1 /* 2 * Copyright (C) 1999-2000 by Maksim Yevmenkin <m_evmenkin@yahoo.com> 3 * All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 17 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 24 * SUCH DAMAGE. 25 * 26 * BASED ON: 27 * ------------------------------------------------------------------------- 28 * 29 * Copyright (c) 1988, Julian Onions <jpo@cs.nott.ac.uk> 30 * Nottingham University 1987. 31 */ 32 33 /* 34 * $FreeBSD: src/sys/net/if_tap.c,v 1.3.2.3 2002/04/14 21:41:48 luigi Exp $ 35 * $Id: if_tap.c,v 0.21 2000/07/23 21:46:02 max Exp $ 36 */ 37 38 #include "opt_inet.h" 39 40 #include <sys/param.h> 41 #include <sys/conf.h> 42 #include <sys/device.h> 43 #include <sys/filedesc.h> 44 #include <sys/filio.h> 45 #include <sys/kernel.h> 46 #include <sys/malloc.h> 47 #include <sys/mbuf.h> 48 #include <sys/proc.h> 49 #include <sys/priv.h> 50 #include <sys/signalvar.h> 51 #include <sys/socket.h> 52 #include <sys/sockio.h> 53 #include <sys/sysctl.h> 54 #include <sys/systm.h> 55 #include <sys/ttycom.h> 56 #include <sys/uio.h> 57 #include <sys/vnode.h> 58 #include <sys/serialize.h> 59 60 #include <sys/thread2.h> 61 #include <sys/mplock2.h> 62 63 #include <net/bpf.h> 64 #include <net/ethernet.h> 65 #include <net/if.h> 66 #include <net/ifq_var.h> 67 #include <net/if_arp.h> 68 #include <net/if_clone.h> 69 #include <net/if_media.h> 70 #include <net/route.h> 71 #include <sys/devfs.h> 72 73 #include <netinet/in.h> 74 75 #include "if_tapvar.h" 76 #include "if_tap.h" 77 78 #define TAP_IFFLAGS (IFF_BROADCAST|IFF_SIMPLEX|IFF_MULTICAST) 79 80 #define TAP_PREALLOCATED_UNITS 4 81 82 #define CDEV_NAME "tap" 83 #define TAPDEBUG if (tapdebug) if_printf 84 85 #define TAP "tap" 86 #define VMNET "vmnet" 87 #define VMNET_DEV_MASK 0x00010000 88 89 DEVFS_DECLARE_CLONE_BITMAP(tap); 90 91 /* module */ 92 static int tapmodevent (module_t, int, void *); 93 94 /* device */ 95 static struct tap_softc *tapcreate(int, cdev_t); 96 static void tapdestroy(struct tap_softc *); 97 98 /* clone */ 99 static int tap_clone_create(struct if_clone *, int, caddr_t); 100 static int tap_clone_destroy(struct ifnet *); 101 102 103 /* network interface */ 104 static void tapifstart (struct ifnet *); 105 static int tapifioctl (struct ifnet *, u_long, caddr_t, 106 struct ucred *); 107 static void tapifinit (void *); 108 static void tapifstop(struct tap_softc *, int); 109 static void tapifflags(struct tap_softc *); 110 111 112 /* character device */ 113 static d_open_t tapopen; 114 static d_clone_t tapclone; 115 static d_close_t tapclose; 116 static d_read_t tapread; 117 static d_write_t tapwrite; 118 static d_ioctl_t tapioctl; 119 static d_kqfilter_t tapkqfilter; 120 121 static struct dev_ops tap_ops = { 122 { CDEV_NAME, 0, 0 }, 123 .d_open = tapopen, 124 .d_close = tapclose, 125 .d_read = tapread, 126 .d_write = tapwrite, 127 .d_ioctl = tapioctl, 128 .d_kqfilter = tapkqfilter 129 }; 130 131 static int taprefcnt = 0; /* module ref. counter */ 132 static int taplastunit = -1; /* max. open unit number */ 133 static int tapdebug = 0; /* debug flag */ 134 static int tapuopen = 0; /* all user open() */ 135 static int tapuponopen = 0; /* IFF_UP */ 136 137 MALLOC_DECLARE(M_TAP); 138 MALLOC_DEFINE(M_TAP, CDEV_NAME, "Ethernet tunnel interface"); 139 struct if_clone tap_cloner = IF_CLONE_INITIALIZER("tap", 140 tap_clone_create, tap_clone_destroy, 141 0, IF_MAXUNIT); 142 static SLIST_HEAD(,tap_softc) tap_listhead = 143 SLIST_HEAD_INITIALIZER(&tap_listhead); 144 145 SYSCTL_INT(_debug, OID_AUTO, if_tap_debug, CTLFLAG_RW, &tapdebug, 0, ""); 146 SYSCTL_DECL(_net_link); 147 SYSCTL_NODE(_net_link, OID_AUTO, tap, CTLFLAG_RW, 0, 148 "Ethernet tunnel software network interface"); 149 SYSCTL_INT(_net_link_tap, OID_AUTO, user_open, CTLFLAG_RW, &tapuopen, 0, 150 "Allow user to open /dev/tap (based on node permissions)"); 151 SYSCTL_INT(_net_link_tap, OID_AUTO, up_on_open, CTLFLAG_RW, &tapuponopen, 0, 152 "Bring interface up when /dev/tap is opened"); 153 SYSCTL_INT(_net_link_tap, OID_AUTO, debug, CTLFLAG_RW, &tapdebug, 0, ""); 154 155 DEV_MODULE(if_tap, tapmodevent, NULL); 156 157 /* 158 * tapmodevent 159 * 160 * module event handler 161 */ 162 static int 163 tapmodevent(module_t mod, int type, void *data) 164 { 165 static int attached = 0; 166 struct tap_softc *tp, *ntp; 167 int i; 168 169 switch (type) { 170 case MOD_LOAD: 171 if (attached) 172 return (EEXIST); 173 174 make_autoclone_dev(&tap_ops, &DEVFS_CLONE_BITMAP(tap), tapclone, 175 UID_ROOT, GID_WHEEL, 0600, "tap"); 176 SLIST_INIT(&tap_listhead); 177 if_clone_attach(&tap_cloner); 178 179 for (i = 0; i < TAP_PREALLOCATED_UNITS; ++i) { 180 make_dev(&tap_ops, i, UID_ROOT, GID_WHEEL, 181 0600, "tap%d", i); 182 devfs_clone_bitmap_set(&DEVFS_CLONE_BITMAP(tap), i); 183 } 184 185 attached = 1; 186 break; 187 188 case MOD_UNLOAD: 189 if (taprefcnt > 0) 190 return (EBUSY); 191 192 if_clone_detach(&tap_cloner); 193 194 /* Maintain tap ifs in a local list */ 195 SLIST_FOREACH_MUTABLE(tp, &tap_listhead, tap_link, ntp) 196 tapdestroy(tp); 197 198 attached = 0; 199 200 devfs_clone_handler_del("tap"); 201 dev_ops_remove_all(&tap_ops); 202 devfs_clone_bitmap_uninit(&DEVFS_CLONE_BITMAP(tap)); 203 break; 204 205 default: 206 return (EOPNOTSUPP); 207 } 208 209 return (0); 210 } /* tapmodevent */ 211 212 213 /* 214 * tapcreate - create or clone an interface 215 */ 216 static struct tap_softc * 217 tapcreate(int unit, cdev_t dev) 218 { 219 const char *name = TAP; 220 struct ifnet *ifp; 221 struct tap_softc *tp; 222 uint8_t ether_addr[ETHER_ADDR_LEN]; 223 224 tp = kmalloc(sizeof(*tp), M_TAP, M_WAITOK | M_ZERO); 225 dev->si_drv1 = tp; 226 tp->tap_dev = dev; 227 tp->tap_unit = unit; 228 229 reference_dev(dev); /* tp association */ 230 231 /* generate fake MAC address: 00 bd xx xx xx unit_no */ 232 ether_addr[0] = 0x00; 233 ether_addr[1] = 0xbd; 234 bcopy(&ticks, ðer_addr[2], 3); 235 ether_addr[5] = (u_char)unit; 236 237 /* fill the rest and attach interface */ 238 ifp = &tp->tap_if; 239 ifp->if_softc = tp; 240 241 if_initname(ifp, name, unit); 242 if (unit > taplastunit) 243 taplastunit = unit; 244 245 ifp->if_init = tapifinit; 246 ifp->if_start = tapifstart; 247 ifp->if_ioctl = tapifioctl; 248 ifp->if_mtu = ETHERMTU; 249 ifp->if_flags = TAP_IFFLAGS; 250 ifq_set_maxlen(&ifp->if_snd, ifqmaxlen); 251 ifq_set_ready(&ifp->if_snd); 