2 * SPDX-License-Identifier: BSD-2-Clause
4 * Copyright (c) 2007-2009 Robert N. M. Watson
5 * Copyright (c) 2010-2011 Juniper Networks, Inc.
8 * This software was developed by Robert N. M. Watson under contract
9 * to Juniper Networks, Inc.
11 * Redistribution and use in source and binary forms, with or without
12 * modification, are permitted provided that the following conditions
14 * 1. Redistributions of source code must retain the above copyright
15 * notice, this list of conditions and the following disclaimer.
16 * 2. Redistributions in binary form must reproduce the above copyright
17 * notice, this list of conditions and the following disclaimer in the
18 * documentation and/or other materials provided with the distribution.
20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 #include <sys/cdefs.h>
35 * netisr is a packet dispatch service, allowing synchronous (directly
36 * dispatched) and asynchronous (deferred dispatch) processing of packets by
37 * registered protocol handlers. Callers pass a protocol identifier and
38 * packet to netisr, along with a direct dispatch hint, and work will either
39 * be immediately processed by the registered handler, or passed to a
40 * software interrupt (SWI) thread for deferred dispatch. Callers will
41 * generally select one or the other based on:
43 * - Whether directly dispatching a netisr handler lead to code reentrance or
44 * lock recursion, such as entering the socket code from the socket code.
45 * - Whether directly dispatching a netisr handler lead to recursive
46 * processing, such as when decapsulating several wrapped layers of tunnel
47 * information (IPSEC within IPSEC within ...).
49 * Maintaining ordering for protocol streams is a critical design concern.
50 * Enforcing ordering limits the opportunity for concurrency, but maintains
51 * the strong ordering requirements found in some protocols, such as TCP. Of
52 * related concern is CPU affinity--it is desirable to process all data
53 * associated with a particular stream on the same CPU over time in order to
54 * avoid acquiring locks associated with the connection on different CPUs,
55 * keep connection data in one cache, and to generally encourage associated
56 * user threads to live on the same CPU as the stream. It's also desirable
57 * to avoid lock migration and contention where locks are associated with
60 * netisr supports several policy variations, represented by the
61 * NETISR_POLICY_* constants, allowing protocols to play various roles in
62 * identifying flows, assigning work to CPUs, etc. These are described in
67 #include "opt_device_polling.h"
69 #include <sys/param.h>
71 #include <sys/kernel.h>
72 #include <sys/kthread.h>
73 #include <sys/malloc.h>
74 #include <sys/interrupt.h>
77 #include <sys/mutex.h>
80 #include <sys/rmlock.h>
81 #include <sys/sched.h>
83 #include <sys/socket.h>
84 #include <sys/sysctl.h>
85 #include <sys/systm.h>
91 #define _WANT_NETISR_INTERNAL /* Enable definitions from netisr_internal.h */
93 #include <net/if_var.h>
94 #include <net/netisr.h>
95 #include <net/netisr_internal.h>
99 * Synchronize use and modification of the registered netisr data structures;
100 * acquire a read lock while modifying the set of registered protocols to
101 * prevent partially registered or unregistered protocols from being run.
103 * The following data structures and fields are protected by this lock:
105 * - The netisr_proto array, including all fields of struct netisr_proto.
106 * - The nws array, including all fields of struct netisr_worker.
107 * - The nws_array array.
109 * Note: the NETISR_LOCKING define controls whether read locks are acquired
110 * in packet processing paths requiring netisr registration stability. This
111 * is disabled by default as it can lead to measurable performance
112 * degradation even with rmlocks (3%-6% for loopback ping-pong traffic), and
113 * because netisr registration and unregistration is extremely rare at
114 * runtime. If it becomes more common, this decision should be revisited.
116 * XXXRW: rmlocks don't support assertions.
118 static struct rmlock netisr_rmlock;
119 #define NETISR_LOCK_INIT() rm_init_flags(&netisr_rmlock, "netisr", \
121 #define NETISR_LOCK_ASSERT()
122 #define NETISR_RLOCK(tracker) rm_rlock(&netisr_rmlock, (tracker))
123 #define NETISR_RUNLOCK(tracker) rm_runlock(&netisr_rmlock, (tracker))
124 #define NETISR_WLOCK() rm_wlock(&netisr_rmlock)
125 #define NETISR_WUNLOCK() rm_wunlock(&netisr_rmlock)
126 /* #define NETISR_LOCKING */
128 static SYSCTL_NODE(_net, OID_AUTO, isr, CTLFLAG_RW | CTLFLAG_MPSAFE, 0,
132 * Three global direct dispatch policies are supported:
134 * NETISR_DISPATCH_DEFERRED: All work is deferred for a netisr, regardless of
135 * context (may be overridden by protocols).
137 * NETISR_DISPATCH_HYBRID: If the executing context allows direct dispatch,
138 * and we're running on the CPU the work would be performed on, then direct
139 * dispatch it if it wouldn't violate ordering constraints on the workstream.
141 * NETISR_DISPATCH_DIRECT: If the executing context allows direct dispatch,
142 * always direct dispatch. (The default.)
144 * Notice that changing the global policy could lead to short periods of
145 * misordered processing, but this is considered acceptable as compared to
146 * the complexity of enforcing ordering during policy changes. Protocols can
147 * override the global policy (when they're not doing that, they select
148 * NETISR_DISPATCH_DEFAULT).
150 #define NETISR_DISPATCH_POLICY_DEFAULT NETISR_DISPATCH_DIRECT
151 #define NETISR_DISPATCH_POLICY_MAXSTR 20 /* Used for temporary buffers. */
152 static u_int netisr_dispatch_policy = NETISR_DISPATCH_POLICY_DEFAULT;
153 static int sysctl_netisr_dispatch_policy(SYSCTL_HANDLER_ARGS);
154 SYSCTL_PROC(_net_isr, OID_AUTO, dispatch,
155 CTLTYPE_STRING | CTLFLAG_RWTUN | CTLFLAG_NEEDGIANT,
156 0, 0, sysctl_netisr_dispatch_policy, "A",
157 "netisr dispatch policy");
160 * Allow the administrator to limit the number of threads (CPUs) to use for
161 * netisr. We don't check netisr_maxthreads before creating the thread for
162 * CPU 0. This must be set at boot. We will create at most one thread per CPU.
