xref: /dragonfly/sys/net/tap/if_tap.c (revision 92fc8b5c)
1 /*
2  * Copyright (C) 1999-2000 by Maksim Yevmenkin <m_evmenkin@yahoo.com>
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  *
14  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24  * SUCH DAMAGE.
25  *
26  * BASED ON:
27  * -------------------------------------------------------------------------
28  *
29  * Copyright (c) 1988, Julian Onions <jpo@cs.nott.ac.uk>
30  * Nottingham University 1987.
31  */
32 
33 /*
34  * $FreeBSD: src/sys/net/if_tap.c,v 1.3.2.3 2002/04/14 21:41:48 luigi Exp $
35  * $Id: if_tap.c,v 0.21 2000/07/23 21:46:02 max Exp $
36  */
37 
38 #include "opt_inet.h"
39 
40 #include <sys/param.h>
41 #include <sys/conf.h>
42 #include <sys/device.h>
43 #include <sys/filedesc.h>
44 #include <sys/filio.h>
45 #include <sys/kernel.h>
46 #include <sys/malloc.h>
47 #include <sys/mbuf.h>
48 #include <sys/proc.h>
49 #include <sys/priv.h>
50 #include <sys/signalvar.h>
51 #include <sys/socket.h>
52 #include <sys/sockio.h>
53 #include <sys/sysctl.h>
54 #include <sys/systm.h>
55 #include <sys/ttycom.h>
56 #include <sys/uio.h>
57 #include <sys/vnode.h>
58 #include <sys/serialize.h>
59 
60 #include <sys/thread2.h>
61 #include <sys/mplock2.h>
62 
63 #include <net/bpf.h>
64 #include <net/ethernet.h>
65 #include <net/if.h>
66 #include <net/ifq_var.h>
67 #include <net/if_arp.h>
68 #include <net/if_clone.h>
69 #include <net/if_media.h>
70 #include <net/route.h>
71 #include <sys/devfs.h>
72 
73 #include <netinet/in.h>
74 
75 #include "if_tapvar.h"
76 #include "if_tap.h"
77 
78 #define TAP_IFFLAGS	(IFF_BROADCAST|IFF_SIMPLEX|IFF_MULTICAST)
79 
80 #define TAP_PREALLOCATED_UNITS	4
81 
82 #define CDEV_NAME	"tap"
83 #define TAPDEBUG	if (tapdebug) if_printf
84 
85 #define TAP		"tap"
86 #define VMNET		"vmnet"
87 #define VMNET_DEV_MASK	0x00010000
88 
89 DEVFS_DECLARE_CLONE_BITMAP(tap);
90 
91 /* module */
92 static int 		tapmodevent	(module_t, int, void *);
93 
94 /* device */
95 static struct tap_softc *tapcreate(int, cdev_t);
96 static void		tapdestroy(struct tap_softc *);
97 
98 /* clone */
99 static int		tap_clone_create(struct if_clone *, int, caddr_t);
100 static int		tap_clone_destroy(struct ifnet *);
101 
102 
103 /* network interface */
104 static void		tapifstart	(struct ifnet *);
105 static int		tapifioctl	(struct ifnet *, u_long, caddr_t,
106 					 struct ucred *);
107 static void		tapifinit	(void *);
108 static void		tapifstop(struct tap_softc *, int);
109 static void		tapifflags(struct tap_softc *);
110 
111 
112 /* character device */
113 static d_open_t		tapopen;
114 static d_clone_t	tapclone;
115 static d_close_t	tapclose;
116 static d_read_t		tapread;
117 static d_write_t	tapwrite;
118 static d_ioctl_t	tapioctl;
119 static d_kqfilter_t	tapkqfilter;
120 
121 static struct dev_ops	tap_ops = {
122 	{ CDEV_NAME, 0, 0 },
123 	.d_open =	tapopen,
124 	.d_close =	tapclose,
125 	.d_read =	tapread,
126 	.d_write =	tapwrite,
127 	.d_ioctl =	tapioctl,
128 	.d_kqfilter =	tapkqfilter
129 };
130 
131 static int		taprefcnt = 0;		/* module ref. counter   */
132 static int		taplastunit = -1;	/* max. open unit number */
133 static int		tapdebug = 0;		/* debug flag            */
134 static int		tapuopen = 0;		/* all user open()       */
135 static int		tapuponopen = 0;	/* IFF_UP       */
136 
137 MALLOC_DECLARE(M_TAP);
138 MALLOC_DEFINE(M_TAP, CDEV_NAME, "Ethernet tunnel interface");
139 struct if_clone tap_cloner = IF_CLONE_INITIALIZER("tap",
140 			     tap_clone_create, tap_clone_destroy,
141 			     0, IF_MAXUNIT);
142 static SLIST_HEAD(,tap_softc) tap_listhead =
143 	SLIST_HEAD_INITIALIZER(&tap_listhead);
