1 /* Copyright 2005 Renzo Davoli VDE-2
2 * Some minor remain from uml_switch Copyright 2002 Yon Uriarte and Jeff Dike
3 * Licensed under the GPLv2
13 #include <sys/socket.h>
16 #include <netinet/in.h> /*ntoh conversion*/
34 // for dedugging if needed
37 void packet_dump (struct packet *p)
40 printf ("packet dump dst");
41 for (i=0;i<ETH_ALEN;i++)
42 printf(":%02x",p->header.dest[i]);
44 for (i=0;i<ETH_ALEN;i++)
45 printf(":%02x",p->header.src[i]);
48 printf(":%02x",p->header.proto[i]);
57 struct endpoint
*next
;
60 #define NOTINPOOL 0x8000
66 /* sender is already inside ep, but it needs one more memaccess */
67 int (*sender
)(int fd
, int fd_ctl
, void *packet
, int len
, void *data
, int port
);
68 struct mod_support
*ms
;
76 * table the vlan table (also for inactive ports)
77 * vlan bctag is the vlan table -- only tagged forwarding ports mapping
78 * vlan bcuntag is the vlan table -- only untagged forwarding ports mapping
79 * validvlan is the table of valid vlans
90 #define IS_BROADCAST(addr) ((addr[0] & 1) == 1)
92 static struct port
**portv
;
94 static int alloc_port(unsigned int portno
)
99 for (i
=1;i
<numports
&& portv
[i
] != NULL
&&
100 (portv
[i
]->ep
!= NULL
|| portv
[i
]->flag
& NOTINPOOL
) ;i
++)
102 } else if (i
<0) /* special case MGMT client port */
107 if (portv
[i
] == NULL
) {
109 if ((port
= malloc(sizeof(struct port
))) == NULL
){
110 printlog(LOG_WARNING
,"malloc port %s",strerror(errno
));
118 port
->cost
=DEFAULT_COST
;
123 BA_SET(vlant
[0].table
,i
);
130 static void free_port(unsigned int portno
)
132 if (portno
< numports
) {
133 struct port
*port
=portv
[portno
];
134 if (port
!= NULL
&& port
->ep
==NULL
) {
137 /* delete completely the port. all vlan defs zapped */
138 BAC_FORALL(validvlan
,NUMOFVLAN
,BA_CLR(vlant
[i
].table
,portno
),i
);
144 /* initialize a port structure with control=fd, given data+data_len and sender
146 * and then add it to the g_fdsdata array at index i. */
147 int setup_ep(int portno
, int fd_ctl
,
149 struct mod_support
*modfun
)
154 if ((portno
= alloc_port(portno
)) >= 0) {
156 if (port
->fd_data
< 0)
157 port
->fd_data
=modfun
->newport(fd_ctl
,portno
);
158 if (port
->fd_data
>= 0 &&
159 (ep
=malloc(sizeof(struct endpoint
))) != NULL
) {
161 port
->sender
=modfun
->sender
;
166 if(port
->ep
== NULL
) {/* WAS INACTIVE */
168 /* copy all the vlan defs to the active vlan defs*/
171 BAC_FORALL(validvlan
,NUMOFVLAN
,
172 ({if (BA_CHECK(vlant
[i
].table
,portno
)) {
173 BA_SET(vlant
[i
].bctag
,portno
);
175 fstaddport(i
,portno
,(i
!=port
->vlanuntag
));
179 if (port
->vlanuntag
!= NOVLAN
) {
180 BA_SET(vlant
[port
->vlanuntag
].bcuntag
,portno
);
181 BA_CLR(vlant
[port
->vlanuntag
].bctag
,portno
);
183 BA_CLR(vlant
[port
->vlanuntag
].notlearning
,portno
);
198 void setup_description(int portno
, int fd_ctl
, char *descr
)
200 if (portno
>=0 && portno
< numports
) {
201 struct port
*port
=portv
[portno
];
204 for (ep
=port
->ep
;ep
!=NULL
;ep
=ep
->next
)
205 if (ep
->fd_ctl
== fd_ctl
)
212 static int rec_close_ep(struct endpoint
**pep
, int fd_ctl
)
214 struct endpoint
*this=*pep
;
216 if (this->fd_ctl
==fd_ctl
) {
218 if (portv
[this->port
]->ms
->delep
)
219 portv
[this->port
]->ms
->delep(this->fd_ctl
,this->data
,this->descr
);
223 return rec_close_ep(&(this->next
),fd_ctl
);
228 int close_ep(int portno
, int fd_ctl
)
230 if (portno
>=0 && portno
< numports
) {
231 struct port
*port
=portv
[portno
];
233 int rv
=rec_close_ep(&(port
->ep
),fd_ctl
);
234 if (port
->ep
== NULL
) {
235 hash_delete_port(portno
);
237 packetq_delfd(port
->fd_data
);
