]> git.proxmox.com Git - qemu.git/blame - net/tap-win32.c
net: move dump backend code from net.c to net/dump.c
[qemu.git] / net / tap-win32.c
CommitLineData
7fb843f8
FB
1/*
2 * TAP-Win32 -- A kernel driver to provide virtual tap device functionality
3 * on Windows. Originally derived from the CIPE-Win32
4 * project by Damion K. Wilson, with extensive modifications by
5 * James Yonan.
6 *
7 * All source code which derives from the CIPE-Win32 project is
8 * Copyright (C) Damion K. Wilson, 2003, and is released under the
9 * GPL version 2 (see below).
10 *
11 * All other source code is Copyright (C) James Yonan, 2003-2004,
12 * and is released under the GPL version 2 (see below).
13 *
14 * This program is free software; you can redistribute it and/or modify
15 * it under the terms of the GNU General Public License as published by
16 * the Free Software Foundation; either version 2 of the License, or
17 * (at your option) any later version.
18 *
19 * This program is distributed in the hope that it will be useful,
20 * but WITHOUT ANY WARRANTY; without even the implied warranty of
21 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
22 * GNU General Public License for more details.
23 *
24 * You should have received a copy of the GNU General Public License
25 * along with this program (see the file COPYING included with this
8167ee88 26 * distribution); if not, see <http://www.gnu.org/licenses/>.
7fb843f8 27 */
a8ed73f7
MM
28
29#include "net/tap.h"
30
87ecb68b
PB
31#include "qemu-common.h"
32#include "net.h"
33#include "sysemu.h"
7fb843f8
FB
34#include <stdio.h>
35#include <windows.h>
f8bfb1dc 36#include <winioctl.h>
7fb843f8
FB
37
38//=============
39// TAP IOCTLs
40//=============
41
42#define TAP_CONTROL_CODE(request,method) \
43 CTL_CODE (FILE_DEVICE_UNKNOWN, request, method, FILE_ANY_ACCESS)
44
45#define TAP_IOCTL_GET_MAC TAP_CONTROL_CODE (1, METHOD_BUFFERED)
46#define TAP_IOCTL_GET_VERSION TAP_CONTROL_CODE (2, METHOD_BUFFERED)
47#define TAP_IOCTL_GET_MTU TAP_CONTROL_CODE (3, METHOD_BUFFERED)
48#define TAP_IOCTL_GET_INFO TAP_CONTROL_CODE (4, METHOD_BUFFERED)
49#define TAP_IOCTL_CONFIG_POINT_TO_POINT TAP_CONTROL_CODE (5, METHOD_BUFFERED)
50#define TAP_IOCTL_SET_MEDIA_STATUS TAP_CONTROL_CODE (6, METHOD_BUFFERED)
51#define TAP_IOCTL_CONFIG_DHCP_MASQ TAP_CONTROL_CODE (7, METHOD_BUFFERED)
52#define TAP_IOCTL_GET_LOG_LINE TAP_CONTROL_CODE (8, METHOD_BUFFERED)
53#define TAP_IOCTL_CONFIG_DHCP_SET_OPT TAP_CONTROL_CODE (9, METHOD_BUFFERED)
54
55//=================
56// Registry keys
57//=================
58
59#define ADAPTER_KEY "SYSTEM\\CurrentControlSet\\Control\\Class\\{4D36E972-E325-11CE-BFC1-08002BE10318}"
60
61#define NETWORK_CONNECTIONS_KEY "SYSTEM\\CurrentControlSet\\Control\\Network\\{4D36E972-E325-11CE-BFC1-08002BE10318}"
62
63//======================
64// Filesystem prefixes
65//======================
66
67#define USERMODEDEVICEDIR "\\\\.\\Global\\"
68#define TAPSUFFIX ".tap"
69
70
71//======================
72// Compile time configuration
73//======================
74
978d5d73 75//#define DEBUG_TAP_WIN32
7fb843f8
FB
76
77#define TUN_ASYNCHRONOUS_WRITES 1
78
79#define TUN_BUFFER_SIZE 1560
80#define TUN_MAX_BUFFER_COUNT 32
81
82/*
83 * The data member "buffer" must be the first element in the tun_buffer
84 * structure. See the function, tap_win32_free_buffer.
