2009-04-19 00:16:04 +00:00
|
|
|
/**************************************************************************
|
|
|
|
|
2010-03-12 19:26:45 +00:00
|
|
|
Copyright (c) 2008-2010, BitGravity Inc.
|
2009-04-19 00:16:04 +00:00
|
|
|
All rights reserved.
|
|
|
|
|
|
|
|
Redistribution and use in source and binary forms, with or without
|
|
|
|
modification, are permitted provided that the following conditions are met:
|
|
|
|
|
|
|
|
1. Redistributions of source code must retain the above copyright notice,
|
|
|
|
this list of conditions and the following disclaimer.
|
|
|
|
|
|
|
|
2. Neither the name of the BitGravity Corporation nor the names of its
|
|
|
|
contributors may be used to endorse or promote products derived from
|
|
|
|
this software without specific prior written permission.
|
|
|
|
|
|
|
|
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
|
|
|
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
|
|
|
|
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
|
|
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
|
|
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
|
|
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
|
|
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
|
|
|
|
***************************************************************************/
|
|
|
|
|
|
|
|
#include "opt_route.h"
|
|
|
|
#include "opt_mpath.h"
|
2009-08-18 20:28:58 +00:00
|
|
|
#include "opt_ddb.h"
|
2010-03-12 05:03:26 +00:00
|
|
|
#include "opt_inet.h"
|
|
|
|
#include "opt_inet6.h"
|
2009-04-19 00:16:04 +00:00
|
|
|
|
|
|
|
#include <sys/cdefs.h>
|
|
|
|
__FBSDID("$FreeBSD$");
|
|
|
|
|
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/bitstring.h>
|
2009-08-18 20:28:58 +00:00
|
|
|
#include <sys/condvar.h>
|
2009-04-19 00:16:04 +00:00
|
|
|
#include <sys/callout.h>
|
|
|
|
#include <sys/kernel.h>
|
|
|
|
#include <sys/kthread.h>
|
|
|
|
#include <sys/limits.h>
|
|
|
|
#include <sys/malloc.h>
|
|
|
|
#include <sys/mbuf.h>
|
|
|
|
#include <sys/proc.h>
|
2010-03-12 05:03:26 +00:00
|
|
|
#include <sys/sbuf.h>
|
2009-04-19 00:16:04 +00:00
|
|
|
#include <sys/sched.h>
|
|
|
|
#include <sys/smp.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/syslog.h>
|
|
|
|
#include <sys/sysctl.h>
|
|
|
|
|
|
|
|
#include <net/if.h>
|
|
|
|
#include <net/if_llatbl.h>
|
|
|
|
#include <net/if_var.h>
|
|
|
|
#include <net/route.h>
|
|
|
|
#include <net/flowtable.h>
|
Introduce and use a sysinit-based initialization scheme for virtual
network stacks, VNET_SYSINIT:
- Add VNET_SYSINIT and VNET_SYSUNINIT macros to declare events that will
occur each time a network stack is instantiated and destroyed. In the
!VIMAGE case, these are simply mapped into regular SYSINIT/SYSUNINIT.
For the VIMAGE case, we instead use SYSINIT's to track their order and
properties on registration, using them for each vnet when created/
destroyed, or immediately on module load for already-started vnets.
- Remove vnet_modinfo mechanism that existed to serve this purpose
previously, as well as its dependency scheme: we now just use the
SYSINIT ordering scheme.
- Implement VNET_DOMAIN_SET() to allow protocol domains to declare that
they want init functions to be called for each virtual network stack
rather than just once at boot, compiling down to DOMAIN_SET() in the
non-VIMAGE case.
- Walk all virtualized kernel subsystems and make use of these instead
of modinfo or DOMAIN_SET() for init/uninit events. In some cases,
convert modular components from using modevent to using sysinit (where
appropriate). In some cases, do minor rejuggling of SYSINIT ordering
to make room for or better manage events.
Portions submitted by: jhb (VNET_SYSINIT), bz (cleanup)
Discussed with: jhb, bz, julian, zec
Reviewed by: bz
Approved by: re (VIMAGE blanket)
2009-07-23 20:46:49 +00:00
|
|
|
#include <net/vnet.h>
|
2009-04-19 00:16:04 +00:00
|
|
|
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <netinet/in_systm.h>
|
|
|
|
#include <netinet/in_var.h>
|
|
|
|
#include <netinet/if_ether.h>
|
|
|
|
#include <netinet/ip.h>
|
2010-03-12 05:03:26 +00:00
|
|
|
#ifdef INET6
|
|
|
|
#include <netinet/ip6.h>
|
|
|
|
#endif
|
2009-04-19 00:16:04 +00:00
|
|
|
#include <netinet/tcp.h>
|
|
|
|
#include <netinet/udp.h>
|
|
|
|
#include <netinet/sctp.h>
|
|
|
|
|
2009-06-09 20:21:40 +00:00
|
|
|
#include <libkern/jenkins.h>
|
2009-08-18 20:28:58 +00:00
|
|
|
#include <ddb/ddb.h>
|
2009-04-19 00:16:04 +00:00
|
|
|
|
|
|
|
struct ipv4_tuple {
|
|
|
|
uint16_t ip_sport; /* source port */
|
|
|
|
uint16_t ip_dport; /* destination port */
|
|
|
|
in_addr_t ip_saddr; /* source address */
|
|
|
|
in_addr_t ip_daddr; /* destination address */
|
|
|
|
};
|
|
|
|
|
|
|
|
union ipv4_flow {
|
|
|
|
struct ipv4_tuple ipf_ipt;
|
|
|
|
uint32_t ipf_key[3];
|
|
|
|
};
|
|
|
|
|
|
|
|
struct ipv6_tuple {
|
|
|
|
uint16_t ip_sport; /* source port */
|
|
|
|
uint16_t ip_dport; /* destination port */
|
|
|
|
struct in6_addr ip_saddr; /* source address */
|
|
|
|
struct in6_addr ip_daddr; /* destination address */
|
|
|
|
};
|
|
|
|
|
|
|
|
union ipv6_flow {
|
|
|
|
struct ipv6_tuple ipf_ipt;
|
|
|
|
uint32_t ipf_key[9];
|
|
|
|
};
|
|
|
|
|
|
|
|
struct flentry {
|
|
|
|
volatile uint32_t f_fhash; /* hash flowing forward */
|
|
|
|
uint16_t f_flags; /* flow flags */
|
2009-08-18 20:28:58 +00:00
|
|
|
uint8_t f_pad;
|
2009-04-19 00:16:04 +00:00
|
|
|
uint8_t f_proto; /* protocol */
|
2009-08-18 20:28:58 +00:00
|
|
|
uint32_t f_fibnum; /* fib index */
|
2009-04-19 00:16:04 +00:00
|
|
|
uint32_t f_uptime; /* uptime at last access */
|
|
|
|
struct flentry *f_next; /* pointer to collision entry */
|
|
|
|
volatile struct rtentry *f_rt; /* rtentry for flow */
|
|
|
|
volatile struct llentry *f_lle; /* llentry for flow */
|
|
|
|
};
|
|
|
|
|
|
|
|
struct flentry_v4 {
|
|
|
|
struct flentry fl_entry;
|
|
|
|
union ipv4_flow fl_flow;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct flentry_v6 {
|
|
|
|
struct flentry fl_entry;
|
|
|
|
union ipv6_flow fl_flow;
|
|
|
|
};
|
|
|
|
|
|
|
|
#define fl_fhash fl_entry.fl_fhash
|
|
|
|
#define fl_flags fl_entry.fl_flags
|
|
|
|
#define fl_proto fl_entry.fl_proto
|
|
|
|
#define fl_uptime fl_entry.fl_uptime
|
|
|
|
#define fl_rt fl_entry.fl_rt
|
|
|
|
#define fl_lle fl_entry.fl_lle
|
|
|
|
|
|
|
|
#define SECS_PER_HOUR 3600
|
|
|
|
#define SECS_PER_DAY (24*SECS_PER_HOUR)
|
|
|
|
|
|
|
|
#define SYN_IDLE 300
|
|
|
|
#define UDP_IDLE 300
|
|
|
|
#define FIN_WAIT_IDLE 600
|
|
|
|
#define TCP_IDLE SECS_PER_DAY
|
|
|
|
|
|
|
|
|
|
|
|
typedef void fl_lock_t(struct flowtable *, uint32_t);
|
|
|
|
typedef void fl_rtalloc_t(struct route *, uint32_t, u_int);
|
|
|
|
|
|
|
|
union flentryp {
|
|
|
|
struct flentry **global;
|
|
|
|
struct flentry **pcpu[MAXCPU];
|
|
|
|
};
|
|
|
|
|
2010-03-12 05:03:26 +00:00
|
|
|
struct flowtable_stats {
|
|
|
|
uint64_t ft_collisions;
|
|
|
|
uint64_t ft_allocated;
|
|
|
|
uint64_t ft_misses;
|
|
|
|
uint64_t ft_max_depth;
|
|
|
|
uint64_t ft_free_checks;
|
|
|
|
uint64_t ft_frees;
|
|
|
|
uint64_t ft_hits;
|
|
|
|
uint64_t ft_lookups;
|
2010-03-22 23:04:12 +00:00
|
|
|
} __aligned(CACHE_LINE_SIZE);
|
2010-03-12 05:03:26 +00:00
|
|
|
|
2009-04-19 00:16:04 +00:00
|
|
|
struct flowtable {
|
2010-03-12 05:03:26 +00:00
|
|
|
struct flowtable_stats ft_stats[MAXCPU];
|
2009-04-19 00:16:04 +00:00
|
|
|
int ft_size;
|
|
|
|
int ft_lock_count;
|
|
|
|
uint32_t ft_flags;
|
2010-03-12 05:03:26 +00:00
|
|
|
char *ft_name;
|
2009-04-19 00:16:04 +00:00
|
|
|
fl_lock_t *ft_lock;
|
|
|
|
fl_lock_t *ft_unlock;
|
|
|
|
fl_rtalloc_t *ft_rtalloc;
|
2010-03-22 23:04:12 +00:00
|
|
|
/*
|
|
|
|
* XXX need to pad out
|
|
|
|
*/
|
2009-04-19 04:24:56 +00:00
|
|
|
struct mtx *ft_locks;
|
|
|
|
union flentryp ft_table;
|
|
|
|
bitstr_t *ft_masks[MAXCPU];
|
2009-04-20 16:16:43 +00:00
|
|
|
bitstr_t *ft_tmpmask;
|
|
|
|
struct flowtable *ft_next;
|
2010-03-22 23:04:12 +00:00
|
|
|
|
|
|
|
uint32_t ft_count __aligned(CACHE_LINE_SIZE);
|
|
|
|
uint32_t ft_udp_idle __aligned(CACHE_LINE_SIZE);
|
|
|
|
uint32_t ft_fin_wait_idle;
|
|
|
|
uint32_t ft_syn_idle;
|
|
|
|
uint32_t ft_tcp_idle;
|
|
|
|
boolean_t ft_full;
|
|
|
|
} __aligned(CACHE_LINE_SIZE);
|
2009-04-19 00:16:04 +00:00
|
|
|
|
|
|
|
static struct proc *flowcleanerproc;
|
2010-11-22 19:32:54 +00:00
|
|
|
static VNET_DEFINE(struct flowtable *, flow_list_head);
|
|
|
|
static VNET_DEFINE(uint32_t, flow_hashjitter);
|
|
|
|
static VNET_DEFINE(uma_zone_t, flow_ipv4_zone);
|
|
|
|
static VNET_DEFINE(uma_zone_t, flow_ipv6_zone);
|
Build on Jeff Roberson's linker-set based dynamic per-CPU allocator
(DPCPU), as suggested by Peter Wemm, and implement a new per-virtual
network stack memory allocator. Modify vnet to use the allocator
instead of monolithic global container structures (vinet, ...). This
change solves many binary compatibility problems associated with
VIMAGE, and restores ELF symbols for virtualized global variables.
Each virtualized global variable exists as a "reference copy", and also
once per virtual network stack. Virtualized global variables are
tagged at compile-time, placing the in a special linker set, which is
loaded into a contiguous region of kernel memory. Virtualized global
variables in the base kernel are linked as normal, but those in modules
are copied and relocated to a reserved portion of the kernel's vnet
region with the help of a the kernel linker.
Virtualized global variables exist in per-vnet memory set up when the
network stack instance is created, and are initialized statically from
the reference copy. Run-time access occurs via an accessor macro, which
converts from the current vnet and requested symbol to a per-vnet
address. When "options VIMAGE" is not compiled into the kernel, normal
global ELF symbols will be used instead and indirection is avoided.
This change restores static initialization for network stack global
variables, restores support for non-global symbols and types, eliminates
the need for many subsystem constructors, eliminates large per-subsystem
structures that caused many binary compatibility issues both for
monitoring applications (netstat) and kernel modules, removes the
per-function INIT_VNET_*() macros throughout the stack, eliminates the
need for vnet_symmap ksym(2) munging, and eliminates duplicate
definitions of virtualized globals under VIMAGE_GLOBALS.
Bump __FreeBSD_version and update UPDATING.
Portions submitted by: bz
Reviewed by: bz, zec
Discussed with: gnn, jamie, jeff, jhb, julian, sam
Suggested by: peter
Approved by: re (kensmith)
2009-07-14 22:48:30 +00:00
|
|
|
|
2009-07-16 21:13:04 +00:00
|
|
|
#define V_flow_list_head VNET(flow_list_head)
|
|
|
|
#define V_flow_hashjitter VNET(flow_hashjitter)
|
|
|
|
#define V_flow_ipv4_zone VNET(flow_ipv4_zone)
|
|
|
|
#define V_flow_ipv6_zone VNET(flow_ipv6_zone)
|
2009-06-22 21:19:24 +00:00
|
|
|
|
2010-03-22 23:04:12 +00:00
|
|
|
|
2009-08-18 20:28:58 +00:00
|
|
|
static struct cv flowclean_cv;
|
|
|
|
static struct mtx flowclean_lock;
|
|
|
|
static uint32_t flowclean_cycles;
|
2010-03-22 23:04:12 +00:00
|
|
|
static uint32_t flowclean_freq;
|
2009-08-18 20:28:58 +00:00
|
|
|
|
2010-03-12 05:03:26 +00:00
|
|
|
#ifdef FLOWTABLE_DEBUG
|
|
|
|
#define FLDPRINTF(ft, flags, fmt, ...) \
|
|
|
|
do { \
|
|
|
|
if ((ft)->ft_flags & (flags)) \
|
|
|
|
printf((fmt), __VA_ARGS__); \
|
|
|
|
} while (0); \
|
|
|
|
|
|
|
|
#else
|
|
|
|
#define FLDPRINTF(ft, flags, fmt, ...)
