1362 lines
		
	
	
		
			29 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			1362 lines
		
	
	
		
			29 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/*
 | 
						|
eth.c
 | 
						|
 | 
						|
Copyright 1995 Philip Homburg
 | 
						|
*/
 | 
						|
 | 
						|
#include "inet.h"
 | 
						|
#include "buf.h"
 | 
						|
#include "clock.h"
 | 
						|
#include "event.h"
 | 
						|
#include "osdep_eth.h"
 | 
						|
#include "type.h"
 | 
						|
 | 
						|
#include "assert.h"
 | 
						|
#include "buf.h"
 | 
						|
#include "eth.h"
 | 
						|
#include "eth_int.h"
 | 
						|
#include "sr.h"
 | 
						|
 | 
						|
THIS_FILE
 | 
						|
 | 
						|
#define ETH_FD_NR	(4*IP_PORT_MAX)
 | 
						|
#define EXPIRE_TIME	60*HZ	/* seconds */
 | 
						|
 | 
						|
typedef struct eth_fd
 | 
						|
{
 | 
						|
	int ef_flags;
 | 
						|
	nwio_ethopt_t ef_ethopt;
 | 
						|
	eth_port_t *ef_port;
 | 
						|
	struct eth_fd *ef_type_next;
 | 
						|
	struct eth_fd *ef_send_next;
 | 
						|
	int ef_srfd;
 | 
						|
	acc_t *ef_rdbuf_head;
 | 
						|
	acc_t *ef_rdbuf_tail;
 | 
						|
	get_userdata_t ef_get_userdata;
 | 
						|
	put_userdata_t ef_put_userdata;
 | 
						|
	put_pkt_t ef_put_pkt;
 | 
						|
	select_res_t ef_select_res;
 | 
						|
	time_t ef_exp_time;
 | 
						|
	size_t ef_write_count;
 | 
						|
	ioreq_t ef_ioctl_req;
 | 
						|
} eth_fd_t;
 | 
						|
 | 
						|
#define EFF_FLAGS	0xf
 | 
						|
#	define EFF_EMPTY	0x0
 | 
						|
#	define EFF_INUSE	0x1
 | 
						|
#	define EFF_BUSY		0xE
 | 
						|
#		define	EFF_READ_IP	0x2
 | 
						|
#		define 	EFF_WRITE_IP	0x4
 | 
						|
#		define 	EFF_IOCTL_IP	0x8
 | 
						|
#	define EFF_OPTSET       0x10
 | 
						|
#   define EFF_SEL_READ	0x20
 | 
						|
 | 
						|
/* Note that the vh_type field is normally considered part of the ethernet
 | 
						|
 * header.
 | 
						|
 */
 | 
						|
typedef struct 
 | 
						|
{
 | 
						|
	u16_t vh_type;
 | 
						|
	u16_t vh_vlan;
 | 
						|
} vlan_hdr_t;
 | 
						|
 | 
						|
static int eth_checkopt ARGS(( eth_fd_t *eth_fd ));
 | 
						|
static void hash_fd ARGS(( eth_fd_t *eth_fd ));
 | 
						|
static void unhash_fd ARGS(( eth_fd_t *eth_fd ));
 | 
						|
static void eth_buffree ARGS(( int priority ));
 | 
						|
#ifdef BUF_CONSISTENCY_CHECK
 | 
						|
static void eth_bufcheck ARGS(( void ));
 | 
						|
#endif
 | 
						|
static int eth_sel_read ARGS(( eth_fd_t * ));
 | 
						|
static void packet2user ARGS(( eth_fd_t *fd, acc_t *pack, time_t exp_time ));
 | 
						|
static void reply_thr_get ARGS(( eth_fd_t *eth_fd,
 | 
						|
	size_t result, int for_ioctl ));
 | 
						|
static void reply_thr_put ARGS(( eth_fd_t *eth_fd,
 | 
						|
	size_t result, int for_ioctl ));
 | 
						|
static void do_rec_conf ARGS(( eth_port_t *eth_port ));
 | 
						|
static u32_t compute_rec_conf ARGS(( eth_port_t *eth_port ));
 | 
						|
static acc_t *insert_vlan_hdr ARGS(( eth_port_t *eth_port, acc_t *pack ));
 | 
						|
 | 
						|
eth_port_t *eth_port_table;
 | 
						|
int no_ethWritePort= 0;
 | 
						|
 | 
						|
static eth_fd_t eth_fd_table[ETH_FD_NR];
 | 
						|
static ether_addr_t broadcast= { { 255, 255, 255, 255, 255, 255 } };
 | 
						|
 | 
						|
void eth_prep()
 | 
						|
{
 | 
						|
	eth_port_table= alloc(eth_conf_nr * sizeof(eth_port_table[0]));
 | 
						|
}
 | 
						|
 | 
						|
void eth_init()
 | 
						|
{
 | 
						|
	int i, j;
 | 
						|
 | 
						|
	assert (BUF_S >= sizeof(nwio_ethopt_t));
 | 
						|
	assert (BUF_S >= ETH_HDR_SIZE);	/* these are in fact static assertions,
 | 
						|
					   thus a good compiler doesn't
 | 
						|
					   generate any code for this */
 | 
						|
 | 
						|
 | 
						|
	for (i=0; i<ETH_FD_NR; i++)
 | 
						|
		eth_fd_table[i].ef_flags= EFF_EMPTY;
 | 
						|
	for (i=0; i<eth_conf_nr; i++)
 | 
						|
	{
 | 
						|
		eth_port_table[i].etp_flags= EPF_EMPTY;
 | 
						|
		eth_port_table[i].etp_getstat= NULL;
 | 
						|
		eth_port_table[i].etp_sendq_head= NULL;
 | 
						|
		eth_port_table[i].etp_sendq_tail= NULL;
 | 
						|
		eth_port_table[i].etp_type_any= NULL;
 | 
						|
		ev_init(ð_port_table[i].etp_sendev);
 | 
						|
		for (j= 0; j<ETH_TYPE_HASH_NR; j++)
 | 
						|
			eth_port_table[i].etp_type[j]= NULL;
 | 
						|
		for (j= 0; j<ETH_VLAN_HASH_NR; j++)
 | 
						|
			eth_port_table[i].etp_vlan_tab[j]= NULL;
 | 
						|
	}
 | 
						|
 | 
						|
#ifndef BUF_CONSISTENCY_CHECK
 | 
						|
	bf_logon(eth_buffree);
 | 
						|
#else
 | 
						|
	bf_logon(eth_buffree, eth_bufcheck);
 | 
						|
#endif
 | 
						|
 | 
						|
	osdep_eth_init();
 | 
						|
}
 | 
						|
 | 
						|
int eth_open(port, srfd, get_userdata, put_userdata, put_pkt,
 | 
						|
	select_res)
 | 
						|
int port, srfd;
 | 
						|
get_userdata_t get_userdata;
 | 
						|
put_userdata_t put_userdata;
 | 
						|
put_pkt_t put_pkt;
 | 
						|
select_res_t select_res;
 | 
						|
{
 | 
						|
	int i;
 | 
						|
	eth_port_t *eth_port;
 | 
						|
	eth_fd_t *eth_fd;
 | 
						|
 | 
						|
	DBLOCK(0x20, printf("eth_open (%d, %d, %lx, %lx)\n", port, srfd, 
 | 
						|
		(unsigned long)get_userdata, (unsigned long)put_userdata));
 | 
						|
	eth_port= ð_port_table[port];
 | 
						|
	if (!(eth_port->etp_flags & EPF_ENABLED))
 | 
						|
		return EGENERIC;
 | 
						|
 | 
						|
	for (i=0; i<ETH_FD_NR && (eth_fd_table[i].ef_flags & EFF_INUSE);
 | 
						|
		i++);
 | 
						|
 | 
						|
	if (i>=ETH_FD_NR)
 | 
						|
	{
 | 
						|
		DBLOCK(1, printf("out of fds\n"));
 | 
						|
		return EAGAIN;
 | 
						|
	}
 | 
						|
 | 
						|
	eth_fd= ð_fd_table[i];
 | 
						|
 | 
						|
	eth_fd->ef_flags= EFF_INUSE;
 | 
						|