163 * By default we initialize this to 1 which would assign just 1 cpu (cpu0) and
164 * therefore only 1 workstream. If set to -1, netisr would use all cpus
165 * (mp_ncpus) and therefore would have those many workstreams. One workstream
168 static int netisr_maxthreads = 1; /* Max number of threads. */
169 SYSCTL_INT(_net_isr, OID_AUTO, maxthreads, CTLFLAG_RDTUN,
170 &netisr_maxthreads, 0,
171 "Use at most this many CPUs for netisr processing");
173 static int netisr_bindthreads = 0; /* Bind threads to CPUs. */
174 SYSCTL_INT(_net_isr, OID_AUTO, bindthreads, CTLFLAG_RDTUN,
175 &netisr_bindthreads, 0, "Bind netisr threads to CPUs.");
178 * Limit per-workstream mbuf queue limits s to at most net.isr.maxqlimit,
179 * both for initial configuration and later modification using
180 * netisr_setqlimit().
182 #define NETISR_DEFAULT_MAXQLIMIT 10240
183 static u_int netisr_maxqlimit = NETISR_DEFAULT_MAXQLIMIT;
184 SYSCTL_UINT(_net_isr, OID_AUTO, maxqlimit, CTLFLAG_RDTUN,
185 &netisr_maxqlimit, 0,
186 "Maximum netisr per-protocol, per-CPU queue depth.");
189 * The default per-workstream mbuf queue limit for protocols that don't
190 * initialize the nh_qlimit field of their struct netisr_handler. If this is
191 * set above netisr_maxqlimit, we truncate it to the maximum during boot.
193 #define NETISR_DEFAULT_DEFAULTQLIMIT 256
194 static u_int netisr_defaultqlimit = NETISR_DEFAULT_DEFAULTQLIMIT;
195 SYSCTL_UINT(_net_isr, OID_AUTO, defaultqlimit, CTLFLAG_RDTUN,
196 &netisr_defaultqlimit, 0,
197 "Default netisr per-protocol, per-CPU queue limit if not set by protocol");
200 * Store and export the compile-time constant NETISR_MAXPROT limit on the
201 * number of protocols that can register with netisr at a time. This is
202 * required for crashdump analysis, as it sizes netisr_proto[].
204 static u_int netisr_maxprot = NETISR_MAXPROT;
205 SYSCTL_UINT(_net_isr, OID_AUTO, maxprot, CTLFLAG_RD,
207 "Compile-time limit on the number of protocols supported by netisr.");
210 * The netisr_proto array describes all registered protocols, indexed by
211 * protocol number. See netisr_internal.h for more details.
213 static struct netisr_proto netisr_proto[NETISR_MAXPROT];
217 * The netisr_enable array describes a per-VNET flag for registered
218 * protocols on whether this netisr is active in this VNET or not.
219 * netisr_register() will automatically enable the netisr for the
220 * default VNET and all currently active instances.
221 * netisr_unregister() will disable all active VNETs, including vnet0.
222 * Individual network stack instances can be enabled/disabled by the
223 * netisr_(un)register _vnet() functions.
224 * With this we keep the one netisr_proto per protocol but add a
225 * mechanism to stop netisr processing for vnet teardown.
226 * Apart from that we expect a VNET to always be enabled.
228 VNET_DEFINE_STATIC(u_int, netisr_enable[NETISR_MAXPROT]);
229 #define V_netisr_enable VNET(netisr_enable)
233 * Per-CPU workstream data. See netisr_internal.h for more details.
235 DPCPU_DEFINE(struct netisr_workstream, nws);
238 * Map contiguous values between 0 and nws_count into CPU IDs appropriate for
239 * accessing workstreams. This allows constructions of the form
240 * DPCPU_ID_GET(nws_array[arbitraryvalue % nws_count], nws).
242 static u_int nws_array[MAXCPU];
245 * Number of registered workstreams. Will be at most the number of running
246 * CPUs once fully started.
248 static u_int nws_count;
249 SYSCTL_UINT(_net_isr, OID_AUTO, numthreads, CTLFLAG_RD,
250 &nws_count, 0, "Number of extant netisr threads.");
253 * Synchronization for each workstream: a mutex protects all mutable fields
254 * in each stream, including per-protocol state (mbuf queues). The SWI is
255 * woken up if asynchronous dispatch is required.
257 #define NWS_LOCK(s) mtx_lock(&(s)->nws_mtx)
258 #define NWS_LOCK_ASSERT(s) mtx_assert(&(s)->nws_mtx, MA_OWNED)
259 #define NWS_UNLOCK(s) mtx_unlock(&(s)->nws_mtx)
260 #define NWS_SIGNAL(s) swi_sched((s)->nws_swi_cookie, 0)
263 * Utility routines for protocols that implement their own mapping of flows
267 netisr_get_cpucount(void)
274 netisr_get_cpuid(u_int cpunumber)
277 return (nws_array[cpunumber % nws_count]);
281 * The default implementation of flow -> CPU ID mapping.
283 * Non-static so that protocols can use it to map their own work to specific
284 * CPUs in a manner consistent to netisr for affinity purposes.
287 netisr_default_flow2cpu(u_int flowid)
290 return (nws_array[flowid % nws_count]);
294 * Dispatch tunable and sysctl configuration.
296 struct netisr_dispatch_table_entry {
298 const char *ndte_policy_str;
300 static const struct netisr_dispatch_table_entry netisr_dispatch_table[] = {
301 { NETISR_DISPATCH_DEFAULT, "default" },
302 { NETISR_DISPATCH_DEFERRED, "deferred" },
303 { NETISR_DISPATCH_HYBRID, "hybrid" },
304 { NETISR_DISPATCH_DIRECT, "direct" },
308 netisr_dispatch_policy_to_str(u_int dispatch_policy, char *buffer,
311 const struct netisr_dispatch_table_entry *ndtep;
316 for (i = 0; i < nitems(netisr_dispatch_table); i++) {
317 ndtep = &netisr_dispatch_table[i];
318 if (ndtep->ndte_policy == dispatch_policy) {
319 str = ndtep->ndte_policy_str;
323 snprintf(buffer, buflen, "%s", str);
327 netisr_dispatch_policy_from_str(const char *str, u_int *dispatch_policyp)
329 const struct netisr_dispatch_table_entry *ndtep;
332 for (i = 0; i < nitems(netisr_dispatch_table); i++) {
333 ndtep = &netisr_dispatch_table[i];
334 if (strcmp(ndtep->ndte_policy_str, str) == 0) {
335 *dispatch_policyp = ndtep->ndte_policy;
343 sysctl_netisr_dispatch_policy(SYSCTL_HANDLER_ARGS)
345 char tmp[NETISR_DISPATCH_POLICY_MAXSTR];
347 u_int dispatch_policy;
350 netisr_dispatch_policy_to_str(netisr_dispatch_policy, tmp,
353 * netisr is initialised very early during the boot when malloc isn't
354 * available yet so we can't use sysctl_handle_string() to process
355 * any non-default value that was potentially set via loader.
