819 lines
		
	
	
		
			18 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			819 lines
		
	
	
		
			18 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
| generic/psip.c
 | |
| 
 | |
| Implementation of a pseudo IP device.
 | |
| 
 | |
| Created:	Apr 22, 1993 by Philip Homburg
 | |
| 
 | |
| Copyright 1995 Philip Homburg
 | |
| */
 | |
| 
 | |
| #include "inet.h"
 | |
| #include "assert.h"
 | |
| #include "buf.h"
 | |
| #include "event.h"
 | |
| #include "type.h"
 | |
| #include "ip_int.h"
 | |
| #include "psip.h"
 | |
| #include "sr.h"
 | |
| 
 | |
| THIS_FILE
 | |
| 
 | |
| typedef struct psip_port
 | |
| {
 | |
| 	int pp_flags;
 | |
| 	int pp_ipdev;
 | |
| 	int pp_opencnt;
 | |
| 	struct psip_fd *pp_rd_head;
 | |
| 	struct psip_fd *pp_rd_tail;
 | |
| 	acc_t *pp_promisc_head;
 | |
| 	acc_t *pp_promisc_tail;
 | |
| } psip_port_t;
 | |
| 
 | |
| #define PPF_EMPTY	0
 | |
| #define PPF_CONFIGURED	1
 | |
| #define PPF_ENABLED	2
 | |
| #define PPF_PROMISC	4
 | |
| 
 | |
| #define PSIP_FD_NR	(1*IP_PORT_MAX)
 | |
| 
 | |
| typedef struct psip_fd
 | |
| {
 | |
| 	int pf_flags;
 | |
| 	int pf_srfd;
 | |
| 	psip_port_t *pf_port;
 | |
| 	get_userdata_t pf_get_userdata;
 | |
| 	put_userdata_t pf_put_userdata;
 | |
| 	struct psip_fd *pf_rd_next;
 | |
| 	size_t pf_rd_count;
 | |
| 	nwio_psipopt_t pf_psipopt;
 | |
| } psip_fd_t;
 | |
| 
 | |
| #define PFF_EMPTY	0
 | |
| #define PFF_INUSE	1
 | |
| #define PFF_READ_IP	2
 | |
| #define PFF_PROMISC	4
 | |
| #define PFF_NEXTHOP	8
 | |
| 
 | |
| PRIVATE psip_port_t *psip_port_table;
 | |
| PRIVATE psip_fd_t psip_fd_table[PSIP_FD_NR];
 | |
| 
 | |
| FORWARD int psip_open ARGS(( int port, int srfd,
 | |
| 	get_userdata_t get_userdata, put_userdata_t put_userdata,
 | |
| 	put_pkt_t pkt_pkt, select_res_t select_res ));
 | |
| FORWARD int psip_ioctl ARGS(( int fd, ioreq_t req ));
 | |
| FORWARD int psip_read ARGS(( int fd, size_t count ));
 | |
| FORWARD int psip_write ARGS(( int fd, size_t count ));
 | |
| FORWARD int psip_select ARGS(( int port_nr, unsigned operations ));
 | |
| FORWARD void psip_close ARGS(( int fd ));
 | |
| FORWARD int psip_cancel ARGS(( int fd, int which_operation ));
 | |
| FORWARD void promisc_restart_read ARGS(( psip_port_t *psip_port ));
 | |
| FORWARD int psip_setopt ARGS(( psip_fd_t *psip_fd, nwio_psipopt_t *newoptp ));
 | |
| FORWARD void psip_buffree ARGS(( int priority ));
 | |
| FORWARD void check_promisc ARGS(( psip_port_t *psip_port ));
 | |
| #ifdef BUF_CONSISTENCY_CHECK
 | |
| FORWARD void psip_bufcheck ARGS(( void ));
 | |
| #endif
 | |
| FORWARD void reply_thr_put ARGS(( psip_fd_t *psip_fd, int reply,
 | |
| 	int for_ioctl ));
 | |
| FORWARD void reply_thr_get ARGS(( psip_fd_t *psip_fd, int reply,
 | |
| 	int for_ioctl ));
 | |
| 
 | |
| PUBLIC void psip_prep()
 | |
| {
 | |
| 	psip_port_table= alloc(psip_conf_nr * sizeof(psip_port_table[0]));
 | |
| }
 | |
| 
 | |
| PUBLIC void psip_init()
 | |
| {
 | |
| 	int i;
 | |
| 	psip_port_t *psip_port;
 | |
| 	psip_fd_t *psip_fd;
 | |
| 
 | |