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
2009-04-19 00:16:04 +00:00
|
|
|
/*
|
|
|
|
* TODO:
|
2009-04-19 04:39:42 +00:00
|
|
|
* - Make flowtable stats per-cpu, aggregated at sysctl call time,
|
|
|
|
* to avoid extra cache evictions caused by incrementing a shared
|
|
|
|
* counter
|
2009-04-20 16:16:43 +00:00
|
|
|
* - add sysctls to resize && flush flow tables
|
2009-04-19 04:39:42 +00:00
|
|
|
* - Add per flowtable sysctls for statistics and configuring timeouts
|
2009-04-19 00:16:04 +00:00
|
|
|
* - add saturation counter to rtentry to support per-packet load-balancing
|
|
|
|
* add flag to indicate round-robin flow, add list lookup from head
|
|
|
|
for flows
|
|
|
|
* - add sysctl / device node / syscall to support exporting and importing
|
|
|
|
* of flows with flag to indicate that a flow was imported so should
|
|
|
|
* not be considered for auto-cleaning
|
|
|
|
* - support explicit connection state (currently only ad-hoc for DSR)
|
2009-06-22 21:19:24 +00:00
|
|
|
* - idetach() cleanup for options VIMAGE builds.
|
2009-04-19 00:16:04 +00:00
|
|
|
*/
|
Build on Jeff Roberson's linker-set based dynamic per-CPU allocator
(DPCPU), as suggested by Peter Wemm, and implement a new per-virtual
network stack memory allocator. Modify vnet to use the allocator
instead of monolithic global container structures (vinet, ...). This
change solves many binary compatibility problems associated with
VIMAGE, and restores ELF symbols for virtualized global variables.
Each virtualized global variable exists as a "reference copy", and also
once per virtual network stack. Virtualized global variables are
tagged at compile-time, placing the in a special linker set, which is
loaded into a contiguous region of kernel memory. Virtualized global
variables in the base kernel are linked as normal, but those in modules
are copied and relocated to a reserved portion of the kernel's vnet
region with the help of a the kernel linker.
Virtualized global variables exist in per-vnet memory set up when the
network stack instance is created, and are initialized statically from
the reference copy. Run-time access occurs via an accessor macro, which
converts from the current vnet and requested symbol to a per-vnet
address. When "options VIMAGE" is not compiled into the kernel, normal
global ELF symbols will be used instead and indirection is avoided.
This change restores static initialization for network stack global
variables, restores support for non-global symbols and types, eliminates
the need for many subsystem constructors, eliminates large per-subsystem
structures that caused many binary compatibility issues both for
monitoring applications (netstat) and kernel modules, removes the
per-function INIT_VNET_*() macros throughout the stack, eliminates the
need for vnet_symmap ksym(2) munging, and eliminates duplicate
definitions of virtualized globals under VIMAGE_GLOBALS.
Bump __FreeBSD_version and update UPDATING.
Portions submitted by: bz
Reviewed by: bz, zec
Discussed with: gnn, jamie, jeff, jhb, julian, sam
Suggested by: peter
Approved by: re (kensmith)
2009-07-14 22:48:30 +00:00
|
|
|
VNET_DEFINE(int, flowtable_enable) = 1;
|
2010-11-22 19:32:54 +00:00
|
|
|
static VNET_DEFINE(int, flowtable_debug);
|
|
|
|
static VNET_DEFINE(int, flowtable_syn_expire) = SYN_IDLE;
|
|
|
|
static VNET_DEFINE(int, flowtable_udp_expire) = UDP_IDLE;
|
|
|
|
static VNET_DEFINE(int, flowtable_fin_wait_expire) = FIN_WAIT_IDLE;
|
|
|
|
static VNET_DEFINE(int, flowtable_tcp_expire) = TCP_IDLE;
|
|
|
|
static VNET_DEFINE(int, flowtable_nmbflows);
|
|
|
|
static VNET_DEFINE(int, flowtable_ready) = 0;
|
Build on Jeff Roberson's linker-set based dynamic per-CPU allocator
(DPCPU), as suggested by Peter Wemm, and implement a new per-virtual
network stack memory allocator. Modify vnet to use the allocator
instead of monolithic global container structures (vinet, ...). This
change solves many binary compatibility problems associated with
VIMAGE, and restores ELF symbols for virtualized global variables.
Each virtualized global variable exists as a "reference copy", and also
once per virtual network stack. Virtualized global variables are
tagged at compile-time, placing the in a special linker set, which is
loaded into a contiguous region of kernel memory. Virtualized global
variables in the base kernel are linked as normal, but those in modules
are copied and relocated to a reserved portion of the kernel's vnet
region with the help of a the kernel linker.
Virtualized global variables exist in per-vnet memory set up when the
network stack instance is created, and are initialized statically from
the reference copy. Run-time access occurs via an accessor macro, which
converts from the current vnet and requested symbol to a per-vnet
address. When "options VIMAGE" is not compiled into the kernel, normal
global ELF symbols will be used instead and indirection is avoided.
This change restores static initialization for network stack global
variables, restores support for non-global symbols and types, eliminates
the need for many subsystem constructors, eliminates large per-subsystem
structures that caused many binary compatibility issues both for
monitoring applications (netstat) and kernel modules, removes the
per-function INIT_VNET_*() macros throughout the stack, eliminates the
need for vnet_symmap ksym(2) munging, and eliminates duplicate
definitions of virtualized globals under VIMAGE_GLOBALS.
Bump __FreeBSD_version and update UPDATING.
Portions submitted by: bz
Reviewed by: bz, zec
Discussed with: gnn, jamie, jeff, jhb, julian, sam
Suggested by: peter
Approved by: re (kensmith)
2009-07-14 22:48:30 +00:00
|
|
|
|
2009-07-16 21:13:04 +00:00
|
|
|
#define V_flowtable_enable VNET(flowtable_enable)
|
2009-08-19 20:13:09 +00:00
|
|
|
#define V_flowtable_debug VNET(flowtable_debug)
|
2009-07-16 21:13:04 +00:00
|
|
|
#define V_flowtable_syn_expire VNET(flowtable_syn_expire)
|
|
|
|
#define V_flowtable_udp_expire VNET(flowtable_udp_expire)
|
|
|
|
#define V_flowtable_fin_wait_expire VNET(flowtable_fin_wait_expire)
|
|
|
|
#define V_flowtable_tcp_expire VNET(flowtable_tcp_expire)
|
|
|
|
#define V_flowtable_nmbflows VNET(flowtable_nmbflows)
|
2009-08-17 19:09:28 +00:00
|
|
|
#define V_flowtable_ready VNET(flowtable_ready)
|
Build on Jeff Roberson's linker-set based dynamic per-CPU allocator
(DPCPU), as suggested by Peter Wemm, and implement a new per-virtual
network stack memory allocator. Modify vnet to use the allocator
instead of monolithic global container structures (vinet, ...). This
change solves many binary compatibility problems associated with
VIMAGE, and restores ELF symbols for virtualized global variables.
Each virtualized global variable exists as a "reference copy", and also
once per virtual network stack. Virtualized global variables are
tagged at compile-time, placing the in a special linker set, which is
loaded into a contiguous region of kernel memory. Virtualized global
variables in the base kernel are linked as normal, but those in modules
are copied and relocated to a reserved portion of the kernel's vnet
region with the help of a the kernel linker.
Virtualized global variables exist in per-vnet memory set up when the
network stack instance is created, and are initialized statically from
the reference copy. Run-time access occurs via an accessor macro, which
converts from the current vnet and requested symbol to a per-vnet
address. When "options VIMAGE" is not compiled into the kernel, normal
global ELF symbols will be used instead and indirection is avoided.
This change restores static initialization for network stack global
variables, restores support for non-global symbols and types, eliminates
the need for many subsystem constructors, eliminates large per-subsystem
structures that caused many binary compatibility issues both for
monitoring applications (netstat) and kernel modules, removes the
per-function INIT_VNET_*() macros throughout the stack, eliminates the
need for vnet_symmap ksym(2) munging, and eliminates duplicate
definitions of virtualized globals under VIMAGE_GLOBALS.
Bump __FreeBSD_version and update UPDATING.
Portions submitted by: bz
Reviewed by: bz, zec
Discussed with: gnn, jamie, jeff, jhb, julian, sam
Suggested by: peter
Approved by: re (kensmith)
2009-07-14 22:48:30 +00:00
|
|
|
|
2009-04-19 00:16:04 +00:00
|
|
|
SYSCTL_NODE(_net_inet, OID_AUTO, flowtable, CTLFLAG_RD, NULL, "flowtable");
|
2009-08-19 20:13:09 +00:00
|
|
|
SYSCTL_VNET_INT(_net_inet_flowtable, OID_AUTO, debug, CTLFLAG_RW,
|
|
|
|
&VNET_NAME(flowtable_debug), 0, "print debug info.");
|
Build on Jeff Roberson's linker-set based dynamic per-CPU allocator
(DPCPU), as suggested by Peter Wemm, and implement a new per-virtual
network stack memory allocator. Modify vnet to use the allocator
instead of monolithic global container structures (vinet, ...). This
change solves many binary compatibility problems associated with
VIMAGE, and restores ELF symbols for virtualized global variables.
Each virtualized global variable exists as a "reference copy", and also
once per virtual network stack. Virtualized global variables are
tagged at compile-time, placing the in a special linker set, which is
loaded into a contiguous region of kernel memory. Virtualized global
variables in the base kernel are linked as normal, but those in modules
are copied and relocated to a reserved portion of the kernel's vnet
region with the help of a the kernel linker.
Virtualized global variables exist in per-vnet memory set up when the
network stack instance is created, and are initialized statically from
the reference copy. Run-time access occurs via an accessor macro, which
converts from the current vnet and requested symbol to a per-vnet
address. When "options VIMAGE" is not compiled into the kernel, normal
global ELF symbols will be used instead and indirection is avoided.
This change restores static initialization for network stack global
variables, restores support for non-global symbols and types, eliminates
the need for many subsystem constructors, eliminates large per-subsystem
structures that caused many binary compatibility issues both for
monitoring applications (netstat) and kernel modules, removes the
per-function INIT_VNET_*() macros throughout the stack, eliminates the
need for vnet_symmap ksym(2) munging, and eliminates duplicate
definitions of virtualized globals under VIMAGE_GLOBALS.
Bump __FreeBSD_version and update UPDATING.
Portions submitted by: bz
Reviewed by: bz, zec
Discussed with: gnn, jamie, jeff, jhb, julian, sam
Suggested by: peter
Approved by: re (kensmith)
2009-07-14 22:48:30 +00:00
|
|
|
SYSCTL_VNET_INT(_net_inet_flowtable, OID_AUTO, enable, CTLFLAG_RW,
|
|
|
|
&VNET_NAME(flowtable_enable), 0, "enable flowtable caching.");
|
2009-04-19 00:16:04 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* XXX This does not end up updating timeouts at runtime
|
|
|
|
* and only reflects the value for the last table added :-/
|
|
|
|
*/
|
Build on Jeff Roberson's linker-set based dynamic per-CPU allocator
(DPCPU), as suggested by Peter Wemm, and implement a new per-virtual
network stack memory allocator. Modify vnet to use the allocator
instead of monolithic global container structures (vinet, ...). This
change solves many binary compatibility problems associated with
VIMAGE, and restores ELF symbols for virtualized global variables.
Each virtualized global variable exists as a "reference copy", and also
once per virtual network stack. Virtualized global variables are
tagged at compile-time, placing the in a special linker set, which is
loaded into a contiguous region of kernel memory. Virtualized global
variables in the base kernel are linked as normal, but those in modules
are copied and relocated to a reserved portion of the kernel's vnet
region with the help of a the kernel linker.
Virtualized global variables exist in per-vnet memory set up when the
network stack instance is created, and are initialized statically from
the reference copy. Run-time access occurs via an accessor macro, which
converts from the current vnet and requested symbol to a per-vnet
address. When "options VIMAGE" is not compiled into the kernel, normal
global ELF symbols will be used instead and indirection is avoided.
This change restores static initialization for network stack global
variables, restores support for non-global symbols and types, eliminates
the need for many subsystem constructors, eliminates large per-subsystem
structures that caused many binary compatibility issues both for
monitoring applications (netstat) and kernel modules, removes the
per-function INIT_VNET_*() macros throughout the stack, eliminates the
need for vnet_symmap ksym(2) munging, and eliminates duplicate
definitions of virtualized globals under VIMAGE_GLOBALS.
Bump __FreeBSD_version and update UPDATING.
Portions submitted by: bz
Reviewed by: bz, zec
Discussed with: gnn, jamie, jeff, jhb, julian, sam
Suggested by: peter
Approved by: re (kensmith)
2009-07-14 22:48:30 +00:00
|
|
|
SYSCTL_VNET_INT(_net_inet_flowtable, OID_AUTO, syn_expire, CTLFLAG_RW,
|
|
|
|
&VNET_NAME(flowtable_syn_expire), 0,
|
2009-06-22 21:19:24 +00:00
|
|
|
"seconds after which to remove syn allocated flow.");
|
Build on Jeff Roberson's linker-set based dynamic per-CPU allocator
(DPCPU), as suggested by Peter Wemm, and implement a new per-virtual
network stack memory allocator. Modify vnet to use the allocator
instead of monolithic global container structures (vinet, ...). This
change solves many binary compatibility problems associated with
VIMAGE, and restores ELF symbols for virtualized global variables.
Each virtualized global variable exists as a "reference copy", and also
once per virtual network stack. Virtualized global variables are
tagged at compile-time, placing the in a special linker set, which is
loaded into a contiguous region of kernel memory. Virtualized global
variables in the base kernel are linked as normal, but those in modules
are copied and relocated to a reserved portion of the kernel's vnet
region with the help of a the kernel linker.
Virtualized global variables exist in per-vnet memory set up when the
network stack instance is created, and are initialized statically from
the reference copy. Run-time access occurs via an accessor macro, which
converts from the current vnet and requested symbol to a per-vnet
address. When "options VIMAGE" is not compiled into the kernel, normal
global ELF symbols will be used instead and indirection is avoided.
This change restores static initialization for network stack global
variables, restores support for non-global symbols and types, eliminates
the need for many subsystem constructors, eliminates large per-subsystem
structures that caused many binary compatibility issues both for
monitoring applications (netstat) and kernel modules, removes the
per-function INIT_VNET_*() macros throughout the stack, eliminates the
need for vnet_symmap ksym(2) munging, and eliminates duplicate
definitions of virtualized globals under VIMAGE_GLOBALS.
Bump __FreeBSD_version and update UPDATING.
Portions submitted by: bz
Reviewed by: bz, zec
Discussed with: gnn, jamie, jeff, jhb, julian, sam
Suggested by: peter
Approved by: re (kensmith)
2009-07-14 22:48:30 +00:00
|
|
|
SYSCTL_VNET_INT(_net_inet_flowtable, OID_AUTO, udp_expire, CTLFLAG_RW,
|
|
|
|
&VNET_NAME(flowtable_udp_expire), 0,
|
2009-06-22 21:19:24 +00:00
|
|
|
"seconds after which to remove flow allocated to UDP.");
|
Build on Jeff Roberson's linker-set based dynamic per-CPU allocator
(DPCPU), as suggested by Peter Wemm, and implement a new per-virtual
network stack memory allocator. Modify vnet to use the allocator
instead of monolithic global container structures (vinet, ...). This
change solves many binary compatibility problems associated with
VIMAGE, and restores ELF symbols for virtualized global variables.
Each virtualized global variable exists as a "reference copy", and also
once per virtual network stack. Virtualized global variables are
tagged at compile-time, placing the in a special linker set, which is
loaded into a contiguous region of kernel memory. Virtualized global
variables in the base kernel are linked as normal, but those in modules
are copied and relocated to a reserved portion of the kernel's vnet
region with the help of a the kernel linker.