252 253 ether_ifattach(ifp, ether_addr, NULL); 254 255 tp->tap_flags |= TAP_INITED; 256 tp->tap_devq.ifq_maxlen = ifqmaxlen; 257 258 SLIST_INSERT_HEAD(&tap_listhead, tp, tap_link); 259 260 TAPDEBUG(ifp, "created. minor = %#x\n", minor(dev)); 261 return (tp); 262 } 263 264 static 265 struct tap_softc * 266 tapfind(int unit) 267 { 268 struct tap_softc *tp; 269 270 SLIST_FOREACH(tp, &tap_listhead, tap_link) { 271 if (tp->tap_unit == unit) 272 return(tp); 273 } 274 return (NULL); 275 } 276 277 /* 278 * tap_clone_create: 279 * 280 * Create a new tap instance via ifconfig. 281 */ 282 static int 283 tap_clone_create(struct if_clone *ifc __unused, int unit, 284 caddr_t param __unused) 285 { 286 struct tap_softc *tp; 287 cdev_t dev; 288 289 tp = tapfind(unit); 290 if (tp == NULL) { 291 if (!devfs_clone_bitmap_chk(&DEVFS_CLONE_BITMAP(tap), unit)) { 292 devfs_clone_bitmap_set(&DEVFS_CLONE_BITMAP(tap), unit); 293 dev = make_dev(&tap_ops, unit, UID_ROOT, GID_WHEEL, 294 0600, "%s%d", TAP, unit); 295 } else { 296 dev = devfs_find_device_by_name("%s%d", TAP, unit); 297 } 298 299 KKASSERT(dev != NULL); 300 tp = tapcreate(unit, dev); 301 } 302 tp->tap_flags |= TAP_CLONE; 303 TAPDEBUG(&tp->tap_if, "clone created. minor = %#x tap_flags = 0x%x\n", 304 minor(tp->tap_dev), tp->tap_flags); 305 306 return (0); 307 } 308 309 /* 310 * tapopen 311 * 312 * to open tunnel. must be superuser 313 */ 314 static int 315 tapopen(struct dev_open_args *ap) 316 { 317 cdev_t dev = NULL; 318 struct tap_softc *tp = NULL; 319 struct ifnet *ifp = NULL; 320 int error; 321 322 if (tapuopen == 0 && 323 (error = priv_check_cred(ap->a_cred, PRIV_ROOT, 0)) != 0) 324 return (error); 325 326 get_mplock(); 327 dev = ap->a_head.a_dev; 328 tp = dev->si_drv1; 329 if (tp == NULL) 330 tp = tapcreate(minor(dev), dev); 331 if (tp->tap_flags & TAP_OPEN) { 332 rel_mplock(); 333 return (EBUSY); 334 } 335 ifp = &tp->arpcom.ac_if; 336 337 if ((tp->tap_flags & TAP_CLONE) == 0) { 338 EVENTHANDLER_INVOKE(ifnet_attach_event, ifp); 339 340 /* Announce the return of the interface. */ 341 rt_ifannouncemsg(ifp, IFAN_ARRIVAL); 342 } 343 344 bcopy(tp->arpcom.ac_enaddr, tp->ether_addr, sizeof(tp->ether_addr)); 345 346 if (curthread->td_proc) 347 fsetown(curthread->td_proc->p_pid, &tp->tap_sigtd); 348 tp->tap_flags |= TAP_OPEN; 349 taprefcnt ++; 350 351 if (tapuponopen && (ifp->if_flags & IFF_UP) == 0) { 352 crit_enter(); 353 if_up(ifp); 354 crit_exit(); 355 356 ifnet_serialize_all(ifp); 357 tapifflags(tp); 358 ifnet_deserialize_all(ifp); 359 360 tp->tap_flags |= TAP_CLOSEDOWN; 361 } 362 363 TAPDEBUG(ifp, "opened. minor = %#x, refcnt = %d, taplastunit = %d\n", 364 minor(tp->tap_dev), taprefcnt, taplastunit); 365 366 rel_mplock(); 367 return (0); 368 } 369 370 static int 371 tapclone(struct dev_clone_args *ap) 372 { 373 int unit; 374 375 unit = devfs_clone_bitmap_get(&DEVFS_CLONE_BITMAP(tap), 0); 376 ap->a_dev = make_only_dev(&tap_ops, unit, UID_ROOT, GID_WHEEL, 377 0600, "%s%d", TAP, unit); 378 tapcreate(unit, ap->a_dev); 379 return (0); 380 } 381 382 /* 383 * tapclose 384 * 385 * close the device - mark i/f down & delete routing info 386 */ 387 static int 388 tapclose(struct dev_close_args *ap) 389 { 390 cdev_t dev = ap->a_head.a_dev; 391 struct tap_softc *tp = dev->si_drv1; 392 struct ifnet *ifp = &tp->tap_if; 393 int clear_flags = 0; 394 395 get_mplock(); 396 397 /* Junk all pending output */ 398 ifq_purge(&ifp->if_snd); 399 400 /* 401 * Do not bring the interface down, and do not anything with 402 * interface, if we are in VMnet mode. just close the device. 