144 
145 SYSCTL_INT(_debug, OID_AUTO, if_tap_debug, CTLFLAG_RW, &tapdebug, 0, "");
146 SYSCTL_DECL(_net_link);
147 SYSCTL_NODE(_net_link, OID_AUTO, tap, CTLFLAG_RW, 0,
148 	    "Ethernet tunnel software network interface");
149 SYSCTL_INT(_net_link_tap, OID_AUTO, user_open, CTLFLAG_RW, &tapuopen, 0,
150 	   "Allow user to open /dev/tap (based on node permissions)");
151 SYSCTL_INT(_net_link_tap, OID_AUTO, up_on_open, CTLFLAG_RW, &tapuponopen, 0,
152 	   "Bring interface up when /dev/tap is opened");
153 SYSCTL_INT(_net_link_tap, OID_AUTO, debug, CTLFLAG_RW, &tapdebug, 0, "");
154 
155 DEV_MODULE(if_tap, tapmodevent, NULL);
156 
157 /*
158  * tapmodevent
159  *
160  * module event handler
161  */
162 static int
163 tapmodevent(module_t mod, int type, void *data)
164 {
165 	static int attached = 0;
166 	struct tap_softc *tp, *ntp;
167 	int i;
168 
169 	switch (type) {
170 	case MOD_LOAD:
171 		if (attached)
172 			return (EEXIST);
173 
174 		make_autoclone_dev(&tap_ops, &DEVFS_CLONE_BITMAP(tap), tapclone,
175 				   UID_ROOT, GID_WHEEL, 0600, "tap");
176 		SLIST_INIT(&tap_listhead);
177 		if_clone_attach(&tap_cloner);
178 
179 		for (i = 0; i < TAP_PREALLOCATED_UNITS; ++i) {
180 			make_dev(&tap_ops, i, UID_ROOT, GID_WHEEL,
181 				 0600, "tap%d", i);
182 			devfs_clone_bitmap_set(&DEVFS_CLONE_BITMAP(tap), i);
183 		}
184 
185 		attached = 1;
186 		break;
187 
188 	case MOD_UNLOAD:
189 		if (taprefcnt > 0)
190 			return (EBUSY);
191 
192 		if_clone_detach(&tap_cloner);
193 
194 		/* Maintain tap ifs in a local list */
195 		SLIST_FOREACH_MUTABLE(tp, &tap_listhead, tap_link, ntp)
196 			tapdestroy(tp);
197 
198 		attached = 0;
199 
200 		devfs_clone_handler_del("tap");
201 		dev_ops_remove_all(&tap_ops);
202 		devfs_clone_bitmap_uninit(&DEVFS_CLONE_BITMAP(tap));
203 		break;
204 
205 	default:
206 		return (EOPNOTSUPP);
207 	}
208 
209 	return (0);
210 } /* tapmodevent */
211 
212 
213 /*
214  * tapcreate - create or clone an interface
215  */
216 static struct tap_softc *
217 tapcreate(int unit, cdev_t dev)
218 {
219 	const char	*name = TAP;
220 	struct ifnet	*ifp;
221 	struct tap_softc *tp;
222 	uint8_t		ether_addr[ETHER_ADDR_LEN];
223 
224 	tp = kmalloc(sizeof(*tp), M_TAP, M_WAITOK | M_ZERO);
225 	dev->si_drv1 = tp;
226 	tp->tap_dev = dev;
227 	tp->tap_unit = unit;
228 
229 	reference_dev(dev);	/* tp association */
230 
231 	/* generate fake MAC address: 00 bd xx xx xx unit_no */
232 	ether_addr[0] = 0x00;
233 	ether_addr[1] = 0xbd;
234 	bcopy(&ticks, &ether_addr[2], 3);
235 	ether_addr[5] = (u_char)unit;
236 
237 	/* fill the rest and attach interface */
238 	ifp = &tp->tap_if;
239 	ifp->if_softc = tp;
240 
241 	if_initname(ifp, name, unit);
242 	if (unit > taplastunit)
243 		taplastunit = unit;
244 
245 	ifp->if_init = tapifinit;
246 	ifp->if_start = tapifstart;
247 	ifp->if_ioctl = tapifioctl;
248 	ifp->if_mtu = ETHERMTU;
249 	ifp->if_flags = TAP_IFFLAGS;
250 	ifq_set_maxlen(&ifp->if_snd, ifqmaxlen);
251 	ifq_set_ready(&ifp->if_snd);
252 
253 	ether_ifattach(ifp, ether_addr, NULL);
254 
255 	tp->tap_flags |= TAP_INITED;
256 	tp->tap_devq.ifq_maxlen = ifqmaxlen;
257 
258 	SLIST_INSERT_HEAD(&tap_listhead, tp, tap_link);
259 
260 	TAPDEBUG(ifp, "created. minor = %#x\n", minor(dev));
261 	return (tp);
262 }
263 
264 static
265 struct tap_softc *
266 tapfind(int unit)
267 {
268 	struct tap_softc *tp;
269 
270 	SLIST_FOREACH(tp, &tap_listhead, tap_link) {
271 		if (tp->tap_unit == unit)
272 			return(tp);
273 	}
274 	return (NULL);
275 }
276 
277 /*
278  * tap_clone_create:
279  *
280  * Create a new tap instance via ifconfig.