239 if (portv
[portno
]->ms
->delport
)
240 portv
[portno
]->ms
->delport(port
->fd_data
,portno
);
245 /* inactivate port: all active vlan defs cleared */
246 BAC_FORALL(validvlan
,NUMOFVLAN
,({
247 BA_CLR(vlant
[i
].bctag
,portno
);
249 fstdelport(i
,portno
);
252 if (port
->vlanuntag
< NOVLAN
) BA_CLR(vlant
[port
->vlanuntag
].bcuntag
,portno
);
261 int portflag(int op
,int f
)
265 case P_SETFLAG
: pflag
=f
; break;
266 case P_ADDFLAG
: pflag
|= f
; break;
267 case P_CLRFLAG
: pflag
&= ~f
; break;
273 /*********************** sending macro used by Core ******************/
276 #define SEND_PACKET_PORT(PORT,PACKET,LEN) \
278 struct port *Port=(PORT); \
279 struct endpoint *ep; \
280 for (ep=Port->ep; ep != NULL; ep=ep->next) \
281 if (Port->ms->sender(Port->fd_data, ep->fd_ctl, (PACKET), (LEN), ep->data, ep->port)) \
282 packetq_add(Port->ms->sender,Port->fd_data, ep->fd_ctl, (PACKET), (LEN), ep->data, ep->port); \
285 #define SEND_PACKET_PORT(PORT,PACKET,LEN) \
287 struct port *Port=(PORT); \
288 struct endpoint *ep; \
289 for (ep=Port->ep; ep != NULL; ep=ep->next) \
290 Port->ms->sender(Port->fd_data, ep->fd_ctl, (PACKET), (LEN), ep->data, ep->port); \
296 /* functions for FSTP */
297 void port_send_packet(int portno
, void *packet
, int len
)
299 SEND_PACKET_PORT(portv
[portno
],packet
,len
);
302 void portset_send_packet(bitarray portset
, void *packet
, int len
)
305 BA_FORALL(portset
,numports
,
306 SEND_PACKET_PORT(portv
[i
],packet
,len
), i
);
309 void port_set_status(int portno
, int vlan
, int status
)
311 if (BA_CHECK(vlant
[vlan
].table
,portno
)) {
312 if (status
==DISCARDING
) {
313 BA_SET(vlant
[vlan
].notlearning
,portno
);
314 BA_CLR(vlant
[vlan
].bctag
,portno
);
315 BA_CLR(vlant
[vlan
].bcuntag
,portno
);
316 } else if (status
==LEARNING
) {
317 BA_CLR(vlant
[vlan
].notlearning
,portno
);
318 BA_CLR(vlant
[vlan
].bctag
,portno
);
319 BA_CLR(vlant
[vlan
].bcuntag
,portno
);
320 } else { /*forwarding*/
321 BA_CLR(vlant
[vlan
].notlearning
,portno
);
322 if (portv
[portno
]->vlanuntag
== vlan
)
323 BA_SET(vlant
[vlan
].bcuntag
,portno
);
325 BA_SET(vlant
[vlan
].bctag
,portno
);
330 int port_get_status(int portno
, int vlan
)
332 if (BA_CHECK(vlant
[vlan
].notlearning
,portno
))
335 if (BA_CHECK(vlant
[vlan
].bctag
,portno
) ||
336 BA_CHECK(vlant
[vlan
].bcuntag
,portno
))
343 int port_getcost(int port
)
345 return portv
[port
]->cost
;
349 /************************************ CORE PACKET MGMT *****************************/
352 * +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
353 * | Destination | Source |81 00|pvlan| L/T | data
354 * +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
356 * +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
357 * | Destination | Source | L/T | data
358 * +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
360 * Destination/Source: 4 byte right shift
362 * Pointer to the packet: +4 bytes
365 #define TAG2UNTAG(P,LEN) \
366 ({ memmove((char *)(P)+4,(P),2*ETH_ALEN); LEN -= 4 ; \
367 (struct packet *)((char *)(P)+4); })
370 * +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
371 * | Destination | Source | L/T | data
372 * +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
374 * +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
375 * | Destination | Source |81 00|pvlan| L/T | data
376 * +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
377 * Destination/Source: 4 byte left shift
379 * Pointer to the packet: +4 bytes
380 * The space has been allocated in advance (just in case); all the modules
381 * read data into a bipacket.
