Home | History | Annotate | only in /src/sys/rump/librump/rumpnet
History log of /src/sys/rump/librump/rumpnet
RevisionDateAuthorComments
 1.1 15-Oct-2008  pooka branches: 1.1.2; 1.1.10; 1.1.16;
Add the basic rump networking library, which provides e.g. sockets
and mbufs. This is required by all network-using rump applications.
 1.1.16.2 04-May-2009  yamt sync with head.
 1.1.16.1 15-Oct-2008  yamt file Makefile was added on branch yamt-nfs-mp on 2009-05-04 08:14:30 +0000
 1.1.10.2 17-Jan-2009  mjf Sync with HEAD.
 1.1.10.1 15-Oct-2008  mjf file Makefile was added on branch mjf-devfs2 on 2009-01-17 13:29:37 +0000
 1.1.2.2 19-Oct-2008  haad Sync with HEAD.
 1.1.2.1 15-Oct-2008  haad file Makefile was added on branch haad-dm on 2008-10-19 22:18:07 +0000
 1.25 03-Sep-2022  mlelstv netisr.c is gone.
 1.24 11-Oct-2021  knakahara Make pktq_rps_hash() pluggable for each interface type. Reviewed by gdt@n.o, thorpej@n.o, and riastradh@n.o, thanks.
 1.23 15-Nov-2018  maxv Merge uipc_mbuf2.c into uipc_mbuf.c. Reorder the latter a little to gather
similar functions. No functional change.
 1.22 14-Apr-2017  ozaki-r branches: 1.22.10; 1.22.12;
Rumpify netipsec

Note that we should modularize netipsec and reduce reverse symbol references
(referencing symbols of netipsec from net, netinet and netinet6) though,
the task needs lots of code changes. Prior to doing so, rumpifying it and
having ATF tests should be useful.
 1.21 02-Feb-2017  ozaki-r Defer some pr_input to workqueue

pr_input is currently called in softint. Some pr_input such as ICMP, ICMPv6
and CARP can add/delete/update IP addresses and routing table entries. For
example, icmp6_redirect_input updates an a routing table entry and
nd6_ra_input may delete an IP address.

Basically such operations shouldn't be done in softint. That aside, we have
a reason to avoid the situation; psz/psref waits cannot be used in softint,
however they are required to work in such pr_input in the MP-safe world.

The change implements the workqueue pr_input framework called wqinput which
provides a means to defer pr_input of a protocol to workqueue easily.
Currently icmp_input, icmp6_input, carp_proto_input and carp6_proto_input
are deferred to workqueue by the framework.

Proposed and discussed on tech-kern and tech-net
 1.20 17-Jan-2017  ozaki-r Fix build (undefined reference to `rumpns_pfil_init' on usr.sbin/puffs/rump_nfs)
 1.19 19-Oct-2015  pooka branches: 1.19.2; 1.19.4;
Add a COMMENT describing what each component roughly does.

"make describe" prints the comment.

Requested/inspired by Vincent Schwarzer on rumpkernel-users
 1.18 24-Aug-2015  pooka remove librump/rumpnet/opt, consolidate in rump/include/opt
 1.17 03-Dec-2014  christos add printers.
 1.16 02-Dec-2014  pooka Remove shlib_version files and just use Makefile SHLIB_MAJOR/MINOR,
with the default provided by Makefile.rump (they're all 0.0 anyway)
 1.15 05-Jun-2014  rmind branches: 1.15.4;
- Implement pktqueue interface for lockless IP input queue.
- Replace ipintrq and ip6intrq with the pktqueue mechanism.
- Eliminate kernel-lock from ipintr() and ip6intr().
- Some preparation work to push softnet_lock out of ipintr().

Discussed on tech-net.
 1.14 27-Apr-2014  pooka Eliminate weak symbols from rump kernel syscall handlers, part 7:

Build component constructors which establish syscalls at boottime.
 1.13 15-Mar-2013  pooka branches: 1.13.6; 1.13.10;
Allow Makefile.rump to append to SRCS.
 1.12 31-Mar-2011  dyoung branches: 1.12.4; 1.12.14;
Hide the radix-trie implementation of the forwarding table so that we
will have an easier time replacing it with something different, even if
it is a second radix-trie implementation.

sys/net/route.c and sys/net/rtsock.c no longer operate directly on
radix_nodes or radix_node_heads.

Hopefully this will reduce the temptation to implement multipath or
source-based routing using grotty hacks to the grotty old radix-trie
code, too. :-)
 1.11 01-Feb-2011  matt Add a new AF/PF_ROUTE which is 64-bit clean which makes the routing socket
interface (and its associated sysctls) act identically for both 32 and 64 bit
programs. The old unclean one remains for backward compatibility.
 1.10 19-Jan-2010  pooka branches: 1.10.4; 1.10.6; 1.10.8;
Redefine bpf linkage through an always present op vector, i.e.
#if NBPFILTER is no longer required in the client. This change
doesn't yet add support for loading bpf as a module, since drivers
can register before bpf is attached. However, callers of bpf can
now be modularized.

Dynamically loadable bpf could probably be done fairly easily with
coordination from the stub driver and the real driver by registering
attachments in the stub before the real driver is loaded and doing
a handoff. ... and I'm not going to ponder the depths of unload
here.

Tested with i386/MONOLITHIC, modified MONOLITHIC without bpf and rump.
 1.9 16-Oct-2009  pooka We have real pollsuck() now, so remove this, ahem, less-than-perfect one.
(XXX: only thing in the kernel using pollsuck is netsmb)
 1.8 14-Oct-2009  pooka Adjust rump sources for external/internal interfaces.
No functional change.
 1.7 06-Sep-2009  pooka add a very simple version of pollsock()
XXX: it seems to exist purely for the pleasure of netsmb??
 1.6 10-Jun-2009  pooka MAXUSERS comes from Makefile.rump
 1.5 10-Jun-2009  pooka libkern is fully included in rumpkern, no need for cherry-picking
modules elsewhere.
 1.4 23-Jan-2009  pooka branches: 1.4.2; 1.4.4;
include rtsock_50.c
 1.3 25-Nov-2008  pooka branches: 1.3.4;
fix comment (no functional change)
 1.2 25-Nov-2008  pooka Heave-ho radix.c from librumpnet_net to librumpnet.
 1.1 15-Oct-2008  pooka branches: 1.1.2; 1.1.4;
Add the basic rump networking library, which provides e.g. sockets
and mbufs. This is required by all network-using rump applications.
 1.1.4.2 03-Mar-2009  skrll Sync with HEAD.
 1.1.4.1 19-Jan-2009  skrll Sync with HEAD.
 1.1.2.3 13-Dec-2008  haad Update haad-dm branch to haad-dm-base2.
 1.1.2.2 19-Oct-2008  haad Sync with HEAD.
 1.1.2.1 15-Oct-2008  haad file Makefile.rumpnet was added on branch haad-dm on 2008-10-19 22:18:07 +0000
 1.3.4.2 17-Jan-2009  mjf Sync with HEAD.
 1.3.4.1 25-Nov-2008  mjf file Makefile.rumpnet was added on branch mjf-devfs2 on 2009-01-17 13:29:37 +0000
 1.4.4.5 11-Mar-2010  yamt sync with head
 1.4.4.4 16-Sep-2009  yamt sync with head
 1.4.4.3 20-Jun-2009  yamt sync with head
 1.4.4.2 04-May-2009  yamt sync with head.
 1.4.4.1 23-Jan-2009  yamt file Makefile.rumpnet was added on branch yamt-nfs-mp on 2009-05-04 08:14:30 +0000
 1.4.2.1 23-Jul-2009  jym Sync with HEAD.
 1.10.8.1 08-Feb-2011  bouyer Sync with HEAD
 1.10.6.1 06-Jun-2011  jruoho Sync with HEAD.
 1.10.4.2 21-Apr-2011  rmind sync with head
 1.10.4.1 05-Mar-2011  rmind sync with head
 1.12.14.3 03-Dec-2017  jdolecek update from HEAD
 1.12.14.2 20-Aug-2014  tls Rebase to HEAD as of a few days ago.
 1.12.14.1 23-Jun-2013  tls resync from head
 1.12.4.1 22-May-2014  yamt sync with head.

for a reference, the tree before this commit was tagged
as yamt-pagecache-tag8.