403 * 404 * If the interface is not cloned, we always bring it down. 405 * 406 * If the interface is cloned, then we bring it down during 407 * closing only if it was brought up during opening. 408 */ 409 if ((tp->tap_flags & TAP_VMNET) == 0 && 410 ((tp->tap_flags & TAP_CLONE) == 0 || 411 (tp->tap_flags & TAP_CLOSEDOWN))) { 412 if (ifp->if_flags & IFF_UP) 413 if_down(ifp); 414 clear_flags = 1; 415 } 416 ifnet_serialize_all(ifp); 417 tapifstop(tp, clear_flags); 418 ifnet_deserialize_all(ifp); 419 420 if ((tp->tap_flags & TAP_CLONE) == 0) { 421 if_purgeaddrs_nolink(ifp); 422 423 EVENTHANDLER_INVOKE(ifnet_detach_event, ifp); 424 425 /* Announce the departure of the interface. */ 426 rt_ifannouncemsg(ifp, IFAN_DEPARTURE); 427 } 428 429 funsetown(&tp->tap_sigio); 430 tp->tap_sigio = NULL; 431 KNOTE(&tp->tap_rkq.ki_note, 0); 432 433 tp->tap_flags &= ~TAP_OPEN; 434 funsetown(&tp->tap_sigtd); 435 tp->tap_sigtd = NULL; 436 437 taprefcnt --; 438 if (taprefcnt < 0) { 439 taprefcnt = 0; 440 if_printf(ifp, "minor = %#x, refcnt = %d is out of sync. " 441 "set refcnt to 0\n", minor(tp->tap_dev), taprefcnt); 442 } 443 444 TAPDEBUG(ifp, "closed. minor = %#x, refcnt = %d, taplastunit = %d\n", 445 minor(tp->tap_dev), taprefcnt, taplastunit); 446 447 if (tp->tap_unit >= TAP_PREALLOCATED_UNITS) 448 tapdestroy(tp); 449 450 rel_mplock(); 451 return (0); 452 } 453 454 /* 455 * tapdestroy: 456 * 457 * Destroy a tap instance. 458 */ 459 static void 460 tapdestroy(struct tap_softc *tp) 461 { 462 struct ifnet *ifp = &tp->arpcom.ac_if; 463 cdev_t dev; 464 465 TAPDEBUG(ifp, "destroyed. minor = %#x, refcnt = %d, taplastunit = %d\n", 466 minor(tp->tap_dev), taprefcnt, taplastunit); 467 468 ifnet_serialize_all(ifp); 469 tapifstop(tp, 1); 470 ifnet_deserialize_all(ifp); 471 472 ether_ifdetach(ifp); 473 SLIST_REMOVE(&tap_listhead, tp, tap_softc, tap_link); 474 475 dev = tp->tap_dev; 476 tp->tap_dev = NULL; 477 dev->si_drv1 = NULL; 478 479 release_dev(dev); /* tp association */ 480 481 /* 482 * Also destroy the cloned device 483 */ 484 if (tp->tap_unit >= TAP_PREALLOCATED_UNITS) { 485 destroy_dev(dev); 486 devfs_clone_bitmap_put(&DEVFS_CLONE_BITMAP(tap), tp->tap_unit); 487 } 488 489 kfree(tp, M_TAP); 490 491 taplastunit--; 492 } 493 494 /* 495 * tap_clone_destroy: 496 * 497 * Destroy a tap instance. 