	eth_fd->ef_ethopt.nweo_flags=NWEO_DEFAULT;
 | 
						|
	eth_fd->ef_port= eth_port;
 | 
						|
	eth_fd->ef_srfd= srfd;
 | 
						|
	assert(eth_fd->ef_rdbuf_head == NULL);
 | 
						|
	eth_fd->ef_get_userdata= get_userdata;
 | 
						|
	eth_fd->ef_put_userdata= put_userdata;
 | 
						|
	eth_fd->ef_put_pkt= put_pkt;
 | 
						|
	eth_fd->ef_select_res= select_res;
 | 
						|
 | 
						|
	return i;
 | 
						|
}
 | 
						|
 | 
						|
int eth_ioctl(fd, req)
 | 
						|
int fd;
 | 
						|
ioreq_t req;
 | 
						|
{
 | 
						|
	acc_t *data;
 | 
						|
	eth_fd_t *eth_fd;
 | 
						|
	eth_port_t *eth_port;
 | 
						|
 | 
						|
	DBLOCK(0x20, printf("eth_ioctl (%d, 0x%lx)\n", fd, (unsigned long)req));
 | 
						|
	eth_fd= ð_fd_table[fd];
 | 
						|
	eth_port= eth_fd->ef_port;
 | 
						|
 | 
						|
	assert (eth_fd->ef_flags & EFF_INUSE);
 | 
						|
 | 
						|
	switch (req)
 | 
						|
	{
 | 
						|
	case NWIOSETHOPT:
 | 
						|
		{
 | 
						|
			nwio_ethopt_t *ethopt;
 | 
						|
			nwio_ethopt_t oldopt, newopt;
 | 
						|
			int result;
 | 
						|
			u32_t new_en_flags, new_di_flags,
 | 
						|
				old_en_flags, old_di_flags;
 | 
						|
 | 
						|
			data= (*eth_fd->ef_get_userdata)(eth_fd->
 | 
						|
				ef_srfd, 0, sizeof(nwio_ethopt_t), TRUE);
 | 
						|
 | 
						|
                        ethopt= (nwio_ethopt_t *)ptr2acc_data(data);
 | 
						|
			oldopt= eth_fd->ef_ethopt;
 | 
						|
			newopt= *ethopt;
 | 
						|
 | 
						|
			old_en_flags= oldopt.nweo_flags & 0xffff;
 | 
						|
			old_di_flags= (oldopt.nweo_flags >> 16) & 0xffff;
 | 
						|
			new_en_flags= newopt.nweo_flags & 0xffff;
 | 
						|
			new_di_flags= (newopt.nweo_flags >> 16) & 0xffff;
 | 
						|
			if (new_en_flags & new_di_flags)
 | 
						|
			{
 | 
						|
				bf_afree(data);
 | 
						|
				reply_thr_get (eth_fd, EBADMODE, TRUE);
 | 
						|
				return NW_OK;
 | 
						|
			}	
 | 
						|
 | 
						|
			/* NWEO_ACC_MASK */
 | 
						|
			if (new_di_flags & NWEO_ACC_MASK)
 | 
						|
			{
 | 
						|
				bf_afree(data);
 | 
						|
				reply_thr_get (eth_fd, EBADMODE, TRUE);
 | 
						|
				return NW_OK;
 | 
						|
			}	
 | 
						|
					/* you can't disable access modes */
 | 
						|
 | 
						|
			if (!(new_en_flags & NWEO_ACC_MASK))
 | 
						|
				new_en_flags |= (old_en_flags & NWEO_ACC_MASK);
 | 
						|
 | 
						|
 | 
						|
			/* NWEO_LOC_MASK */
 | 
						|
			if (!((new_en_flags | new_di_flags) & NWEO_LOC_MASK))
 | 
						|
			{
 | 
						|
				new_en_flags |= (old_en_flags & NWEO_LOC_MASK);
 | 
						|
				new_di_flags |= (old_di_flags & NWEO_LOC_MASK);
 | 
						|
			}
 | 
						|
 | 
						|
			/* NWEO_BROAD_MASK */
 | 
						|
			if (!((new_en_flags | new_di_flags) & NWEO_BROAD_MASK))
 | 
						|
			{
 | 
						|
				new_en_flags |= (old_en_flags & NWEO_BROAD_MASK);
 | 
						|
				new_di_flags |= (old_di_flags & NWEO_BROAD_MASK);
 | 
						|
			}
 | 
						|
 | 
						|
			/* NWEO_MULTI_MASK */
 | 
						|
			if (!((new_en_flags | new_di_flags) & NWEO_MULTI_MASK))
 | 
						|
			{
 | 
						|
				new_en_flags |= (old_en_flags & NWEO_MULTI_MASK);
 | 
						|
				new_di_flags |= (old_di_flags & NWEO_MULTI_MASK);
 | 
						|
				newopt.nweo_multi= oldopt.nweo_multi;
 | 
						|
			}
 | 
						|
 | 
						|
			/* NWEO_PROMISC_MASK */
 | 
						|
			if (!((new_en_flags | new_di_flags) & NWEO_PROMISC_MASK))
 | 
						|
			{
 | 
						|
				new_en_flags |= (old_en_flags & NWEO_PROMISC_MASK);
 | 
						|
				new_di_flags |= (old_di_flags & NWEO_PROMISC_MASK);
 | 
						|
			}
 | 
						|
 | 
						|
			/* NWEO_REM_MASK */
 | 
						|
			if (!((new_en_flags | new_di_flags) & NWEO_REM_MASK))
 | 
						|
			{
 | 
						|
				new_en_flags |= (old_en_flags & NWEO_REM_MASK);
 | 
						|
				new_di_flags |= (old_di_flags & NWEO_REM_MASK);
 | 
						|
				newopt.nweo_rem= oldopt.nweo_rem;
 | 
						|
			}
 | 
						|
 | 
						|
			/* NWEO_TYPE_MASK */
 | 
						|
			if (!((new_en_flags | new_di_flags) & NWEO_TYPE_MASK))
 | 
						|
			{
 | 
						|
				new_en_flags |= (old_en_flags & NWEO_TYPE_MASK);
 | 
						|
				new_di_flags |= (old_di_flags & NWEO_TYPE_MASK);
 | 
						|
				newopt.nweo_type= oldopt.nweo_type;
 | 
						|
			}
 | 
						|
 | 
						|
			/* NWEO_RW_MASK */
 | 
						|
			if (!((new_en_flags | new_di_flags) & NWEO_RW_MASK))
 | 
						|
			{
 | 
						|
				new_en_flags |= (old_en_flags & NWEO_RW_MASK);
 | 
						|
				new_di_flags |= (old_di_flags & NWEO_RW_MASK);
 | 
						|
			}
 | 
						|
 | 
						|
			if (eth_fd->ef_flags & EFF_OPTSET)
 | 
						|
				unhash_fd(eth_fd);
 | 
						|
 | 
						|
			newopt.nweo_flags= ((unsigned long)new_di_flags << 16) |
 | 
						|
				new_en_flags;
 | 
						|
			eth_fd->ef_ethopt= newopt;
 | 
						|
 | 
						|
			result= eth_checkopt(eth_fd);
 | 
						|
 | 
						|
			if (result<0)
 | 
						|
				eth_fd->ef_ethopt= oldopt;
 | 
						|
			else
 | 
						|
			{
 | 
						|
				unsigned long opt_flags;
 | 
						|
				unsigned changes;
 | 
						|
				opt_flags= oldopt.nweo_flags ^
 | 
						|
					eth_fd->ef_ethopt.nweo_flags;
 | 
						|
				changes= ((opt_flags >> 16) | opt_flags) &
 | 
						|
					0xffff;
 | 
						|
				if (changes & (NWEO_BROAD_MASK |
 | 
						|
					NWEO_MULTI_MASK | NWEO_PROMISC_MASK))
 | 
						|
				{
 | 
						|
					do_rec_conf(eth_port);
 | 
						|
				}
 | 
						|
			}
 | 
						|
 | 
						|
			if (eth_fd->ef_flags & EFF_OPTSET)
 | 
						|
				hash_fd(eth_fd);
 | 
						|
 | 
						|
			bf_afree(data);
 | 
						|
			reply_thr_get (eth_fd, result, TRUE);
 | 
						|
			return NW_OK;	
 | 
						|
		}
 | 
						|
 | 
						|
	case NWIOGETHOPT:
 | 
						|
		{
 | 
						|
			nwio_ethopt_t *ethopt;
 | 
						|
			acc_t *acc;