| 	for (i=0, psip_port= psip_port_table; i<psip_conf_nr; i++, psip_port++)
 | |
| 		psip_port->pp_flags= PPF_EMPTY;
 | |
| 
 | |
| 	for (i=0, psip_fd= psip_fd_table; i<PSIP_FD_NR; i++, psip_fd++)
 | |
| 		psip_fd->pf_flags= PFF_EMPTY;
 | |
| 
 | |
| 	for (i=0, psip_port= psip_port_table; i<psip_conf_nr; i++, psip_port++)
 | |
| 	{
 | |
| 		psip_port->pp_flags |= PPF_CONFIGURED;
 | |
| 		psip_port->pp_opencnt= 0;
 | |
| 		psip_port->pp_rd_head= NULL;
 | |
| 		psip_port->pp_promisc_head= NULL;
 | |
| 	}
 | |
| 
 | |
| #ifndef BUF_CONSISTENCY_CHECK
 | |
| 	bf_logon(psip_buffree);
 | |
| #else
 | |
| 	bf_logon(psip_buffree, psip_bufcheck);
 | |
| #endif
 | |
| }
 | |
| 
 | |
| PUBLIC int psip_enable(port_nr, ip_port_nr)
 | |
| int port_nr;
 | |
| int ip_port_nr;
 | |
| {
 | |
| 	psip_port_t *psip_port;
 | |
| 
 | |
| 	assert(port_nr >= 0);
 | |
| 	if (port_nr >= psip_conf_nr)
 | |
| 		return -1;
 | |
| 
 | |
| 	psip_port= &psip_port_table[port_nr];
 | |
| 	if (!(psip_port->pp_flags &PPF_CONFIGURED))
 | |
| 		return -1;
 | |
| 
 | |
| 	psip_port->pp_ipdev= ip_port_nr;
 | |
| 	psip_port->pp_flags |= PPF_ENABLED;
 | |
| 
 | |
| 	sr_add_minor(if2minor(psip_conf[port_nr].pc_ifno, PSIP_DEV_OFF),
 | |
| 		port_nr, psip_open, psip_close, psip_read,
 | |
| 		psip_write, psip_ioctl, psip_cancel, psip_select);
 | |
| 
 | |
| 	return NW_OK;
 | |
| }
 | |
| 
 | |
| PUBLIC int psip_send(port_nr, dest, pack)
 | |
| int port_nr;
 | |
| ipaddr_t dest;
 | |
| acc_t *pack;
 | |
| {
 | |
| 	psip_port_t *psip_port;
 | |
| 	psip_fd_t *psip_fd, *mark_fd;
 | |
| 	int i, result, result1;
 | |
| 	size_t buf_size, extrasize;
 | |
| 	acc_t *hdr_pack, *acc;
 | |
| 	psip_io_hdr_t *hdr;
 | |
| 
 | |
| 	assert(port_nr >= 0 && port_nr < psip_conf_nr);
 | |
| 	psip_port= &psip_port_table[port_nr];
 | |
| 
 | |
| 	if (psip_port->pp_opencnt == 0)
 | |
| 	{
 | |
| 		bf_afree(pack);
 | |
| 		return NW_OK;
 | |
| 	}
 | |
| 
 | |
| 	for(;;)
 | |
| 	{
 | |
| 		mark_fd= psip_port->pp_rd_tail;
 | |
| 
 | |
| 		for(i= 0; i<PSIP_FD_NR; i++)
 | |
| 		{
 | |
| 			psip_fd= psip_port->pp_rd_head;
 | |
| 			if (!psip_fd)
 | |
| 				return NW_SUSPEND;
 | |
| 			psip_port->pp_rd_head= psip_fd->pf_rd_next;
 | |
| 			if (!(psip_fd->pf_flags & PFF_PROMISC))
 | |
| 				break;
 | |
| 			psip_fd->pf_rd_next= NULL;
 | |
| 			if (psip_port->pp_rd_head == NULL)
 | |
| 				psip_port->pp_rd_head= psip_fd;
 | |
| 			else
 | |
| 				psip_port->pp_rd_tail->pf_rd_next= psip_fd;
 | |
| 			psip_port->pp_rd_tail= psip_fd;
 | |
| 			if (psip_fd == mark_fd)
 | |
| 				return NW_SUSPEND;
 | |
| 		}
 | |
| 		if (i == PSIP_FD_NR)
 | |
| 			ip_panic(( "psip_send: loop" ));
 | |
| 
 | |
| 		assert(psip_fd->pf_flags & PFF_READ_IP);
 | |
| 		psip_fd->pf_flags &= ~PFF_READ_IP;
 | |
| 
 | |
| 		if (psip_fd->pf_flags & PFF_NEXTHOP)
 | |
| 			extrasize= sizeof(dest);
 | |
| 		else
 | |
| 			extrasize= 0;
 | |
| 
 | |
| 		buf_size= bf_bufsize(pack);
 | |
| 		if (buf_size+extrasize <= psip_fd->pf_rd_count)
 | |
| 		{
 | |
| 			if (psip_port->pp_flags & PPF_PROMISC)
 | |
| 			{
 | |