Virtualized global variables exist in per-vnet memory set up when the
network stack instance is created, and are initialized statically from
the reference copy. Run-time access occurs via an accessor macro, which
converts from the current vnet and requested symbol to a per-vnet
address. When "options VIMAGE" is not compiled into the kernel, normal
global ELF symbols will be used instead and indirection is avoided.
This change restores static initialization for network stack global
variables, restores support for non-global symbols and types, eliminates
the need for many subsystem constructors, eliminates large per-subsystem
structures that caused many binary compatibility issues both for
monitoring applications (netstat) and kernel modules, removes the
per-function INIT_VNET_*() macros throughout the stack, eliminates the
need for vnet_symmap ksym(2) munging, and eliminates duplicate
definitions of virtualized globals under VIMAGE_GLOBALS.
Bump __FreeBSD_version and update UPDATING.
Portions submitted by: bz
Reviewed by: bz, zec
Discussed with: gnn, jamie, jeff, jhb, julian, sam
Suggested by: peter
Approved by: re (kensmith)
2009-07-14 22:48:30 +00:00
|
|
|
SYSCTL_VNET_INT(_net_inet_flowtable, OID_AUTO, fin_wait_expire, CTLFLAG_RW,
|
|
|
|
&VNET_NAME(flowtable_fin_wait_expire), 0,
|
2009-06-22 21:19:24 +00:00
|
|
|
"seconds after which to remove a flow in FIN_WAIT.");
|
Build on Jeff Roberson's linker-set based dynamic per-CPU allocator
(DPCPU), as suggested by Peter Wemm, and implement a new per-virtual
network stack memory allocator. Modify vnet to use the allocator
instead of monolithic global container structures (vinet, ...). This
change solves many binary compatibility problems associated with
VIMAGE, and restores ELF symbols for virtualized global variables.
Each virtualized global variable exists as a "reference copy", and also
once per virtual network stack. Virtualized global variables are
tagged at compile-time, placing the in a special linker set, which is
loaded into a contiguous region of kernel memory. Virtualized global
variables in the base kernel are linked as normal, but those in modules
are copied and relocated to a reserved portion of the kernel's vnet
region with the help of a the kernel linker.
Virtualized global variables exist in per-vnet memory set up when the
network stack instance is created, and are initialized statically from
the reference copy. Run-time access occurs via an accessor macro, which
converts from the current vnet and requested symbol to a per-vnet
address. When "options VIMAGE" is not compiled into the kernel, normal
global ELF symbols will be used instead and indirection is avoided.
This change restores static initialization for network stack global
variables, restores support for non-global symbols and types, eliminates
the need for many subsystem constructors, eliminates large per-subsystem
structures that caused many binary compatibility issues both for
monitoring applications (netstat) and kernel modules, removes the
per-function INIT_VNET_*() macros throughout the stack, eliminates the
need for vnet_symmap ksym(2) munging, and eliminates duplicate
definitions of virtualized globals under VIMAGE_GLOBALS.
Bump __FreeBSD_version and update UPDATING.
Portions submitted by: bz
Reviewed by: bz, zec
Discussed with: gnn, jamie, jeff, jhb, julian, sam
Suggested by: peter
Approved by: re (kensmith)
2009-07-14 22:48:30 +00:00
|
|
|
SYSCTL_VNET_INT(_net_inet_flowtable, OID_AUTO, tcp_expire, CTLFLAG_RW,
|
|
|
|
&VNET_NAME(flowtable_tcp_expire), 0,
|
2009-06-22 21:19:24 +00:00
|
|
|
"seconds after which to remove flow allocated to a TCP connection.");
|
2009-04-19 00:16:04 +00:00
|
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Maximum number of flows that can be allocated of a given type.
|
|
|
|
*
|
|
|
|
* The table is allocated at boot time (for the pure caching case
|
|
|
|
* there is no reason why this could not be changed at runtime)
|
|
|
|
* and thus (currently) needs to be set with a tunable.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
sysctl_nmbflows(SYSCTL_HANDLER_ARGS)
|
|
|
|
{
|
|
|
|
int error, newnmbflows;
|
|
|
|
|
2009-06-22 21:19:24 +00:00
|
|
|
newnmbflows = V_flowtable_nmbflows;
|
2009-04-19 00:16:04 +00:00
|
|
|
error = sysctl_handle_int(oidp, &newnmbflows, 0, req);
|
|
|
|
if (error == 0 && req->newptr) {
|
2009-06-22 21:19:24 +00:00
|
|
|
if (newnmbflows > V_flowtable_nmbflows) {
|
|
|
|
V_flowtable_nmbflows = newnmbflows;
|
|
|
|
uma_zone_set_max(V_flow_ipv4_zone,
|
|
|
|
V_flowtable_nmbflows);
|
|
|
|
uma_zone_set_max(V_flow_ipv6_zone,
|
|
|
|
V_flowtable_nmbflows);
|
2009-04-19 00:16:04 +00:00
|
|
|
} else
|
|
|
|
error = EINVAL;
|
|
|
|
}
|
|
|
|
return (error);
|
|
|
|
}
|
Build on Jeff Roberson's linker-set based dynamic per-CPU allocator
(DPCPU), as suggested by Peter Wemm, and implement a new per-virtual
network stack memory allocator. Modify vnet to use the allocator
instead of monolithic global container structures (vinet, ...). This
change solves many binary compatibility problems associated with
VIMAGE, and restores ELF symbols for virtualized global variables.
Each virtualized global variable exists as a "reference copy", and also
once per virtual network stack. Virtualized global variables are
tagged at compile-time, placing the in a special linker set, which is
loaded into a contiguous region of kernel memory. Virtualized global
variables in the base kernel are linked as normal, but those in modules
are copied and relocated to a reserved portion of the kernel's vnet
region with the help of a the kernel linker.
Virtualized global variables exist in per-vnet memory set up when the
network stack instance is created, and are initialized statically from
the reference copy. Run-time access occurs via an accessor macro, which
converts from the current vnet and requested symbol to a per-vnet
address. When "options VIMAGE" is not compiled into the kernel, normal
global ELF symbols will be used instead and indirection is avoided.
This change restores static initialization for network stack global
variables, restores support for non-global symbols and types, eliminates
the need for many subsystem constructors, eliminates large per-subsystem
structures that caused many binary compatibility issues both for
monitoring applications (netstat) and kernel modules, removes the
per-function INIT_VNET_*() macros throughout the stack, eliminates the
need for vnet_symmap ksym(2) munging, and eliminates duplicate
definitions of virtualized globals under VIMAGE_GLOBALS.
Bump __FreeBSD_version and update UPDATING.
Portions submitted by: bz
Reviewed by: bz, zec
Discussed with: gnn, jamie, jeff, jhb, julian, sam
Suggested by: peter
Approved by: re (kensmith)
2009-07-14 22:48:30 +00:00
|
|
|
SYSCTL_VNET_PROC(_net_inet_flowtable, OID_AUTO, nmbflows,
|
|
|
|
CTLTYPE_INT|CTLFLAG_RW, 0, 0, sysctl_nmbflows, "IU",
|
2009-06-22 21:19:24 +00:00
|
|
|
"Maximum number of flows allowed");
|
2009-04-19 00:16:04 +00:00
|
|
|
|
2010-03-12 05:03:26 +00:00
|
|
|
|
|
|
|
|
2010-03-12 06:31:19 +00:00
|
|
|
#define FS_PRINT(sb, field) sbuf_printf((sb), "\t%s: %jd\n", #field, fs->ft_##field)
|
2010-03-12 05:03:26 +00:00
|
|
|
|
|
|
|
static void
|
2010-03-12 06:31:19 +00:00
|
|
|
fs_print(struct sbuf *sb, struct flowtable_stats *fs)
|
2010-03-12 05:03:26 +00:00
|
|
|
{
|
|
|
|
|
|
|
|
FS_PRINT(sb, collisions);
|
|
|
|
FS_PRINT(sb, allocated);
|
|
|
|
FS_PRINT(sb, misses);
|
|
|
|
FS_PRINT(sb, max_depth);
|
|
|
|
FS_PRINT(sb, free_checks);
|
|
|
|
FS_PRINT(sb, frees);
|
|
|
|
FS_PRINT(sb, hits);
|
|
|
|
FS_PRINT(sb, lookups);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2010-03-12 06:31:19 +00:00
|
|
|
flowtable_show_stats(struct sbuf *sb, struct flowtable *ft)
|
2010-03-12 05:03:26 +00:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
struct flowtable_stats fs, *pfs;
|
|
|
|
|
|
|
|
if (ft->ft_flags & FL_PCPU) {
|
|
|
|
bzero(&fs, sizeof(fs));
|
|
|
|
pfs = &fs;
|
2010-06-11 18:46:34 +00:00
|
|
|
CPU_FOREACH(i) {
|
2010-03-12 05:03:26 +00:00
|
|
|
pfs->ft_collisions += ft->ft_stats[i].ft_collisions;
|
|
|
|
pfs->ft_allocated += ft->ft_stats[i].ft_allocated;
|
|
|
|
pfs->ft_misses += ft->ft_stats[i].ft_misses;
|
|
|
|
pfs->ft_free_checks += ft->ft_stats[i].ft_free_checks;
|
|
|
|
pfs->ft_frees += ft->ft_stats[i].ft_frees;
|
|
|
|
pfs->ft_hits += ft->ft_stats[i].ft_hits;
|
|
|
|
pfs->ft_lookups += ft->ft_stats[i].ft_lookups;
|
|
|
|
if (ft->ft_stats[i].ft_max_depth > pfs->ft_max_depth)
|
|
|
|
pfs->ft_max_depth = ft->ft_stats[i].ft_max_depth;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
pfs = &ft->ft_stats[0];
|
|
|
|
}
|
2010-03-12 06:31:19 +00:00
|
|
|
fs_print(sb, pfs);
|
2010-03-12 05:03:26 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
sysctl_flowtable_stats(SYSCTL_HANDLER_ARGS)
|
|
|
|
{
|
|
|
|
struct flowtable *ft;
|
2010-03-12 06:31:19 +00:00
|
|
|
struct sbuf *sb;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
sb = sbuf_new(NULL, NULL, 64*1024, SBUF_FIXEDLEN);
|
2010-03-12 05:03:26 +00:00
|
|
|
|
|
|
|
ft = V_flow_list_head;
|
|
|
|
while (ft != NULL) {
|
2010-03-12 06:31:19 +00:00
|
|
|
sbuf_printf(sb, "\ntable name: %s\n", ft->ft_name);
|
|
|
|
flowtable_show_stats(sb, ft);
|
2010-03-12 05:03:26 +00:00
|
|
|
ft = ft->ft_next;
|
|
|
|
}
|
2010-03-12 06:31:19 +00:00
|
|
|
sbuf_finish(sb);
|
|
|
|
error = SYSCTL_OUT(req, sbuf_data(sb), sbuf_len(sb) + 1);
|
|
|
|
sbuf_delete(sb);
|
2010-03-12 05:03:26 +00:00
|
|
|
|
2010-03-12 06:31:19 +00:00
|
|
|
return (error);
|
2010-03-12 05:03:26 +00:00
|
|
|
}
|
2010-03-12 06:31:19 +00:00
|
|
|
SYSCTL_VNET_PROC(_net_inet_flowtable, OID_AUTO, stats, CTLTYPE_STRING|CTLFLAG_RD,
|
|
|
|
NULL, 0, sysctl_flowtable_stats, "A", "flowtable statistics");
|
2010-03-12 05:03:26 +00:00
|
|
|
|
|
|
|
|
2009-04-19 00:16:04 +00:00
|
|
|
#ifndef RADIX_MPATH
|
|
|
|
static void
|
2009-08-18 20:28:58 +00:00
|
|
|
in_rtalloc_ign_wrapper(struct route *ro, uint32_t hash, u_int fibnum)