 | 
						|
			int result;
 | 
						|
 | 
						|
			acc= bf_memreq(sizeof(nwio_ethopt_t));
 | 
						|
 | 
						|
			ethopt= (nwio_ethopt_t *)ptr2acc_data(acc);
 | 
						|
 | 
						|
			*ethopt= eth_fd->ef_ethopt;
 | 
						|
 | 
						|
			result= (*eth_fd->ef_put_userdata)(eth_fd->
 | 
						|
				ef_srfd, 0, acc, TRUE);
 | 
						|
			if (result >= 0)
 | 
						|
				reply_thr_put(eth_fd, NW_OK, TRUE);
 | 
						|
			return result;
 | 
						|
		}
 | 
						|
	case NWIOGETHSTAT:
 | 
						|
		{
 | 
						|
			nwio_ethstat_t *ethstat;
 | 
						|
			acc_t *acc;
 | 
						|
			int result;
 | 
						|
 | 
						|
			assert (sizeof(nwio_ethstat_t) <= BUF_S);
 | 
						|
 | 
						|
			eth_port= eth_fd->ef_port;
 | 
						|
			if (!(eth_port->etp_flags & EPF_ENABLED))
 | 
						|
			{
 | 
						|
				reply_thr_put(eth_fd, EGENERIC, TRUE);
 | 
						|
				return NW_OK;
 | 
						|
			}
 | 
						|
 | 
						|
			if (!(eth_port->etp_flags & EPF_GOT_ADDR))
 | 
						|
			{
 | 
						|
#if 0
 | 
						|
				printf(
 | 
						|
				"eth_ioctl: suspending NWIOGETHSTAT ioctl\n");
 | 
						|
#endif
 | 
						|
 | 
						|
				eth_fd->ef_ioctl_req= req;
 | 
						|
				assert(!(eth_fd->ef_flags & EFF_IOCTL_IP));
 | 
						|
				eth_fd->ef_flags |= EFF_IOCTL_IP;
 | 
						|
				return NW_SUSPEND;
 | 
						|
			}
 | 
						|
 | 
						|
			if (eth_port->etp_getstat)
 | 
						|
			{
 | 
						|
				printf(
 | 
						|
	"eth_ioctl: pending eth_get_stat request, suspending caller\n");
 | 
						|
				assert(!(eth_fd->ef_flags & EFF_IOCTL_IP));
 | 
						|
				eth_fd->ef_flags |= EFF_IOCTL_IP;
 | 
						|
				return NW_SUSPEND;
 | 
						|
			}
 | 
						|
 | 
						|
			acc= bf_memreq(sizeof(nwio_ethstat_t));
 | 
						|
			compare (bf_bufsize(acc), ==, sizeof(*ethstat));
 | 
						|
 | 
						|
			ethstat= (nwio_ethstat_t *)ptr2acc_data(acc);
 | 
						|
			ethstat->nwes_addr= eth_port->etp_ethaddr;
 | 
						|
 | 
						|
			if (!eth_port->etp_vlan)
 | 
						|
			{
 | 
						|
				result= eth_get_stat(eth_port,
 | 
						|
					ðstat->nwes_stat);
 | 
						|
				if (result == SUSPEND)
 | 
						|
				{
 | 
						|
#if 0
 | 
						|
					printf(
 | 
						|
				"eth_ioctl: eth_get_stat returned SUSPEND\n");
 | 
						|
#endif
 | 
						|
					eth_fd->ef_ioctl_req= req;
 | 
						|
					assert(!(eth_fd->ef_flags &
 | 
						|
						EFF_IOCTL_IP));
 | 
						|
					eth_fd->ef_flags |= EFF_IOCTL_IP;
 | 
						|
#if 0
 | 
						|
printf("eth_ioctl: setting etp_getstat in port %d to %p\n",
 | 
						|
	eth_port-eth_port_table, acc);
 | 
						|
#endif
 | 
						|
					eth_port->etp_getstat= acc;
 | 
						|
					acc= NULL;
 | 
						|
					return NW_SUSPEND;
 | 
						|
				}
 | 
						|
				if (result != NW_OK)
 | 
						|
				{
 | 
						|
					bf_afree(acc);
 | 
						|
					reply_thr_put(eth_fd, result, TRUE);
 | 
						|
					return NW_OK;
 | 
						|
				}
 | 
						|
			}
 | 
						|
			else
 | 
						|
			{
 | 
						|
				/* No statistics */
 | 
						|
				memset(ðstat->nwes_stat, '\0',
 | 
						|
					sizeof(ethstat->nwes_stat));
 | 
						|
			}
 | 
						|
 | 
						|
			result= (*eth_fd->ef_put_userdata)(eth_fd->
 | 
						|
				ef_srfd, 0, acc, TRUE);
 | 
						|
			if (result >= 0)
 | 
						|
				reply_thr_put(eth_fd, NW_OK, TRUE);
 | 
						|
			return result;
 | 
						|
		}
 | 
						|
	default:
 | 
						|
		break;
 | 
						|
	}
 | 
						|
	reply_thr_put(eth_fd, EBADIOCTL, TRUE);
 | 
						|
	return NW_OK;
 | 
						|
}
 | 
						|
 | 
						|
int eth_write(fd, count)
 | 
						|
int fd;
 | 
						|
size_t count;
 | 
						|
{
 | 
						|
	eth_fd_t *eth_fd;
 | 
						|
	eth_port_t *eth_port, *rep;
 | 
						|
	acc_t *user_data;
 | 
						|
	int r;
 | 
						|
 | 
						|
	eth_fd= ð_fd_table[fd];
 | 
						|
	eth_port= eth_fd->ef_port;
 | 
						|
 | 
						|
	if (!(eth_fd->ef_flags & EFF_OPTSET))
 | 
						|
	{
 | 
						|
		reply_thr_get (eth_fd, EBADMODE, FALSE);
 | 
						|
		return NW_OK;
 | 
						|
	}
 | 
						|
 | 
						|
	assert (!(eth_fd->ef_flags & EFF_WRITE_IP));
 | 
						|
 | 
						|
	eth_fd->ef_write_count= count;
 | 
						|
	if (eth_fd->ef_ethopt.nweo_flags & NWEO_RWDATONLY)
 | 
						|
		count += ETH_HDR_SIZE;
 | 
						|
 | 
						|
	if (count<ETH_MIN_PACK_SIZE || count>ETH_MAX_PACK_SIZE)
 | 
						|
	{
 | 
						|
		DBLOCK(1, printf("illegal packetsize (%d)\n",count));
 | 
						|
		reply_thr_get (eth_fd, EPACKSIZE, FALSE);
 | 
						|
		return NW_OK;
 | 
						|
	}
 | 
						|
	eth_fd->ef_flags |= EFF_WRITE_IP;
 | 
						|
 | 
						|
	/* Enqueue at the real ethernet port */
 | 
						|
	rep= eth_port->etp_vlan_port;
 | 
						|
	if (!rep)
 | 
						|
		rep= eth_port;
 | 
						|
	if (rep->etp_wr_pack)
 | 
						|
	{
 | 
						|
		eth_fd->ef_send_next= NULL;
 | 
						|
		if (rep->etp_sendq_head)
 | 
						|
			rep->etp_sendq_tail->ef_send_next= eth_fd;
 | 
						|
		else
 | 
						|
			rep->etp_sendq_head= eth_fd;
 | 
						|
		rep->etp_sendq_tail= eth_fd;
 | 
						|
		return NW_SUSPEND;
 | 
						|
	}
 | 
						|
 | 
						|
	user_data= (*eth_fd->ef_get_userdata)(eth_fd->ef_srfd, 0,
 | 
						|
		eth_fd->ef_write_count, FALSE);
 | 
						|
	if (!user_data)
 | 
						|
	{
 | 
						|
		eth_fd->ef_flags &= ~EFF_WRITE_IP;
 | 
						|
		reply_thr_get (eth_fd, EFAULT, FALSE);
 | 
						|
		return NW_OK;
 | 
						|
	}
 | 
						|
	r= eth_send(fd, user_data, eth_fd->ef_write_count);
 | 
						|
	assert(r == NW_OK);
 | 
						|
 | 
						|
	eth_fd->ef_flags &= ~EFF_WRITE_IP;
 | 
						|
	reply_thr_get(eth_fd, eth_fd->ef_write_count, FALSE);
 | 
						|
	return NW_OK;
 | 
						|
}
 | 
						|
 | 
						|
int eth_send(fd, data, data_len)
 | 
						|
int fd;