357 if (req->newptr != NULL) {
358 len = req->newlen - req->newidx;
359 if (len >= NETISR_DISPATCH_POLICY_MAXSTR)
361 error = SYSCTL_IN(req, tmp, len);
364 error = netisr_dispatch_policy_from_str(tmp,
367 dispatch_policy == NETISR_DISPATCH_DEFAULT)
370 netisr_dispatch_policy = dispatch_policy;
373 error = sysctl_handle_string(oidp, tmp, sizeof(tmp), req);
379 * Register a new netisr handler, which requires initializing per-protocol
380 * fields for each workstream. All netisr work is briefly suspended while
381 * the protocol is installed.
384 netisr_register(const struct netisr_handler *nhp)
386 VNET_ITERATOR_DECL(vnet_iter);
387 struct netisr_work *npwp;
391 proto = nhp->nh_proto;
395 * Test that the requested registration is valid.
397 KASSERT(nhp->nh_name != NULL,
398 ("%s: nh_name NULL for %u", __func__, proto));
399 KASSERT(nhp->nh_handler != NULL,
400 ("%s: nh_handler NULL for %s", __func__, name));
401 KASSERT(nhp->nh_policy == NETISR_POLICY_SOURCE ||
402 nhp->nh_policy == NETISR_POLICY_FLOW ||
403 nhp->nh_policy == NETISR_POLICY_CPU,
404 ("%s: unsupported nh_policy %u for %s", __func__,
405 nhp->nh_policy, name));
406 KASSERT(nhp->nh_policy == NETISR_POLICY_FLOW ||
407 nhp->nh_m2flow == NULL,
408 ("%s: nh_policy != FLOW but m2flow defined for %s", __func__,
410 KASSERT(nhp->nh_policy == NETISR_POLICY_CPU || nhp->nh_m2cpuid == NULL,
411 ("%s: nh_policy != CPU but m2cpuid defined for %s", __func__,
413 KASSERT(nhp->nh_policy != NETISR_POLICY_CPU || nhp->nh_m2cpuid != NULL,
414 ("%s: nh_policy == CPU but m2cpuid not defined for %s", __func__,
416 KASSERT(nhp->nh_dispatch == NETISR_DISPATCH_DEFAULT ||
417 nhp->nh_dispatch == NETISR_DISPATCH_DEFERRED ||
418 nhp->nh_dispatch == NETISR_DISPATCH_HYBRID ||
419 nhp->nh_dispatch == NETISR_DISPATCH_DIRECT,
420 ("%s: invalid nh_dispatch (%u)", __func__, nhp->nh_dispatch));
422 KASSERT(proto < NETISR_MAXPROT,
423 ("%s(%u, %s): protocol too big", __func__, proto, name));
426 * Test that no existing registration exists for this protocol.
429 KASSERT(netisr_proto[proto].np_name == NULL,
430 ("%s(%u, %s): name present", __func__, proto, name));
431 KASSERT(netisr_proto[proto].np_handler == NULL,
432 ("%s(%u, %s): handler present", __func__, proto, name));
434 netisr_proto[proto].np_name = name;
435 netisr_proto[proto].np_handler = nhp->nh_handler;
436 netisr_proto[proto].np_m2flow = nhp->nh_m2flow;
437 netisr_proto[proto].np_m2cpuid = nhp->nh_m2cpuid;
438 netisr_proto[proto].np_drainedcpu = nhp->nh_drainedcpu;
439 if (nhp->nh_qlimit == 0)
440 netisr_proto[proto].np_qlimit = netisr_defaultqlimit;
441 else if (nhp->nh_qlimit > netisr_maxqlimit) {
442 printf("%s: %s requested queue limit %u capped to "
443 "net.isr.maxqlimit %u\n", __func__, name, nhp->nh_qlimit,
445 netisr_proto[proto].np_qlimit = netisr_maxqlimit;
447 netisr_proto[proto].np_qlimit = nhp->nh_qlimit;
448 netisr_proto[proto].np_policy = nhp->nh_policy;
449 netisr_proto[proto].np_dispatch = nhp->nh_dispatch;
451 npwp = &(DPCPU_ID_PTR(i, nws))->nws_work[proto];
452 bzero(npwp, sizeof(*npwp));
453 npwp->nw_qlimit = netisr_proto[proto].np_qlimit;
458 * Test that we are in vnet0 and have a curvnet set.
460 KASSERT(curvnet != NULL, ("%s: curvnet is NULL", __func__));
461 KASSERT(IS_DEFAULT_VNET(curvnet), ("%s: curvnet %p is not vnet0 %p",
462 __func__, curvnet, vnet0));
463 VNET_LIST_RLOCK_NOSLEEP();
464 VNET_FOREACH(vnet_iter) {
465 CURVNET_SET(vnet_iter);
466 V_netisr_enable[proto] = 1;
469 VNET_LIST_RUNLOCK_NOSLEEP();
475 * Clear drop counters across all workstreams for a protocol.
478 netisr_clearqdrops(const struct netisr_handler *nhp)
480 struct netisr_work *npwp;
486 proto = nhp->nh_proto;
490 KASSERT(proto < NETISR_MAXPROT,
491 ("%s(%u): protocol too big for %s", __func__, proto, name));
494 KASSERT(netisr_proto[proto].np_handler != NULL,
495 ("%s(%u): protocol not registered for %s", __func__, proto,
499 npwp = &(DPCPU_ID_PTR(i, nws))->nws_work[proto];
506 * Query current drop counters across all workstreams for a protocol.