85 */
86typedef struct tun_buffer_s {
87 unsigned char buffer [TUN_BUFFER_SIZE];
88 unsigned long read_size;
89 struct tun_buffer_s* next;
c227f099 90} tun_buffer_t;
7fb843f8
FB
91
92typedef struct tap_win32_overlapped {
93 HANDLE handle;
94 HANDLE read_event;
95 HANDLE write_event;
96 HANDLE output_queue_semaphore;
97 HANDLE free_list_semaphore;
e6cda8e2 98 HANDLE tap_semaphore;
7fb843f8
FB
99 CRITICAL_SECTION output_queue_cs;
100 CRITICAL_SECTION free_list_cs;
101 OVERLAPPED read_overlapped;
102 OVERLAPPED write_overlapped;
c227f099
AL
103 tun_buffer_t buffers[TUN_MAX_BUFFER_COUNT];
104 tun_buffer_t* free_list;
105 tun_buffer_t* output_queue_front;
106 tun_buffer_t* output_queue_back;
107} tap_win32_overlapped_t;
7fb843f8 108
c227f099 109static tap_win32_overlapped_t tap_overlapped;
7fb843f8 110
c227f099 111static tun_buffer_t* get_buffer_from_free_list(tap_win32_overlapped_t* const overlapped)
7fb843f8 112{
c227f099 113 tun_buffer_t* buffer = NULL;
7fb843f8
FB
114 WaitForSingleObject(overlapped->free_list_semaphore, INFINITE);
115 EnterCriticalSection(&overlapped->free_list_cs);
116 buffer = overlapped->free_list;
117// assert(buffer != NULL);
118 overlapped->free_list = buffer->next;
119 LeaveCriticalSection(&overlapped->free_list_cs);
120 buffer->next = NULL;
121 return buffer;
122}
123
c227f099 124static void put_buffer_on_free_list(tap_win32_overlapped_t* const overlapped, tun_buffer_t* const buffer)
7fb843f8
FB
125{
126 EnterCriticalSection(&overlapped->free_list_cs);
127 buffer->next = overlapped->free_list;
128 overlapped->free_list = buffer;
129 LeaveCriticalSection(&overlapped->free_list_cs);
130 ReleaseSemaphore(overlapped->free_list_semaphore, 1, NULL);
131}
132
c227f099 133static tun_buffer_t* get_buffer_from_output_queue(tap_win32_overlapped_t* const overlapped, const int block)
7fb843f8 134{
c227f099 135 tun_buffer_t* buffer = NULL;
7fb843f8
FB
136 DWORD result, timeout = block ? INFINITE : 0L;
137
138 // Non-blocking call
5fafdf24 139 result = WaitForSingleObject(overlapped->output_queue_semaphore, timeout);
7fb843f8 140
5fafdf24
TS
141 switch (result)
142 {
7fb843f8 143 // The semaphore object was signaled.
5fafdf24 144 case WAIT_OBJECT_0:
7fb843f8
FB
145 EnterCriticalSection(&overlapped->output_queue_cs);
146
147 buffer = overlapped->output_queue_front;
148 overlapped->output_queue_front = buffer->next;
149
150 if(overlapped->output_queue_front == NULL) {
151 overlapped->output_queue_back = NULL;
152 }
153
154 LeaveCriticalSection(&overlapped->output_queue_cs);
5fafdf24 155 break;
7fb843f8
FB
156
157 // Semaphore was nonsignaled, so a time-out occurred.
5fafdf24 158 case WAIT_TIMEOUT:
7fb843f8 159 // Cannot open another window.