281  */
282 static int
283 tap_clone_create(struct if_clone *ifc __unused, int unit,
284     caddr_t param __unused)
285 {
286 	struct tap_softc *tp;
287 	cdev_t dev;
288 
289 	tp = tapfind(unit);
290 	if (tp == NULL) {
291 		if (!devfs_clone_bitmap_chk(&DEVFS_CLONE_BITMAP(tap), unit)) {
292 			devfs_clone_bitmap_set(&DEVFS_CLONE_BITMAP(tap), unit);
293 			dev = make_dev(&tap_ops, unit, UID_ROOT, GID_WHEEL,
294 					   0600, "%s%d", TAP, unit);
295 		} else {
296 			dev = devfs_find_device_by_name("%s%d", TAP, unit);
297 		}
298 
299 		KKASSERT(dev != NULL);
300 		tp = tapcreate(unit, dev);
301 	}
302 	tp->tap_flags |= TAP_CLONE;
303 	TAPDEBUG(&tp->tap_if, "clone created. minor = %#x tap_flags = 0x%x\n",
304 		 minor(tp->tap_dev), tp->tap_flags);
305 
306 	return (0);
307 }
308 
309 /*
310  * tapopen
311  *
312  * to open tunnel. must be superuser
313  */
314 static int
315 tapopen(struct dev_open_args *ap)
316 {
317 	cdev_t dev = NULL;
318 	struct tap_softc *tp = NULL;
319 	struct ifnet *ifp = NULL;
320 	int error;
321 
322 	if (tapuopen == 0 &&
323 	    (error = priv_check_cred(ap->a_cred, PRIV_ROOT, 0)) != 0)
324 		return (error);
325 
326 	get_mplock();
327 	dev = ap->a_head.a_dev;
328 	tp = dev->si_drv1;
329 	if (tp == NULL)
330 		tp = tapcreate(minor(dev), dev);
331 	if (tp->tap_flags & TAP_OPEN) {
332 		rel_mplock();
333 		return (EBUSY);
334 	}
335 	ifp = &tp->arpcom.ac_if;
336 
337 	if ((tp->tap_flags & TAP_CLONE) == 0) {
338 		EVENTHANDLER_INVOKE(ifnet_attach_event, ifp);
339 
340 		/* Announce the return of the interface. */
341 		rt_ifannouncemsg(ifp, IFAN_ARRIVAL);
342 	}
343 
344 	bcopy(tp->arpcom.ac_enaddr, tp->ether_addr, sizeof(tp->ether_addr));
345 
346 	if (curthread->td_proc)
347 		fsetown(curthread->td_proc->p_pid, &tp->tap_sigtd);
348 	tp->tap_flags |= TAP_OPEN;
349 	taprefcnt ++;
350 
351 	if (tapuponopen && (ifp->if_flags & IFF_UP) == 0) {
352 		crit_enter();
353 		if_up(ifp);
354 		crit_exit();
355 
356 		ifnet_serialize_all(ifp);
357 		tapifflags(tp);
358 		ifnet_deserialize_all(ifp);
359 
360 		tp->tap_flags |= TAP_CLOSEDOWN;
361 	}
362 
363 	TAPDEBUG(ifp, "opened. minor = %#x, refcnt = %d, taplastunit = %d\n",
364 		 minor(tp->tap_dev), taprefcnt, taplastunit);
365 
366 	rel_mplock();
367 	return (0);
368 }
369 
370 static int
371 tapclone(struct dev_clone_args *ap)
372 {
373 	int unit;
374 
375 	unit = devfs_clone_bitmap_get(&DEVFS_CLONE_BITMAP(tap), 0);
376 	ap->a_dev = make_only_dev(&tap_ops, unit, UID_ROOT, GID_WHEEL,
377 				  0600, "%s%d", TAP, unit);
378 	tapcreate(unit, ap->a_dev);
379 	return (0);
380 }
381 
382 /*
383  * tapclose
384  *
385  * close the device - mark i/f down & delete routing info
386  */
387 static int
388 tapclose(struct dev_close_args *ap)
389 {
390 	cdev_t dev = ap->a_head.a_dev;
391 	struct tap_softc *tp = dev->si_drv1;
392 	struct ifnet *ifp = &tp->tap_if;
393 	int clear_flags = 0;
394 
395 	get_mplock();
396 
397 	/* Junk all pending output */
398 	ifq_purge(&ifp->if_snd);
399 
400 	/*
401 	 * Do not bring the interface down, and do not anything with
402 	 * interface, if we are in VMnet mode. just close the device.