this commit was splitted into small chunks to avoid
a limitation of cvs. ("Protocol error: too many arguments")
 1.13.10.1 10-Aug-2014  tls Rebase.
 1.13.6.1 18-May-2014  rmind sync with head
 1.15.4.5 28-Aug-2017  skrll Sync with HEAD
 1.15.4.4 05-Feb-2017  skrll Sync with HEAD
 1.15.4.3 27-Dec-2015  skrll Sync with HEAD (as of 26th Dec)
 1.15.4.2 22-Sep-2015  skrll Sync with HEAD
 1.15.4.1 06-Apr-2015  skrll Sync with HEAD
 1.19.4.1 21-Apr-2017  bouyer Sync with HEAD
 1.19.2.2 26-Apr-2017  pgoyette Sync with HEAD
 1.19.2.1 20-Mar-2017  pgoyette Sync with HEAD
 1.22.12.1 10-Jun-2019  christos Sync with HEAD
 1.22.10.1 26-Nov-2018  pgoyette Sync with HEAD, resolve a couple of conflicts
 1.2 16-Oct-2009  pooka We have real pollsuck() now, so remove this, ahem, less-than-perfect one.
(XXX: only thing in the kernel using pollsuck is netsmb)
 1.1 06-Sep-2009  pooka branches: 1.1.2;
add a very simple version of pollsock()
XXX: it seems to exist purely for the pleasure of netsmb??
 1.1.2.3 11-Mar-2010  yamt sync with head
 1.1.2.2 16-Sep-2009  yamt sync with head
 1.1.2.1 06-Sep-2009  yamt file net_emul.c was added on branch yamt-nfs-mp on 2009-09-16 13:38:05 +0000
 1.49 04-Apr-2022  yamaguchi Move input processing of lagg(4) before ether_input
to get rid of dependence.

This implementation is similar with that of bridge(4).
 1.48 30-Sep-2021  yamaguchi vlan: Register vlan_ifdetach to ether_ifdetach hook
 1.47 30-Sep-2021  yamaguchi bridge: Register bridge_ifdetach to ether_ifdetach hook
 1.46 30-Sep-2021  yamaguchi vlan: Register the callback to update link-state of vlan I/F
to link-state change hook

The callback is registered in every vlan I/F even if the parent
interface is the same. Therefore it is not needed to search the
vlan I/F by the parent interface unlike the previous callback.
 1.45 30-Sep-2021  yamaguchi lagg: Register lagg_linkstate_changed to link-state change hook
 1.44 30-Sep-2021  yamaguchi bridge: Register bridge_calc_link_state to link-state change hook
 1.43 14-Jul-2021  ozaki-r Rump-ify ALTQ (librumpnet_altq.so)
 1.42 17-May-2021  yamaguchi Add a new link-aggregation pseudo interface named lagg(4)

- FreeBSD's lagg(4) based implementation
- MP-safe and MP-scalable
 1.41 06-Nov-2020  christos branches: 1.41.4; 1.41.6;
PR/55777: Ruslan Nikolaev: Move the unp_sysctl_create to uipc_usrreq.c to
facilitate splitting rump modules and does not require a dummy function.
 1.40 27-Sep-2020  roy branches: 1.40.2;
rump: Add weak alias for bridge_calc_link_state
 1.39 27-Sep-2020  roy rump: Try to fix build
 1.38 28-Aug-2020  ozaki-r ipsec: rename ipsec_ip_input to ipsec_ip_input_checkpolicy

Because it just checks if a packet passes security policies.
 1.37 12-Dec-2018  rin PR kern/53562

Handle TX offload in software when a packet is sent via
bridge_output(). We can send it as is in the following
exceptional cases:

For unicast:

(1) When the destination interface is the same as source.

(2) When the destination supports all TX offload options
specified in a packet.

For multicast/broadcast:

(3) When all the members of the bridge support the specified
TX offload options.

For (3), add sc_csum_flags_tx flag to bridge softc, which is
logical AND b/w capabilities of TX offload options in member
interface (ifp->if_csum_flags_tx). The flag is updated when a
member is (i) added to or (ii) removed from a bridge, or (iii)
if_csum_flags_tx flag of a member interface is manipulated via
ifconfig(8).

Turn on M_CSUM_TSOv[46] bit in ifp->if_csum_flags_tx flag when
TSO[46] is enabled for that interface.

OK msaitoh thorpej
 1.36 14-May-2018  maxv branches: 1.36.2;
Merge ipsec4_input and ipsec6_input into ipsec_ip_input. Make the argument
a bool for clarity. Optimize the function: if M_CANFASTFWD is not there
(because already removed by the firewall) leave now.

Makes it easier to see that M_CANFASTFWD is not removed on IPv6.
 1.35 10-May-2018  maxv Rename ipsec4_forward -> ipsec_mtu, and switch to void.
 1.34 05-May-2018  christos add an empty stub
 1.33 28-Apr-2018  maxv Stop using a macro, rename the function to ipsec_init_pcbpolicy directly.
 1.32 12-Apr-2018  christos remove now unused crap.
 1.31 27-Feb-2018  maxv branches: 1.31.2;
Dedup: merge ipsec4_set_policy and ipsec6_set_policy. The content of the
original ipsec_set_policy function is inlined into the new one.
 1.30 27-Feb-2018  maxv Oops, forgot this file; I just merged two IPsec functions, so adapt
the rump stubs accordingly.
 1.29 26-Feb-2018  maxv Dedup: merge ipsec4_in_reject and ipsec6_in_reject into ipsec_in_reject.
While here fix misleading comment.

ok ozaki-r@
 1.28 26-Feb-2018  maxv Dedup: merge ipsec4_hdrsiz and ipsec6_hdrsiz into ipsec_hdrsiz.

ok ozaki-r@
 1.27 02-Aug-2017  ozaki-r Make IPsec SPD MP-safe

We use localcount(9), not psref(9), to make the sptree and secpolicy (SP)
entries MP-safe because SPs need to be referenced over opencrypto
processing that executes a callback in a different context.

SPs on sockets aren't managed by the sptree and can be destroyed in softint.
localcount_drain cannot be used in softint so we delay the destruction of
such SPs to a thread context. To do so, a list to manage such SPs is added
(key_socksplist) and key_timehandler_spd deletes dead SPs in the list.

For more details please read the locking notes in key.c.

Proposed on tech-kern@ and tech-net@
 1.26 14-Apr-2017  ozaki-r branches: 1.26.4;
Rumpify netipsec

Note that we should modularize netipsec and reduce reverse symbol references
(referencing symbols of netipsec from net, netinet and netinet6) though,
the task needs lots of code changes. Prior to doing so, rumpifying it and
having ATF tests should be useful.
 1.25 14-Mar-2017  ozaki-r Use if_acquire and if_release instead of using psref API directly

- Provide if_release for consistency to if_acquire
- Use if_acquire and if_release for ifp iterations
- Make ifnet_psref_class static
 1.24 26-Nov-2016  ozaki-r branches: 1.24.2;
Rumpify vlan(4)
 1.23 12-May-2016  ozaki-r branches: 1.23.2;
Protect ifnet list with psz and psref

The change ensures that ifnet objects in the ifnet list aren't freed during
list iterations by using pserialize(9) and psref(9).

Note that the change adds a pslist(9) for ifnet but doesn't remove the
original ifnet list (ifnet_list) to avoid breaking kvm(3) users. We
shouldn't use the original list in the kernel anymore.
 1.22 15-Apr-2016  ozaki-r Rump-ify if_pppoe

From s-yamaguchi@IIJ
 1.21 02-Dec-2014  ozaki-r Get rid of weak_alias for bridge_input

bridge_input is now not directly called from ether_input,
so we can remove weak_alias for it.
 1.20 02-Dec-2014  ozaki-r Revert "Pull if_drain routine out of m_reclaim"

The commit broke dlopen()'d rumpnet on platforms where ld.so does not
override weak aliases (e.g. musl, Solaris, potentially OS X, ...).

Requested by pooka@.
 1.19 27-Nov-2014  ozaki-r branches: 1.19.2;
Pull if_drain routine out of m_reclaim

It's if-specific and should be in if.c.

No functional change.
 1.18 18-May-2014  rmind Fix RUMP build.
 1.17 26-Apr-2014  pooka don't invade the __toolchain namespace
 1.16 26-Apr-2014  pooka Move a few stubs to where they really belong; allows us to create
them as strong instead of weak symbols.
 1.15 26-Apr-2014  pooka kill weak aliases which are no longer necessary
 1.14 26-Jun-2013  pooka branches: 1.14.2; 1.14.6;
Remove the route_info weak alias. It's unnecessary since 2011
and confused Linux ld.so, thus preventing dlopen() of librumpnet.
Reported in private email by Justin Cormack.