 | 
						|
acc_t *data;
 | 
						|
size_t data_len;
 | 
						|
{
 | 
						|
	eth_fd_t *eth_fd;
 | 
						|
	eth_port_t *eth_port, *rep;
 | 
						|
	eth_hdr_t *eth_hdr;
 | 
						|
	acc_t *eth_pack;
 | 
						|
	unsigned long nweo_flags;
 | 
						|
	size_t count;
 | 
						|
	ev_arg_t ev_arg;
 | 
						|
 | 
						|
	eth_fd= ð_fd_table[fd];
 | 
						|
	eth_port= eth_fd->ef_port;
 | 
						|
 | 
						|
	if (!(eth_fd->ef_flags & EFF_OPTSET))
 | 
						|
		return EBADMODE;
 | 
						|
 | 
						|
	count= data_len;
 | 
						|
	if (eth_fd->ef_ethopt.nweo_flags & NWEO_RWDATONLY)
 | 
						|
		count += ETH_HDR_SIZE;
 | 
						|
 | 
						|
	if (count<ETH_MIN_PACK_SIZE || count>ETH_MAX_PACK_SIZE)
 | 
						|
	{
 | 
						|
		DBLOCK(1, printf("illegal packetsize (%d)\n",count));
 | 
						|
		return EPACKSIZE;
 | 
						|
	}
 | 
						|
	rep= eth_port->etp_vlan_port;
 | 
						|
	if (!rep)
 | 
						|
		rep= eth_port;
 | 
						|
 | 
						|
	if (rep->etp_wr_pack)
 | 
						|
		return NW_WOULDBLOCK;
 | 
						|
	
 | 
						|
	nweo_flags= eth_fd->ef_ethopt.nweo_flags;
 | 
						|
	if (nweo_flags & NWEO_RWDATONLY)
 | 
						|
	{
 | 
						|
		eth_pack= bf_memreq(ETH_HDR_SIZE);
 | 
						|
		eth_pack->acc_next= data;
 | 
						|
	}
 | 
						|
	else
 | 
						|
		eth_pack= bf_packIffLess(data, ETH_HDR_SIZE);
 | 
						|
 | 
						|
	eth_hdr= (eth_hdr_t *)ptr2acc_data(eth_pack);
 | 
						|
 | 
						|
	if (nweo_flags & NWEO_REMSPEC)
 | 
						|
		eth_hdr->eh_dst= eth_fd->ef_ethopt.nweo_rem;
 | 
						|
 | 
						|
	if (!(eth_port->etp_flags & EPF_GOT_ADDR))
 | 
						|
	{
 | 
						|
		/* No device, discard packet */
 | 
						|
		bf_afree(eth_pack);
 | 
						|
		return NW_OK;
 | 
						|
	}
 | 
						|
 | 
						|
	if (!(nweo_flags & NWEO_EN_PROMISC))
 | 
						|
		eth_hdr->eh_src= eth_port->etp_ethaddr;
 | 
						|
 | 
						|
	if (nweo_flags & NWEO_TYPESPEC)
 | 
						|
		eth_hdr->eh_proto= eth_fd->ef_ethopt.nweo_type;
 | 
						|
 | 
						|
	if (eth_addrcmp(eth_hdr->eh_dst, eth_port->etp_ethaddr) == 0)
 | 
						|
	{
 | 
						|
		/* Local loopback. */
 | 
						|
		eth_port->etp_wr_pack= eth_pack;
 | 
						|
		ev_arg.ev_ptr= eth_port;
 | 
						|
		ev_enqueue(ð_port->etp_sendev, eth_loop_ev, ev_arg);
 | 
						|
		return NW_OK;
 | 
						|
	}
 | 
						|
 | 
						|
	if (rep != eth_port)
 | 
						|
	{
 | 
						|
		eth_pack= insert_vlan_hdr(eth_port, eth_pack);
 | 
						|
		if (!eth_pack)
 | 
						|
		{
 | 
						|
			/* Packet is silently discarded */
 | 
						|
			return NW_OK;
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	eth_write_port(rep, eth_pack);
 | 
						|
	return NW_OK;
 | 
						|
}
 | 
						|
 | 
						|
int eth_read (fd, count)
 | 
						|
int fd;
 | 
						|
size_t count;
 | 
						|
{
 | 
						|
	eth_fd_t *eth_fd;
 | 
						|
	acc_t *pack;
 | 
						|
 | 
						|
	eth_fd= ð_fd_table[fd];
 | 
						|
	if (!(eth_fd->ef_flags & EFF_OPTSET))
 | 
						|
	{
 | 
						|
		reply_thr_put(eth_fd, EBADMODE, FALSE);
 | 
						|
		return NW_OK;
 | 
						|
	}
 | 
						|
	if (count < ETH_MAX_PACK_SIZE)
 | 
						|
	{
 | 
						|
		reply_thr_put(eth_fd, EPACKSIZE, FALSE);
 | 
						|
		return NW_OK;
 | 
						|
	}
 | 
						|
 | 
						|
	assert(!(eth_fd->ef_flags & EFF_READ_IP));
 | 
						|
	eth_fd->ef_flags |= EFF_READ_IP;
 | 
						|
 | 
						|
	while (eth_fd->ef_rdbuf_head)
 | 
						|
	{
 | 
						|
		pack= eth_fd->ef_rdbuf_head;
 | 
						|
		eth_fd->ef_rdbuf_head= pack->acc_ext_link;
 | 
						|
		if (get_time() <= eth_fd->ef_exp_time)
 | 
						|
		{
 | 
						|
			packet2user(eth_fd, pack, eth_fd->ef_exp_time);
 | 
						|
			if (!(eth_fd->ef_flags & EFF_READ_IP))
 | 
						|
				return NW_OK;
 | 
						|
		}
 | 
						|
		else
 | 
						|
			bf_afree(pack);
 | 
						|
	}
 | 
						|
	return NW_SUSPEND;
 | 
						|
}
 | 
						|
 | 
						|
int eth_cancel(fd, which_operation)
 | 
						|
int fd;
 | 
						|
int which_operation;
 | 
						|
{
 | 
						|
	eth_fd_t *eth_fd, *prev, *loc_fd;
 | 
						|
	eth_port_t *eth_port;
 | 
						|
 | 
						|
	DBLOCK(2, printf("eth_cancel (%d)\n", fd));
 | 
						|
	eth_fd= ð_fd_table[fd];
 | 
						|
 | 
						|
	switch (which_operation)
 | 
						|
	{
 | 
						|
	case SR_CANCEL_READ:
 | 
						|
		assert (eth_fd->ef_flags & EFF_READ_IP);
 | 
						|
		eth_fd->ef_flags &= ~EFF_READ_IP;
 | 
						|
		reply_thr_put(eth_fd, EINTR, FALSE);
 | 
						|
		break;
 | 
						|
	case SR_CANCEL_WRITE:
 | 
						|
		assert (eth_fd->ef_flags & EFF_WRITE_IP);
 | 
						|
		eth_fd->ef_flags &= ~EFF_WRITE_IP;
 | 
						|
 | 
						|
		/* Remove fd from send queue */
 | 
						|
		eth_port= eth_fd->ef_port;
 | 
						|
		if (eth_port->etp_vlan_port)
 | 
						|
			eth_port= eth_port->etp_vlan_port;
 | 
						|
		for (prev= 0, loc_fd= eth_port->etp_sendq_head; loc_fd != NULL;
 | 
						|
			prev= loc_fd, loc_fd= loc_fd->ef_send_next)
 | 
						|
		{
 | 
						|
			if (loc_fd == eth_fd)
 | 
						|
				break;
 | 
						|
		}
 | 
						|
		assert(loc_fd == eth_fd);
 | 
						|
		if (prev == NULL)
 | 
						|
			eth_port->etp_sendq_head= loc_fd->ef_send_next;
 | 
						|
		else
 | 
						|
			prev->ef_send_next= loc_fd->ef_send_next;
 | 
						|
		if (loc_fd->ef_send_next == NULL)
 | 
						|
			eth_port->etp_sendq_tail= prev;
 | 
						|
			
 | 
						|
		reply_thr_get(eth_fd, EINTR, FALSE);
 | 
						|
		break;
 | 
						|
	case SR_CANCEL_IOCTL:
 | 
						|
		assert (eth_fd->ef_flags & EFF_IOCTL_IP);
 | 
						|
		eth_fd->ef_flags &= ~EFF_IOCTL_IP;
 | 
						|
		reply_thr_get(eth_fd, EINTR, TRUE);
 | 
						|
		break;
 | 
						|
	default:
 | 
						|
		ip_panic(( "got unknown cancel request" ));
 | 
						|
	}
 | 
						|
	return NW_OK;