| 				/* Deal with promiscuous mode. */
 | |
| 				hdr_pack= bf_memreq(sizeof(*hdr));
 | |
| 				hdr= (psip_io_hdr_t *)ptr2acc_data(hdr_pack);
 | |
| 				memset(hdr, '\0', sizeof(*hdr));
 | |
| 				hdr->pih_flags |= PF_LOC2REM;
 | |
| 				hdr->pih_nexthop= dest;
 | |
| 
 | |
| 				pack->acc_linkC++;
 | |
| 				hdr_pack->acc_next= pack;
 | |
| 				hdr_pack->acc_ext_link= NULL;
 | |
| 				if (psip_port->pp_promisc_head)
 | |
| 				{
 | |
| 					/* Append at the end. */
 | |
| 					psip_port->pp_promisc_tail->
 | |
| 						acc_ext_link= hdr_pack;
 | |
| 					psip_port->pp_promisc_tail= hdr_pack;
 | |
| 				}
 | |
| 				else
 | |
| 				{
 | |
| 					/* First packet. */
 | |
| 					psip_port->pp_promisc_head= hdr_pack;
 | |
| 					psip_port->pp_promisc_tail= hdr_pack;
 | |
| 					if (psip_port->pp_rd_head)
 | |
| 					    promisc_restart_read(psip_port);
 | |
| 				}
 | |
| 			}
 | |
| 
 | |
| 			if (extrasize)
 | |
| 			{
 | |
| 				/* Prepend nexthop address */
 | |
| 				acc= bf_memreq(sizeof(dest));
 | |
| 				*(ipaddr_t *)(ptr2acc_data(acc))= dest;
 | |
| 				acc->acc_next= pack;
 | |
| 				pack= acc; acc= NULL;
 | |
| 				buf_size += extrasize;
 | |
| 			}
 | |
| 
 | |
| 			result= (*psip_fd->pf_put_userdata)(psip_fd->pf_srfd, 
 | |
| 				(size_t)0, pack, FALSE);
 | |
| 			if (result == NW_OK)
 | |
| 				result= buf_size;
 | |
| 		}
 | |
| 		else
 | |
| 			result= EPACKSIZE;
 | |
| 
 | |
| 		result1= (*psip_fd->pf_put_userdata)(psip_fd->pf_srfd,
 | |
| 				(size_t)result, NULL, FALSE);
 | |
| 		assert(result1 == NW_OK);
 | |
| 		if (result == EPACKSIZE)
 | |
| 			continue;
 | |
| 		return NW_OK;
 | |
| 	}
 | |
| 	return NW_SUSPEND;
 | |
| }
 | |
| 
 | |
| PRIVATE int psip_open(port, srfd, get_userdata, put_userdata, put_pkt,
 | |
| 	select_res)
 | |
| int port;
 | |
| int srfd;
 | |
| get_userdata_t get_userdata;
 | |
| put_userdata_t put_userdata;
 | |
| put_pkt_t put_pkt;
 | |
| select_res_t select_res;
 | |
| {
 | |
| 	psip_port_t *psip_port;
 | |
| 	psip_fd_t *psip_fd;
 | |
| 	int i;
 | |
| 
 | |
| 	assert(port >= 0 && port < psip_conf_nr);
 | |
| 	psip_port= &psip_port_table[port];
 | |
| 
 | |
| 	if (!(psip_port->pp_flags & PPF_ENABLED))
 | |
| 		return ENXIO;
 | |
| 
 | |
| 	for (i= 0, psip_fd= psip_fd_table; i<PSIP_FD_NR; i++, psip_fd++)
 | |
| 	{
 | |
| 		if (psip_fd->pf_flags & PFF_INUSE)
 | |
| 			continue;
 | |
| 		break;
 | |
| 	}
 | |
| 	if (i == PSIP_FD_NR)
 | |
| 		return ENFILE;
 | |
| 	psip_fd->pf_flags |= PFF_INUSE;
 | |
| 	psip_fd->pf_srfd= srfd;
 | |
| 	psip_fd->pf_port= psip_port;
 | |
| 	psip_fd->pf_get_userdata= get_userdata;
 | |
| 	psip_fd->pf_put_userdata= put_userdata;
 | |
| 	psip_port->pp_opencnt++;
 | |
| 
 | |
| 	return i;
 | |
| }
 | |
| 
 | |
| PRIVATE int psip_ioctl(fd, req)
 | |
| int fd;
 | |
| ioreq_t req;
 | |
| {
 | |
| 	int result;
 | |
| 	psip_fd_t *psip_fd;
 | |
| 	acc_t *data;
 | |
| 	nwio_ipconf_t *ipconfp;
 | |
| 	nwio_psipopt_t *psip_opt, *newoptp;
 | |
| 
 | |
| 	assert(fd >= 0 && fd < PSIP_FD_NR);
 | |
| 	psip_fd= &psip_fd_table[fd];