5fafdf24 160 break;
7fb843f8
FB
161 }
162
163 return buffer;
164}
165
c227f099 166static tun_buffer_t* get_buffer_from_output_queue_immediate (tap_win32_overlapped_t* const overlapped)
7fb843f8
FB
167{
168 return get_buffer_from_output_queue(overlapped, 0);
169}
170
c227f099 171static void put_buffer_on_output_queue(tap_win32_overlapped_t* const overlapped, tun_buffer_t* const buffer)
7fb843f8
FB
172{
173 EnterCriticalSection(&overlapped->output_queue_cs);
174
175 if(overlapped->output_queue_front == NULL && overlapped->output_queue_back == NULL) {
176 overlapped->output_queue_front = overlapped->output_queue_back = buffer;
177 } else {
178 buffer->next = NULL;
179 overlapped->output_queue_back->next = buffer;
180 overlapped->output_queue_back = buffer;
181 }
182
183 LeaveCriticalSection(&overlapped->output_queue_cs);
184
185 ReleaseSemaphore(overlapped->output_queue_semaphore, 1, NULL);
186}
187
188
189static int is_tap_win32_dev(const char *guid)
190{
191 HKEY netcard_key;
192 LONG status;
193 DWORD len;
194 int i = 0;
195
196 status = RegOpenKeyEx(
197 HKEY_LOCAL_MACHINE,
198 ADAPTER_KEY,
199 0,
200 KEY_READ,
201 &netcard_key);
202
203 if (status != ERROR_SUCCESS) {
204 return FALSE;
205 }
206
207 for (;;) {
208 char enum_name[256];
209 char unit_string[256];
210 HKEY unit_key;
211 char component_id_string[] = "ComponentId";
212 char component_id[256];
213 char net_cfg_instance_id_string[] = "NetCfgInstanceId";
214 char net_cfg_instance_id[256];
215 DWORD data_type;
216
217 len = sizeof (enum_name);
218 status = RegEnumKeyEx(
219 netcard_key,
220 i,
221 enum_name,
222 &len,
223 NULL,
224 NULL,
225 NULL,
226 NULL);
227
228 if (status == ERROR_NO_MORE_ITEMS)
229 break;
230 else if (status != ERROR_SUCCESS) {
231 return FALSE;
232 }
233
234 snprintf (unit_string, sizeof(unit_string), "%s\\%s",
235 ADAPTER_KEY, enum_name);
236
237 status = RegOpenKeyEx(
238 HKEY_LOCAL_MACHINE,
239 unit_string,
240 0,
241 KEY_READ,
242 &unit_key);
243
244 if (status != ERROR_SUCCESS) {
245 return FALSE;
246 } else {
247 len = sizeof (component_id);
248 status = RegQueryValueEx(
249 unit_key,
250 component_id_string,
251 NULL,
252 &data_type,
b9e82a59 253 (LPBYTE)component_id,
7fb843f8
FB
254 &len);
255
256 if (!(status != ERROR_SUCCESS || data_type != REG_SZ)) {
257 len = sizeof (net_cfg_instance_id);
258 status = RegQueryValueEx(
259 unit_key,
260 net_cfg_instance_id_string,
261 NULL,
262 &data_type,
b9e82a59 263 (LPBYTE)net_cfg_instance_id,
7fb843f8
FB
264 &len);
265
266 if (status == ERROR_SUCCESS && data_type == REG_SZ) {
267 if (/* !strcmp (component_id, TAP_COMPONENT_ID) &&*/
268 !strcmp (net_cfg_instance_id, guid)) {
269 RegCloseKey (unit_key);
270 RegCloseKey (netcard_key);
271 return TRUE;
272 }
273 }
274 }
275 RegCloseKey (unit_key);
276 }
277 ++i;
278 }
279
280 RegCloseKey (netcard_key);
281 return FALSE;
282}
283
284static int get_device_guid(
285 char *name,
286 int name_size,
287 char *actual_name,