Also, g/c a few other stubs which are no longer necessary.
 1.13 05-Aug-2012  pooka branches: 1.13.2;
Remove stubs which have been provided elsewhere for almost 2 years now.
 1.12 01-Feb-2011  matt branches: 1.12.4;
Add a new AF/PF_ROUTE which is 64-bit clean which makes the routing socket
interface (and its associated sysctls) act identically for both 32 and 64 bit
programs. The old unclean one remains for backward compatibility.
 1.11 08-Dec-2010  pooka branches: 1.11.2; 1.11.4;
weak stubs for agr(4)
 1.10 08-Dec-2010  pooka add weak stubs for bridge (not the game)
 1.9 08-Dec-2010  joerg Don't alias the same symbol twice.
 1.8 23-Jan-2009  pooka branches: 1.8.4; 1.8.8;
Add a few stubs to allow to compile - i'll have to sort these out later.
 1.7 29-Dec-2008  pooka branches: 1.7.2;
Provide ifunit stub in the same place as others.
 1.6 29-Dec-2008  pooka __weak_alias some more networking symbols for the benefit of the
nfs boot code in case not using the full networking stack.
 1.5 18-Dec-2008  pooka __KERNEL_RCSID
 1.4 16-Oct-2008  pooka branches: 1.4.2; 1.4.4;
...... except that the compat converter is actually supposed to convert
the ioctl, not return random garbage. It returning random garbage
causes an interface with an interesting netmask to get set and
hence a very interesting effect when you try to add a route for
your system.

All in all, a very healthy debugging session (if you're a vampire
or a wraith).
 1.3 16-Oct-2008  pooka ... except that compat_ifioctl() must know how to route the
commands further.
 1.2 16-Oct-2008  pooka Add a few compat stubs. They shouldn't be required at all, but I
don't currently have the time to wage a holy war against how the
kernel decides it wants them.
 1.1 15-Oct-2008  pooka Add the basic rump networking library, which provides e.g. sockets
and mbufs. This is required by all network-using rump applications.
 1.4.4.2 03-Mar-2009  skrll Sync with HEAD.
 1.4.4.1 19-Jan-2009  skrll Sync with HEAD.
 1.4.2.2 19-Oct-2008  haad Sync with HEAD.
 1.4.2.1 16-Oct-2008  haad file net_stub.c was added on branch haad-dm on 2008-10-19 22:18:07 +0000
 1.7.2.2 17-Jan-2009  mjf Sync with HEAD.
 1.7.2.1 29-Dec-2008  mjf file net_stub.c was added on branch mjf-devfs2 on 2009-01-17 13:29:37 +0000
 1.8.8.1 05-Mar-2011  rmind sync with head
 1.8.4.2 04-May-2009  yamt sync with head.
 1.8.4.1 23-Jan-2009  yamt file net_stub.c was added on branch yamt-nfs-mp on 2009-05-04 08:14:30 +0000
 1.11.4.1 08-Feb-2011  bouyer Sync with HEAD
 1.11.2.1 06-Jun-2011  jruoho Sync with HEAD.
 1.12.4.2 22-May-2014  yamt sync with head.

for a reference, the tree before this commit was tagged
as yamt-pagecache-tag8.

this commit was splitted into small chunks to avoid
a limitation of cvs. ("Protocol error: too many arguments")
 1.12.4.1 30-Oct-2012  yamt sync with head
 1.13.2.2 03-Dec-2017  jdolecek update from HEAD
 1.13.2.1 20-Aug-2014  tls Rebase to HEAD as of a few days ago.
 1.14.6.1 10-Aug-2014  tls Rebase.
 1.14.2.1 18-May-2014  rmind sync with head
 1.19.2.5 28-Aug-2017  skrll Sync with HEAD
 1.19.2.4 05-Dec-2016  skrll Sync with HEAD
 1.19.2.3 29-May-2016  skrll Sync with HEAD
 1.19.2.2 22-Apr-2016  skrll Sync with HEAD
 1.19.2.1 06-Apr-2015  skrll Sync with HEAD
 1.23.2.3 26-Apr-2017  pgoyette Sync with HEAD
 1.23.2.2 20-Mar-2017  pgoyette Sync with HEAD
 1.23.2.1 07-Jan-2017  pgoyette Sync with HEAD. (Note that most of these changes are simply $NetBSD$
tag issues.)
 1.24.2.1 21-Apr-2017  bouyer Sync with HEAD
 1.26.4.1 21-Oct-2017  snj Pull up following revision(s) (requested by ozaki-r in ticket #300):
crypto/dist/ipsec-tools/src/setkey/parse.y: 1.19
crypto/dist/ipsec-tools/src/setkey/token.l: 1.20
distrib/sets/lists/tests/mi: 1.754, 1.757, 1.759
doc/TODO.smpnet: 1.12-1.13
sys/net/pfkeyv2.h: 1.32
sys/net/raw_cb.c: 1.23-1.24, 1.28
sys/net/raw_cb.h: 1.28
sys/net/raw_usrreq.c: 1.57-1.58
sys/net/rtsock.c: 1.228-1.229
sys/netinet/in_proto.c: 1.125
sys/netinet/ip_input.c: 1.359-1.361
sys/netinet/tcp_input.c: 1.359-1.360
sys/netinet/tcp_output.c: 1.197
sys/netinet/tcp_var.h: 1.178
sys/netinet6/icmp6.c: 1.213
sys/netinet6/in6_proto.c: 1.119
sys/netinet6/ip6_forward.c: 1.88
sys/netinet6/ip6_input.c: 1.181-1.182
sys/netinet6/ip6_output.c: 1.193
sys/netinet6/ip6protosw.h: 1.26
sys/netipsec/ipsec.c: 1.100-1.122
sys/netipsec/ipsec.h: 1.51-1.61
sys/netipsec/ipsec6.h: 1.18-1.20
sys/netipsec/ipsec_input.c: 1.44-1.51
sys/netipsec/ipsec_netbsd.c: 1.41-1.45
sys/netipsec/ipsec_output.c: 1.49-1.64
sys/netipsec/ipsec_private.h: 1.5
sys/netipsec/key.c: 1.164-1.234
sys/netipsec/key.h: 1.20-1.32
sys/netipsec/key_debug.c: 1.18-1.21
sys/netipsec/key_debug.h: 1.9
sys/netipsec/keydb.h: 1.16-1.20
sys/netipsec/keysock.c: 1.59-1.62
sys/netipsec/keysock.h: 1.10
sys/netipsec/xform.h: 1.9-1.12
sys/netipsec/xform_ah.c: 1.55-1.74
sys/netipsec/xform_esp.c: 1.56-1.72
sys/netipsec/xform_ipcomp.c: 1.39-1.53
sys/netipsec/xform_ipip.c: 1.50-1.54
sys/netipsec/xform_tcp.c: 1.12-1.16
sys/rump/librump/rumpkern/Makefile.rumpkern: 1.170
sys/rump/librump/rumpnet/net_stub.c: 1.27
sys/sys/protosw.h: 1.67-1.68
tests/net/carp/t_basic.sh: 1.7
tests/net/if_gif/t_gif.sh: 1.11
tests/net/if_l2tp/t_l2tp.sh: 1.3
tests/net/ipsec/Makefile: 1.7-1.9
tests/net/ipsec/algorithms.sh: 1.5
tests/net/ipsec/common.sh: 1.4-1.6
tests/net/ipsec/t_ipsec_ah_keys.sh: 1.2
tests/net/ipsec/t_ipsec_esp_keys.sh: 1.2
tests/net/ipsec/t_ipsec_gif.sh: 1.6-1.7
tests/net/ipsec/t_ipsec_l2tp.sh: 1.6-1.7
tests/net/ipsec/t_ipsec_misc.sh: 1.8-1.18
tests/net/ipsec/t_ipsec_sockopt.sh: 1.1-1.2
tests/net/ipsec/t_ipsec_tcp.sh: 1.1-1.2
tests/net/ipsec/t_ipsec_transport.sh: 1.5-1.6
tests/net/ipsec/t_ipsec_tunnel.sh: 1.9
tests/net/ipsec/t_ipsec_tunnel_ipcomp.sh: 1.1-1.2
tests/net/ipsec/t_ipsec_tunnel_odd.sh: 1.3
tests/net/mcast/t_mcast.sh: 1.6
tests/net/net/t_ipaddress.sh: 1.11
tests/net/net_common.sh: 1.20
tests/net/npf/t_npf.sh: 1.3
tests/net/route/t_flags.sh: 1.20
tests/net/route/t_flags6.sh: 1.16
usr.bin/netstat/fast_ipsec.c: 1.22
Do m_pullup before mtod

