-01-26 06:49:34 +00:00
|
|
|
* Three heaps contain queues and pipes that the scheduler handles:
|
|
|
|
*
|
|
|
|
* ready_heap contains all dn_flow_queue related to fixed-rate pipes.
|
|
|
|
*
|
|
|
|
* wfq_ready_heap contains the pipes associated with WF2Q flows
|
|
|
|
*
|
|
|
|
* extract_heap contains pipes associated with delay lines.
|
|
|
|
*
|
2000-06-08 09:45:23 +00:00
|
|
|
*/
|
2001-10-05 05:45:27 +00:00
|
|
|
|
|
|
|
MALLOC_DEFINE(M_DUMMYNET, "dummynet", "dummynet heap");
|
|
|
|
|
2000-06-08 09:45:23 +00:00
|
|
|
static struct dn_heap ready_heap, extract_heap, wfq_ready_heap ;
|
2001-01-26 06:49:34 +00:00
|
|
|
|
2000-01-08 11:24:46 +00:00
|
|
|
static int heap_init(struct dn_heap *h, int size) ;
|
|
|
|
static int heap_insert (struct dn_heap *h, dn_key key1, void *p);
|
2000-06-08 09:45:23 +00:00
|
|
|
static void heap_extract(struct dn_heap *h, void *obj);
|
2001-01-26 06:49:34 +00:00
|
|
|
|
2000-01-08 11:24:46 +00:00
|
|
|
static void transmit_event(struct dn_pipe *pipe);
|
|
|
|
static void ready_event(struct dn_flow_queue *q);
|
|
|
|
|
1998-09-12 22:03:21 +00:00
|
|
|
static struct dn_pipe *all_pipes = NULL ; /* list of all pipes */
|
2000-06-08 09:45:23 +00:00
|
|
|
static struct dn_flow_set *all_flow_sets = NULL ;/* list of all flow_sets */
|
1998-09-12 22:03:21 +00:00
|
|
|
|
2001-10-05 05:45:27 +00:00
|
|
|
static struct callout_handle dn_timeout;
|
|
|
|
|
1998-09-12 22:03:21 +00:00
|
|
|
#ifdef SYSCTL_NODE
|
2000-01-08 11:24:46 +00:00
|
|
|
SYSCTL_NODE(_net_inet_ip, OID_AUTO, dummynet,
|
|
|
|
CTLFLAG_RW, 0, "Dummynet");
|
|
|
|
SYSCTL_INT(_net_inet_ip_dummynet, OID_AUTO, hash_size,
|
2000-02-10 14:17:40 +00:00
|
|
|
CTLFLAG_RW, &dn_hash_size, 0, "Default hash table size");
|
2000-01-08 11:24:46 +00:00
|
|
|
SYSCTL_INT(_net_inet_ip_dummynet, OID_AUTO, curr_time,
|
|
|
|
CTLFLAG_RD, &curr_time, 0, "Current tick");
|
|
|
|
SYSCTL_INT(_net_inet_ip_dummynet, OID_AUTO, ready_heap,
|
|
|
|
CTLFLAG_RD, &ready_heap.size, 0, "Size of ready heap");
|
|
|
|
SYSCTL_INT(_net_inet_ip_dummynet, OID_AUTO, extract_heap,
|
|
|
|
CTLFLAG_RD, &extract_heap.size, 0, "Size of extract heap");
|
|
|
|
SYSCTL_INT(_net_inet_ip_dummynet, OID_AUTO, searches,
|
|
|
|
CTLFLAG_RD, &searches, 0, "Number of queue searches");
|
|
|
|
SYSCTL_INT(_net_inet_ip_dummynet, OID_AUTO, search_steps,
|
|
|
|
CTLFLAG_RD, &search_steps, 0, "Number of queue search steps");
|
2000-02-10 14:17:40 +00:00
|
|
|
SYSCTL_INT(_net_inet_ip_dummynet, OID_AUTO, expire,
|
|
|
|
CTLFLAG_RW, &pipe_expire, 0, "Expire queue if empty");
|
2000-06-08 09:45:23 +00:00
|
|
|
SYSCTL_INT(_net_inet_ip_dummynet, OID_AUTO, max_chain_len,
|
2002-12-15 10:24:36 +00:00
|
|
|
CTLFLAG_RW, &dn_max_ratio, 0,
|
2000-06-08 09:45:23 +00:00
|
|
|
"Max ratio between dynamic queues and buckets");
|
|
|
|
SYSCTL_INT(_net_inet_ip_dummynet, OID_AUTO, red_lookup_depth,
|
|
|
|
CTLFLAG_RD, &red_lookup_depth, 0, "Depth of RED lookup table");
|
|
|
|
SYSCTL_INT(_net_inet_ip_dummynet, OID_AUTO, red_avg_pkt_size,
|
|
|
|
CTLFLAG_RD, &red_avg_pkt_size, 0, "RED Medium packet size");
|
|
|
|
SYSCTL_INT(_net_inet_ip_dummynet, OID_AUTO, red_max_pkt_size,
|
|
|
|
CTLFLAG_RD, &red_max_pkt_size, 0, "RED Max packet size");
|
1998-09-12 22:03:21 +00:00
|
|
|
#endif
|
|
|
|
|
2000-06-08 09:45:23 +00:00
|
|
|
static int config_pipe(struct dn_pipe *p);
|
1998-12-14 18:09:13 +00:00
|
|
|
static int ip_dn_ctl(struct sockopt *sopt);
|
1998-09-12 22:03:21 +00:00
|
|
|
|
1999-01-11 11:08:07 +00:00
|
|
|
static void rt_unref(struct rtentry *);
|
1999-01-12 12:27:54 +00:00
|
|
|
static void dummynet(void *);
|
|
|
|
static void dummynet_flush(void);
|
2000-06-08 09:45:23 +00:00
|
|
|
void dummynet_drain(void);
|
Remove (almost all) global variables that were used to hold
packet forwarding state ("annotations") during ip processing.
The code is considerably cleaner now.
The variables removed by this change are:
ip_divert_cookie used by divert sockets
ip_fw_fwd_addr used for transparent ip redirection
last_pkt used by dynamic pipes in dummynet
Removal of the first two has been done by carrying the annotations
into volatile structs prepended to the mbuf chains, and adding
appropriate code to add/remove annotations in the routines which
make use of them, i.e. ip_input(), ip_output(), tcp_input(),
bdg_forward(), ether_demux(), ether_output_frame(), div_output().
On passing, remove a bug in divert handling of fragmented packet.
Now it is the fragment at offset 0 which sets the divert status of
the whole packet, whereas formerly it was the last incoming fragment
to decide.
Removal of last_pkt required a change in the interface of ip_fw_chk()
and dummynet_io(). On passing, use the same mechanism for dummynet
annotations and for divert/forward annotations.
option IPFIREWALL_FORWARD is effectively useless, the code to
implement it is very small and is now in by default to avoid the
obfuscation of conditionally compiled code.
NOTES:
* there is at least one global variable left, sro_fwd, in ip_output().
I am not sure if/how this can be removed.
* I have deliberately avoided gratuitous style changes in this commit
to avoid cluttering the diffs. Minor stule cleanup will likely be
necessary
* this commit only focused on the IP layer. I am sure there is a
number of global variables used in the TCP and maybe UDP stack.
* despite the number of files touched, there are absolutely no API's
or data structures changed by this commit (except the interfaces of
ip_fw_chk() and dummynet_io(), which are internal anyways), so
an MFC is quite safe and unintrusive (and desirable, given the
improved readability of the code).
MFC after: 10 days
2002-06-22 11:51:02 +00:00
|
|
|
static ip_dn_io_t dummynet_io;
|
2001-11-04 22:56:25 +00:00
|
|
|
static void dn_rule_delete(void *);
|
1998-09-12 22:03:21 +00:00
|
|
|
|
2001-01-26 06:49:34 +00:00
|
|
|
int if_tx_rdy(struct ifnet *ifp);
|
|
|
|
|
1999-01-11 11:08:07 +00:00
|
|
|
static void
|
|
|
|
rt_unref(struct rtentry *rt)
|
|
|
|
{
|
|
|
|
if (rt == NULL)
|
|
|
|
return ;
|
|
|
|
if (rt->rt_refcnt <= 0)
|
2002-12-24 13:45:24 +00:00
|
|
|
printf("dummynet: warning, refcnt now %ld, decreasing\n",
|
|
|
|
rt->rt_refcnt);
|
1999-01-11 11:08:07 +00:00
|
|
|
RTFREE(rt);
|
|
|
|
}
|
|
|
|
|
1998-09-12 22:03:21 +00:00
|
|
|
/*
|
2000-01-08 11:24:46 +00:00
|
|
|
* Heap management functions.
|
|
|
|
*
|
|
|
|
* In the heap, first node is element 0. Children of i are 2i+1 and 2i+2.
|
|
|
|
* Some macros help finding parent/children so we can optimize them.
|
2000-02-10 14:17:40 +00:00
|
|
|
*
|
2000-01-08 11:24:46 +00:00
|
|
|
* heap_init() is called to expand the heap when needed.
|
2000-06-08 09:45:23 +00:00
|
|
|
* Increment size in blocks of 16 entries.
|
2000-01-08 11:24:46 +00:00
|
|
|
* XXX failure to allocate a new element is a pretty bad failure
|
|
|
|
* as we basically stall a whole queue forever!!
|
|
|
|
* Returns 1 on error, 0 on success
|
1998-09-12 22:03:21 +00:00
|
|
|
*/
|
2000-01-08 11:24:46 +00:00
|
|
|
#define HEAP_FATHER(x) ( ( (x) - 1 ) / 2 )
|
|
|
|
#define HEAP_LEFT(x) ( 2*(x) + 1 )
|
|
|
|
#define HEAP_IS_LEFT(x) ( (x) & 1 )
|
2000-06-08 09:45:23 +00:00
|
|
|
#define HEAP_RIGHT(x) ( 2*(x) + 2 )
|
2000-01-08 11:24:46 +00:00
|
|
|
#define HEAP_SWAP(a, b, buffer) { buffer = a ; a = b ; b = buffer ; }
|
2000-06-08 09:45:23 +00:00
|
|
|
#define HEAP_INCREMENT 15
|
2000-01-08 11:24:46 +00:00
|
|
|
|
|
|
|
static int
|
|
|
|
heap_init(struct dn_heap *h, int new_size)
|
2002-12-15 10:24:36 +00:00
|
|
|
{
|
2000-01-08 11:24:46 +00:00
|
|
|
struct dn_heap_entry *p;
|
|
|
|
|
|
|
|
if (h->size >= new_size ) {
|
2002-12-24 13:45:24 +00:00
|
|
|
printf("dummynet: heap_init, Bogus call, have %d want %d\n",
|
2000-01-08 11:24:46 +00:00
|
|
|
h->size, new_size);
|
|
|
|
return 0 ;
|
2002-12-15 10:24:36 +00:00
|
|
|
}
|
2000-01-08 11:24:46 +00:00
|
|
|
new_size = (new_size + HEAP_INCREMENT ) & ~HEAP_INCREMENT ;
|
2002-12-15 10:21:30 +00:00
|
|
|
p = malloc(new_size * sizeof(*p), M_DUMMYNET, M_NOWAIT);
|
2000-01-08 11:24:46 +00:00
|
|
|
if (p == NULL) {
|
2002-12-24 13:45:24 +00:00
|
|
|
printf("dummynet: heap_init, resize %d failed\n", new_size );
|
2000-01-08 11:24:46 +00:00
|
|
|
return 1 ; /* error */
|
|
|
|
}
|
|
|
|
if (h->size > 0) {
|
|
|
|
bcopy(h->p, p, h->size * sizeof(*p) );
|
2001-10-05 05:45:27 +00:00
|
|
|
free(h->p, M_DUMMYNET);
|
1998-09-12 22:03:21 +00:00
|
|
|
}
|
2000-01-08 11:24:46 +00:00
|
|
|
h->p = p ;
|
|
|
|
h->size = new_size ;
|
|
|
|
return 0 ;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Insert element in heap. Normally, p != NULL, we insert p in
|
|
|
|
* a new position and bubble up. If p == NULL, then the element is
|
|
|
|
* already in place, and key is the position where to start the
|
|
|
|
* bubble-up.
|
|
|
|
* Returns 1 on failure (cannot allocate new heap entry)
|
2000-06-08 09:45:23 +00:00
|
|
|
*
|
|
|
|
* If offset > 0 the position (index, int) of the element in the heap is
|
|
|
|
* also stored in the element itself at the given offset in bytes.
|
2000-01-08 11:24:46 +00:00
|
|
|
*/
|
2000-06-08 09:45:23 +00:00
|
|
|
#define SET_OFFSET(heap, node) \
|
|
|
|
if (heap->offset > 0) \
|
|
|
|
*((int *)((char *)(heap->p[node].object) + heap->offset)) = node ;
|
2001-01-22 23:04:13 +00:00
|
|
|
/*
|
|
|
|
* RESET_OFFSET is used for sanity checks. It sets offset to an invalid value.
|
|
|
|
*/
|
|
|
|
#define RESET_OFFSET(heap, node) \
|
|
|
|
if (heap->offset > 0) \
|
2001-11-04 22:56:25 +00:00
|
|
|
*((int *)((char *)(heap->p[node].object) + heap->offset)) = -1 ;
|
2000-01-08 11:24:46 +00:00
|
|
|
static int
|
|
|
|
heap_insert(struct dn_heap *h, dn_key key1, void *p)
|
2002-12-15 10:24:36 +00:00
|
|
|
{
|
2000-01-08 11:24:46 +00:00
|
|
|
int son = h->elements ;
|
|
|
|
|
|
|
|
if (p == NULL) /* data already there, set starting point */
|
|
|
|
son = key1 ;
|
|
|
|
else { /* insert new element at the end, possibly resize */
|
|
|
|
son = h->elements ;
|
|
|
|
if (son == h->size) /* need resize... */
|
|
|
|
if (heap_init(h, h->elements+1) )
|
|
|
|
return 1 ; /* failure... */
|
|
|
|
h->p[son].object = p ;
|
|
|
|
h->p[son].key = key1 ;
|
|
|
|
h->elements++ ;
|
|
|
|
}
|
|
|
|
while (son > 0) { /* bubble up */
|
|
|
|
int father = HEAP_FATHER(son) ;
|
|
|
|
struct dn_heap_entry tmp ;
|
|
|
|
|
|
|
|
if (DN_KEY_LT( h->p[father].key, h->p[son].key ) )
|
2002-12-15 10:24:36 +00:00
|
|
|
break ; /* found right position */
|
2000-06-08 09:45:23 +00:00
|
|
|
/* son smaller than father, swap and repeat */
|
2000-01-08 11:24:46 +00:00
|
|
|
HEAP_SWAP(h->p[son], h->p[father], tmp) ;
|
2000-06-08 09:45:23 +00:00
|
|
|
SET_OFFSET(h, son);
|
2000-01-08 11:24:46 +00:00
|
|
|
son = father ;
|
|
|
|
}
|
2000-06-08 09:45:23 +00:00
|
|
|
SET_OFFSET(h, son);
|
2000-01-08 11:24:46 +00:00
|
|
|
return 0 ;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2000-06-08 09:45:23 +00:00
|
|
|
* remove top element from heap, or obj if obj != NULL
|
2000-01-08 11:24:46 +00:00
|
|
|
*/
|
|
|
|
static void
|
2000-06-08 09:45:23 +00:00
|
|
|
heap_extract(struct dn_heap *h, void *obj)
|
2002-12-15 10:24:36 +00:00
|
|
|
{
|
2000-01-08 11:24:46 +00:00
|
|
|
int child, father, max = h->elements - 1 ;
|
2000-06-08 09:45:23 +00:00
|
|
|
|
2001-01-26 06:49:34 +00:00
|
|
|
if (max < 0) {
|
2002-12-24 13:45:24 +00:00
|
|
|
printf("dummynet: warning, extract from empty heap 0x%p\n", h);
|
2000-01-08 11:24:46 +00:00
|
|
|
return ;
|
2001-01-26 06:49:34 +00:00
|
|
|
}
|
2000-06-08 09:45:23 +00:00
|
|
|
father = 0 ; /* default: move up smallest child */
|
|
|
|
if (obj != NULL) { /* extract specific element, index is at offset */
|
2001-01-26 06:49:34 +00:00
|
|
|
if (h->offset <= 0)
|
2002-12-24 13:45:24 +00:00
|
|
|
panic("dummynet: heap_extract from middle not supported on this heap!!!\n");
|
2000-06-08 09:45:23 +00:00
|
|
|
father = *((int *)((char *)obj + h->offset)) ;
|
2001-01-22 23:04:13 +00:00
|
|
|
if (father < 0 || father >= h->elements) {
|
|
|
|
printf("dummynet: heap_extract, father %d out of bound 0..%d\n",
|
|
|
|
father, h->elements);
|
2002-12-24 13:45:24 +00:00
|
|
|
panic("dummynet: heap_extract");
|
2001-01-22 23:04:13 +00:00
|
|
|
}
|
2000-06-08 09:45:23 +00:00
|
|
|
}
|
2001-01-26 06:49:34 +00:00
|
|
|
RESET_OFFSET(h, father);
|
2000-01-08 11:24:46 +00:00
|
|
|
child = HEAP_LEFT(father) ; /* left child */
|
|
|
|
while (child <= max) { /* valid entry */
|
|
|
|
if (child != max && DN_KEY_LT(h->p[child+1].key, h->p[child].key) )
|
|
|
|
child = child+1 ; /* take right child, otherwise left */
|
|
|
|
h->p[father] = h->p[child] ;
|
2000-06-08 09:45:23 +00:00
|
|
|
SET_OFFSET(h, father);
|
2000-01-08 11:24:46 +00:00
|
|
|
father = child ;
|
|
|
|
child = HEAP_LEFT(child) ; /* left child for next loop */
|
2002-12-15 10:24:36 +00:00
|
|
|
}
|
2000-01-08 11:24:46 +00:00
|
|
|
h->elements-- ;
|
|
|
|
if (father != max) {
|
1998-09-12 22:03:21 +00:00
|
|
|
/*
|
2000-01-08 11:24:46 +00:00
|
|
|
* Fill hole with last entry and bubble up, reusing the insert code
|
1998-09-12 22:03:21 +00:00
|
|
|
*/
|
2000-01-08 11:24:46 +00:00
|
|
|
h->p[father] = h->p[max] ;
|
|
|
|
heap_insert(h, father, NULL); /* this one cannot fail */
|
2001-01-26 06:49:34 +00:00
|
|
|
}
|
2002-12-15 10:24:36 +00:00
|
|
|
}
|
1998-09-12 22:03:21 +00:00
|
|
|
|
2001-02-02 00:18:00 +00:00
|
|
|
#if 0
|
2000-06-08 09:45:23 +00:00
|
|
|
/*
|
|
|
|
* change object position and update references
|
2001-02-02 00:18:00 +00:00
|
|
|
* XXX this one is never used!
