]> git.proxmox.com Git - mirror_qemu.git/blame - net/tap-win32.c
vdpa: Add SetSteeringEBPF method for NetClientState
[mirror_qemu.git] / net / tap-win32.c
CommitLineData
7fb843f8
FB
1/*
2 * TAP-Win32 -- A kernel driver to provide virtual tap device functionality
3 * on Windows. Originally derived from the CIPE-Win32
4 * project by Damion K. Wilson, with extensive modifications by
5 * James Yonan.
6 *
7 * All source code which derives from the CIPE-Win32 project is
8 * Copyright (C) Damion K. Wilson, 2003, and is released under the
9 * GPL version 2 (see below).
10 *
11 * All other source code is Copyright (C) James Yonan, 2003-2004,
12 * and is released under the GPL version 2 (see below).
13 *
14 * This program is free software; you can redistribute it and/or modify
15 * it under the terms of the GNU General Public License as published by
16 * the Free Software Foundation; either version 2 of the License, or
17 * (at your option) any later version.
18 *
19 * This program is distributed in the hope that it will be useful,
20 * but WITHOUT ANY WARRANTY; without even the implied warranty of
21 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
22 * GNU General Public License for more details.
23 *
24 * You should have received a copy of the GNU General Public License
25 * along with this program (see the file COPYING included with this
8167ee88 26 * distribution); if not, see <http://www.gnu.org/licenses/>.
7fb843f8 27 */
a8ed73f7 28
2744d920 29#include "qemu/osdep.h"
1422e32d 30#include "tap_int.h"
a8ed73f7 31
08778b39 32#include "clients.h" /* net_init_tap */
969e50b6 33#include "net/eth.h"
1422e32d 34#include "net/net.h"
b2136140 35#include "net/tap.h" /* tap_has_ufo, ... */
1de7afc9 36#include "qemu/error-report.h"
db725815 37#include "qemu/main-loop.h"
7fb843f8 38#include <windows.h>
f8bfb1dc 39#include <winioctl.h>
7fb843f8
FB
40
41//=============
42// TAP IOCTLs
43//=============
44
45#define TAP_CONTROL_CODE(request,method) \
46 CTL_CODE (FILE_DEVICE_UNKNOWN, request, method, FILE_ANY_ACCESS)
47
48#define TAP_IOCTL_GET_MAC TAP_CONTROL_CODE (1, METHOD_BUFFERED)
49#define TAP_IOCTL_GET_VERSION TAP_CONTROL_CODE (2, METHOD_BUFFERED)
50#define TAP_IOCTL_GET_MTU TAP_CONTROL_CODE (3, METHOD_BUFFERED)
51#define TAP_IOCTL_GET_INFO TAP_CONTROL_CODE (4, METHOD_BUFFERED)
52#define TAP_IOCTL_CONFIG_POINT_TO_POINT TAP_CONTROL_CODE (5, METHOD_BUFFERED)
53#define TAP_IOCTL_SET_MEDIA_STATUS TAP_CONTROL_CODE (6, METHOD_BUFFERED)
54#define TAP_IOCTL_CONFIG_DHCP_MASQ TAP_CONTROL_CODE (7, METHOD_BUFFERED)
55#define TAP_IOCTL_GET_LOG_LINE TAP_CONTROL_CODE (8, METHOD_BUFFERED)
56#define TAP_IOCTL_CONFIG_DHCP_SET_OPT TAP_CONTROL_CODE (9, METHOD_BUFFERED)
57
58//=================
59// Registry keys
60//=================
61
62#define ADAPTER_KEY "SYSTEM\\CurrentControlSet\\Control\\Class\\{4D36E972-E325-11CE-BFC1-08002BE10318}"
63
64#define NETWORK_CONNECTIONS_KEY "SYSTEM\\CurrentControlSet\\Control\\Network\\{4D36E972-E325-11CE-BFC1-08002BE10318}"
65
66//======================
67// Filesystem prefixes
68//======================
69
70#define USERMODEDEVICEDIR "\\\\.\\Global\\"
71#define TAPSUFFIX ".tap"
72
73
74//======================
75// Compile time configuration
76//======================
77
978d5d73 78//#define DEBUG_TAP_WIN32
7fb843f8 79
b73c1849
AB
80/* FIXME: The asynch write path appears to be broken at
81 * present. WriteFile() ignores the lpNumberOfBytesWritten parameter
82 * for overlapped writes, with the result we return zero bytes sent,
83 * and after handling a single packet, receive is disabled for this
84 * interface. */
85/* #define TUN_ASYNCHRONOUS_WRITES 1 */
7fb843f8
FB
86
87#define TUN_BUFFER_SIZE 1560
88#define TUN_MAX_BUFFER_COUNT 32
89
90/*
91 * The data member "buffer" must be the first element in the tun_buffer
92 * structure. See the function, tap_win32_free_buffer.