 | |
| 
 | |
| 	switch(req)
 | |
| 	{
 | |
| 	case NWIOSIPCONF:
 | |
| 		data= (*psip_fd->pf_get_userdata)(psip_fd->pf_srfd, 0, 
 | |
| 			sizeof(*ipconfp), TRUE);
 | |
| 		if (!data)
 | |
| 		{
 | |
| 			result= EFAULT;
 | |
| 			break;
 | |
| 		}
 | |
| 		data= bf_packIffLess(data, sizeof(*ipconfp));
 | |
| 		assert (data->acc_length == sizeof(*ipconfp));
 | |
| 
 | |
| 		ipconfp= (nwio_ipconf_t *)ptr2acc_data(data);
 | |
| 		result= ip_setconf(psip_fd->pf_port->pp_ipdev, ipconfp);
 | |
| 		bf_afree(data);
 | |
| 		reply_thr_get(psip_fd, result, TRUE);
 | |
| 		break;
 | |
| 	case NWIOSPSIPOPT:
 | |
| 		data= (*psip_fd->pf_get_userdata)(psip_fd->pf_srfd, 0, 
 | |
| 			sizeof(*psip_opt), TRUE);
 | |
| 		if (!data)
 | |
| 		{
 | |
| 			result= EFAULT;
 | |
| 			break;
 | |
| 		}
 | |
| 		data= bf_packIffLess(data, sizeof(*psip_opt));
 | |
| 		assert (data->acc_length == sizeof(*psip_opt));
 | |
| 
 | |
| 		newoptp= (nwio_psipopt_t *)ptr2acc_data(data);
 | |
| 		result= psip_setopt(psip_fd, newoptp);
 | |
| 		bf_afree(data);
 | |
| 		if (result == NW_OK)
 | |
| 		{
 | |
| 			if (psip_fd->pf_psipopt.nwpo_flags & NWPO_EN_PROMISC)
 | |
| 			{
 | |
| 				psip_fd->pf_flags |= PFF_PROMISC;
 | |
| 				psip_fd->pf_port->pp_flags |= PPF_PROMISC;
 | |
| 			}
 | |
| 			else
 | |
| 			{
 | |
| 				psip_fd->pf_flags &= ~PFF_PROMISC;
 | |
| 				check_promisc(psip_fd->pf_port);
 | |
| 			}
 | |
| 			if (psip_fd->pf_psipopt.nwpo_flags & NWPO_EN_NEXTHOP)
 | |
| 			{
 | |
| 				psip_fd->pf_flags |= PFF_NEXTHOP;
 | |
| 			}
 | |
| 			else
 | |
| 			{
 | |
| 				psip_fd->pf_flags &= ~PFF_NEXTHOP;
 | |
| 			}
 | |
| 		}
 | |
| 		reply_thr_get(psip_fd, result, TRUE);
 | |
| 		break;
 | |
| 	case NWIOGPSIPOPT:
 | |
| 		data= bf_memreq(sizeof(*psip_opt));
 | |
| 		psip_opt= (nwio_psipopt_t *)ptr2acc_data(data);
 | |
| 
 | |
| 		*psip_opt= psip_fd->pf_psipopt;
 | |
| 		result= (*psip_fd->pf_put_userdata)(psip_fd->pf_srfd, 0,
 | |
| 			data, TRUE);
 | |
| 		if (result == NW_OK)
 | |
| 			reply_thr_put(psip_fd, NW_OK, TRUE);
 | |
| 		break;
 | |
| 	default:
 | |
| 		reply_thr_put(psip_fd, ENOTTY, TRUE);
 | |
| 		break;
 | |
| 	}
 | |
| 	return NW_OK;
 | |
| }
 | |
| 
 | |
| PRIVATE int psip_read(fd, count)
 | |
| int fd;
 | |
| size_t count;
 | |
| {
 | |
| 	psip_port_t *psip_port;
 | |
| 	psip_fd_t *psip_fd;
 | |
| 	acc_t *pack;
 | |
| 	size_t buf_size;
 | |
| 	int result, result1;
 | |
| 
 | |
| 	assert(fd >= 0 && fd < PSIP_FD_NR);
 | |
| 	psip_fd= &psip_fd_table[fd];
 | |
| 	psip_port= psip_fd->pf_port;
 | |
| 
 | |
| 	if ((psip_fd->pf_flags & PFF_PROMISC) && psip_port->pp_promisc_head)
 | |
| 	{
 | |
| 		/* Deliver a queued packet. */
 | |
| 		pack= psip_port->pp_promisc_head;
 | |
| 		buf_size= bf_bufsize(pack);
 | |
| 		if (buf_size <= count)
 | |
| 		{
 | |
| 			psip_port->pp_promisc_head= pack->acc_ext_link;
 | |
| 			result= (*psip_fd->pf_put_userdata)(psip_fd->pf_srfd, 
 | |
| 				(size_t)0, pack, FALSE);
 | |
| 			if (result == NW_OK)
 | |
| 				result= buf_size;
 | |
| 		}
 | |
| 		else
 | |
