History log of /dragonfly/usr.sbin/pfctl/pfctl_qstats.c (Results 1 – 10 of 10)
Revision (<<< Hide revision tags) (Show revision tags >>>) Date Author Comments
Revision tags: v6.2.1, v6.2.0, v6.3.0, v6.0.1, v6.0.0, v6.0.0rc1, v6.1.0, v5.8.3, v5.8.2, v5.8.1, v5.8.0, v5.9.0, v5.8.0rc1, v5.6.3, v5.6.2, v5.6.1, v5.6.0, v5.6.0rc1, v5.7.0, v5.4.3, v5.4.2, v5.4.1, v5.4.0, v5.5.0, v5.4.0rc1
# d15093b9 09-Aug-2018 Aaron LI <aly@aaronly.me>

Revert "pf: Allow disappearing or not yet existing interfaces for ALTQ"

This reverts commit 0a887f91f9633448c99b9a5b7c6116a0a22d25d6.

1. It's incorrect to change the ifnet_unlock(). The original p

Revert "pf: Allow disappearing or not yet existing interfaces for ALTQ"

This reverts commit 0a887f91f9633448c99b9a5b7c6116a0a22d25d6.

1. It's incorrect to change the ifnet_unlock(). The original protection
range is used to make sure that the ifp does not get ripped out behind
our back.

2. We don't suffer from the issue that that commit was intended to fix.

Thanks-to: sephe

show more ...


# 0a887f91 16-Jun-2018 Aaron LI <aly@aaronly.me>

pf: Allow disappearing or not yet existing interfaces for ALTQ

Make ALTQ cope with disappearing interfaces (particularly common with
net/mpd4 and netgraph in general). This also allows to add queue

pf: Allow disappearing or not yet existing interfaces for ALTQ

Make ALTQ cope with disappearing interfaces (particularly common with
net/mpd4 and netgraph in general). This also allows to add queues for
an interface that is not yet existing, however, you have to provide
the bandwidth for the interface.

Meanwhile, simplify the ifnet_unlock() calls for ifunit() use.

Taken-from: FreeBSD (r177700)

show more ...


Revision tags: v5.2.2, v5.2.1, v5.2.0, v5.3.0, v5.2.0rc, v5.0.2, v5.0.1, v5.0.0, v5.0.0rc2, v5.1.0, v5.0.0rc1, v4.8.1, v4.8.0, v4.6.2, v4.9.0, v4.8.0rc, v4.6.1, v4.6.0, v4.6.0rc2, v4.6.0rc, v4.7.0, v4.4.3, v4.4.2, v4.4.1, v4.4.0, v4.5.0, v4.4.0rc, v4.2.4, v4.3.1, v4.2.3, v4.2.1, v4.2.0, v4.0.6, v4.3.0, v4.2.0rc, v4.0.5, v4.0.4, v4.0.3, v4.0.2, v4.0.1, v4.0.0, v4.0.0rc3, v4.0.0rc2, v4.0.0rc, v4.1.0, v3.8.2
# a14160bc 19-Jul-2014 Matthew Dillon <dillon@apollo.backplane.com>

kernel - Revert "Fix buildworld."

* Fix PF in a different way, by conditionalizing the inclusion of
struct pf_state instead of conditionalizing all the use cases for
pfvar.h.

* This reverts com

kernel - Revert "Fix buildworld."

* Fix PF in a different way, by conditionalizing the inclusion of
struct pf_state instead of conditionalizing all the use cases for
pfvar.h.

* This reverts commit 56e2aaa4d1de560d06f713866ab834747982f839.

* Reorders pfvar.h a bit and conditionalizes struct pf_state { }.

show more ...


# 56e2aaa4 29-Jun-2014 Sascha Wildner <saw@online.de>

Fix buildworld.

Due to adding a struct lock to struct pf_state in one of the recent
pf(4) commits, we have to define _KERNEL_STRUCTURES in everything
which includes pfvar.h.


Revision tags: v3.8.1, v3.6.3, v3.8.0, v3.8.0rc2, v3.9.0, v3.8.0rc, v3.6.2, v3.6.1, v3.6.0, v3.7.1, v3.6.0rc, v3.7.0, v3.4.3, v3.4.2, v3.4.0, v3.4.1, v3.4.0rc, v3.5.0, v3.2.2, v3.2.1, v3.2.0, v3.3.0, v3.0.3, v3.0.2, v3.0.1, v3.1.0, v3.0.0
# 86d7f5d3 26-Nov-2011 John Marino <draco@marino.st>

Initial import of binutils 2.22 on the new vendor branch

Future versions of binutils will also reside on this branch rather
than continuing to create new binutils branches for each new version.


Revision tags: v2.12.0, v2.13.0, v2.10.1, v2.11.0, v2.10.0, v2.9.1, v2.8.2, v2.8.1, v2.8.0, v2.9.0, v2.6.3, v2.7.3, v2.6.2, v2.7.2, v2.7.1, v2.6.1, v2.7.0, v2.6.0, v2.5.1, v2.4.1, v2.5.0, v2.4.0, v2.3.2, v2.3.1, v2.2.1, v2.2.0, v2.3.0, v2.1.1, v2.0.1
# 5950bf01 06-Apr-2008 Matthew Dillon <dillon@dragonflybsd.org>

Add fairq to altq. Fairq is a fair queueing algorithm with bandwidth
prioritization and a bandwidth delimiter (hogs) to allow low bandwidth
buckets to jump the round robin. This fairq algorithm is

Add fairq to altq. Fairq is a fair queueing algorithm with bandwidth
prioritization and a bandwidth delimiter (hogs) to allow low bandwidth
buckets to jump the round robin. This fairq algorithm is currently unweighted
but traffic can still be classified with the global priority model. For
each queue traffic is normally round robined by taking a packet from each
bucket in turn.