498 */ 499 static int 500 tap_clone_destroy(struct ifnet *ifp) 501 { 502 struct tap_softc *tp = ifp->if_softc; 503 504 if ((tp->tap_flags & TAP_CLONE) == 0) 505 return ENXIO; 506 507 TAPDEBUG(&tp->tap_if, "clone destroyed. minor = %#x tap_flags = 0x%x\n", 508 minor(tp->tap_dev), tp->tap_flags); 509 tapdestroy(tp); 510 511 return 0; 512 } 513 514 /* 515 * tapifinit 516 * 517 * Network interface initialization function (called with if serializer held) 518 * 519 * MPSAFE 520 */ 521 static void 522 tapifinit(void *xtp) 523 { 524 struct tap_softc *tp = xtp; 525 struct ifnet *ifp = &tp->tap_if; 526 527 TAPDEBUG(ifp, "initializing, minor = %#x tap_flags = 0x%x\n", 528 minor(tp->tap_dev), tp->tap_flags); 529 530 ASSERT_IFNET_SERIALIZED_ALL(ifp); 531 532 tapifstop(tp, 1); 533 534 ifp->if_flags |= IFF_RUNNING; 535 ifp->if_flags &= ~IFF_OACTIVE; 536 537 /* attempt to start output */ 538 tapifstart(ifp); 539 } 540 541 542 /* 543 * tapifioctl 544 * 545 * Process an ioctl request on network interface (called with if serializer 546 * held). 547 * 548 * MPSAFE 549 */ 550 static int 551 tapifioctl(struct ifnet *ifp, u_long cmd, caddr_t data, struct ucred *cr) 552 { 553 struct tap_softc *tp = (struct tap_softc *)(ifp->if_softc); 554 struct ifstat *ifs = NULL; 555 struct ifmediareq *ifmr = NULL; 556 int error = 0; 557 int dummy; 558 559 switch (cmd) { 560 case SIOCSIFADDR: 561 case SIOCGIFADDR: 562 case SIOCSIFMTU: 563 error = ether_ioctl(ifp, cmd, data); 564 break; 565 566 case SIOCSIFFLAGS: 567 tapifflags(tp); 568 break; 569 570 case SIOCADDMULTI: /* XXX -- just like vmnet does */ 571 case SIOCDELMULTI: 572 break; 573 574 case SIOCGIFMEDIA: 575 /* 576 * The bridge code needs this when running the 577 * spanning tree protocol. 578 */ 579 ifmr = (struct ifmediareq *)data; 580 dummy = ifmr->ifm_count; 581 ifmr->ifm_count = 1; 582 ifmr->ifm_status = IFM_AVALID; 583 ifmr->ifm_active = IFM_ETHER; 584 if (tp->tap_flags & TAP_OPEN) 585 ifmr->ifm_status |= IFM_ACTIVE; 586 ifmr->ifm_current = ifmr->ifm_active; 587 if (dummy >= 1) { 588 int media = IFM_ETHER; 589 error = copyout(&media, 590 ifmr->ifm_ulist, 591 sizeof(int)); 592 } 593 break; 594 595 case SIOCGIFSTATUS: 596 ifs = (struct ifstat *)data; 597 dummy = strlen(ifs->ascii); 598 if ((tp->tap_flags & TAP_OPEN) && 599 dummy < sizeof(ifs->ascii)) { 600 if (tp->tap_sigtd && tp->tap_sigtd->sio_proc) { 601 ksnprintf(ifs->ascii + dummy, 602 sizeof(ifs->ascii) - dummy, 603 "\tOpened by pid %d\n", 604 (int)tp->tap_sigtd->sio_proc->p_pid); 605 } else { 606 ksnprintf(ifs->ascii + dummy, 607 sizeof(ifs->ascii) - dummy, 608 "\tOpened by <unknown>\n"); 609 } 610 } 611 break; 612 613 default: 614 error = EINVAL; 615 break; 616 } 617 618 return (error); 619 } 620 621 622 /* 623 * tapifstart 624 * 625 * Queue packets from higher level ready to put out (called with if serializer 626 * held) 627 * 628 * MPSAFE 629 */ 630 static void 631 tapifstart(struct ifnet *ifp) 632 { 633 struct tap_softc *tp = ifp->if_softc; 634 struct ifqueue *ifq; 635 struct mbuf *m; 636 int has_data = 0; 637 638 TAPDEBUG(ifp, "starting, minor = %#x\n", minor(tp->tap_dev)); 639 640 /* 641 * do not junk pending output if we are in VMnet mode. 642 * XXX: can this do any harm because of queue overflow? 