403 	 *
404 	 * If the interface is not cloned, we always bring it down.
405 	 *
406 	 * If the interface is cloned, then we bring it down during
407 	 * closing only if it was brought up during opening.
408 	 */
409 	if ((tp->tap_flags & TAP_VMNET) == 0 &&
410 	    ((tp->tap_flags & TAP_CLONE) == 0 ||
411 	     (tp->tap_flags & TAP_CLOSEDOWN))) {
412 		if (ifp->if_flags & IFF_UP)
413 			if_down(ifp);
414 		clear_flags = 1;
415 	}
416 	ifnet_serialize_all(ifp);
417 	tapifstop(tp, clear_flags);
418 	ifnet_deserialize_all(ifp);
419 
420 	if ((tp->tap_flags & TAP_CLONE) == 0) {
421 		if_purgeaddrs_nolink(ifp);
422 
423 		EVENTHANDLER_INVOKE(ifnet_detach_event, ifp);
424 
425 		/* Announce the departure of the interface. */
426 		rt_ifannouncemsg(ifp, IFAN_DEPARTURE);
427 	}
428 
429 	funsetown(&tp->tap_sigio);
430 	tp->tap_sigio = NULL;
431 	KNOTE(&tp->tap_rkq.ki_note, 0);
432 
433 	tp->tap_flags &= ~TAP_OPEN;
434 	funsetown(&tp->tap_sigtd);
435 	tp->tap_sigtd = NULL;
436 
437 	taprefcnt --;
438 	if (taprefcnt < 0) {
439 		taprefcnt = 0;
440 		if_printf(ifp, "minor = %#x, refcnt = %d is out of sync. "
441 			"set refcnt to 0\n", minor(tp->tap_dev), taprefcnt);
442 	}
443 
444 	TAPDEBUG(ifp, "closed. minor = %#x, refcnt = %d, taplastunit = %d\n",
445 		 minor(tp->tap_dev), taprefcnt, taplastunit);
446 
447 	if (tp->tap_unit >= TAP_PREALLOCATED_UNITS)
448 		tapdestroy(tp);
449 
450 	rel_mplock();
451 	return (0);
452 }
453 
454 /*
455  * tapdestroy:
456  *
457  *	Destroy a tap instance.
458  */
459 static void
460 tapdestroy(struct tap_softc *tp)
461 {
462 	struct ifnet *ifp = &tp->arpcom.ac_if;
463 	cdev_t dev;
464 
465 	TAPDEBUG(ifp, "destroyed. minor = %#x, refcnt = %d, taplastunit = %d\n",
466 		 minor(tp->tap_dev), taprefcnt, taplastunit);
467 
468 	ifnet_serialize_all(ifp);
469 	tapifstop(tp, 1);
470 	ifnet_deserialize_all(ifp);
471 
472 	ether_ifdetach(ifp);
473 	SLIST_REMOVE(&tap_listhead, tp, tap_softc, tap_link);
474 
475 	dev = tp->tap_dev;
476 	tp->tap_dev = NULL;
477 	dev->si_drv1 = NULL;
478 
479 	release_dev(dev);	/* tp association */
480 
481 	/*
482 	 * Also destroy the cloned device
483 	 */
484 	if (tp->tap_unit >= TAP_PREALLOCATED_UNITS) {
485 		destroy_dev(dev);
486 		devfs_clone_bitmap_put(&DEVFS_CLONE_BITMAP(tap), tp->tap_unit);
487 	}
488 
489 	kfree(tp, M_TAP);
490 
491 	taplastunit--;
492 }
493 
494 /*
495  * tap_clone_destroy:
496  *
497  *	Destroy a tap instance.
498  */
499 static int
500 tap_clone_destroy(struct ifnet *ifp)
501 {
502 	struct tap_softc *tp = ifp->if_softc;
503 
504 	if ((tp->tap_flags & TAP_CLONE) == 0)
505 		return ENXIO;
506 
507 	TAPDEBUG(&tp->tap_if, "clone destroyed. minor = %#x tap_flags = 0x%x\n",
508 		 minor(tp->tap_dev), tp->tap_flags);
509 	tapdestroy(tp);
510 
511 	return 0;
512 }
513 
514 /*
515  * tapifinit
516  *
517  * Network interface initialization function (called with if serializer held)
518  *
519  * MPSAFE
520  */
521 static void
522 tapifinit(void *xtp)
523 {
524 	struct tap_softc *tp = xtp;
525 	struct ifnet *ifp = &tp->tap_if;
526 
527 	TAPDEBUG(ifp, "initializing, minor = %#x tap_flags = 0x%x\n",
528 		 minor(tp->tap_dev), tp->tap_flags);
529 
530 	ASSERT_IFNET_SERIALIZED_ALL(ifp);
531 
532 	tapifstop(tp, 1);
533 
534 	ifp->if_flags |= IFF_RUNNING;
535 	ifp->if_flags &= ~IFF_OACTIVE;
536 
537 	/* attempt to start output */
538 	tapifstart(ifp);
539 }
540 
541 
542 /*
543  * tapifioctl
544  *
545  * Process an ioctl request on network interface (called with if serializer
546  * held).