93 */
94typedef struct tun_buffer_s {
95 unsigned char buffer [TUN_BUFFER_SIZE];
96 unsigned long read_size;
97 struct tun_buffer_s* next;
c227f099 98} tun_buffer_t;
7fb843f8
FB
99
100typedef struct tap_win32_overlapped {
101 HANDLE handle;
102 HANDLE read_event;
103 HANDLE write_event;
104 HANDLE output_queue_semaphore;
105 HANDLE free_list_semaphore;
e6cda8e2 106 HANDLE tap_semaphore;
7fb843f8
FB
107 CRITICAL_SECTION output_queue_cs;
108 CRITICAL_SECTION free_list_cs;
109 OVERLAPPED read_overlapped;
110 OVERLAPPED write_overlapped;
c227f099
AL
111 tun_buffer_t buffers[TUN_MAX_BUFFER_COUNT];
112 tun_buffer_t* free_list;
113 tun_buffer_t* output_queue_front;
114 tun_buffer_t* output_queue_back;
115} tap_win32_overlapped_t;
7fb843f8 116
c227f099 117static tap_win32_overlapped_t tap_overlapped;
7fb843f8 118
c227f099 119static tun_buffer_t* get_buffer_from_free_list(tap_win32_overlapped_t* const overlapped)
7fb843f8 120{
c227f099 121 tun_buffer_t* buffer = NULL;
7fb843f8
FB
122 WaitForSingleObject(overlapped->free_list_semaphore, INFINITE);
123 EnterCriticalSection(&overlapped->free_list_cs);
124 buffer = overlapped->free_list;
125// assert(buffer != NULL);
126 overlapped->free_list = buffer->next;
127 LeaveCriticalSection(&overlapped->free_list_cs);
128 buffer->next = NULL;
129 return buffer;
130}
131
c227f099 132static void put_buffer_on_free_list(tap_win32_overlapped_t* const overlapped, tun_buffer_t* const buffer)
7fb843f8
FB
133{
134 EnterCriticalSection(&overlapped->free_list_cs);
135 buffer->next = overlapped->free_list;
136 overlapped->free_list = buffer;
137 LeaveCriticalSection(&overlapped->free_list_cs);
138 ReleaseSemaphore(overlapped->free_list_semaphore, 1, NULL);
139}
140
c227f099 141static tun_buffer_t* get_buffer_from_output_queue(tap_win32_overlapped_t* const overlapped, const int block)
7fb843f8 142{
c227f099 143 tun_buffer_t* buffer = NULL;
7fb843f8
FB
144 DWORD result, timeout = block ? INFINITE : 0L;
145
146 // Non-blocking call
5fafdf24 147 result = WaitForSingleObject(overlapped->output_queue_semaphore, timeout);
7fb843f8 148
5fafdf24
TS
149 switch (result)
150 {
7fb843f8 151 // The semaphore object was signaled.
5fafdf24 152 case WAIT_OBJECT_0:
7fb843f8
FB
153 EnterCriticalSection(&overlapped->output_queue_cs);
154
155 buffer = overlapped->output_queue_front;
156 overlapped->output_queue_front = buffer->next;
157
158 if(overlapped->output_queue_front == NULL) {
159 overlapped->output_queue_back = NULL;
160 }
161
162 LeaveCriticalSection(&overlapped->output_queue_cs);
5fafdf24 163 break;
7fb843f8
FB
164
165 // Semaphore was nonsignaled, so a time-out occurred.