288 int actual_name_size)
289{
290 LONG status;
291 HKEY control_net_key;
292 DWORD len;
293 int i = 0;
294 int stop = 0;
295
296 status = RegOpenKeyEx(
297 HKEY_LOCAL_MACHINE,
298 NETWORK_CONNECTIONS_KEY,
299 0,
300 KEY_READ,
301 &control_net_key);
302
303 if (status != ERROR_SUCCESS) {
304 return -1;
305 }
306
307 while (!stop)
308 {
309 char enum_name[256];
310 char connection_string[256];
311 HKEY connection_key;
312 char name_data[256];
313 DWORD name_type;
314 const char name_string[] = "Name";
315
316 len = sizeof (enum_name);
317 status = RegEnumKeyEx(
318 control_net_key,
319 i,
320 enum_name,
321 &len,
322 NULL,
323 NULL,
324 NULL,
325 NULL);
326
327 if (status == ERROR_NO_MORE_ITEMS)
328 break;
329 else if (status != ERROR_SUCCESS) {
330 return -1;
331 }
332
5fafdf24 333 snprintf(connection_string,
7fb843f8
FB
334 sizeof(connection_string),
335 "%s\\%s\\Connection",
336 NETWORK_CONNECTIONS_KEY, enum_name);
337
338 status = RegOpenKeyEx(
339 HKEY_LOCAL_MACHINE,
340 connection_string,
341 0,
342 KEY_READ,
343 &connection_key);
3b46e624 344
7fb843f8
FB
345 if (status == ERROR_SUCCESS) {
346 len = sizeof (name_data);
347 status = RegQueryValueEx(
348 connection_key,
349 name_string,
350 NULL,
351 &name_type,
b9e82a59 352 (LPBYTE)name_data,
7fb843f8
FB
353 &len);
354
355 if (status != ERROR_SUCCESS || name_type != REG_SZ) {
356 return -1;
357 }
358 else {
359 if (is_tap_win32_dev(enum_name)) {
360 snprintf(name, name_size, "%s", enum_name);
361 if (actual_name) {
362 if (strcmp(actual_name, "") != 0) {
363 if (strcmp(name_data, actual_name) != 0) {
364 RegCloseKey (connection_key);
365 ++i;
366 continue;
367 }
368 }
369 else {
370 snprintf(actual_name, actual_name_size, "%s", name_data);
371 }
372 }
373 stop = 1;
374 }
375 }
376
377 RegCloseKey (connection_key);
378 }
379 ++i;
380 }
381
382 RegCloseKey (control_net_key);
383
384 if (stop == 0)
385 return -1;
386
387 return 0;
388}
389
390static int tap_win32_set_status(HANDLE handle, int status)
391{
392 unsigned long len = 0;
393
394 return DeviceIoControl(handle, TAP_IOCTL_SET_MEDIA_STATUS,
395 &status, sizeof (status),
396 &status, sizeof (status), &len, NULL);
397}
398
c227f099 399static void tap_win32_overlapped_init(tap_win32_overlapped_t* const overlapped, const HANDLE handle)
7fb843f8
FB
400{
401 overlapped->handle = handle;
402
403 overlapped->read_event = CreateEvent(NULL, FALSE, FALSE, NULL);
404 overlapped->write_event = CreateEvent(NULL, FALSE, FALSE, NULL);
405
406 overlapped->read_overlapped.Offset = 0;
407 overlapped->read_overlapped.OffsetHigh = 0;
408 overlapped->read_overlapped.hEvent = overlapped->read_event;
409
410 overlapped->write_overlapped.Offset = 0;
411 overlapped->write_overlapped.OffsetHigh = 0;
412 overlapped->write_overlapped.hEvent = overlapped->write_event;
413
414 InitializeCriticalSection(&overlapped->output_queue_cs);
415 InitializeCriticalSection(&overlapped->free_list_cs);
416
5fafdf24 417 overlapped->output_queue_semaphore = CreateSemaphore(
