Date: Wed, 23 Jul 2014 16:27:43 GMT From: dpl@FreeBSD.org To: svn-soc-all@FreeBSD.org Subject: socsvn commit: r271284 - soc2014/dpl/netmap-ipfwjit/sys/netpfil/ipfw Message-ID: <201407231627.s6NGRhC2073698@socsvn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: dpl Date: Wed Jul 23 16:27:43 2014 New Revision: 271284 URL: http://svnweb.FreeBSD.org/socsvn/?view=rev&rev=271284 Log: Taken out the inline type of the functions. Modified: soc2014/dpl/netmap-ipfwjit/sys/netpfil/ipfw/ip_fw_rules.h Modified: soc2014/dpl/netmap-ipfwjit/sys/netpfil/ipfw/ip_fw_rules.h ============================================================================== --- soc2014/dpl/netmap-ipfwjit/sys/netpfil/ipfw/ip_fw_rules.h Wed Jul 23 16:27:02 2014 (r271283) +++ soc2014/dpl/netmap-ipfwjit/sys/netpfil/ipfw/ip_fw_rules.h Wed Jul 23 16:27:43 2014 (r271284) @@ -656,13 +656,13 @@ * Actions executed per-rule. */ -static inline void +static void rule_nop(int *match) { *match = 1; } -static inline void +static void rule_forward_mac(int opcode) { printf("ipfw: opcode %d unimplemented\n", @@ -670,7 +670,7 @@ } -static inline void +static void rule_jail(int * match, u_short offset, uint8_t proto, ipfw_insn *cmd, struct ip_fw_args *args, int ucred_lookup, void *ucred_cache) { /* @@ -693,25 +693,25 @@ #endif } -static inline void +static void rule_recv(int *match, ipfw_insn *cmd, struct mbuf *m, struct ip_fw_chain *chain, uint32_t *tablearg) { *match = iface_match(m->m_pkthdr.rcvif, (ipfw_insn_if *)cmd, chain, tablearg); } -static inline void +static void rule_xmit(int *match, struct ifnet *oif, ipfw_insn *cmd, struct ip_fw_chain *chain, uint32_t *tablearg) { *match = iface_match(oif, (ipfw_insn_if *)cmd, chain, tablearg); } -static inline void +static void rule_via(int *match, struct ifnet *oif, struct mbuf *m, ipfw_insn *cmd, struct ip_fw_chain *chain, uint32_t *tablearg) { *match = iface_match(oif ? oif : m->m_pkthdr.rcvif, (ipfw_insn_if *)cmd, chain, tablearg); } -static inline void +static void rule_macaddr2(int *match, struct ip_fw_args *args, ipfw_insn *cmd) { if (args->eh != NULL) { /* have MAC header */ @@ -729,7 +729,7 @@ } -static inline void +static void rule_mac_type(int *match, struct ip_fw_args *args, ipfw_insn *cmd, int cmdlen, uint16_t etype) { if (args->eh != NULL) { @@ -745,26 +745,26 @@ } -static inline void +static void rule_frag(int *match, u_short offset) { *match = (offset != 0); } -static inline void +static void rule_in(int *match, struct ifnet *oif) { /* "out" is "not in" */ *match = (oif == NULL); } -static inline void +static void rule_layer2(int *match, struct ip_fw_args * args) { *match = (args->eh != NULL); } -static inline void +static void rule_diverted(int *match, struct ip_fw_args * args, ipfw_insn *cmd) { /* For diverted packets, args->rule.info @@ -776,7 +776,7 @@ cmd->arg1 & ((i & IPFW_INFO_IN) ? 