5fafdf24 166 case WAIT_TIMEOUT:
7fb843f8 167 // Cannot open another window.
5fafdf24 168 break;
7fb843f8
FB
169 }
170
171 return buffer;
172}
173
c227f099 174static tun_buffer_t* get_buffer_from_output_queue_immediate (tap_win32_overlapped_t* const overlapped)
7fb843f8
FB
175{
176 return get_buffer_from_output_queue(overlapped, 0);
177}
178
c227f099 179static void put_buffer_on_output_queue(tap_win32_overlapped_t* const overlapped, tun_buffer_t* const buffer)
7fb843f8
FB
180{
181 EnterCriticalSection(&overlapped->output_queue_cs);
182
183 if(overlapped->output_queue_front == NULL && overlapped->output_queue_back == NULL) {
184 overlapped->output_queue_front = overlapped->output_queue_back = buffer;
185 } else {
186 buffer->next = NULL;
187 overlapped->output_queue_back->next = buffer;
188 overlapped->output_queue_back = buffer;
189 }
190
191 LeaveCriticalSection(&overlapped->output_queue_cs);
192
193 ReleaseSemaphore(overlapped->output_queue_semaphore, 1, NULL);
194}
195
196
197static int is_tap_win32_dev(const char *guid)
198{
199 HKEY netcard_key;
200 LONG status;
201 DWORD len;
202 int i = 0;
203
204 status = RegOpenKeyEx(
205 HKEY_LOCAL_MACHINE,
206 ADAPTER_KEY,
207 0,
208 KEY_READ,
209 &netcard_key);
210
211 if (status != ERROR_SUCCESS) {
212 return FALSE;
213 }
214
215 for (;;) {
216 char enum_name[256];
217 char unit_string[256];
218 HKEY unit_key;
219 char component_id_string[] = "ComponentId";
220 char component_id[256];
221 char net_cfg_instance_id_string[] = "NetCfgInstanceId";
222 char net_cfg_instance_id[256];
223 DWORD data_type;
224
225 len = sizeof (enum_name);
226 status = RegEnumKeyEx(
227 netcard_key,
228 i,
229 enum_name,
230 &len,
231 NULL,
232 NULL,
233 NULL,
234 NULL);
235
236 if (status == ERROR_NO_MORE_ITEMS)
237 break;
238 else if (status != ERROR_SUCCESS) {
239 return FALSE;
240 }
241
242 snprintf (unit_string, sizeof(unit_string), "%s\\%s",
243 ADAPTER_KEY, enum_name);
244
245 status = RegOpenKeyEx(
246 HKEY_LOCAL_MACHINE,
247 unit_string,
248 0,
249 KEY_READ,
250 &unit_key);
251
252 if (status != ERROR_SUCCESS) {
253 return FALSE;
254 } else {
255 len = sizeof (component_id);
256 status = RegQueryValueEx(
257 unit_key,
258 component_id_string,
259 NULL,
260 &data_type,
b9e82a59 261 (LPBYTE)component_id,
7fb843f8
FB
262 &len);
263
264 if (!(status != ERROR_SUCCESS || data_type != REG_SZ)) {
265 len = sizeof (net_cfg_instance_id);
266 status = RegQueryValueEx(
267 unit_key,
268 net_cfg_instance_id_string,
269 NULL,
270 &data_type,
b9e82a59 271 (LPBYTE)net_cfg_instance_id,
7fb843f8
FB
272 &len);
273
274 if (status == ERROR_SUCCESS && data_type == REG_SZ) {
275 if (/* !strcmp (component_id, TAP_COMPONENT_ID) &&*/
276 !strcmp (net_cfg_instance_id, guid)) {
277 RegCloseKey (unit_key);
278 RegCloseKey (netcard_key);
279 return TRUE;