384 #define UNTAG2TAG(P,VLAN,LEN) \
385 ({ memmove((char *)(P)-4,(P),2*ETH_ALEN); LEN += 4 ; \
386 (P)->header.src[2]=0x81; (P)->header.src[3]=0x00;\
387 (P)->header.src[4]=(VLAN >> 8); (P)->header.src[5]=(VLAN);\
388 (struct packet *)((char *)(P)-4); })
391 void handle_in_packet(int port
, struct packet
*packet
, int len
)
392 /* static void update_src(int port, struct packet *p) */
397 if (packet
->header
.proto
[0] == 0x81 && packet
->header
.proto
[1] == 0x00) {
399 vlan
=((packet
->data
[0] << 8) + packet
->data
[1]) & 0xfff;
400 if (! BA_CHECK(vlant
[vlan
].table
,port
))
401 return; /*discard unwanted packets*/
404 if ((vlan
=portv
[port
]->vlanuntag
) == NOVLAN
)
405 return; /*discard unwanted packets*/
409 /* when it works as a HUB, MST packet must be forwarded */
410 if (ISBPDU(packet
) && !(pflag
& HUB_TAG
)) {
411 fst_in_bpdu(port
,packet
,len
,vlan
,tagged
);
412 return; /* BPDU packets are not forwarded */
415 /* The port is in blocked status, no packet received */
416 if (BA_CHECK(vlant
[vlan
].notlearning
,port
)) return;
418 /* We don't like broadcast source addresses */
419 if(! ((IS_BROADCAST(packet
->header
.src
)) || (pflag
& HUB_TAG
))) {
421 int last
= find_in_hash_update(packet
->header
.src
,vlan
,port
);
422 /* old value differs from actual input port */
423 if(last
>=0 && (port
!= last
)){
424 printlog(LOG_INFO
,"MAC %02x:%02x:%02x:%02x:%02x:%02x moved from port %d to port %d",packet
->header
.src
[0],packet
->header
.src
[1],packet
->header
.src
[2],packet
->header
.src
[3],packet
->header
.src
[4],packet
->header
.src
[5],last
,port
);
427 /* static void send_dst(int port,struct packet *packet, int len) */
428 if(IS_BROADCAST(packet
->header
.dest
) || (pflag
& HUB_TAG
) ||
429 (tarport
= find_in_hash(packet
->header
.dest
,vlan
)) < 0 ){
430 /* FST HERE! broadcast only on active ports*/
431 /* no cache or broadcast/multicast == all ports *except* the source port! */
432 /* BROADCAST: tag/untag. Broadcast the packet untouched on the ports
433 * of the same tag-ness, then transform it to the other tag-ness for the others*/
436 BA_FORALL(vlant
[vlan
].bctag
,numports
,
437 ({if (i
!= port
) SEND_PACKET_PORT(portv
[i
],packet
,len
);}),i
);
438 packet
=TAG2UNTAG(packet
,len
);
439 BA_FORALL(vlant
[vlan
].bcuntag
,numports
,
440 ({if (i
!= port
) SEND_PACKET_PORT(portv
[i
],packet
,len
);}),i
);
441 } else { /* untagged */
443 BA_FORALL(vlant
[vlan
].bcuntag
,numports
,
444 ({if (i
!= port
) SEND_PACKET_PORT(portv
[i
],packet
,len
);}),i
);
445 packet
=UNTAG2TAG(packet
,vlan
,len
);
446 BA_FORALL(vlant
[vlan
].bctag
,numports
,
447 ({if (i
!= port
) SEND_PACKET_PORT(portv
[i
],packet
,len
);}),i
);
451 /* the hash table should not generate tarport not in vlan