|
2009-04-19 00:16:04 +00:00
|
|
|
{
|
|
|
|
|
2009-08-18 20:28:58 +00:00
|
|
|
rtalloc_ign_fib(ro, 0, fibnum);
|
2009-04-19 00:16:04 +00:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
static void
|
|
|
|
flowtable_global_lock(struct flowtable *table, uint32_t hash)
|
|
|
|
{
|
|
|
|
int lock_index = (hash)&(table->ft_lock_count - 1);
|
|
|
|
|
|
|
|
mtx_lock(&table->ft_locks[lock_index]);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
flowtable_global_unlock(struct flowtable *table, uint32_t hash)
|
|
|
|
{
|
|
|
|
int lock_index = (hash)&(table->ft_lock_count - 1);
|
|
|
|
|
|
|
|
mtx_unlock(&table->ft_locks[lock_index]);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
flowtable_pcpu_lock(struct flowtable *table, uint32_t hash)
|
|
|
|
{
|
|
|
|
|
|
|
|
critical_enter();
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
flowtable_pcpu_unlock(struct flowtable *table, uint32_t hash)
|
|
|
|
{
|
|
|
|
|
|
|
|
critical_exit();
|
|
|
|
}
|
|
|
|
|
|
|
|
#define FL_ENTRY_INDEX(table, hash)((hash) % (table)->ft_size)
|
|
|
|
#define FL_ENTRY(table, hash) *flowtable_entry((table), (hash))
|
|
|
|
#define FL_ENTRY_LOCK(table, hash) (table)->ft_lock((table), (hash))
|
|
|
|
#define FL_ENTRY_UNLOCK(table, hash) (table)->ft_unlock((table), (hash))
|
|
|
|
|
2010-03-12 05:03:26 +00:00
|
|
|
#define FL_STALE (1<<8)
|
|
|
|
#define FL_OVERWRITE (1<<10)
|
2009-04-19 00:16:04 +00:00
|
|
|
|
2010-03-12 05:03:26 +00:00
|
|
|
void
|
|
|
|
flow_invalidate(struct flentry *fle)
|
2009-04-19 00:16:04 +00:00
|
|
|
{
|
2010-03-12 05:03:26 +00:00
|
|
|
|
|
|
|
fle->f_flags |= FL_STALE;
|
|
|
|
}
|
|
|
|
|
|
|
|
static __inline int
|
|
|
|
proto_to_flags(uint8_t proto)
|
|
|
|
{
|
|
|
|
int flag;
|
|
|
|
|
|
|
|
switch (proto) {
|
|
|
|
case IPPROTO_TCP:
|
|
|
|
flag = FL_TCP;
|
|
|
|
break;
|
|
|
|
case IPPROTO_SCTP:
|
|
|
|
flag = FL_SCTP;
|
|
|
|
break;
|
|
|
|
case IPPROTO_UDP:
|
|
|
|
flag = FL_UDP;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
flag = 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return (flag);
|
|
|
|
}
|
|
|
|
|
|
|
|
static __inline int
|
|
|
|
flags_to_proto(int flags)
|
|
|
|
{
|
|
|
|
int proto, protoflags;
|
|
|
|
|
|
|
|
protoflags = flags & (FL_TCP|FL_SCTP|FL_UDP);
|
|
|
|
switch (protoflags) {
|
|
|
|
case FL_TCP:
|
|
|
|
proto = IPPROTO_TCP;
|
|
|
|
break;
|
|
|
|
case FL_SCTP:
|
|
|
|
proto = IPPROTO_SCTP;
|
|
|
|
break;
|
|
|
|
case FL_UDP:
|
|
|
|
proto = IPPROTO_UDP;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
proto = 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return (proto);
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef INET
|
|
|
|
#ifdef FLOWTABLE_DEBUG
|
|
|
|
static void
|
|
|
|
ipv4_flow_print_tuple(int flags, int proto, struct sockaddr_in *ssin,
|
|
|
|
struct sockaddr_in *dsin)
|
|
|
|
{
|
|
|
|
char saddr[4*sizeof "123"], daddr[4*sizeof "123"];
|
|
|
|
|
|
|
|
if (flags & FL_HASH_ALL) {
|
|
|
|
inet_ntoa_r(ssin->sin_addr, saddr);
|
|
|
|
inet_ntoa_r(dsin->sin_addr, daddr);
|
|
|
|
printf("proto=%d %s:%d->%s:%d\n",
|
|
|
|
proto, saddr, ntohs(ssin->sin_port), daddr,
|
|
|
|
ntohs(dsin->sin_port));
|
|
|
|
} else {
|
|
|
|
inet_ntoa_r(*(struct in_addr *) &dsin->sin_addr, daddr);
|
|
|
|
printf("proto=%d %s\n", proto, daddr);
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
static int
|
|
|
|
ipv4_mbuf_demarshal(struct flowtable *ft, struct mbuf *m,
|
|
|
|
struct sockaddr_in *ssin, struct sockaddr_in *dsin, uint16_t *flags)
|
|
|
|
{
|
|
|
|
struct ip *ip;
|
|
|
|
uint8_t proto;
|
2009-04-19 00:16:04 +00:00
|
|
|
int iphlen;
|
|
|
|
struct tcphdr *th;
|
|
|
|
struct udphdr *uh;
|
|
|
|
struct sctphdr *sh;
|
2010-03-12 05:03:26 +00:00
|
|
|
uint16_t sport, dport;
|
2009-04-19 00:16:04 +00:00
|
|
|
|
2010-03-12 05:03:26 +00:00
|
|
|
proto = sport = dport = 0;
|
|
|
|
ip = mtod(m, struct ip *);
|
|
|
|
dsin->sin_family = AF_INET;
|
|
|
|
dsin->sin_len = sizeof(*dsin);
|
|
|
|
dsin->sin_addr = ip->ip_dst;
|
|
|
|
ssin->sin_family = AF_INET;
|
|
|
|
ssin->sin_len = sizeof(*ssin);
|
|
|
|
ssin->sin_addr = ip->ip_src;
|
2009-04-19 00:16:04 +00:00
|
|
|
|
2010-03-12 05:03:26 +00:00
|
|
|
proto = ip->ip_p;
|
|
|
|
if ((*flags & FL_HASH_ALL) == 0) {
|
|
|
|
FLDPRINTF(ft, FL_DEBUG_ALL, "skip port check flags=0x%x ",
|
|
|
|
*flags);
|
2009-04-19 00:16:04 +00:00
|
|
|
goto skipports;
|
2010-03-12 05:03:26 +00:00
|
|
|
}
|
2009-04-19 00:16:04 +00:00
|
|
|
|
|
|
|
iphlen = ip->ip_hl << 2; /* XXX options? */
|
2010-03-12 05:03:26 +00:00
|
|
|
|
2009-04-19 00:16:04 +00:00
|
|
|
switch (proto) {
|
|
|
|
case IPPROTO_TCP:
|
|
|
|
th = (struct tcphdr *)((caddr_t)ip + iphlen);
|
2010-03-12 05:03:26 +00:00
|
|
|
sport = th->th_sport;
|
|
|
|
dport = th->th_dport;
|
|
|
|
if ((*flags & FL_HASH_ALL) &&
|
|
|
|
(th->th_flags & (TH_RST|TH_FIN)))
|
2009-04-19 00:16:04 +00:00
|
|
|
*flags |= FL_STALE;
|
|
|
|
break;
|
|
|
|
case IPPROTO_UDP:
|
|
|
|
uh = (struct udphdr *)((caddr_t)ip + iphlen);
|
|
|
|
sport = uh->uh_sport;
|
|
|
|
dport = uh->uh_dport;
|
|
|
|
break;
|
|
|
|
case IPPROTO_SCTP:
|
|
|
|
sh = (struct sctphdr *)((caddr_t)ip + iphlen);
|
|
|
|
sport = sh->src_port;
|
|
|
|
dport = sh->dest_port;
|
|
|
|
break;
|
|
|
|
default:
|
2010-03-12 05:03:26 +00:00
|
|
|
FLDPRINTF(ft, FL_DEBUG_ALL, "proto=0x%x not supported\n", proto);
|
|
|
|
return (ENOTSUP);
|
2009-04-19 00:16:04 +00:00
|
|
|
/* no port - hence not a protocol we care about */
|
2010-01-07 21:01:37 +00:00
|
|
|
break;
|
2009-04-19 00:16:04 +00:00
|
|
|
|
|
|
|
}
|
|
|
|
|
2010-03-12 05:03:26 +00:00
|
|
|
skipports:
|
|
|
|
*flags |= proto_to_flags(proto);
|
|
|
|
ssin->sin_port = sport;
|
|
|
|
dsin->sin_port = dport;
|
|
|
|
return (0);
|
|
|
|
}
|
2009-04-19 00:16:04 +00:00
|
|
|
|
2010-03-12 05:03:26 +00:00
|
|
|
static uint32_t
|
|
|
|
ipv4_flow_lookup_hash_internal(
|
|
|
|
struct sockaddr_in *ssin, struct sockaddr_in *dsin,
|
|
|
|
uint32_t *key, uint16_t flags)
|
|
|
|
{
|
|
|
|
uint16_t sport, dport;
|
|
|
|
uint8_t proto;
|
|
|
|
int offset = 0;
|
2009-04-19 00:16:04 +00:00
|
|
|
|
2010-03-12 05:03:26 +00:00
|
|
|
if ((V_flowtable_enable == 0) || (V_flowtable_ready == 0))
|
|
|
|
return (0);
|
|
|
|
proto = flags_to_proto(flags);
|
|
|
|
sport = dport = key[2] = key[1] = key[0] = 0;
|
|
|
|
if ((ssin != NULL) && (flags & FL_HASH_ALL)) {
|
|
|
|
key[1] = ssin->sin_addr.s_addr;
|
|
|
|
sport = ssin->sin_port;
|
|
|
|
}
|
|
|
|
if (dsin != NULL) {
|
|
|
|
key[2] = dsin->sin_addr.s_addr;
|
|
|
|
dport = dsin->sin_port;
|
|
|
|
}
|
|
|
|
if (flags & FL_HASH_ALL) {
|
|
|
|
((uint16_t *)key)[0] = sport;
|
|
|
|
((uint16_t *)key)[1] = dport;
|
|
|
|
} else
|
|
|
|
offset = V_flow_hashjitter + proto;
|
|
|
|
|
|
|
|
return (jenkins_hashword(key, 3, offset));
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct flentry *
|
|
|
|
flowtable_lookup_mbuf4(struct flowtable *ft, struct mbuf *m)
|
|
|
|
{
|
|
|
|
struct sockaddr_storage ssa, dsa;
|
|
|
|
uint16_t flags;
|
|
|
|
struct sockaddr_in *dsin, *ssin;
|
|
|
|
|
|
|
|
dsin = (struct sockaddr_in *)&dsa;
|
|
|
|
ssin = (struct sockaddr_in *)&ssa;
|
2010-03-12 10:24:58 +00:00
|
|
|
bzero(dsin, sizeof(*dsin));
|
|
|
|
bzero(ssin, sizeof(*ssin));
|
2010-03-12 05:03:26 +00:00
|
|
|
flags = ft->ft_flags;
|
|
|
|
if (ipv4_mbuf_demarshal(ft, m, ssin, dsin, &flags) != 0)
|
|
|
|
return (NULL);
|
|
|
|
|
|
|
|
return (flowtable_lookup(ft, &ssa, &dsa, M_GETFIB(m), flags));
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
flow_to_route(struct flentry *fle, struct route *ro)
|
|
|
|
{
|
|
|
|
uint32_t *hashkey = NULL;
|
|
|
|
struct sockaddr_in *sin;
|
|
|
|
|
|
|
|
sin = (struct sockaddr_in *)&ro->ro_dst;
|
|
|
|
sin->sin_family = AF_INET;
|
|
|
|
sin->sin_len = sizeof(*sin);
|
|
|
|
hashkey = ((struct flentry_v4 *)fle)->fl_flow.ipf_key;
|
|
|
|
sin->sin_addr.s_addr = hashkey[2];
|
|
|
|
ro->ro_rt = __DEVOLATILE(struct rtentry *, fle->f_rt);
|
|
|
|
ro->ro_lle = __DEVOLATILE(struct llentry *, fle->f_lle);
|
|
|
|
}
|
|
|
|
#endif /* INET */
|
|
|
|
|
|
|
|
#ifdef INET6
|
|
|
|
/*
|
|
|
|
* PULLUP_TO(len, p, T) makes sure that len + sizeof(T) is contiguous,
|
|
|
|
* then it sets p to point at the offset "len" in the mbuf. WARNING: the
|
|
|
|
* pointer might become stale after other pullups (but we never use it
|
|
|
|
* this way).
|
|
|
|
*/
|
|
|
|
#define PULLUP_TO(_len, p, T) \
|
|
|
|
do { \
|
|
|
|
int x = (_len) + sizeof(T); \
|
|
|
|
if ((m)->m_len < x) { \
|
|
|
|
goto receive_failed; \
|
|
|
|
} \
|
|
|
|
p = (mtod(m, char *) + (_len)); \
|
|
|
|
} while (0)
|
|
|
|
|
|
|
|
#define TCP(p) ((struct tcphdr *)(p))
|
|
|
|
#define SCTP(p) ((struct sctphdr *)(p))
|
|
|
|
#define UDP(p) ((struct udphdr *)(p))
|
|
|
|
|
|
|
|
static int
|
|
|
|
ipv6_mbuf_demarshal(struct flowtable *ft, struct mbuf *m,
|
|
|
|
struct sockaddr_in6 *ssin6, struct sockaddr_in6 *dsin6, uint16_t *flags)
|
|
|
|
{
|
|
|
|
struct ip6_hdr *ip6;
|
|
|
|
uint8_t proto;
|
|
|
|
int hlen;
|
|
|
|
uint16_t src_port, dst_port;
|
|
|
|
u_short offset;
|
|
|
|
void *ulp;
|
|
|
|
|
|
|
|
offset = hlen = src_port = dst_port = 0;
|
|
|
|
ulp = NULL;
|
|
|
|
ip6 = mtod(m, struct ip6_hdr *);
|
|
|
|
hlen = sizeof(struct ip6_hdr);
|
|
|
|
proto = ip6->ip6_nxt;
|
|
|
|
|
|
|
|
if ((*flags & FL_HASH_ALL) == 0)
|
|
|
|
goto skipports;
|
|
|
|
|
|
|
|
while (ulp == NULL) {
|
|
|
|
switch (proto) {
|
|
|
|
case IPPROTO_ICMPV6:
|
|
|
|
case IPPROTO_OSPFIGP:
|
|
|
|
case IPPROTO_PIM:
|
|
|
|
case IPPROTO_CARP:
|
|
|
|
case IPPROTO_ESP:
|
|
|
|
case IPPROTO_NONE:
|
|
|
|
ulp = ip6;
|
|
|
|
break;
|
|
|
|
case IPPROTO_TCP:
|
|
|
|
PULLUP_TO(hlen, ulp, struct tcphdr);
|
|
|
|
dst_port = TCP(ulp)->th_dport;
|
|
|
|
src_port = TCP(ulp)->th_sport;
|
|
|
|
if ((*flags & FL_HASH_ALL) &&
|
|
|
|
(TCP(ulp)->th_flags & (TH_RST|TH_FIN)))
|
|
|
|
*flags |= FL_STALE;
|
|
|
|
break;
|
|
|
|
case IPPROTO_SCTP:
|
|
|
|
PULLUP_TO(hlen, ulp, struct sctphdr);
|
|
|
|
src_port = SCTP(ulp)->src_port;
|
|
|
|
dst_port = SCTP(ulp)->dest_port;
|