280 }
281 }
282 }
283 RegCloseKey (unit_key);
284 }
285 ++i;
286 }
287
288 RegCloseKey (netcard_key);
289 return FALSE;
290}
291
292static int get_device_guid(
293 char *name,
294 int name_size,
295 char *actual_name,
296 int actual_name_size)
297{
298 LONG status;
299 HKEY control_net_key;
300 DWORD len;
301 int i = 0;
302 int stop = 0;
303
304 status = RegOpenKeyEx(
305 HKEY_LOCAL_MACHINE,
306 NETWORK_CONNECTIONS_KEY,
307 0,
308 KEY_READ,
309 &control_net_key);
310
311 if (status != ERROR_SUCCESS) {
312 return -1;
313 }
314
315 while (!stop)
316 {
317 char enum_name[256];
318 char connection_string[256];
319 HKEY connection_key;
320 char name_data[256];
321 DWORD name_type;
322 const char name_string[] = "Name";
323
324 len = sizeof (enum_name);
325 status = RegEnumKeyEx(
326 control_net_key,
327 i,
328 enum_name,
329 &len,
330 NULL,
331 NULL,
332 NULL,
333 NULL);
334
335 if (status == ERROR_NO_MORE_ITEMS)
336 break;
337 else if (status != ERROR_SUCCESS) {
338 return -1;
339 }
340
5fafdf24 341 snprintf(connection_string,
7fb843f8
FB
342 sizeof(connection_string),
343 "%s\\%s\\Connection",
344 NETWORK_CONNECTIONS_KEY, enum_name);
345
346 status = RegOpenKeyEx(
347 HKEY_LOCAL_MACHINE,
348 connection_string,
349 0,
350 KEY_READ,
351 &connection_key);
3b46e624 352
7fb843f8
FB
353 if (status == ERROR_SUCCESS) {
354 len = sizeof (name_data);
355 status = RegQueryValueEx(
356 connection_key,
357 name_string,
358 NULL,
359 &name_type,
b9e82a59 360 (LPBYTE)name_data,
7fb843f8
FB
361 &len);
362
363 if (status != ERROR_SUCCESS || name_type != REG_SZ) {
ee0428e3
AB
364 ++i;
365 continue;
7fb843f8
FB
366 }
367 else {
368 if (is_tap_win32_dev(enum_name)) {
369 snprintf(name, name_size, "%s", enum_name);
370 if (actual_name) {
371 if (strcmp(actual_name, "") != 0) {
372 if (strcmp(name_data, actual_name) != 0) {
373 RegCloseKey (connection_key);
374 ++i;
375 continue;
376 }
377 }
378 else {
379 snprintf(actual_name, actual_name_size, "%s", name_data);
380 }
381 }
382 stop = 1;
383 }
384 }
385
386 RegCloseKey (connection_key);
387 }
388 ++i;
389 }
390
391 RegCloseKey (control_net_key);
392
393 if (stop == 0)
394 return -1;
395
396 return 0;
397}
398
399static int tap_win32_set_status(HANDLE handle, int status)
400{
401 unsigned long len = 0;
402
403 return DeviceIoControl(handle, TAP_IOCTL_SET_MEDIA_STATUS,
404 &status, sizeof (status),
405 &status, sizeof (status), &len, NULL);
406}
407
c227f099 408static void tap_win32_overlapped_init(tap_win32_overlapped_t* const overlapped, const HANDLE handle)
7fb843f8
FB
409{
410 overlapped->handle = handle;
411
412 overlapped->read_event = CreateEvent(NULL, FALSE, FALSE, NULL);
413 overlapped->write_event = CreateEvent(NULL, FALSE, FALSE, NULL);
414
415 overlapped->read_overlapped.Offset = 0;
416 overlapped->read_overlapped.OffsetHigh = 0;