It may fix panicks of some tests on anita/sparc and anita/GuruPlug.
---
KNF
---
Enable DEBUG for babylon5
---
Apply C99-style struct initialization to xformsw
---
Tweak outputs of netstat -s for IPsec

- Get rid of "Fast"
- Use ipsec and ipsec6 for titles to clarify protocol
- Indent outputs of sub protocols

Original outputs were organized like this:

(Fast) IPsec:
IPsec ah:
IPsec esp:
IPsec ipip:
IPsec ipcomp:
(Fast) IPsec:
IPsec ah:
IPsec esp:
IPsec ipip:
IPsec ipcomp:

New outputs are organized like this:

ipsec:
ah:
esp:
ipip:
ipcomp:
ipsec6:
ah:
esp:
ipip:
ipcomp:
---
Add test cases for IPComp
---
Simplify IPSEC_OSTAT macro (NFC)
---
KNF; replace leading whitespaces with hard tabs
---
Introduce and use SADB_SASTATE_USABLE_P
---
KNF
---
Add update command for testing

Updating an SA (SADB_UPDATE) requires that a process issuing
SADB_UPDATE is the same as a process issued SADB_ADD (or SADB_GETSPI).
This means that update command must be used with add command in a
configuration of setkey. This usage is normally meaningless but
useful for testing (and debugging) purposes.
---
Add test cases for updating SA/SP

The tests require newly-added udpate command of setkey.
---
PR/52346: Frank Kardel: Fix checksumming for NAT-T
See XXX for improvements.
---
Remove codes for PACKET_TAG_IPSEC_IN_CRYPTO_DONE

It seems that PACKET_TAG_IPSEC_IN_CRYPTO_DONE is for network adapters
that have IPsec accelerators; a driver sets the mtag to a packet
when its device has already encrypted the packet.

Unfortunately no driver implements such offload features for long
years and seems unlikely to implement them soon. (Note that neither
FreeBSD nor Linux doesn't have such drivers.) Let's remove related
(unused) codes and simplify the IPsec code.
---
Fix usages of sadb_msg_errno
---
Avoid updating sav directly

On SADB_UPDATE a target sav was updated directly, which was unsafe.
Instead allocate another sav, copy variables of the old sav to
the new one and replace the old one with the new one.
---
Simplify; we can assume sav->tdb_xform cannot be NULL while it's valid
---
Rename key_alloc* functions (NFC)

We shouldn't use the term "alloc" for functions that just look up
data and actually don't allocate memory.
---
Use explicit_memset to surely zero-clear key_auth and key_enc
---
Make sure to clear keys on error paths of key_setsaval
---
Add missing KEY_FREESAV
---
Make sure a sav is inserted to a sah list after its initialization completes
---
Remove unnecessary zero-clearing codes from key_setsaval

key_setsaval is now used only for a newly-allocated sav. (It was
used to reset variables of an existing sav.)
---
Correct wrong assumption of sav->refcnt in key_delsah

A sav in a list is basically not to be sav->refcnt == 0. And also
KEY_FREESAV assumes sav->refcnt > 0.
---
Let key_getsavbyspi take a reference of a returning sav
---
Use time_mono_to_wall (NFC)
---
Separate sending message routine (NFC)
---
Simplify; remove unnecessary zero-clears

key_freesaval is used only when a target sav is being destroyed.
---
Omit NULL checks for sav->lft_c

sav->lft_c can be NULL only when initializing or destroying sav.
---
Omit unnecessary NULL checks for sav->sah
---
Omit unnecessary check of sav->state

key_allocsa_policy picks a sav of either MATURE or DYING so we
don't need to check its state again.
---
Simplify; omit unnecessary saidx passing

- ipsec_nextisr returns a saidx but no caller uses it
- key_checkrequest is passed a saidx but it can be gotton by
another argument (isr)
---
Fix splx isn't called on some error paths
---
Fix header size calculation of esp where sav is NULL
---
Fix header size calculation of ah in the case sav is NULL

This fix was also needed for esp.
---
Pass sav directly to opencrypto callback

In a callback, use a passed sav as-is by default and look up a sav
only if the passed sav is dead.
---
Avoid examining freshness of sav on packet processing

If a sav list is sorted (by lft_c->sadb_lifetime_addtime) in advance,
we don't need to examine each sav and also don't need to delete one
on the fly and send up a message. Fortunately every sav lists are sorted
as we need.

Added key_validate_savlist validates that each sav list is surely sorted
(run only if DEBUG because it's not cheap).
---
Add test cases for SAs with different SPIs
---
Prepare to stop using isr->sav

isr is a shared resource and using isr->sav as a temporal storage
for each packet processing is racy. And also having a reference from
isr to sav makes the lifetime of sav non-deterministic; such a reference
is removed when a packet is processed and isr->sav is overwritten by
new one. Let's have a sav locally for each packet processing instead of
using shared isr->sav.

However this change doesn't stop using isr->sav yet because there are
some users of isr->sav. isr->sav will be removed after the users find
a way to not use isr->sav.
---
Fix wrong argument handling
---
fix printf format.
---
Don't validate sav lists of LARVAL or DEAD states

We don't sort the lists so the validation will always fail.

Fix PR kern/52405
---
Make sure to sort the list when changing the state by key_sa_chgstate
---
Rename key_allocsa_policy to key_lookup_sa_bysaidx
---
Separate test files
---
Calculate ah_max_authsize on initialization as well as esp_max_ivlen
---
Remove m_tag_find(PACKET_TAG_IPSEC_PENDING_TDB) because nobody sets the tag
---
Restore a comment removed in previous

The comment is valid for the below code.
---
Make tests more stable

sleep command seems to wait longer than expected on anita so
use polling to wait for a state change.
---
Add tests that explicitly delete SAs instead of waiting for expirations
---
Remove invalid M_AUTHIPDGM check on ESP isr->sav

M_AUTHIPDGM flag is set to a mbuf in ah_input_cb. An sav of ESP can
have AH authentication as sav->tdb_authalgxform. However, in that
case esp_input and esp_input_cb are used to do ESP decryption and
AH authentication and M_AUTHIPDGM never be set to a mbuf. So
checking M_AUTHIPDGM of a mbuf on isr->sav of ESP is meaningless.
---
Look up sav instead of relying on unstable sp->req->sav

This code is executed only in an error path so an additional lookup
doesn't matter.
---
Correct a comment
---
Don't release sav if calling crypto_dispatch again
---
Remove extra KEY_FREESAV from ipsec_process_done

It should be done by the caller.
---
Don't bother the case of crp->crp_buf == NULL in callbacks
---
Hold a reference to an SP during opencrypto processing

An SP has a list of isr (ipsecrequest) that represents a sequence
of IPsec encryption/authentication processing. One isr corresponds
to one opencrypto processing. The lifetime of an isr follows its SP.

We pass an isr to a callback function of opencrypto to continue
to a next encryption/authentication processing. However nobody
guaranteed that the isr wasn't freed, i.e., its SP wasn't destroyed.

In order to avoid such unexpected destruction of isr, hold a reference
to its SP during opencrypto processing.
---
Don't make SAs expired on tests that delete SAs explicitly
---
Fix a debug message
---
Dedup error paths (NFC)
---
Use pool to allocate tdb_crypto

For ESP and AH, we need to allocate an extra variable space in addition
to struct tdb_crypto. The fixed size of pool items may be larger than
an actual requisite size of a buffer, but still the performance
improvement by replacing malloc with pool wins.
---
Don't use unstable isr->sav for header size calculations

We may need to optimize to not look up sav here for users that
don't need to know an exact size of headers (e.g., TCP segmemt size
caclulation).
---
Don't use sp->req->sav when handling NAT-T ESP fragmentation

In order to do this we need to look up a sav however an additional
look-up degrades performance. A sav is later looked up in
ipsec4_process_packet so delay the fragmentation check until then
to avoid an extra look-up.
---
Don't use key_lookup_sp that depends on unstable sp->req->sav

It provided a fast look-up of SP. We will provide an alternative
method in the future (after basic MP-ification finishes).
---
Stop setting isr->sav on looking up sav in key_checkrequest
---
Remove ipsecrequest#sav
---
Stop setting mtag of PACKET_TAG_IPSEC_IN_DONE because there is no users anymore
---
Skip ipsec_spi_*_*_preferred_new_timeout when running on qemu

Probably due to PR 43997
---
Add localcount to rump kernels
---
Remove unused macro
---
Fix key_getcomb_setlifetime

The fix adjusts a soft limit to be 80% of a corresponding hard limit.