|
2000-06-08 09:45:23 +00:00
|
|
|
*/
|
|
|
|
static void
|
|
|
|
heap_move(struct dn_heap *h, dn_key new_key, void *object)
|
|
|
|
{
|
|
|
|
int temp;
|
|
|
|
int i ;
|
|
|
|
int max = h->elements-1 ;
|
|
|
|
struct dn_heap_entry buf ;
|
|
|
|
|
|
|
|
if (h->offset <= 0)
|
|
|
|
panic("cannot move items on this heap");
|
|
|
|
|
|
|
|
i = *((int *)((char *)object + h->offset));
|
|
|
|
if (DN_KEY_LT(new_key, h->p[i].key) ) { /* must move up */
|
|
|
|
h->p[i].key = new_key ;
|
|
|
|
for (; i>0 && DN_KEY_LT(new_key, h->p[(temp = HEAP_FATHER(i))].key) ;
|
|
|
|
i = temp ) { /* bubble up */
|
|
|
|
HEAP_SWAP(h->p[i], h->p[temp], buf) ;
|
|
|
|
SET_OFFSET(h, i);
|
|
|
|
}
|
|
|
|
} else { /* must move down */
|
|
|
|
h->p[i].key = new_key ;
|
|
|
|
while ( (temp = HEAP_LEFT(i)) <= max ) { /* found left child */
|
|
|
|
if ((temp != max) && DN_KEY_GT(h->p[temp].key, h->p[temp+1].key))
|
|
|
|
temp++ ; /* select child with min key */
|
|
|
|
if (DN_KEY_GT(new_key, h->p[temp].key)) { /* go down */
|
|
|
|
HEAP_SWAP(h->p[i], h->p[temp], buf) ;
|
|
|
|
SET_OFFSET(h, i);
|
|
|
|
} else
|
|
|
|
break ;
|
|
|
|
i = temp ;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
SET_OFFSET(h, i);
|
|
|
|
}
|
2001-02-02 00:18:00 +00:00
|
|
|
#endif /* heap_move, unused */
|
2000-06-08 09:45:23 +00:00
|
|
|
|
2000-01-08 11:24:46 +00:00
|
|
|
/*
|
|
|
|
* heapify() will reorganize data inside an array to maintain the
|
|
|
|
* heap property. It is needed when we delete a bunch of entries.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
heapify(struct dn_heap *h)
|
|
|
|
{
|
2000-06-08 09:45:23 +00:00
|
|
|
int i ;
|
1998-09-12 22:03:21 +00:00
|
|
|
|
2000-06-08 09:45:23 +00:00
|
|
|
for (i = 0 ; i < h->elements ; i++ )
|
|
|
|
heap_insert(h, i , NULL) ;
|
2001-01-16 23:49:49 +00:00
|
|
|
}
|
2000-06-08 09:45:23 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* cleanup the heap and free data structure
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
heap_free(struct dn_heap *h)
|
|
|
|
{
|
|
|
|
if (h->size >0 )
|
2001-10-05 05:45:27 +00:00
|
|
|
free(h->p, M_DUMMYNET);
|
2001-01-26 06:49:34 +00:00
|
|
|
bzero(h, sizeof(*h) );
|
2000-01-08 11:24:46 +00:00
|
|
|
}
|
2000-06-08 09:45:23 +00:00
|
|
|
|
2000-01-08 11:24:46 +00:00
|
|
|
/*
|
|
|
|
* --- end of heap management functions ---
|
|
|
|
*/
|
1998-09-12 22:03:21 +00:00
|
|
|
|
2000-01-08 11:24:46 +00:00
|
|
|
/*
|
2000-06-08 09:45:23 +00:00
|
|
|
* Scheduler functions:
|
2000-01-08 11:24:46 +00:00
|
|
|
*
|
|
|
|
* transmit_event() is called when the delay-line needs to enter
|
|
|
|
* the scheduler, either because of existing pkts getting ready,
|
|
|
|
* or new packets entering the queue. The event handled is the delivery
|
|
|
|
* time of the packet.
|
|
|
|
*
|
2000-06-08 09:45:23 +00:00
|
|
|
* ready_event() does something similar with fixed-rate queues, and the
|
2000-01-08 11:24:46 +00:00
|
|
|
* event handled is the finish time of the head pkt.
|
|
|
|
*
|
2001-01-26 06:49:34 +00:00
|
|
|
* wfq_ready_event() does something similar with WF2Q queues, and the
|
2000-06-08 09:45:23 +00:00
|
|
|
* event handled is the start time of the head pkt.
|
|
|
|
*
|
|
|
|
* In all cases, we make sure that the data structures are consistent
|
2000-01-08 11:24:46 +00:00
|
|
|
* before passing pkts out, because this might trigger recursive
|
|
|
|
* invocations of the procedures.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
transmit_event(struct dn_pipe *pipe)
|
|
|
|
{
|
|
|
|
struct dn_pkt *pkt ;
|
|
|
|
|
2000-06-08 09:45:23 +00:00
|
|
|
while ( (pkt = pipe->head) && DN_KEY_LEQ(pkt->output_time, curr_time) ) {
|
1998-09-12 22:03:21 +00:00
|
|
|
/*
|
2000-01-08 11:24:46 +00:00
|
|
|
* first unlink, then call procedures, since ip_input() can invoke
|
|
|
|
* ip_output() and viceversa, thus causing nested calls
|
1998-09-12 22:03:21 +00:00
|
|
|
*/
|
2000-06-08 09:45:23 +00:00
|
|
|
pipe->head = DN_NEXT(pkt) ;
|
1998-09-12 22:03:21 +00:00
|
|
|
|
|
|
|
/*
|
2000-01-08 11:24:46 +00:00
|
|
|
* The actual mbuf is preceded by a struct dn_pkt, resembling an mbuf
|
|
|
|
* (NOT A REAL one, just a small block of malloc'ed memory) with
|
Remove (almost all) global variables that were used to hold
packet forwarding state ("annotations") during ip processing.
The code is considerably cleaner now.
The variables removed by this change are:
ip_divert_cookie used by divert sockets
ip_fw_fwd_addr used for transparent ip redirection
last_pkt used by dynamic pipes in dummynet
Removal of the first two has been done by carrying the annotations
into volatile structs prepended to the mbuf chains, and adding
appropriate code to add/remove annotations in the routines which
make use of them, i.e. ip_input(), ip_output(), tcp_input(),
bdg_forward(), ether_demux(), ether_output_frame(), div_output().
On passing, remove a bug in divert handling of fragmented packet.
Now it is the fragment at offset 0 which sets the divert status of
the whole packet, whereas formerly it was the last incoming fragment
to decide.
Removal of last_pkt required a change in the interface of ip_fw_chk()
and dummynet_io(). On passing, use the same mechanism for dummynet
annotations and for divert/forward annotations.
option IPFIREWALL_FORWARD is effectively useless, the code to
implement it is very small and is now in by default to avoid the
obfuscation of conditionally compiled code.
NOTES:
* there is at least one global variable left, sro_fwd, in ip_output().
I am not sure if/how this can be removed.
* I have deliberately avoided gratuitous style changes in this commit
to avoid cluttering the diffs. Minor stule cleanup will likely be
necessary
* this commit only focused on the IP layer. I am sure there is a
number of global variables used in the TCP and maybe UDP stack.
* despite the number of files touched, there are absolutely no API's
or data structures changed by this commit (except the interfaces of
ip_fw_chk() and dummynet_io(), which are internal anyways), so
an MFC is quite safe and unintrusive (and desirable, given the
improved readability of the code).
MFC after: 10 days
2002-06-22 11:51:02 +00:00
|
|
|
* m_type = MT_TAG, m_flags = PACKET_TAG_DUMMYNET
|
|
|
|
* dn_m (m_next) = actual mbuf to be processed by ip_input/output
|
2000-01-08 11:24:46 +00:00
|
|
|
* and some other fields.
|
|
|
|
* The block IS FREED HERE because it contains parameters passed
|
|
|
|
* to the called routine.
|
1998-09-12 22:03:21 +00:00
|
|
|
*/
|
|
|
|
switch (pkt->dn_dir) {
|
2000-01-08 11:24:46 +00:00
|
|
|
case DN_TO_IP_OUT:
|
2002-10-16 01:54:46 +00:00
|
|
|
(void)ip_output((struct mbuf *)pkt, NULL, NULL, 0, NULL, NULL);
|
2000-01-08 11:24:46 +00:00
|
|
|
rt_unref (pkt->ro.ro_rt) ;
|
1998-09-12 22:03:21 +00:00
|
|
|
break ;
|
2000-01-08 11:24:46 +00:00
|
|
|
|
1998-09-12 22:03:21 +00:00
|
|
|
case DN_TO_IP_IN :
|
|
|
|
ip_input((struct mbuf *)pkt) ;
|
|
|
|
break ;
|
2000-01-08 11:24:46 +00:00
|
|
|
|
2001-10-05 05:45:27 +00:00
|
|
|
case DN_TO_BDG_FWD :
|
2001-11-04 22:56:25 +00:00
|
|
|
if (!BDG_LOADED) {
|
|
|
|
/* somebody unloaded the bridge module. Drop pkt */
|
2002-12-24 13:45:24 +00:00
|
|
|
printf("dummynet: dropping bridged packet trapped in pipe\n");
|
2001-11-04 22:56:25 +00:00
|
|
|
m_freem(pkt->dn_m);
|
2002-05-13 10:37:19 +00:00
|
|
|
break;
|
|
|
|
} /* fallthrough */
|
|
|
|
case DN_TO_ETH_DEMUX:
|
|
|
|
{
|
2001-11-04 22:56:25 +00:00
|
|
|
struct mbuf *m = (struct mbuf *)pkt ;
|
2000-05-14 02:18:43 +00:00
|
|
|
|
2001-10-05 05:45:27 +00:00
|
|
|
if (pkt->dn_m->m_len < ETHER_HDR_LEN &&
|
|
|
|
(pkt->dn_m = m_pullup(pkt->dn_m, ETHER_HDR_LEN)) == NULL) {
|
|
|
|
printf("dummynet/bridge: pullup fail, dropping pkt\n");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
/*
|
2001-11-04 22:56:25 +00:00
|
|
|
* bdg_forward() wants a pointer to the pseudo-mbuf-header, but
|
|
|
|
* on return it will supply the pointer to the actual packet
|
2001-10-05 05:45:27 +00:00
|
|
|
* (originally pkt->dn_m, but could be something else now) if
|
|
|
|
* it has not consumed it.
|
|
|
|
*/
|
2002-05-13 10:37:19 +00:00
|
|
|
if (pkt->dn_dir == DN_TO_BDG_FWD) {
|
2002-11-14 23:46:04 +00:00
|
|
|
m = bdg_forward_ptr(m, pkt->ifp);
|
2002-05-13 10:37:19 +00:00
|
|
|
if (m)
|
|
|
|
m_freem(m);
|
|
|
|
} else
|
2002-11-14 23:46:04 +00:00
|
|
|
ether_demux(NULL, m); /* which consumes the mbuf */
|
1999-05-04 07:30:08 +00:00
|
|
|
}
|
1998-09-12 22:03:21 +00:00
|
|
|
break ;
|
2002-05-13 10:37:19 +00:00
|
|
|
case DN_TO_ETH_OUT:
|
|
|
|
ether_output_frame(pkt->ifp, (struct mbuf *)pkt);
|
|
|
|
break;
|
|
|
|
|
1998-09-12 22:03:21 +00:00
|
|
|
default:
|
|
|
|
printf("dummynet: bad switch %d!\n", pkt->dn_dir);
|
|
|
|
m_freem(pkt->dn_m);
|
|
|
|
break ;
|
|
|
|
}
|
2001-11-04 22:56:25 +00:00
|
|
|
free(pkt, M_DUMMYNET);
|
1998-09-12 22:03:21 +00:00
|
|
|
}
|
2000-01-08 11:24:46 +00:00
|
|
|
/* if there are leftover packets, put into the heap for next event */
|
2000-06-08 09:45:23 +00:00
|
|
|
if ( (pkt = pipe->head) )
|
2000-01-08 11:24:46 +00:00
|
|
|
heap_insert(&extract_heap, pkt->output_time, pipe ) ;
|
|
|
|
/* XXX should check errors on heap_insert, by draining the
|
|
|
|
* whole pipe p and hoping in the future we are more successful
|
|
|
|
*/
|
1998-09-12 22:03:21 +00:00
|
|
|
}
|
2000-01-08 11:24:46 +00:00
|
|
|
|
2000-06-08 09:45:23 +00:00
|
|
|
/*
|
|
|
|
* the following macro computes how many ticks we have to wait
|
|
|
|
* before being able to transmit a packet. The credit is taken from
|
|
|
|
* either a pipe (WF2Q) or a flow_queue (per-flow queueing)
|
|
|
|
*/
|
|
|
|
#define SET_TICKS(pkt, q, p) \
|
|
|
|
(pkt->dn_m->m_pkthdr.len*8*hz - (q)->numbytes + p->bandwidth - 1 ) / \
|
|
|
|
p->bandwidth ;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* extract pkt from queue, compute output time (could be now)
|
|
|
|
* and put into delay line (p_queue)
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
move_pkt(struct dn_pkt *pkt, struct dn_flow_queue *q,
|
|
|
|
struct dn_pipe *p, int len)
|
|
|
|
{
|
|
|
|
q->head = DN_NEXT(pkt) ;
|
|
|
|
q->len-- ;
|
|
|
|
q->len_bytes -= len ;
|
|
|
|
|
|
|
|
pkt->output_time = curr_time + p->delay ;
|
|
|
|
|
|
|
|
if (p->head == NULL)
|
|
|
|
p->head = pkt;
|
|
|
|
else
|
|
|
|
DN_NEXT(p->tail) = pkt;
|
|
|
|
p->tail = pkt;
|
|
|
|
DN_NEXT(p->tail) = NULL;
|
|
|
|
}
|
|
|
|
|
1998-09-12 22:03:21 +00:00
|
|
|
/*
|
2000-01-08 11:24:46 +00:00
|
|
|
* ready_event() is invoked every time the queue must enter the
|
|
|
|
* scheduler, either because the first packet arrives, or because
|
|
|
|
* a previously scheduled event fired.
|
|
|
|
* On invokation, drain as many pkts as possible (could be 0) and then
|
|
|
|
* if there are leftover packets reinsert the pkt in the scheduler.
|
1998-09-12 22:03:21 +00:00
|
|
|
*/
|
2000-01-08 11:24:46 +00:00
|
|
|
static void
|
|
|
|
ready_event(struct dn_flow_queue *q)
|
1998-09-12 22:03:21 +00:00
|
|
|
{
|
2000-01-08 11:24:46 +00:00
|
|
|
struct dn_pkt *pkt;
|
2000-06-08 09:45:23 +00:00
|
|
|
struct dn_pipe *p = q->fs->pipe ;
|
|
|
|
int p_was_empty ;
|
|
|
|
|
|
|
|
if (p == NULL) {
|
2002-12-24 13:45:24 +00:00
|
|
|
printf("dummynet: ready_event- pipe is gone\n");
|
2000-06-08 09:45:23 +00:00
|
|
|
return ;
|
|
|
|
}
|
|
|
|
p_was_empty = (p->head == NULL) ;
|
1998-09-12 22:03:21 +00:00
|
|
|
|
2001-01-16 23:49:49 +00:00
|
|
|
/*
|
2000-06-08 09:45:23 +00:00
|
|
|
* schedule fixed-rate queues linked to this pipe:
|
|
|
|
* Account for the bw accumulated since last scheduling, then
|
|
|
|
* drain as many pkts as allowed by q->numbytes and move to
|
|
|
|
* the delay line (in p) computing output time.
|
|
|
|
* bandwidth==0 (no limit) means we can drain the whole queue,
|
|
|
|
* setting len_scaled = 0 does the job.
|
2001-01-16 23:49:49 +00:00
|
|
|
*/
|
2000-06-08 09:45:23 +00:00
|
|
|
q->numbytes += ( curr_time - q->sched_time ) * p->bandwidth;
|
|
|
|
while ( (pkt = q->head) != NULL ) {
|
|
|
|
int len = pkt->dn_m->m_pkthdr.len;
|
|
|
|
int len_scaled = p->bandwidth ? len*8*hz : 0 ;
|
2000-01-08 11:24:46 +00:00
|
|
|
if (len_scaled > q->numbytes )
|
|
|
|
break ;
|
|
|
|
q->numbytes -= len_scaled ;
|
2000-06-08 09:45:23 +00:00
|
|
|
move_pkt(pkt, q, p, len);
|
1998-09-12 22:03:21 +00:00
|
|
|
}
|
2000-01-08 11:24:46 +00:00
|
|
|
/*
|
|
|
|
* If we have more packets queued, schedule next ready event
|
|
|
|
* (can only occur when bandwidth != 0, otherwise we would have
|
|
|
|
* flushed the whole queue in the previous loop).
|
2000-06-08 09:45:23 +00:00
|
|
|
* To this purpose we record the current time and compute how many
|
|
|
|
* ticks to go for the finish time of the packet.
|
2000-01-08 11:24:46 +00:00
|
|
|
*/
|
2000-06-08 09:45:23 +00:00
|
|
|
if ( (pkt = q->head) != NULL ) { /* this implies bandwidth != 0 */
|
|
|
|
dn_key t = SET_TICKS(pkt, q, p); /* ticks i have to wait */
|
|
|
|
q->sched_time = curr_time ;
|
2000-01-08 11:24:46 +00:00
|
|
|
heap_insert(&ready_heap, curr_time + t, (void *)q );
|
|
|
|
/* XXX should check errors on heap_insert, and drain the whole
|
|
|
|
* queue on error hoping next time we are luckier.
|
|
|
|
*/
|
2003-03-27 14:56:36 +00:00
|
|
|
} else { /* RED needs to know when the queue becomes empty */
|
2000-06-08 09:45:23 +00:00
|
|
|
q->q_time = curr_time;
|
2003-03-27 14:56:36 +00:00
|
|
|
q->numbytes = 0;
|
|
|
|
}
|
2000-06-08 09:45:23 +00:00
|
|
|
/*
|
|
|
|
* If the delay line was empty call transmit_event(p) now.
|
|
|
|
* Otherwise, the scheduler will take care of it.
|
|
|
|
*/
|
|
|
|
if (p_was_empty)
|
|
|
|
transmit_event(p);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Called when we can transmit packets on WF2Q queues. Take pkts out of
|
|
|
|
* the queues at their start time, and enqueue into the delay line.
|
|
|
|
* Packets are drained until p->numbytes < 0. As long as
|
|
|
|
* len_scaled >= p->numbytes, the packet goes into the delay line
|
|
|
|
* with a deadline p->delay. For the last packet, if p->numbytes<0,
|
|
|
|
* there is an additional delay.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
ready_event_wfq(struct dn_pipe *p)
|
|
|
|
{
|
|
|
|
int p_was_empty = (p->head == NULL) ;
|
|
|
|
struct dn_heap *sch = &(p->scheduler_heap);
|
2001-01-26 06:49:34 +00:00
|
|
|
struct dn_heap *neh = &(p->not_eligible_heap) ;
|
2000-06-08 09:45:23 +00:00
|
|
|
|
|
|
|
if (p->if_name[0] == 0) /* tx clock is simulated */
|
|
|
|
p->numbytes += ( curr_time - p->sched_time ) * p->bandwidth;
|
|
|
|
else { /* tx clock is for real, the ifq must be empty or this is a NOP */
|
|
|
|
if (p->ifp && p->ifp->if_snd.ifq_head != NULL)
|
|
|
|
return ;
|
|
|
|
else {
|
2002-12-24 13:45:24 +00:00
|
|
|
DEB(printf("dummynet: pipe %d ready from %s --\n",
|
2000-06-08 09:45:23 +00:00
|
|
|
p->pipe_nr, p->if_name);)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2001-01-26 06:49:34 +00:00
|
|
|
/*
|
|
|
|
* While we have backlogged traffic AND credit, we need to do
|
|
|
|
* something on the queue.
|
|
|
|
*/
|
2001-02-02 00:18:00 +00:00
|
|
|
while ( p->numbytes >=0 && (sch->elements>0 || neh->elements >0) ) {
|
2001-01-26 06:49:34 +00:00
|
|
|
if (sch->elements > 0) { /* have some eligible pkts to send out */
|
|
|
|
struct dn_flow_queue *q = sch->p[0].object ;
|
2002-12-15 10:24:36 +00:00
|
|
|
struct dn_pkt *pkt = q->head;
|
|
|
|
struct dn_flow_set *fs = q->fs;
|
2001-01-26 06:49:34 +00:00
|
|
|
u_int64_t len = pkt->dn_m->m_pkthdr.len;
|
|
|
|
int len_scaled = p->bandwidth ? len*8*hz : 0 ;
|
|
|
|
|
|
|
|
heap_extract(sch, NULL); /* remove queue from heap */
|
|
|
|
p->numbytes -= len_scaled ;
|
|
|
|
move_pkt(pkt, q, p, len);
|
|
|
|
|
|
|
|
p->V += (len<<MY_M) / p->sum ; /* update V */
|
|
|
|
q->S = q->F ; /* update start time */
|
|
|
|
if (q->len == 0) { /* Flow not backlogged any more */
|
|
|
|
fs->backlogged-- ;
|
|
|
|
heap_insert(&(p->idle_heap), q->F, q);
|
|
|
|
} else { /* still backlogged */
|
|
|
|
/*
|
|
|
|
* update F and position in backlogged queue, then
|
|
|
|
* put flow in not_eligible_heap (we will fix this later).
|
|
|
|
*/
|
|
|
|
len = (q->head)->dn_m->m_pkthdr.len;
|
|
|
|
q->F += (len<<MY_M)/(u_int64_t) fs->weight ;
|
2001-02-02 00:18:00 +00:00
|
|
|
if (DN_KEY_LEQ(q->S, p->V))
|
|
|
|
heap_insert(neh, q->S, q);
|
|
|
|
else
|
|
|
|
heap_insert(sch, q->F, q);
|
2001-01-26 06:49:34 +00:00
|
|
|
}
|
2000-06-08 09:45:23 +00:00
|
|
|
}
|
2001-02-02 00:18:00 +00:00
|
|
|
/*
|
|
|
|
* now compute V = max(V, min(S_i)). Remember that all elements in sch
|
|
|
|
* have by definition S_i <= V so if sch is not empty, V is surely
|
|
|
|
* the max and we must not update it. Conversely, if sch is empty
|
|
|
|
* we only need to look at neh.