417 overlapped->read_overlapped.hEvent = overlapped->read_event;
418
419 overlapped->write_overlapped.Offset = 0;
420 overlapped->write_overlapped.OffsetHigh = 0;
421 overlapped->write_overlapped.hEvent = overlapped->write_event;
422
423 InitializeCriticalSection(&overlapped->output_queue_cs);
424 InitializeCriticalSection(&overlapped->free_list_cs);
425
5fafdf24 426 overlapped->output_queue_semaphore = CreateSemaphore(
7fb843f8
FB
427 NULL, // default security attributes
428 0, // initial count
429 TUN_MAX_BUFFER_COUNT, // maximum count
430 NULL); // unnamed semaphore
431
432 if(!overlapped->output_queue_semaphore) {
433 fprintf(stderr, "error creating output queue semaphore!\n");
434 }
435
5fafdf24 436 overlapped->free_list_semaphore = CreateSemaphore(
7fb843f8
FB
437 NULL, // default security attributes
438 TUN_MAX_BUFFER_COUNT, // initial count
439 TUN_MAX_BUFFER_COUNT, // maximum count
440 NULL); // unnamed semaphore
441
442 if(!overlapped->free_list_semaphore) {
443 fprintf(stderr, "error creating free list semaphore!\n");
444 }
445
446 overlapped->free_list = overlapped->output_queue_front = overlapped->output_queue_back = NULL;
447
448 {
449 unsigned index;
450 for(index = 0; index < TUN_MAX_BUFFER_COUNT; index++) {
c227f099 451 tun_buffer_t* element = &overlapped->buffers[index];
7fb843f8
FB
452 element->next = overlapped->free_list;
453 overlapped->free_list = element;
454 }
455 }
e6cda8e2
FB
456 /* To count buffers, initially no-signal. */
457 overlapped->tap_semaphore = CreateSemaphore(NULL, 0, TUN_MAX_BUFFER_COUNT, NULL);
458 if(!overlapped->tap_semaphore)
459 fprintf(stderr, "error creating tap_semaphore.\n");
7fb843f8
FB
460}
461
c227f099 462static int tap_win32_write(tap_win32_overlapped_t *overlapped,
7fb843f8
FB
463 const void *buffer, unsigned long size)
464{
465 unsigned long write_size;
466 BOOL result;
467 DWORD error;
468
b73c1849 469#ifdef TUN_ASYNCHRONOUS_WRITES
7fb843f8
FB
470 result = GetOverlappedResult( overlapped->handle, &overlapped->write_overlapped,
471 &write_size, FALSE);
472
473 if (!result && GetLastError() == ERROR_IO_INCOMPLETE)
474 WaitForSingleObject(overlapped->write_event, INFINITE);
b73c1849 475#endif
7fb843f8
FB
476
477 result = WriteFile(overlapped->handle, buffer, size,
478 &write_size, &overlapped->write_overlapped);
3b46e624 479
b73c1849
AB
480#ifdef TUN_ASYNCHRONOUS_WRITES
481 /* FIXME: we can't sensibly set write_size here, without waiting
482 * for the IO to complete! Moreover, we can't return zero,
483 * because that will disable receive on this interface, and we
484 * also can't assume it will succeed and return the full size,
485 * because that will result in the buffer being reclaimed while
486 * the IO is in progress. */
487#error Async writes are broken. Please disable TUN_ASYNCHRONOUS_WRITES.