509 netisr_getqdrops(const struct netisr_handler *nhp, u_int64_t *qdropp)
511 struct netisr_work *npwp;
512 struct rm_priotracker tracker;
519 proto = nhp->nh_proto;
523 KASSERT(proto < NETISR_MAXPROT,
524 ("%s(%u): protocol too big for %s", __func__, proto, name));
526 NETISR_RLOCK(&tracker);
527 KASSERT(netisr_proto[proto].np_handler != NULL,
528 ("%s(%u): protocol not registered for %s", __func__, proto,
532 npwp = &(DPCPU_ID_PTR(i, nws))->nws_work[proto];
533 *qdropp += npwp->nw_qdrops;
535 NETISR_RUNLOCK(&tracker);
539 * Query current per-workstream queue limit for a protocol.
542 netisr_getqlimit(const struct netisr_handler *nhp, u_int *qlimitp)
544 struct rm_priotracker tracker;
550 proto = nhp->nh_proto;
554 KASSERT(proto < NETISR_MAXPROT,
555 ("%s(%u): protocol too big for %s", __func__, proto, name));
557 NETISR_RLOCK(&tracker);
558 KASSERT(netisr_proto[proto].np_handler != NULL,
559 ("%s(%u): protocol not registered for %s", __func__, proto,
561 *qlimitp = netisr_proto[proto].np_qlimit;
562 NETISR_RUNLOCK(&tracker);
566 * Update the queue limit across per-workstream queues for a protocol. We
567 * simply change the limits, and don't drain overflowed packets as they will
568 * (hopefully) take care of themselves shortly.
571 netisr_setqlimit(const struct netisr_handler *nhp, u_int qlimit)
573 struct netisr_work *npwp;
579 if (qlimit > netisr_maxqlimit)
582 proto = nhp->nh_proto;
586 KASSERT(proto < NETISR_MAXPROT,
587 ("%s(%u): protocol too big for %s", __func__, proto, name));
590 KASSERT(netisr_proto[proto].np_handler != NULL,
591 ("%s(%u): protocol not registered for %s", __func__, proto,
594 netisr_proto[proto].np_qlimit = qlimit;
596 npwp = &(DPCPU_ID_PTR(i, nws))->nws_work[proto];
597 npwp->nw_qlimit = qlimit;
604 * Drain all packets currently held in a particular protocol work queue.
607 netisr_drain_proto(struct netisr_work *npwp)
612 * We would assert the lock on the workstream but it's not passed in.
614 while ((m = npwp->nw_head) != NULL) {
615 npwp->nw_head = m->m_nextpkt;
617 if (npwp->nw_head == NULL)
618 npwp->nw_tail = NULL;
622 KASSERT(npwp->nw_tail == NULL, ("%s: tail", __func__));
623 KASSERT(npwp->nw_len == 0, ("%s: len", __func__));
627 * Remove the registration of a network protocol, which requires clearing
628 * per-protocol fields across all workstreams, including freeing all mbufs in
629 * the queues at time of unregister. All work in netisr is briefly suspended
630 * while this takes place.
633 netisr_unregister(const struct netisr_handler *nhp)
635 VNET_ITERATOR_DECL(vnet_iter);
636 struct netisr_work *npwp;
642 proto = nhp->nh_proto;
646 KASSERT(proto < NETISR_MAXPROT,
647 ("%s(%u): protocol too big for %s", __func__, proto, name));
650 KASSERT(netisr_proto[proto].np_handler != NULL,
651 ("%s(%u): protocol not registered for %s", __func__, proto,
655 VNET_LIST_RLOCK_NOSLEEP();
656 VNET_FOREACH(vnet_iter) {
657 CURVNET_SET(vnet_iter);
658 V_netisr_enable[proto] = 0;
661 VNET_LIST_RUNLOCK_NOSLEEP();
664 netisr_proto[proto].np_name = NULL;
665 netisr_proto[proto].np_handler = NULL;
666 netisr_proto[proto].np_m2flow = NULL;
667 netisr_proto[proto].np_m2cpuid = NULL;
668 netisr_proto[proto].np_qlimit = 0;
669 netisr_proto[proto].np_policy = 0;
671 npwp = &(DPCPU_ID_PTR(i, nws))->nws_work[proto];
672 netisr_drain_proto(npwp);
673 bzero(npwp, sizeof(*npwp));
680 netisr_register_vnet(const struct netisr_handler *nhp)
684 proto = nhp->nh_proto;
686 KASSERT(curvnet != NULL, ("%s: curvnet is NULL", __func__));
687 KASSERT(proto < NETISR_MAXPROT,
688 ("%s(%u): protocol too big for %s", __func__, proto, nhp->nh_name));
690 KASSERT(netisr_proto[proto].np_handler != NULL,
691 ("%s(%u): protocol not registered for %s", __func__, proto,
694 V_netisr_enable[proto] = 1;
699 netisr_drain_proto_vnet(struct vnet *vnet, u_int proto)
701 struct netisr_workstream *nwsp;
702 struct netisr_work *npwp;
703 struct mbuf *m, *mp, *n, *ne;
706 KASSERT(vnet != NULL, ("%s: vnet is NULL", __func__));
707 NETISR_LOCK_ASSERT();
710 nwsp = DPCPU_ID_PTR(i, nws);
711 if (nwsp->nws_intr_event == NULL)
713 npwp = &nwsp->nws_work[proto];
717 * Rather than dissecting and removing mbufs from the middle
718 * of the chain, we build a new chain if the packet stays and
719 * update the head and tail pointers at the end. All packets
720 * matching the given vnet are freed.
727 mp->m_nextpkt = NULL;
728 if (mp->m_pkthdr.rcvif->if_vnet != vnet) {
737 /* This is a packet in the selected vnet. Free it. */
748 netisr_unregister_vnet(const struct netisr_handler *nhp)
752 proto = nhp->nh_proto;
754 KASSERT(curvnet != NULL, ("%s: curvnet is NULL", __func__));
755 KASSERT(proto < NETISR_MAXPROT,
756 ("%s(%u): protocol too big for %s", __func__, proto, nhp->nh_name));
758 KASSERT(netisr_proto[proto].np_handler != NULL,
759 ("%s(%u): protocol not registered for %s", __func__, proto,
762 V_netisr_enable[proto] = 0;
764 netisr_drain_proto_vnet(curvnet, proto);
770 * Compose the global and per-protocol policies on dispatch, and return the
771 * dispatch policy to use.
774 netisr_get_dispatch(struct netisr_proto *npp)
778 * Protocol-specific configuration overrides the global default.