7fb843f8
FB
418 NULL, // default security attributes
419 0, // initial count
420 TUN_MAX_BUFFER_COUNT, // maximum count
421 NULL); // unnamed semaphore
422
423 if(!overlapped->output_queue_semaphore) {
424 fprintf(stderr, "error creating output queue semaphore!\n");
425 }
426
5fafdf24 427 overlapped->free_list_semaphore = CreateSemaphore(
7fb843f8
FB
428 NULL, // default security attributes
429 TUN_MAX_BUFFER_COUNT, // initial count
430 TUN_MAX_BUFFER_COUNT, // maximum count
431 NULL); // unnamed semaphore
432
433 if(!overlapped->free_list_semaphore) {
434 fprintf(stderr, "error creating free list semaphore!\n");
435 }
436
437 overlapped->free_list = overlapped->output_queue_front = overlapped->output_queue_back = NULL;
438
439 {
440 unsigned index;
441 for(index = 0; index < TUN_MAX_BUFFER_COUNT; index++) {
c227f099 442 tun_buffer_t* element = &overlapped->buffers[index];
7fb843f8
FB
443 element->next = overlapped->free_list;
444 overlapped->free_list = element;
445 }
446 }
e6cda8e2
FB
447 /* To count buffers, initially no-signal. */
448 overlapped->tap_semaphore = CreateSemaphore(NULL, 0, TUN_MAX_BUFFER_COUNT, NULL);
449 if(!overlapped->tap_semaphore)
450 fprintf(stderr, "error creating tap_semaphore.\n");
7fb843f8
FB
451}
452
c227f099 453static int tap_win32_write(tap_win32_overlapped_t *overlapped,
7fb843f8
FB
454 const void *buffer, unsigned long size)
455{
456 unsigned long write_size;
457 BOOL result;
458 DWORD error;
459
460 result = GetOverlappedResult( overlapped->handle, &overlapped->write_overlapped,
461 &write_size, FALSE);
462
463 if (!result && GetLastError() == ERROR_IO_INCOMPLETE)
464 WaitForSingleObject(overlapped->write_event, INFINITE);
465
466 result = WriteFile(overlapped->handle, buffer, size,
467 &write_size, &overlapped->write_overlapped);
3b46e624 468
5fafdf24 469 if (!result) {
7fb843f8 470 switch (error = GetLastError())
5fafdf24
TS
471 {
472 case ERROR_IO_PENDING:
7fb843f8
FB
473#ifndef TUN_ASYNCHRONOUS_WRITES
474 WaitForSingleObject(overlapped->write_event, INFINITE);
475#endif
476 break;
477 default:
478 return -1;
5fafdf24 479 }
7fb843f8
FB
480 }
481
482 return 0;
483}
484
485static DWORD WINAPI tap_win32_thread_entry(LPVOID param)
486{
c227f099 487 tap_win32_overlapped_t *overlapped = (tap_win32_overlapped_t*)param;
7fb843f8
FB
488 unsigned long read_size;
489 BOOL result;
490 DWORD dwError;
c227f099 491 tun_buffer_t* buffer = get_buffer_from_free_list(overlapped);
7fb843f8
FB
492
493
494 for (;;) {
495 result = ReadFile(overlapped->handle,
496 buffer->buffer,
497 sizeof(buffer->buffer),
498 &read_size,
499 &overlapped->read_overlapped);
500 if (!result) {
501 dwError = GetLastError();
502 if (dwError == ERROR_IO_PENDING) {
503 WaitForSingleObject(overlapped->read_event, INFINITE);
504 result = GetOverlappedResult( overlapped->handle, &overlapped->read_overlapped,
505 &read_size, FALSE);
506 if (!result) {
978d5d73 507#ifdef DEBUG_TAP_WIN32
7fb843f8