 | 
						|
}
 | 
						|
 | 
						|
int eth_select(fd, operations)
 | 
						|
int fd;
 | 
						|
unsigned operations;
 | 
						|
{
 | 
						|
	unsigned resops;
 | 
						|
	eth_fd_t *eth_fd;
 | 
						|
 | 
						|
	eth_fd= ð_fd_table[fd];
 | 
						|
	assert (eth_fd->ef_flags & EFF_INUSE);
 | 
						|
 | 
						|
	resops= 0;
 | 
						|
 | 
						|
	if (operations & SR_SELECT_READ)
 | 
						|
	{
 | 
						|
		if (eth_sel_read(eth_fd))
 | 
						|
			resops |= SR_SELECT_READ;
 | 
						|
		else if (!(operations & SR_SELECT_POLL))
 | 
						|
			eth_fd->ef_flags |= EFF_SEL_READ;
 | 
						|
	}
 | 
						|
	if (operations & SR_SELECT_WRITE)
 | 
						|
	{
 | 
						|
		/* Should handle special case when the interface is down */
 | 
						|
		resops |= SR_SELECT_WRITE;
 | 
						|
	}
 | 
						|
	if (operations & SR_SELECT_EXCEPTION)
 | 
						|
	{
 | 
						|
		printf("eth_select: not implemented for exceptions\n");
 | 
						|
	}
 | 
						|
	return resops;
 | 
						|
}
 | 
						|
 | 
						|
void eth_close(fd)
 | 
						|
int fd;
 | 
						|
{
 | 
						|
	eth_fd_t *eth_fd;
 | 
						|
	eth_port_t *eth_port;
 | 
						|
	acc_t *pack;
 | 
						|
 | 
						|
	eth_fd= ð_fd_table[fd];
 | 
						|
 | 
						|
	assert ((eth_fd->ef_flags & EFF_INUSE) &&
 | 
						|
		!(eth_fd->ef_flags & EFF_BUSY));
 | 
						|
 | 
						|
	if (eth_fd->ef_flags & EFF_OPTSET)
 | 
						|
		unhash_fd(eth_fd);
 | 
						|
	while (eth_fd->ef_rdbuf_head != NULL)
 | 
						|
	{
 | 
						|
		pack= eth_fd->ef_rdbuf_head;
 | 
						|
		eth_fd->ef_rdbuf_head= pack->acc_ext_link;
 | 
						|
		bf_afree(pack);
 | 
						|
	}
 | 
						|
	eth_fd->ef_flags= EFF_EMPTY;
 | 
						|
 | 
						|
	eth_port= eth_fd->ef_port;
 | 
						|
	do_rec_conf(eth_port);
 | 
						|
}
 | 
						|
 | 
						|
void eth_loop_ev(ev, ev_arg)
 | 
						|
event_t *ev;
 | 
						|
ev_arg_t ev_arg;
 | 
						|
{
 | 
						|
	acc_t *pack;
 | 
						|
	eth_port_t *eth_port;
 | 
						|
 | 
						|
	eth_port= ev_arg.ev_ptr;
 | 
						|
	assert(ev == ð_port->etp_sendev);
 | 
						|
 | 
						|
	pack= eth_port->etp_wr_pack;
 | 
						|
 | 
						|
	assert(!no_ethWritePort);
 | 
						|
	no_ethWritePort= 1;
 | 
						|
	eth_arrive(eth_port, pack, bf_bufsize(pack));
 | 
						|
	assert(no_ethWritePort);
 | 
						|
	no_ethWritePort= 0;
 | 
						|
 | 
						|
	eth_port->etp_wr_pack= NULL;
 | 
						|
	eth_restart_write(eth_port);
 | 
						|
}
 | 
						|
 | 
						|
static int eth_checkopt (eth_fd)
 | 
						|
eth_fd_t *eth_fd;
 | 
						|
{
 | 
						|
/* bug: we don't check access modes yet */
 | 
						|
 | 
						|
	unsigned long flags;
 | 
						|
	unsigned int en_di_flags;
 | 
						|
	acc_t *pack;
 | 
						|
 | 
						|
	flags= eth_fd->ef_ethopt.nweo_flags;
 | 
						|
	en_di_flags= (flags >>16) | (flags & 0xffff);
 | 
						|
 | 
						|
	if ((en_di_flags & NWEO_ACC_MASK) &&
 | 
						|
		(en_di_flags & NWEO_LOC_MASK) &&
 | 
						|
		(en_di_flags & NWEO_BROAD_MASK) &&
 | 
						|
		(en_di_flags & NWEO_MULTI_MASK) &&
 | 
						|
		(en_di_flags & NWEO_PROMISC_MASK) &&
 | 
						|
		(en_di_flags & NWEO_REM_MASK) &&
 | 
						|
		(en_di_flags & NWEO_TYPE_MASK) &&
 | 
						|
		(en_di_flags & NWEO_RW_MASK))
 | 
						|
	{
 | 
						|
		eth_fd->ef_flags |= EFF_OPTSET;
 | 
						|
	}
 | 
						|
	else
 | 
						|
		eth_fd->ef_flags &= ~EFF_OPTSET;
 | 
						|
 | 
						|
	while (eth_fd->ef_rdbuf_head != NULL)
 | 
						|
	{
 | 
						|
		pack= eth_fd->ef_rdbuf_head;
 | 
						|
		eth_fd->ef_rdbuf_head= pack->acc_ext_link;
 | 
						|
		bf_afree(pack);
 | 
						|
	}
 | 
						|
 | 
						|
	return NW_OK;
 | 
						|
}
 | 
						|
 | 
						|
static void hash_fd(eth_fd)
 | 
						|
eth_fd_t *eth_fd;
 | 
						|
{
 | 
						|
	eth_port_t *eth_port;
 | 
						|
	int hash;
 | 
						|
 | 
						|
	eth_port= eth_fd->ef_port;
 | 
						|
	if (eth_fd->ef_ethopt.nweo_flags & NWEO_TYPEANY)
 | 
						|
	{
 | 
						|
		eth_fd->ef_type_next= eth_port->etp_type_any;
 | 
						|
		eth_port->etp_type_any= eth_fd;
 | 
						|
	}
 | 
						|
	else
 | 
						|
	{
 | 
						|
		hash= eth_fd->ef_ethopt.nweo_type;
 | 
						|
		hash ^= (hash >> 8);
 | 
						|
		hash &= (ETH_TYPE_HASH_NR-1);
 | 
						|
 | 
						|
		eth_fd->ef_type_next= eth_port->etp_type[hash];
 | 
						|
		eth_port->etp_type[hash]= eth_fd;
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
static void unhash_fd(eth_fd)
 | 
						|
eth_fd_t *eth_fd;
 | 
						|
{
 | 
						|
	eth_port_t *eth_port;
 | 
						|
	eth_fd_t *prev, *curr, **eth_fd_p;
 | 
						|
	int hash;
 | 
						|
 | 
						|
	eth_port= eth_fd->ef_port;
 | 
						|
	if (eth_fd->ef_ethopt.nweo_flags & NWEO_TYPEANY)
 | 
						|
	{
 | 
						|
		eth_fd_p= ð_port->etp_type_any;
 | 
						|
	}
 | 
						|
	else
 | 
						|
	{
 | 
						|
		hash= eth_fd->ef_ethopt.nweo_type;
 | 
						|
		hash ^= (hash >> 8);
 | 
						|
		hash &= (ETH_TYPE_HASH_NR-1);
 | 
						|
 | 
						|
		eth_fd_p= ð_port->etp_type[hash];
 | 
						|
	}
 | 
						|
	for (prev= NULL, curr= *eth_fd_p; curr;
 | 
						|
		prev= curr, curr= curr->ef_type_next)
 | 
						|
	{
 | 
						|
		if (curr == eth_fd)
 | 
						|
			break;
 | 
						|
	}
 | 
						|
	assert(curr);
 | 
						|
	if (prev)
 | 
						|
		prev->ef_type_next= curr->ef_type_next;
 | 
						|
	else
 | 
						|
		*eth_fd_p= curr->ef_type_next;
 | 
						|
}
 | 
						|
 | 
						|
void eth_restart_write(eth_port)
 | 
						|
eth_port_t *eth_port;
 | 
						|
{
 | 
						|
	eth_fd_t *eth_fd;
 | 
						|
	int r;
 | 
						|
 | 
						|
	assert(eth_port->etp_wr_pack == NULL);
 | 
						|
	while (eth_fd= eth_port->etp_sendq_head, eth_fd != NULL)
 | 
						|
	{
 | 
						|
		if (eth_port->etp_wr_pack)
 | 