I'm not sure the fix is really correct though, at least the original
code is wrong. A passed comb is zero-cleared before calling
key_getcomb_setlifetime, so
comb->sadb_comb_soft_addtime = comb->sadb_comb_soft_addtime * 80 / 100;
is meaningless.
---
Provide and apply key_sp_refcnt (NFC)

It simplifies further changes.
---
Fix indentation

Pointed out by knakahara@
---
Use pslist(9) for sptree
---
Don't acquire global locks for IPsec if NET_MPSAFE

Note that the change is just to make testing easy and IPsec isn't MP-safe yet.
---
Let PF_KEY socks hold their own lock instead of softnet_lock

Operations on SAD and SPD are executed via PF_KEY socks. The operations
include deletions of SAs and SPs that will use synchronization mechanisms
such as pserialize_perform to wait for references to SAs and SPs to be
released. It is known that using such mechanisms with holding softnet_lock
causes a dead lock. We should avoid the situation.
---
Make IPsec SPD MP-safe

We use localcount(9), not psref(9), to make the sptree and secpolicy (SP)
entries MP-safe because SPs need to be referenced over opencrypto
processing that executes a callback in a different context.

SPs on sockets aren't managed by the sptree and can be destroyed in softint.
localcount_drain cannot be used in softint so we delay the destruction of
such SPs to a thread context. To do so, a list to manage such SPs is added
(key_socksplist) and key_timehandler_spd deletes dead SPs in the list.

For more details please read the locking notes in key.c.

Proposed on tech-kern@ and tech-net@
---
Fix updating ipsec_used

- key_update_used wasn't called in key_api_spddelete2 and key_api_spdflush
- key_update_used wasn't called if an SP had been added/deleted but
a reply to userland failed
---
Fix updating ipsec_used; turn on when SPs on sockets are added
---
Add missing IPsec policy checks to icmp6_rip6_input

icmp6_rip6_input is quite similar to rip6_input and the same checks exist
in rip6_input.
---
Add test cases for setsockopt(IP_IPSEC_POLICY)
---
Don't use KEY_NEWSP for dummy SP entries

By the change KEY_NEWSP is now not called from softint anymore
and we can use kmem_zalloc with KM_SLEEP for KEY_NEWSP.
---
Comment out unused functions
---
Add test cases that there are SPs but no relevant SAs
---
Don't allow sav->lft_c to be NULL

lft_c of an sav that was created by SADB_GETSPI could be NULL.
---
Clean up clunky eval strings

- Remove unnecessary \ at EOL
- This allows to omit ; too
- Remove unnecessary quotes for arguments of atf_set
- Don't expand $DEBUG in eval
- We expect it's expanded on execution

Suggested by kre@
---
Remove unnecessary KEY_FREESAV in an error path

sav should be freed (unreferenced) by the caller.
---
Use pslist(9) for sahtree
---
Use pslist(9) for sah->savtree
---
Rename local variable newsah to sah

It may not be new.
---
MP-ify SAD slightly

- Introduce key_sa_mtx and use it for some list operations
- Use pserialize for some list iterations
---
Introduce KEY_SA_UNREF and replace KEY_FREESAV with it where sav will never be actually freed in the future

KEY_SA_UNREF is still key_freesav so no functional change for now.

This change reduces diff of further changes.
---
Remove out-of-date log output

Pointed out by riastradh@
---
Use KDASSERT instead of KASSERT for mutex_ownable

Because mutex_ownable is too heavy to run in a fast path
even for DIAGNOSTIC + LOCKDEBUG.

Suggested by riastradh@
---
Assemble global lists and related locks into cache lines (NFCI)

Also rename variable names from *tree to *list because they are
just lists, not trees.

Suggested by riastradh@
---
Move locking notes
---
Update the locking notes

- Add locking order
- Add locking notes for misc lists such as reglist
- Mention pserialize, key_sp_ref and key_sp_unref on SP operations

Requested by riastradh@
---
Describe constraints of key_sp_ref and key_sp_unref

Requested by riastradh@
---
Hold key_sad.lock on SAVLIST_WRITER_INSERT_TAIL
---
Add __read_mostly to key_psz

Suggested by riastradh@
---
Tweak wording (pserialize critical section => pserialize read section)

Suggested by riastradh@
---
Add missing mutex_exit
---
Fix setkey -D -P outputs

The outputs were tweaked (by me), but I forgot updating libipsec
in my local ATF environment...
---
MP-ify SAD (key_sad.sahlist and sah entries)

localcount(9) is used to protect key_sad.sahlist and sah entries
as well as SPD (and will be used for SAD sav).

Please read the locking notes of SAD for more details.
---
Introduce key_sa_refcnt and replace sav->refcnt with it (NFC)
---
Destroy sav only in the loop for DEAD sav
---
Fix KASSERT(solocked(sb->sb_so)) failure in sbappendaddr that is called eventually from key_sendup_mbuf

If key_sendup_mbuf isn't passed a socket, the assertion fails.
Originally in this case sb->sb_so was softnet_lock and callers
held softnet_lock so the assertion was magically satisfied.
Now sb->sb_so is key_so_mtx and also softnet_lock isn't always
held by callers so the assertion can fail.

Fix it by holding key_so_mtx if key_sendup_mbuf isn't passed a socket.

Reported by knakahara@
Tested by knakahara@ and ozaki-r@
---
Fix locking notes of SAD
---
Fix deadlock between key_sendup_mbuf called from key_acquire and localcount_drain

If we call key_sendup_mbuf from key_acquire that is called on packet
processing, a deadlock can happen like this:
- At key_acquire, a reference to an SP (and an SA) is held
- key_sendup_mbuf will try to take key_so_mtx
- Some other thread may try to localcount_drain to the SP with
holding key_so_mtx in say key_api_spdflush
- In this case localcount_drain never return because key_sendup_mbuf
that has stuck on key_so_mtx never release a reference to the SP

Fix the deadlock by deferring key_sendup_mbuf to the timer
(key_timehandler).
---
Fix that prev isn't cleared on retry
---
Limit the number of mbufs queued for deferred key_sendup_mbuf

It's easy to be queued hundreds of mbufs on the list under heavy
network load.
---
MP-ify SAD (savlist)

localcount(9) is used to protect savlist of sah. The basic design is
similar to MP-ifications of SPD and SAD sahlist. Please read the
locking notes of SAD for more details.
---
Simplify ipsec_reinject_ipstack (NFC)
---
Add per-CPU rtcache to ipsec_reinject_ipstack

It reduces route lookups and also reduces rtcache lock contentions
when NET_MPSAFE is enabled.
---
Use pool_cache(9) instead of pool(9) for tdb_crypto objects

The change improves network throughput especially on multi-core systems.
---
Update

ipsec(4), opencrypto(9) and vlan(4) are now MP-safe.
---
Write known issues on scalability
---
Share a global dummy SP between PCBs

It's never be changed so it can be pre-allocated and shared safely between PCBs.
---
Fix race condition on the rawcb list shared by rtsock and keysock

keysock now protects itself by its own mutex, which means that
the rawcb list is protected by two different mutexes (keysock's one
and softnet_lock for rtsock), of course it's useless.

Fix the situation by having a discrete rawcb list for each.
---
Use a dedicated mutex for rt_rawcb instead of softnet_lock if NET_MPSAFE
---
fix localcount leak in sav. fixed by ozaki-r@n.o.

I commit on behalf of him.
---
remove unnecessary comment.
---
Fix deadlock between pserialize_perform and localcount_drain

A typical ussage of localcount_drain looks like this:

mutex_enter(&mtx);
item = remove_from_list();
pserialize_perform(psz);
localcount_drain(&item->localcount, &cv, &mtx);
mutex_exit(&mtx);

This sequence can cause a deadlock which happens for example on the following
situation:

- Thread A calls localcount_drain which calls xc_broadcast after releasing
a specified mutex
- Thread B enters the sequence and calls pserialize_perform with holding
the mutex while pserialize_perform also calls xc_broadcast
- Thread C (xc_thread) that calls an xcall callback of localcount_drain tries
to hold the mutex

xc_broadcast of thread B doesn't start until xc_broadcast of thread A
finishes, which is a feature of xcall(9). This means that pserialize_perform
never complete until xc_broadcast of thread A finishes. On the other hand,
thread C that is a callee of xc_broadcast of thread A sticks on the mutex.
Finally the threads block each other (A blocks B, B blocks C and C blocks A).