780 if (npp->np_dispatch != NETISR_DISPATCH_DEFAULT)
781 return (npp->np_dispatch);
782 return (netisr_dispatch_policy);
786 * Look up the workstream given a packet and source identifier. Do this by
787 * checking the protocol's policy, and optionally call out to the protocol
788 * for assistance if required.
791 netisr_select_cpuid(struct netisr_proto *npp, u_int dispatch_policy,
792 uintptr_t source, struct mbuf *m, u_int *cpuidp)
797 NETISR_LOCK_ASSERT();
800 * In the event we have only one worker, shortcut and deliver to it
801 * without further ado.
803 if (nws_count == 1) {
804 *cpuidp = nws_array[0];
809 * What happens next depends on the policy selected by the protocol.
810 * If we want to support per-interface policies, we should do that
813 policy = npp->np_policy;
814 if (policy == NETISR_POLICY_CPU) {
815 m = npp->np_m2cpuid(m, source, cpuidp);
820 * It's possible for a protocol not to have a good idea about
821 * where to process a packet, in which case we fall back on
822 * the netisr code to decide. In the hybrid case, return the
823 * current CPU ID, which will force an immediate direct
824 * dispatch. In the queued case, fall back on the SOURCE
827 if (*cpuidp != NETISR_CPUID_NONE) {
828 *cpuidp = netisr_get_cpuid(*cpuidp);
831 if (dispatch_policy == NETISR_DISPATCH_HYBRID) {
832 *cpuidp = netisr_get_cpuid(curcpu);
835 policy = NETISR_POLICY_SOURCE;
838 if (policy == NETISR_POLICY_FLOW) {
839 if (M_HASHTYPE_GET(m) == M_HASHTYPE_NONE &&
840 npp->np_m2flow != NULL) {
841 m = npp->np_m2flow(m, source);
845 if (M_HASHTYPE_GET(m) != M_HASHTYPE_NONE) {
847 netisr_default_flow2cpu(m->m_pkthdr.flowid);
850 policy = NETISR_POLICY_SOURCE;
853 KASSERT(policy == NETISR_POLICY_SOURCE,
854 ("%s: invalid policy %u for %s", __func__, npp->np_policy,
857 MPASS((m->m_pkthdr.csum_flags & CSUM_SND_TAG) == 0);
858 ifp = m->m_pkthdr.rcvif;
860 *cpuidp = nws_array[(ifp->if_index + source) % nws_count];
862 *cpuidp = nws_array[source % nws_count];
867 * Process packets associated with a workstream and protocol. For reasons of
868 * fairness, we process up to one complete netisr queue at a time, moving the
869 * queue to a stack-local queue for processing, but do not loop refreshing
870 * from the global queue. The caller is responsible for deciding whether to
871 * loop, and for setting the NWS_RUNNING flag. The passed workstream will be
872 * locked on entry and relocked before return, but will be released while
873 * processing. The number of packets processed is returned.
876 netisr_process_workstream_proto(struct netisr_workstream *nwsp, u_int proto)
878 struct netisr_work local_npw, *npwp;
882 NETISR_LOCK_ASSERT();
883 NWS_LOCK_ASSERT(nwsp);
885 KASSERT(nwsp->nws_flags & NWS_RUNNING,
886 ("%s(%u): not running", __func__, proto));
887 KASSERT(proto >= 0 && proto < NETISR_MAXPROT,
888 ("%s(%u): invalid proto\n", __func__, proto));
890 npwp = &nwsp->nws_work[proto];
891 if (npwp->nw_len == 0)
895 * Move the global work queue to a thread-local work queue.
897 * Notice that this means the effective maximum length of the queue
898 * is actually twice that of the maximum queue length specified in
899 * the protocol registration call.
901 handled = npwp->nw_len;
903 npwp->nw_head = NULL;
904 npwp->nw_tail = NULL;
906 nwsp->nws_pendingbits &= ~(1 << proto);
908 while ((m = local_npw.nw_head) != NULL) {
909 local_npw.nw_head = m->m_nextpkt;
911 if (local_npw.nw_head == NULL)
912 local_npw.nw_tail = NULL;
914 VNET_ASSERT(m->m_pkthdr.rcvif != NULL,
915 ("%s:%d rcvif == NULL: m=%p", __func__, __LINE__, m));
916 CURVNET_SET(m->m_pkthdr.rcvif->if_vnet);
917 netisr_proto[proto].np_handler(m);
920 KASSERT(local_npw.nw_len == 0,
921 ("%s(%u): len %u", __func__, proto, local_npw.nw_len));
922 if (netisr_proto[proto].np_drainedcpu)
923 netisr_proto[proto].np_drainedcpu(nwsp->nws_cpu);
925 npwp->nw_handled += handled;
930 * SWI handler for netisr -- processes packets in a set of workstreams that
931 * it owns, woken up by calls to NWS_SIGNAL(). If this workstream is already
932 * being direct dispatched, go back to sleep and wait for the dispatching
933 * thread to wake us up again.
938 #ifdef NETISR_LOCKING
939 struct rm_priotracker tracker;
941 struct netisr_workstream *nwsp;
946 #ifdef DEVICE_POLLING
947 KASSERT(nws_count == 1,
948 ("%s: device_polling but nws_count != 1", __func__));
951 #ifdef NETISR_LOCKING
952 NETISR_RLOCK(&tracker);
955 KASSERT(!(nwsp->nws_flags & NWS_RUNNING), ("swi_net: running"));
956 if (nwsp->nws_flags & NWS_DISPATCHING)
958 nwsp->nws_flags |= NWS_RUNNING;
959 nwsp->nws_flags &= ~NWS_SCHEDULED;
960 while ((bits = nwsp->nws_pendingbits) != 0) {
961 while ((prot = ffs(bits)) != 0) {
963 bits &= ~(1 << prot);
964 (void)netisr_process_workstream_proto(nwsp, prot);
967 nwsp->nws_flags &= ~NWS_RUNNING;
970 #ifdef NETISR_LOCKING
971 NETISR_RUNLOCK(&tracker);
973 #ifdef DEVICE_POLLING
979 netisr_queue_workstream(struct netisr_workstream *nwsp, u_int proto,
980 struct netisr_work *npwp, struct mbuf *m, int *dosignalp)
983 NWS_LOCK_ASSERT(nwsp);
986 if (npwp->nw_len < npwp->nw_qlimit) {
988 if (npwp->nw_head == NULL) {
992 npwp->nw_tail->m_nextpkt = m;
996 if (npwp->nw_len > npwp->nw_watermark)
997 npwp->nw_watermark = npwp->nw_len;
1000 * We must set the bit regardless of NWS_RUNNING, so that
1001 * swi_net() keeps calling netisr_process_workstream_proto().