						|
			return;
 | 
						|
		eth_port->etp_sendq_head= eth_fd->ef_send_next;
 | 
						|
 | 
						|
		assert(eth_fd->ef_flags & EFF_WRITE_IP);
 | 
						|
		eth_fd->ef_flags &= ~EFF_WRITE_IP;
 | 
						|
		r= eth_write(eth_fd-eth_fd_table, eth_fd->ef_write_count);
 | 
						|
		assert(r == NW_OK);
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
void eth_arrive (eth_port, pack, pack_size)
 | 
						|
eth_port_t *eth_port;
 | 
						|
acc_t *pack;
 | 
						|
size_t pack_size;
 | 
						|
{
 | 
						|
 | 
						|
	eth_hdr_t *eth_hdr;
 | 
						|
	ether_addr_t *dst_addr;
 | 
						|
	int pack_stat;
 | 
						|
	ether_type_t type;
 | 
						|
	eth_fd_t *eth_fd, *first_fd, *share_fd;
 | 
						|
	int hash, i;
 | 
						|
	u16_t vlan, temp;
 | 
						|
	time_t exp_time;
 | 
						|
	acc_t *vlan_pack, *hdr_acc, *tmp_acc;
 | 
						|
	eth_port_t *vp;
 | 
						|
	vlan_hdr_t vh;
 | 
						|
	u32_t *p;
 | 
						|
 | 
						|
	exp_time= get_time() + EXPIRE_TIME;
 | 
						|
 | 
						|
	pack= bf_packIffLess(pack, ETH_HDR_SIZE);
 | 
						|
 | 
						|
	eth_hdr= (eth_hdr_t*)ptr2acc_data(pack);
 | 
						|
	dst_addr= ð_hdr->eh_dst;
 | 
						|
 | 
						|
	DIFBLOCK(0x20, dst_addr->ea_addr[0] != 0xFF &&
 | 
						|
		(dst_addr->ea_addr[0] & 0x1),
 | 
						|
		printf("got multicast packet\n"));
 | 
						|
 | 
						|
	if (dst_addr->ea_addr[0] & 0x1)
 | 
						|
	{
 | 
						|
		/* multi cast or broadcast */
 | 
						|
		if (eth_addrcmp(*dst_addr, broadcast) == 0)
 | 
						|
			pack_stat= NWEO_EN_BROAD;
 | 
						|
		else
 | 
						|
			pack_stat= NWEO_EN_MULTI;
 | 
						|
	}
 | 
						|
	else
 | 
						|
	{
 | 
						|
		assert(eth_port->etp_flags & EPF_GOT_ADDR);
 | 
						|
		if (eth_addrcmp (*dst_addr, eth_port->etp_ethaddr) == 0)
 | 
						|
			pack_stat= NWEO_EN_LOC;
 | 
						|
		else
 | 
						|
			pack_stat= NWEO_EN_PROMISC;
 | 
						|
	}
 | 
						|
	type= eth_hdr->eh_proto;
 | 
						|
	hash= type;
 | 
						|
	hash ^= (hash >> 8);
 | 
						|
	hash &= (ETH_TYPE_HASH_NR-1);
 | 
						|
 | 
						|
	if (type == HTONS(ETH_VLAN_PROTO))
 | 
						|
	{
 | 
						|
		/* VLAN packet. Extract original ethernet packet */
 | 
						|
 | 
						|
		vlan_pack= pack;
 | 
						|
		vlan_pack->acc_linkC++;
 | 
						|
		hdr_acc= bf_cut(vlan_pack, 0, 2*sizeof(ether_addr_t));
 | 
						|
		vlan_pack= bf_delhead(vlan_pack, 2*sizeof(ether_addr_t));
 | 
						|
		vlan_pack= bf_packIffLess(vlan_pack, sizeof(vh));
 | 
						|
		vh= *(vlan_hdr_t *)ptr2acc_data(vlan_pack);
 | 
						|
		vlan_pack= bf_delhead(vlan_pack, sizeof(vh));
 | 
						|
		hdr_acc= bf_append(hdr_acc, vlan_pack);
 | 
						|
		vlan_pack= hdr_acc; hdr_acc= NULL;
 | 
						|
		if (bf_bufsize(vlan_pack) < ETH_MIN_PACK_SIZE)
 | 
						|
		{
 | 
						|
			tmp_acc= bf_memreq(sizeof(vh));
 | 
						|
 | 
						|
			/* Clear padding */
 | 
						|
			assert(sizeof(vh) <= sizeof(*p));
 | 
						|
			p= (u32_t *)ptr2acc_data(tmp_acc);
 | 
						|
			*p= 0xdeadbeef;
 | 
						|
 | 
						|
			vlan_pack= bf_append(vlan_pack, tmp_acc);
 | 
						|
			tmp_acc= NULL;
 | 
						|
		}
 | 
						|
		vlan= ntohs(vh.vh_vlan);
 | 
						|
		if (vlan & ETH_TCI_CFI)
 | 
						|
		{
 | 
						|
			/* No support for extended address formats */
 | 
						|
			bf_afree(vlan_pack); vlan_pack= NULL;
 | 
						|
		}
 | 
						|
		vlan &= ETH_TCI_VLAN_MASK;
 | 
						|
	}
 | 
						|
	else
 | 
						|
	{
 | 
						|
		/* No VLAN processing */
 | 
						|
		vlan_pack= NULL;
 | 
						|
		vlan= 0;	/* lint */
 | 
						|
	}
 | 
						|
 | 
						|
	first_fd= NULL;
 | 
						|
	for (i= 0; i<2; i++)
 | 
						|
	{
 | 
						|
		share_fd= NULL;
 | 
						|
 | 
						|
		eth_fd= (i == 0) ? eth_port->etp_type_any :
 | 
						|
			eth_port->etp_type[hash];
 | 
						|
		for (; eth_fd; eth_fd= eth_fd->ef_type_next)
 | 
						|
		{
 | 
						|
			if (i && eth_fd->ef_ethopt.nweo_type != type)
 | 
						|
				continue;
 | 
						|
			if (!(eth_fd->ef_ethopt.nweo_flags & pack_stat))
 | 
						|
				continue;
 | 
						|
			if (eth_fd->ef_ethopt.nweo_flags & NWEO_REMSPEC &&
 | 
						|
				eth_addrcmp(eth_hdr->eh_src,
 | 
						|
				eth_fd->ef_ethopt.nweo_rem) != 0)
 | 
						|
			{
 | 
						|
					continue;
 | 
						|
			}
 | 
						|
			if ((eth_fd->ef_ethopt.nweo_flags & NWEO_ACC_MASK) ==
 | 
						|
				NWEO_SHARED)
 | 
						|
			{
 | 
						|
				if (!share_fd)
 | 
						|
				{
 | 
						|
					share_fd= eth_fd;
 | 
						|
					continue;
 | 
						|
				}
 | 
						|
				if (!eth_fd->ef_rdbuf_head)
 | 
						|
					share_fd= eth_fd;
 | 
						|
				continue;
 | 
						|
			}
 | 
						|
			if (!first_fd)
 | 
						|
			{
 | 
						|
				first_fd= eth_fd;
 | 
						|
				continue;
 | 
						|
			}
 | 
						|
			pack->acc_linkC++;
 | 
						|
			packet2user(eth_fd, pack, exp_time);
 | 
						|
		}
 | 
						|
		if (share_fd)
 | 
						|
		{
 | 
						|
			pack->acc_linkC++;
 | 
						|
			packet2user(share_fd, pack, exp_time);
 | 
						|
		}
 | 
						|
	}
 | 
						|
	if (first_fd)
 | 
						|
	{
 | 
						|
		if (first_fd->ef_put_pkt &&
 | 
						|
			(first_fd->ef_flags & EFF_READ_IP) &&
 | 
						|
			!(first_fd->ef_ethopt.nweo_flags & NWEO_RWDATONLY))
 | 
						|
		{
 | 
						|
			(*first_fd->ef_put_pkt)(first_fd->ef_srfd, pack,
 | 
						|
				pack_size);
 | 
						|
		}
 | 
						|
		else
 | 
						|
			packet2user(first_fd, pack, exp_time);
 | 
						|
	}
 | 
						|
	else
 | 
						|
	{
 | 
						|
		if (pack_stat == NWEO_EN_LOC)
 | 
						|
		{
 | 
						|
			DBLOCK(0x01,
 | 
						|
			printf("eth_arrive: dropping packet for proto 0x%x\n",
 | 
						|
				ntohs(type)));
 | 
						|
		}
 | 
						|
		else
 | 
						|
		{
 | 
						|