FB
508 LPVOID lpBuffer;
509 dwError = GetLastError();
510 FormatMessage( FORMAT_MESSAGE_ALLOCATE_BUFFER | FORMAT_MESSAGE_FROM_SYSTEM,
511 NULL, dwError, MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT),
512 (LPTSTR) & lpBuffer, 0, NULL );
513 fprintf(stderr, "Tap-Win32: Error GetOverlappedResult %d - %s\n", dwError, lpBuffer);
514 LocalFree( lpBuffer );
515#endif
516 }
517 } else {
978d5d73 518#ifdef DEBUG_TAP_WIN32
7fb843f8
FB
519 LPVOID lpBuffer;
520 FormatMessage( FORMAT_MESSAGE_ALLOCATE_BUFFER | FORMAT_MESSAGE_FROM_SYSTEM,
521 NULL, dwError, MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT),
522 (LPTSTR) & lpBuffer, 0, NULL );
523 fprintf(stderr, "Tap-Win32: Error ReadFile %d - %s\n", dwError, lpBuffer);
524 LocalFree( lpBuffer );
525#endif
526 }
527 }
528
529 if(read_size > 0) {
530 buffer->read_size = read_size;
531 put_buffer_on_output_queue(overlapped, buffer);
e6cda8e2 532 ReleaseSemaphore(overlapped->tap_semaphore, 1, NULL);
7fb843f8
FB
533 buffer = get_buffer_from_free_list(overlapped);
534 }
535 }
536
537 return 0;
538}
539
c227f099 540static int tap_win32_read(tap_win32_overlapped_t *overlapped,
7fb843f8
FB
541 uint8_t **pbuf, int max_size)
542{
543 int size = 0;
544
c227f099 545 tun_buffer_t* buffer = get_buffer_from_output_queue_immediate(overlapped);
7fb843f8
FB
546
547 if(buffer != NULL) {
548 *pbuf = buffer->buffer;
549 size = (int)buffer->read_size;
550 if(size > max_size) {
551 size = max_size;
552 }
553 }
554
555 return size;
556}
557
c227f099 558static void tap_win32_free_buffer(tap_win32_overlapped_t *overlapped,
b9e82a59 559 uint8_t *pbuf)
7fb843f8 560{
c227f099 561 tun_buffer_t* buffer = (tun_buffer_t*)pbuf;
7fb843f8
FB
562 put_buffer_on_free_list(overlapped, buffer);
563}
564
c227f099 565static int tap_win32_open(tap_win32_overlapped_t **phandle,
7fb843f8
FB
566 const char *prefered_name)
567{
568 char device_path[256];
569 char device_guid[0x100];
570 int rc;
571 HANDLE handle;
572 BOOL bret;
573 char name_buffer[0x100] = {0, };
574 struct {
575 unsigned long major;
576 unsigned long minor;
577 unsigned long debug;
578 } version;
b9e82a59 579 DWORD version_len;
7fb843f8
FB
580 DWORD idThread;
581 HANDLE hThread;
582
583 if (prefered_name != NULL)
584 snprintf(name_buffer, sizeof(name_buffer), "%s", prefered_name);
585
586 rc = get_device_guid(device_guid, sizeof(device_guid), name_buffer, sizeof(name_buffer));
587 if (rc)
588 return -1;
589
590 snprintf (device_path, sizeof(device_path), "%s%s%s",
591 USERMODEDEVICEDIR,
592 device_guid,
593 TAPSUFFIX);
594
595 handle = CreateFile (
596 device_path,
597 GENERIC_READ | GENERIC_WRITE,
598 0,
599 0,
600 OPEN_EXISTING,
601 FILE_ATTRIBUTE_SYSTEM | FILE_FLAG_OVERLAPPED,
602 0 );
603
604 if (handle == INVALID_HANDLE_VALUE) {
605 return -1;
606 }
607
608 bret = DeviceIoControl(handle, TAP_IOCTL_GET_VERSION,
609 &version, sizeof (version),
610 &version, sizeof (version), &version_len, NULL);
611
612 if (bret == FALSE) {