1003 nwsp->nws_pendingbits |= (1 << proto);
1004 if (!(nwsp->nws_flags &
1005 (NWS_RUNNING | NWS_DISPATCHING | NWS_SCHEDULED))) {
1006 nwsp->nws_flags |= NWS_SCHEDULED;
1007 *dosignalp = 1; /* Defer until unlocked. */
1019 netisr_queue_internal(u_int proto, struct mbuf *m, u_int cpuid)
1021 struct netisr_workstream *nwsp;
1022 struct netisr_work *npwp;
1023 int dosignal, error;
1025 #ifdef NETISR_LOCKING
1026 NETISR_LOCK_ASSERT();
1028 KASSERT(cpuid <= mp_maxid, ("%s: cpuid too big (%u, %u)", __func__,
1030 KASSERT(!CPU_ABSENT(cpuid), ("%s: CPU %u absent", __func__, cpuid));
1034 nwsp = DPCPU_ID_PTR(cpuid, nws);
1035 npwp = &nwsp->nws_work[proto];
1037 error = netisr_queue_workstream(nwsp, proto, npwp, m, &dosignal);
1045 netisr_queue_src(u_int proto, uintptr_t source, struct mbuf *m)
1047 #ifdef NETISR_LOCKING
1048 struct rm_priotracker tracker;
1053 KASSERT(proto < NETISR_MAXPROT,
1054 ("%s: invalid proto %u", __func__, proto));
1056 #ifdef NETISR_LOCKING
1057 NETISR_RLOCK(&tracker);
1059 KASSERT(netisr_proto[proto].np_handler != NULL,
1060 ("%s: invalid proto %u", __func__, proto));
1063 if (V_netisr_enable[proto] == 0) {
1065 return (ENOPROTOOPT);
1069 m = netisr_select_cpuid(&netisr_proto[proto], NETISR_DISPATCH_DEFERRED,
1072 KASSERT(!CPU_ABSENT(cpuid), ("%s: CPU %u absent", __func__,
1074 VNET_ASSERT(m->m_pkthdr.rcvif != NULL,
1075 ("%s:%d rcvif == NULL: m=%p", __func__, __LINE__, m));
1076 error = netisr_queue_internal(proto, m, cpuid);
1079 #ifdef NETISR_LOCKING
1080 NETISR_RUNLOCK(&tracker);
1086 netisr_queue(u_int proto, struct mbuf *m)
1089 return (netisr_queue_src(proto, 0, m));
1093 * Dispatch a packet for netisr processing; direct dispatch is permitted by
1097 netisr_dispatch_src(u_int proto, uintptr_t source, struct mbuf *m)
1099 #ifdef NETISR_LOCKING
1100 struct rm_priotracker tracker;
1102 struct netisr_workstream *nwsp;
1103 struct netisr_proto *npp;
1104 struct netisr_work *npwp;
1105 int dosignal, error;
1106 u_int cpuid, dispatch_policy;
1109 KASSERT(proto < NETISR_MAXPROT,
1110 ("%s: invalid proto %u", __func__, proto));
1111 #ifdef NETISR_LOCKING
1112 NETISR_RLOCK(&tracker);
1114 npp = &netisr_proto[proto];
1115 KASSERT(npp->np_handler != NULL, ("%s: invalid proto %u", __func__,
1119 if (V_netisr_enable[proto] == 0) {
1121 return (ENOPROTOOPT);
1125 dispatch_policy = netisr_get_dispatch(npp);
1126 if (dispatch_policy == NETISR_DISPATCH_DEFERRED)
1127 return (netisr_queue_src(proto, source, m));
1130 * If direct dispatch is forced, then unconditionally dispatch
1131 * without a formal CPU selection. Borrow the current CPU's stats,
1132 * even if there's no worker on it. In this case we don't update
1133 * nws_flags because all netisr processing will be source ordered due
1134 * to always being forced to directly dispatch.
1136 if (dispatch_policy == NETISR_DISPATCH_DIRECT) {
1137 nwsp = DPCPU_PTR(nws);
1138 npwp = &nwsp->nws_work[proto];
1139 npwp->nw_dispatched++;
1141 netisr_proto[proto].np_handler(m);
1146 KASSERT(dispatch_policy == NETISR_DISPATCH_HYBRID,
1147 ("%s: unknown dispatch policy (%u)", __func__, dispatch_policy));
1150 * Otherwise, we execute in a hybrid mode where we will try to direct
1151 * dispatch if we're on the right CPU and the netisr worker isn't
1155 m = netisr_select_cpuid(&netisr_proto[proto], NETISR_DISPATCH_HYBRID,
1161 KASSERT(!CPU_ABSENT(cpuid), ("%s: CPU %u absent", __func__, cpuid));
1162 if (cpuid != curcpu)
1163 goto queue_fallback;
1164 nwsp = DPCPU_PTR(nws);
1165 npwp = &nwsp->nws_work[proto];
1168 * We are willing to direct dispatch only if three conditions hold:
1170 * (1) The netisr worker isn't already running,
1171 * (2) Another thread isn't already directly dispatching, and
1172 * (3) The netisr hasn't already been woken up.
1175 if (nwsp->nws_flags & (NWS_RUNNING | NWS_DISPATCHING | NWS_SCHEDULED)) {
1176 error = netisr_queue_workstream(nwsp, proto, npwp, m,
1185 * The current thread is now effectively the netisr worker, so set
1186 * the dispatching flag to prevent concurrent processing of the
1187 * stream from another thread (even the netisr worker), which could
1188 * otherwise lead to effective misordering of the stream.
1190 nwsp->nws_flags |= NWS_DISPATCHING;
1192 netisr_proto[proto].np_handler(m);
1194 nwsp->nws_flags &= ~NWS_DISPATCHING;
1196 npwp->nw_hybrid_dispatched++;
1199 * If other work was enqueued by another thread while we were direct
1200 * dispatching, we need to signal the netisr worker to do that work.
1201 * In the future, we might want to do some of that work in the
1202 * current thread, rather than trigger further context switches. If
1203 * so, we'll want to establish a reasonable bound on the work done in
1204 * the "borrowed" context.