488#else /* !TUN_ASYNCHRONOUS_WRITES */
5fafdf24 489 if (!result) {
b73c1849
AB
490 error = GetLastError();
491 if (error == ERROR_IO_PENDING) {
492 result = GetOverlappedResult(overlapped->handle,
493 &overlapped->write_overlapped,
494 &write_size, TRUE);
5fafdf24 495 }
7fb843f8 496 }
b73c1849
AB
497#endif
498
499 if (!result) {
500#ifdef DEBUG_TAP_WIN32
501 LPTSTR msgbuf;
502 error = GetLastError();
503 FormatMessage(FORMAT_MESSAGE_ALLOCATE_BUFFER|FORMAT_MESSAGE_FROM_SYSTEM,
504 NULL, error, MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT),
505 &msgbuf, 0, NULL);
506 fprintf(stderr, "Tap-Win32: Error WriteFile %d - %s\n", error, msgbuf);
507 LocalFree(msgbuf);
508#endif
509 return 0;
510 }
7fb843f8 511
c3febae6 512 return write_size;
7fb843f8
FB
513}
514
515static DWORD WINAPI tap_win32_thread_entry(LPVOID param)
516{
c227f099 517 tap_win32_overlapped_t *overlapped = (tap_win32_overlapped_t*)param;
7fb843f8
FB
518 unsigned long read_size;
519 BOOL result;
520 DWORD dwError;
c227f099 521 tun_buffer_t* buffer = get_buffer_from_free_list(overlapped);
7fb843f8
FB
522
523
524 for (;;) {
525 result = ReadFile(overlapped->handle,
526 buffer->buffer,
527 sizeof(buffer->buffer),
528 &read_size,
529 &overlapped->read_overlapped);
530 if (!result) {
531 dwError = GetLastError();
532 if (dwError == ERROR_IO_PENDING) {
533 WaitForSingleObject(overlapped->read_event, INFINITE);
534 result = GetOverlappedResult( overlapped->handle, &overlapped->read_overlapped,
535 &read_size, FALSE);
536 if (!result) {
978d5d73 537#ifdef DEBUG_TAP_WIN32
7fb843f8
FB
538 LPVOID lpBuffer;
539 dwError = GetLastError();
540 FormatMessage( FORMAT_MESSAGE_ALLOCATE_BUFFER | FORMAT_MESSAGE_FROM_SYSTEM,
541 NULL, dwError, MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT),
542 (LPTSTR) & lpBuffer, 0, NULL );
543 fprintf(stderr, "Tap-Win32: Error GetOverlappedResult %d - %s\n", dwError, lpBuffer);
544 LocalFree( lpBuffer );
545#endif
546 }
547 } else {
978d5d73 548#ifdef DEBUG_TAP_WIN32
7fb843f8
FB
549 LPVOID lpBuffer;
550 FormatMessage( FORMAT_MESSAGE_ALLOCATE_BUFFER | FORMAT_MESSAGE_FROM_SYSTEM,
551 NULL, dwError, MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT),
552 (LPTSTR) & lpBuffer, 0, NULL );
553 fprintf(stderr, "Tap-Win32: Error ReadFile %d - %s\n", dwError, lpBuffer);
554 LocalFree( lpBuffer );
555#endif
556 }
557 }
558
559 if(read_size > 0) {
560 buffer->read_size = read_size;
561 put_buffer_on_output_queue(overlapped, buffer);
e6cda8e2 562 ReleaseSemaphore(overlapped->tap_semaphore, 1, NULL);
7fb843f8
FB
563 buffer = get_buffer_from_free_list(overlapped);
564 }
565 }
566
567 return 0;
568}
569
c227f099 570static int tap_win32_read(tap_win32_overlapped_t *overlapped,
7fb843f8
FB
571 uint8_t **pbuf, int max_size)
572{
573 int size = 0;
574
c227f099 575 tun_buffer_t* buffer = get_buffer_from_output_queue_immediate(overlapped);
7fb843f8
FB
576
577 if(buffer != NULL) {
578 *pbuf = buffer->buffer;
579 size = (int)buffer->read_size;
580 if(size > max_size) {
581 size = max_size;
582 }
583 }
584
585 return size;
586}
587
c227f099 588static void tap_win32_free_buffer(tap_win32_overlapped_t *overlapped,
b9e82a59 589 uint8_t *pbuf)
7fb843f8 590{