452 * any time a port is removed from a vlan, the port is flushed from the hash */
454 return; /*do not loop!*/
456 if (portv
[tarport
]->vlanuntag
==vlan
) /* TAG->UNTAG */
457 SEND_PACKET_PORT(portv
[tarport
],TAG2UNTAG(packet
,len
),len
);
459 SEND_PACKET_PORT(portv
[tarport
],packet
,len
);
461 if (portv
[tarport
]->vlanuntag
==vlan
) /* UNTAG->UNTAG */
462 SEND_PACKET_PORT(portv
[tarport
],packet
,len
);
463 else /* UNTAG->TAG */
464 SEND_PACKET_PORT(portv
[tarport
],UNTAG2TAG(packet
,vlan
,len
),len
);
469 /**************************************** COMMAND MANAGEMENT ****************************************/
471 static int showinfo(int fd
)
473 printoutc(fd
,"Numports=%d",numports
);
474 printoutc(fd
,"HUB=%s",(pflag
& HUB_TAG
)?"true":"false");
478 static int portsetnumports(int val
)
483 for(i
=val
;i
<numports
;i
++)
486 portv
=realloc(portv
,val
*sizeof(struct port
*));
488 printlog(LOG_ERR
,"Numport resize failed portv %s",strerror(errno
));
491 for (i
=0;i
<NUMOFVLAN
;i
++) {
492 if (vlant
[i
].table
) {
493 BA_REALLOC(vlant
[i
].table
,numports
,val
);
494 if (vlant
[i
].table
== NULL
) {
495 printlog(LOG_ERR
,"Numport resize failed vlan tables vlan table %s",strerror(errno
));
499 if (vlant
[i
].bctag
) {
500 BA_REALLOC(vlant
[i
].bctag
,numports
,val
);
501 if (vlant
[i
].bctag
== NULL
) {
502 printlog(LOG_ERR
,"Numport resize failed vlan tables vlan bctag %s",strerror(errno
));
506 if (vlant
[i
].notlearning
) {
507 BA_REALLOC(vlant
[i
].notlearning
,numports
,val
);
508 if (vlant
[i
].notlearning
== NULL
) {
509 printlog(LOG_ERR
,"Numport resize failed vlan tables vlan notlearning %s",strerror(errno
));
514 for (i
=numports
;i
<val
;i
++)
525 static int portallocatable(char *arg
)
528 if (sscanf(arg
,"%i %i",&port
,&value
) != 2)
530 if (port
< 0 || port
>= numports
)
532 if (portv
[port
] == NULL
)
535 portv
[port
]->flag
&= ~NOTINPOOL
;
537 portv
[port
]->flag
|= NOTINPOOL
;
541 static int portremove(int val
)
543 if (val
<0 || val
>=numports
)
545 if (portv
[val
] == NULL
)
547 if (portv
[val
]->ep
!= NULL
)
553 static int portcreate(int val
)
555 if (val
<0 || val
>=numports
)
557 if (portv
[val
] != NULL
)
563 static int epclose(char *arg
)
566 if (sscanf(arg
,"%i %i",&port
,&id
) != 2)
569 return close_ep(port
,id
);
572 static int print_port(int fd
,int i
,int inclinactive
)
575 if (portv
[i
] != NULL
&& (inclinactive
|| portv
[i
]->ep
!=NULL
)) {
576 printoutc(fd
,"Port %04d untagged_vlan=%04d %sACTIVE - %sUnnamed Allocatable",
577 i
,portv
[i
]->vlanuntag
,
578 portv
[i
]->ep
?"":"IN",
579 (portv
[i
]->flag
& NOTINPOOL
)?"NOT ":"");
580 for (ep
=portv
[i
]->ep
; ep
!= NULL
; ep
=ep
->next
)
581 printoutc(fd
," -- endpoint ID %04d module %-12s: %s",ep
->fd_ctl
,
582 portv
[i
]->ms
->modname
,(ep
->descr