547  *
548  * MPSAFE
549  */
550 static int
551 tapifioctl(struct ifnet *ifp, u_long cmd, caddr_t data, struct ucred *cr)
552 {
553 	struct tap_softc 	*tp = (struct tap_softc *)(ifp->if_softc);
554 	struct ifstat		*ifs = NULL;
555 	struct ifmediareq	*ifmr = NULL;
556 	int			error = 0;
557 	int			dummy;
558 
559 	switch (cmd) {
560 		case SIOCSIFADDR:
561 		case SIOCGIFADDR:
562 		case SIOCSIFMTU:
563 			error = ether_ioctl(ifp, cmd, data);
564 			break;
565 
566 		case SIOCSIFFLAGS:
567 			tapifflags(tp);
568 			break;
569 
570 		case SIOCADDMULTI: /* XXX -- just like vmnet does */
571 		case SIOCDELMULTI:
572 			break;
573 
574 		case SIOCGIFMEDIA:
575 			/*
576 			 * The bridge code needs this when running the
577 			 * spanning tree protocol.
578 			 */
579 			ifmr = (struct ifmediareq *)data;
580 			dummy = ifmr->ifm_count;
581 			ifmr->ifm_count = 1;
582 			ifmr->ifm_status = IFM_AVALID;
583 			ifmr->ifm_active = IFM_ETHER;
584 			if (tp->tap_flags & TAP_OPEN)
585 				ifmr->ifm_status |= IFM_ACTIVE;
586 			ifmr->ifm_current = ifmr->ifm_active;
587 			if (dummy >= 1) {
588 				int media = IFM_ETHER;
589 				error = copyout(&media,
590 						ifmr->ifm_ulist,
591 						sizeof(int));
592 			}
593 			break;
594 
595 		case SIOCGIFSTATUS:
596 			ifs = (struct ifstat *)data;
597 			dummy = strlen(ifs->ascii);
598 			if ((tp->tap_flags & TAP_OPEN) &&
599 			    dummy < sizeof(ifs->ascii)) {
600 				if (tp->tap_sigtd && tp->tap_sigtd->sio_proc) {
601 				    ksnprintf(ifs->ascii + dummy,
602 					sizeof(ifs->ascii) - dummy,
603 					"\tOpened by pid %d\n",
604 					(int)tp->tap_sigtd->sio_proc->p_pid);
605 				} else {
606 				    ksnprintf(ifs->ascii + dummy,
607 					sizeof(ifs->ascii) - dummy,
608 					"\tOpened by <unknown>\n");
609 				}
610 			}
611 			break;
612 
613 		default:
614 			error = EINVAL;
615 			break;
616 	}
617 
618 	return (error);
619 }
620 
621 
622 /*
623  * tapifstart
624  *
625  * Queue packets from higher level ready to put out (called with if serializer
626  * held)
627  *
628  * MPSAFE
629  */
630 static void
631 tapifstart(struct ifnet *ifp)
632 {
633 	struct tap_softc *tp = ifp->if_softc;
634 	struct ifqueue *ifq;
635 	struct mbuf *m;
636 	int has_data = 0;
637 
638 	TAPDEBUG(ifp, "starting, minor = %#x\n", minor(tp->tap_dev));
639 
640 	/*
641 	 * do not junk pending output if we are in VMnet mode.
642 	 * XXX: can this do any harm because of queue overflow?