c227f099 591 tun_buffer_t* buffer = (tun_buffer_t*)pbuf;
7fb843f8
FB
592 put_buffer_on_free_list(overlapped, buffer);
593}
594
c227f099 595static int tap_win32_open(tap_win32_overlapped_t **phandle,
eac29d87 596 const char *preferred_name)
7fb843f8
FB
597{
598 char device_path[256];
599 char device_guid[0x100];
600 int rc;
601 HANDLE handle;
602 BOOL bret;
603 char name_buffer[0x100] = {0, };
604 struct {
605 unsigned long major;
606 unsigned long minor;
607 unsigned long debug;
608 } version;
b9e82a59 609 DWORD version_len;
7fb843f8 610 DWORD idThread;
7fb843f8 611
eac29d87
SW
612 if (preferred_name != NULL) {
613 snprintf(name_buffer, sizeof(name_buffer), "%s", preferred_name);
614 }
7fb843f8
FB
615
616 rc = get_device_guid(device_guid, sizeof(device_guid), name_buffer, sizeof(name_buffer));
617 if (rc)
618 return -1;
619
620 snprintf (device_path, sizeof(device_path), "%s%s%s",
621 USERMODEDEVICEDIR,
622 device_guid,
623 TAPSUFFIX);
624
625 handle = CreateFile (
626 device_path,
627 GENERIC_READ | GENERIC_WRITE,
628 0,
629 0,
630 OPEN_EXISTING,
631 FILE_ATTRIBUTE_SYSTEM | FILE_FLAG_OVERLAPPED,
632 0 );
633
634 if (handle == INVALID_HANDLE_VALUE) {
635 return -1;
636 }
637
638 bret = DeviceIoControl(handle, TAP_IOCTL_GET_VERSION,
639 &version, sizeof (version),
640 &version, sizeof (version), &version_len, NULL);
641
642 if (bret == FALSE) {
643 CloseHandle(handle);
644 return -1;
645 }
646
647 if (!tap_win32_set_status(handle, TRUE)) {
648 return -1;
649 }
650
651 tap_win32_overlapped_init(&tap_overlapped, handle);
652
653 *phandle = &tap_overlapped;
654
49a2942d
BS
655 CreateThread(NULL, 0, tap_win32_thread_entry,
656 (LPVOID)&tap_overlapped, 0, &idThread);
7fb843f8
FB
657 return 0;
658}
659
660/********************************************/
661
662 typedef struct TAPState {
4e68f7a0 663 NetClientState nc;
c227f099 664 tap_win32_overlapped_t *handle;
7fb843f8
FB
665 } TAPState;
666
4e68f7a0 667static void tap_cleanup(NetClientState *nc)
b946a153 668{
dca91811 669 TAPState *s = DO_UPCAST(TAPState, nc, nc);
b946a153
AL
670
671 qemu_del_wait_object(s->handle->tap_semaphore, NULL, NULL);
672
673 /* FIXME: need to kill thread and close file handle:
674 tap_win32_close(s);
675 */
b946a153
AL
676}
677
4e68f7a0 678static ssize_t tap_receive(NetClientState *nc, const uint8_t *buf, size_t size)
7fb843f8 679{
dca91811 680 TAPState *s = DO_UPCAST(TAPState, nc, nc);
7fb843f8 681
4f1c942b 682 return tap_win32_write(s->handle, buf, size);
7fb843f8
FB
683}
684
e6cda8e2 685static void tap_win32_send(void *opaque)
7fb843f8 686{
e6cda8e2 687 TAPState *s = opaque;
21df394d 688 uint8_t *buf, *orig_buf;
7fb843f8
FB
689 int max_size = 4096;
690 int size;
969e50b6
BM
691 uint8_t min_pkt[ETH_ZLEN];
692 size_t min_pktsz = sizeof(min_pkt);
7fb843f8 693
7fb843f8
FB
694 size = tap_win32_read(s->handle, &buf, max_size);
695 if (size > 0) {
21df394d
JW
696 orig_buf = buf;
697
bc38e31b 698 if (net_peer_needs_padding(&s->nc)) {
969e50b6
BM
699 if (eth_pad_short_frame(min_pkt, &min_pktsz, buf, size)) {
700 buf = min_pkt;
701 size = min_pktsz;
702 }
703 }
704
dca91811 705 qemu_send_packet(&s->nc, buf, size);
21df394d 706 tap_win32_free_buffer(s->handle, orig_buf);