)?ep
->descr
:"no endpoint description");
588 static int print_ptable(int fd
,char *arg
)
593 if (i
<0 || i
>=numports
)
596 return print_port(fd
,i
,0);
599 for (i
=0;i
<numports
;i
++)
605 static int print_ptableall(int fd
,char *arg
)
610 if (i
<0 || i
>=numports
)
613 return print_port(fd
,i
,1);
616 for (i
=0;i
<numports
;i
++)
622 static int portsethub(int val
)
624 (val
)?portflag(P_SETFLAG
,HUB_TAG
):portflag(P_CLRFLAG
,HUB_TAG
);
628 static int portsetvlan(char *arg
)
631 if (sscanf(arg
,"%i %i",&port
,&vlan
) != 2)
633 /* port NOVLAN is okay here, it means NO untagged traffic */
634 if (vlan
<0 || vlan
> NUMOFVLAN
|| port
< 0 || port
>= numports
)
636 if ((vlan
!= NOVLAN
&& !BAC_CHECK(validvlan
,vlan
)) || portv
[port
] == NULL
)
638 int oldvlan
=portv
[port
]->vlanuntag
;
639 portv
[port
]->vlanuntag
=NOVLAN
;
640 hash_delete_port(port
);
641 if (portv
[port
]->ep
!= NULL
) {
642 /*changing active port*/
643 if (oldvlan
!= NOVLAN
)
644 BA_CLR(vlant
[oldvlan
].bcuntag
,port
);
645 if (vlan
!= NOVLAN
) {
646 BA_SET(vlant
[vlan
].bcuntag
,port
);
647 BA_CLR(vlant
[vlan
].bctag
,port
);
650 if (oldvlan
!= NOVLAN
) fstdelport(oldvlan
,port
);
651 if (vlan
!= NOVLAN
) fstaddport(vlan
,port
,0);
654 if (oldvlan
!= NOVLAN
) BA_CLR(vlant
[oldvlan
].table
,port
);
655 if (vlan
!= NOVLAN
) BA_SET(vlant
[vlan
].table
,port
);
656 portv
[port
]->vlanuntag
=vlan
;
660 static int vlancreate_nocheck(int vlan
)
663 vlant
[vlan
].table
=BA_ALLOC(numports
);
664 vlant
[vlan
].bctag
=BA_ALLOC(numports
);
665 vlant
[vlan
].bcuntag
=BA_ALLOC(numports
);
666 vlant
[vlan
].notlearning
=BA_ALLOC(numports
);
667 if (vlant
[vlan
].table
== NULL
|| vlant
[vlan
].bctag
== NULL
||
668 vlant
[vlan
].bcuntag
== NULL
)
675 BAC_SET(validvlan
,NUMOFVLAN
,vlan
);
680 static int vlancreate(int vlan
)
682 if (vlan
> 0 && vlan
< NUMOFVLAN
-1) { /*vlan NOVLAN (0xfff a.k.a. 4095) is reserved */
683 if (BAC_CHECK(validvlan
,vlan
))
686 return vlancreate_nocheck(vlan
);
691 static int vlanremove(int vlan
)
693 if (vlan
>= 0 && vlan
< NUMOFVLAN
) {
694 if (BAC_CHECK(validvlan
,vlan
)) {
695 register int i
,used
=0;
696 BA_FORALL(vlant
[vlan
].table
,numports
,used
++,i
);
700 BAC_CLR(validvlan
,NUMOFVLAN
,vlan
);
701 free(vlant
[vlan
].table
);
702 free(vlant
[vlan
].bctag
);
703 free(vlant
[vlan
].bcuntag
);
704 free(vlant
[vlan
].notlearning
);
705 vlant
[vlan
].table
=NULL
;
706 vlant
[vlan
].bctag
=NULL
;
707 vlant
[vlan
].bcuntag
=NULL
;
708 vlant
[vlan
].notlearning
=NULL
;
720 static int vlanaddport(char *arg
)
723 if (sscanf(arg
,"%i %i",&vlan
,&port
) != 2)
725 if (vlan
<0 || vlan
>= NUMOFVLAN
-1 || port
< 0 || port
>= numports
)
727 if (!BAC_CHECK(validvlan
,vlan
) || portv
[port
] == NULL
)
729 if (portv
[port
]->ep
!= NULL