A possible fix is to serialize executions of the above sequence by another
mutex, but adding another mutex makes the code complex, so fix the deadlock
by another way; the fix is to release the mutex before pserialize_perform
and instead use a condvar to prevent pserialize_perform from being called
simultaneously.

Note that the deadlock has happened only if NET_MPSAFE is enabled.
---
Add missing ifdef NET_MPSAFE
---
Take softnet_lock on pr_input properly if NET_MPSAFE

Currently softnet_lock is taken unnecessarily in some cases, e.g.,
icmp_input and encap4_input from ip_input, or not taken even if needed,
e.g., udp_input and tcp_input from ipsec4_common_input_cb. Fix them.

NFC if NET_MPSAFE is disabled (default).
---
- sanitize key debugging so that we don't print extra newlines or unassociated
debugging messages.
- remove unused functions and make internal ones static
- print information in one line per message
---
humanize printing of ip addresses
---
cast reduction, NFC.
---
Fix typo in comment
---
Pull out ipsec_fill_saidx_bymbuf (NFC)
---
Don't abuse key_checkrequest just for looking up sav

It does more than expected for example key_acquire.
---
Fix SP is broken on transport mode

isr->saidx was modified accidentally in ipsec_nextisr.

Reported by christos@
Helped investigations by christos@ and knakahara@
---
Constify isr at many places (NFC)
---
Include socketvar.h for softnet_lock
---
Fix buffer length for ipsec_logsastr
 1.31.2.5 26-Dec-2018  pgoyette Sync with HEAD, resolve a few conflicts
 1.31.2.4 21-May-2018  pgoyette Sync with HEAD
 1.31.2.3 02-May-2018  pgoyette Synch with HEAD
 1.31.2.2 16-Apr-2018  pgoyette Sync with HEAD, resolve some conflicts
 1.31.2.1 12-Apr-2018  pgoyette Merge christos's recent changes on HEAD
 1.36.2.1 10-Jun-2019  christos Sync with HEAD
 1.40.2.1 14-Dec-2020  thorpej Sync w/ HEAD.
 1.41.6.1 31-May-2021  cjep sync with head
 1.41.4.2 01-Aug-2021  thorpej Sync with HEAD.
 1.41.4.1 17-Jun-2021  thorpej Sync w/ HEAD.
 1.11 03-Sep-2022  thorpej Garbage-collect the remaining vestiges of netisr.
 1.10 26-Jan-2016  pooka Put the kernelside rump kernel headers into <rump-sys> instead of
sprinkling them around the faction directories. Avoids having
to add a CPPFLAGS (or several) to pretty much every component
Makefile.

Leave compat headers around in the old locations.

The commit changes some autogenerated files, but I'll fix the
generators shortly and regen.
 1.9 05-Jun-2014  rmind branches: 1.9.4;
- Implement pktqueue interface for lockless IP input queue.
- Replace ipintrq and ip6intrq with the pktqueue mechanism.
- Eliminate kernel-lock from ipintr() and ip6intr().
- Some preparation work to push softnet_lock out of ipintr().

Discussed on tech-net.
 1.8 25-Feb-2014  pooka branches: 1.8.2;
Schedule only those netisr's that have registered handlers.
 1.7 14-Feb-2014  pooka Register netisr's from component constructors instead of via a hardcoded
global list.
 1.6 18-Jul-2013  kefren Add librumpnet_netmpls that provides MPLS features into rump kernels
ok'ed pooka@
 1.5 30-Dec-2010  pooka branches: 1.5.8; 1.5.18; 1.5.22; 1.5.30;
Refetch netisr function pointers with dlsym(). This gives the
desired values in case the components containing the netisr handlers
were not linked in but dlopen()'d before calling rump_init().

(could simplify a little in case static linking is declared dead)
 1.4 26-May-2009  pooka branches: 1.4.4;
Support IPv6 in rump. I'd have liked to introduce a netinet6
component, but due to ifdef happiness permeating the sources, it's
a compile decision for now, so netinet pulls in both inet and inet6.

One issue, one single issue: the loopback interface still needs to
be created for IPv6 to work. I have patches to take care of it
automatically if the appropriate component (net) is present, but
they require a bit more testing before commit.
 1.3 18-Mar-2009  cegger branches: 1.3.2;
Ansify function definitions w/o arguments. Generated with sed.
 1.2 18-Dec-2008  pooka branches: 1.2.2; 1.2.4;
__KERNEL_RCSID
 1.1 15-Oct-2008  pooka branches: 1.1.2; 1.1.4;
Add the basic rump networking library, which provides e.g. sockets
and mbufs. This is required by all network-using rump applications.
 1.1.4.2 28-Apr-2009  skrll Sync with HEAD.
 1.1.4.1 19-Jan-2009  skrll Sync with HEAD.
 1.1.2.2 19-Oct-2008  haad Sync with HEAD.
 1.1.2.1 15-Oct-2008  haad file netisr.c was added on branch haad-dm on 2008-10-19 22:18:07 +0000
 1.2.4.2 23-Jul-2009  jym Sync with HEAD.
 1.2.4.1 13-May-2009  jym Sync with HEAD.

Commit is split, to avoid a "too many arguments" protocol error.
 1.2.2.2 17-Jan-2009  mjf Sync with HEAD.
 1.2.2.1 18-Dec-2008  mjf file netisr.c was added on branch mjf-devfs2 on 2009-01-17 13:29:37 +0000
 1.3.2.3 20-Jun-2009  yamt sync with head
 1.3.2.2 04-May-2009  yamt sync with head.
 1.3.2.1 18-Mar-2009  yamt file netisr.c was added on branch yamt-nfs-mp on 2009-05-04 08:14:30 +0000
 1.4.4.1 05-Mar-2011  rmind sync with head
 1.5.30.1 23-Jul-2013  riastradh sync with HEAD
 1.5.22.2 18-May-2014  rmind sync with head
 1.5.22.1 28-Aug-2013  rmind sync with head
 1.5.18.2 03-Dec-2017  jdolecek update from HEAD
 1.5.18.1 20-Aug-2014  tls Rebase to HEAD as of a few days ago.
 1.5.8.1 22-May-2014  yamt sync with head.

for a reference, the tree before this commit was tagged
as yamt-pagecache-tag8.

this commit was splitted into small chunks to avoid
a limitation of cvs. ("Protocol error: too many arguments")
 1.8.2.1 10-Aug-2014  tls Rebase.
 1.9.4.1 19-Mar-2016  skrll Sync with HEAD
 1.21 10-Jan-2018  ozaki-r Don't start callouts for domains before attaching domains on rump kernels

On rump kernels, the callouts for domains, pffasttimo and pfslowtimo, started
before domains were attached. Normally the callouts were dispatched after
domain attaches (initializations) finished, however, under load the callouts
could be executed prior to the attaches, resulting in that the callouts accessed
unallocated or uninitialized resources.
 1.20 17-Jan-2017  christos branches: 1.20.6;
call pfil_init() here.
 1.19 11-Apr-2016  ozaki-r branches: 1.19.2; 1.19.4;
Sweep unncessary radix.h inclusions
 1.18 26-Jan-2016  pooka Put the kernelside rump kernel headers into <rump-sys> instead of
sprinkling them around the faction directories. Avoids having
to add a CPPFLAGS (or several) to pretty much every component
Makefile.

Leave compat headers around in the old locations.

The commit changes some autogenerated files, but I'll fix the
generators shortly and regen.
 1.17 14-Feb-2014  pooka branches: 1.17.6;
Register netisr's from component constructors instead of via a hardcoded
global list.
 1.16 14-Jan-2013  pooka branches: 1.16.2;
Remove routines which don't make sense (maybe they're some intermediate
phase of the component framework?)
 1.15 14-Jan-2013  pooka Set networking soft interrupt vectors earlier, just in case interface
component initialization causes network traffic to be received.
 1.14 14-Jan-2013  pooka Don't use __weak_alias where the component framework is sufficient.
 1.13 11-Jan-2011  pooka branches: 1.13.8; 1.13.18;
Add one more component level to networking: IFCFG.
It is executed after IF and the purposes to guarantee the right
order in cross-component interface address configuration.
(e.g. lo0 is attached by net but 127.0.0.1 is configured by netinet)
 1.12 01-Mar-2010  pooka branches: 1.12.2;
Introduce RUMP_COMPONENT. It behaves mostly like a simplified
module which is linked into the kernel and cannot be unloaded.
The main purpose is to get the proper constructors run and create
any /dev nodes necessary for said component. Once more of the
kernel (e.g. networking stack and device drivers) are converted to
MODULE and devfs pops up from somewhere, rump components can be
retired.
 1.11 19-Jan-2010  pooka branches: 1.11.2;
Redefine bpf linkage through an always present op vector, i.e.
#if NBPFILTER is no longer required in the client. This change
doesn't yet add support for loading bpf as a module, since drivers
can register before bpf is attached. However, callers of bpf can
now be modularized.