643 */ 644 645 if (((tp->tap_flags & TAP_VMNET) == 0) && 646 ((tp->tap_flags & TAP_READY) != TAP_READY)) { 647 TAPDEBUG(ifp, "not ready. minor = %#x, tap_flags = 0x%x\n", 648 minor(tp->tap_dev), tp->tap_flags); 649 ifq_purge(&ifp->if_snd); 650 return; 651 } 652 653 ifp->if_flags |= IFF_OACTIVE; 654 655 ifq = &tp->tap_devq; 656 while ((m = ifq_dequeue(&ifp->if_snd, NULL)) != NULL) { 657 if (IF_QFULL(ifq)) { 658 IF_DROP(ifq); 659 ifp->if_oerrors++; 660 m_freem(m); 661 } else { 662 IF_ENQUEUE(ifq, m); 663 ifp->if_opackets++; 664 has_data = 1; 665 } 666 } 667 668 if (has_data) { 669 if (tp->tap_flags & TAP_RWAIT) { 670 tp->tap_flags &= ~TAP_RWAIT; 671 wakeup((caddr_t)tp); 672 } 673 674 KNOTE(&tp->tap_rkq.ki_note, 0); 675 676 if ((tp->tap_flags & TAP_ASYNC) && (tp->tap_sigio != NULL)) { 677 get_mplock(); 678 pgsigio(tp->tap_sigio, SIGIO, 0); 679 rel_mplock(); 680 } 681 } 682 683 ifp->if_flags &= ~IFF_OACTIVE; 684 } 685 686 687 /* 688 * tapioctl 689 * 690 * The ops interface is now pretty minimal. Called via fileops with nothing 691 * held. 692 * 693 * MPSAFE 694 */ 695 static int 696 tapioctl(struct dev_ioctl_args *ap) 697 { 698 cdev_t dev = ap->a_head.a_dev; 699 caddr_t data = ap->a_data; 700 struct tap_softc *tp = dev->si_drv1; 701 struct ifnet *ifp = &tp->tap_if; 702 struct tapinfo *tapp = NULL; 703 struct mbuf *mb; 704 short f; 705 int error; 706 707 ifnet_serialize_all(ifp); 708 error = 0; 709 710 switch (ap->a_cmd) { 711 case TAPSIFINFO: 712 tapp = (struct tapinfo *)data; 713 ifp->if_mtu = tapp->mtu; 714 ifp->if_type = tapp->type; 715 ifp->if_baudrate = tapp->baudrate; 716 break; 717 718 case TAPGIFINFO: 719 tapp = (struct tapinfo *)data; 720 tapp->mtu = ifp->if_mtu; 721 tapp->type = ifp->if_type; 722 tapp->baudrate = ifp->if_baudrate; 723 break; 724 725 case TAPSDEBUG: 726 tapdebug = *(int *)data; 727 break; 728 729 case TAPGDEBUG: 730 *(int *)data = tapdebug; 731 break; 732 733 case FIOASYNC: 734 if (*(int *)data) 735 tp->tap_flags |= TAP_ASYNC; 736 else 737 tp->tap_flags &= ~TAP_ASYNC; 738 break; 739 740 case FIONREAD: 741 *(int *)data = 0; 742 743 /* Take a look at devq first */ 744 IF_POLL(&tp->tap_devq, mb); 745 if (mb == NULL) 746 mb = ifq_poll(&ifp->if_snd); 747 748 if (mb != NULL) { 749 for(; mb != NULL; mb = mb->m_next) 750 *(int *)data += mb->m_len; 751 } 752 break; 753 754 case FIOSETOWN: 755 error = fsetown(*(int *)data, &tp->tap_sigio); 756 break; 757 758 case FIOGETOWN: 759 *(int *)data = fgetown(&tp->tap_sigio); 760 break; 761 762 /* this is deprecated, FIOSETOWN should be used instead */ 763 case TIOCSPGRP: 764 error = fsetown(-(*(int *)data), &tp->tap_sigio); 765 break; 766 767 /* this is deprecated, FIOGETOWN should be used instead */ 768 case TIOCGPGRP: 769 *(int *)data = -fgetown(&tp->tap_sigio); 770 break; 771 772 /* VMware/VMnet port ioctl's */ 773 774 case SIOCGIFFLAGS: /* get ifnet flags */ 775 bcopy(&ifp->if_flags, data, sizeof(ifp->if_flags)); 776 break; 777 778 case VMIO_SIOCSIFFLAGS: /* VMware/VMnet SIOCSIFFLAGS */ 779 f = *(short *)data; 780 f &= 0x0fff; 781 f &= ~IFF_CANTCHANGE; 782 f |= IFF_UP; 783 ifp->if_flags = f | (ifp->if_flags & IFF_CANTCHANGE); 784 break; 785 786 case OSIOCGIFADDR: /* get MAC address of the remote side */ 787 case SIOCGIFADDR: 788 bcopy(tp->ether_addr, data, sizeof(tp->ether_addr)); 789 break; 790 791 case SIOCSIFADDR: /* set MAC address of the remote side */ 792 bcopy(data, tp->ether_addr, sizeof(tp->ether_addr)); 793 break; 794 795 default: 796 error = ENOTTY; 797 break; 798 } 799 ifnet_deserialize_all(ifp); 800 return (error); 801 } 802 803 804 /* 805 * tapread 806 * 807 * The ops read interface - reads a packet at a time, or at 808 * least as much of a packet as can be read. 809 * 810 * Called from the fileops interface with nothing held. 811 * 812 * MPSAFE 813 */ 814 static int 815 tapread(struct dev_read_args *ap) 816 { 817 cdev_t dev = ap->a_head.a_dev; 818 struct uio *uio = ap->a_uio; 819 struct tap_softc *tp = dev->si_drv1; 820 struct ifnet *ifp = &tp->tap_if; 821 struct mbuf *m0 = NULL; 822 int error = 0, len; 823 824 TAPDEBUG(ifp, "reading, minor = %#x\n", minor(tp->tap_dev)); 825 826 if ((tp->tap_flags & TAP_READY) != TAP_READY) { 827 TAPDEBUG(ifp, "not ready. minor = %#x, tap_flags = 0x%x\n", 828 minor(tp->tap_dev), tp->tap_flags); 829 830 return (EHOSTDOWN); 831 } 832 833 tp->tap_flags &= ~TAP_RWAIT; 834 835 /* sleep until we get a packet */ 836 do { 837 ifnet_serialize_all(ifp); 838 IF_DEQUEUE(&tp->tap_devq, m0); 839 if (m0 == NULL) { 840 if (ap->a_ioflag & IO_NDELAY) { 841 ifnet_deserialize_all(ifp); 842 return (EWOULDBLOCK); 843 } 844 tp->tap_flags |= TAP_RWAIT; 845 tsleep_interlock(tp, PCATCH); 846 ifnet_deserialize_all(ifp); 847 error = tsleep(tp, PCATCH | PINTERLOCKED, "taprd", 0); 848 if (error) 849 return (error); 850 } else { 851 ifnet_deserialize_all(ifp); 852 } 853 } while (m0 == NULL); 854 855 BPF_MTAP(ifp, m0); 856 857 /* xfer packet to user space */ 858 while ((m0 != NULL) && (uio->uio_resid > 0) && (error == 0)) { 859 len = (int)szmin(uio->uio_resid, m0->m_len); 860 if (len == 0) 861 break; 862 863 error = uiomove(mtod(m0, caddr_t), (size_t)len, uio); 864 m0 = m_free(m0); 865 } 866 867 if (m0 != NULL) { 868 TAPDEBUG(ifp, "dropping mbuf, minor = %#x\n", 869 minor(tp->tap_dev)); 870 m_freem(m0); 871 } 872 873 return (error); 874 } 875 876 /* 877 * tapwrite 878 * 879 * The ops write interface - an atomic write is a packet - or else! 880 * 881 * Called from the fileops interface with nothing held. 882 * 883 * MPSAFE 884 */ 885 static int 886 tapwrite(struct dev_write_args *ap) 887 { 888 cdev_t dev = ap->a_head.a_dev; 889 struct uio *uio = ap->a_uio; 890 struct tap_softc *tp = dev->si_drv1; 891 struct ifnet *ifp = &tp->tap_if; 892 struct mbuf *top = NULL, **mp = NULL, *m = NULL; 893 int error; 894 size_t tlen, mlen; 895 896 TAPDEBUG(ifp, "writing, minor = %#x\n", minor(tp->tap_dev)); 897 898 if ((tp->tap_flags & TAP_READY) != TAP_READY) { 899 TAPDEBUG(ifp, "not ready. minor = %#x, tap_flags = 0x%x\n", 900 minor(tp->tap_dev), tp->tap_flags); 901 return (EHOSTDOWN); 902 } 903 904 if (uio->uio_resid == 0) 905 return (0); 906 907 if (uio->uio_resid > TAPMRU) { 908 TAPDEBUG(ifp, "invalid packet len = %zu, minor = %#x\n", 909 uio->uio_resid, minor(tp->tap_dev)); 910 911 return (EIO); 912 } 913 tlen = uio->uio_resid; 914 915 /* get a header mbuf */ 916 MGETHDR(m, MB_WAIT, MT_DATA); 917 if (m == NULL) 918 return (ENOBUFS); 919 mlen = MHLEN; 920 921 top = NULL; 922 mp = ⊤ 923 error = 0; 924 925 while (error == 0 && uio->uio_resid > 0) { 926 m->m_len = (int)szmin(mlen, uio->uio_resid); 927 error = uiomove(mtod(m, caddr_t), (size_t)m->m_len, uio); 