643 	 */
644 
645 	if (((tp->tap_flags & TAP_VMNET) == 0) &&
646 	    ((tp->tap_flags & TAP_READY) != TAP_READY)) {
647 		TAPDEBUG(ifp, "not ready. minor = %#x, tap_flags = 0x%x\n",
648 			 minor(tp->tap_dev), tp->tap_flags);
649 		ifq_purge(&ifp->if_snd);
650 		return;
651 	}
652 
653 	ifp->if_flags |= IFF_OACTIVE;
654 
655 	ifq = &tp->tap_devq;
656 	while ((m = ifq_dequeue(&ifp->if_snd, NULL)) != NULL) {
657 		if (IF_QFULL(ifq)) {
658 			IF_DROP(ifq);
659 			ifp->if_oerrors++;
660 			m_freem(m);
661 		} else {
662 			IF_ENQUEUE(ifq, m);
663 			ifp->if_opackets++;
664 			has_data = 1;
665 		}
666 	}
667 
668 	if (has_data) {
669 		if (tp->tap_flags & TAP_RWAIT) {
670 			tp->tap_flags &= ~TAP_RWAIT;
671 			wakeup((caddr_t)tp);
672 		}
673 
674 		KNOTE(&tp->tap_rkq.ki_note, 0);
675 
676 		if ((tp->tap_flags & TAP_ASYNC) && (tp->tap_sigio != NULL)) {
677 			get_mplock();
678 			pgsigio(tp->tap_sigio, SIGIO, 0);
679 			rel_mplock();
680 		}
681 	}
682 
683 	ifp->if_flags &= ~IFF_OACTIVE;
684 }
685 
686 
687 /*
688  * tapioctl
689  *
690  * The ops interface is now pretty minimal.  Called via fileops with nothing
691  * held.
692  *
693  * MPSAFE
694  */
695 static int
696 tapioctl(struct dev_ioctl_args *ap)
697 {
698 	cdev_t dev = ap->a_head.a_dev;
699 	caddr_t data = ap->a_data;
700 	struct tap_softc	*tp = dev->si_drv1;
701 	struct ifnet		*ifp = &tp->tap_if;
702  	struct tapinfo		*tapp = NULL;
703 	struct mbuf *mb;
704 	short f;
705 	int error;
706 
707 	ifnet_serialize_all(ifp);
708 	error = 0;
709 
710 	switch (ap->a_cmd) {
711 	case TAPSIFINFO:
712 		tapp = (struct tapinfo *)data;
713 		ifp->if_mtu = tapp->mtu;
714 		ifp->if_type = tapp->type;
715 		ifp->if_baudrate = tapp->baudrate;
716 		break;
717 
718 	case TAPGIFINFO:
719 		tapp = (struct tapinfo *)data;
720 		tapp->mtu = ifp->if_mtu;
721 		tapp->type = ifp->if_type;
722 		tapp->baudrate = ifp->if_baudrate;
723 		break;
724 
725 	case TAPSDEBUG:
726 		tapdebug = *(int *)data;
727 		break;
728 
729 	case TAPGDEBUG:
730 		*(int *)data = tapdebug;
731 		break;
732 
733 	case FIOASYNC:
734 		if (*(int *)data)
735 			tp->tap_flags |= TAP_ASYNC;
736 		else
737 			tp->tap_flags &= ~TAP_ASYNC;
738 		break;
739 
740 	case FIONREAD:
741 		*(int *)data = 0;
742 
743 		/* Take a look at devq first */
744 		IF_POLL(&tp->tap_devq, mb);
745 		if (mb == NULL)
746 			mb = ifq_poll(&ifp->if_snd);
747 
748 		if (mb != NULL) {
749 			for(; mb != NULL; mb = mb->m_next)
750 				*(int *)data += mb->m_len;
751 		}
752 		break;
753 
754 	case FIOSETOWN:
755 		error = fsetown(*(int *)data, &tp->tap_sigio);
756 		break;
757 
758 	case FIOGETOWN:
759 		*(int *)data = fgetown(&tp->tap_sigio);
760 		break;
761 
762 	/* this is deprecated, FIOSETOWN should be used instead */
763 	case TIOCSPGRP:
764 		error = fsetown(-(*(int *)data), &tp->tap_sigio);
765 		break;
766 
767 	/* this is deprecated, FIOGETOWN should be used instead */
768 	case TIOCGPGRP:
769 		*(int *)data = -fgetown(&tp->tap_sigio);
770 		break;
771 
772 	/* VMware/VMnet port ioctl's */
773 
774 	case SIOCGIFFLAGS:	/* get ifnet flags */
775 		bcopy(&ifp->if_flags, data, sizeof(ifp->if_flags));
776 		break;
777 
778 	case VMIO_SIOCSIFFLAGS: /* VMware/VMnet SIOCSIFFLAGS */
779 		f = *(short *)data;
780 		f &= 0x0fff;
781 		f &= ~IFF_CANTCHANGE;
782 		f |= IFF_UP;
783 		ifp->if_flags = f | (ifp->if_flags & IFF_CANTCHANGE);
784 		break;
785 
786 	case OSIOCGIFADDR:	/* get MAC address of the remote side */
787 	case SIOCGIFADDR:
788 		bcopy(tp->ether_addr, data, sizeof(tp->ether_addr));
789 		break;
790 
791 	case SIOCSIFADDR:	/* set MAC address of the remote side */
792 		bcopy(data, tp->ether_addr, sizeof(tp->ether_addr));
793 		break;
794 
795 	default:
796 		error = ENOTTY;
797 		break;
798 	}
799 	ifnet_deserialize_all(ifp);
800 	return (error);
801 }
802 
803 
804 /*
805  * tapread
806  *
807  * The ops read interface - reads a packet at a time, or at
808  * least as much of a packet as can be read.