Dynamically loadable bpf could probably be done fairly easily with
coordination from the stub driver and the real driver by registering
attachments in the stub before the real driver is loaded and doing
a handoff. ... and I'm not going to ponder the depths of unload
here.

Tested with i386/MONOLITHIC, modified MONOLITHIC without bpf and rump.
 1.10 04-Oct-2009  pooka Initialize suckets before domains since some domains install timers
which take softnet_lock and might run before the lock is actually
initialized. Also, soinit() itself already calls soinit2(), so no
need to call it twice.
 1.9 16-Sep-2009  pooka create interfaces only after ifnef is initialized
 1.8 28-May-2009  pooka Use a bunch of weak symbols to determine which network components
are present. This works in userspace as opposed relying in link
sets, which fail miserably. Later, when the networking stack
becomes modularized, we can move to a dynamic scheme like with file
systems.

Also, this change allows us to do proper autoconfig, namely attach
the loopback interface iff it is present.
 1.7 18-Mar-2009  cegger branches: 1.7.2;
Ansify function definitions w/o arguments. Generated with sed.
 1.6 29-Dec-2008  pooka branches: 1.6.2; 1.6.4;
Provide ifunit stub in the same place as others.
 1.5 18-Dec-2008  pooka __KERNEL_RCSID
 1.4 25-Nov-2008  pooka "Manually" call rn_init() to make sure it's done. The real kernel
hooks it up with domain constructors in a fascinating way.
 1.3 16-Oct-2008  pooka branches: 1.3.2; 1.3.4;
Before I sort all the COMPAT_RIDICULOUSLYPREHISTORIC ioctl stuff
out, add a weak alias for ifunit() so that utils can be linked with
sockin.
 1.2 16-Oct-2008  pooka call rump_netisr_init()
 1.1 15-Oct-2008  pooka Add the basic rump networking library, which provides e.g. sockets
and mbufs. This is required by all network-using rump applications.
 1.3.4.2 28-Apr-2009  skrll Sync with HEAD.
 1.3.4.1 19-Jan-2009  skrll Sync with HEAD.
 1.3.2.3 13-Dec-2008  haad Update haad-dm branch to haad-dm-base2.
 1.3.2.2 19-Oct-2008  haad Sync with HEAD.
 1.3.2.1 16-Oct-2008  haad file rump_net.c was added on branch haad-dm on 2008-10-19 22:18:07 +0000
 1.6.4.2 23-Jul-2009  jym Sync with HEAD.
 1.6.4.1 13-May-2009  jym Sync with HEAD.

Commit is split, to avoid a "too many arguments" protocol error.
 1.6.2.2 17-Jan-2009  mjf Sync with HEAD.
 1.6.2.1 29-Dec-2008  mjf file rump_net.c was added on branch mjf-devfs2 on 2009-01-17 13:29:37 +0000
 1.7.2.4 11-Mar-2010  yamt sync with head
 1.7.2.3 20-Jun-2009  yamt sync with head
 1.7.2.2 04-May-2009  yamt sync with head.
 1.7.2.1 18-Mar-2009  yamt file rump_net.c was added on branch yamt-nfs-mp on 2009-05-04 08:14:30 +0000
 1.11.2.1 30-Apr-2010  uebayasi Sync with HEAD.
 1.12.2.1 05-Mar-2011  rmind sync with head
 1.13.18.3 03-Dec-2017  jdolecek update from HEAD
 1.13.18.2 20-Aug-2014  tls Rebase to HEAD as of a few days ago.
 1.13.18.1 25-Feb-2013  tls resync with head
 1.13.8.2 22-May-2014  yamt sync with head.

for a reference, the tree before this commit was tagged
as yamt-pagecache-tag8.

this commit was splitted into small chunks to avoid
a limitation of cvs. ("Protocol error: too many arguments")
 1.13.8.1 23-Jan-2013  yamt sync with head
 1.16.2.1 18-May-2014  rmind sync with head
 1.17.6.3 05-Feb-2017  skrll Sync with HEAD
 1.17.6.2 22-Apr-2016  skrll Sync with HEAD
 1.17.6.1 19-Mar-2016  skrll Sync with HEAD
 1.19.4.1 21-Apr-2017  bouyer Sync with HEAD
 1.19.2.1 20-Mar-2017  pgoyette Sync with HEAD
 1.20.6.1 16-Jan-2018  martin Pull up following revision(s) (requested by ozaki-r in ticket #498):
sys/kern/uipc_domain.c: revision 1.101
sys/sys/domain.h: revision 1.34
sys/rump/librump/rumpnet/rump_net.c: revision 1.21
Don't start callouts for domains before attaching domains on rump kernels
On rump kernels, the callouts for domains, pffasttimo and pfslowtimo, started
before domains were attached. Normally the callouts were dispatched after
domain attaches (initializations) finished, however, under load the callouts
could be executed prior to the attaches, resulting in that the callouts accessed
unallocated or uninitialized resources.
 1.11 26-Jan-2016  pooka Put the kernelside rump kernel headers into <rump-sys> instead of
sprinkling them around the faction directories. Avoids having
to add a CPPFLAGS (or several) to pretty much every component
Makefile.

Leave compat headers around in the old locations.

The commit changes some autogenerated files, but I'll fix the
generators shortly and regen.
 1.10 22-Aug-2014  pooka branches: 1.10.2;
Nuke the DOMAINADD() macro and just call domain_attach(), now that things
work correctly that way.
 1.9 14-Feb-2014  pooka Register netisr's from component constructors instead of via a hardcoded
global list.
 1.8 14-Feb-2014  pooka g/c prototype of imaginary routine
 1.7 03-Jul-2013  pooka g/c dummyif, not useful these days
 1.6 14-Jan-2013  pooka branches: 1.6.2;
Don't use __weak_alias where the component framework is sufficient.
 1.5 01-Mar-2010  pooka branches: 1.5.10; 1.5.20;
Introduce RUMP_COMPONENT. It behaves mostly like a simplified
module which is linked into the kernel and cannot be unloaded.
The main purpose is to get the proper constructors run and create
any /dev nodes necessary for said component. Once more of the
kernel (e.g. networking stack and device drivers) are converted to
MODULE and devfs pops up from somewhere, rump components can be
retired.
 1.4 14-Oct-2009  pooka branches: 1.4.2;
Adjust rump sources for external/internal interfaces.
No functional change.
 1.3 28-May-2009  pooka Use a bunch of weak symbols to determine which network components
are present. This works in userspace as opposed relying in link
sets, which fail miserably. Later, when the networking stack
becomes modularized, we can move to a dynamic scheme like with file
systems.

Also, this change allows us to do proper autoconfig, namely attach
the loopback interface iff it is present.
 1.2 27-May-2009  pooka Add a dummyif, which doesn't actually traffic any cargo, but since
it has no backend it can always be attached and is therefore
convenient for testing ifconfig.
 1.1 15-Oct-2008  pooka branches: 1.1.2; 1.1.10; 1.1.12; 1.1.16;
Add the basic rump networking library, which provides e.g. sockets
and mbufs. This is required by all network-using rump applications.
 1.1.16.4 11-Mar-2010  yamt sync with head
 1.1.16.3 20-Jun-2009  yamt sync with head
 1.1.16.2 04-May-2009  yamt sync with head.
 1.1.16.1 15-Oct-2008  yamt file rump_net_private.h was added on branch yamt-nfs-mp on 2009-05-04 08:14:31 +0000
 1.1.12.1 23-Jul-2009  jym Sync with HEAD.
 1.1.10.2 17-Jan-2009  mjf Sync with HEAD.
 1.1.10.1 15-Oct-2008  mjf file rump_net_private.h was added on branch mjf-devfs2 on 2009-01-17 13:29:37 +0000
 1.1.2.2 19-Oct-2008  haad Sync with HEAD.
 1.1.2.1 15-Oct-2008  haad file rump_net_private.h was added on branch haad-dm on 2008-10-19 22:18:07 +0000
 1.4.2.1 30-Apr-2010  uebayasi Sync with HEAD.
 1.5.20.3 03-Dec-2017  jdolecek update from HEAD
 1.5.20.2 20-Aug-2014  tls Rebase to HEAD as of a few days ago.
 1.5.20.1 25-Feb-2013  tls resync with head
 1.5.10.2 22-May-2014  yamt sync with head.

for a reference, the tree before this commit was tagged
as yamt-pagecache-tag8.

this commit was splitted into small chunks to avoid
a limitation of cvs. ("Protocol error: too many arguments")
 1.5.10.1 23-Jan-2013  yamt sync with head
 1.6.2.2 18-May-2014  rmind sync with head
 1.6.2.1 28-Aug-2013  rmind sync with head
 1.10.2.1 19-Mar-2016  skrll Sync with HEAD
 1.4 26-Jan-2016  pooka generate privhdrs to new location
 1.3 03-Jul-2013  pooka branches: 1.3.8;
Having a system-supplied function interface to create virt(4) is not
fully useful when the system doesn't supply anything to configure the
interface with. So remove rump_virtif_create(), that functionality
is now taken care of with ifcloner.
 1.2 20-Oct-2009  pooka branches: 1.2.4; 1.2.14; 1.2.24; 1.2.28;
add shmif_create
 1.1 14-Oct-2009  pooka Create rump public interfaces from description tables. This allows
us to control and wrap all entry points from "userspace" into rump.
This in turn is necessary for the upcoming rump cpu scheduler.