|
|
|
|
*/
|
|
|
|
if (sch->elements == 0 && neh->elements > 0)
|
|
|
|
p->V = MAX64 ( p->V, neh->p[0].key );
|
|
|
|
/* move from neh to sch any packets that have become eligible */
|
2000-06-08 09:45:23 +00:00
|
|
|
while (neh->elements > 0 && DN_KEY_LEQ(neh->p[0].key, p->V) ) {
|
2001-01-26 06:49:34 +00:00
|
|
|
struct dn_flow_queue *q = neh->p[0].object ;
|
2000-06-08 09:45:23 +00:00
|
|
|
heap_extract(neh, NULL);
|
2001-01-26 06:49:34 +00:00
|
|
|
heap_insert(sch, q->F, q);
|
2000-06-08 09:45:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (p->if_name[0] != '\0') {/* tx clock is from a real thing */
|
|
|
|
p->numbytes = -1 ; /* mark not ready for I/O */
|
|
|
|
break ;
|
|
|
|
}
|
|
|
|
}
|
2001-02-02 00:18:00 +00:00
|
|
|
if (sch->elements == 0 && neh->elements == 0 && p->numbytes >= 0
|
|
|
|
&& p->idle_heap.elements > 0) {
|
2001-01-26 06:49:34 +00:00
|
|
|
/*
|
|
|
|
* no traffic and no events scheduled. We can get rid of idle-heap.
|
|
|
|
*/
|
|
|
|
int i ;
|
|
|
|
|
|
|
|
for (i = 0 ; i < p->idle_heap.elements ; i++) {
|
|
|
|
struct dn_flow_queue *q = p->idle_heap.p[i].object ;
|
|
|
|
|
|
|
|
q->F = 0 ;
|
|
|
|
q->S = q->F + 1 ;
|
|
|
|
}
|
|
|
|
p->sum = 0 ;
|
|
|
|
p->V = 0 ;
|
|
|
|
p->idle_heap.elements = 0 ;
|
|
|
|
}
|
2000-06-08 09:45:23 +00:00
|
|
|
/*
|
|
|
|
* If we are getting clocks from dummynet (not a real interface) and
|
|
|
|
* If we are under credit, schedule the next ready event.
|
|
|
|
* Also fix the delivery time of the last packet.
|
|
|
|
*/
|
|
|
|
if (p->if_name[0]==0 && p->numbytes < 0) { /* this implies bandwidth >0 */
|
|
|
|
dn_key t=0 ; /* number of ticks i have to wait */
|
|
|
|
|
|
|
|
if (p->bandwidth > 0)
|
|
|
|
t = ( p->bandwidth -1 - p->numbytes) / p->bandwidth ;
|
|
|
|
p->tail->output_time += t ;
|
|
|
|
p->sched_time = curr_time ;
|
|
|
|
heap_insert(&wfq_ready_heap, curr_time + t, (void *)p);
|
|
|
|
/* XXX should check errors on heap_insert, and drain the whole
|
|
|
|
* queue on error hoping next time we are luckier.
|
|
|
|
*/
|
2000-01-08 11:24:46 +00:00
|
|
|
}
|
2000-02-04 16:45:33 +00:00
|
|
|
/*
|
|
|
|
* If the delay line was empty call transmit_event(p) now.
|
|
|
|
* Otherwise, the scheduler will take care of it.
|
|
|
|
*/
|
|
|
|
if (p_was_empty)
|
|
|
|
transmit_event(p);
|
2000-01-08 11:24:46 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2000-06-08 09:45:23 +00:00
|
|
|
* This is called once per tick, or HZ times per second. It is used to
|
2000-01-08 11:24:46 +00:00
|
|
|
* increment the current tick counter and schedule expired events.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
dummynet(void * __unused unused)
|
|
|
|
{
|
|
|
|
void *p ; /* generic parameter to handler */
|
|
|
|
struct dn_heap *h ;
|
|
|
|
int s ;
|
2000-06-08 09:45:23 +00:00
|
|
|
struct dn_heap *heaps[3];
|
|
|
|
int i;
|
2001-01-16 23:49:49 +00:00
|
|
|
struct dn_pipe *pe ;
|
2000-01-08 11:24:46 +00:00
|
|
|
|
2000-06-08 09:45:23 +00:00
|
|
|
heaps[0] = &ready_heap ; /* fixed-rate queues */
|
|
|
|
heaps[1] = &wfq_ready_heap ; /* wfq queues */
|
|
|
|
heaps[2] = &extract_heap ; /* delay line */
|
2001-01-22 23:04:13 +00:00
|
|
|
s = splimp(); /* see note on top, splnet() is not enough */
|
2000-01-08 11:24:46 +00:00
|
|
|
curr_time++ ;
|
2000-06-08 09:45:23 +00:00
|
|
|
for (i=0; i < 3 ; i++) {
|
|
|
|
h = heaps[i];
|
2001-01-16 23:49:49 +00:00
|
|
|
while (h->elements > 0 && DN_KEY_LEQ(h->p[0].key, curr_time) ) {
|
2000-06-08 09:45:23 +00:00
|
|
|
DDB(if (h->p[0].key > curr_time)
|
2002-12-24 13:45:24 +00:00
|
|
|
printf("dummynet: warning, heap %d is %d ticks late\n",
|
2000-06-08 09:45:23 +00:00
|
|
|
i, (int)(curr_time - h->p[0].key));)
|
|
|
|
p = h->p[0].object ; /* store a copy before heap_extract */
|
|
|
|
heap_extract(h, NULL); /* need to extract before processing */
|
|
|
|
if (i == 0)
|
2001-01-16 23:49:49 +00:00
|
|
|
ready_event(p) ;
|
2000-06-08 09:45:23 +00:00
|
|
|
else if (i == 1) {
|
|
|
|
struct dn_pipe *pipe = p;
|
|
|
|
if (pipe->if_name[0] != '\0')
|
2002-12-24 13:45:24 +00:00
|
|
|
printf("dummynet: bad ready_event_wfq for pipe %s\n",
|
2000-06-08 09:45:23 +00:00
|
|
|
pipe->if_name);
|
|
|
|
else
|
|
|
|
ready_event_wfq(p) ;
|
|
|
|
} else
|
2001-01-16 23:49:49 +00:00
|
|
|
transmit_event(p);
|
|
|
|
}
|
2000-06-08 09:45:23 +00:00
|
|
|
}
|
2001-01-16 23:49:49 +00:00
|
|
|
/* sweep pipes trying to expire idle flow_queues */
|
|
|
|
for (pe = all_pipes; pe ; pe = pe->next )
|
|
|
|
if (pe->idle_heap.elements > 0 &&
|
|
|
|
DN_KEY_LT(pe->idle_heap.p[0].key, pe->V) ) {
|
|
|
|
struct dn_flow_queue *q = pe->idle_heap.p[0].object ;
|
|
|
|
|
|
|
|
heap_extract(&(pe->idle_heap), NULL);
|
|
|
|
q->S = q->F + 1 ; /* mark timestamp as invalid */
|
|
|
|
pe->sum -= q->fs->weight ;
|
|
|
|
}
|
1999-08-11 14:37:58 +00:00
|
|
|
splx(s);
|
2001-10-05 05:45:27 +00:00
|
|
|
dn_timeout = timeout(dummynet, NULL, 1);
|
2000-01-08 11:24:46 +00:00
|
|
|
}
|
2002-12-15 10:24:36 +00:00
|
|
|
|
2000-01-08 11:24:46 +00:00
|
|
|
/*
|
2000-06-08 09:45:23 +00:00
|
|
|
* called by an interface when tx_rdy occurs.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
if_tx_rdy(struct ifnet *ifp)
|
|
|
|
{
|
|
|
|
struct dn_pipe *p;
|
|
|
|
|
|
|
|
for (p = all_pipes; p ; p = p->next )
|
|
|
|
if (p->ifp == ifp)
|
|
|
|
break ;
|
|
|
|
if (p == NULL) {
|
|
|
|
char buf[32];
|
|
|
|
sprintf(buf, "%s%d",ifp->if_name, ifp->if_unit);
|
|
|
|
for (p = all_pipes; p ; p = p->next )
|
|
|
|
if (!strcmp(p->if_name, buf) ) {
|
|
|
|
p->ifp = ifp ;
|
2002-12-24 13:45:24 +00:00
|
|
|
DEB(printf("dummynet: ++ tx rdy from %s (now found)\n", buf);)
|
2000-06-08 09:45:23 +00:00
|
|
|
break ;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (p != NULL) {
|
2002-12-24 13:45:24 +00:00
|
|
|
DEB(printf("dummynet: ++ tx rdy from %s%d - qlen %d\n", ifp->if_name,
|
2000-06-08 09:45:23 +00:00
|
|
|
ifp->if_unit, ifp->if_snd.ifq_len);)
|
|
|
|
p->numbytes = 0 ; /* mark ready for I/O */
|
|
|
|
ready_event_wfq(p);
|
|
|
|
}
|
2001-02-02 00:18:00 +00:00
|
|
|
return 0;
|
2000-06-08 09:45:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Unconditionally expire empty queues in case of shortage.
|
|
|
|
* Returns the number of queues freed.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
expire_queues(struct dn_flow_set *fs)
|
|
|
|
{
|
|
|
|
struct dn_flow_queue *q, *prev ;
|
|
|
|
int i, initial_elements = fs->rq_elements ;
|
|
|
|
|
|
|
|
if (fs->last_expired == time_second)
|
|
|
|
return 0 ;
|
|
|
|
fs->last_expired = time_second ;
|
|
|
|
for (i = 0 ; i <= fs->rq_size ; i++) /* last one is overflow */
|
|
|
|
for (prev=NULL, q = fs->rq[i] ; q != NULL ; )
|
2001-01-26 06:49:34 +00:00
|
|
|
if (q->head != NULL || q->S != q->F+1) {
|
2000-06-08 09:45:23 +00:00
|
|
|
prev = q ;
|
|
|
|
q = q->next ;
|
|
|
|
} else { /* entry is idle, expire it */
|
|
|
|
struct dn_flow_queue *old_q = q ;
|
|
|
|
|
|
|
|
if (prev != NULL)
|
|
|
|
prev->next = q = q->next ;
|
|
|
|
else
|
|
|
|
fs->rq[i] = q = q->next ;
|
|
|
|
fs->rq_elements-- ;
|
2001-10-05 05:45:27 +00:00
|
|
|
free(old_q, M_DUMMYNET);
|
2000-06-08 09:45:23 +00:00
|
|
|
}
|
|
|
|
return initial_elements - fs->rq_elements ;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If room, create a new queue and put at head of slot i;
|
|
|
|
* otherwise, create or use the default queue.
|
|
|
|
*/
|
|
|
|
static struct dn_flow_queue *
|
|
|
|
create_queue(struct dn_flow_set *fs, int i)
|
|
|
|
{
|
|
|
|
struct dn_flow_queue *q ;
|
|
|
|
|
|
|
|
if (fs->rq_elements > fs->rq_size * dn_max_ratio &&
|
|
|
|
expire_queues(fs) == 0) {
|
|
|
|
/*
|
|
|
|
* No way to get room, use or create overflow queue.
|
|
|
|
*/
|
|
|
|
i = fs->rq_size ;
|
|
|
|
if ( fs->rq[i] != NULL )
|
|
|
|
return fs->rq[i] ;
|
|
|
|
}
|
2002-12-15 10:21:30 +00:00
|
|
|
q = malloc(sizeof(*q), M_DUMMYNET, M_NOWAIT | M_ZERO);
|
2000-06-08 09:45:23 +00:00
|
|
|
if (q == NULL) {
|
2002-12-24 13:45:24 +00:00
|
|
|
printf("dummynet: sorry, cannot allocate queue for new flow\n");
|
2000-06-08 09:45:23 +00:00
|
|
|
return NULL ;
|
|
|
|
}
|
|
|
|
q->fs = fs ;
|
|
|
|
q->hash_slot = i ;
|
|
|
|
q->next = fs->rq[i] ;
|
2001-01-16 23:49:49 +00:00
|
|
|
q->S = q->F + 1; /* hack - mark timestamp as invalid */
|
2000-06-08 09:45:23 +00:00
|
|
|
fs->rq[i] = q ;
|
|
|
|
fs->rq_elements++ ;
|
|
|
|
return q ;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Given a flow_set and a pkt in last_pkt, find a matching queue
|
2000-01-08 11:24:46 +00:00
|
|
|
* after appropriate masking. The queue is moved to front
|
|
|
|
* so that further searches take less time.
|
|
|
|
*/
|
|
|
|
static struct dn_flow_queue *
|
Remove (almost all) global variables that were used to hold
packet forwarding state ("annotations") during ip processing.
The code is considerably cleaner now.
The variables removed by this change are:
ip_divert_cookie used by divert sockets
ip_fw_fwd_addr used for transparent ip redirection
last_pkt used by dynamic pipes in dummynet
Removal of the first two has been done by carrying the annotations
into volatile structs prepended to the mbuf chains, and adding
appropriate code to add/remove annotations in the routines which
make use of them, i.e. ip_input(), ip_output(), tcp_input(),
bdg_forward(), ether_demux(), ether_output_frame(), div_output().
On passing, remove a bug in divert handling of fragmented packet.
Now it is the fragment at offset 0 which sets the divert status of
the whole packet, whereas formerly it was the last incoming fragment
to decide.
Removal of last_pkt required a change in the interface of ip_fw_chk()
and dummynet_io(). On passing, use the same mechanism for dummynet
annotations and for divert/forward annotations.
option IPFIREWALL_FORWARD is effectively useless, the code to
implement it is very small and is now in by default to avoid the
obfuscation of conditionally compiled code.
NOTES:
* there is at least one global variable left, sro_fwd, in ip_output().
I am not sure if/how this can be removed.
* I have deliberately avoided gratuitous style changes in this commit
to avoid cluttering the diffs. Minor stule cleanup will likely be
necessary
* this commit only focused on the IP layer. I am sure there is a
number of global variables used in the TCP and maybe UDP stack.
* despite the number of files touched, there are absolutely no API's
or data structures changed by this commit (except the interfaces of
ip_fw_chk() and dummynet_io(), which are internal anyways), so
an MFC is quite safe and unintrusive (and desirable, given the
improved readability of the code).
MFC after: 10 days
2002-06-22 11:51:02 +00:00
|
|
|
find_queue(struct dn_flow_set *fs, struct ipfw_flow_id *id)
|
2000-01-08 11:24:46 +00:00
|
|
|
{
|
|
|
|
int i = 0 ; /* we need i and q for new allocations */
|
|
|
|
struct dn_flow_queue *q, *prev;
|
|
|
|
|
2000-06-08 09:45:23 +00:00
|
|
|
if ( !(fs->flags_fs & DN_HAVE_FLOW_MASK) )
|
|
|
|
q = fs->rq[0] ;
|
2000-01-08 11:24:46 +00:00
|
|
|
else {
|
|
|
|
/* first, do the masking */
|
Remove (almost all) global variables that were used to hold
packet forwarding state ("annotations") during ip processing.
The code is considerably cleaner now.
The variables removed by this change are:
ip_divert_cookie used by divert sockets
ip_fw_fwd_addr used for transparent ip redirection
last_pkt used by dynamic pipes in dummynet
Removal of the first two has been done by carrying the annotations
into volatile structs prepended to the mbuf chains, and adding
appropriate code to add/remove annotations in the routines which
make use of them, i.e. ip_input(), ip_output(), tcp_input(),
bdg_forward(), ether_demux(), ether_output_frame(), div_output().
On passing, remove a bug in divert handling of fragmented packet.
Now it is the fragment at offset 0 which sets the divert status of
the whole packet, whereas formerly it was the last incoming fragment
to decide.
Removal of last_pkt required a change in the interface of ip_fw_chk()
and dummynet_io(). On passing, use the same mechanism for dummynet
annotations and for divert/forward annotations.
option IPFIREWALL_FORWARD is effectively useless, the code to
implement it is very small and is now in by default to avoid the
obfuscation of conditionally compiled code.
NOTES:
* there is at least one global variable left, sro_fwd, in ip_output().
I am not sure if/how this can be removed.
* I have deliberately avoided gratuitous style changes in this commit
to avoid cluttering the diffs. Minor stule cleanup will likely be
necessary
* this commit only focused on the IP layer. I am sure there is a
number of global variables used in the TCP and maybe UDP stack.
* despite the number of files touched, there are absolutely no API's
or data structures changed by this commit (except the interfaces of
ip_fw_chk() and dummynet_io(), which are internal anyways), so
an MFC is quite safe and unintrusive (and desirable, given the
improved readability of the code).
MFC after: 10 days
2002-06-22 11:51:02 +00:00
|
|
|
id->dst_ip &= fs->flow_mask.dst_ip ;
|
|
|
|
id->src_ip &= fs->flow_mask.src_ip ;
|
|
|
|
id->dst_port &= fs->flow_mask.dst_port ;
|
|
|
|
id->src_port &= fs->flow_mask.src_port ;
|
|
|
|
id->proto &= fs->flow_mask.proto ;
|
|
|
|
id->flags = 0 ; /* we don't care about this one */
|
2000-01-08 11:24:46 +00:00
|
|
|
/* then, hash function */
|
Remove (almost all) global variables that were used to hold
packet forwarding state ("annotations") during ip processing.
The code is considerably cleaner now.
The variables removed by this change are:
ip_divert_cookie used by divert sockets
ip_fw_fwd_addr used for transparent ip redirection
last_pkt used by dynamic pipes in dummynet
Removal of the first two has been done by carrying the annotations
into volatile structs prepended to the mbuf chains, and adding
appropriate code to add/remove annotations in the routines which
make use of them, i.e. ip_input(), ip_output(), tcp_input(),
bdg_forward(), ether_demux(), ether_output_frame(), div_output().
On passing, remove a bug in divert handling of fragmented packet.
Now it is the fragment at offset 0 which sets the divert status of
the whole packet, whereas formerly it was the last incoming fragment
to decide.
Removal of last_pkt required a change in the interface of ip_fw_chk()
and dummynet_io(). On passing, use the same mechanism for dummynet
annotations and for divert/forward annotations.
option IPFIREWALL_FORWARD is effectively useless, the code to
implement it is very small and is now in by default to avoid the
obfuscation of conditionally compiled code.
NOTES:
* there is at least one global variable left, sro_fwd, in ip_output().
I am not sure if/how this can be removed.
* I have deliberately avoided gratuitous style changes in this commit
to avoid cluttering the diffs. Minor stule cleanup will likely be
necessary
* this commit only focused on the IP layer. I am sure there is a
number of global variables used in the TCP and maybe UDP stack.
* despite the number of files touched, there are absolutely no API's
or data structures changed by this commit (except the interfaces of
ip_fw_chk() and dummynet_io(), which are internal anyways), so
an MFC is quite safe and unintrusive (and desirable, given the
improved readability of the code).
MFC after: 10 days
2002-06-22 11:51:02 +00:00
|
|
|
i = ( (id->dst_ip) & 0xffff ) ^
|
|
|
|
( (id->dst_ip >> 15) & 0xffff ) ^
|
|
|
|
( (id->src_ip << 1) & 0xffff ) ^
|
|
|
|
( (id->src_ip >> 16 ) & 0xffff ) ^
|
|
|
|
(id->dst_port << 1) ^ (id->src_port) ^
|
|
|
|
(id->proto );
|
2000-06-08 09:45:23 +00:00
|
|
|
i = i % fs->rq_size ;
|
2000-01-08 11:24:46 +00:00
|
|
|
/* finally, scan the current list for a match */
|
|
|
|
searches++ ;
|
2000-06-08 09:45:23 +00:00
|
|
|
for (prev=NULL, q = fs->rq[i] ; q ; ) {
|
2000-01-08 11:24:46 +00:00
|
|
|
search_steps++;
|
2002-11-13 11:31:44 +00:00
|
|
|
if (id->dst_ip == q->id.dst_ip &&
|
2003-06-28 14:23:22 +00:00
|
|
|
id->src_ip == q->id.src_ip &&
|
|
|
|
id->dst_port == q->id.dst_port &&
|
|
|
|
id->src_port == q->id.src_port &&
|
|
|
|
id->proto == q->id.proto &&
|
|
|
|
id->flags == q->id.flags)
|
2000-01-08 11:24:46 +00:00
|
|
|
break ; /* found */
|
2001-01-26 06:49:34 +00:00
|
|
|
else if (pipe_expire && q->head == NULL && q->S == q->F+1 ) {
|
|
|
|
/* entry is idle and not in any heap, expire it */
|
2000-02-10 14:17:40 +00:00
|
|
|
struct dn_flow_queue *old_q = q ;
|
|
|
|
|
|
|
|
if (prev != NULL)
|
|
|
|
prev->next = q = q->next ;
|
|
|
|
else
|
2000-06-08 09:45:23 +00:00
|
|
|
fs->rq[i] = q = q->next ;
|
|
|
|
fs->rq_elements-- ;
|
2001-10-05 05:45:27 +00:00
|
|
|
free(old_q, M_DUMMYNET);
|
2000-02-10 14:17:40 +00:00
|
|
|
continue ;
|
|
|
|
}
|
|
|
|
prev = q ;
|
|
|
|
q = q->next ;
|
2000-01-08 11:24:46 +00:00
|
|
|
}
|
|
|
|
if (q && prev != NULL) { /* found and not in front */
|
|
|
|
prev->next = q->next ;
|
2000-06-08 09:45:23 +00:00
|
|
|
q->next = fs->rq[i] ;
|
|
|
|
fs->rq[i] = q ;
|
2000-01-08 11:24:46 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
if (q == NULL) { /* no match, need to allocate a new entry */
|
2000-06-08 09:45:23 +00:00
|
|
|
q = create_queue(fs, i);
|
|
|
|
if (q != NULL)
|
Remove (almost all) global variables that were used to hold
packet forwarding state ("annotations") during ip processing.