| 			result= EPACKSIZE;
 | |
| 
 | |
| 		result1= (*psip_fd->pf_put_userdata)(psip_fd->pf_srfd,
 | |
| 				(size_t)result, NULL, FALSE);
 | |
| 		assert(result1 == NW_OK);
 | |
| 		return NW_OK;
 | |
| 	}
 | |
| 
 | |
| 	psip_fd->pf_rd_count= count;
 | |
| 	if (psip_port->pp_rd_head == NULL)
 | |
| 		psip_port->pp_rd_head= psip_fd;
 | |
| 	else
 | |
| 		psip_port->pp_rd_tail->pf_rd_next= psip_fd;
 | |
| 	psip_fd->pf_rd_next= NULL;
 | |
| 	psip_port->pp_rd_tail= psip_fd;
 | |
| 
 | |
| 	psip_fd->pf_flags |= PFF_READ_IP;
 | |
| 	if (!(psip_fd->pf_flags & PFF_PROMISC))
 | |
| 		ipps_get(psip_port->pp_ipdev);
 | |
| 	if (psip_fd->pf_flags & PFF_READ_IP)
 | |
| 		return NW_SUSPEND;
 | |
| 	return NW_OK;
 | |
| }
 | |
| 
 | |
| PRIVATE int psip_write(fd, count)
 | |
| int fd;
 | |
| size_t count;
 | |
| {
 | |
| 	psip_port_t *psip_port;
 | |
| 	psip_fd_t *psip_fd;
 | |
| 	acc_t *pack, *hdr_pack;
 | |
| 	psip_io_hdr_t *hdr;
 | |
| 	size_t pack_len;
 | |
| 	ipaddr_t nexthop;
 | |
| 
 | |
| 	assert(fd >= 0 && fd < PSIP_FD_NR);
 | |
| 	psip_fd= &psip_fd_table[fd];
 | |
| 	psip_port= psip_fd->pf_port;
 | |
| 
 | |
| 	pack= (*psip_fd->pf_get_userdata)(psip_fd->pf_srfd, (size_t)0,
 | |
| 		count, FALSE);
 | |
| 	if (pack == NULL)
 | |
| 	{
 | |
| 		pack= (*psip_fd->pf_get_userdata)(psip_fd->pf_srfd, 
 | |
| 			(size_t)EFAULT, (size_t)0, FALSE);
 | |
| 		assert(pack == NULL);
 | |
| 		return NW_OK;
 | |
| 	}
 | |
| 
 | |
| 	if (psip_fd->pf_flags & PFF_NEXTHOP)
 | |
| 	{
 | |
| 		pack_len= bf_bufsize(pack);
 | |
| 		if (pack_len <= sizeof(nexthop))
 | |
| 		{
 | |
| 			/* Something strange */
 | |
| 			bf_afree(pack); pack= NULL;
 | |
| 			pack= (*psip_fd->pf_get_userdata)(psip_fd->pf_srfd,
 | |
| 				(size_t)EPACKSIZE, (size_t)0, FALSE);
 | |
| 			assert(pack == NULL);
 | |
| 			return NW_OK;
 | |
| 		}
 | |
| 		pack= bf_packIffLess(pack, sizeof(nexthop));
 | |
| 		nexthop= *(ipaddr_t *)ptr2acc_data(pack);
 | |
| 		pack= bf_delhead(pack, sizeof(nexthop));
 | |
| 
 | |
| 		/* Map multicast to broadcast */
 | |
| 		if ((nexthop & HTONL(0xE0000000)) == HTONL(0xE0000000))
 | |
| 			nexthop= HTONL(0xffffffff);
 | |
| 	}
 | |
| 	else
 | |
| 	{
 | |
| 		/* Assume point to point */
 | |
| 		nexthop= HTONL(0x00000000);
 | |
| 	}
 | |
| 
 | |
| 	if (psip_port->pp_flags & PPF_PROMISC)
 | |
| 	{
 | |
| 		/* Deal with promiscuous mode. */
 | |
| 		hdr_pack= bf_memreq(sizeof(*hdr));
 | |
| 		hdr= (psip_io_hdr_t *)ptr2acc_data(hdr_pack);
 | |
| 		memset(hdr, '\0', sizeof(*hdr));
 | |
| 		hdr->pih_flags |= PF_REM2LOC;
 | |
| 		hdr->pih_nexthop= nexthop;
 | |
| 
 | |
| 		pack->acc_linkC++;
 | |
| 		hdr_pack->acc_next= pack;
 | |
| 		hdr_pack->acc_ext_link= NULL;
 | |
| 		if (psip_port->pp_promisc_head)
 | |
| 		{
 | |
| 			/* Append at the end. */
 | |
| 			psip_port->pp_promisc_tail->acc_ext_link= hdr_pack;
 | |
| 			psip_port->pp_promisc_tail= hdr_pack;
 | |
| 		}
 | |
| 		else
 | |
| 		{
 | |
| 			/* First packet. */
 | |
| 			psip_port->pp_promisc_head= hdr_pack;
 | |
| 			psip_port->pp_promisc_tail= hdr_pack;