			DBLOCK(0x20, printf("dropping packet for proto 0x%x\n",
 | 
						|
				ntohs(type)));
 | 
						|
		}			
 | 
						|
		bf_afree(pack);
 | 
						|
	}
 | 
						|
	if (vlan_pack)
 | 
						|
	{
 | 
						|
		hash= ETH_HASH_VLAN(vlan, temp);
 | 
						|
		for (vp= eth_port->etp_vlan_tab[hash]; vp;
 | 
						|
			vp= vp->etp_vlan_next)
 | 
						|
		{
 | 
						|
			if (vp->etp_vlan == vlan)
 | 
						|
				break;
 | 
						|
		}
 | 
						|
		if (vp)
 | 
						|
		{
 | 
						|
			eth_arrive(vp, vlan_pack, pack_size-sizeof(vh));
 | 
						|
			vlan_pack= NULL;
 | 
						|
		}
 | 
						|
		else
 | 
						|
		{
 | 
						|
			/* No device for VLAN */
 | 
						|
			bf_afree(vlan_pack);
 | 
						|
			vlan_pack= NULL;
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
void eth_reg_vlan(eth_port, vlan_port)
 | 
						|
eth_port_t *eth_port;
 | 
						|
eth_port_t *vlan_port;
 | 
						|
{
 | 
						|
	u16_t t, vlan;
 | 
						|
	int h;
 | 
						|
 | 
						|
	vlan= vlan_port->etp_vlan;
 | 
						|
	h= ETH_HASH_VLAN(vlan, t);
 | 
						|
	vlan_port->etp_vlan_next= eth_port->etp_vlan_tab[h];
 | 
						|
	eth_port->etp_vlan_tab[h]= vlan_port;
 | 
						|
}
 | 
						|
 | 
						|
void eth_restart_ioctl(eth_port)
 | 
						|
eth_port_t *eth_port;
 | 
						|
{
 | 
						|
	int i, r;
 | 
						|
	eth_fd_t *eth_fd;
 | 
						|
	acc_t *acc;
 | 
						|
 | 
						|
#if 0
 | 
						|
	printf("in eth_restart_ioctl\n");
 | 
						|
#endif
 | 
						|
 | 
						|
	/* eth_restart_ioctl is called on too occasions: when a device
 | 
						|
	 * driver registers with inet and when a eth_get_stat call has
 | 
						|
	 * completed. We assume the second option when etp_getstat is
 | 
						|
	 * not equal to zero at the start of the call.
 | 
						|
	 */
 | 
						|
	acc= eth_port->etp_getstat;
 | 
						|
 | 
						|
	for (i= 0, eth_fd= eth_fd_table; i<ETH_FD_NR; i++, eth_fd++)
 | 
						|
	{
 | 
						|
		if (!(eth_fd->ef_flags & EFF_INUSE))
 | 
						|
			continue;
 | 
						|
		if (eth_fd->ef_port != eth_port)
 | 
						|
			continue;
 | 
						|
		if (!(eth_fd->ef_flags & EFF_IOCTL_IP))
 | 
						|
			continue;
 | 
						|
		if (eth_fd->ef_ioctl_req != NWIOGETHSTAT)
 | 
						|
			continue;
 | 
						|
 | 
						|
#if 0
 | 
						|
printf("eth_restart_ioctl: etp_getstat in port %d is %p\n",
 | 
						|
	eth_port-eth_port_table, acc);
 | 
						|
#endif
 | 
						|
 | 
						|
		if (acc != NULL)
 | 
						|
		{
 | 
						|
#if 0
 | 
						|
			printf("eth_restart_ioctl: completed getstat\n");
 | 
						|
#endif
 | 
						|
			acc->acc_linkC++;
 | 
						|
			r= (*eth_fd->ef_put_userdata)(eth_fd->ef_srfd, 0,
 | 
						|
				acc, TRUE);
 | 
						|
			if (r >= 0)
 | 
						|
				reply_thr_put(eth_fd, NW_OK, TRUE);
 | 
						|
			eth_fd->ef_flags &= ~EFF_IOCTL_IP;
 | 
						|
			continue;
 | 
						|
		}
 | 
						|
 | 
						|
 { static int count; if (++count > 5) ip_panic(("too many restarts")); }
 | 
						|
 | 
						|
		eth_fd->ef_flags &= ~EFF_IOCTL_IP;
 | 
						|
		eth_ioctl(i, eth_fd->ef_ioctl_req);
 | 
						|
	}
 | 
						|
 | 
						|
	if (acc != NULL)
 | 
						|
	{
 | 
						|
#if 0
 | 
						|
printf("eth_restart_ioctl: clearing etp_getstat in port %d\n",
 | 
						|
	eth_port-eth_port_table);
 | 
						|
#endif
 | 
						|
		assert(acc == eth_port->etp_getstat);
 | 
						|
 | 
						|
		bf_afree(acc);
 | 
						|
		eth_port->etp_getstat= NULL;
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
static int eth_sel_read (eth_fd)
 | 
						|
eth_fd_t *eth_fd;
 | 
						|
{
 | 
						|
	acc_t *tmp_acc, *next_acc;
 | 
						|
 | 
						|
	if (!(eth_fd->ef_flags & EFF_OPTSET))
 | 
						|
		return 1;	/* Read will not block */
 | 
						|
 | 
						|
	if (eth_fd->ef_rdbuf_head)
 | 
						|
	{
 | 
						|
		if (get_time() <= eth_fd->ef_exp_time)
 | 
						|
			return 1;
 | 
						|
		
 | 
						|
		tmp_acc= eth_fd->ef_rdbuf_head;
 | 
						|
		while (tmp_acc)
 | 
						|
		{
 | 
						|
			next_acc= tmp_acc->acc_ext_link;
 | 
						|
			bf_afree(tmp_acc);
 | 
						|
			tmp_acc= next_acc;
 | 
						|
		}
 | 
						|
		eth_fd->ef_rdbuf_head= NULL;
 | 
						|
	}
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
static void packet2user (eth_fd, pack, exp_time)
 | 
						|
eth_fd_t *eth_fd;
 | 
						|
acc_t *pack;
 | 
						|
time_t exp_time;
 | 
						|
{
 | 
						|
	int result;
 | 
						|
	acc_t *tmp_pack;
 | 
						|
	size_t size;
 | 
						|
 | 
						|
	assert (eth_fd->ef_flags & EFF_INUSE);
 | 
						|
	if (!(eth_fd->ef_flags & EFF_READ_IP))
 | 
						|
	{
 | 
						|
		if (pack->acc_linkC != 1)
 | 
						|
		{
 | 
						|
			tmp_pack= bf_dupacc(pack);
 | 
						|
			bf_afree(pack);
 | 
						|
			pack= tmp_pack;
 | 
						|
			tmp_pack= NULL;
 | 
						|
		}
 | 
						|
		pack->acc_ext_link= NULL;
 | 
						|
		if (eth_fd->ef_rdbuf_head == NULL)
 | 
						|
		{
 | 
						|
			eth_fd->ef_rdbuf_head= pack;
 | 
						|
			eth_fd->ef_exp_time= exp_time;
 | 
						|
		}
 | 
						|
		else
 | 
						|
			eth_fd->ef_rdbuf_tail->acc_ext_link= pack;
 | 
						|
		eth_fd->ef_rdbuf_tail= pack;
 | 
						|
 | 
						|
		if (eth_fd->ef_flags & EFF_SEL_READ)
 | 
						|
		{
 | 
						|
			eth_fd->ef_flags &= ~EFF_SEL_READ;
 | 
						|
			if (eth_fd->ef_select_res)
 | 
						|
				eth_fd->ef_select_res(eth_fd->ef_srfd, SR_SELECT_READ);
 | 
						|
			else
 | 
						|
				printf("packet2user: no select_res\n");
 | 
						|
		}
 | 
						|
		return;
 | 
						|
	}
 | 
						|
 | 
						|
	if (eth_fd->ef_ethopt.nweo_flags & NWEO_RWDATONLY)
 | 
						|
		pack= bf_delhead(pack, ETH_HDR_SIZE);
 | 
						|
 | 
						|
	size= bf_bufsize(pack);
 | 
						|
 | 
						|
	if (eth_fd->ef_put_pkt)
 | 
						|
	{
 | 
						|