|
|
|
break;
|
|
|
|
case IPPROTO_UDP:
|
|
|
|
PULLUP_TO(hlen, ulp, struct udphdr);
|
|
|
|
dst_port = UDP(ulp)->uh_dport;
|
|
|
|
src_port = UDP(ulp)->uh_sport;
|
|
|
|
break;
|
|
|
|
case IPPROTO_HOPOPTS: /* RFC 2460 */
|
|
|
|
PULLUP_TO(hlen, ulp, struct ip6_hbh);
|
|
|
|
hlen += (((struct ip6_hbh *)ulp)->ip6h_len + 1) << 3;
|
|
|
|
proto = ((struct ip6_hbh *)ulp)->ip6h_nxt;
|
|
|
|
ulp = NULL;
|
|
|
|
break;
|
|
|
|
case IPPROTO_ROUTING: /* RFC 2460 */
|
|
|
|
PULLUP_TO(hlen, ulp, struct ip6_rthdr);
|
|
|
|
hlen += (((struct ip6_rthdr *)ulp)->ip6r_len + 1) << 3;
|
|
|
|
proto = ((struct ip6_rthdr *)ulp)->ip6r_nxt;
|
|
|
|
ulp = NULL;
|
|
|
|
break;
|
|
|
|
case IPPROTO_FRAGMENT: /* RFC 2460 */
|
|
|
|
PULLUP_TO(hlen, ulp, struct ip6_frag);
|
|
|
|
hlen += sizeof (struct ip6_frag);
|
|
|
|
proto = ((struct ip6_frag *)ulp)->ip6f_nxt;
|
|
|
|
offset = ((struct ip6_frag *)ulp)->ip6f_offlg &
|
|
|
|
IP6F_OFF_MASK;
|
|
|
|
ulp = NULL;
|
|
|
|
break;
|
|
|
|
case IPPROTO_DSTOPTS: /* RFC 2460 */
|
|
|
|
PULLUP_TO(hlen, ulp, struct ip6_hbh);
|
|
|
|
hlen += (((struct ip6_hbh *)ulp)->ip6h_len + 1) << 3;
|
|
|
|
proto = ((struct ip6_hbh *)ulp)->ip6h_nxt;
|
|
|
|
ulp = NULL;
|
|
|
|
break;
|
|
|
|
case IPPROTO_AH: /* RFC 2402 */
|
|
|
|
PULLUP_TO(hlen, ulp, struct ip6_ext);
|
|
|
|
hlen += (((struct ip6_ext *)ulp)->ip6e_len + 2) << 2;
|
|
|
|
proto = ((struct ip6_ext *)ulp)->ip6e_nxt;
|
|
|
|
ulp = NULL;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
PULLUP_TO(hlen, ulp, struct ip6_ext);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (src_port == 0) {
|
|
|
|
receive_failed:
|
|
|
|
return (ENOTSUP);
|
2009-04-19 00:16:04 +00:00
|
|
|
}
|
|
|
|
|
2010-03-12 05:03:26 +00:00
|
|
|
skipports:
|
|
|
|
dsin6->sin6_family = AF_INET6;
|
|
|
|
dsin6->sin6_len = sizeof(*dsin6);
|
|
|
|
dsin6->sin6_port = dst_port;
|
|
|
|
memcpy(&dsin6->sin6_addr, &ip6->ip6_dst, sizeof(struct in6_addr));
|
|
|
|
|
|
|
|
ssin6->sin6_family = AF_INET6;
|
|
|
|
ssin6->sin6_len = sizeof(*ssin6);
|
|
|
|
ssin6->sin6_port = src_port;
|
|
|
|
memcpy(&ssin6->sin6_addr, &ip6->ip6_src, sizeof(struct in6_addr));
|
|
|
|
*flags |= proto_to_flags(proto);
|
|
|
|
|
2009-04-19 00:16:04 +00:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
2010-03-12 05:03:26 +00:00
|
|
|
#define zero_key(key) \
|
|
|
|
do { \
|
|
|
|
key[0] = 0; \
|
|
|
|
key[1] = 0; \
|
|
|
|
key[2] = 0; \
|
|
|
|
key[3] = 0; \
|
|
|
|
key[4] = 0; \
|
|
|
|
key[5] = 0; \
|
|
|
|
key[6] = 0; \
|
|
|
|
key[7] = 0; \
|
|
|
|
key[8] = 0; \
|
|
|
|
} while (0)
|
|
|
|
|
|
|
|
static uint32_t
|
|
|
|
ipv6_flow_lookup_hash_internal(
|
|
|
|
struct sockaddr_in6 *ssin6, struct sockaddr_in6 *dsin6,
|
|
|
|
uint32_t *key, uint16_t flags)
|
|
|
|
{
|
|
|
|
uint16_t sport, dport;
|
|
|
|
uint8_t proto;
|
|
|
|
int offset = 0;
|
|
|
|
|
|
|
|
if ((V_flowtable_enable == 0) || (V_flowtable_ready == 0))
|
|
|
|
return (0);
|
|
|
|
|
|
|
|
proto = flags_to_proto(flags);
|
|
|
|
zero_key(key);
|
|
|
|
sport = dport = 0;
|
|
|
|
if (dsin6 != NULL) {
|
|
|
|
memcpy(&key[1], &dsin6->sin6_addr, sizeof(struct in6_addr));
|
|
|
|
dport = dsin6->sin6_port;
|
|
|
|
}
|
|
|
|
if ((ssin6 != NULL) && (flags & FL_HASH_ALL)) {
|
|
|
|
memcpy(&key[5], &ssin6->sin6_addr, sizeof(struct in6_addr));
|
|
|
|
sport = ssin6->sin6_port;
|
|
|
|
}
|
|
|
|
if (flags & FL_HASH_ALL) {
|
|
|
|
((uint16_t *)key)[0] = sport;
|
|
|
|
((uint16_t *)key)[1] = dport;
|
|
|
|
} else
|
|
|
|
offset = V_flow_hashjitter + proto;
|
|
|
|
|
|
|
|
return (jenkins_hashword(key, 9, offset));
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct flentry *
|
|
|
|
flowtable_lookup_mbuf6(struct flowtable *ft, struct mbuf *m)
|
|
|
|
{
|
|
|
|
struct sockaddr_storage ssa, dsa;
|
|
|
|
struct sockaddr_in6 *dsin6, *ssin6;
|
|
|
|
uint16_t flags;
|
|
|
|
|
|
|
|
dsin6 = (struct sockaddr_in6 *)&dsa;
|
|
|
|
ssin6 = (struct sockaddr_in6 *)&ssa;
|
2010-03-12 10:24:58 +00:00
|
|
|
bzero(dsin6, sizeof(*dsin6));
|
|
|
|
bzero(ssin6, sizeof(*ssin6));
|
2010-03-12 05:03:26 +00:00
|
|
|
flags = ft->ft_flags;
|
|
|
|
|
|
|
|
if (ipv6_mbuf_demarshal(ft, m, ssin6, dsin6, &flags) != 0)
|
|
|
|
return (NULL);
|
|
|
|
|
|
|
|
return (flowtable_lookup(ft, &ssa, &dsa, M_GETFIB(m), flags));
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
flow_to_route_in6(struct flentry *fle, struct route_in6 *ro)
|
|
|
|
{
|
|
|
|
uint32_t *hashkey = NULL;
|
|
|
|
struct sockaddr_in6 *sin6;
|
|
|
|
|
|
|
|
sin6 = (struct sockaddr_in6 *)&ro->ro_dst;
|
|
|
|
|
|
|
|
sin6->sin6_family = AF_INET6;
|
|
|
|
sin6->sin6_len = sizeof(*sin6);
|
|
|
|
hashkey = ((struct flentry_v6 *)fle)->fl_flow.ipf_key;
|
|
|
|
memcpy(&sin6->sin6_addr, &hashkey[5], sizeof (struct in6_addr));
|
|
|
|
ro->ro_rt = __DEVOLATILE(struct rtentry *, fle->f_rt);
|
|
|
|
ro->ro_lle = __DEVOLATILE(struct llentry *, fle->f_lle);
|
|
|
|
|
|
|
|
}
|
|
|
|
#endif /* INET6 */
|
|
|
|
|
2009-04-19 00:16:04 +00:00
|
|
|
static bitstr_t *
|
|
|
|
flowtable_mask(struct flowtable *ft)
|
|
|
|
{
|
|
|
|
bitstr_t *mask;
|
2009-08-18 20:28:58 +00:00
|
|
|
|
2009-04-19 00:16:04 +00:00
|
|
|
if (ft->ft_flags & FL_PCPU)
|
|
|
|
mask = ft->ft_masks[curcpu];
|
|
|
|
else
|
|
|
|
mask = ft->ft_masks[0];
|
|
|
|
|
|
|
|
return (mask);
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct flentry **
|
|
|
|
flowtable_entry(struct flowtable *ft, uint32_t hash)
|
|
|
|
{
|
|
|
|
struct flentry **fle;
|
|
|
|
int index = (hash % ft->ft_size);
|
|
|
|
|
|
|
|
if (ft->ft_flags & FL_PCPU) {
|
|
|
|
KASSERT(&ft->ft_table.pcpu[curcpu][0] != NULL, ("pcpu not set"));
|
|
|
|
fle = &ft->ft_table.pcpu[curcpu][index];
|
|
|
|
} else {
|
|
|
|
KASSERT(&ft->ft_table.global[0] != NULL, ("global not set"));
|
|
|
|
fle = &ft->ft_table.global[index];
|
|
|
|
}
|
|
|
|
|
|
|
|
return (fle);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
flow_stale(struct flowtable *ft, struct flentry *fle)
|
|
|
|
{
|
|
|
|
time_t idle_time;
|
|
|
|
|
|
|
|
if ((fle->f_fhash == 0)
|
|
|
|
|| ((fle->f_rt->rt_flags & RTF_HOST) &&
|
|
|
|
((fle->f_rt->rt_flags & (RTF_UP))
|
|
|
|
!= (RTF_UP)))
|
2010-03-09 01:11:45 +00:00
|
|
|
|| (fle->f_rt->rt_ifp == NULL)
|
|
|
|
|| !RT_LINK_IS_UP(fle->f_rt->rt_ifp))
|
2009-04-19 00:16:04 +00:00
|
|
|
return (1);
|
|
|
|
|
|
|
|
idle_time = time_uptime - fle->f_uptime;
|
|
|
|
|
|
|
|
if ((fle->f_flags & FL_STALE) ||
|
|
|
|
((fle->f_flags & (TH_SYN|TH_ACK|TH_FIN)) == 0
|
|
|
|
&& (idle_time > ft->ft_udp_idle)) ||
|
|
|
|
((fle->f_flags & TH_FIN)
|
|
|
|
&& (idle_time > ft->ft_fin_wait_idle)) ||
|
|
|
|
((fle->f_flags & (TH_SYN|TH_ACK)) == TH_SYN
|
|
|
|
&& (idle_time > ft->ft_syn_idle)) ||
|
|
|
|
((fle->f_flags & (TH_SYN|TH_ACK)) == (TH_SYN|TH_ACK)
|
|
|
|
&& (idle_time > ft->ft_tcp_idle)) ||
|
|
|
|
((fle->f_rt->rt_flags & RTF_UP) == 0 ||
|
|
|
|
(fle->f_rt->rt_ifp == NULL)))
|
|
|
|
return (1);
|
|
|
|
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
flowtable_set_hashkey(struct flentry *fle, uint32_t *key)
|
|
|
|
{
|
|
|
|
uint32_t *hashkey;
|
|
|
|
int i, nwords;
|
|
|
|
|
|
|
|
if (fle->f_flags & FL_IPV6) {
|
|
|
|
nwords = 9;
|
|
|
|
hashkey = ((struct flentry_v4 *)fle)->fl_flow.ipf_key;
|
|
|
|
} else {
|
|
|
|
nwords = 3;
|
|
|
|
hashkey = ((struct flentry_v6 *)fle)->fl_flow.ipf_key;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < nwords; i++)
|
|
|
|
hashkey[i] = key[i];
|
|
|
|
}
|
|
|
|
|
2010-03-22 23:04:12 +00:00
|
|
|
static struct flentry *
|
|
|
|
flow_alloc(struct flowtable *ft)
|
|
|
|
{
|
|
|
|
struct flentry *newfle;
|
|
|
|
uma_zone_t zone;
|
|
|
|
|
|
|
|
newfle = NULL;
|
|
|
|
zone = (ft->ft_flags & FL_IPV6) ? V_flow_ipv6_zone : V_flow_ipv4_zone;
|
|
|
|
|
|
|
|
newfle = uma_zalloc(zone, M_NOWAIT | M_ZERO);
|
|
|
|
if (newfle != NULL)
|
|
|
|
atomic_add_int(&ft->ft_count, 1);
|
|
|
|
return (newfle);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
flow_free(struct flentry *fle, struct flowtable *ft)
|
|
|
|
{
|
|
|
|
uma_zone_t zone;
|
|
|
|
|
|
|
|
zone = (ft->ft_flags & FL_IPV6) ? V_flow_ipv6_zone : V_flow_ipv4_zone;
|
|
|
|
atomic_add_int(&ft->ft_count, -1);
|
|
|
|
uma_zfree(zone, fle);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
flow_full(struct flowtable *ft)
|
|
|
|
{
|
|
|
|
boolean_t full;
|
|
|
|
uint32_t count;
|
|
|
|
|
|
|
|
full = ft->ft_full;
|
|
|
|
count = ft->ft_count;
|
|
|
|
|
|
|
|
if (full && (count < (V_flowtable_nmbflows - (V_flowtable_nmbflows >> 3))))
|
|
|
|
ft->ft_full = FALSE;
|
|
|
|
else if (!full && (count > (V_flowtable_nmbflows - (V_flowtable_nmbflows >> 5))))
|
|
|
|
ft->ft_full = TRUE;
|
|
|
|
|
|
|
|
if (full && !ft->ft_full) {
|
|
|
|
flowclean_freq = 4*hz;
|
|
|
|
if ((ft->ft_flags & FL_HASH_ALL) == 0)
|
|
|
|
ft->ft_udp_idle = ft->ft_fin_wait_idle =
|
|
|
|
ft->ft_syn_idle = ft->ft_tcp_idle = 5;
|
|
|
|
cv_broadcast(&flowclean_cv);
|
|
|
|
} else if (!full && ft->ft_full) {
|
|
|
|
flowclean_freq = 20*hz;
|
|
|
|
if ((ft->ft_flags & FL_HASH_ALL) == 0)
|
|
|
|
ft->ft_udp_idle = ft->ft_fin_wait_idle =
|
|
|
|
ft->ft_syn_idle = ft->ft_tcp_idle = 30;
|
|
|
|
}
|
|
|
|
|
|
|
|
return (ft->ft_full);
|
|
|
|
}
|
|
|
|
|
2009-04-19 00:16:04 +00:00
|
|
|
static int
|
|
|
|
flowtable_insert(struct flowtable *ft, uint32_t hash, uint32_t *key,
|
2010-03-12 05:03:26 +00:00
|
|
|
uint32_t fibnum, struct route *ro, uint16_t flags)
|
2009-04-19 00:16:04 +00:00
|
|
|
{
|
|
|
|
struct flentry *fle, *fletail, *newfle, **flep;
|
2010-03-12 05:03:26 +00:00
|
|
|
struct flowtable_stats *fs = &ft->ft_stats[curcpu];
|
2009-04-19 00:16:04 +00:00
|
|
|
int depth;
|
|
|
|
bitstr_t *mask;
|
2010-03-12 05:03:26 +00:00
|
|
|
uint8_t proto;
|
2009-04-19 00:16:04 +00:00
|
|
|
|
2010-03-22 23:04:12 +00:00
|
|
|
newfle = flow_alloc(ft);
|
2009-04-19 00:16:04 +00:00
|
|
|
if (newfle == NULL)
|
|
|
|
return (ENOMEM);
|
|
|
|
|
|
|
|
newfle->f_flags |= (flags & FL_IPV6);
|
2010-03-12 05:03:26 +00:00
|
|
|
proto = flags_to_proto(flags);
|
|
|
|
|
2009-04-19 00:16:04 +00:00
|
|
|
FL_ENTRY_LOCK(ft, hash);
|
|
|
|
mask = flowtable_mask(ft);