 | |
| 			if (psip_port->pp_rd_head)
 | |
| 				promisc_restart_read(psip_port);
 | |
| 		}
 | |
| 	}
 | |
| 	ipps_put(psip_port->pp_ipdev, nexthop, pack);
 | |
| 	pack= (*psip_fd->pf_get_userdata)(psip_fd->pf_srfd, (size_t)count,
 | |
| 		(size_t)0, FALSE);
 | |
| 	assert(pack == NULL);
 | |
| 	return NW_OK;
 | |
| }
 | |
| 
 | |
| PRIVATE int psip_select(fd, operations)
 | |
| int fd;
 | |
| unsigned operations;
 | |
| {
 | |
| 	printf("psip_select: not implemented\n");
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| PRIVATE void psip_close(fd)
 | |
| int fd;
 | |
| {
 | |
| 	psip_port_t *psip_port;
 | |
| 	psip_fd_t *psip_fd;
 | |
| 
 | |
| 	assert(fd >= 0 && fd < PSIP_FD_NR);
 | |
| 	psip_fd= &psip_fd_table[fd];
 | |
| 	psip_port= psip_fd->pf_port;
 | |
| 
 | |
| 	if (psip_fd->pf_flags & PFF_PROMISC)
 | |
| 	{
 | |
| 		/* Check if the port should still be in promiscuous mode.
 | |
| 		 */
 | |
| 		psip_fd->pf_flags &= ~PFF_PROMISC;
 | |
| 		check_promisc(psip_fd->pf_port);
 | |
| 	}
 | |
| 
 | |
| 	assert(psip_port->pp_opencnt >0);
 | |
| 	psip_port->pp_opencnt--;
 | |
| 	psip_fd->pf_flags= PFF_EMPTY;
 | |
| 	ipps_get(psip_port->pp_ipdev);
 | |
| 
 | |
| }
 | |
| 
 | |
| PRIVATE int psip_cancel(fd, which_operation)
 | |
| int fd;
 | |
| int which_operation;
 | |
| {
 | |
| 	psip_port_t *psip_port;
 | |
| 	psip_fd_t *psip_fd, *prev_fd, *tmp_fd;
 | |
| 	int result;
 | |
| 
 | |
| 	DBLOCK(1, printf("psip_cancel(%d, %d)\n", fd, which_operation));
 | |
| 
 | |
| 	assert(fd >= 0 && fd < PSIP_FD_NR);
 | |
| 	psip_fd= &psip_fd_table[fd];
 | |
| 	psip_port= psip_fd->pf_port;
 | |
| 
 | |
| 	switch(which_operation)
 | |
| 	{
 | |
| 	case SR_CANCEL_IOCTL:
 | |
| 		ip_panic(( "should not be here" ));
 | |
| 	case SR_CANCEL_READ:
 | |
| 		assert(psip_fd->pf_flags & PFF_READ_IP);
 | |
| 		for (prev_fd= NULL, tmp_fd= psip_port->pp_rd_head; tmp_fd;
 | |
| 			prev_fd= tmp_fd, tmp_fd= tmp_fd->pf_rd_next)
 | |
| 		{
 | |
| 			if (tmp_fd == psip_fd)
 | |
| 				break;
 | |
| 		}
 | |
| 		if (tmp_fd == NULL)
 | |
| 			ip_panic(( "unable to find to request to cancel" ));
 | |
| 		if (prev_fd == NULL)
 | |
| 			psip_port->pp_rd_head= psip_fd->pf_rd_next;
 | |
| 		else
 | |
| 			prev_fd->pf_rd_next= psip_fd->pf_rd_next;
 | |
| 		if (psip_fd->pf_rd_next == NULL)
 | |
| 			psip_port->pp_rd_tail= prev_fd;
 | |
| 		psip_fd->pf_flags &= ~PFF_READ_IP;
 | |
| 		result= (*psip_fd->pf_put_userdata)(psip_fd->pf_srfd,
 | |
| 						(size_t)EINTR, NULL, FALSE);
 | |
| 		assert(result == NW_OK);
 | |
| 		break;
 | |
| 	case SR_CANCEL_WRITE:
 | |
| 		ip_panic(( "should not be here" ));
 | |
| 	default:
 | |
| 		ip_panic(( "invalid operation for cancel" ));
 | |
| 	}
 | |
| 	return NW_OK;
 | |
| }
 | |
| 
 | |
| PRIVATE void promisc_restart_read(psip_port)
 | |
| psip_port_t *psip_port;
 | |
| {
 | |
| 	psip_fd_t *psip_fd, *prev, *next;
 | |
| 	acc_t *pack;
 | |
| 	size_t buf_size;
 | |
| 	int result, result1;
 | |
| 
 | |
| 	/* Overkill at the moment: just one reader in promiscious mode is
 | |
| 	 * allowed.