		(*eth_fd->ef_put_pkt)(eth_fd->ef_srfd, pack, size);
 | 
						|
		return;
 | 
						|
	}
 | 
						|
 | 
						|
	eth_fd->ef_flags &= ~EFF_READ_IP;
 | 
						|
	result= (*eth_fd->ef_put_userdata)(eth_fd->ef_srfd, (size_t)0, pack,
 | 
						|
		FALSE);
 | 
						|
	if (result >=0)
 | 
						|
		reply_thr_put(eth_fd, size, FALSE);
 | 
						|
	else
 | 
						|
		reply_thr_put(eth_fd, result, FALSE);
 | 
						|
}
 | 
						|
 | 
						|
static void eth_buffree (priority)
 | 
						|
int priority;
 | 
						|
{
 | 
						|
	int i;
 | 
						|
	eth_fd_t *eth_fd;
 | 
						|
	acc_t *pack;
 | 
						|
 | 
						|
	if (priority == ETH_PRI_FDBUFS_EXTRA)
 | 
						|
	{
 | 
						|
		for (i= 0, eth_fd= eth_fd_table; i<ETH_FD_NR; i++, eth_fd++)
 | 
						|
		{
 | 
						|
			while (eth_fd->ef_rdbuf_head &&
 | 
						|
				eth_fd->ef_rdbuf_head->acc_ext_link)
 | 
						|
			{
 | 
						|
				pack= eth_fd->ef_rdbuf_head;
 | 
						|
				eth_fd->ef_rdbuf_head= pack->acc_ext_link;
 | 
						|
				bf_afree(pack);
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
	if (priority == ETH_PRI_FDBUFS)
 | 
						|
	{
 | 
						|
		for (i= 0, eth_fd= eth_fd_table; i<ETH_FD_NR; i++, eth_fd++)
 | 
						|
		{
 | 
						|
			while (eth_fd->ef_rdbuf_head)
 | 
						|
			{
 | 
						|
				pack= eth_fd->ef_rdbuf_head;
 | 
						|
				eth_fd->ef_rdbuf_head= pack->acc_ext_link;
 | 
						|
				bf_afree(pack);
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
#ifdef BUF_CONSISTENCY_CHECK
 | 
						|
static void eth_bufcheck()
 | 
						|
{
 | 
						|
	int i;
 | 
						|
	eth_fd_t *eth_fd;
 | 
						|
	acc_t *pack;
 | 
						|
 | 
						|
	for (i= 0; i<eth_conf_nr; i++)
 | 
						|
	{
 | 
						|
		bf_check_acc(eth_port_table[i].etp_rd_pack);
 | 
						|
		bf_check_acc(eth_port_table[i].etp_wr_pack);
 | 
						|
	}
 | 
						|
	for (i= 0, eth_fd= eth_fd_table; i<ETH_FD_NR; i++, eth_fd++)
 | 
						|
	{
 | 
						|
		for (pack= eth_fd->ef_rdbuf_head; pack;
 | 
						|
			pack= pack->acc_ext_link)
 | 
						|
		{
 | 
						|
			bf_check_acc(pack);
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
#endif
 | 
						|
 | 
						|
static void do_rec_conf(eth_port)
 | 
						|
eth_port_t *eth_port;
 | 
						|
{
 | 
						|
	int i;
 | 
						|
	u32_t flags;
 | 
						|
	eth_port_t *vp;
 | 
						|
 | 
						|
	assert(eth_port);
 | 
						|
 | 
						|
	if (eth_port->etp_vlan)
 | 
						|
	{
 | 
						|
		/* Configure underlying device */
 | 
						|
		eth_port= eth_port->etp_vlan_port;
 | 
						|
	}
 | 
						|
	flags= compute_rec_conf(eth_port);
 | 
						|
	for (i= 0; i<ETH_VLAN_HASH_NR; i++)
 | 
						|
	{
 | 
						|
		for (vp= eth_port->etp_vlan_tab[i]; vp; vp= vp->etp_vlan_next)
 | 
						|
			flags |= compute_rec_conf(vp);
 | 
						|
	}
 | 
						|
	eth_set_rec_conf(eth_port, flags);
 | 
						|
}
 | 
						|
 | 
						|
static u32_t compute_rec_conf(eth_port)
 | 
						|
eth_port_t *eth_port;
 | 
						|
{
 | 
						|
	eth_fd_t *eth_fd;
 | 
						|
	u32_t flags;
 | 
						|
	int i;
 | 
						|
 | 
						|
	flags= NWEO_NOFLAGS;
 | 
						|
	for (i=0, eth_fd= eth_fd_table; i<ETH_FD_NR; i++, eth_fd++)
 | 
						|
	{
 | 
						|
		if ((eth_fd->ef_flags & (EFF_INUSE|EFF_OPTSET)) !=
 | 
						|
			(EFF_INUSE|EFF_OPTSET))
 | 
						|
		{
 | 
						|
			continue;
 | 
						|
		}
 | 
						|
		if (eth_fd->ef_port != eth_port)
 | 
						|
			continue;
 | 
						|
		flags |= eth_fd->ef_ethopt.nweo_flags;
 | 
						|
	}
 | 
						|
	return flags;
 | 
						|
}
 | 
						|
 | 
						|
static void reply_thr_get (eth_fd, result, for_ioctl)
 | 
						|
eth_fd_t *eth_fd;
 | 
						|
size_t result;
 | 
						|
int for_ioctl;
 | 
						|
{
 | 
						|
	acc_t *data;
 | 
						|
 | 
						|
	data= (*eth_fd->ef_get_userdata)(eth_fd->ef_srfd, result, 0, for_ioctl);
 | 
						|
	assert (!data);	
 | 
						|
}
 | 
						|
 | 
						|
static void reply_thr_put (eth_fd, result, for_ioctl)
 | 
						|
eth_fd_t *eth_fd;
 | 
						|
size_t result;
 | 
						|
int for_ioctl;
 | 
						|
{
 | 
						|
	int error;
 | 
						|
 | 
						|
	error= (*eth_fd->ef_put_userdata)(eth_fd->ef_srfd, result, (acc_t *)0,
 | 
						|
		for_ioctl);
 | 
						|
	assert(error == NW_OK);
 | 
						|
}
 | 
						|
 | 
						|
static acc_t *insert_vlan_hdr(eth_port, pack)
 | 
						|
eth_port_t *eth_port;
 | 
						|
acc_t *pack;
 | 
						|
{
 | 
						|
	acc_t *head_acc, *vh_acc;
 | 
						|
	u16_t type, vlan;
 | 
						|
	vlan_hdr_t *vp;
 | 
						|
 | 
						|
	head_acc= bf_cut(pack, 0, 2*sizeof(ether_addr_t));
 | 
						|
	pack= bf_delhead(pack, 2*sizeof(ether_addr_t));
 | 
						|
	pack= bf_packIffLess(pack, sizeof(type));
 | 
						|
	type= *(u16_t *)ptr2acc_data(pack);
 | 
						|
	if (type == HTONS(ETH_VLAN_PROTO))
 | 
						|
	{
 | 
						|
		/* Packeted is already tagged. Should update vlan number.
 | 
						|
		 * For now, just discard packet.
 | 
						|
		 */
 | 
						|
		printf("insert_vlan_hdr: discarding vlan packet\n");
 | 
						|
		bf_afree(head_acc); head_acc= NULL;
 | 
						|
		bf_afree(pack); pack= NULL;
 | 
						|
		return NULL;
 | 
						|
	}
 | 
						|
	vlan= eth_port->etp_vlan;	/* priority and CFI are zero */
 | 
						|
 | 
						|
	vh_acc= bf_memreq(sizeof(vlan_hdr_t));
 | 
						|
	vp= (vlan_hdr_t *)ptr2acc_data(vh_acc);
 | 
						|
	vp->vh_type= HTONS(ETH_VLAN_PROTO);
 | 
						|
	vp->vh_vlan= htons(vlan);
 | 
						|
 | 
						|
	head_acc= bf_append(head_acc, vh_acc); vh_acc= NULL;
 | 
						|
	head_acc= bf_append(head_acc, pack); pack= NULL;
 | 
						|
	pack= head_acc; head_acc= NULL;
 | 
						|
	return pack;
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 * $PchId: eth.c,v 1.23 2005/06/28 14:15:58 philip Exp $
 | 
						|
 */
 |