This feature is primarily intended for edge routers and egress points with
bandwidth constrictions.

* Hogs feature allows low bandwidth buckets to burst. Low bandwidth can
mean, e.g. an interactive shell or even simply ack traffic, without
the need to explicitly classify it. Bandwidth is managed on a per-bucket
basis.

* Prioritization feature allows minimum guaranteed bandwidths based on
service classifications. e.g. VOIP, web, mail, PtP, etc.

* Weighted fairq not implemented (beyond using classification into priority
queues), but the circular bucket design makes it a fairly easy task if
someone wants to do it.

* Add ALTQ_MBUF_STATE_HASHED and generate a hash of the connection state
in the mbuf header for any packet that you have set 'keep state' for
in pf. This is done in PF and is needed by fairq to bucketize
'connections'.

* Add the fairq implementation and a new ALTQ_FAIRQ kernel build option.

* Simple example included below.

ports="{ 25, 80 }"
altq on vke0 fairq bandwidth 500Kb queue { normal, bulk }
queue bulk priority 1 bandwidth 100Kb \
fairq(buckets 64, hogs 25Kb) qlimit 50
queue normal priority 2 bandwidth 400Kb \
fairq(buckets 64, hogs 25Kb, default) qlimit 50

pass out on vke0 inet proto tcp from any to any \
keep state queue normal
pass out on vke0 inet proto tcp from any to any port $ports \
keep state queue bulk

show more ...


# a798b49f 11-Feb-2005 Joerg Sonnenberger <joerg@dragonflybsd.org>

Add ALTQ support to pfctl(8). Fix a small bug introduced earlier
in the HTONL --> htonl conversion.


# 95cc27f0 21-Sep-2004 Joerg Sonnenberger <joerg@dragonflybsd.org>

Uesrland part of PF

Obtained-from: OpenBSD
Ported-by: Devon O'Dell and Simon 'corecode' Schubert

Additioncally, do a pass over the code to get it WARNS=6 clean.
This means mostly fixing const'ness

Uesrland part of PF

Obtained-from: OpenBSD
Ported-by: Devon O'Dell and Simon 'corecode' Schubert

Additioncally, do a pass over the code to get it WARNS=6 clean.
This means mostly fixing const'ness of strings and cleanup sign/unsigned
comparisions. The warnings in authpf about unused arguments have been
removed by use of __unused.

show more ...


# ed1f0be2 11-Oct-2010 Jan Lentfer <Jan.Lentfer@web.de>

pf: Update packetfilter to OpenBSD 4.4

* As correct pf function depends directly on pfsync now
compile if_pfsyn.c into pf.ko. pflog is already part
of pf.ko.

* A

pf: Update packetfilter to OpenBSD 4.4

* As correct pf function depends directly on pfsync now
compile if_pfsyn.c into pf.ko. pflog is already part
of pf.ko.

* Activate pfsync function by default. It's not a kernel
option anymore, but pfsync is very unlikley to work.
Anyway our ifconfig is missing all pfsync related options.
I will try to make pfsync working again after upgrading to
pf from OpenBSD 4.5 as pfsync changes completley then
and is not compatible anymore with prior versions.

* Also make the module unloading sane in if_pflog.c

Thanks to Alex Hornung and Aggelos Economopoulos for debugging.

show more ...


# 70224baa 08-Aug-2010 Jan Lentfer <Jan.Lentfer@web.de>

pf: Update packet filter to the version that comes with OpenBSD 4.1

The original OpenBSD 4.1 defaults to "keep state flags S/SA" for
all pass rules. In contrast to that we default to "no sta

pf: Update packet filter to the version that comes with OpenBSD 4.1

The original OpenBSD 4.1 defaults to "keep state flags S/SA" for
all pass rules. In contrast to that we default to "no state". As
in earlier verions of pf in DragonFly the default keep-state
policy can still be set with the keep-policy option (e.g. "set
keep-policy keep state (pickups)").

DragonFly additions to pf have been kept: fairq support,
pickups.

Detailed Info on changes/additions:
* ALTQ: Fix altq to work with pf_mtag
Patch by Matthew Dillon
* libkern: Revert commit e104539
strchr was added to libkern.h together with strrch
* net/if.h: add interface groups
Imported from FreeBSD.
* netinet6/in6.h: add macros
IN6_IS_ADDR_MC_INTFACELOCAL
IN6_IS_SCOPE_EMBED
PV6_ADDR_SCOPE_INTFACELOCAL
* sys/libkern.h: Add strchr and strrchr as inline functions
Brought in from FreeBSD
* sys/net/if_var.h: Import interface groups
Import interface groups and event handlers from FreeBSD
* sys/net/if_var.h: add if_pf_kif, if_groups to struct ifnet
obtained from: Open/FreeBSD
* net/if_types.h: add IFT_ENC to non-IATA-assignments
obtained from Open/FreeBSD
* net/bpf.c: add bpf_mtap_hdr from OpenBSD
Con up a minimal dummy header to pacify bpf. Allocate
(only) a struct m_hdr on the stack.

show more ...