|
|
|
|
flep = flowtable_entry(ft, hash);
|
|
|
|
fletail = fle = *flep;
|
|
|
|
|
|
|
|
if (fle == NULL) {
|
|
|
|
bit_set(mask, FL_ENTRY_INDEX(ft, hash));
|
|
|
|
*flep = fle = newfle;
|
|
|
|
goto skip;
|
|
|
|
}
|
|
|
|
|
|
|
|
depth = 0;
|
2010-03-12 05:03:26 +00:00
|
|
|
fs->ft_collisions++;
|
2009-04-19 00:16:04 +00:00
|
|
|
/*
|
|
|
|
* find end of list and make sure that we were not
|
|
|
|
* preempted by another thread handling this flow
|
|
|
|
*/
|
|
|
|
while (fle != NULL) {
|
|
|
|
if (fle->f_fhash == hash && !flow_stale(ft, fle)) {
|
|
|
|
/*
|
|
|
|
* there was either a hash collision
|
|
|
|
* or we lost a race to insert
|
|
|
|
*/
|
|
|
|
FL_ENTRY_UNLOCK(ft, hash);
|
2010-03-22 23:04:12 +00:00
|
|
|
flow_free(newfle, ft);
|
|
|
|
|
2010-03-12 05:03:26 +00:00
|
|
|
if (flags & FL_OVERWRITE)
|
|
|
|
goto skip;
|
2009-04-19 00:16:04 +00:00
|
|
|
return (EEXIST);
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* re-visit this double condition XXX
|
|
|
|
*/
|
|
|
|
if (fletail->f_next != NULL)
|
|
|
|
fletail = fle->f_next;
|
|
|
|
|
|
|
|
depth++;
|
|
|
|
fle = fle->f_next;
|
|
|
|
}
|
|
|
|
|
2010-03-12 05:03:26 +00:00
|
|
|
if (depth > fs->ft_max_depth)
|
|
|
|
fs->ft_max_depth = depth;
|
2009-04-19 00:16:04 +00:00
|
|
|
fletail->f_next = newfle;
|
|
|
|
fle = newfle;
|
|
|
|
skip:
|
|
|
|
flowtable_set_hashkey(fle, key);
|
|
|
|
|
|
|
|
fle->f_proto = proto;
|
|
|
|
fle->f_rt = ro->ro_rt;
|
|
|
|
fle->f_lle = ro->ro_lle;
|
|
|
|
fle->f_fhash = hash;
|
2009-08-18 20:28:58 +00:00
|
|
|
fle->f_fibnum = fibnum;
|
2009-04-19 00:16:04 +00:00
|
|
|
fle->f_uptime = time_uptime;
|
|
|
|
FL_ENTRY_UNLOCK(ft, hash);
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
2010-03-12 05:03:26 +00:00
|
|
|
int
|
|
|
|
kern_flowtable_insert(struct flowtable *ft,
|
|
|
|
struct sockaddr_storage *ssa, struct sockaddr_storage *dsa,
|
|
|
|
struct route *ro, uint32_t fibnum, int flags)
|
|
|
|
{
|
|
|
|
uint32_t key[9], hash;
|
|
|
|
|
|
|
|
flags = (ft->ft_flags | flags | FL_OVERWRITE);
|
|
|
|
hash = 0;
|
|
|
|
|
|
|
|
#ifdef INET
|
|
|
|
if (ssa->ss_family == AF_INET)
|
|
|
|
hash = ipv4_flow_lookup_hash_internal((struct sockaddr_in *)ssa,
|
|
|
|
(struct sockaddr_in *)dsa, key, flags);
|
|
|
|
#endif
|
|
|
|
#ifdef INET6
|
|
|
|
if (ssa->ss_family == AF_INET6)
|
|
|
|
hash = ipv6_flow_lookup_hash_internal((struct sockaddr_in6 *)ssa,
|
|
|
|
(struct sockaddr_in6 *)dsa, key, flags);
|
|
|
|
#endif
|
|
|
|
if (ro->ro_rt == NULL || ro->ro_lle == NULL)
|
|
|
|
return (EINVAL);
|
|
|
|
|
|
|
|
FLDPRINTF(ft, FL_DEBUG,
|
|
|
|
"kern_flowtable_insert: key=%x:%x:%x hash=%x fibnum=%d flags=%x\n",
|
|
|
|
key[0], key[1], key[2], hash, fibnum, flags);
|
|
|
|
return (flowtable_insert(ft, hash, key, fibnum, ro, flags));
|
|
|
|
}
|
|
|
|
|
2009-04-19 00:16:04 +00:00
|
|
|
static int
|
|
|
|
flowtable_key_equal(struct flentry *fle, uint32_t *key)
|
|
|
|
{
|
|
|
|
uint32_t *hashkey;
|
|
|
|
int i, nwords;
|
|
|
|
|
|
|
|
if (fle->f_flags & FL_IPV6) {
|
|
|
|
nwords = 9;
|
|
|
|
hashkey = ((struct flentry_v4 *)fle)->fl_flow.ipf_key;
|
|
|
|
} else {
|
|
|
|
nwords = 3;
|
|
|
|
hashkey = ((struct flentry_v6 *)fle)->fl_flow.ipf_key;
|
|
|
|
}
|
2010-03-12 05:03:26 +00:00
|
|
|
|
2009-04-19 00:16:04 +00:00
|
|
|
for (i = 0; i < nwords; i++)
|
|
|
|
if (hashkey[i] != key[i])
|
|
|
|
return (0);
|
|
|
|
|
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
|
2010-03-12 05:03:26 +00:00
|
|
|
struct flentry *
|
|
|
|
flowtable_lookup_mbuf(struct flowtable *ft, struct mbuf *m, int af)
|
|
|
|
{
|
|
|
|
struct flentry *fle = NULL;
|
|
|
|
|
|
|
|
#ifdef INET
|
|
|
|
if (af == AF_INET)
|
|
|
|
fle = flowtable_lookup_mbuf4(ft, m);
|
|
|
|
#endif
|
|
|
|
#ifdef INET6
|
|
|
|
if (af == AF_INET6)
|
|
|
|
fle = flowtable_lookup_mbuf6(ft, m);
|
|
|
|
#endif
|
|
|
|
if (fle != NULL && m != NULL && (m->m_flags & M_FLOWID) == 0) {
|
|
|
|
m->m_flags |= M_FLOWID;
|
|
|
|
m->m_pkthdr.flowid = fle->f_fhash;
|
|
|
|
}
|
|
|
|
return (fle);
|
|
|
|
}
|
|
|
|
|
|
|
|
struct flentry *
|
|
|
|
flowtable_lookup(struct flowtable *ft, struct sockaddr_storage *ssa,
|
|
|
|
struct sockaddr_storage *dsa, uint32_t fibnum, int flags)
|
2009-04-19 00:16:04 +00:00
|
|
|
{
|
|
|
|
uint32_t key[9], hash;
|
|
|
|
struct flentry *fle;
|
2010-03-12 05:03:26 +00:00
|
|
|
struct flowtable_stats *fs = &ft->ft_stats[curcpu];
|
2009-04-19 00:16:04 +00:00
|
|
|
uint8_t proto = 0;
|
2009-08-18 20:28:58 +00:00
|
|
|
int error = 0;
|
2009-04-19 00:16:04 +00:00
|
|
|
struct rtentry *rt;
|
|
|
|
struct llentry *lle;
|
2010-03-12 05:03:26 +00:00
|
|
|
struct route sro, *ro;
|
|
|
|
struct route_in6 sro6;
|
|
|
|
|
|
|
|
sro.ro_rt = sro6.ro_rt = NULL;
|
|
|
|
sro.ro_lle = sro6.ro_lle = NULL;
|
|
|
|
ro = NULL;
|
|
|
|
hash = 0;
|
|
|
|
flags |= ft->ft_flags;
|
|
|
|
proto = flags_to_proto(flags);
|
|
|
|
#ifdef INET
|
|
|
|
if (ssa->ss_family == AF_INET) {
|
|
|
|
struct sockaddr_in *ssin, *dsin;
|
|
|
|
|
|
|
|
ro = &sro;
|
|
|
|
memcpy(&ro->ro_dst, dsa, sizeof(struct sockaddr_in));
|
2010-03-12 10:24:58 +00:00
|
|
|
/*
|
|
|
|
* The harvested source and destination addresses
|
|
|
|
* may contain port information if the packet is
|
|
|
|
* from a transport protocol (e.g. TCP/UDP). The
|
|
|
|
* port field must be cleared before performing
|
|
|
|
* a route lookup.
|
|
|
|
*/
|
|
|
|
((struct sockaddr_in *)&ro->ro_dst)->sin_port = 0;
|
2010-03-12 05:03:26 +00:00
|
|
|
dsin = (struct sockaddr_in *)dsa;
|
|
|
|
ssin = (struct sockaddr_in *)ssa;
|
|
|
|
if ((dsin->sin_addr.s_addr == ssin->sin_addr.s_addr) ||
|
|
|
|
(ntohl(dsin->sin_addr.s_addr) >> IN_CLASSA_NSHIFT) == IN_LOOPBACKNET ||
|
|
|
|
(ntohl(ssin->sin_addr.s_addr) >> IN_CLASSA_NSHIFT) == IN_LOOPBACKNET)
|
|
|
|
return (NULL);
|
|
|
|
|
|
|
|
hash = ipv4_flow_lookup_hash_internal(ssin, dsin, key, flags);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
#ifdef INET6
|
|
|
|
if (ssa->ss_family == AF_INET6) {
|
|
|
|
struct sockaddr_in6 *ssin6, *dsin6;
|
|
|
|
|
|
|
|
ro = (struct route *)&sro6;
|
|
|
|
memcpy(&sro6.ro_dst, dsa,
|
|
|
|
sizeof(struct sockaddr_in6));
|
2010-03-12 10:24:58 +00:00
|
|
|
((struct sockaddr_in6 *)&ro->ro_dst)->sin6_port = 0;
|
2010-03-12 05:03:26 +00:00
|
|
|
dsin6 = (struct sockaddr_in6 *)dsa;
|
|
|
|
ssin6 = (struct sockaddr_in6 *)ssa;
|
|
|
|
|
|
|
|
flags |= FL_IPV6;
|
|
|
|
hash = ipv6_flow_lookup_hash_internal(ssin6, dsin6, key, flags);
|
|
|
|
}
|
|
|
|
#endif
|
2009-04-19 00:16:04 +00:00
|
|
|
/*
|
|
|
|
* Ports are zero and this isn't a transmit cache
|
|
|
|
* - thus not a protocol for which we need to keep
|
|
|
|
* state
|
2010-03-12 05:03:26 +00:00
|
|
|
* FL_HASH_ALL => key[0] != 0 for TCP || UDP || SCTP
|
2009-04-19 00:16:04 +00:00
|
|
|
*/
|
2010-03-12 05:03:26 +00:00
|
|
|
if (hash == 0 || (key[0] == 0 && (ft->ft_flags & FL_HASH_ALL)))
|
|
|
|
return (NULL);
|
2009-04-19 00:16:04 +00:00
|
|
|
|
2010-03-12 05:03:26 +00:00
|
|
|
fs->ft_lookups++;
|
2009-04-19 00:16:04 +00:00
|
|
|
FL_ENTRY_LOCK(ft, hash);
|
|
|
|
if ((fle = FL_ENTRY(ft, hash)) == NULL) {
|
|
|
|
FL_ENTRY_UNLOCK(ft, hash);
|
|
|
|
goto uncached;
|
|
|
|
}
|
|
|
|
keycheck:
|
|
|
|
rt = __DEVOLATILE(struct rtentry *, fle->f_rt);
|
|
|
|
lle = __DEVOLATILE(struct llentry *, fle->f_lle);
|
|
|
|
if ((rt != NULL)
|
|
|
|
&& fle->f_fhash == hash
|
|
|
|
&& flowtable_key_equal(fle, key)
|
|
|
|
&& (proto == fle->f_proto)
|
2009-08-18 20:28:58 +00:00
|
|
|
&& (fibnum == fle->f_fibnum)
|
2009-04-19 00:16:04 +00:00
|
|
|
&& (rt->rt_flags & RTF_UP)
|
|
|
|
&& (rt->rt_ifp != NULL)) {
|
2010-03-12 05:03:26 +00:00
|
|
|
fs->ft_hits++;
|
2009-04-19 00:16:04 +00:00
|
|
|
fle->f_uptime = time_uptime;
|
|
|
|
fle->f_flags |= flags;
|
|
|
|
FL_ENTRY_UNLOCK(ft, hash);
|
2010-03-12 05:03:26 +00:00
|
|
|
return (fle);
|
2009-04-19 00:16:04 +00:00
|
|
|
} else if (fle->f_next != NULL) {
|
|
|
|
fle = fle->f_next;
|
|
|
|
goto keycheck;
|
|
|
|
}
|
|
|
|
FL_ENTRY_UNLOCK(ft, hash);
|
|
|
|
uncached:
|
2010-03-22 23:04:12 +00:00
|
|
|
if (flags & FL_NOAUTO || flow_full(ft))
|
2010-03-12 05:03:26 +00:00
|
|
|
return (NULL);
|
|
|
|
|
|
|
|
fs->ft_misses++;
|
2009-04-19 00:16:04 +00:00
|
|
|
/*
|
|
|
|
* This bit of code ends up locking the
|
|
|
|
* same route 3 times (just like ip_output + ether_output)
|
|
|
|
* - at lookup
|
|
|
|
* - in rt_check when called by arpresolve
|
|
|
|
* - dropping the refcount for the rtentry
|
|
|
|
*
|
|
|
|
* This could be consolidated to one if we wrote a variant
|
|
|
|
* of arpresolve with an rt_check variant that expected to
|
|
|
|
* receive the route locked
|
|
|
|
*/
|
|
|
|
|
2010-03-12 05:03:26 +00:00
|
|
|
#ifdef INVARIANTS
|
|
|
|
if ((ro->ro_dst.sa_family != AF_INET) &&
|
|
|
|
(ro->ro_dst.sa_family != AF_INET6))
|
|
|
|
panic("sa_family == %d\n", ro->ro_dst.sa_family);
|
|
|
|
#endif
|
|
|
|
|
2009-08-18 20:28:58 +00:00
|
|
|
ft->ft_rtalloc(ro, hash, fibnum);
|
2009-04-19 00:16:04 +00:00
|
|
|
if (ro->ro_rt == NULL)
|
|
|
|
error = ENETUNREACH;
|
|
|
|
else {
|
|
|
|
struct llentry *lle = NULL;
|
2010-03-12 05:03:26 +00:00
|
|
|
struct sockaddr_storage *l3addr;
|
2009-04-19 00:16:04 +00:00
|
|
|
struct rtentry *rt = ro->ro_rt;
|
|
|
|
struct ifnet *ifp = rt->rt_ifp;
|
|
|
|
|
2009-08-28 07:01:09 +00:00
|
|
|
if (ifp->if_flags & (IFF_POINTOPOINT | IFF_LOOPBACK)) {
|
|
|
|
RTFREE(rt);
|
|
|
|
ro->ro_rt = NULL;
|
2010-03-12 05:03:26 +00:00
|
|
|
return (NULL);
|
2009-08-28 07:01:09 +00:00
|
|
|
}
|
2010-03-12 05:03:26 +00:00
|
|
|
#ifdef INET6
|
|
|
|
if (ssa->ss_family == AF_INET6) {
|
|
|
|
struct sockaddr_in6 *dsin6;
|
|
|
|
|
|
|
|
dsin6 = (struct sockaddr_in6 *)dsa;
|
|
|
|
if (in6_localaddr(&dsin6->sin6_addr)) {
|
|
|
|
RTFREE(rt);
|
|
|
|
ro->ro_rt = NULL;
|
|
|
|
return (NULL);
|
|
|
|
}
|
2009-08-28 07:01:09 +00:00
|
|
|
|
2010-03-12 05:03:26 +00:00
|
|
|
if (rt->rt_flags & RTF_GATEWAY)
|
|
|
|
l3addr = (struct sockaddr_storage *)rt->rt_gateway;
|
|
|
|
|
|
|
|
else
|
|
|
|
l3addr = (struct sockaddr_storage *)&ro->ro_dst;
|
|