&& portv
[port
]->vlanuntag
!= vlan
) {
730 /* changing active port*/
731 BA_SET(vlant
[vlan
].bctag
,port
);
733 fstaddport(vlan
,port
,1);
736 BA_SET(vlant
[vlan
].table
,port
);
740 static int vlandelport(char *arg
)
743 if (sscanf(arg
,"%i %i",&vlan
,&port
) != 2)
745 if (vlan
<0 || vlan
>= NUMOFVLAN
-1 || port
< 0 || port
>= numports
)
747 if (!BAC_CHECK(validvlan
,vlan
) || portv
[port
] == NULL
)
749 if (portv
[port
]->vlanuntag
== vlan
)
751 if (portv
[port
]->ep
!= NULL
) {
752 /*changing active port*/
753 BA_CLR(vlant
[vlan
].bctag
,port
);
755 fstdelport(vlan
,port
);
758 BA_CLR(vlant
[vlan
].table
,port
);
759 hash_delete_port(port
);
763 #define STRSTATUS(PN,V) \
764 ((BA_CHECK(vlant[(V)].notlearning,(PN))) ? "Discarding" : \
765 (BA_CHECK(vlant[(V)].bctag,(PN)) || BA_CHECK(vlant[(V)].bcuntag,(PN))) ? \
766 "Forwarding" : "Learning")
768 static void vlanprintactive(int vlan
,int fd
)
771 printoutc(fd
,"VLAN %04d",vlan
);
773 if (pflag
& FSTP_TAG
) {
775 printoutc(fd
," ++ FST root %02x:%02x:%02x:%02x:%02x:%02x:%02x:%02x \n"
776 " designated %02x:%02x:%02x:%02x:%02x:%02x:%02x:%02x port %d cost %d age %d",
777 fsttab
[vlan
]->root
[0], fsttab
[vlan
]->root
[1], fsttab
[vlan
]->root
[2], fsttab
[vlan
]->root
[3],
778 fsttab
[vlan
]->root
[4], fsttab
[vlan
]->root
[5], fsttab
[vlan
]->root
[6], fsttab
[vlan
]->root
[7],
779 fsttab
[vlan
]->desbr
[0], fsttab
[vlan
]->desbr
[1], fsttab
[vlan
]->desbr
[2], fsttab
[vlan
]->desbr
[3],
780 fsttab
[vlan
]->desbr
[4], fsttab
[vlan
]->desbr
[5], fsttab
[vlan
]->desbr
[6], fsttab
[vlan
]->desbr
[7],
781 fsttab
[vlan
]->rootport
,
782 ntohl(*(u_int32_t
*)(&(fsttab
[vlan
]->rootcost
))),
783 qtime()-fsttab
[vlan
]->roottimestamp
);
784 BA_FORALL(vlant
[vlan
].table
,numports
,
785 ({ int tagged
=portv
[i
]->vlanuntag
!= vlan
;
787 printoutc(fd
," -- Port %04d tagged=%d act=%d learn=%d forw=%d cost=%d role=%s",
788 i
, tagged
, 1, !(NOTLEARNING(i
,vlan
)),
789 (tagged
)?(BA_CHECK(vlant
[vlan
].bctag
,i
) != 0):(BA_CHECK(vlant
[vlan
].bcuntag
,i
) != 0),
791 (fsttab
[vlan
]->rootport
==i
?"Root":
792 ((BA_CHECK(fsttab
[vlan
]->backup
,i
)?"Alternate/Backup":"Designated")))
798 BA_FORALL(vlant
[vlan
].table
,numports
,
799 ({ int tagged
=portv
[i
]->vlanuntag
!= vlan
;
801 printoutc(fd
," -- Port %04d tagged=%d active=1 status=%s", i
, tagged
,
809 static int vlanprint(int fd
,char *arg
)
814 if (vlan
>= 0 && vlan
< NUMOFVLAN
-1) {
815 if (BAC_CHECK(validvlan
,vlan
))
816 vlanprintactive(vlan
,fd
);
822 BAC_FORALLFUN(validvlan
,NUMOFVLAN
,vlanprintactive
,fd
);
826 static void vlanprintelem(int vlan
,int fd
)
829 printoutc(fd
,"VLAN %04d",vlan
);
830 BA_FORALL(vlant
[vlan
].table
,numports
,
831 printoutc(fd
," -- Port %04d tagged=%d active=%d status=%s",
832 i