613 CloseHandle(handle);
614 return -1;
615 }
616
617 if (!tap_win32_set_status(handle, TRUE)) {
618 return -1;
619 }
620
621 tap_win32_overlapped_init(&tap_overlapped, handle);
622
623 *phandle = &tap_overlapped;
624
625 hThread = CreateThread(NULL, 0, tap_win32_thread_entry,
626 (LPVOID)&tap_overlapped, 0, &idThread);
7fb843f8
FB
627 return 0;
628}
629
630/********************************************/
631
632 typedef struct TAPState {
633 VLANClientState *vc;
c227f099 634 tap_win32_overlapped_t *handle;
7fb843f8
FB
635 } TAPState;
636
b946a153
AL
637static void tap_cleanup(VLANClientState *vc)
638{
639 TAPState *s = vc->opaque;
640
641 qemu_del_wait_object(s->handle->tap_semaphore, NULL, NULL);
642
643 /* FIXME: need to kill thread and close file handle:
644 tap_win32_close(s);
645 */
646 qemu_free(s);
647}
648
4f1c942b 649static ssize_t tap_receive(VLANClientState *vc, const uint8_t *buf, size_t size)
7fb843f8 650{
4f1c942b 651 TAPState *s = vc->opaque;
7fb843f8 652
4f1c942b 653 return tap_win32_write(s->handle, buf, size);
7fb843f8
FB
654}
655
e6cda8e2 656static void tap_win32_send(void *opaque)
7fb843f8 657{
e6cda8e2 658 TAPState *s = opaque;
7fb843f8
FB
659 uint8_t *buf;
660 int max_size = 4096;
661 int size;
662
7fb843f8
FB
663 size = tap_win32_read(s->handle, &buf, max_size);
664 if (size > 0) {
665 qemu_send_packet(s->vc, buf, size);
666 tap_win32_free_buffer(s->handle, buf);
667 }
668}
669
a8ed73f7
MM
670static int tap_win32_init(VLANState *vlan, const char *model,
671 const char *name, const char *ifname)
7fb843f8
FB
672{
673 TAPState *s;
3b46e624 674
7fb843f8
FB
675 s = qemu_mallocz(sizeof(TAPState));
676 if (!s)
677 return -1;
678 if (tap_win32_open(&s->handle, ifname) < 0) {
679 printf("tap: Could not open '%s'\n", ifname);
680 return -1;
681 }
682
bb6e6364
MM
683 s->vc = qemu_new_vlan_client(NET_CLIENT_TYPE_TAP,
684 vlan, NULL, model, name,
283c7c63 685 NULL, tap_receive,
70783b9c 686 NULL, NULL, tap_cleanup, s);
3b46e624 687
7fb843f8
FB
688 snprintf(s->vc->info_str, sizeof(s->vc->info_str),
689 "tap: ifname=%s", ifname);
a18e524a 690
e6cda8e2 691 qemu_add_wait_object(s->handle->tap_semaphore, tap_win32_send, s);
7fb843f8
FB
692 return 0;
693}
a8ed73f7
MM
694
695int net_init_tap(QemuOpts *opts, Monitor *mon, const char *name, VLANState *vlan)
696{
697 const char *ifname;
698
699 ifname = qemu_opt_get(opts, "ifname");
700
701 if (!ifname) {
702 qemu_error("tap: no interface name\n");
703 return -1;
704 }
705
706 if (tap_win32_init(vlan, "tap", name, ifname) == -1) {
707 return -1;
708 }
709
710 if (vlan) {
711 vlan->nb_host_devs++;
712 }
713
714 return 0;
715}
716
717int tap_has_ufo(VLANClientState *vc)
718{
719 return 0;
720}
721
722int tap_has_vnet_hdr(VLANClientState *vc)
723{
724 return 0;
725}
726
727void tap_using_vnet_hdr(VLANClientState *vc, int using_vnet_hdr)
728{
729}
730
731void tap_set_offload(VLANClientState *vc, int csum, int tso4,
732 int tso6, int ecn, int ufo)
733{
734}