1 : 2); } -static inline void +static void rule_proto(int *match, uint8_t proto, ipfw_insn *cmd) { /* @@ -786,7 +786,7 @@ *match = (proto == cmd->arg1); } -static inline void +static void rule_ip_src(int *match, int is_ipv4, ipfw_insn *cmd, struct in_addr *src_ip) { *match = is_ipv4 && @@ -794,7 +794,7 @@ src_ip->s_addr); } -static inline void +static void rule_ip_dst_lookup(int *match, ipfw_insn *cmd, int cmdlen, struct ip_fw_args *args, uint32_t *tablearg, int is_ipv4, int is_ipv6, struct ip *ip, struct in_addr *dst_ip, struct in_addr *src_ip, uint16_t dst_port, uint16_t src_port, u_short offset, uint8_t proto, int ucred_lookup, void *ucred_cache, struct ip_fw_chain *chain) { if (is_ipv4) { @@ -869,7 +869,7 @@ } } -static inline void +static void rule_ip_dst_mask(int *match, int is_ipv4, ipfw_insn *cmd, int cmdlen, struct in_addr *dst_ip, struct in_addr *src_ip) { if (is_ipv4) { @@ -884,7 +884,7 @@ } } -static inline void +static void rule_ip_src_me(int *match, int is_ipv4, int is_ipv6, struct in_addr *src_ip, struct ip_fw_args *args) { if (is_ipv4) { @@ -901,14 +901,14 @@ } #ifdef INET6 -static inline void +static void rule_ip6_src_me(int *match, int is_ipv6, struct ip_fw_args *args) { *match= is_ipv6 && search_ip6_addr_net(&args->f_id.src_ip6); } #endif /* INET6 */ -static inline void +static void rule_ip_src_set(int *match, int is_ipv4, ipfw_insn *cmd, struct ip_fw_args *args) { if (is_ipv4) { @@ -927,7 +927,7 @@ } } -static inline void +static void rule_ip_dst(int *match, int is_ipv4, ipfw_insn *cmd, struct in_addr *dst_ip) { *match = is_ipv4 && @@ -935,7 +935,7 @@ dst_ip->s_addr); } -static inline void +static void rule_ip_dst_me(int *match, struct ip_fw_args *args, int is_ipv4, int is_ipv6, struct in_addr *dst_ip) { if (is_ipv4) { @@ -951,14 +951,14 @@ } #ifdef INET6 -static inline void +static void rule_ip6_dst_me(int *match, struct ip_fw_args *args, int is_ipv6) { *match= is_ipv6 && search_ip6_addr_net(&args->f_id.dst_ip6); } #endif /* INET6 */ -static inline void +static void rule_ip_dstport(int *match, uint8_t proto, u_short offset, ipfw_insn *cmd, int cmdlen, uint16_t dst_port, uint16_t src_port) { /* @@ -981,7 +981,7 @@ } } -static inline void +static void rule_icmptype(int *match, u_short offset, uint8_t proto, void *ulp, ipfw_insn *cmd ) { *match = (offset == 0 && proto==IPPROTO_ICMP && @@ -989,7 +989,7 @@ } #ifdef INET6 -static inline void +static void rule_icmp6type(int *match, u_short offset, int is_ipv6, uint8_t proto, void *ulp, ipfw_insn *cmd) { *match = is_ipv6 && offset == 0 && @@ -1001,7 +1001,7 @@ #endif /* INET6 */ -static inline void +static void rule_ipopt(int *match, int is_ipv4, struct ip *ip, ipfw_insn *cmd) { *match = (is_ipv4 && @@ -1009,14 +1009,14 @@ } -static inline void +static void rule_ipver(int *match, int is_ipv4, ipfw_insn *cmd, struct ip *ip) { *match = (is_ipv4 && cmd->arg1 == ip->ip_v); } -static inline void +static void rule_ipttl(int *match, int is_ipv4, ipfw_insn *cmd, int cmdlen, struct ip *ip, uint16_t iplen) { if (is_ipv4) { /* only for IP packets */ @@ -1042,21 +1042,21 @@ } } -static inline void +static void rule_ipprecedence(int *match, int is_ipv4, ipfw_insn *cmd, struct ip *ip) { *match = (is_ipv4 && (cmd->arg1 == (ip->ip_tos & 0xe0)) ); } -static inline void +static void rule_iptos(int *match, int is_ipv4, ipfw_insn *cmd, struct ip *ip) { *match = (is_ipv4 && flags_match(cmd, ip->ip_tos)); } -static inline void +static void rule_dscp(int *match, int is_ipv4, int is_ipv6, ipfw_insn *cmd, struct ip *ip) { uint32_t *p; @@ -1082,7 +1082,7 @@ *match = *p & (1 << x); } -static inline void +static void rule_tcpdatalen(int *match, uint8_t proto, u_short offset, void *ulp, uint16_t iplen, int cmdlen, ipfw_insn *cmd, struct ip *ip) { if (proto == IPPROTO_TCP && offset == 0) { @@ -1106,14 +1106,14 @@ } } -static inline void +static void rule_tcpflags(int *match, uint8_t proto, u_short offset, ipfw_insn *cmd, void *ulp) { *match = (proto == IPPROTO_TCP && offset == 0 && flags_match(cmd, TCP(ulp)->th_flags)); } -static inline int +static int rule_tcpopts(int *match, u_int hlen, void *ulp, uint8_t proto, u_short offset, ipfw_insn *cmd, struct mbuf *m, struct ip_fw_args *args) { /* @@ -1137,7 +1137,7 @@ return (0); } -static inline void +static void rule_tcpseq(int *match, uint8_t proto, u_short offset, ipfw_insn *cmd, void *ulp) { *match = (proto == IPPROTO_TCP && offset == 0 && @@ -1145,7 +1145,7 @@ TCP(ulp)->th_seq); } -static inline void +static void rule_tcpack(int *match, uint8_t proto, u_short offset, ipfw_insn *cmd, void *ulp) { *match = (proto == IPPROTO_TCP && offset == 0 && @@ -1153,7 +1153,7 @@ TCP(ulp)->th_ack); } -static inline void +static void rule_tcpwin(int *match, uint8_t proto, u_short offset, ipfw_insn *cmd, int cmdlen, void *ulp) { if (proto == IPPROTO_TCP && offset == 0) { @@ -1174,7 +1174,7 @@ } } -static inline void +static void rule_estab(int *match, uint8_t proto, u_short offset, void *ulp) { /* reject packets which have SYN only */ @@ -1184,7 +1184,7 @@ (TH_RST | TH_ACK | TH_SYN)) != TH_SYN); } -static inline void +static void rule_altq(int *match, ipfw_insn *cmd, struct mbuf *m, struct ip *ip) { struct pf_mtag *at; @@ -1216,7 +1216,7 @@ at->hdr = ip; } -static inline void +static void rule_log(int *match, struct ip_fw *f, u_int hlen, struct ip_fw_args *args, struct mbuf *m, struct ifnet *oif, u_short offset, u_short ip6f_mf, uint32_t tablearg, struct ip *ip) { ipfw_log(f, hlen, args, m, @@ -1224,14 +1224,14 @@ *match = 1; } -static inline void +static void rule_prob(int *match, ipfw_insn *cmd) { *match = (random()<((ipfw_insn_u32 *)cmd)->d[0]); return; } -static inline void +static void rule_verrevpath(int *match, struct ifnet *oif, struct mbuf *m, int is_ipv6, struct ip_fw_args *args, struct in_addr *src_ip) { /* Outgoing packets automatically pass/match */ @@ -1247,7 +1247,7 @@ args->f_id.fib))); } -static inline void +static void rule_versrcreach(int *match, u_int hlen, struct ifnet *oif, int is_ipv6, struct ip_fw_args *args, struct in_addr *src_ip) { /* Outgoing packets automatically pass/match */ @@ -1261,7 +1261,7 @@ } /* dpl XXX We could pass pointers to struct in_addr at in_localaddr() */ -static inline void +static void rule_antispoof(int *match, struct ifnet *oif, u_int hlen, int is_ipv4, int is_ipv6, struct in_addr *src_ip, struct ip_fw_args *args, struct mbuf *m) { /* Outgoing packets automatically pass/match */ @@ -1287,7 +1287,7 @@ } #ifdef IPSEC -static inline void +static void rule_ipsec(int *match, struct mbuf *) { *match = (m_tag_find(m, @@ -1296,7 +1296,7 @@ #endif /* IPSEC */ #ifdef INET6 -static inline void +static void rule_ip6_src(int *match, int is_ipv6, struct ip_fw_args *args, ipfw_insn *cmd) { *match = is_ipv6 && @@ -1304,7 +1304,7 @@ &((ipfw_insn_ip6 *)cmd)->addr6); } -static inline void +static void rule_ip6_dst(int *match, int is_ipv6, struct ip_fw_args *args, ipfw_insn *cmd) { *match = is_ipv6 && @@ -1312,7 +1312,7 @@ &((ipfw_insn_ip6 *)cmd)->addr6); } -static inline void +static void rule_ip6_dst_mask(int *match, struct ip_fw_args *args, ipfw_insn *cmd, int cmdlen, int is_ipv6) { if (is_ipv6) { @@ -1336,7 +1336,7 @@ } } -static inline void +static void rule_flow6id(int *match, int is_ipv6, struct ip_fw_args *args, ipfw_insn *cmd) { *match = is_ipv6 && @@ -1344,27 +1344,27 @@ (ipfw_insn_u32 *) cmd); } -static inline void +static void rule_ext_hdr(int *match, int is_ipv6, uint16_t ext_hd, ipfw_insn *cmd) { *match = is_ipv6 && (ext_hd & ((ipfw_insn *) cmd)->arg1); } -static inline void +static void rule_ip6(int *match, int is_ipv6) { *match = is_ipv6; } #endif /* INET6 */ -static inline void +static void rule_ip4(int *match, int is_ipv4) { *match = is_ipv4; } -static inline void +static void rule_tag(int *match, ipfw_insn *cmd, struct mbuf *m, uint32_t tablearg) { struct m_tag *mtag; @@ -1395,14 +1395,14 @@ } } -static inline void +static void rule_fib(int *match, struct ip_fw_args *args, ipfw_insn *cmd) { if (args->f_id.fib == cmd->arg1) *match = 1; } -static inline void +static void rule_sockarg(int *match, int is_ipv6, uint8_t proto, struct in_addr *dst_ip, struct in_addr *src_ip, uint16_t dst_port, uint16_t src_port, struct ip_fw_args *args, uint32_t *tablearg) { #ifndef USERSPACE /* not supported in userspace */ @@ -1449,7 +1449,7 @@ #endif /* !USERSPACE */ } -static inline void +static void rule_tagged(int *match, ipfw_insn *cmd, int cmdlen, struct mbuf *m, uint32_t tablearg) { struct m_tag *mtag; @@ -1483,7 +1483,7 @@ /* * The second sets of opcodes. They represent the actions of a rule. */ -static inline void +static void rule_keep_state(int *match, struct ip_fw *f, ipfw_insn *cmd, struct ip_fw_args *args, uint32_t tablearg, int *retval, int *l, int *done) { if (ipfw_install_state(f, @@ -1496,7 +1496,7 @@ *match = 1; } -static inline void +static void rule_check_state(int *match, int *dyn_dir, ipfw_dyn_rule *q, struct ip_fw_args *args, uint8_t proto, void *ulp, int pktlen, struct ip_fw *f, int *f_pos, struct ip_fw_chain *chain, ipfw_insn *cmd, int *cmdlen, int *l) { /* @@ -1545,7 +1545,7 @@ *match = 1; } -static inline void +static void rule_accept(int *retval, int *l, int *done) { *retval = 0; /* accept */ @@ -1553,7 +1553,7 @@ *done = 1; /* exit outer loop */ } -static inline void +static void rule_queue(struct ip_fw_args *args, int f_pos, struct ip_fw_chain *chain, ipfw_insn *cmd, uint32_t tablearg, int *retval, int *l, int *done) { set_match(args, f_pos, chain); @@ -1567,7 +1567,7 @@ *done = 1; /* exit outer loop */ } -static inline void +static void rule_tee(int *l, int *done, int *retval, ipfw_insn *cmd, struct ip_fw_args *args, int f_pos, uint32_t tablearg, struct ip_fw_chain *chain) { if (args->eh) /* not on layer 2 */ @@ -1581,14 +1581,14 @@ args->rule.info = IP_FW_ARG_TABLEARG(cmd->arg1); } -static inline void +static void rule_count(int *l, struct ip_fw *f, int pktlen) { IPFW_INC_RULE_COUNTER(f, pktlen); *l = 0; /* exit inner loop */ } -static