Revision tags: v6.2.1, v6.2.0, v6.3.0, v6.0.1, v6.0.0, v6.0.0rc1, v6.1.0, v5.8.3, v5.8.2, v5.8.1, v5.8.0, v5.9.0, v5.8.0rc1, v5.6.3, v5.6.2, v5.6.1, v5.6.0, v5.6.0rc1, v5.7.0, v5.4.3, v5.4.2, v5.4.1, v5.4.0, v5.5.0, v5.4.0rc1 |
|
#
d15093b9 |
| 09-Aug-2018 |
Aaron LI <aly@aaronly.me> |
Revert "pf: Allow disappearing or not yet existing interfaces for ALTQ"
This reverts commit 0a887f91f9633448c99b9a5b7c6116a0a22d25d6.
1. It's incorrect to change the ifnet_unlock(). The original p
Revert "pf: Allow disappearing or not yet existing interfaces for ALTQ"
This reverts commit 0a887f91f9633448c99b9a5b7c6116a0a22d25d6.
1. It's incorrect to change the ifnet_unlock(). The original protection range is used to make sure that the ifp does not get ripped out behind our back.
2. We don't suffer from the issue that that commit was intended to fix.
Thanks-to: sephe
show more ...
|
#
0a887f91 |
| 16-Jun-2018 |
Aaron LI <aly@aaronly.me> |
pf: Allow disappearing or not yet existing interfaces for ALTQ
Make ALTQ cope with disappearing interfaces (particularly common with net/mpd4 and netgraph in general). This also allows to add queue
pf: Allow disappearing or not yet existing interfaces for ALTQ
Make ALTQ cope with disappearing interfaces (particularly common with net/mpd4 and netgraph in general). This also allows to add queues for an interface that is not yet existing, however, you have to provide the bandwidth for the interface.
Meanwhile, simplify the ifnet_unlock() calls for ifunit() use.
Taken-from: FreeBSD (r177700)
show more ...
|
Revision tags: v5.2.2, v5.2.1, v5.2.0, v5.3.0, v5.2.0rc, v5.0.2, v5.0.1, v5.0.0, v5.0.0rc2, v5.1.0, v5.0.0rc1, v4.8.1, v4.8.0, v4.6.2, v4.9.0, v4.8.0rc, v4.6.1, v4.6.0, v4.6.0rc2, v4.6.0rc, v4.7.0, v4.4.3, v4.4.2, v4.4.1, v4.4.0, v4.5.0, v4.4.0rc, v4.2.4, v4.3.1, v4.2.3, v4.2.1, v4.2.0, v4.0.6, v4.3.0, v4.2.0rc, v4.0.5, v4.0.4, v4.0.3, v4.0.2, v4.0.1, v4.0.0, v4.0.0rc3, v4.0.0rc2, v4.0.0rc, v4.1.0, v3.8.2 |
|
#
a14160bc |
| 19-Jul-2014 |
Matthew Dillon <dillon@apollo.backplane.com> |
kernel - Revert "Fix buildworld."
* Fix PF in a different way, by conditionalizing the inclusion of struct pf_state instead of conditionalizing all the use cases for pfvar.h.
* This reverts com
kernel - Revert "Fix buildworld."
* Fix PF in a different way, by conditionalizing the inclusion of struct pf_state instead of conditionalizing all the use cases for pfvar.h.
* This reverts commit 56e2aaa4d1de560d06f713866ab834747982f839.
* Reorders pfvar.h a bit and conditionalizes struct pf_state { }.
show more ...
|
#
56e2aaa4 |
| 29-Jun-2014 |
Sascha Wildner <saw@online.de> |
Fix buildworld.
Due to adding a struct lock to struct pf_state in one of the recent pf(4) commits, we have to define _KERNEL_STRUCTURES in everything which includes pfvar.h.
|
Revision tags: v3.8.1, v3.6.3, v3.8.0, v3.8.0rc2, v3.9.0, v3.8.0rc, v3.6.2, v3.6.1, v3.6.0, v3.7.1, v3.6.0rc, v3.7.0, v3.4.3, v3.4.2, v3.4.0, v3.4.1, v3.4.0rc, v3.5.0, v3.2.2, v3.2.1, v3.2.0, v3.3.0, v3.0.3, v3.0.2, v3.0.1, v3.1.0, v3.0.0 |
|
#
86d7f5d3 |
| 26-Nov-2011 |
John Marino <draco@marino.st> |
Initial import of binutils 2.22 on the new vendor branch
Future versions of binutils will also reside on this branch rather than continuing to create new binutils branches for each new version.
|
Revision tags: v2.12.0, v2.13.0, v2.10.1, v2.11.0, v2.10.0, v2.9.1, v2.8.2, v2.8.1, v2.8.0, v2.9.0, v2.6.3, v2.7.3, v2.6.2, v2.7.2, v2.7.1, v2.6.1, v2.7.0, v2.6.0, v2.5.1, v2.4.1, v2.5.0, v2.4.0, v2.3.2, v2.3.1, v2.2.1, v2.2.0, v2.3.0, v2.1.1, v2.0.1 |
|
#
5950bf01 |
| 06-Apr-2008 |
Matthew Dillon <dillon@dragonflybsd.org> |
Add fairq to altq. Fairq is a fair queueing algorithm with bandwidth prioritization and a bandwidth delimiter (hogs) to allow low bandwidth buckets to jump the round robin. This fairq algorithm is
Add fairq to altq. Fairq is a fair queueing algorithm with bandwidth prioritization and a bandwidth delimiter (hogs) to allow low bandwidth buckets to jump the round robin. This fairq algorithm is currently unweighted but traffic can still be classified with the global priority model. For each queue traffic is normally round robined by taking a packet from each bucket in turn.