 | |
| 	 */
 | |
| 	pack= psip_port->pp_promisc_head;
 | |
| 	if (!pack)
 | |
| 		return;
 | |
| 	assert(pack->acc_ext_link == NULL);
 | |
| 
 | |
| 	for(psip_fd= psip_port->pp_rd_head, prev= NULL; psip_fd;
 | |
| 		prev= psip_fd, psip_fd= psip_fd->pf_rd_next)
 | |
| 	{
 | |
| again:
 | |
| 		if (!(psip_fd->pf_flags & PFF_PROMISC))
 | |
| 			continue;
 | |
| 		next= psip_fd->pf_rd_next;
 | |
| 		if (prev)
 | |
| 			prev->pf_rd_next= next;
 | |
| 		else
 | |
| 			psip_port->pp_rd_head= next;
 | |
| 		if (!next)
 | |
| 			psip_port->pp_rd_tail= prev;
 | |
| 
 | |
| 		assert(psip_fd->pf_flags & PFF_READ_IP);
 | |
| 		psip_fd->pf_flags &= ~PFF_READ_IP;
 | |
| 
 | |
| 		buf_size= bf_bufsize(pack);
 | |
| 		if (buf_size <= psip_fd->pf_rd_count)
 | |
| 		{
 | |
| 			psip_port->pp_promisc_head= pack->acc_ext_link;
 | |
| 			result= (*psip_fd->pf_put_userdata)(psip_fd->pf_srfd, 
 | |
| 				(size_t)0, pack, FALSE);
 | |
| 			if (result == NW_OK)
 | |
| 				result= buf_size;
 | |
| 		}
 | |
| 		else
 | |
| 			result= EPACKSIZE;
 | |
| 
 | |
| 		result1= (*psip_fd->pf_put_userdata)(psip_fd->pf_srfd,
 | |
| 				(size_t)result, NULL, FALSE);
 | |
| 		assert(result1 == NW_OK);
 | |
| 
 | |
| 		if (psip_port->pp_promisc_head)
 | |
| 		{
 | |
| 			/* Restart from the beginning */
 | |
| 			assert(result == EPACKSIZE);
 | |
| 			psip_fd= psip_port->pp_rd_head;
 | |
| 			prev= NULL;
 | |
| 			goto again;
 | |
| 		}
 | |
| 		break;
 | |
| 	}
 | |
| }
 | |
| 
 | |
| PRIVATE int psip_setopt(psip_fd, newoptp)
 | |
| psip_fd_t *psip_fd;
 | |
| nwio_psipopt_t *newoptp;
 | |
| {
 | |
| 	nwio_psipopt_t oldopt;
 | |
| 	unsigned int new_en_flags, new_di_flags, old_en_flags, old_di_flags;
 | |
| 	unsigned long new_flags;
 | |
| 
 | |
| 	oldopt= psip_fd->pf_psipopt;
 | |
| 
 | |
| 	old_en_flags= oldopt.nwpo_flags & 0xffff;
 | |
| 	old_di_flags= (oldopt.nwpo_flags >> 16) & 0xffff;
 | |
| 
 | |
| 	new_en_flags= newoptp->nwpo_flags & 0xffff;
 | |
| 	new_di_flags= (newoptp->nwpo_flags >> 16) & 0xffff;
 | |
| 
 | |
| 	if (new_en_flags & new_di_flags)
 | |
| 		return EBADMODE;
 | |
| 
 | |
| 	/* NWUO_LOCADDR_MASK */
 | |
| 	if (!((new_en_flags | new_di_flags) & NWPO_PROMISC_MASK))
 | |
| 	{
 | |
| 		new_en_flags |= (old_en_flags & NWPO_PROMISC_MASK);
 | |
| 		new_di_flags |= (old_di_flags & NWPO_PROMISC_MASK);
 | |
| 	}
 | |
| 
 | |
| 	new_flags= ((unsigned long)new_di_flags << 16) | new_en_flags;
 | |
| 	if ((new_flags & NWPO_EN_PROMISC) &&
 | |
| 		(psip_fd->pf_port->pp_flags & PPF_PROMISC))
 | |
| 	{
 | |
| 		printf("psip_setopt: EBUSY for port %d, flags 0x%x\n",
 | |
| 			psip_fd->pf_port - psip_port_table,
 | |
| 			psip_fd->pf_port->pp_flags);
 | |
| 		/* We can support only one at a time. */
 | |
| 		return EBUSY;
 | |
| 	}
 | |
| 
 | |
| 	psip_fd->pf_psipopt= *newoptp;
 | |
| 	psip_fd->pf_psipopt.nwpo_flags= new_flags;
 | |
| 
 | |
| 	return NW_OK;
 | |
| }
 | |
| 
 | |
| PRIVATE void check_promisc(psip_port)
 | |
| psip_port_t *psip_port;
 | |
| {
 | |
| 	int i;
 | |
| 	psip_fd_t *psip_fd;
 | |
| 	acc_t *acc, *acc_next;
 | |
| 
 | |
| 	/* Check if the port should still be in promiscuous mode.  Overkill
 | |
| 	 * at the moment.