809  *
810  * Called from the fileops interface with nothing held.
811  *
812  * MPSAFE
813  */
814 static int
815 tapread(struct dev_read_args *ap)
816 {
817 	cdev_t dev = ap->a_head.a_dev;
818 	struct uio *uio = ap->a_uio;
819 	struct tap_softc	*tp = dev->si_drv1;
820 	struct ifnet		*ifp = &tp->tap_if;
821 	struct mbuf		*m0 = NULL;
822 	int			 error = 0, len;
823 
824 	TAPDEBUG(ifp, "reading, minor = %#x\n", minor(tp->tap_dev));
825 
826 	if ((tp->tap_flags & TAP_READY) != TAP_READY) {
827 		TAPDEBUG(ifp, "not ready. minor = %#x, tap_flags = 0x%x\n",
828 			 minor(tp->tap_dev), tp->tap_flags);
829 
830 		return (EHOSTDOWN);
831 	}
832 
833 	tp->tap_flags &= ~TAP_RWAIT;
834 
835 	/* sleep until we get a packet */
836 	do {
837 		ifnet_serialize_all(ifp);
838 		IF_DEQUEUE(&tp->tap_devq, m0);
839 		if (m0 == NULL) {
840 			if (ap->a_ioflag & IO_NDELAY) {
841 				ifnet_deserialize_all(ifp);
842 				return (EWOULDBLOCK);
843 			}
844 			tp->tap_flags |= TAP_RWAIT;
845 			tsleep_interlock(tp, PCATCH);
846 			ifnet_deserialize_all(ifp);
847 			error = tsleep(tp, PCATCH | PINTERLOCKED, "taprd", 0);
848 			if (error)
849 				return (error);
850 		} else {
851 			ifnet_deserialize_all(ifp);
852 		}
853 	} while (m0 == NULL);
854 
855 	BPF_MTAP(ifp, m0);
856 
857 	/* xfer packet to user space */
858 	while ((m0 != NULL) && (uio->uio_resid > 0) && (error == 0)) {
859 		len = (int)szmin(uio->uio_resid, m0->m_len);
860 		if (len == 0)
861 			break;
862 
863 		error = uiomove(mtod(m0, caddr_t), (size_t)len, uio);
864 		m0 = m_free(m0);
865 	}
866 
867 	if (m0 != NULL) {
868 		TAPDEBUG(ifp, "dropping mbuf, minor = %#x\n",
869 			 minor(tp->tap_dev));
870 		m_freem(m0);
871 	}
872 
873 	return (error);
874 }
875 
876 /*
877  * tapwrite
878  *
879  * The ops write interface - an atomic write is a packet - or else!
880  *
881  * Called from the fileops interface with nothing held.
882  *
883  * MPSAFE
884  */
885 static int
886 tapwrite(struct dev_write_args *ap)
887 {
888 	cdev_t dev = ap->a_head.a_dev;
889 	struct uio *uio = ap->a_uio;
890 	struct tap_softc	*tp = dev->si_drv1;
891 	struct ifnet		*ifp = &tp->tap_if;
892 	struct mbuf		*top = NULL, **mp = NULL, *m = NULL;
893 	int			error;
894 	size_t			tlen, mlen;
895 
896 	TAPDEBUG(ifp, "writing, minor = %#x\n", minor(tp->tap_dev));
897 
898 	if ((tp->tap_flags & TAP_READY) != TAP_READY) {
899 		TAPDEBUG(ifp, "not ready. minor = %#x, tap_flags = 0x%x\n",
900 			 minor(tp->tap_dev), tp->tap_flags);
901 		return (EHOSTDOWN);
902 	}
903 
904 	if (uio->uio_resid == 0)
905 		return (0);
906 
907 	if (uio->uio_resid > TAPMRU) {
908 		TAPDEBUG(ifp, "invalid packet len = %zu, minor = %#x\n",
909 			 uio->uio_resid, minor(tp->tap_dev));
910 
911 		return (EIO);
912 	}
913 	tlen = uio->uio_resid;
914 
915 	/* get a header mbuf */
916 	MGETHDR(m, MB_WAIT, MT_DATA);
917 	if (m == NULL)
918 		return (ENOBUFS);
919 	mlen = MHLEN;
920 
921 	top = NULL;
922 	mp = &top;
923 	error = 0;
924 
925 	while (error == 0 && uio->uio_resid > 0) {
926 		m->m_len = (int)szmin(mlen, uio->uio_resid);
927 		error = uiomove(mtod(m, caddr_t), (size_t)m->m_len, uio);
928 		*mp = m;
929 		mp = &m->m_next;
930 		if (uio->uio_resid > 0) {