The code is considerably cleaner now.
The variables removed by this change are:
ip_divert_cookie used by divert sockets
ip_fw_fwd_addr used for transparent ip redirection
last_pkt used by dynamic pipes in dummynet
Removal of the first two has been done by carrying the annotations
into volatile structs prepended to the mbuf chains, and adding
appropriate code to add/remove annotations in the routines which
make use of them, i.e. ip_input(), ip_output(), tcp_input(),
bdg_forward(), ether_demux(), ether_output_frame(), div_output().
On passing, remove a bug in divert handling of fragmented packet.
Now it is the fragment at offset 0 which sets the divert status of
the whole packet, whereas formerly it was the last incoming fragment
to decide.
Removal of last_pkt required a change in the interface of ip_fw_chk()
and dummynet_io(). On passing, use the same mechanism for dummynet
annotations and for divert/forward annotations.
option IPFIREWALL_FORWARD is effectively useless, the code to
implement it is very small and is now in by default to avoid the
obfuscation of conditionally compiled code.
NOTES:
* there is at least one global variable left, sro_fwd, in ip_output().
I am not sure if/how this can be removed.
* I have deliberately avoided gratuitous style changes in this commit
to avoid cluttering the diffs. Minor stule cleanup will likely be
necessary
* this commit only focused on the IP layer. I am sure there is a
number of global variables used in the TCP and maybe UDP stack.
* despite the number of files touched, there are absolutely no API's
or data structures changed by this commit (except the interfaces of
ip_fw_chk() and dummynet_io(), which are internal anyways), so
an MFC is quite safe and unintrusive (and desirable, given the
improved readability of the code).
MFC after: 10 days
2002-06-22 11:51:02 +00:00
|
|
|
q->id = *id ;
|
2000-01-08 11:24:46 +00:00
|
|
|
}
|
|
|
|
return q ;
|
1998-09-12 22:03:21 +00:00
|
|
|
}
|
|
|
|
|
2000-06-08 09:45:23 +00:00
|
|
|
static int
|
|
|
|
red_drops(struct dn_flow_set *fs, struct dn_flow_queue *q, int len)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* RED algorithm
|
2002-12-15 10:24:36 +00:00
|
|
|
*
|
2000-06-08 09:45:23 +00:00
|
|
|
* RED calculates the average queue size (avg) using a low-pass filter
|
|
|
|
* with an exponential weighted (w_q) moving average:
|
|
|
|
* avg <- (1-w_q) * avg + w_q * q_size
|
|
|
|
* where q_size is the queue length (measured in bytes or * packets).
|
2002-12-15 10:24:36 +00:00
|
|
|
*
|
2000-06-08 09:45:23 +00:00
|
|
|
* If q_size == 0, we compute the idle time for the link, and set
|
|
|
|
* avg = (1 - w_q)^(idle/s)
|
|
|
|
* where s is the time needed for transmitting a medium-sized packet.
|
2002-12-15 10:24:36 +00:00
|
|
|
*
|
2000-06-08 09:45:23 +00:00
|
|
|
* Now, if avg < min_th the packet is enqueued.
|
|
|
|
* If avg > max_th the packet is dropped. Otherwise, the packet is
|
|
|
|
* dropped with probability P function of avg.
|
2002-12-15 10:24:36 +00:00
|
|
|
*
|
2000-06-08 09:45:23 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
int64_t p_b = 0;
|
|
|
|
/* queue in bytes or packets ? */
|
|
|
|
u_int q_size = (fs->flags_fs & DN_QSIZE_IS_BYTES) ? q->len_bytes : q->len;
|
|
|
|
|
2003-06-23 21:38:21 +00:00
|
|
|
DEB(printf("\ndummynet: %d q: %2u ", (int) curr_time, q_size);)
|
2000-06-08 09:45:23 +00:00
|
|
|
|
|
|
|
/* average queue size estimation */
|
|
|
|
if (q_size != 0) {
|
|
|
|
/*
|
|
|
|
* queue is not empty, avg <- avg + (q_size - avg) * w_q
|
|
|
|
*/
|
|
|
|
int diff = SCALE(q_size) - q->avg;
|
|
|
|
int64_t v = SCALE_MUL((int64_t) diff, (int64_t) fs->w_q);
|
|
|
|
|
|
|
|
q->avg += (int) v;
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* queue is empty, find for how long the queue has been
|
|
|
|
* empty and use a lookup table for computing
|
|
|
|
* (1 - * w_q)^(idle_time/s) where s is the time to send a
|
|
|
|
* (small) packet.
|
|
|
|
* XXX check wraps...
|
|
|
|
*/
|
|
|
|
if (q->avg) {
|
|
|
|
u_int t = (curr_time - q->q_time) / fs->lookup_step;
|
|
|
|
|
|
|
|
q->avg = (t < fs->lookup_depth) ?
|
|
|
|
SCALE_MUL(q->avg, fs->w_q_lookup[t]) : 0;
|
|
|
|
}
|
|
|
|
}
|
2002-12-24 13:45:24 +00:00
|
|
|
DEB(printf("dummynet: avg: %u ", SCALE_VAL(q->avg));)
|
2000-06-08 09:45:23 +00:00
|
|
|
|
|
|
|
/* should i drop ? */
|
|
|
|
|
|
|
|
if (q->avg < fs->min_th) {
|
|
|
|
q->count = -1;
|
|
|
|
return 0; /* accept packet ; */
|
|
|
|
}
|
|
|
|
if (q->avg >= fs->max_th) { /* average queue >= max threshold */
|
|
|
|
if (fs->flags_fs & DN_IS_GENTLE_RED) {
|
|
|
|
/*
|
|
|
|
* According to Gentle-RED, if avg is greater than max_th the
|
|
|
|
* packet is dropped with a probability
|
|
|
|
* p_b = c_3 * avg - c_4
|
|
|
|
* where c_3 = (1 - max_p) / max_th, and c_4 = 1 - 2 * max_p
|
|
|
|
*/
|
|
|
|
p_b = SCALE_MUL((int64_t) fs->c_3, (int64_t) q->avg) - fs->c_4;
|
|
|
|
} else {
|
|
|
|
q->count = -1;
|
2003-01-20 13:03:34 +00:00
|
|
|
DEB(printf("dummynet: - drop"););
|
2000-06-08 09:45:23 +00:00
|
|
|
return 1 ;
|
|
|
|
}
|
|
|
|
} else if (q->avg > fs->min_th) {
|
|
|
|
/*
|
|
|
|
* we compute p_b using the linear dropping function p_b = c_1 *
|
|
|
|
* avg - c_2, where c_1 = max_p / (max_th - min_th), and c_2 =
|
|
|
|
* max_p * min_th / (max_th - min_th)
|
|
|
|
*/
|
|
|
|
p_b = SCALE_MUL((int64_t) fs->c_1, (int64_t) q->avg) - fs->c_2;
|
|
|
|
}
|
|
|
|
if (fs->flags_fs & DN_QSIZE_IS_BYTES)
|
|
|
|
p_b = (p_b * len) / fs->max_pkt_size;
|
|
|
|
if (++q->count == 0)
|
|
|
|
q->random = random() & 0xffff;
|
|
|
|
else {
|
|
|
|
/*
|
|
|
|
* q->count counts packets arrived since last drop, so a greater
|
|
|
|
* value of q->count means a greater packet drop probability.
|
|
|
|
*/
|
|
|
|
if (SCALE_MUL(p_b, SCALE((int64_t) q->count)) > q->random) {
|
|
|
|
q->count = 0;
|
2003-01-20 13:03:34 +00:00
|
|
|
DEB(printf("dummynet: - red drop");)
|
2000-06-08 09:45:23 +00:00
|
|
|
/* after a drop we calculate a new random value */
|
|
|
|
q->random = random() & 0xffff;
|
|
|
|
return 1; /* drop */
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* end of RED algorithm */
|
|
|
|
return 0 ; /* accept */
|
|
|
|
}
|
|
|
|
|
|
|
|
static __inline
|
|
|
|
struct dn_flow_set *
|
2001-09-27 23:44:27 +00:00
|
|
|
locate_flowset(int pipe_nr, struct ip_fw *rule)
|
2000-06-08 09:45:23 +00:00
|
|
|
{
|
2002-07-17 07:21:42 +00:00
|
|
|
#if IPFW2
|
|
|
|
struct dn_flow_set *fs;
|
|
|
|
ipfw_insn *cmd = rule->cmd + rule->act_ofs;
|
|
|
|
|
|
|
|
if (cmd->opcode == O_LOG)
|
|
|
|
cmd += F_LEN(cmd);
|
2003-06-04 01:17:37 +00:00
|
|
|
#ifdef __i386__
|
2002-07-17 07:21:42 +00:00
|
|
|
fs = ((ipfw_insn_pipe *)cmd)->pipe_ptr;
|
2003-06-04 01:17:37 +00:00
|
|
|
#else
|
|
|
|
bcopy(& ((ipfw_insn_pipe *)cmd)->pipe_ptr, &fs, sizeof(fs));
|
|
|
|
#endif
|
The new ipfw code.
This code makes use of variable-size kernel representation of rules
(exactly the same concept of BPF instructions, as used in the BSDI's
firewall), which makes firewall operation a lot faster, and the
code more readable and easier to extend and debug.
The interface with the rest of the system is unchanged, as witnessed
by this commit. The only extra kernel files that I am touching
are if_fw.h and ip_dummynet.c, which is quite tied to ipfw. In
userland I only had to touch those programs which manipulate the
internal representation of firewall rules).
The code is almost entirely new (and I believe I have written the
vast majority of those sections which were taken from the former
ip_fw.c), so rather than modifying the old ip_fw.c I decided to
create a new file, sys/netinet/ip_fw2.c . Same for the user
interface, which is in sbin/ipfw/ipfw2.c (it still compiles to
/sbin/ipfw). The old files are still there, and will be removed
in due time.
I have not renamed the header file because it would have required
touching a one-line change to a number of kernel files.
In terms of user interface, the new "ipfw" is supposed to accepts
the old syntax for ipfw rules (and produce the same output with
"ipfw show". Only a couple of the old options (out of some 30 of
them) has not been implemented, but they will be soon.
On the other hand, the new code has some very powerful extensions.
First, you can put "or" connectives between match fields (and soon
also between options), and write things like
ipfw add allow ip from { 1.2.3.4/27 or 5.6.7.8/30 } 10-23,25,1024-3000 to any
This should make rulesets slightly more compact (and lines longer!),
by condensing 2 or more of the old rules into single ones.
Also, as an example of how easy the rules can be extended, I have
implemented an 'address set' match pattern, where you can specify
an IP address in a format like this:
10.20.30.0/26{18,44,33,22,9}
which will match the set of hosts listed in braces belonging to the
subnet 10.20.30.0/26 . The match is done using a bitmap, so it is
essentially a constant time operation requiring a handful of CPU
instructions (and a very small amount of memmory -- for a full /24
subnet, the instruction only consumes 40 bytes).
Again, in this commit I have focused on functionality and tried
to minimize changes to the other parts of the system. Some performance
improvement can be achieved with minor changes to the interface of
ip_fw_chk_t. This will be done later when this code is settled.
The code is meant to compile unmodified on RELENG_4 (once the
PACKET_TAG_* changes have been merged), for this reason
you will see #ifdef __FreeBSD_version in a couple of places.
This should minimize errors when (hopefully soon) it will be time
to do the MFC.
2002-06-27 23:02:18 +00:00
|
|
|
|
|
|
|
if (fs != NULL)
|
|
|
|
return fs;
|
2000-06-08 09:45:23 +00:00
|
|
|
|
2002-07-17 07:21:42 +00:00
|
|
|
if (cmd->opcode == O_QUEUE)
|
|
|
|
#else /* !IPFW2 */
|
|
|
|
struct dn_flow_set *fs = NULL ;
|
|
|
|
|
|
|
|
if ( (rule->fw_flg & IP_FW_F_COMMAND) == IP_FW_F_QUEUE )
|
|
|
|
#endif /* !IPFW2 */
|
2000-06-08 09:45:23 +00:00
|
|
|
for (fs=all_flow_sets; fs && fs->fs_nr != pipe_nr; fs=fs->next)
|
|
|
|
;
|
|
|
|
else {
|
|
|
|
struct dn_pipe *p1;
|
|
|
|
for (p1 = all_pipes; p1 && p1->pipe_nr != pipe_nr; p1 = p1->next)
|
|
|
|
;
|
|
|
|
if (p1 != NULL)
|
|
|
|
fs = &(p1->fs) ;
|
|
|
|
}
|
2002-07-17 07:21:42 +00:00
|
|
|
/* record for the future */
|
|
|
|
#if IPFW2
|
2003-06-04 01:17:37 +00:00
|
|
|
#ifdef __i386__
|
2002-07-17 07:21:42 +00:00
|
|
|
((ipfw_insn_pipe *)cmd)->pipe_ptr = fs;
|
2003-06-04 01:17:37 +00:00
|
|
|
#else
|
|
|
|
bcopy(&fs, & ((ipfw_insn_pipe *)cmd)->pipe_ptr, sizeof(fs));
|
|
|
|
#endif
|
2002-07-17 07:21:42 +00:00
|
|
|
#else
|
|
|
|
if (fs != NULL)
|
|
|
|
rule->pipe_ptr = fs;
|
|
|
|
#endif
|
2000-06-08 09:45:23 +00:00
|
|
|
return fs ;
|
|
|
|
}
|
|
|
|
|
1998-09-12 22:03:21 +00:00
|
|
|
/*
|
2000-06-08 09:45:23 +00:00
|
|
|
* dummynet hook for packets. Below 'pipe' is a pipe or a queue
|
|
|
|
* depending on whether WF2Q or fixed bw is used.
|
2002-05-13 10:37:19 +00:00
|
|
|
*
|
|
|
|
* pipe_nr pipe or queue the packet is destined for.
|
|
|
|
* dir where shall we send the packet after dummynet.
|
|
|
|
* m the mbuf with the packet
|
|
|
|
* ifp the 'ifp' parameter from the caller.
|
|
|
|
* NULL in ip_input, destination interface in ip_output,
|
|
|
|
* real_dst in bdg_forward
|
|
|
|
* ro route parameter (only used in ip_output, NULL otherwise)
|
|
|
|
* dst destination address, only used by ip_output
|
|
|
|
* rule matching rule, in case of multiple passes
|
|
|
|
* flags flags from the caller, only used in ip_output
|
2002-12-15 10:24:36 +00:00
|
|
|
*
|
1998-09-12 22:03:21 +00:00
|
|
|
*/
|
Remove (almost all) global variables that were used to hold
packet forwarding state ("annotations") during ip processing.
The code is considerably cleaner now.
The variables removed by this change are:
ip_divert_cookie used by divert sockets
ip_fw_fwd_addr used for transparent ip redirection
last_pkt used by dynamic pipes in dummynet
Removal of the first two has been done by carrying the annotations
into volatile structs prepended to the mbuf chains, and adding
appropriate code to add/remove annotations in the routines which
make use of them, i.e. ip_input(), ip_output(), tcp_input(),
bdg_forward(), ether_demux(), ether_output_frame(), div_output().
On passing, remove a bug in divert handling of fragmented packet.
Now it is the fragment at offset 0 which sets the divert status of
the whole packet, whereas formerly it was the last incoming fragment
to decide.
Removal of last_pkt required a change in the interface of ip_fw_chk()
and dummynet_io(). On passing, use the same mechanism for dummynet
annotations and for divert/forward annotations.
option IPFIREWALL_FORWARD is effectively useless, the code to
implement it is very small and is now in by default to avoid the
obfuscation of conditionally compiled code.
NOTES:
* there is at least one global variable left, sro_fwd, in ip_output().
I am not sure if/how this can be removed.
* I have deliberately avoided gratuitous style changes in this commit
to avoid cluttering the diffs. Minor stule cleanup will likely be
necessary
* this commit only focused on the IP layer. I am sure there is a
number of global variables used in the TCP and maybe UDP stack.
* despite the number of files touched, there are absolutely no API's
or data structures changed by this commit (except the interfaces of
ip_fw_chk() and dummynet_io(), which are internal anyways), so
an MFC is quite safe and unintrusive (and desirable, given the
improved readability of the code).
MFC after: 10 days
2002-06-22 11:51:02 +00:00
|
|
|
static int
|
|
|
|
dummynet_io(struct mbuf *m, int pipe_nr, int dir, struct ip_fw_args *fwa)
|
1998-09-12 22:03:21 +00:00
|
|
|
{
|
|
|
|
struct dn_pkt *pkt;
|
2000-06-08 09:45:23 +00:00
|
|
|
struct dn_flow_set *fs;
|
|
|
|
struct dn_pipe *pipe ;
|
|
|
|
u_int64_t len = m->m_pkthdr.len ;
|
2000-01-08 11:24:46 +00:00
|
|
|
struct dn_flow_queue *q = NULL ;
|
2002-07-09 06:53:38 +00:00
|
|
|
int s = splimp();
|
2002-07-17 07:21:42 +00:00
|
|
|
int is_pipe;
|
|
|
|
#if IPFW2
|
|
|
|
ipfw_insn *cmd = fwa->rule->cmd + fwa->rule->act_ofs;
|
|
|
|
|
|
|
|
if (cmd->opcode == O_LOG)
|
|
|
|
cmd += F_LEN(cmd);
|
|
|
|
is_pipe = (cmd->opcode == O_PIPE);
|
|
|
|
#else
|
|
|
|
is_pipe = (fwa->rule->fw_flg & IP_FW_F_COMMAND) == IP_FW_F_PIPE;
|
|
|
|
#endif
|
1998-09-12 22:03:21 +00:00
|
|
|
|
|
|
|
pipe_nr &= 0xffff ;
|
2001-01-26 06:49:34 +00:00
|
|
|
|
The new ipfw code.
This code makes use of variable-size kernel representation of rules
(exactly the same concept of BPF instructions, as used in the BSDI's
firewall), which makes firewall operation a lot faster, and the
code more readable and easier to extend and debug.
The interface with the rest of the system is unchanged, as witnessed
by this commit. The only extra kernel files that I am touching
are if_fw.h and ip_dummynet.c, which is quite tied to ipfw. In
userland I only had to touch those programs which manipulate the
internal representation of firewall rules).
The code is almost entirely new (and I believe I have written the
vast majority of those sections which were taken from the former
ip_fw.c), so rather than modifying the old ip_fw.c I decided to
create a new file, sys/netinet/ip_fw2.c . Same for the user
interface, which is in sbin/ipfw/ipfw2.c (it still compiles to
/sbin/ipfw). The old files are still there, and will be removed
in due time.
I have not renamed the header file because it would have required
touching a one-line change to a number of kernel files.
In terms of user interface, the new "ipfw" is supposed to accepts
the old syntax for ipfw rules (and produce the same output with
"ipfw show". Only a couple of the old options (out of some 30 of
them) has not been implemented, but they will be soon.
On the other hand, the new code has some very powerful extensions.
First, you can put "or" connectives between match fields (and soon
also between options), and write things like
ipfw add allow ip from { 1.2.3.4/27 or 5.6.7.8/30 } 10-23,25,1024-3000 to any
This should make rulesets slightly more compact (and lines longer!),
by condensing 2 or more of the old rules into single ones.
Also, as an example of how easy the rules can be extended, I have
implemented an 'address set' match pattern, where you can specify
an IP address in a format like this:
10.20.30.0/26{18,44,33,22,9}
which will match the set of hosts listed in braces belonging to the
subnet 10.20.30.0/26 . The match is done using a bitmap, so it is
essentially a constant time operation requiring a handful of CPU
instructions (and a very small amount of memmory -- for a full /24
subnet, the instruction only consumes 40 bytes).