1206 if (nwsp->nws_pendingbits != 0) {
1207 nwsp->nws_flags |= NWS_SCHEDULED;
1218 error = netisr_queue_internal(proto, m, cpuid);
1222 #ifdef NETISR_LOCKING
1223 NETISR_RUNLOCK(&tracker);
1229 netisr_dispatch(u_int proto, struct mbuf *m)
1232 return (netisr_dispatch_src(proto, 0, m));
1235 #ifdef DEVICE_POLLING
1237 * Kernel polling borrows a netisr thread to run interface polling in; this
1238 * function allows kernel polling to request that the netisr thread be
1239 * scheduled even if no packets are pending for protocols.
1242 netisr_sched_poll(void)
1244 struct netisr_workstream *nwsp;
1246 nwsp = DPCPU_ID_PTR(nws_array[0], nws);
1252 netisr_start_swi(u_int cpuid, struct pcpu *pc)
1255 struct netisr_workstream *nwsp;
1258 KASSERT(!CPU_ABSENT(cpuid), ("%s: CPU %u absent", __func__, cpuid));
1260 nwsp = DPCPU_ID_PTR(cpuid, nws);
1261 mtx_init(&nwsp->nws_mtx, "netisr_mtx", NULL, MTX_DEF);
1262 nwsp->nws_cpu = cpuid;
1263 snprintf(swiname, sizeof(swiname), "netisr %u", cpuid);
1264 error = swi_add(&nwsp->nws_intr_event, swiname, swi_net, nwsp,
1265 SWI_NET, INTR_TYPE_NET | INTR_MPSAFE, &nwsp->nws_swi_cookie);
1267 panic("%s: swi_add %d", __func__, error);
1268 pc->pc_netisr = nwsp->nws_intr_event;
1269 if (netisr_bindthreads) {
1270 error = intr_event_bind(nwsp->nws_intr_event, cpuid);
1272 printf("%s: cpu %u: intr_event_bind: %d", __func__,
1276 nws_array[nws_count] = nwsp->nws_cpu;
1282 * Initialize the netisr subsystem. We rely on BSS and static initialization
1283 * of most fields in global data structures.
1285 * Start a worker thread for the boot CPU so that we can support network
1286 * traffic immediately in case the network stack is used before additional
1287 * CPUs are started (for example, diskless boot).
1290 netisr_init(void *arg)
1295 if (netisr_maxthreads == 0 || netisr_maxthreads < -1 )
1296 netisr_maxthreads = 1; /* default behavior */
1297 else if (netisr_maxthreads == -1)
1298 netisr_maxthreads = mp_ncpus; /* use max cpus */
1299 if (netisr_maxthreads > mp_ncpus) {
1300 printf("netisr_init: forcing maxthreads from %d to %d\n",
1301 netisr_maxthreads, mp_ncpus);
1302 netisr_maxthreads = mp_ncpus;
1304 if (netisr_defaultqlimit > netisr_maxqlimit) {
1305 printf("netisr_init: forcing defaultqlimit from %d to %d\n",
1306 netisr_defaultqlimit, netisr_maxqlimit);
1307 netisr_defaultqlimit = netisr_maxqlimit;
1309 #ifdef DEVICE_POLLING
1311 * The device polling code is not yet aware of how to deal with
1312 * multiple netisr threads, so for the time being compiling in device
1313 * polling disables parallel netisr workers.
1315 if (netisr_maxthreads != 1 || netisr_bindthreads != 0) {
1316 printf("netisr_init: forcing maxthreads to 1 and "
1317 "bindthreads to 0 for device polling\n");
1318 netisr_maxthreads = 1;
1319 netisr_bindthreads = 0;
1323 #ifdef EARLY_AP_STARTUP
1324 STAILQ_FOREACH(pc, &cpuhead, pc_allcpu) {
1325 if (nws_count >= netisr_maxthreads)
1327 netisr_start_swi(pc->pc_cpuid, pc);
1331 netisr_start_swi(pc->pc_cpuid, pc);
1334 SYSINIT(netisr_init, SI_SUB_SOFTINTR, SI_ORDER_FIRST, netisr_init, NULL);
1336 #ifndef EARLY_AP_STARTUP
1338 * Start worker threads for additional CPUs. No attempt to gracefully handle
1339 * work reassignment, we don't yet support dynamic reconfiguration.
1342 netisr_start(void *arg)
1346 STAILQ_FOREACH(pc, &cpuhead, pc_allcpu) {
1347 if (nws_count >= netisr_maxthreads)
1349 /* Worker will already be present for boot CPU. */
1350 if (pc->pc_netisr != NULL)
1352 netisr_start_swi(pc->pc_cpuid, pc);
1355 SYSINIT(netisr_start, SI_SUB_SMP, SI_ORDER_MIDDLE, netisr_start, NULL);
1359 * Sysctl monitoring for netisr: query a list of registered protocols.
1362 sysctl_netisr_proto(SYSCTL_HANDLER_ARGS)
1364 struct rm_priotracker tracker;
1365 struct sysctl_netisr_proto *snpp, *snp_array;
1366 struct netisr_proto *npp;
1367 u_int counter, proto;
1370 if (req->newptr != NULL)
1372 snp_array = malloc(sizeof(*snp_array) * NETISR_MAXPROT, M_TEMP,
1375 NETISR_RLOCK(&tracker);
1376 for (proto = 0; proto < NETISR_MAXPROT; proto++) {
1377 npp = &netisr_proto[proto];
1378 if (npp->np_name == NULL)
1380 snpp = &snp_array[counter];
1381 snpp->snp_version = sizeof(*snpp);
1382 strlcpy(snpp->snp_name, npp->np_name, NETISR_NAMEMAXLEN);
1383 snpp->snp_proto = proto;
1384 snpp->snp_qlimit = npp->np_qlimit;
1385 snpp->snp_policy = npp->np_policy;
1386 snpp->snp_dispatch = npp->np_dispatch;
1387 if (npp->np_m2flow != NULL)
1388 snpp->snp_flags |= NETISR_SNP_FLAGS_M2FLOW;
1389 if (npp->np_m2cpuid != NULL)
1390 snpp->snp_flags |= NETISR_SNP_FLAGS_M2CPUID;
1391 if (npp->np_drainedcpu != NULL)
1392 snpp->snp_flags |= NETISR_SNP_FLAGS_DRAINEDCPU;
1395 NETISR_RUNLOCK(&tracker);
1396 KASSERT(counter <= NETISR_MAXPROT,
1397 ("sysctl_netisr_proto: counter too big (%d)", counter));
1398 error = SYSCTL_OUT(req, snp_array, sizeof(*snp_array) * counter);
1399 free(snp_array, M_TEMP);
1403 SYSCTL_PROC(_net_isr, OID_AUTO, proto,
1404 CTLFLAG_RD|CTLTYPE_STRUCT|CTLFLAG_MPSAFE, 0, 0, sysctl_netisr_proto,
1405 "S,sysctl_netisr_proto",
1406 "Return list of protocols registered with netisr");
1409 * Sysctl monitoring for netisr: query a list of workstreams.