931 			MGET(m, MB_WAIT, MT_DATA);
932 			if (m == NULL) {
933 				error = ENOBUFS;
934 				break;
935 			}
936 			mlen = MLEN;
937 		}
938 	}
939 	if (error) {
940 		ifp->if_ierrors ++;
941 		if (top)
942 			m_freem(top);
943 		return (error);
944 	}
945 
946 	top->m_pkthdr.len = (int)tlen;
947 	top->m_pkthdr.rcvif = ifp;
948 
949 	/*
950 	 * Ethernet bridge and bpf are handled in ether_input
951 	 *
952 	 * adjust mbuf and give packet to the ether_input
953 	 */
954 	ifnet_serialize_all(ifp);
955 	ifp->if_input(ifp, top);
956 	ifp->if_ipackets ++; /* ibytes are counted in ether_input */
957 	ifnet_deserialize_all(ifp);
958 
959 	return (0);
960 }
961 
962 /*
963  * tapkqfilter - called from the fileops interface with nothing held
964  *
965  * MPSAFE
966  */
967 static int filt_tapread(struct knote *kn, long hint);
968 static int filt_tapwrite(struct knote *kn, long hint);
969 static void filt_tapdetach(struct knote *kn);
970 static struct filterops tapread_filtops =
971 	{ FILTEROP_ISFD, NULL, filt_tapdetach, filt_tapread };
972 static struct filterops tapwrite_filtops =
973 	{ FILTEROP_ISFD, NULL, filt_tapdetach, filt_tapwrite };
974 
975 static int
976 tapkqfilter(struct dev_kqfilter_args *ap)
977 {
978 	cdev_t dev = ap->a_head.a_dev;
979 	struct knote *kn = ap->a_kn;
980 	struct tap_softc *tp;
981 	struct klist *list;
982 	struct ifnet *ifp;
983 
984 	tp = dev->si_drv1;
985 	list = &tp->tap_rkq.ki_note;
986 	ifp = &tp->tap_if;
987 	ap->a_result =0;
988 
989 	switch(kn->kn_filter) {
990 	case EVFILT_READ:
991 		kn->kn_fop = &tapread_filtops;
992 		kn->kn_hook = (void *)tp;
993 		break;
994 	case EVFILT_WRITE:
995 		kn->kn_fop = &tapwrite_filtops;
996 		kn->kn_hook = (void *)tp;
997 		break;
998 	default:
999 		ap->a_result = EOPNOTSUPP;
1000 		return(0);
1001 	}
1002 
1003 	knote_insert(list, kn);
1004 	return(0);
1005 }
1006 
1007 static int
1008 filt_tapread(struct knote *kn, long hint)
1009 {
1010 	struct tap_softc *tp = (void *)kn->kn_hook;
1011 
1012 	if (IF_QEMPTY(&tp->tap_devq) == 0)	/* XXX serializer */
1013 		return(1);
1014 	else
1015 		return(0);
1016 }
1017 
1018 static int
1019 filt_tapwrite(struct knote *kn, long hint)
1020 {
1021 	/* Always ready for a write */
1022 	return (1);
1023 }
1024 
1025 static void
1026 filt_tapdetach(struct knote *kn)
1027 {
1028 	struct tap_softc *tp = (void *)kn->kn_hook;
1029 
1030 	knote_remove(&tp->tap_rkq.ki_note, kn);
1031 }
1032 
1033 static void
1034 tapifstop(struct tap_softc *tp, int clear_flags)
1035 {
1036 	struct ifnet *ifp = &tp->tap_if;
1037 
1038 	ASSERT_IFNET_SERIALIZED_ALL(ifp);
1039 	IF_DRAIN(&tp->tap_devq);
1040 	tp->tap_flags &= ~TAP_CLOSEDOWN;
1041 	if (clear_flags)
1042 		ifp->if_flags &= ~(IFF_RUNNING | IFF_OACTIVE);
1043 }
1044 
1045 static void
1046 tapifflags(struct tap_softc *tp)
1047 {
1048 	struct ifnet *ifp = &tp->arpcom.ac_if;
1049 
1050 	ASSERT_IFNET_SERIALIZED_ALL(ifp);
1051 	if ((tp->tap_flags & TAP_VMNET) == 0) {
1052 		/*
1053 		 * Only for non-vmnet tap(4)
1054 		 */
1055 		if (ifp->if_flags & IFF_UP) {
1056 			if ((ifp->if_flags & IFF_RUNNING) == 0)
1057 				tapifinit(tp);
1058 		} else {
1059 			tapifstop(tp, 1);
1060 		}
1061 	} else {
1062 		/* XXX */
1063 	}
1064 }
1065