|
|
llentry_update(&lle, LLTABLE6(ifp), l3addr, ifp);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
#ifdef INET
|
|
|
|
if (ssa->ss_family == AF_INET) {
|
|
|
|
if (rt->rt_flags & RTF_GATEWAY)
|
|
|
|
l3addr = (struct sockaddr_storage *)rt->rt_gateway;
|
|
|
|
else
|
|
|
|
l3addr = (struct sockaddr_storage *)&ro->ro_dst;
|
|
|
|
llentry_update(&lle, LLTABLE(ifp), l3addr, ifp);
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
2009-04-19 00:16:04 +00:00
|
|
|
ro->ro_lle = lle;
|
|
|
|
|
|
|
|
if (lle == NULL) {
|
|
|
|
RTFREE(rt);
|
|
|
|
ro->ro_rt = NULL;
|
2010-03-12 05:03:26 +00:00
|
|
|
return (NULL);
|
2009-04-19 00:16:04 +00:00
|
|
|
}
|
2010-03-12 05:03:26 +00:00
|
|
|
error = flowtable_insert(ft, hash, key, fibnum, ro, flags);
|
|
|
|
|
2009-04-19 00:16:04 +00:00
|
|
|
if (error) {
|
|
|
|
RTFREE(rt);
|
|
|
|
LLE_FREE(lle);
|
|
|
|
ro->ro_rt = NULL;
|
|
|
|
ro->ro_lle = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-03-12 05:03:26 +00:00
|
|
|
return ((error) ? NULL : fle);
|
2009-04-19 00:16:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* used by the bit_alloc macro
|
|
|
|
*/
|
|
|
|
#define calloc(count, size) malloc((count)*(size), M_DEVBUF, M_WAITOK|M_ZERO)
|
|
|
|
|
|
|
|
struct flowtable *
|
2010-03-12 05:03:26 +00:00
|
|
|
flowtable_alloc(char *name, int nentry, int flags)
|
2009-04-19 00:16:04 +00:00
|
|
|
{
|
|
|
|
struct flowtable *ft, *fttail;
|
|
|
|
int i;
|
|
|
|
|
2009-06-22 21:19:24 +00:00
|
|
|
if (V_flow_hashjitter == 0)
|
|
|
|
V_flow_hashjitter = arc4random();
|
2009-04-19 00:16:04 +00:00
|
|
|
|
|
|
|
KASSERT(nentry > 0, ("nentry must be > 0, is %d\n", nentry));
|
|
|
|
|
|
|
|
ft = malloc(sizeof(struct flowtable),
|
|
|
|
M_RTABLE, M_WAITOK | M_ZERO);
|
2010-03-12 05:03:26 +00:00
|
|
|
|
|
|
|
ft->ft_name = name;
|
2009-04-19 00:16:04 +00:00
|
|
|
ft->ft_flags = flags;
|
|
|
|
ft->ft_size = nentry;
|
|
|
|
#ifdef RADIX_MPATH
|
|
|
|
ft->ft_rtalloc = rtalloc_mpath_fib;
|
|
|
|
#else
|
|
|
|
ft->ft_rtalloc = in_rtalloc_ign_wrapper;
|
|
|
|
#endif
|
|
|
|
if (flags & FL_PCPU) {
|
|
|
|
ft->ft_lock = flowtable_pcpu_lock;
|
|
|
|
ft->ft_unlock = flowtable_pcpu_unlock;
|
|
|
|
|
|
|
|
for (i = 0; i <= mp_maxid; i++) {
|
|
|
|
ft->ft_table.pcpu[i] =
|
|
|
|
malloc(nentry*sizeof(struct flentry *),
|
|
|
|
M_RTABLE, M_WAITOK | M_ZERO);
|
|
|
|
ft->ft_masks[i] = bit_alloc(nentry);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
ft->ft_lock_count = 2*(powerof2(mp_maxid + 1) ? (mp_maxid + 1):
|
|
|
|
(fls(mp_maxid + 1) << 1));
|
|
|
|
|
|
|
|
ft->ft_lock = flowtable_global_lock;
|
|
|
|
ft->ft_unlock = flowtable_global_unlock;
|
|
|
|
ft->ft_table.global =
|
|
|
|
malloc(nentry*sizeof(struct flentry *),
|
|
|
|
M_RTABLE, M_WAITOK | M_ZERO);
|
|
|
|
ft->ft_locks = malloc(ft->ft_lock_count*sizeof(struct mtx),
|
|
|
|
M_RTABLE, M_WAITOK | M_ZERO);
|
|
|
|
for (i = 0; i < ft->ft_lock_count; i++)
|
|
|
|
mtx_init(&ft->ft_locks[i], "flow", NULL, MTX_DEF|MTX_DUPOK);
|
|
|
|
|
|
|
|
ft->ft_masks[0] = bit_alloc(nentry);
|
|
|
|
}
|
2009-04-20 16:16:43 +00:00
|
|
|
ft->ft_tmpmask = bit_alloc(nentry);
|
2009-04-19 00:16:04 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* In the local transmit case the table truly is
|
|
|
|
* just a cache - so everything is eligible for
|
|
|
|
* replacement after 5s of non-use
|
|
|
|
*/
|
2010-03-12 05:03:26 +00:00
|
|
|
if (flags & FL_HASH_ALL) {
|
2009-06-22 21:19:24 +00:00
|
|
|
ft->ft_udp_idle = V_flowtable_udp_expire;
|
|
|
|
ft->ft_syn_idle = V_flowtable_syn_expire;
|
|
|
|
ft->ft_fin_wait_idle = V_flowtable_fin_wait_expire;
|
|
|
|
ft->ft_tcp_idle = V_flowtable_fin_wait_expire;
|
2009-04-19 00:16:04 +00:00
|
|
|
} else {
|
|
|
|
ft->ft_udp_idle = ft->ft_fin_wait_idle =
|
|
|
|
ft->ft_syn_idle = ft->ft_tcp_idle = 30;
|
|
|
|
|
|
|
|
}
|
2009-04-20 16:16:43 +00:00
|
|
|
|
2009-04-19 00:16:04 +00:00
|
|
|
/*
|
|
|
|
* hook in to the cleaner list
|
|
|
|
*/
|
2009-06-22 21:19:24 +00:00
|
|
|
if (V_flow_list_head == NULL)
|
|
|
|
V_flow_list_head = ft;
|
2009-04-19 00:16:04 +00:00
|
|
|
else {
|
2009-06-22 21:19:24 +00:00
|
|
|
fttail = V_flow_list_head;
|
2009-04-19 00:16:04 +00:00
|
|
|
while (fttail->ft_next != NULL)
|
|
|
|
fttail = fttail->ft_next;
|
|
|
|
fttail->ft_next = ft;
|
|
|
|
}
|
|
|
|
|
|
|
|
return (ft);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The rest of the code is devoted to garbage collection of expired entries.
|
|
|
|
* It is a new additon made necessary by the switch to dynamically allocating
|
|
|
|
* flow tables.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
static void
|
2010-03-22 23:04:12 +00:00
|
|
|
fle_free(struct flentry *fle, struct flowtable *ft)
|
2009-04-19 00:16:04 +00:00
|
|
|
{
|
|
|
|
struct rtentry *rt;
|
|
|
|
struct llentry *lle;
|
|
|
|
|
|
|
|
rt = __DEVOLATILE(struct rtentry *, fle->f_rt);
|
|
|
|
lle = __DEVOLATILE(struct llentry *, fle->f_lle);
|
2010-05-12 04:51:20 +00:00
|
|
|
if (rt != NULL)
|
|
|
|
RTFREE(rt);
|
|
|
|
if (lle != NULL)
|
|
|
|
LLE_FREE(lle);
|
2010-03-22 23:04:12 +00:00
|
|
|
flow_free(fle, ft);
|
2009-04-19 00:16:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2009-10-01 20:32:29 +00:00
|
|
|
flowtable_free_stale(struct flowtable *ft, struct rtentry *rt)
|
2009-04-19 00:16:04 +00:00
|
|
|
{
|
|
|
|
int curbit = 0, count;
|
|
|
|
struct flentry *fle, **flehead, *fleprev;
|
|
|
|
struct flentry *flefreehead, *flefreetail, *fletmp;
|
2009-04-20 16:16:43 +00:00
|
|
|
bitstr_t *mask, *tmpmask;
|
2010-03-12 05:03:26 +00:00
|
|
|
struct flowtable_stats *fs = &ft->ft_stats[curcpu];
|
|
|
|
|
2009-04-19 00:16:04 +00:00
|
|
|
flefreehead = flefreetail = NULL;
|
|
|
|
mask = flowtable_mask(ft);
|
2009-04-20 16:16:43 +00:00
|
|
|
tmpmask = ft->ft_tmpmask;
|
|
|
|
memcpy(tmpmask, mask, ft->ft_size/8);
|
|
|
|
/*
|
|
|
|
* XXX Note to self, bit_ffs operates at the byte level
|
|
|
|
* and thus adds gratuitous overhead
|
|
|
|
*/
|
|
|
|
bit_ffs(tmpmask, ft->ft_size, &curbit);
|
|
|
|
while (curbit != -1) {
|
2009-04-19 04:24:56 +00:00
|
|
|
if (curbit >= ft->ft_size || curbit < -1) {
|
|
|
|
log(LOG_ALERT,
|
|
|
|
"warning: bad curbit value %d \n",
|
2009-04-19 00:16:04 +00:00
|
|
|
curbit);
|
2009-04-19 04:24:56 +00:00
|
|
|
break;
|
2009-04-19 00:16:04 +00:00
|
|
|
}
|
2010-03-12 05:03:26 +00:00
|
|
|
|
2009-04-19 00:16:04 +00:00
|
|
|
FL_ENTRY_LOCK(ft, curbit);
|
|
|
|
flehead = flowtable_entry(ft, curbit);
|
|
|
|
fle = fleprev = *flehead;
|
|
|
|
|
2010-03-12 05:03:26 +00:00
|
|
|
fs->ft_free_checks++;
|
2009-04-19 04:24:56 +00:00
|
|
|
#ifdef DIAGNOSTIC
|
2009-04-19 00:16:04 +00:00
|
|
|
if (fle == NULL && curbit > 0) {
|
2009-04-19 04:24:56 +00:00
|
|
|
log(LOG_ALERT,
|
|
|
|
"warning bit=%d set, but no fle found\n",
|
|
|
|
curbit);
|
2009-04-19 00:16:04 +00:00
|
|
|
}
|
2009-04-19 04:24:56 +00:00
|
|
|
#endif
|
2009-10-01 20:32:29 +00:00
|
|
|
while (fle != NULL) {
|
|
|
|
if (rt != NULL) {
|
|
|
|
if (__DEVOLATILE(struct rtentry *, fle->f_rt) != rt) {
|
|
|
|
fleprev = fle;
|
|
|
|
fle = fle->f_next;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
} else if (!flow_stale(ft, fle)) {
|
2009-04-19 00:16:04 +00:00
|
|
|
fleprev = fle;
|
|
|
|
fle = fle->f_next;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* delete head of the list
|
|
|
|
*/
|
|
|
|
if (fleprev == *flehead) {
|
|
|
|
fletmp = fleprev;
|
|
|
|
if (fle == fleprev) {
|
|
|
|
fleprev = *flehead = fle->f_next;
|
|
|
|
} else
|
|
|
|
fleprev = *flehead = fle;
|
|
|
|
fle = fle->f_next;
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* don't advance fleprev
|
|
|
|
*/
|
|
|
|
fletmp = fle;
|
|
|
|
fleprev->f_next = fle->f_next;
|
|
|
|
fle = fleprev->f_next;
|
|
|
|
}
|
2010-03-12 05:03:26 +00:00
|
|
|
|
2009-04-19 00:16:04 +00:00
|
|
|
if (flefreehead == NULL)
|
|
|
|
flefreehead = flefreetail = fletmp;
|
2009-04-19 04:24:56 +00:00
|
|
|
else {
|
2009-04-19 00:16:04 +00:00
|
|
|
flefreetail->f_next = fletmp;
|
2009-04-19 04:24:56 +00:00
|
|
|
flefreetail = fletmp;
|
|
|
|
}
|
|
|
|
fletmp->f_next = NULL;
|
2009-04-19 00:16:04 +00:00
|
|
|
}
|
|
|
|
if (*flehead == NULL)
|
|
|
|
bit_clear(mask, curbit);
|
|
|
|
FL_ENTRY_UNLOCK(ft, curbit);
|
2009-04-20 16:16:43 +00:00
|
|
|
bit_clear(tmpmask, curbit);
|
|
|
|
bit_ffs(tmpmask, ft->ft_size, &curbit);
|
2009-04-19 00:16:04 +00:00
|
|
|
}
|
|
|
|
count = 0;
|
|
|
|
while ((fle = flefreehead) != NULL) {
|
|
|
|
flefreehead = fle->f_next;
|
|
|
|
count++;
|
2010-03-12 05:03:26 +00:00
|
|
|
fs->ft_frees++;
|
2010-03-22 23:04:12 +00:00
|
|
|
fle_free(fle, ft);
|
2009-04-19 00:16:04 +00:00
|
|
|
}
|
2009-08-19 20:13:09 +00:00
|
|
|
if (V_flowtable_debug && count)
|
2009-04-19 00:16:04 +00:00
|
|
|
log(LOG_DEBUG, "freed %d flow entries\n", count);
|
|
|
|
}
|
|
|
|
|
2009-10-01 20:32:29 +00:00
|
|
|
void
|
|
|
|
flowtable_route_flush(struct flowtable *ft, struct rtentry *rt)
|
|
|
|
{
|
|
|
|
int i;
|
2010-03-12 05:03:26 +00:00
|
|
|
|
2009-10-01 20:32:29 +00:00
|
|
|
if (ft->ft_flags & FL_PCPU) {
|
2010-06-11 18:46:34 +00:00
|
|
|
CPU_FOREACH(i) {
|
2009-10-20 21:27:03 +00:00
|
|
|
if (smp_started == 1) {
|
|
|
|
thread_lock(curthread);
|
|
|
|
sched_bind(curthread, i);
|
|
|
|
thread_unlock(curthread);
|
|
|
|
}
|
2009-10-01 20:32:29 +00:00
|
|
|
|
|
|
|
flowtable_free_stale(ft, rt);
|
|
|
|
|
2009-10-20 21:27:03 +00:00
|
|
|
if (smp_started == 1) {
|
|
|
|
thread_lock(curthread);
|
|
|
|
sched_unbind(curthread);
|
|
|
|
thread_unlock(curthread);
|
|
|
|
}
|
2009-10-01 20:32:29 +00:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
flowtable_free_stale(ft, rt);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2009-04-19 00:16:04 +00:00
|
|
|
static void
|
2009-06-22 21:19:24 +00:00
|
|
|
flowtable_clean_vnet(void)
|
2009-04-19 00:16:04 +00:00
|
|
|
{
|
|
|
|
struct flowtable *ft;
|
|
|
|
int i;
|
|
|
|
|
2009-06-22 21:19:24 +00:00
|
|
|
ft = V_flow_list_head;
|
|
|
|
while (ft != NULL) {
|
|
|
|
if (ft->ft_flags & FL_PCPU) {
|
2010-06-11 18:46:34 +00:00
|
|
|
CPU_FOREACH(i) {
|