Again, in this commit I have focused on functionality and tried
to minimize changes to the other parts of the system. Some performance
improvement can be achieved with minor changes to the interface of
ip_fw_chk_t. This will be done later when this code is settled.
The code is meant to compile unmodified on RELENG_4 (once the
PACKET_TAG_* changes have been merged), for this reason
you will see #ifdef __FreeBSD_version in a couple of places.
This should minimize errors when (hopefully soon) it will be time
to do the MFC.
2002-06-27 23:02:18 +00:00
|
|
|
/*
|
2003-01-01 18:49:04 +00:00
|
|
|
* This is a dummynet rule, so we expect an O_PIPE or O_QUEUE rule.
|
The new ipfw code.
This code makes use of variable-size kernel representation of rules
(exactly the same concept of BPF instructions, as used in the BSDI's
firewall), which makes firewall operation a lot faster, and the
code more readable and easier to extend and debug.
The interface with the rest of the system is unchanged, as witnessed
by this commit. The only extra kernel files that I am touching
are if_fw.h and ip_dummynet.c, which is quite tied to ipfw. In
userland I only had to touch those programs which manipulate the
internal representation of firewall rules).
The code is almost entirely new (and I believe I have written the
vast majority of those sections which were taken from the former
ip_fw.c), so rather than modifying the old ip_fw.c I decided to
create a new file, sys/netinet/ip_fw2.c . Same for the user
interface, which is in sbin/ipfw/ipfw2.c (it still compiles to
/sbin/ipfw). The old files are still there, and will be removed
in due time.
I have not renamed the header file because it would have required
touching a one-line change to a number of kernel files.
In terms of user interface, the new "ipfw" is supposed to accepts
the old syntax for ipfw rules (and produce the same output with
"ipfw show". Only a couple of the old options (out of some 30 of
them) has not been implemented, but they will be soon.
On the other hand, the new code has some very powerful extensions.
First, you can put "or" connectives between match fields (and soon
also between options), and write things like
ipfw add allow ip from { 1.2.3.4/27 or 5.6.7.8/30 } 10-23,25,1024-3000 to any
This should make rulesets slightly more compact (and lines longer!),
by condensing 2 or more of the old rules into single ones.
Also, as an example of how easy the rules can be extended, I have
implemented an 'address set' match pattern, where you can specify
an IP address in a format like this:
10.20.30.0/26{18,44,33,22,9}
which will match the set of hosts listed in braces belonging to the
subnet 10.20.30.0/26 . The match is done using a bitmap, so it is
essentially a constant time operation requiring a handful of CPU
instructions (and a very small amount of memmory -- for a full /24
subnet, the instruction only consumes 40 bytes).
Again, in this commit I have focused on functionality and tried
to minimize changes to the other parts of the system. Some performance
improvement can be achieved with minor changes to the interface of
ip_fw_chk_t. This will be done later when this code is settled.
The code is meant to compile unmodified on RELENG_4 (once the
PACKET_TAG_* changes have been merged), for this reason
you will see #ifdef __FreeBSD_version in a couple of places.
This should minimize errors when (hopefully soon) it will be time
to do the MFC.
2002-06-27 23:02:18 +00:00
|
|
|
*/
|
|
|
|
fs = locate_flowset(pipe_nr, fwa->rule);
|
|
|
|
if (fs == NULL)
|
|
|
|
goto dropit ; /* this queue/pipe does not exist! */
|
2000-06-08 09:45:23 +00:00
|
|
|
pipe = fs->pipe ;
|
|
|
|
if (pipe == NULL) { /* must be a queue, try find a matching pipe */
|
|
|
|
for (pipe = all_pipes; pipe && pipe->pipe_nr != fs->parent_nr;
|
|
|
|
pipe = pipe->next)
|
1998-09-12 22:03:21 +00:00
|
|
|
;
|
2000-06-08 09:45:23 +00:00
|
|
|
if (pipe != NULL)
|
|
|
|
fs->pipe = pipe ;
|
|
|
|
else {
|
2002-12-24 13:45:24 +00:00
|
|
|
printf("dummynet: no pipe %d for queue %d, drop pkt\n",
|
2000-06-08 09:45:23 +00:00
|
|
|
fs->parent_nr, fs->fs_nr);
|
|
|
|
goto dropit ;
|
2001-01-26 06:49:34 +00:00
|
|
|
}
|
2000-06-08 09:45:23 +00:00
|
|
|
}
|
Remove (almost all) global variables that were used to hold
packet forwarding state ("annotations") during ip processing.
The code is considerably cleaner now.
The variables removed by this change are:
ip_divert_cookie used by divert sockets
ip_fw_fwd_addr used for transparent ip redirection
last_pkt used by dynamic pipes in dummynet
Removal of the first two has been done by carrying the annotations
into volatile structs prepended to the mbuf chains, and adding
appropriate code to add/remove annotations in the routines which
make use of them, i.e. ip_input(), ip_output(), tcp_input(),
bdg_forward(), ether_demux(), ether_output_frame(), div_output().
On passing, remove a bug in divert handling of fragmented packet.
Now it is the fragment at offset 0 which sets the divert status of
the whole packet, whereas formerly it was the last incoming fragment
to decide.
Removal of last_pkt required a change in the interface of ip_fw_chk()
and dummynet_io(). On passing, use the same mechanism for dummynet
annotations and for divert/forward annotations.
option IPFIREWALL_FORWARD is effectively useless, the code to
implement it is very small and is now in by default to avoid the
obfuscation of conditionally compiled code.
NOTES:
* there is at least one global variable left, sro_fwd, in ip_output().
I am not sure if/how this can be removed.
* I have deliberately avoided gratuitous style changes in this commit
to avoid cluttering the diffs. Minor stule cleanup will likely be
necessary
* this commit only focused on the IP layer. I am sure there is a
number of global variables used in the TCP and maybe UDP stack.
* despite the number of files touched, there are absolutely no API's
or data structures changed by this commit (except the interfaces of
ip_fw_chk() and dummynet_io(), which are internal anyways), so
an MFC is quite safe and unintrusive (and desirable, given the
improved readability of the code).
MFC after: 10 days
2002-06-22 11:51:02 +00:00
|
|
|
q = find_queue(fs, &(fwa->f_id));
|
2000-01-08 11:24:46 +00:00
|
|
|
if ( q == NULL )
|
|
|
|
goto dropit ; /* cannot allocate queue */
|
2000-06-08 09:45:23 +00:00
|
|
|
/*
|
|
|
|
* update statistics, then check reasons to drop pkt
|
|
|
|
*/
|
2000-01-08 11:24:46 +00:00
|
|
|
q->tot_bytes += len ;
|
|
|
|
q->tot_pkts++ ;
|
2000-06-08 09:45:23 +00:00
|
|
|
if ( fs->plr && random() < fs->plr )
|
2000-01-08 11:24:46 +00:00
|
|
|
goto dropit ; /* random pkt drop */
|
2000-06-08 09:45:23 +00:00
|
|
|
if ( fs->flags_fs & DN_QSIZE_IS_BYTES) {
|
|
|
|
if (q->len_bytes > fs->qsize)
|
2001-02-02 00:18:00 +00:00
|
|
|
goto dropit ; /* queue size overflow */
|
2000-06-08 09:45:23 +00:00
|
|
|
} else {
|
|
|
|
if (q->len >= fs->qsize)
|
|
|
|
goto dropit ; /* queue count overflow */
|
|
|
|
}
|
|
|
|
if ( fs->flags_fs & DN_IS_RED && red_drops(fs, q, len) )
|
|
|
|
goto dropit ;
|
2000-01-08 11:24:46 +00:00
|
|
|
|
2000-12-08 21:51:06 +00:00
|
|
|
/* XXX expensive to zero, see if we can remove it*/
|
2001-11-04 22:56:25 +00:00
|
|
|
pkt = (struct dn_pkt *)malloc(sizeof (*pkt), M_DUMMYNET, M_NOWAIT|M_ZERO);
|
2000-01-08 11:24:46 +00:00
|
|
|
if ( pkt == NULL )
|
|
|
|
goto dropit ; /* cannot allocate packet header */
|
|
|
|
/* ok, i can handle the pkt now... */
|
|
|
|
/* build and enqueue packet + parameters */
|
Remove (almost all) global variables that were used to hold
packet forwarding state ("annotations") during ip processing.
The code is considerably cleaner now.
The variables removed by this change are:
ip_divert_cookie used by divert sockets
ip_fw_fwd_addr used for transparent ip redirection
last_pkt used by dynamic pipes in dummynet
Removal of the first two has been done by carrying the annotations
into volatile structs prepended to the mbuf chains, and adding
appropriate code to add/remove annotations in the routines which
make use of them, i.e. ip_input(), ip_output(), tcp_input(),
bdg_forward(), ether_demux(), ether_output_frame(), div_output().
On passing, remove a bug in divert handling of fragmented packet.
Now it is the fragment at offset 0 which sets the divert status of
the whole packet, whereas formerly it was the last incoming fragment
to decide.
Removal of last_pkt required a change in the interface of ip_fw_chk()
and dummynet_io(). On passing, use the same mechanism for dummynet
annotations and for divert/forward annotations.
option IPFIREWALL_FORWARD is effectively useless, the code to
implement it is very small and is now in by default to avoid the
obfuscation of conditionally compiled code.
NOTES:
* there is at least one global variable left, sro_fwd, in ip_output().
I am not sure if/how this can be removed.
* I have deliberately avoided gratuitous style changes in this commit
to avoid cluttering the diffs. Minor stule cleanup will likely be
necessary
* this commit only focused on the IP layer. I am sure there is a
number of global variables used in the TCP and maybe UDP stack.
* despite the number of files touched, there are absolutely no API's
or data structures changed by this commit (except the interfaces of
ip_fw_chk() and dummynet_io(), which are internal anyways), so
an MFC is quite safe and unintrusive (and desirable, given the
improved readability of the code).
MFC after: 10 days
2002-06-22 11:51:02 +00:00
|
|
|
pkt->hdr.mh_type = MT_TAG;
|
|
|
|
pkt->hdr.mh_flags = PACKET_TAG_DUMMYNET;
|
|
|
|
pkt->rule = fwa->rule ;
|
2000-01-08 11:24:46 +00:00
|
|
|
DN_NEXT(pkt) = NULL;
|
1998-09-12 22:03:21 +00:00
|
|
|
pkt->dn_m = m;
|
|
|
|
pkt->dn_dir = dir ;
|
|
|
|
|
Remove (almost all) global variables that were used to hold
packet forwarding state ("annotations") during ip processing.
The code is considerably cleaner now.
The variables removed by this change are:
ip_divert_cookie used by divert sockets
ip_fw_fwd_addr used for transparent ip redirection
last_pkt used by dynamic pipes in dummynet
Removal of the first two has been done by carrying the annotations
into volatile structs prepended to the mbuf chains, and adding
appropriate code to add/remove annotations in the routines which
make use of them, i.e. ip_input(), ip_output(), tcp_input(),
bdg_forward(), ether_demux(), ether_output_frame(), div_output().
On passing, remove a bug in divert handling of fragmented packet.
Now it is the fragment at offset 0 which sets the divert status of
the whole packet, whereas formerly it was the last incoming fragment
to decide.
Removal of last_pkt required a change in the interface of ip_fw_chk()
and dummynet_io(). On passing, use the same mechanism for dummynet
annotations and for divert/forward annotations.
option IPFIREWALL_FORWARD is effectively useless, the code to
implement it is very small and is now in by default to avoid the
obfuscation of conditionally compiled code.
NOTES:
* there is at least one global variable left, sro_fwd, in ip_output().
I am not sure if/how this can be removed.
* I have deliberately avoided gratuitous style changes in this commit
to avoid cluttering the diffs. Minor stule cleanup will likely be
necessary
* this commit only focused on the IP layer. I am sure there is a
number of global variables used in the TCP and maybe UDP stack.
* despite the number of files touched, there are absolutely no API's
or data structures changed by this commit (except the interfaces of
ip_fw_chk() and dummynet_io(), which are internal anyways), so
an MFC is quite safe and unintrusive (and desirable, given the
improved readability of the code).
MFC after: 10 days
2002-06-22 11:51:02 +00:00
|
|
|
pkt->ifp = fwa->oif;
|
1998-09-12 22:03:21 +00:00
|
|
|
if (dir == DN_TO_IP_OUT) {
|
1999-05-04 07:30:08 +00:00
|
|
|
/*
|
2000-01-08 11:24:46 +00:00
|
|
|
* We need to copy *ro because for ICMP pkts (and maybe others)
|
2000-06-08 09:45:23 +00:00
|
|
|
* the caller passed a pointer into the stack; dst might also be
|
|
|
|
* a pointer into *ro so it needs to be updated.
|
1999-05-04 07:30:08 +00:00
|
|
|
*/
|
Remove (almost all) global variables that were used to hold
packet forwarding state ("annotations") during ip processing.
The code is considerably cleaner now.
The variables removed by this change are:
ip_divert_cookie used by divert sockets
ip_fw_fwd_addr used for transparent ip redirection
last_pkt used by dynamic pipes in dummynet
Removal of the first two has been done by carrying the annotations
into volatile structs prepended to the mbuf chains, and adding
appropriate code to add/remove annotations in the routines which
make use of them, i.e. ip_input(), ip_output(), tcp_input(),
bdg_forward(), ether_demux(), ether_output_frame(), div_output().
On passing, remove a bug in divert handling of fragmented packet.
Now it is the fragment at offset 0 which sets the divert status of
the whole packet, whereas formerly it was the last incoming fragment
to decide.
Removal of last_pkt required a change in the interface of ip_fw_chk()
and dummynet_io(). On passing, use the same mechanism for dummynet
annotations and for divert/forward annotations.
option IPFIREWALL_FORWARD is effectively useless, the code to
implement it is very small and is now in by default to avoid the
obfuscation of conditionally compiled code.
NOTES:
* there is at least one global variable left, sro_fwd, in ip_output().
I am not sure if/how this can be removed.
* I have deliberately avoided gratuitous style changes in this commit
to avoid cluttering the diffs. Minor stule cleanup will likely be
necessary
* this commit only focused on the IP layer. I am sure there is a
number of global variables used in the TCP and maybe UDP stack.
* despite the number of files touched, there are absolutely no API's
or data structures changed by this commit (except the interfaces of
ip_fw_chk() and dummynet_io(), which are internal anyways), so
an MFC is quite safe and unintrusive (and desirable, given the
improved readability of the code).
MFC after: 10 days
2002-06-22 11:51:02 +00:00
|
|
|
pkt->ro = *(fwa->ro);
|
|
|
|
if (fwa->ro->ro_rt)
|
|
|
|
fwa->ro->ro_rt->rt_refcnt++ ;
|
|
|
|
if (fwa->dst == (struct sockaddr_in *)&fwa->ro->ro_dst) /* dst points into ro */
|
|
|
|
fwa->dst = (struct sockaddr_in *)&(pkt->ro.ro_dst) ;
|
|
|
|
|
|
|
|
pkt->dn_dst = fwa->dst;
|
|
|
|
pkt->flags = fwa->flags;
|
1998-09-12 22:03:21 +00:00
|
|
|
}
|
2000-06-08 09:45:23 +00:00
|
|
|
if (q->head == NULL)
|
|
|
|
q->head = pkt;
|
1998-09-12 22:03:21 +00:00
|
|
|
else
|
2000-06-08 09:45:23 +00:00
|
|
|
DN_NEXT(q->tail) = pkt;
|
|
|
|
q->tail = pkt;
|
2000-01-08 11:24:46 +00:00
|
|
|
q->len++;
|
|
|
|
q->len_bytes += len ;
|
1998-09-12 22:03:21 +00:00
|
|
|
|
2001-02-02 00:18:00 +00:00
|
|
|
if ( q->head != pkt ) /* flow was not idle, we are done */
|
|
|
|
goto done;
|
2000-01-08 11:24:46 +00:00
|
|
|
/*
|
2001-01-26 06:49:34 +00:00
|
|
|
* If we reach this point the flow was previously idle, so we need
|
|
|
|
* to schedule it. This involves different actions for fixed-rate or
|
|
|
|
* WF2Q queues.
|
1998-09-12 22:03:21 +00:00
|
|
|
*/
|
2002-07-09 06:53:38 +00:00
|
|
|
if (is_pipe) {
|
2001-01-26 06:49:34 +00:00
|
|
|
/*
|
|
|
|
* Fixed-rate queue: just insert into the ready_heap.
|
|
|
|
*/
|
2000-06-08 09:45:23 +00:00
|
|
|
dn_key t = 0 ;
|
2002-12-15 10:24:36 +00:00
|
|
|
if (pipe->bandwidth)
|
2000-06-08 09:45:23 +00:00
|
|
|
t = SET_TICKS(pkt, q, pipe);
|
|
|
|
q->sched_time = curr_time ;
|
|
|
|
if (t == 0) /* must process it now */
|
2001-01-26 06:49:34 +00:00
|
|
|
ready_event( q );
|
2000-06-08 09:45:23 +00:00
|
|
|
else
|
|
|
|
heap_insert(&ready_heap, curr_time + t , q );
|
|
|
|
} else {
|
|
|
|
/*
|
2001-02-02 00:18:00 +00:00
|
|
|
* WF2Q. First, compute start time S: if the flow was idle (S=F+1)
|
|
|
|
* set S to the virtual time V for the controlling pipe, and update
|
|
|
|
* the sum of weights for the pipe; otherwise, remove flow from
|
|
|
|
* idle_heap and set S to max(F,V).
|
|
|
|
* Second, compute finish time F = S + len/weight.
|
|
|
|
* Third, if pipe was idle, update V=max(S, V).
|
|
|
|
* Fourth, count one more backlogged flow.
|
2000-06-08 09:45:23 +00:00
|
|
|
*/
|
2001-01-16 23:49:49 +00:00
|
|
|
if (DN_KEY_GT(q->S, q->F)) { /* means timestamps are invalid */
|
|
|
|
q->S = pipe->V ;
|
|
|
|
pipe->sum += fs->weight ; /* add weight of new queue */
|
|
|
|
} else {
|
|
|
|
heap_extract(&(pipe->idle_heap), q);
|
|
|
|
q->S = MAX64(q->F, pipe->V ) ;
|
|
|
|
}
|
2000-06-08 09:45:23 +00:00
|
|
|
q->F = q->S + ( len<<MY_M )/(u_int64_t) fs->weight;
|
|
|
|
|
2001-02-02 00:18:00 +00:00
|
|
|
if (pipe->not_eligible_heap.elements == 0 &&
|
|
|
|
pipe->scheduler_heap.elements == 0)
|
2001-01-26 06:49:34 +00:00
|
|
|
pipe->V = MAX64 ( q->S, pipe->V );
|
2001-02-02 00:18:00 +00:00
|
|
|
fs->backlogged++ ;
|
2001-01-26 06:49:34 +00:00
|
|
|
/*
|
|
|
|
* Look at eligibility. A flow is not eligibile if S>V (when
|
|
|
|
* this happens, it means that there is some other flow already
|
|
|
|
* scheduled for the same pipe, so the scheduler_heap cannot be
|
|
|
|
* empty). If the flow is not eligible we just store it in the
|
2001-02-02 00:18:00 +00:00
|
|
|
* not_eligible_heap. Otherwise, we store in the scheduler_heap
|
2001-01-26 06:49:34 +00:00
|
|
|
* and possibly invoke ready_event_wfq() right now if there is
|
|
|
|
* leftover credit.
|
2001-02-02 00:18:00 +00:00
|
|
|
* Note that for all flows in scheduler_heap (SCH), S_i <= V,
|
|
|
|
* and for all flows in not_eligible_heap (NEH), S_i > V .
|
|
|
|
* So when we need to compute max( V, min(S_i) ) forall i in SCH+NEH,
|
|
|
|
* we only need to look into NEH.