7fb843f8
FB
707 }
708}
709
3bac80d3 710static bool tap_has_ufo(NetClientState *nc)
2e753bcc
VM
711{
712 return false;
713}
714
3bac80d3 715static bool tap_has_vnet_hdr(NetClientState *nc)
2e753bcc
VM
716{
717 return false;
718}
719
720int tap_probe_vnet_hdr_len(int fd, int len)
721{
722 return 0;
723}
724
725void tap_fd_set_vnet_hdr_len(int fd, int len)
726{
727}
728
4ee9b43b
MT
729int tap_fd_set_vnet_le(int fd, int is_le)
730{
731 return -EINVAL;
732}
733
734int tap_fd_set_vnet_be(int fd, int is_be)
735{
736 return -EINVAL;
737}
738
3bac80d3 739static void tap_using_vnet_hdr(NetClientState *nc, bool using_vnet_hdr)
2e753bcc
VM
740{
741}
742
3bac80d3 743static void tap_set_offload(NetClientState *nc, int csum, int tso4,
2ab0ec31 744 int tso6, int ecn, int ufo, int uso4, int uso6)
2e753bcc
VM
745{
746}
747
748struct vhost_net *tap_get_vhost_net(NetClientState *nc)
749{
750 return NULL;
751}
752
3bac80d3 753static bool tap_has_vnet_hdr_len(NetClientState *nc, int len)
2e753bcc
VM
754{
755 return false;
756}
757
3bac80d3 758static void tap_set_vnet_hdr_len(NetClientState *nc, int len)
2e753bcc
VM
759{
760 abort();
761}
762
dca91811 763static NetClientInfo net_tap_win32_info = {
f394b2e2 764 .type = NET_CLIENT_DRIVER_TAP,
dca91811
MM
765 .size = sizeof(TAPState),
766 .receive = tap_receive,
767 .cleanup = tap_cleanup,
2e753bcc
VM
768 .has_ufo = tap_has_ufo,
769 .has_vnet_hdr = tap_has_vnet_hdr,
770 .has_vnet_hdr_len = tap_has_vnet_hdr_len,
771 .using_vnet_hdr = tap_using_vnet_hdr,
772 .set_offload = tap_set_offload,
773 .set_vnet_hdr_len = tap_set_vnet_hdr_len,
dca91811
MM
774};
775
4e68f7a0 776static int tap_win32_init(NetClientState *peer, const char *model,
a8ed73f7 777 const char *name, const char *ifname)
7fb843f8 778{
4e68f7a0 779 NetClientState *nc;
7fb843f8 780 TAPState *s;
dca91811 781 tap_win32_overlapped_t *handle;
3b46e624 782
dca91811 783 if (tap_win32_open(&handle, ifname) < 0) {
7fb843f8
FB
784 printf("tap: Could not open '%s'\n", ifname);
785 return -1;
786 }
787
ab5f3f84 788 nc = qemu_new_net_client(&net_tap_win32_info, peer, model, name);
3b46e624 789
08fd0fa9
BS
790 s = DO_UPCAST(TAPState, nc, nc);
791
53b85d95 792 qemu_set_info_str(&s->nc, "tap: ifname=%s", ifname);
d89b4f83 793
dca91811
MM
794 s->handle = handle;
795
e6cda8e2 796 qemu_add_wait_object(s->handle->tap_semaphore, tap_win32_send, s);
dca91811 797
7fb843f8
FB
798 return 0;
799}
a8ed73f7 800
cebea510 801int net_init_tap(const Netdev *netdev, const char *name,
a30ecde6 802 NetClientState *peer, Error **errp)
a8ed73f7 803{
a30ecde6 804 /* FIXME error_setg(errp, ...) on failure */
08c573a8 805 const NetdevTapOptions *tap;
a8ed73f7 806
f394b2e2
EB
807 assert(netdev->type == NET_CLIENT_DRIVER_TAP);
808 tap = &netdev->u.tap;
a8ed73f7 809
7480874a 810 if (!tap->ifname) {
1ecda02b 811 error_report("tap: no interface name");
a8ed73f7
MM
812 return -1;
813 }
814
d33d93b2 815 if (tap_win32_init(peer, "tap", name, tap->ifname) == -1) {
a8ed73f7
MM
816 return -1;
817 }
818
a8ed73f7
MM
819 return 0;
820}
821
16dbaf90
JW
822int tap_enable(NetClientState *nc)
823{
824 abort();
825}
826
827int tap_disable(NetClientState *nc)
828{
829 abort();
830}