This feature is primarily intended for edge routers and egress points with bandwidth constrictions.
* Hogs feature allows low bandwidth buckets to burst. Low bandwidth can mean, e.g. an interactive shell or even simply ack traffic, without the need to explicitly classify it. Bandwidth is managed on a per-bucket basis.
* Prioritization feature allows minimum guaranteed bandwidths based on service classifications. e.g. VOIP, web, mail, PtP, etc.
* Weighted fairq not implemented (beyond using classification into priority queues), but the circular bucket design makes it a fairly easy task if someone wants to do it.
* Add ALTQ_MBUF_STATE_HASHED and generate a hash of the connection state in the mbuf header for any packet that you have set 'keep state' for in pf. This is done in PF and is needed by fairq to bucketize 'connections'.
* Add the fairq implementation and a new ALTQ_FAIRQ kernel build option.
* Simple example included below.
ports="{ 25, 80 }" altq on vke0 fairq bandwidth 500Kb queue { normal, bulk } queue bulk priority 1 bandwidth 100Kb \ fairq(buckets 64, hogs 25Kb) qlimit 50 queue normal priority 2 bandwidth 400Kb \ fairq(buckets 64, hogs 25Kb, default) qlimit 50
pass out on vke0 inet proto tcp from any to any \ keep state queue normal pass out on vke0 inet proto tcp from any to any port $ports \ keep state queue bulk
show more ...
|
#
a798b49f |
| 11-Feb-2005 |
Joerg Sonnenberger <joerg@dragonflybsd.org> |
Add ALTQ support to pfctl(8). Fix a small bug introduced earlier in the HTONL --> htonl conversion.
|
#
95cc27f0 |
| 21-Sep-2004 |
Joerg Sonnenberger <joerg@dragonflybsd.org> |
Uesrland part of PF
Obtained-from: OpenBSD Ported-by: Devon O'Dell and Simon 'corecode' Schubert
Additioncally, do a pass over the code to get it WARNS=6 clean. This means mostly fixing const'ness
Uesrland part of PF
Obtained-from: OpenBSD Ported-by: Devon O'Dell and Simon 'corecode' Schubert
Additioncally, do a pass over the code to get it WARNS=6 clean. This means mostly fixing const'ness of strings and cleanup sign/unsigned comparisions. The warnings in authpf about unused arguments have been removed by use of __unused.
show more ...
|
#
ed1f0be2 |
| 11-Oct-2010 |
Jan Lentfer <Jan.Lentfer@web.de> |
pf: Update packetfilter to OpenBSD 4.4
* As correct pf function depends directly on pfsync now compile if_pfsyn.c into pf.ko. pflog is already part of pf.ko.
* A
pf: Update packetfilter to OpenBSD 4.4
* As correct pf function depends directly on pfsync now compile if_pfsyn.c into pf.ko. pflog is already part of pf.ko.
* Activate pfsync function by default. It's not a kernel option anymore, but pfsync is very unlikley to work. Anyway our ifconfig is missing all pfsync related options. I will try to make pfsync working again after upgrading to pf from OpenBSD 4.5 as pfsync changes completley then and is not compatible anymore with prior versions.
* Also make the module unloading sane in if_pflog.c
Thanks to Alex Hornung and Aggelos Economopoulos for debugging.
show more ...
|
#
70224baa |
| 08-Aug-2010 |
Jan Lentfer <Jan.Lentfer@web.de> |
pf: Update packet filter to the version that comes with OpenBSD 4.1
The original OpenBSD 4.1 defaults to "keep state flags S/SA" for all pass rules. In contrast to that we default to "no sta
pf: Update packet filter to the version that comes with OpenBSD 4.1
The original OpenBSD 4.1 defaults to "keep state flags S/SA" for all pass rules. In contrast to that we default to "no state". As in earlier verions of pf in DragonFly the default keep-state policy can still be set with the keep-policy option (e.g. "set keep-policy keep state (pickups)").
DragonFly additions to pf have been kept: fairq support, pickups.
Detailed Info on changes/additions: * ALTQ: Fix altq to work with pf_mtag Patch by Matthew Dillon * libkern: Revert commit e104539 strchr was added to libkern.h together with strrch * net/if.h: add interface groups Imported from FreeBSD. * netinet6/in6.h: add macros IN6_IS_ADDR_MC_INTFACELOCAL IN6_IS_SCOPE_EMBED PV6_ADDR_SCOPE_INTFACELOCAL * sys/libkern.h: Add strchr and strrchr as inline functions Brought in from FreeBSD * sys/net/if_var.h: Import interface groups Import interface groups and event handlers from FreeBSD * sys/net/if_var.h: add if_pf_kif, if_groups to struct ifnet obtained from: Open/FreeBSD * net/if_types.h: add IFT_ENC to non-IATA-assignments obtained from Open/FreeBSD * net/bpf.c: add bpf_mtap_hdr from OpenBSD Con up a minimal dummy header to pacify bpf. Allocate (only) a struct m_hdr on the stack.
show more ...
|