928 *mp = m; 929 mp = &m->m_next; 930 if (uio->uio_resid > 0) { 931 MGET(m, MB_WAIT, MT_DATA); 932 if (m == NULL) { 933 error = ENOBUFS; 934 break; 935 } 936 mlen = MLEN; 937 } 938 } 939 if (error) { 940 ifp->if_ierrors ++; 941 if (top) 942 m_freem(top); 943 return (error); 944 } 945 946 top->m_pkthdr.len = (int)tlen; 947 top->m_pkthdr.rcvif = ifp; 948 949 /* 950 * Ethernet bridge and bpf are handled in ether_input 951 * 952 * adjust mbuf and give packet to the ether_input 953 */ 954 ifnet_serialize_all(ifp); 955 ifp->if_input(ifp, top); 956 ifp->if_ipackets ++; /* ibytes are counted in ether_input */ 957 ifnet_deserialize_all(ifp); 958 959 return (0); 960 } 961 962 /* 963 * tapkqfilter - called from the fileops interface with nothing held 964 * 965 * MPSAFE 966 */ 967 static int filt_tapread(struct knote *kn, long hint); 968 static int filt_tapwrite(struct knote *kn, long hint); 969 static void filt_tapdetach(struct knote *kn); 970 static struct filterops tapread_filtops = 971 { FILTEROP_ISFD, NULL, filt_tapdetach, filt_tapread }; 972 static struct filterops tapwrite_filtops = 973 { FILTEROP_ISFD, NULL, filt_tapdetach, filt_tapwrite }; 974 975 static int 976 tapkqfilter(struct dev_kqfilter_args *ap) 977 { 978 cdev_t dev = ap->a_head.a_dev; 979 struct knote *kn = ap->a_kn; 980 struct tap_softc *tp; 981 struct klist *list; 982 struct ifnet *ifp; 983 984 tp = dev->si_drv1; 985 list = &tp->tap_rkq.ki_note; 986 ifp = &tp->tap_if; 987 ap->a_result =0; 988 989 switch(kn->kn_filter) { 990 case EVFILT_READ: 991 kn->kn_fop = &tapread_filtops; 992 kn->kn_hook = (void *)tp; 993 break; 994 case EVFILT_WRITE: 995 kn->kn_fop = &tapwrite_filtops; 996 kn->kn_hook = (void *)tp; 997 break; 998 default: 999 ap->a_result = EOPNOTSUPP; 1000 return(0); 1001 } 1002 1003 knote_insert(list, kn); 1004 return(0); 1005 } 1006 1007 static int 1008 filt_tapread(struct knote *kn, long hint) 1009 { 1010 struct tap_softc *tp = (void *)kn->kn_hook; 1011 1012 if (IF_QEMPTY(&tp->tap_devq) == 0) /* XXX serializer */ 1013 return(1); 1014 else 1015 return(0); 1016 } 1017 1018 static int 1019 filt_tapwrite(struct knote *kn, long hint) 1020 { 1021 /* Always ready for a write */ 1022 return (1); 1023 } 1024 1025 static void 1026 filt_tapdetach(struct knote *kn) 1027 { 1028 struct tap_softc *tp = (void *)kn->kn_hook; 1029 1030 knote_remove(&tp->tap_rkq.ki_note, kn); 1031 } 1032 1033 static void 1034 tapifstop(struct tap_softc *tp, int clear_flags) 1035 { 1036 struct ifnet *ifp = &tp->tap_if; 1037 1038 ASSERT_IFNET_SERIALIZED_ALL(ifp); 1039 IF_DRAIN(&tp->tap_devq); 1040 tp->tap_flags &= ~TAP_CLOSEDOWN; 1041 if (clear_flags) 1042 ifp->if_flags &= ~(IFF_RUNNING | IFF_OACTIVE); 1043 } 1044 1045 static void 1046 tapifflags(struct tap_softc *tp) 1047 { 1048 struct ifnet *ifp = &tp->arpcom.ac_if; 1049 1050 ASSERT_IFNET_SERIALIZED_ALL(ifp); 1051 if ((tp->tap_flags & TAP_VMNET) == 0) { 1052 /* 1053 * Only for non-vmnet tap(4) 1054 */ 1055 if (ifp->if_flags & IFF_UP) { 1056 if ((ifp->if_flags & IFF_RUNNING) == 0) 1057 tapifinit(tp); 1058 } else { 1059 tapifstop(tp, 1); 1060 } 1061 } else { 1062 /* XXX */ 1063 } 1064 } 1065