|
2001-01-26 06:49:34 +00:00
|
|
|
*/
|
2000-06-08 09:45:23 +00:00
|
|
|
if (DN_KEY_GT(q->S, pipe->V) ) { /* not eligible */
|
2001-01-26 06:49:34 +00:00
|
|
|
if (pipe->scheduler_heap.elements == 0)
|
2002-12-24 13:45:24 +00:00
|
|
|
printf("dummynet: ++ ouch! not eligible but empty scheduler!\n");
|
2000-06-08 09:45:23 +00:00
|
|
|
heap_insert(&(pipe->not_eligible_heap), q->S, q);
|
|
|
|
} else {
|
|
|
|
heap_insert(&(pipe->scheduler_heap), q->F, q);
|
|
|
|
if (pipe->numbytes >= 0) { /* pipe is idle */
|
|
|
|
if (pipe->scheduler_heap.elements != 1)
|
2002-12-24 13:45:24 +00:00
|
|
|
printf("dummynet: OUCH! pipe should have been idle!\n");
|
|
|
|
DEB(printf("dummynet: waking up pipe %d at %d\n",
|
2000-06-08 09:45:23 +00:00
|
|
|
pipe->pipe_nr, (int)(q->F >> MY_M)); )
|
|
|
|
pipe->sched_time = curr_time ;
|
|
|
|
ready_event_wfq(pipe);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
done:
|
1999-08-11 14:37:58 +00:00
|
|
|
splx(s);
|
1998-09-12 22:03:21 +00:00
|
|
|
return 0;
|
2000-01-08 11:24:46 +00:00
|
|
|
|
|
|
|
dropit:
|
|
|
|
splx(s);
|
|
|
|
if (q)
|
|
|
|
q->drops++ ;
|
|
|
|
m_freem(m);
|
2002-08-15 16:53:43 +00:00
|
|
|
return ( (fs && (fs->flags_fs & DN_NOERROR)) ? 0 : ENOBUFS);
|
1998-09-12 22:03:21 +00:00
|
|
|
}
|
|
|
|
|
2000-01-08 11:24:46 +00:00
|
|
|
/*
|
2000-06-08 09:45:23 +00:00
|
|
|
* Below, the rt_unref is only needed when (pkt->dn_dir == DN_TO_IP_OUT)
|
2000-01-08 11:24:46 +00:00
|
|
|
* Doing this would probably save us the initial bzero of dn_pkt
|
|
|
|
*/
|
|
|
|
#define DN_FREE_PKT(pkt) { \
|
|
|
|
struct dn_pkt *n = pkt ; \
|
|
|
|
rt_unref ( n->ro.ro_rt ) ; \
|
|
|
|
m_freem(n->dn_m); \
|
|
|
|
pkt = DN_NEXT(n) ; \
|
2001-10-05 05:45:27 +00:00
|
|
|
free(n, M_DUMMYNET) ; }
|
2000-06-08 09:45:23 +00:00
|
|
|
|
1998-09-12 22:03:21 +00:00
|
|
|
/*
|
2000-06-08 09:45:23 +00:00
|
|
|
* Dispose all packets and flow_queues on a flow_set.
|
|
|
|
* If all=1, also remove red lookup table and other storage,
|
|
|
|
* including the descriptor itself.
|
|
|
|
* For the one in dn_pipe MUST also cleanup ready_heap...
|
1998-09-12 22:03:21 +00:00
|
|
|
*/
|
|
|
|
static void
|
2000-06-08 09:45:23 +00:00
|
|
|
purge_flow_set(struct dn_flow_set *fs, int all)
|
1998-09-12 22:03:21 +00:00
|
|
|
{
|
2000-01-08 11:24:46 +00:00
|
|
|
struct dn_pkt *pkt ;
|
|
|
|
struct dn_flow_queue *q, *qn ;
|
|
|
|
int i ;
|
|
|
|
|
2000-06-08 09:45:23 +00:00
|
|
|
for (i = 0 ; i <= fs->rq_size ; i++ ) {
|
|
|
|
for (q = fs->rq[i] ; q ; q = qn ) {
|
|
|
|
for (pkt = q->head ; pkt ; )
|
2000-01-08 11:24:46 +00:00
|
|
|
DN_FREE_PKT(pkt) ;
|
|
|
|
qn = q->next ;
|
2001-10-05 05:45:27 +00:00
|
|
|
free(q, M_DUMMYNET);
|
2000-01-08 11:24:46 +00:00
|
|
|
}
|
2000-06-08 09:45:23 +00:00
|
|
|
fs->rq[i] = NULL ;
|
|
|
|
}
|
|
|
|
fs->rq_elements = 0 ;
|
|
|
|
if (all) {
|
|
|
|
/* RED - free lookup table */
|
|
|
|
if (fs->w_q_lookup)
|
2001-10-05 05:45:27 +00:00
|
|
|
free(fs->w_q_lookup, M_DUMMYNET);
|
2000-06-08 09:45:23 +00:00
|
|
|
if (fs->rq)
|
2001-10-05 05:45:27 +00:00
|
|
|
free(fs->rq, M_DUMMYNET);
|
2000-06-08 09:45:23 +00:00
|
|
|
/* if this fs is not part of a pipe, free it */
|
|
|
|
if (fs->pipe && fs != &(fs->pipe->fs) )
|
2001-10-05 05:45:27 +00:00
|
|
|
free(fs, M_DUMMYNET);
|
2000-06-08 09:45:23 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Dispose all packets queued on a pipe (not a flow_set).
|
|
|
|
* Also free all resources associated to a pipe, which is about
|
|
|
|
* to be deleted.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
purge_pipe(struct dn_pipe *pipe)
|
|
|
|
{
|
|
|
|
struct dn_pkt *pkt ;
|
|
|
|
|
|
|
|
purge_flow_set( &(pipe->fs), 1 );
|
|
|
|
|
|
|
|
for (pkt = pipe->head ; pkt ; )
|
2000-01-08 11:24:46 +00:00
|
|
|
DN_FREE_PKT(pkt) ;
|
2000-06-08 09:45:23 +00:00
|
|
|
|
|
|
|
heap_free( &(pipe->scheduler_heap) );
|
|
|
|
heap_free( &(pipe->not_eligible_heap) );
|
2001-01-16 23:49:49 +00:00
|
|
|
heap_free( &(pipe->idle_heap) );
|
1998-09-12 22:03:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2000-01-08 11:24:46 +00:00
|
|
|
* Delete all pipes and heaps returning memory. Must also
|
|
|
|
* remove references from all ipfw rules to all pipes.
|
1998-09-12 22:03:21 +00:00
|
|
|
*/
|
|
|
|
static void
|
|
|
|
dummynet_flush()
|
|
|
|
{
|
2000-01-08 11:24:46 +00:00
|
|
|
struct dn_pipe *curr_p, *p ;
|
2000-06-08 09:45:23 +00:00
|
|
|
struct dn_flow_set *fs, *curr_fs;
|
2000-01-08 11:24:46 +00:00
|
|
|
int s ;
|
1998-09-12 22:03:21 +00:00
|
|
|
|
2001-01-22 23:04:13 +00:00
|
|
|
s = splimp() ;
|
2000-01-08 11:24:46 +00:00
|
|
|
|
|
|
|
/* remove all references to pipes ...*/
|
The new ipfw code.
This code makes use of variable-size kernel representation of rules
(exactly the same concept of BPF instructions, as used in the BSDI's
firewall), which makes firewall operation a lot faster, and the
code more readable and easier to extend and debug.
The interface with the rest of the system is unchanged, as witnessed
by this commit. The only extra kernel files that I am touching
are if_fw.h and ip_dummynet.c, which is quite tied to ipfw. In
userland I only had to touch those programs which manipulate the
internal representation of firewall rules).
The code is almost entirely new (and I believe I have written the
vast majority of those sections which were taken from the former
ip_fw.c), so rather than modifying the old ip_fw.c I decided to
create a new file, sys/netinet/ip_fw2.c . Same for the user
interface, which is in sbin/ipfw/ipfw2.c (it still compiles to
/sbin/ipfw). The old files are still there, and will be removed
in due time.
I have not renamed the header file because it would have required
touching a one-line change to a number of kernel files.
In terms of user interface, the new "ipfw" is supposed to accepts
the old syntax for ipfw rules (and produce the same output with
"ipfw show". Only a couple of the old options (out of some 30 of
them) has not been implemented, but they will be soon.
On the other hand, the new code has some very powerful extensions.
First, you can put "or" connectives between match fields (and soon
also between options), and write things like
ipfw add allow ip from { 1.2.3.4/27 or 5.6.7.8/30 } 10-23,25,1024-3000 to any
This should make rulesets slightly more compact (and lines longer!),
by condensing 2 or more of the old rules into single ones.
Also, as an example of how easy the rules can be extended, I have
implemented an 'address set' match pattern, where you can specify
an IP address in a format like this:
10.20.30.0/26{18,44,33,22,9}
which will match the set of hosts listed in braces belonging to the
subnet 10.20.30.0/26 . The match is done using a bitmap, so it is
essentially a constant time operation requiring a handful of CPU
instructions (and a very small amount of memmory -- for a full /24
subnet, the instruction only consumes 40 bytes).
Again, in this commit I have focused on functionality and tried
to minimize changes to the other parts of the system. Some performance
improvement can be achieved with minor changes to the interface of
ip_fw_chk_t. This will be done later when this code is settled.
The code is meant to compile unmodified on RELENG_4 (once the
PACKET_TAG_* changes have been merged), for this reason
you will see #ifdef __FreeBSD_version in a couple of places.
This should minimize errors when (hopefully soon) it will be time
to do the MFC.
2002-06-27 23:02:18 +00:00
|
|
|
flush_pipe_ptrs(NULL);
|
2000-01-08 11:24:46 +00:00
|
|
|
/* prevent future matches... */
|
|
|
|
p = all_pipes ;
|
2002-12-15 10:24:36 +00:00
|
|
|
all_pipes = NULL ;
|
2000-06-08 09:45:23 +00:00
|
|
|
fs = all_flow_sets ;
|
|
|
|
all_flow_sets = NULL ;
|
2000-01-08 11:24:46 +00:00
|
|
|
/* and free heaps so we don't have unwanted events */
|
2000-06-08 09:45:23 +00:00
|
|
|
heap_free(&ready_heap);
|
|
|
|
heap_free(&wfq_ready_heap);
|
|
|
|
heap_free(&extract_heap);
|
1998-09-12 22:03:21 +00:00
|
|
|
splx(s) ;
|
|
|
|
/*
|
2000-01-08 11:24:46 +00:00
|
|
|
* Now purge all queued pkts and delete all pipes
|
1998-09-12 22:03:21 +00:00
|
|
|
*/
|
2000-06-08 09:45:23 +00:00
|
|
|
/* scan and purge all flow_sets. */
|
|
|
|
for ( ; fs ; ) {
|
|
|
|
curr_fs = fs ;
|
|
|
|
fs = fs->next ;
|
|
|
|
purge_flow_set(curr_fs, 1);
|
|
|
|
}
|
1998-09-12 22:03:21 +00:00
|
|
|
for ( ; p ; ) {
|
|
|
|
purge_pipe(p);
|
2000-01-08 11:24:46 +00:00
|
|
|
curr_p = p ;
|
2002-12-15 10:24:36 +00:00
|
|
|
p = p->next ;
|
2001-10-05 05:45:27 +00:00
|
|
|
free(curr_p, M_DUMMYNET);
|
1998-09-12 22:03:21 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2000-06-08 09:45:23 +00:00
|
|
|
|
2001-09-27 23:44:27 +00:00
|
|
|
extern struct ip_fw *ip_fw_default_rule ;
|
2000-06-08 09:45:23 +00:00
|
|
|
static void
|
|
|
|
dn_rule_delete_fs(struct dn_flow_set *fs, void *r)
|
|
|
|
{
|
|
|
|
int i ;
|
|
|
|
struct dn_flow_queue *q ;
|
|
|
|
struct dn_pkt *pkt ;
|
|
|
|
|
|
|
|
for (i = 0 ; i <= fs->rq_size ; i++) /* last one is ovflow */
|
|
|
|
for (q = fs->rq[i] ; q ; q = q->next )
|
|
|
|
for (pkt = q->head ; pkt ; pkt = DN_NEXT(pkt) )
|
Remove (almost all) global variables that were used to hold
packet forwarding state ("annotations") during ip processing.
The code is considerably cleaner now.
The variables removed by this change are:
ip_divert_cookie used by divert sockets
ip_fw_fwd_addr used for transparent ip redirection
last_pkt used by dynamic pipes in dummynet
Removal of the first two has been done by carrying the annotations
into volatile structs prepended to the mbuf chains, and adding
appropriate code to add/remove annotations in the routines which
make use of them, i.e. ip_input(), ip_output(), tcp_input(),
bdg_forward(), ether_demux(), ether_output_frame(), div_output().
On passing, remove a bug in divert handling of fragmented packet.
Now it is the fragment at offset 0 which sets the divert status of
the whole packet, whereas formerly it was the last incoming fragment
to decide.
Removal of last_pkt required a change in the interface of ip_fw_chk()
and dummynet_io(). On passing, use the same mechanism for dummynet
annotations and for divert/forward annotations.
option IPFIREWALL_FORWARD is effectively useless, the code to
implement it is very small and is now in by default to avoid the
obfuscation of conditionally compiled code.
NOTES:
* there is at least one global variable left, sro_fwd, in ip_output().
I am not sure if/how this can be removed.
* I have deliberately avoided gratuitous style changes in this commit
to avoid cluttering the diffs. Minor stule cleanup will likely be
necessary
* this commit only focused on the IP layer. I am sure there is a
number of global variables used in the TCP and maybe UDP stack.
* despite the number of files touched, there are absolutely no API's
or data structures changed by this commit (except the interfaces of
ip_fw_chk() and dummynet_io(), which are internal anyways), so
an MFC is quite safe and unintrusive (and desirable, given the
improved readability of the code).
MFC after: 10 days
2002-06-22 11:51:02 +00:00
|
|
|
if (pkt->rule == r)
|
|
|
|
pkt->rule = ip_fw_default_rule ;
|
2000-06-08 09:45:23 +00:00
|
|
|
}
|
1998-09-12 22:03:21 +00:00
|
|
|
/*
|
2000-01-08 11:24:46 +00:00
|
|
|
* when a firewall rule is deleted, scan all queues and remove the flow-id
|
1998-09-12 22:03:21 +00:00
|
|
|
* from packets matching this rule.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
dn_rule_delete(void *r)
|
|
|
|
{
|
1999-01-11 11:08:07 +00:00
|
|
|
struct dn_pipe *p ;
|
2000-01-08 11:24:46 +00:00
|
|
|
struct dn_pkt *pkt ;
|
2000-06-08 09:45:23 +00:00
|
|
|
struct dn_flow_set *fs ;
|
1999-01-11 11:08:07 +00:00
|
|
|
|
2000-06-08 09:45:23 +00:00
|
|
|
/*
|
|
|
|
* If the rule references a queue (dn_flow_set), then scan
|
|
|
|
* the flow set, otherwise scan pipes. Should do either, but doing
|
|
|
|
* both does not harm.
|
|
|
|
*/
|
|
|
|
for ( fs = all_flow_sets ; fs ; fs = fs->next )
|
|
|
|
dn_rule_delete_fs(fs, r);
|
1999-01-11 11:08:07 +00:00
|
|
|
for ( p = all_pipes ; p ; p = p->next ) {
|
2000-06-08 09:45:23 +00:00
|
|
|
fs = &(p->fs) ;
|
|
|
|
dn_rule_delete_fs(fs, r);
|
|
|
|
for (pkt = p->head ; pkt ; pkt = DN_NEXT(pkt) )
|
2002-07-08 22:37:55 +00:00
|
|
|
if (pkt->rule == r)
|
|
|
|
pkt->rule = ip_fw_default_rule ;
|
1998-09-12 22:03:21 +00:00
|
|
|
}
|
1998-12-14 18:09:13 +00:00
|
|
|
}
|
1998-09-12 22:03:21 +00:00
|
|
|
|
|
|
|
/*
|
2000-06-08 09:45:23 +00:00
|
|
|
* setup RED parameters
|
1998-09-12 22:03:21 +00:00
|
|
|
*/
|
|
|
|
static int
|
2002-12-15 10:24:36 +00:00
|
|
|
config_red(struct dn_flow_set *p, struct dn_flow_set * x)
|
1998-09-12 22:03:21 +00:00
|
|
|
{
|
2000-06-08 09:45:23 +00:00
|
|
|
int i;
|
|
|
|
|
|
|
|
x->w_q = p->w_q;
|
|
|
|
x->min_th = SCALE(p->min_th);
|
|
|
|
x->max_th = SCALE(p->max_th);
|
|
|
|
x->max_p = p->max_p;
|
|
|
|
|
|
|
|
x->c_1 = p->max_p / (p->max_th - p->min_th);
|
|
|
|
x->c_2 = SCALE_MUL(x->c_1, SCALE(p->min_th));
|
|
|
|
if (x->flags_fs & DN_IS_GENTLE_RED) {
|
|
|
|
x->c_3 = (SCALE(1) - p->max_p) / p->max_th;
|
|
|
|
x->c_4 = (SCALE(1) - 2 * p->max_p);
|
|
|
|
}
|
1998-12-14 18:09:13 +00:00
|
|
|
|
2000-06-08 09:45:23 +00:00
|
|
|
/* if the lookup table already exist, free and create it again */
|
2001-11-04 22:56:25 +00:00
|
|
|
if (x->w_q_lookup) {
|
2001-10-05 05:45:27 +00:00
|
|
|
free(x->w_q_lookup, M_DUMMYNET);
|
2001-11-04 22:56:25 +00:00
|
|
|
x->w_q_lookup = NULL ;
|
|
|
|
}
|
2000-06-08 09:45:23 +00:00
|
|
|
if (red_lookup_depth == 0) {
|
2002-12-24 13:45:24 +00:00
|
|
|
printf("\ndummynet: net.inet.ip.dummynet.red_lookup_depth must be > 0\n");
|
2001-10-05 05:45:27 +00:00
|
|
|
free(x, M_DUMMYNET);
|
2000-06-08 09:45:23 +00:00
|
|
|
return EINVAL;
|
|
|
|
}
|
|
|
|
x->lookup_depth = red_lookup_depth;
|
|
|
|
x->w_q_lookup = (u_int *) malloc(x->lookup_depth * sizeof(int),
|
2002-12-15 10:21:30 +00:00
|
|
|
M_DUMMYNET, M_NOWAIT);
|
2000-06-08 09:45:23 +00:00
|
|
|
if (x->w_q_lookup == NULL) {
|
2002-12-24 13:45:24 +00:00
|
|
|
printf("dummynet: sorry, cannot allocate red lookup table\n");
|
2001-10-05 05:45:27 +00:00
|
|
|
free(x, M_DUMMYNET);
|
2000-06-08 09:45:23 +00:00
|
|
|
return ENOSPC;
|
|
|
|
}
|
1998-12-14 18:09:13 +00:00
|
|
|
|
2000-06-08 09:45:23 +00:00
|
|
|
/* fill the lookup table with (1 - w_q)^x */
|
|
|
|
x->lookup_step = p->lookup_step ;
|
|
|
|
x->lookup_weight = p->lookup_weight ;
|
|
|
|
x->w_q_lookup[0] = SCALE(1) - x->w_q;
|
|
|
|
for (i = 1; i < x->lookup_depth; i++)
|
|
|
|
x->w_q_lookup[i] = SCALE_MUL(x->w_q_lookup[i - 1], x->lookup_weight);
|
|
|
|
if (red_avg_pkt_size < 1)
|
|
|
|
red_avg_pkt_size = 512 ;
|
|
|
|
x->avg_pkt_size = red_avg_pkt_size ;
|
|
|
|
if (red_max_pkt_size < 1)
|
|
|
|
red_max_pkt_size = 1500 ;
|
|
|
|
x->max_pkt_size = red_max_pkt_size ;
|
|
|
|
return 0 ;
|
|
|
|
}
|
1998-12-14 18:09:13 +00:00
|
|
|
|
2000-06-08 09:45:23 +00:00
|
|
|
static int
|
|
|
|
alloc_hash(struct dn_flow_set *x, struct dn_flow_set *pfs)
|
|
|
|
{
|
|
|
|
if (x->flags_fs & DN_HAVE_FLOW_MASK) { /* allocate some slots */
|
|
|
|
int l = pfs->rq_size;
|
|
|
|
|
|
|
|
if (l == 0)
|
|
|
|
l = dn_hash_size;
|
|
|
|
if (l < 4)
|
|
|
|
l = 4;
|
2002-10-12 07:45:23 +00:00
|
|
|
else if (l > DN_MAX_HASH_SIZE)
|
|
|
|
l = DN_MAX_HASH_SIZE;
|
2000-06-08 09:45:23 +00:00
|
|
|
x->rq_size = l;
|
|
|
|
} else /* one is enough for null mask */
|
|
|
|
x->rq_size = 1;
|
|
|
|
x->rq = malloc((1 + x->rq_size) * sizeof(struct dn_flow_queue *),
|
2002-12-15 10:21:30 +00:00
|
|
|
M_DUMMYNET, M_NOWAIT | M_ZERO);
|
2000-06-08 09:45:23 +00:00
|
|
|
if (x->rq == NULL) {
|
2002-12-24 13:45:24 +00:00
|
|
|
printf("dummynet: sorry, cannot allocate queue\n");
|
2000-06-08 09:45:23 +00:00
|
|
|
return ENOSPC;
|
|
|
|
}
|
|
|
|
x->rq_elements = 0;
|
|
|
|
return 0 ;
|
|
|
|
}
|
1998-12-14 18:09:13 +00:00
|
|
|
|
2000-06-08 09:45:23 +00:00
|
|
|
static void
|
|
|
|
set_fs_parms(struct dn_flow_set *x, struct dn_flow_set *src)
|
|
|
|
{
|
|
|
|
x->flags_fs = src->flags_fs;
|
|
|
|
x->qsize = src->qsize;
|
|
|
|
x->plr = src->plr;
|
|
|
|
x->flow_mask = src->flow_mask;
|
|
|
|
if (x->flags_fs & DN_QSIZE_IS_BYTES) {
|
|
|
|
if (x->qsize > 1024*1024)
|
|
|
|
x->qsize = 1024*1024 ;
|
|
|
|
} else {
|
|
|
|
if (x->qsize == 0)
|
|
|
|
x->qsize = 50 ;
|
|
|
|
if (x->qsize > 100)
|
|
|
|
x->qsize = 50 ;
|
|
|
|
}
|
|
|
|
/* configuring RED */
|
|
|
|
if ( x->flags_fs & DN_IS_RED )
|
|
|
|
config_red(src, x) ; /* XXX should check errors */
|
2001-01-16 23:49:49 +00:00
|
|
|
}
|
1998-12-14 18:09:13 +00:00
|
|
|
|
2001-01-16 23:49:49 +00:00
|
|
|
/*
|
2000-06-08 09:45:23 +00:00
|
|
|
* setup pipe or queue parameters.