 | |
| 	 */
 | |
| 	if (!(psip_port->pp_flags & PPF_PROMISC))
 | |
| 		return;
 | |
| 
 | |
| 	psip_port->pp_flags &= ~PPF_PROMISC;
 | |
| 	for (i= 0, psip_fd= psip_fd_table; i<PSIP_FD_NR; i++, psip_fd++)
 | |
| 	{
 | |
| 		if ((psip_fd->pf_flags & (PFF_INUSE|PFF_PROMISC)) !=
 | |
| 			(PFF_INUSE|PFF_PROMISC))
 | |
| 		{
 | |
| 			continue;
 | |
| 		}
 | |
| 		if (psip_fd->pf_port != psip_port)
 | |
| 			continue;
 | |
| 		printf("check_promisc: setting PROMISC for port %d\n",
 | |
| 			psip_port-psip_port_table);
 | |
| 		psip_port->pp_flags |= PPF_PROMISC;
 | |
| 		break;
 | |
| 	}
 | |
| 	if (!(psip_port->pp_flags & PPF_PROMISC))
 | |
| 	{
 | |
| 		/* Delete queued packets. */
 | |
| 		acc= psip_port->pp_promisc_head;
 | |
| 		psip_port->pp_promisc_head= NULL;
 | |
| 		while (acc)
 | |
| 		{
 | |
| 			acc_next= acc->acc_ext_link;
 | |
| 			bf_afree(acc);
 | |
| 			acc= acc_next;
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| PRIVATE void psip_buffree (priority)
 | |
| int priority;
 | |
| {
 | |
| 	int i;
 | |
| 	psip_port_t *psip_port;
 | |
| 	acc_t *tmp_acc, *next_acc;
 | |
| 
 | |
| 	if (priority == PSIP_PRI_EXP_PROMISC)
 | |
| 	{
 | |
| 		for (i=0, psip_port= psip_port_table; i<psip_conf_nr;
 | |
| 			i++, psip_port++)
 | |
| 		{
 | |
| 			if (!(psip_port->pp_flags & PPF_CONFIGURED) )
 | |
| 				continue;
 | |
| 			if (psip_port->pp_promisc_head)
 | |
| 			{
 | |
| 				tmp_acc= psip_port->pp_promisc_head;
 | |
| 				while(tmp_acc)
 | |
| 				{
 | |
| 					next_acc= tmp_acc->acc_ext_link;
 | |
| 					bf_afree(tmp_acc);
 | |
| 					tmp_acc= next_acc;
 | |
| 				}
 | |
| 				psip_port->pp_promisc_head= NULL;
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| #ifdef BUF_CONSISTENCY_CHECK
 | |
| PRIVATE void psip_bufcheck()
 | |
| {
 | |
| 	int i;
 | |
| 	psip_port_t *psip_port;
 | |
| 	acc_t *tmp_acc;
 | |
| 
 | |
| 	for (i= 0, psip_port= psip_port_table; i<psip_conf_nr;
 | |
| 		i++, psip_port++)
 | |
| 	{
 | |
| 		for (tmp_acc= psip_port->pp_promisc_head; tmp_acc; 
 | |
| 			tmp_acc= tmp_acc->acc_ext_link)
 | |
| 		{
 | |
| 			bf_check_acc(tmp_acc);
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| #endif
 | |
| 
 | |
| /*
 | |
| reply_thr_put
 | |
| */
 | |
| 
 | |
| PRIVATE void reply_thr_put(psip_fd, reply, for_ioctl)
 | |
| psip_fd_t *psip_fd;
 | |
| int reply;
 | |
| int for_ioctl;
 | |
| {
 | |
| 	int result;
 | |
| 
 | |
| 	result= (*psip_fd->pf_put_userdata)(psip_fd->pf_srfd, reply,
 | |
| 		(acc_t *)0, for_ioctl);
 | |
| 	assert(result == NW_OK);
 | |
| }
 | |
| 
 | |
| /*
 | |
| reply_thr_get
 | |
| */
 | |
| 
 | |
| PRIVATE void reply_thr_get(psip_fd, reply, for_ioctl)
 | |
| psip_fd_t *psip_fd;
 | |
| int reply;
 | |
| int for_ioctl;
 | |
| {
 | |
| 	acc_t *result;
 | |
| 	result= (*psip_fd->pf_get_userdata)(psip_fd->pf_srfd, reply,
 | |
| 		(size_t)0, for_ioctl);
 | |
| 	assert (!result);
 | |
| }
 | |
| 
 | |
| 
 | |
| /*
 | |
|  * $PchId: psip.c,v 1.15 2005/06/28 14:19:29 philip Exp $
 | |
|  */
 | 