inline void +static void rule_skipto(int *match, int *l, ipfw_insn *cmd, int *cmdlen, int *skip_or, int *f_pos, struct ip_fw *f, int pktlen, struct ip_fw_chain *chain, uint32_t tablearg) { IPFW_INC_RULE_COUNTER(f, pktlen); @@ -1613,7 +1613,7 @@ *skip_or = 0; } -static inline void +static void rule_callreturn(ipfw_insn *cmd, struct mbuf *m, struct ip_fw *f, struct ip_fw_chain *chain, uint32_t tablearg, int pktlen, int *skip_or, int *cmdlen, int *f_pos, int *l) { /* @@ -1710,7 +1710,7 @@ #undef IS_RETURN } -static inline void +static void rule_reject(u_int hlen, int is_ipv4, u_short offset, uint8_t proto, void *ulp, struct mbuf *m, struct in_addr *dst_ip, struct ip_fw_args *args, ipfw_insn *cmd, uint16_t iplen, struct ip *ip) { /* @@ -1729,7 +1729,7 @@ } #ifdef INET6 -static inline void +static void rule_unreach6(u_int hlen, int is_ipv6, u_short offset, uint8_t proto, uint8_t icmp6_type, struct mbuf *m, struct ip_fw_args *args, ipfw_insn *cmd, struct ip *ip) { if (hlen > 0 && is_ipv6 && @@ -1747,7 +1747,7 @@ #endif /* INET6 */ -static inline void +static void rule_deny(int *l, int *done, int *retval) { *retval = IP_FW_DENY; @@ -1755,7 +1755,7 @@ *done = 1; /* exit outer loop */ } -static inline void +static void rule_forward_ip(struct ip_fw_args *args, ipfw_dyn_rule *q, struct ip_fw *f, int dyn_dir, ipfw_insn *cmd, uint32_t tablearg, int *retval, int *l, int *done) { if (args->eh) /* not valid on layer2 pkts */ @@ -1780,7 +1780,7 @@ } #ifdef INET6 -static inline void +static void rule_forward_ip6(struct ip_fw_args *args, ipfw_dyn_rule *q, struct ip_fw *f, int dyn_dir, ipfw_insn *cmd, int *retval, int *l, int *done) { if (args->eh) /* not valid on layer2 pkts */ @@ -1798,7 +1798,7 @@ } #endif /* INET6 */ -static inline void +static void rule_ngtee(struct ip_fw_args *args, int f_pos, struct ip_fw_chain *chain, ipfw_insn *cmd, uint32_t tablearg, int *retval, int *l, int *done) { set_match(args, f_pos, chain); @@ -1811,7 +1811,7 @@ *done = 1; /* exit outer loop */ } -static inline void +static void rule_setfib(struct ip_fw *f, int pktlen, uint32_t tablearg, ipfw_insn *cmd, struct mbuf *m, struct ip_fw_args *args, int *l) { uint32_t fib; @@ -1825,7 +1825,7 @@ *l = 0; /* exit inner loop */ } -static inline void +static void rule_setdscp(ipfw_insn *cmd, struct ip *ip, int is_ipv4, int is_ipv6, uint32_t tablearg, struct ip_fw *f, int pktlen, int *l) { uint16_t code; @@ -1852,7 +1852,7 @@ IPFW_INC_RULE_COUNTER(f, pktlen); } -static inline void +static void rule_nat(struct ip_fw_args *args, int f_pos, struct ip_fw_chain *chain, ipfw_insn *cmd, struct mbuf *m, uint32_t tablearg, int *retval, int *done, int *l) { *l = 0; /* exit inner loop */ @@ -1886,7 +1886,7 @@ *retval = ipfw_nat_ptr(args, t, m); } -static inline void rule_reass(struct ip_fw *f, int f_pos, struct ip_fw_chain *chain, int pktlen, struct ip *ip, struct ip_fw_args *args, struct mbuf *m, int *retval, int *done, int *l) +static void rule_reass(struct ip_fw *f, int f_pos, struct ip_fw_chain *chain, int pktlen, struct ip *ip, struct ip_fw_args *args, struct mbuf *m, int *retval, int *done, int *l) { int ip_off;
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201407231627.s6NGRhC2073698>