1412 sysctl_netisr_workstream(SYSCTL_HANDLER_ARGS)
1414 struct rm_priotracker tracker;
1415 struct sysctl_netisr_workstream *snwsp, *snws_array;
1416 struct netisr_workstream *nwsp;
1417 u_int counter, cpuid;
1420 if (req->newptr != NULL)
1422 snws_array = malloc(sizeof(*snws_array) * MAXCPU, M_TEMP,
1425 NETISR_RLOCK(&tracker);
1426 CPU_FOREACH(cpuid) {
1427 nwsp = DPCPU_ID_PTR(cpuid, nws);
1428 if (nwsp->nws_intr_event == NULL)
1431 snwsp = &snws_array[counter];
1432 snwsp->snws_version = sizeof(*snwsp);
1435 * For now, we equate workstream IDs and CPU IDs in the
1436 * kernel, but expose them independently to userspace in case
1437 * that assumption changes in the future.
1439 snwsp->snws_wsid = cpuid;
1440 snwsp->snws_cpu = cpuid;
1441 if (nwsp->nws_intr_event != NULL)
1442 snwsp->snws_flags |= NETISR_SNWS_FLAGS_INTR;
1446 NETISR_RUNLOCK(&tracker);
1447 KASSERT(counter <= MAXCPU,
1448 ("sysctl_netisr_workstream: counter too big (%d)", counter));
1449 error = SYSCTL_OUT(req, snws_array, sizeof(*snws_array) * counter);
1450 free(snws_array, M_TEMP);
1454 SYSCTL_PROC(_net_isr, OID_AUTO, workstream,
1455 CTLFLAG_RD|CTLTYPE_STRUCT|CTLFLAG_MPSAFE, 0, 0, sysctl_netisr_workstream,
1456 "S,sysctl_netisr_workstream",
1457 "Return list of workstreams implemented by netisr");
1460 * Sysctl monitoring for netisr: query per-protocol data across all
1464 sysctl_netisr_work(SYSCTL_HANDLER_ARGS)
1466 struct rm_priotracker tracker;
1467 struct sysctl_netisr_work *snwp, *snw_array;
1468 struct netisr_workstream *nwsp;
1469 struct netisr_proto *npp;
1470 struct netisr_work *nwp;
1471 u_int counter, cpuid, proto;
1474 if (req->newptr != NULL)
1476 snw_array = malloc(sizeof(*snw_array) * MAXCPU * NETISR_MAXPROT,
1477 M_TEMP, M_ZERO | M_WAITOK);
1479 NETISR_RLOCK(&tracker);
1480 CPU_FOREACH(cpuid) {
1481 nwsp = DPCPU_ID_PTR(cpuid, nws);
1482 if (nwsp->nws_intr_event == NULL)
1485 for (proto = 0; proto < NETISR_MAXPROT; proto++) {
1486 npp = &netisr_proto[proto];
1487 if (npp->np_name == NULL)
1489 nwp = &nwsp->nws_work[proto];
1490 snwp = &snw_array[counter];
1491 snwp->snw_version = sizeof(*snwp);
1492 snwp->snw_wsid = cpuid; /* See comment above. */
1493 snwp->snw_proto = proto;
1494 snwp->snw_len = nwp->nw_len;
1495 snwp->snw_watermark = nwp->nw_watermark;
1496 snwp->snw_dispatched = nwp->nw_dispatched;
1497 snwp->snw_hybrid_dispatched =
1498 nwp->nw_hybrid_dispatched;
1499 snwp->snw_qdrops = nwp->nw_qdrops;
1500 snwp->snw_queued = nwp->nw_queued;
1501 snwp->snw_handled = nwp->nw_handled;
1506 KASSERT(counter <= MAXCPU * NETISR_MAXPROT,
1507 ("sysctl_netisr_work: counter too big (%d)", counter));
1508 NETISR_RUNLOCK(&tracker);
1509 error = SYSCTL_OUT(req, snw_array, sizeof(*snw_array) * counter);
1510 free(snw_array, M_TEMP);
1514 SYSCTL_PROC(_net_isr, OID_AUTO, work,
1515 CTLFLAG_RD|CTLTYPE_STRUCT|CTLFLAG_MPSAFE, 0, 0, sysctl_netisr_work,
1516 "S,sysctl_netisr_work",
1517 "Return list of per-workstream, per-protocol work in netisr");
1520 DB_SHOW_COMMAND(netisr, db_show_netisr)
1522 struct netisr_workstream *nwsp;
1523 struct netisr_work *nwp;
1527 db_printf("%3s %6s %5s %5s %5s %8s %8s %8s %8s\n", "CPU", "Proto",
1528 "Len", "WMark", "Max", "Disp", "HDisp", "Drop", "Queue");
1529 CPU_FOREACH(cpuid) {
1530 nwsp = DPCPU_ID_PTR(cpuid, nws);
1531 if (nwsp->nws_intr_event == NULL)
1534 for (proto = 0; proto < NETISR_MAXPROT; proto++) {
1535 if (netisr_proto[proto].np_handler == NULL)
1537 nwp = &nwsp->nws_work[proto];
1539 db_printf("%3d ", cpuid);
1542 db_printf("%3s ", "");
1544 "%6s %5d %5d %5d %8ju %8ju %8ju %8ju\n",
1545 netisr_proto[proto].np_name, nwp->nw_len,
1546 nwp->nw_watermark, nwp->nw_qlimit,
1547 nwp->nw_dispatched, nwp->nw_hybrid_dispatched,
1548 nwp->nw_qdrops, nwp->nw_queued);