, portv
[i
]->vlanuntag
!= vlan
, portv
[i
]->ep
!= NULL
, STRSTATUS(i
,vlan
)),i
);
835 static int vlanprintall(int fd
,char *arg
)
840 if (vlan
> 0 && vlan
< NUMOFVLAN
-1) {
841 if (BAC_CHECK(validvlan
,vlan
))
842 vlanprintelem(vlan
,fd
);
848 BAC_FORALLFUN(validvlan
,NUMOFVLAN
,vlanprintelem
,fd
);
852 /* NOT sure about the effects of changing address on FSTP */
855 static int setmacaddr(char *strmac
)
857 int maci
[ETH_ALEN
],rv
;
859 if (index(strmac
,':') != NULL
)
860 rv
=sscanf(strmac
,"%x:%x:%x:%x:%x:%x", maci
+0, maci
+1, maci
+2, maci
+3, maci
+4, maci
+5);
862 rv
=sscanf(strmac
,"%x.%x.%x.%x.%x.%x", maci
+0, maci
+1, maci
+2, maci
+3, maci
+4, maci
+5);
867 for (i
=0;i
<ETH_ALEN
;i
++)
868 switchmac
[i
]=maci
[i
];
875 static struct comlist cl
[]={
876 {"port","============","PORT STATUS MENU",NULL
,NOARG
},
877 {"port/showinfo","","show hash info",showinfo
,NOARG
|WITHFD
},
878 {"port/setnumports","N","set the number of ports",portsetnumports
,INTARG
},
879 /*{"port/setmacaddr","MAC","set the switch MAC address",setmacaddr,STRARG},*/
880 {"port/sethub","0/1","1=HUB 0=switch",portsethub
,INTARG
},
881 {"port/setvlan","N VLAN","set port VLAN (untagged)",portsetvlan
,STRARG
},
882 {"port/create","N","create the port N (inactive)",portcreate
,INTARG
},
883 {"port/remove","N","remove the port N",portremove
,INTARG
},
884 {"port/allocatable","N 0/1","Is the port allocatable as unnamed? 1=Y 0=N",portallocatable
,STRARG
},
885 {"port/epclose","N ID","remove the endpoint port N/id ID",epclose
,STRARG
},
886 {"port/print","[N]","print the port/endpoint table",print_ptable
,STRARG
|WITHFD
},
887 {"port/allprint","[N]","print the port/endpoint table (including inactive port)",print_ptableall
,STRARG
|WITHFD
},
888 {"vlan","============","VLAN MANAGEMENT MENU",NULL
,NOARG
},
889 {"vlan/create","N","create the VLAN with tag N",vlancreate
,INTARG
},
890 {"vlan/remove","N","remove the VLAN with tag N",vlanremove
,INTARG
},
891 {"vlan/addport","N PORT","add port to the vlan N (tagged)",vlanaddport
,STRARG
},
892 {"vlan/delport","N PORT","add port to the vlan N (tagged)",vlandelport
,STRARG
},
893 {"vlan/print","[N]","print the list of defined vlan",vlanprint
,STRARG
|WITHFD
},
894 {"vlan/allprint","[N]","print the list of defined vlan (including inactive port)",vlanprintall
,STRARG
|WITHFD
},
897 void port_init(int initnumports
)
899 if((numports
=initnumports
) <= 0) {
900 printlog(LOG_ERR
,"The switch must have at least 1 port\n");
903 portv
=calloc(numports
,sizeof(struct port
*));
905 validvlan
=BAC_ALLOC(NUMOFVLAN
);
906 if (portv
==NULL
|| validvlan
== NULL
) {
907 printlog(LOG_ERR
,"ALLOC port data structures");
910 if (vlancreate_nocheck(0) != 0) {
911 printlog(LOG_ERR
,"ALLOC vlan port data structures");