|
2001-01-16 23:49:49 +00:00
|
|
|
*/
|
2000-01-08 11:24:46 +00:00
|
|
|
|
2002-12-15 10:24:36 +00:00
|
|
|
static int
|
2000-06-08 09:45:23 +00:00
|
|
|
config_pipe(struct dn_pipe *p)
|
|
|
|
{
|
2003-07-25 09:59:16 +00:00
|
|
|
int i, r, s;
|
2000-06-08 09:45:23 +00:00
|
|
|
struct dn_flow_set *pfs = &(p->fs);
|
2003-03-27 14:56:36 +00:00
|
|
|
struct dn_flow_queue *q;
|
2000-01-08 11:24:46 +00:00
|
|
|
|
2001-11-04 22:56:25 +00:00
|
|
|
/*
|
|
|
|
* The config program passes parameters as follows:
|
2000-06-08 09:45:23 +00:00
|
|
|
* bw = bits/second (0 means no limits),
|
|
|
|
* delay = ms, must be translated into ticks.
|
|
|
|
* qsize = slots/bytes
|
2001-11-04 22:56:25 +00:00
|
|
|
*/
|
|
|
|
p->delay = ( p->delay * hz ) / 1000 ;
|
2000-06-08 09:45:23 +00:00
|
|
|
/* We need either a pipe number or a flow_set number */
|
|
|
|
if (p->pipe_nr == 0 && pfs->fs_nr == 0)
|
|
|
|
return EINVAL ;
|
|
|
|
if (p->pipe_nr != 0 && pfs->fs_nr != 0)
|
|
|
|
return EINVAL ;
|
|
|
|
if (p->pipe_nr != 0) { /* this is a pipe */
|
|
|
|
struct dn_pipe *x, *a, *b;
|
|
|
|
/* locate pipe */
|
2000-01-08 11:24:46 +00:00
|
|
|
for (a = NULL , b = all_pipes ; b && b->pipe_nr < p->pipe_nr ;
|
1998-09-12 22:03:21 +00:00
|
|
|
a = b , b = b->next) ;
|
2000-06-08 09:45:23 +00:00
|
|
|
|
|
|
|
if (b == NULL || b->pipe_nr != p->pipe_nr) { /* new pipe */
|
2002-12-15 10:21:30 +00:00
|
|
|
x = malloc(sizeof(struct dn_pipe), M_DUMMYNET, M_NOWAIT | M_ZERO);
|
2000-01-08 11:24:46 +00:00
|
|
|
if (x == NULL) {
|
2002-12-24 13:45:24 +00:00
|
|
|
printf("dummynet: no memory for new pipe\n");
|
2000-06-08 09:45:23 +00:00
|
|
|
return ENOSPC;
|
1998-09-12 22:03:21 +00:00
|
|
|
}
|
2000-06-08 09:45:23 +00:00
|
|
|
x->pipe_nr = p->pipe_nr;
|
|
|
|
x->fs.pipe = x ;
|
2001-02-02 00:18:00 +00:00
|
|
|
/* idle_heap is the only one from which we extract from the middle.
|
2001-01-16 23:49:49 +00:00
|
|
|
*/
|
|
|
|
x->idle_heap.size = x->idle_heap.elements = 0 ;
|
2001-02-02 00:18:00 +00:00
|
|
|
x->idle_heap.offset=OFFSET_OF(struct dn_flow_queue, heap_pos);
|
2003-03-27 14:56:36 +00:00
|
|
|
} else {
|
2000-06-08 09:45:23 +00:00
|
|
|
x = b;
|
2003-03-27 14:56:36 +00:00
|
|
|
s = splimp();
|
|
|
|
/* Flush accumulated credit for all queues */
|
|
|
|
for (i = 0; i <= x->fs.rq_size; i++)
|
|
|
|
for (q = x->fs.rq[i]; q; q = q->next)
|
|
|
|
q->numbytes = 0;
|
|
|
|
splx(s);
|
|
|
|
}
|
2000-06-08 09:45:23 +00:00
|
|
|
|
2003-03-27 14:56:36 +00:00
|
|
|
s = splimp();
|
2003-03-27 15:00:10 +00:00
|
|
|
x->bandwidth = p->bandwidth ;
|
2000-06-08 09:45:23 +00:00
|
|
|
x->numbytes = 0; /* just in case... */
|
|
|
|
bcopy(p->if_name, x->if_name, sizeof(p->if_name) );
|
|
|
|
x->ifp = NULL ; /* reset interface ptr */
|
2003-03-27 15:00:10 +00:00
|
|
|
x->delay = p->delay ;
|
2000-06-08 09:45:23 +00:00
|
|
|
set_fs_parms(&(x->fs), pfs);
|
|
|
|
|
|
|
|
|
|
|
|
if ( x->fs.rq == NULL ) { /* a new pipe */
|
2003-07-25 09:59:16 +00:00
|
|
|
r = alloc_hash(&(x->fs), pfs) ;
|
|
|
|
if (r) {
|
2001-10-05 05:45:27 +00:00
|
|
|
free(x, M_DUMMYNET);
|
2003-07-25 09:59:16 +00:00
|
|
|
splx(s);
|
|
|
|
return r ;
|
2000-01-08 11:24:46 +00:00
|
|
|
}
|
|
|
|
x->next = b ;
|
|
|
|
if (a == NULL)
|
|
|
|
all_pipes = x ;
|
|
|
|
else
|
|
|
|
a->next = x ;
|
|
|
|
}
|
2003-03-27 14:56:36 +00:00
|
|
|
splx(s);
|
2000-06-08 09:45:23 +00:00
|
|
|
} else { /* config queue */
|
|
|
|
struct dn_flow_set *x, *a, *b ;
|
1998-12-14 18:09:13 +00:00
|
|
|
|
2000-06-08 09:45:23 +00:00
|
|
|
/* locate flow_set */
|
|
|
|
for (a=NULL, b=all_flow_sets ; b && b->fs_nr < pfs->fs_nr ;
|
1998-09-12 22:03:21 +00:00
|
|
|
a = b , b = b->next) ;
|
2000-01-08 11:24:46 +00:00
|
|
|
|
2000-06-08 09:45:23 +00:00
|
|
|
if (b == NULL || b->fs_nr != pfs->fs_nr) { /* new */
|
|
|
|
if (pfs->parent_nr == 0) /* need link to a pipe */
|
|
|
|
return EINVAL ;
|
2002-12-15 10:21:30 +00:00
|
|
|
x = malloc(sizeof(struct dn_flow_set), M_DUMMYNET, M_NOWAIT|M_ZERO);
|
2000-06-08 09:45:23 +00:00
|
|
|
if (x == NULL) {
|
2002-12-24 13:45:24 +00:00
|
|
|
printf("dummynet: no memory for new flow_set\n");
|
2000-06-08 09:45:23 +00:00
|
|
|
return ENOSPC;
|
|
|
|
}
|
|
|
|
x->fs_nr = pfs->fs_nr;
|
|
|
|
x->parent_nr = pfs->parent_nr;
|
|
|
|
x->weight = pfs->weight ;
|
|
|
|
if (x->weight == 0)
|
|
|
|
x->weight = 1 ;
|
|
|
|
else if (x->weight > 100)
|
|
|
|
x->weight = 100 ;
|
|
|
|
} else {
|
|
|
|
/* Change parent pipe not allowed; must delete and recreate */
|
|
|
|
if (pfs->parent_nr != 0 && b->parent_nr != pfs->parent_nr)
|
|
|
|
return EINVAL ;
|
|
|
|
x = b;
|
|
|
|
}
|
2003-03-27 14:56:36 +00:00
|
|
|
s = splimp();
|
2000-06-08 09:45:23 +00:00
|
|
|
set_fs_parms(x, pfs);
|
2000-01-08 11:24:46 +00:00
|
|
|
|
2000-06-08 09:45:23 +00:00
|
|
|
if ( x->rq == NULL ) { /* a new flow_set */
|
2003-07-25 09:59:16 +00:00
|
|
|
r = alloc_hash(x, pfs) ;
|
2003-07-31 10:24:36 +00:00
|
|
|
if (r) {
|
2001-10-05 05:45:27 +00:00
|
|
|
free(x, M_DUMMYNET);
|
2003-07-25 09:59:16 +00:00
|
|
|
splx(s);
|
|
|
|
return r ;
|
2000-06-08 09:45:23 +00:00
|
|
|
}
|
|
|
|
x->next = b;
|
2000-01-08 11:24:46 +00:00
|
|
|
if (a == NULL)
|
2000-06-08 09:45:23 +00:00
|
|
|
all_flow_sets = x;
|
2000-01-08 11:24:46 +00:00
|
|
|
else
|
2000-06-08 09:45:23 +00:00
|
|
|
a->next = x;
|
|
|
|
}
|
2003-03-27 14:56:36 +00:00
|
|
|
splx(s);
|
2000-06-08 09:45:23 +00:00
|
|
|
}
|
|
|
|
return 0 ;
|
|
|
|
}
|
|
|
|
|
2001-01-26 06:49:34 +00:00
|
|
|
/*
|
2000-06-08 09:45:23 +00:00
|
|
|
* Helper function to remove from a heap queues which are linked to
|
|
|
|
* a flow_set about to be deleted.
|
2001-02-02 00:18:00 +00:00
|
|
|
*/
|
2000-06-08 09:45:23 +00:00
|
|
|
static void
|
|
|
|
fs_remove_from_heap(struct dn_heap *h, struct dn_flow_set *fs)
|
|
|
|
{
|
2001-01-16 23:49:49 +00:00
|
|
|
int i = 0, found = 0 ;
|
2000-06-08 09:45:23 +00:00
|
|
|
for (; i < h->elements ;)
|
|
|
|
if ( ((struct dn_flow_queue *)h->p[i].object)->fs == fs) {
|
2001-01-16 23:49:49 +00:00
|
|
|
h->elements-- ;
|
|
|
|
h->p[i] = h->p[h->elements] ;
|
|
|
|
found++ ;
|
|
|
|
} else
|
|
|
|
i++ ;
|
|
|
|
if (found)
|
|
|
|
heapify(h);
|
|
|
|
}
|
2000-06-08 09:45:23 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* helper function to remove a pipe from a heap (can be there at most once)
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
pipe_remove_from_heap(struct dn_heap *h, struct dn_pipe *p)
|
|
|
|
{
|
|
|
|
if (h->elements > 0) {
|
|
|
|
int i = 0 ;
|
|
|
|
for (i=0; i < h->elements ; i++ ) {
|
|
|
|
if (h->p[i].object == p) { /* found it */
|
2001-01-26 06:49:34 +00:00
|
|
|
h->elements-- ;
|
|
|
|
h->p[i] = h->p[h->elements] ;
|
|
|
|
heapify(h);
|
2000-06-08 09:45:23 +00:00
|
|
|
break ;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2001-01-16 23:49:49 +00:00
|
|
|
}
|
2000-06-08 09:45:23 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* drain all queues. Called in case of severe mbuf shortage.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
dummynet_drain()
|
|
|
|
{
|
|
|
|
struct dn_flow_set *fs;
|
|
|
|
struct dn_pipe *p;
|
|
|
|
struct dn_pkt *pkt;
|
|
|
|
|
|
|
|
heap_free(&ready_heap);
|
|
|
|
heap_free(&wfq_ready_heap);
|
|
|
|
heap_free(&extract_heap);
|
|
|
|
/* remove all references to this pipe from flow_sets */
|
|
|
|
for (fs = all_flow_sets; fs; fs= fs->next )
|
|
|
|
purge_flow_set(fs, 0);
|
|
|
|
|
|
|
|
for (p = all_pipes; p; p= p->next ) {
|
|
|
|
purge_flow_set(&(p->fs), 0);
|
|
|
|
for (pkt = p->head ; pkt ; )
|
|
|
|
DN_FREE_PKT(pkt) ;
|
|
|
|
p->head = p->tail = NULL ;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Fully delete a pipe or a queue, cleaning up associated info.
|
|
|
|
*/
|
2002-12-15 10:24:36 +00:00
|
|
|
static int
|
2000-06-08 09:45:23 +00:00
|
|
|
delete_pipe(struct dn_pipe *p)
|
|
|
|
{
|
|
|
|
int s ;
|
|
|
|
|
|
|
|
if (p->pipe_nr == 0 && p->fs.fs_nr == 0)
|
|
|
|
return EINVAL ;
|
|
|
|
if (p->pipe_nr != 0 && p->fs.fs_nr != 0)
|
|
|
|
return EINVAL ;
|
|
|
|
if (p->pipe_nr != 0) { /* this is an old-style pipe */
|
|
|
|
struct dn_pipe *a, *b;
|
|
|
|
struct dn_flow_set *fs;
|
|
|
|
|
|
|
|
/* locate pipe */
|
|
|
|
for (a = NULL , b = all_pipes ; b && b->pipe_nr < p->pipe_nr ;
|
|
|
|
a = b , b = b->next) ;
|
2001-01-16 23:49:49 +00:00
|
|
|
if (b == NULL || (b->pipe_nr != p->pipe_nr) )
|
2000-06-08 09:45:23 +00:00
|
|
|
return EINVAL ; /* not found */
|
|
|
|
|
2001-01-22 23:04:13 +00:00
|
|
|
s = splimp() ;
|
2000-06-08 09:45:23 +00:00
|
|
|
|
|
|
|
/* unlink from list of pipes */
|
|
|
|
if (a == NULL)
|
|
|
|
all_pipes = b->next ;
|
|
|
|
else
|
|
|
|
a->next = b->next ;
|
|
|
|
/* remove references to this pipe from the ip_fw rules. */
|
The new ipfw code.
This code makes use of variable-size kernel representation of rules
(exactly the same concept of BPF instructions, as used in the BSDI's
firewall), which makes firewall operation a lot faster, and the
code more readable and easier to extend and debug.
The interface with the rest of the system is unchanged, as witnessed
by this commit. The only extra kernel files that I am touching
are if_fw.h and ip_dummynet.c, which is quite tied to ipfw. In
userland I only had to touch those programs which manipulate the
internal representation of firewall rules).
The code is almost entirely new (and I believe I have written the
vast majority of those sections which were taken from the former
ip_fw.c), so rather than modifying the old ip_fw.c I decided to
create a new file, sys/netinet/ip_fw2.c . Same for the user
interface, which is in sbin/ipfw/ipfw2.c (it still compiles to
/sbin/ipfw). The old files are still there, and will be removed
in due time.
I have not renamed the header file because it would have required
touching a one-line change to a number of kernel files.
In terms of user interface, the new "ipfw" is supposed to accepts
the old syntax for ipfw rules (and produce the same output with
"ipfw show". Only a couple of the old options (out of some 30 of
them) has not been implemented, but they will be soon.
On the other hand, the new code has some very powerful extensions.
First, you can put "or" connectives between match fields (and soon
also between options), and write things like
ipfw add allow ip from { 1.2.3.4/27 or 5.6.7.8/30 } 10-23,25,1024-3000 to any
This should make rulesets slightly more compact (and lines longer!),
by condensing 2 or more of the old rules into single ones.
Also, as an example of how easy the rules can be extended, I have
implemented an 'address set' match pattern, where you can specify
an IP address in a format like this:
10.20.30.0/26{18,44,33,22,9}
which will match the set of hosts listed in braces belonging to the
subnet 10.20.30.0/26 . The match is done using a bitmap, so it is
essentially a constant time operation requiring a handful of CPU
instructions (and a very small amount of memmory -- for a full /24
subnet, the instruction only consumes 40 bytes).
Again, in this commit I have focused on functionality and tried
to minimize changes to the other parts of the system. Some performance
improvement can be achieved with minor changes to the interface of
ip_fw_chk_t. This will be done later when this code is settled.
The code is meant to compile unmodified on RELENG_4 (once the
PACKET_TAG_* changes have been merged), for this reason
you will see #ifdef __FreeBSD_version in a couple of places.
This should minimize errors when (hopefully soon) it will be time
to do the MFC.
2002-06-27 23:02:18 +00:00
|
|
|
flush_pipe_ptrs(&(b->fs));
|
2000-06-08 09:45:23 +00:00
|
|
|
|
|
|
|
/* remove all references to this pipe from flow_sets */
|
|
|
|
for (fs = all_flow_sets; fs; fs= fs->next )
|
|
|
|
if (fs->pipe == b) {
|
2002-12-24 13:45:24 +00:00
|
|
|
printf("dummynet: ++ ref to pipe %d from fs %d\n",
|
2000-06-08 09:45:23 +00:00
|
|
|
p->pipe_nr, fs->fs_nr);
|
|
|
|
fs->pipe = NULL ;
|
|
|
|
purge_flow_set(fs, 0);
|
|
|
|
}
|
|
|
|
fs_remove_from_heap(&ready_heap, &(b->fs));
|
|
|
|
purge_pipe(b); /* remove all data associated to this pipe */
|
|
|
|
/* remove reference to here from extract_heap and wfq_ready_heap */
|
|
|
|
pipe_remove_from_heap(&extract_heap, b);
|
|
|
|
pipe_remove_from_heap(&wfq_ready_heap, b);
|
2001-01-26 06:49:34 +00:00
|
|
|
splx(s);
|
2001-10-05 05:45:27 +00:00
|
|
|
free(b, M_DUMMYNET);
|
2001-01-26 19:43:54 +00:00
|
|
|
} else { /* this is a WF2Q queue (dn_flow_set) */
|
2000-06-08 09:45:23 +00:00
|
|
|
struct dn_flow_set *a, *b;
|
|
|
|
|
|
|
|
/* locate set */
|
|
|
|
for (a = NULL, b = all_flow_sets ; b && b->fs_nr < p->fs.fs_nr ;
|
|
|
|
a = b , b = b->next) ;
|
2001-01-16 23:49:49 +00:00
|
|
|
if (b == NULL || (b->fs_nr != p->fs.fs_nr) )
|
2000-06-08 09:45:23 +00:00
|
|
|
return EINVAL ; /* not found */
|
|
|
|
|
2001-01-22 23:04:13 +00:00
|
|
|
s = splimp() ;
|
2000-06-08 09:45:23 +00:00
|
|
|
if (a == NULL)
|
|
|
|
all_flow_sets = b->next ;
|
|
|
|
else
|
|
|
|
a->next = b->next ;
|
|
|
|
/* remove references to this flow_set from the ip_fw rules. */
|
The new ipfw code.
This code makes use of variable-size kernel representation of rules
(exactly the same concept of BPF instructions, as used in the BSDI's
firewall), which makes firewall operation a lot faster, and the
code more readable and easier to extend and debug.
The interface with the rest of the system is unchanged, as witnessed
by this commit. The only extra kernel files that I am touching
are if_fw.h and ip_dummynet.c, which is quite tied to ipfw. In
userland I only had to touch those programs which manipulate the
internal representation of firewall rules).
The code is almost entirely new (and I believe I have written the
vast majority of those sections which were taken from the former
ip_fw.c), so rather than modifying the old ip_fw.c I decided to
create a new file, sys/netinet/ip_fw2.c . Same for the user
interface, which is in sbin/ipfw/ipfw2.c (it still compiles to
/sbin/ipfw). The old files are still there, and will be removed
in due time.
I have not renamed the header file because it would have required
touching a one-line change to a number of kernel files.