2009-10-22 00:32:01 +00:00
|
|
|
if (smp_started == 1) {
|
|
|
|
thread_lock(curthread);
|
|
|
|
sched_bind(curthread, i);
|
|
|
|
thread_unlock(curthread);
|
|
|
|
}
|
2009-06-22 21:19:24 +00:00
|
|
|
|
2009-10-01 20:32:29 +00:00
|
|
|
flowtable_free_stale(ft, NULL);
|
2009-06-22 21:19:24 +00:00
|
|
|
|
2009-10-22 00:32:01 +00:00
|
|
|
if (smp_started == 1) {
|
|
|
|
thread_lock(curthread);
|
|
|
|
sched_unbind(curthread);
|
|
|
|
thread_unlock(curthread);
|
|
|
|
}
|
2009-06-22 21:19:24 +00:00
|
|
|
}
|
|
|
|
} else {
|
2009-10-01 20:32:29 +00:00
|
|
|
flowtable_free_stale(ft, NULL);
|
2009-06-22 21:19:24 +00:00
|
|
|
}
|
|
|
|
ft = ft->ft_next;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
flowtable_cleaner(void)
|
|
|
|
{
|
|
|
|
VNET_ITERATOR_DECL(vnet_iter);
|
|
|
|
|
2009-04-19 00:16:04 +00:00
|
|
|
if (bootverbose)
|
|
|
|
log(LOG_INFO, "flowtable cleaner started\n");
|
|
|
|
while (1) {
|
2009-06-22 21:19:24 +00:00
|
|
|
VNET_LIST_RLOCK();
|
|
|
|
VNET_FOREACH(vnet_iter) {
|
|
|
|
CURVNET_SET(vnet_iter);
|
|
|
|
flowtable_clean_vnet();
|
|
|
|
CURVNET_RESTORE();
|
2009-04-19 00:16:04 +00:00
|
|
|
}
|
2009-06-22 21:19:24 +00:00
|
|
|
VNET_LIST_RUNLOCK();
|
|
|
|
|
2009-08-18 20:28:58 +00:00
|
|
|
flowclean_cycles++;
|
2009-04-19 00:16:04 +00:00
|
|
|
/*
|
2009-08-19 20:13:09 +00:00
|
|
|
* The 10 second interval between cleaning checks
|
2009-04-19 00:16:04 +00:00
|
|
|
* is arbitrary
|
|
|
|
*/
|
2009-08-18 20:28:58 +00:00
|
|
|
mtx_lock(&flowclean_lock);
|
|
|
|
cv_broadcast(&flowclean_cv);
|
2010-03-22 23:04:12 +00:00
|
|
|
cv_timedwait(&flowclean_cv, &flowclean_lock, flowclean_freq);
|
2009-08-18 20:28:58 +00:00
|
|
|
mtx_unlock(&flowclean_lock);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
flowtable_flush(void *unused __unused)
|
|
|
|
{
|
|
|
|
uint64_t start;
|
2010-03-12 05:03:26 +00:00
|
|
|
|
2009-08-18 20:28:58 +00:00
|
|
|
mtx_lock(&flowclean_lock);
|
|
|
|
start = flowclean_cycles;
|
|
|
|
while (start == flowclean_cycles) {
|
|
|
|
cv_broadcast(&flowclean_cv);
|
|
|
|
cv_wait(&flowclean_cv, &flowclean_lock);
|
2009-04-19 00:16:04 +00:00
|
|
|
}
|
2009-08-18 20:28:58 +00:00
|
|
|
mtx_unlock(&flowclean_lock);
|
2009-04-19 00:16:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static struct kproc_desc flow_kp = {
|
|
|
|
"flowcleaner",
|
|
|
|
flowtable_cleaner,
|
|
|
|
&flowcleanerproc
|
|
|
|
};
|
|
|
|
SYSINIT(flowcleaner, SI_SUB_KTHREAD_IDLE, SI_ORDER_ANY, kproc_start, &flow_kp);
|
2009-06-09 21:55:28 +00:00
|
|
|
|
2009-08-18 20:28:58 +00:00
|
|
|
static void
|
|
|
|
flowtable_init_vnet(const void *unused __unused)
|
|
|
|
{
|
|
|
|
|
2010-03-22 23:04:12 +00:00
|
|
|
V_flowtable_nmbflows = 1024 + maxusers * 64 * mp_ncpus;
|
2009-08-18 20:28:58 +00:00
|
|
|
V_flow_ipv4_zone = uma_zcreate("ip4flow", sizeof(struct flentry_v4),
|
|
|
|
NULL, NULL, NULL, NULL, 64, UMA_ZONE_MAXBUCKET);
|
|
|
|
V_flow_ipv6_zone = uma_zcreate("ip6flow", sizeof(struct flentry_v6),
|
|
|
|
NULL, NULL, NULL, NULL, 64, UMA_ZONE_MAXBUCKET);
|
|
|
|
uma_zone_set_max(V_flow_ipv4_zone, V_flowtable_nmbflows);
|
|
|
|
uma_zone_set_max(V_flow_ipv6_zone, V_flowtable_nmbflows);
|
2009-08-21 09:22:32 +00:00
|
|
|
V_flowtable_ready = 1;
|
2009-08-18 20:28:58 +00:00
|
|
|
}
|
2010-03-22 23:04:12 +00:00
|
|
|
VNET_SYSINIT(flowtable_init_vnet, SI_SUB_SMP, SI_ORDER_ANY,
|
2009-08-18 20:28:58 +00:00
|
|
|
flowtable_init_vnet, NULL);
|
|
|
|
|
|
|
|
static void
|
|
|
|
flowtable_init(const void *unused __unused)
|
|
|
|
{
|
|
|
|
|
|
|
|
cv_init(&flowclean_cv, "flowcleanwait");
|
|
|
|
mtx_init(&flowclean_lock, "flowclean lock", NULL, MTX_DEF);
|
|
|
|
EVENTHANDLER_REGISTER(ifnet_departure_event, flowtable_flush, NULL,
|
|
|
|
EVENTHANDLER_PRI_ANY);
|
2010-03-22 23:04:12 +00:00
|
|
|
flowclean_freq = 20*hz;
|
2009-08-18 20:28:58 +00:00
|
|
|
}
|
2010-04-27 23:48:50 +00:00
|
|
|
SYSINIT(flowtable_init, SI_SUB_KTHREAD_INIT, SI_ORDER_FIRST,
|
2009-08-18 20:28:58 +00:00
|
|
|
flowtable_init, NULL);
|
|
|
|
|
|
|
|
|
|
|
|
#ifdef VIMAGE
|
|
|
|
static void
|
|
|
|
flowtable_uninit(const void *unused __unused)
|
|
|
|
{
|
|
|
|
|
2009-08-21 09:22:32 +00:00
|
|
|
V_flowtable_ready = 0;
|
2009-08-18 20:28:58 +00:00
|
|
|
uma_zdestroy(V_flow_ipv4_zone);
|
|
|
|
uma_zdestroy(V_flow_ipv6_zone);
|
|
|
|
}
|
|
|
|
|
|
|
|
VNET_SYSUNINIT(flowtable_uninit, SI_SUB_KTHREAD_INIT, SI_ORDER_ANY,
|
|
|
|
flowtable_uninit, NULL);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef DDB
|
2010-03-12 19:58:51 +00:00
|
|
|
static uint32_t *
|
|
|
|
flowtable_get_hashkey(struct flentry *fle)
|
|
|
|
{
|
|
|
|
uint32_t *hashkey;
|
|
|
|
|
|
|
|
if (fle->f_flags & FL_IPV6)
|
|
|
|
hashkey = ((struct flentry_v4 *)fle)->fl_flow.ipf_key;
|
|
|
|
else
|
|
|
|
hashkey = ((struct flentry_v6 *)fle)->fl_flow.ipf_key;
|
|
|
|
|
|
|
|
return (hashkey);
|
|
|
|
}
|
|
|
|
|
2009-08-18 20:28:58 +00:00
|
|
|
static bitstr_t *
|
|
|
|
flowtable_mask_pcpu(struct flowtable *ft, int cpuid)
|
|
|
|
{
|
|
|
|
bitstr_t *mask;
|
|
|
|
|
|
|
|
if (ft->ft_flags & FL_PCPU)
|
|
|
|
mask = ft->ft_masks[cpuid];
|
|
|
|
else
|
|
|
|
mask = ft->ft_masks[0];
|
|
|
|
|
|
|
|
return (mask);
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct flentry **
|
|
|
|
flowtable_entry_pcpu(struct flowtable *ft, uint32_t hash, int cpuid)
|
|
|
|
{
|
|
|
|
struct flentry **fle;
|
|
|
|
int index = (hash % ft->ft_size);
|
|
|
|
|
|
|
|
if (ft->ft_flags & FL_PCPU) {
|
|
|
|
fle = &ft->ft_table.pcpu[cpuid][index];
|
|
|
|
} else {
|
|
|
|
fle = &ft->ft_table.global[index];
|
|
|
|
}
|
|
|
|
|
|
|
|
return (fle);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
flow_show(struct flowtable *ft, struct flentry *fle)
|
|
|
|
{
|
|
|
|
int idle_time;
|
2010-03-12 05:03:26 +00:00
|
|
|
int rt_valid, ifp_valid;
|
|
|
|
uint16_t sport, dport;
|
|
|
|
uint32_t *hashkey;
|
|
|
|
char saddr[4*sizeof "123"], daddr[4*sizeof "123"];
|
|
|
|
volatile struct rtentry *rt;
|
|
|
|
struct ifnet *ifp = NULL;
|
2009-08-18 20:28:58 +00:00
|
|
|
|
|
|
|
idle_time = (int)(time_uptime - fle->f_uptime);
|
2010-03-12 05:03:26 +00:00
|
|
|
rt = fle->f_rt;
|
|
|
|
rt_valid = rt != NULL;
|
|
|
|
if (rt_valid)
|
|
|
|
ifp = rt->rt_ifp;
|
|
|
|
ifp_valid = ifp != NULL;
|
|
|
|
hashkey = flowtable_get_hashkey(fle);
|
|
|
|
if (fle->f_flags & FL_IPV6)
|
|
|
|
goto skipaddr;
|
|
|
|
|
|
|
|
inet_ntoa_r(*(struct in_addr *) &hashkey[2], daddr);
|
|
|
|
if (ft->ft_flags & FL_HASH_ALL) {
|
|
|
|
inet_ntoa_r(*(struct in_addr *) &hashkey[1], saddr);
|
|
|
|
sport = ntohs(((uint16_t *)hashkey)[0]);
|
|
|
|
dport = ntohs(((uint16_t *)hashkey)[1]);
|
|
|
|
db_printf("%s:%d->%s:%d",
|
|
|
|
saddr, sport, daddr,
|
|
|
|
dport);
|
|
|
|
} else
|
|
|
|
db_printf("%s ", daddr);
|
|
|
|
|
|
|
|
skipaddr:
|
2009-08-18 20:28:58 +00:00
|
|
|
if (fle->f_flags & FL_STALE)
|
|
|
|
db_printf(" FL_STALE ");
|
2010-03-12 05:03:26 +00:00
|
|
|
if (fle->f_flags & FL_TCP)
|
|
|
|
db_printf(" FL_TCP ");
|
|
|
|
if (fle->f_flags & FL_UDP)
|
|
|
|
db_printf(" FL_UDP ");
|
|
|
|
if (rt_valid) {
|
|
|
|
if (rt->rt_flags & RTF_UP)
|
|
|
|
db_printf(" RTF_UP ");
|
|
|
|
}
|
|
|
|
if (ifp_valid) {
|
|
|
|
if (ifp->if_flags & IFF_LOOPBACK)
|
|
|
|
db_printf(" IFF_LOOPBACK ");
|
|
|
|
if (ifp->if_flags & IFF_UP)
|
|
|
|
db_printf(" IFF_UP ");
|
|
|
|
if (ifp->if_flags & IFF_POINTOPOINT)
|
|
|
|
db_printf(" IFF_POINTOPOINT ");
|
|
|
|
}
|
|
|
|
if (fle->f_flags & FL_IPV6)
|
|
|
|
db_printf("\n\tkey=%08x:%08x:%08x%08x:%08x:%08x%08x:%08x:%08x",
|
|
|
|
hashkey[0], hashkey[1], hashkey[2],
|
|
|
|
hashkey[3], hashkey[4], hashkey[5],
|
|
|
|
hashkey[6], hashkey[7], hashkey[8]);
|
|
|
|
else
|
|
|
|
db_printf("\n\tkey=%08x:%08x:%08x ",
|
|
|
|
hashkey[0], hashkey[1], hashkey[2]);
|
|
|
|
db_printf("hash=%08x idle_time=%03d"
|
|
|
|
"\n\tfibnum=%02d rt=%p",
|
|
|
|
fle->f_fhash, idle_time, fle->f_fibnum, fle->f_rt);
|
2009-08-18 20:28:58 +00:00
|
|
|
db_printf("\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
flowtable_show(struct flowtable *ft, int cpuid)
|
|
|
|
{
|
|
|
|
int curbit = 0;
|
|
|
|
struct flentry *fle, **flehead;
|
|
|
|
bitstr_t *mask, *tmpmask;
|
|
|
|
|
2010-03-12 05:03:26 +00:00
|
|
|
if (cpuid != -1)
|
|
|
|
db_printf("cpu: %d\n", cpuid);
|
2009-08-18 20:28:58 +00:00
|
|
|
mask = flowtable_mask_pcpu(ft, cpuid);
|
|
|
|
tmpmask = ft->ft_tmpmask;
|
|
|
|
memcpy(tmpmask, mask, ft->ft_size/8);
|
|
|
|
/*
|
|
|
|
* XXX Note to self, bit_ffs operates at the byte level
|
|
|
|
* and thus adds gratuitous overhead
|
|
|
|
*/
|
|
|
|
bit_ffs(tmpmask, ft->ft_size, &curbit);
|
|
|
|
while (curbit != -1) {
|
|
|
|
if (curbit >= ft->ft_size || curbit < -1) {
|
|
|
|
db_printf("warning: bad curbit value %d \n",
|
|
|
|
curbit);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
flehead = flowtable_entry_pcpu(ft, curbit, cpuid);
|
|
|
|
fle = *flehead;
|
|
|
|
|
|
|
|
while (fle != NULL) {
|
|
|
|
flow_show(ft, fle);
|
|
|
|
fle = fle->f_next;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
bit_clear(tmpmask, curbit);
|
|
|
|
bit_ffs(tmpmask, ft->ft_size, &curbit);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
flowtable_show_vnet(void)
|
|
|
|
{
|
|
|
|
struct flowtable *ft;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
ft = V_flow_list_head;
|
|
|
|
while (ft != NULL) {
|
2010-03-12 05:03:26 +00:00
|
|
|
printf("name: %s\n", ft->ft_name);
|
2009-08-18 20:28:58 +00:00
|
|
|
if (ft->ft_flags & FL_PCPU) {
|
2010-06-11 18:46:34 +00:00
|
|
|
CPU_FOREACH(i) {
|
2009-08-18 20:28:58 +00:00
|
|
|
flowtable_show(ft, i);
|
|
|
|
}
|
|
|
|
} else {
|
2010-03-12 05:03:26 +00:00
|
|
|
flowtable_show(ft, -1);
|
2009-08-18 20:28:58 +00:00
|
|
|
}
|
|
|
|
ft = ft->ft_next;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
DB_SHOW_COMMAND(flowtables, db_show_flowtables)
|
|
|
|
{
|
|
|
|
VNET_ITERATOR_DECL(vnet_iter);
|
|
|
|
|
|
|
|
VNET_FOREACH(vnet_iter) {
|
|
|
|
CURVNET_SET(vnet_iter);
|
|
|
|
flowtable_show_vnet();
|
|
|
|
CURVNET_RESTORE();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|