For each interface "foo" a public wrapper called "rump_foo" is
created. It calls the internal implementation "rumppriv_foo". In
case foo is to be called from inside of rump kernel space, the
private interface "rumppriv_foo" is used -- the userspace wrapper
prototypes are not even exported into the rump kernel namespace.
Needless to say, the rump kernel internal interfaces are not exported
for users.

Now, three classes of interfaces fight for control of rump:
+ the noble local control interfaces (which this commit addresses)
+ the insidious rump system calls (which are generated from syscalls.master)
+ and the evil vnode interfaces (which are generated from vnode_if.src)
 1.2.28.1 28-Aug-2013  rmind sync with head
 1.2.24.2 03-Dec-2017  jdolecek update from HEAD
 1.2.24.1 20-Aug-2014  tls Rebase to HEAD as of a few days ago.
 1.2.14.1 22-May-2014  yamt sync with head.

for a reference, the tree before this commit was tagged
as yamt-pagecache-tag8.

this commit was splitted into small chunks to avoid
a limitation of cvs. ("Protocol error: too many arguments")
 1.2.4.2 11-Mar-2010  yamt sync with head
 1.2.4.1 20-Oct-2009  yamt file rumpnet.ifspec was added on branch yamt-nfs-mp on 2010-03-11 15:04:38 +0000
 1.3.8.1 19-Mar-2016  skrll Sync with HEAD
 1.6 26-Jan-2016  pooka Put the kernelside rump kernel headers into <rump-sys> instead of
sprinkling them around the faction directories. Avoids having
to add a CPPFLAGS (or several) to pretty much every component
Makefile.

Leave compat headers around in the old locations.

The commit changes some autogenerated files, but I'll fix the
generators shortly and regen.
 1.5 03-Jul-2013  pooka branches: 1.5.8;
regen
 1.4 20-Oct-2009  pooka branches: 1.4.4; 1.4.14; 1.4.24; 1.4.28;
regen
 1.3 15-Oct-2009  pooka regen: scheduling points in rump_pub wrappers
 1.2 14-Oct-2009  pooka regen: put all public interfaces created by ifspec into a rump_pub namespace
 1.1 14-Oct-2009  pooka generate rump local interfaces
 1.4.28.1 28-Aug-2013  rmind sync with head
 1.4.24.2 03-Dec-2017  jdolecek update from HEAD
 1.4.24.1 20-Aug-2014  tls Rebase to HEAD as of a few days ago.
 1.4.14.1 22-May-2014  yamt sync with head.

for a reference, the tree before this commit was tagged
as yamt-pagecache-tag8.

this commit was splitted into small chunks to avoid
a limitation of cvs. ("Protocol error: too many arguments")
 1.4.4.2 11-Mar-2010  yamt sync with head
 1.4.4.1 20-Oct-2009  yamt file rumpnet_if_priv.h was added on branch yamt-nfs-mp on 2010-03-11 15:04:39 +0000
 1.5.8.1 19-Mar-2016  skrll Sync with HEAD
 1.7 26-Jan-2016  pooka regen rump kernel interfaces for header change.
(they were already manually edited for a prior commit, so not much change)
 1.6 26-Jan-2016  pooka Put the kernelside rump kernel headers into <rump-sys> instead of
sprinkling them around the faction directories. Avoids having
to add a CPPFLAGS (or several) to pretty much every component
Makefile.

Leave compat headers around in the old locations.

The commit changes some autogenerated files, but I'll fix the
generators shortly and regen.
 1.5 03-Jul-2013  pooka branches: 1.5.8;
regen
 1.4 20-Oct-2009  pooka branches: 1.4.4; 1.4.14; 1.4.24; 1.4.28;
regen
 1.3 15-Oct-2009  pooka regen: scheduling points in rump_pub wrappers
 1.2 14-Oct-2009  pooka regen: put all public interfaces created by ifspec into a rump_pub namespace
 1.1 14-Oct-2009  pooka generate rump local interfaces
 1.4.28.1 28-Aug-2013  rmind sync with head
 1.4.24.2 03-Dec-2017  jdolecek update from HEAD
 1.4.24.1 20-Aug-2014  tls Rebase to HEAD as of a few days ago.
 1.4.14.1 22-May-2014  yamt sync with head.

for a reference, the tree before this commit was tagged
as yamt-pagecache-tag8.

this commit was splitted into small chunks to avoid
a limitation of cvs. ("Protocol error: too many arguments")
 1.4.4.2 11-Mar-2010  yamt sync with head
 1.4.4.1 20-Oct-2009  yamt file rumpnet_if_wrappers.c was added on branch yamt-nfs-mp on 2010-03-11 15:04:39 +0000
 1.5.8.1 19-Mar-2016  skrll Sync with HEAD
 1.10 20-May-2024  christos regen
 1.9 19-May-2024  christos regen
 1.8 29-Jul-2023  rin rump: Regen again to fix missing __kevent100 symbol.

makerumpsyscalls.sh requires rebuilt rump libraries installed in
/usr/lib or directory specified by its first argument.

Now, new failures observed for ATF after __kevent100 addition are
fixed at least for aarch64.
 1.7 10-Jul-2023  christos Regen
 1.6 27-May-2020  christos regen for lpathconf.
 1.5 22-Sep-2019  christos regen
 1.4 26-Jan-2016  pooka branches: 1.4.18;
Put the kernelside rump kernel headers into <rump-sys> instead of
sprinkling them around the faction directories. Avoids having
to add a CPPFLAGS (or several) to pretty much every component
Makefile.

Leave compat headers around in the old locations.

The commit changes some autogenerated files, but I'll fix the
generators shortly and regen.
 1.3 18-Jun-2015  pooka regen
 1.2 27-Apr-2014  pooka branches: 1.2.2; 1.2.4; 1.2.6; 1.2.10; 1.2.12;
regen
 1.1 27-Apr-2014  pooka Eliminate weak symbols from rump kernel syscall handlers, part 6:

Generate component constructors which establish non-modular syscalls.
 1.2.12.2 19-Mar-2016  skrll Sync with HEAD
 1.2.12.1 22-Sep-2015  skrll Sync with HEAD
 1.2.10.3 03-Dec-2017  jdolecek update from HEAD
 1.2.10.2 20-Aug-2014  tls Rebase to HEAD as of a few days ago.
 1.2.10.1 27-Apr-2014  tls file rumpnet_syscalls.c was added on branch tls-maxphys on 2014-08-20 00:04:42 +0000
 1.2.6.2 10-Aug-2014  tls Rebase.
 1.2.6.1 27-Apr-2014  tls file rumpnet_syscalls.c was added on branch tls-earlyentropy on 2014-08-10 06:56:51 +0000
 1.2.4.2 22-May-2014  yamt sync with head.

for a reference, the tree before this commit was tagged
as yamt-pagecache-tag8.

this commit was splitted into small chunks to avoid
a limitation of cvs. ("Protocol error: too many arguments")
 1.2.4.1 27-Apr-2014  yamt file rumpnet_syscalls.c was added on branch yamt-pagecache on 2014-05-22 11:41:16 +0000
 1.2.2.2 18-May-2014  rmind sync with head
 1.2.2.1 27-Apr-2014  rmind file rumpnet_syscalls.c was added on branch rmind-smpnet on 2014-05-18 17:46:19 +0000
 1.4.18.1 13-Apr-2020  martin Mostly merge changes from HEAD upto 20200411

RSS XML Feed