In terms of user interface, the new "ipfw" is supposed to accepts
the old syntax for ipfw rules (and produce the same output with
"ipfw show". Only a couple of the old options (out of some 30 of
them) has not been implemented, but they will be soon.
On the other hand, the new code has some very powerful extensions.
First, you can put "or" connectives between match fields (and soon
also between options), and write things like
ipfw add allow ip from { 1.2.3.4/27 or 5.6.7.8/30 } 10-23,25,1024-3000 to any
This should make rulesets slightly more compact (and lines longer!),
by condensing 2 or more of the old rules into single ones.
Also, as an example of how easy the rules can be extended, I have
implemented an 'address set' match pattern, where you can specify
an IP address in a format like this:
10.20.30.0/26{18,44,33,22,9}
which will match the set of hosts listed in braces belonging to the
subnet 10.20.30.0/26 . The match is done using a bitmap, so it is
essentially a constant time operation requiring a handful of CPU
instructions (and a very small amount of memmory -- for a full /24
subnet, the instruction only consumes 40 bytes).
Again, in this commit I have focused on functionality and tried
to minimize changes to the other parts of the system. Some performance
improvement can be achieved with minor changes to the interface of
ip_fw_chk_t. This will be done later when this code is settled.
The code is meant to compile unmodified on RELENG_4 (once the
PACKET_TAG_* changes have been merged), for this reason
you will see #ifdef __FreeBSD_version in a couple of places.
This should minimize errors when (hopefully soon) it will be time
to do the MFC.
2002-06-27 23:02:18 +00:00
|
|
|
flush_pipe_ptrs(b);
|
2000-06-08 09:45:23 +00:00
|
|
|
|
|
|
|
if (b->pipe != NULL) {
|
|
|
|
/* Update total weight on parent pipe and cleanup parent heaps */
|
|
|
|
b->pipe->sum -= b->weight * b->backlogged ;
|
|
|
|
fs_remove_from_heap(&(b->pipe->not_eligible_heap), b);
|
|
|
|
fs_remove_from_heap(&(b->pipe->scheduler_heap), b);
|
2001-01-26 06:49:34 +00:00
|
|
|
#if 1 /* XXX should i remove from idle_heap as well ? */
|
2001-01-16 23:49:49 +00:00
|
|
|
fs_remove_from_heap(&(b->pipe->idle_heap), b);
|
|
|
|
#endif
|
2000-06-08 09:45:23 +00:00
|
|
|
}
|
|
|
|
purge_flow_set(b, 1);
|
|
|
|
splx(s);
|
|
|
|
}
|
|
|
|
return 0 ;
|
2001-01-16 23:49:49 +00:00
|
|
|
}
|
2000-06-08 09:45:23 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* helper function used to copy data from kernel in DUMMYNET_GET
|
|
|
|
*/
|
|
|
|
static char *
|
|
|
|
dn_copy_set(struct dn_flow_set *set, char *bp)
|
|
|
|
{
|
|
|
|
int i, copied = 0 ;
|
|
|
|
struct dn_flow_queue *q, *qp = (struct dn_flow_queue *)bp;
|
|
|
|
|
|
|
|
for (i = 0 ; i <= set->rq_size ; i++)
|
|
|
|
for (q = set->rq[i] ; q ; q = q->next, qp++ ) {
|
|
|
|
if (q->hash_slot != i)
|
2002-12-24 13:45:24 +00:00
|
|
|
printf("dummynet: ++ at %d: wrong slot (have %d, "
|
2000-06-08 09:45:23 +00:00
|
|
|
"should be %d)\n", copied, q->hash_slot, i);
|
|
|
|
if (q->fs != set)
|
2002-12-24 13:45:24 +00:00
|
|
|
printf("dummynet: ++ at %d: wrong fs ptr (have %p, should be %p)\n",
|
2000-06-08 09:45:23 +00:00
|
|
|
i, q->fs, set);
|
|
|
|
copied++ ;
|
|
|
|
bcopy(q, qp, sizeof( *q ) );
|
|
|
|
/* cleanup pointers */
|
|
|
|
qp->next = NULL ;
|
|
|
|
qp->head = qp->tail = NULL ;
|
|
|
|
qp->fs = NULL ;
|
1998-09-12 22:03:21 +00:00
|
|
|
}
|
2000-06-08 09:45:23 +00:00
|
|
|
if (copied != set->rq_elements)
|
2002-12-24 13:45:24 +00:00
|
|
|
printf("dummynet: ++ wrong count, have %d should be %d\n",
|
2000-06-08 09:45:23 +00:00
|
|
|
copied, set->rq_elements);
|
|
|
|
return (char *)qp ;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
dummynet_get(struct sockopt *sopt)
|
|
|
|
{
|
|
|
|
char *buf, *bp ; /* bp is the "copy-pointer" */
|
|
|
|
size_t size ;
|
|
|
|
struct dn_flow_set *set ;
|
|
|
|
struct dn_pipe *p ;
|
|
|
|
int s, error=0 ;
|
|
|
|
|
2001-01-22 23:04:13 +00:00
|
|
|
s = splimp();
|
2000-06-08 09:45:23 +00:00
|
|
|
/*
|
|
|
|
* compute size of data structures: list of pipes and flow_sets.
|
|
|
|
*/
|
|
|
|
for (p = all_pipes, size = 0 ; p ; p = p->next )
|
|
|
|
size += sizeof( *p ) +
|
|
|
|
p->fs.rq_elements * sizeof(struct dn_flow_queue);
|
|
|
|
for (set = all_flow_sets ; set ; set = set->next )
|
|
|
|
size += sizeof ( *set ) +
|
|
|
|
set->rq_elements * sizeof(struct dn_flow_queue);
|
2002-12-15 10:21:30 +00:00
|
|
|
buf = malloc(size, M_TEMP, M_NOWAIT);
|
2000-06-08 09:45:23 +00:00
|
|
|
if (buf == 0) {
|
|
|
|
splx(s);
|
|
|
|
return ENOBUFS ;
|
|
|
|
}
|
|
|
|
for (p = all_pipes, bp = buf ; p ; p = p->next ) {
|
|
|
|
struct dn_pipe *pipe_bp = (struct dn_pipe *)bp ;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* copy pipe descriptor into *bp, convert delay back to ms,
|
|
|
|
* then copy the flow_set descriptor(s) one at a time.
|
|
|
|
* After each flow_set, copy the queue descriptor it owns.
|
|
|
|
*/
|
|
|
|
bcopy(p, bp, sizeof( *p ) );
|
|
|
|
pipe_bp->delay = (pipe_bp->delay * 1000) / hz ;
|
2000-06-14 10:07:22 +00:00
|
|
|
/*
|
|
|
|
* XXX the following is a hack based on ->next being the
|
|
|
|
* first field in dn_pipe and dn_flow_set. The correct
|
|
|
|
* solution would be to move the dn_flow_set to the beginning
|
|
|
|
* of struct dn_pipe.
|
|
|
|
*/
|
|
|
|
pipe_bp->next = (struct dn_pipe *)DN_IS_PIPE ;
|
|
|
|
/* clean pointers */
|
2000-06-08 09:45:23 +00:00
|
|
|
pipe_bp->head = pipe_bp->tail = NULL ;
|
|
|
|
pipe_bp->fs.next = NULL ;
|
|
|
|
pipe_bp->fs.pipe = NULL ;
|
|
|
|
pipe_bp->fs.rq = NULL ;
|
|
|
|
|
|
|
|
bp += sizeof( *p ) ;
|
|
|
|
bp = dn_copy_set( &(p->fs), bp );
|
|
|
|
}
|
|
|
|
for (set = all_flow_sets ; set ; set = set->next ) {
|
|
|
|
struct dn_flow_set *fs_bp = (struct dn_flow_set *)bp ;
|
|
|
|
bcopy(set, bp, sizeof( *set ) );
|
2000-06-14 10:07:22 +00:00
|
|
|
/* XXX same hack as above */
|
|
|
|
fs_bp->next = (struct dn_flow_set *)DN_IS_QUEUE ;
|
2000-06-08 09:45:23 +00:00
|
|
|
fs_bp->pipe = NULL ;
|
|
|
|
fs_bp->rq = NULL ;
|
|
|
|
bp += sizeof( *set ) ;
|
|
|
|
bp = dn_copy_set( set, bp );
|
|
|
|
}
|
|
|
|
splx(s);
|
|
|
|
error = sooptcopyout(sopt, buf, size);
|
2001-11-04 22:56:25 +00:00
|
|
|
free(buf, M_TEMP);
|
2000-06-08 09:45:23 +00:00
|
|
|
return error ;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Handler for the various dummynet socket options (get, flush, config, del)
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
ip_dn_ctl(struct sockopt *sopt)
|
|
|
|
{
|
|
|
|
int error = 0 ;
|
|
|
|
struct dn_pipe *p, tmp_pipe;
|
|
|
|
|
|
|
|
/* Disallow sets in really-really secure mode. */
|
2001-09-26 19:58:29 +00:00
|
|
|
if (sopt->sopt_dir == SOPT_SET) {
|
The new ipfw code.
This code makes use of variable-size kernel representation of rules
(exactly the same concept of BPF instructions, as used in the BSDI's
firewall), which makes firewall operation a lot faster, and the
code more readable and easier to extend and debug.
The interface with the rest of the system is unchanged, as witnessed
by this commit. The only extra kernel files that I am touching
are if_fw.h and ip_dummynet.c, which is quite tied to ipfw. In
userland I only had to touch those programs which manipulate the
internal representation of firewall rules).
The code is almost entirely new (and I believe I have written the
vast majority of those sections which were taken from the former
ip_fw.c), so rather than modifying the old ip_fw.c I decided to
create a new file, sys/netinet/ip_fw2.c . Same for the user
interface, which is in sbin/ipfw/ipfw2.c (it still compiles to
/sbin/ipfw). The old files are still there, and will be removed
in due time.
I have not renamed the header file because it would have required
touching a one-line change to a number of kernel files.
In terms of user interface, the new "ipfw" is supposed to accepts
the old syntax for ipfw rules (and produce the same output with
"ipfw show". Only a couple of the old options (out of some 30 of
them) has not been implemented, but they will be soon.
On the other hand, the new code has some very powerful extensions.
First, you can put "or" connectives between match fields (and soon
also between options), and write things like
ipfw add allow ip from { 1.2.3.4/27 or 5.6.7.8/30 } 10-23,25,1024-3000 to any
This should make rulesets slightly more compact (and lines longer!),
by condensing 2 or more of the old rules into single ones.
Also, as an example of how easy the rules can be extended, I have
implemented an 'address set' match pattern, where you can specify
an IP address in a format like this:
10.20.30.0/26{18,44,33,22,9}
which will match the set of hosts listed in braces belonging to the
subnet 10.20.30.0/26 . The match is done using a bitmap, so it is
essentially a constant time operation requiring a handful of CPU
instructions (and a very small amount of memmory -- for a full /24
subnet, the instruction only consumes 40 bytes).
Again, in this commit I have focused on functionality and tried
to minimize changes to the other parts of the system. Some performance
improvement can be achieved with minor changes to the interface of
ip_fw_chk_t. This will be done later when this code is settled.
The code is meant to compile unmodified on RELENG_4 (once the
PACKET_TAG_* changes have been merged), for this reason
you will see #ifdef __FreeBSD_version in a couple of places.
This should minimize errors when (hopefully soon) it will be time
to do the MFC.
2002-06-27 23:02:18 +00:00
|
|
|
#if __FreeBSD_version >= 500034
|
2002-02-27 18:32:23 +00:00
|
|
|
error = securelevel_ge(sopt->sopt_td->td_ucred, 3);
|
2001-09-26 19:58:29 +00:00
|
|
|
if (error)
|
|
|
|
return (error);
|
The new ipfw code.
This code makes use of variable-size kernel representation of rules
(exactly the same concept of BPF instructions, as used in the BSDI's
firewall), which makes firewall operation a lot faster, and the
code more readable and easier to extend and debug.
The interface with the rest of the system is unchanged, as witnessed
by this commit. The only extra kernel files that I am touching
are if_fw.h and ip_dummynet.c, which is quite tied to ipfw. In
userland I only had to touch those programs which manipulate the
internal representation of firewall rules).
The code is almost entirely new (and I believe I have written the
vast majority of those sections which were taken from the former
ip_fw.c), so rather than modifying the old ip_fw.c I decided to
create a new file, sys/netinet/ip_fw2.c . Same for the user
interface, which is in sbin/ipfw/ipfw2.c (it still compiles to
/sbin/ipfw). The old files are still there, and will be removed
in due time.
I have not renamed the header file because it would have required
touching a one-line change to a number of kernel files.
In terms of user interface, the new "ipfw" is supposed to accepts
the old syntax for ipfw rules (and produce the same output with
"ipfw show". Only a couple of the old options (out of some 30 of
them) has not been implemented, but they will be soon.
On the other hand, the new code has some very powerful extensions.
First, you can put "or" connectives between match fields (and soon
also between options), and write things like
ipfw add allow ip from { 1.2.3.4/27 or 5.6.7.8/30 } 10-23,25,1024-3000 to any
This should make rulesets slightly more compact (and lines longer!),
by condensing 2 or more of the old rules into single ones.
Also, as an example of how easy the rules can be extended, I have
implemented an 'address set' match pattern, where you can specify
an IP address in a format like this:
10.20.30.0/26{18,44,33,22,9}
which will match the set of hosts listed in braces belonging to the
subnet 10.20.30.0/26 . The match is done using a bitmap, so it is
essentially a constant time operation requiring a handful of CPU
instructions (and a very small amount of memmory -- for a full /24
subnet, the instruction only consumes 40 bytes).
Again, in this commit I have focused on functionality and tried
to minimize changes to the other parts of the system. Some performance
improvement can be achieved with minor changes to the interface of
ip_fw_chk_t. This will be done later when this code is settled.
The code is meant to compile unmodified on RELENG_4 (once the
PACKET_TAG_* changes have been merged), for this reason
you will see #ifdef __FreeBSD_version in a couple of places.
This should minimize errors when (hopefully soon) it will be time
to do the MFC.
2002-06-27 23:02:18 +00:00
|
|
|
#else
|
|
|
|
if (securelevel >= 3)
|
|
|
|
return (EPERM);
|
|
|
|
#endif
|
2001-09-26 19:58:29 +00:00
|
|
|
}
|
2000-06-08 09:45:23 +00:00
|
|
|
|
|
|
|
switch (sopt->sopt_name) {
|
|
|
|
default :
|
2002-12-24 13:45:24 +00:00
|
|
|
printf("dummynet: -- unknown option %d", sopt->sopt_name);
|
2000-06-08 09:45:23 +00:00
|
|
|
return EINVAL ;
|
|
|
|
|
|
|
|
case IP_DUMMYNET_GET :
|
|
|
|
error = dummynet_get(sopt);
|
|
|
|
break ;
|
|
|
|
|
|
|
|
case IP_DUMMYNET_FLUSH :
|
|
|
|
dummynet_flush() ;
|
|
|
|
break ;
|
|
|
|
|
|
|
|
case IP_DUMMYNET_CONFIGURE :
|
|
|
|
p = &tmp_pipe ;
|
|
|
|
error = sooptcopyin(sopt, p, sizeof *p, sizeof *p);
|
|
|
|
if (error)
|
|
|
|
break ;
|
|
|
|
error = config_pipe(p);
|
|
|
|
break ;
|
|
|
|
|
|
|
|
case IP_DUMMYNET_DEL : /* remove a pipe or queue */
|
|
|
|
p = &tmp_pipe ;
|
|
|
|
error = sooptcopyin(sopt, p, sizeof *p, sizeof *p);
|
|
|
|
if (error)
|
|
|
|
break ;
|
|
|
|
|
|
|
|
error = delete_pipe(p);
|
2000-01-08 11:24:46 +00:00
|
|
|
break ;
|
|
|
|
}
|
1998-12-14 18:09:13 +00:00
|
|
|
return error ;
|
1998-09-12 22:03:21 +00:00
|
|
|
}
|
|
|
|
|
1999-04-20 13:32:06 +00:00
|
|
|
static void
|
1998-09-12 22:03:21 +00:00
|
|
|
ip_dn_init(void)
|
|
|
|
{
|
2001-11-04 22:56:25 +00:00
|
|
|
printf("DUMMYNET initialized (011031)\n");
|
1998-09-12 22:03:21 +00:00
|
|
|
all_pipes = NULL ;
|
2000-06-08 09:45:23 +00:00
|
|
|
all_flow_sets = NULL ;
|
2000-01-08 11:24:46 +00:00
|
|
|
ready_heap.size = ready_heap.elements = 0 ;
|
2001-02-02 00:18:00 +00:00
|
|
|
ready_heap.offset = 0 ;
|
2000-06-08 09:45:23 +00:00
|
|
|
|
|
|
|
wfq_ready_heap.size = wfq_ready_heap.elements = 0 ;
|
2001-02-02 00:18:00 +00:00
|
|
|
wfq_ready_heap.offset = 0 ;
|
2000-06-08 09:45:23 +00:00
|
|
|
|
2000-01-08 11:24:46 +00:00
|
|
|
extract_heap.size = extract_heap.elements = 0 ;
|
2000-06-08 09:45:23 +00:00
|
|
|
extract_heap.offset = 0 ;
|
1998-09-12 22:03:21 +00:00
|
|
|
ip_dn_ctl_ptr = ip_dn_ctl;
|
2001-10-05 05:45:27 +00:00
|
|
|
ip_dn_io_ptr = dummynet_io;
|
2001-11-04 22:56:25 +00:00
|
|
|
ip_dn_ruledel_ptr = dn_rule_delete;
|
2001-10-05 05:45:27 +00:00
|
|
|
bzero(&dn_timeout, sizeof(struct callout_handle));
|
|
|
|
dn_timeout = timeout(dummynet, NULL, 1);
|
1998-09-12 22:03:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
1999-04-17 11:09:08 +00:00
|
|
|
dummynet_modevent(module_t mod, int type, void *data)
|
1998-09-12 22:03:21 +00:00
|
|
|
{
|
2001-10-05 05:45:27 +00:00
|
|
|
int s;
|
1999-04-17 11:09:08 +00:00
|
|
|
switch (type) {
|
|
|
|
case MOD_LOAD:
|
2001-01-22 23:04:13 +00:00
|
|
|
s = splimp();
|
2001-11-04 22:56:25 +00:00
|
|
|
if (DUMMYNET_LOADED) {
|
|
|
|
splx(s);
|
|
|
|
printf("DUMMYNET already loaded\n");
|
|
|
|
return EEXIST ;
|
|
|
|
}
|
1999-04-17 11:09:08 +00:00
|
|
|
ip_dn_init();
|
|
|
|
splx(s);
|
|
|
|
break;
|
2001-11-04 22:56:25 +00:00
|
|
|
|
1999-04-17 11:09:08 +00:00
|
|
|
case MOD_UNLOAD:
|
2001-11-04 22:56:25 +00:00
|
|
|
#if !defined(KLD_MODULE)
|
|
|
|
printf("dummynet statically compiled, cannot unload\n");
|
|
|
|
return EINVAL ;
|
|
|
|
#else
|
|
|
|
s = splimp();
|
2001-10-05 05:45:27 +00:00
|
|
|
untimeout(dummynet, NULL, dn_timeout);
|
|
|
|
dummynet_flush();
|
|
|
|
ip_dn_ctl_ptr = NULL;
|
|
|
|
ip_dn_io_ptr = NULL;
|
|
|
|
ip_dn_ruledel_ptr = NULL;
|
1999-04-17 11:09:08 +00:00
|
|
|
splx(s);
|
2001-11-04 22:56:25 +00:00
|
|
|
#endif
|
2000-01-08 11:24:46 +00:00
|
|
|
break ;
|
1999-04-17 11:09:08 +00:00
|
|
|
default:
|
2000-01-08 11:24:46 +00:00
|
|
|
break ;
|
1999-04-17 11:09:08 +00:00
|
|
|
}
|
2000-01-08 11:24:46 +00:00
|
|
|
return 0 ;
|
1998-09-12 22:03:21 +00:00
|
|
|
}
|
|
|
|
|
1999-04-17 11:09:08 +00:00
|
|
|
static moduledata_t dummynet_mod = {
|
|
|
|
"dummynet",
|
|
|
|
dummynet_modevent,
|
|
|
|
NULL
|
2001-10-05 05:45:27 +00:00
|
|
|
};
|
1999-04-20 13:32:06 +00:00
|
|
|
DECLARE_MODULE(dummynet, dummynet_mod, SI_SUB_PSEUDO, SI_ORDER_ANY);
|
2001-10-05 05:45:27 +00:00
|
|
|
MODULE_DEPEND(dummynet, ipfw, 1, 1, 1);
|
|
|
|
MODULE_VERSION(dummynet, 1);
|