kernel - Move mplock to machine-independent C
[dragonfly.git] / sys / net / tap / if_tap.c
blob2010b01cb518bc14a8ab83b116ce9780962c12c4
1 /*
2 * Copyright (C) 1999-2000 by Maksim Yevmenkin <m_evmenkin@yahoo.com>
3 * All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24 * SUCH DAMAGE.
26 * BASED ON:
27 * -------------------------------------------------------------------------
29 * Copyright (c) 1988, Julian Onions <jpo@cs.nott.ac.uk>
30 * Nottingham University 1987.
34 * $FreeBSD: src/sys/net/if_tap.c,v 1.3.2.3 2002/04/14 21:41:48 luigi Exp $
35 * $DragonFly: src/sys/net/tap/if_tap.c,v 1.41 2008/09/05 17:03:15 dillon Exp $
36 * $Id: if_tap.c,v 0.21 2000/07/23 21:46:02 max Exp $
39 #include "opt_inet.h"
41 #include <sys/param.h>
42 #include <sys/conf.h>
43 #include <sys/device.h>
44 #include <sys/filedesc.h>
45 #include <sys/filio.h>
46 #include <sys/kernel.h>
47 #include <sys/malloc.h>
48 #include <sys/mbuf.h>
49 #include <sys/poll.h>
50 #include <sys/proc.h>
51 #include <sys/priv.h>
52 #include <sys/signalvar.h>
53 #include <sys/socket.h>
54 #include <sys/sockio.h>
55 #include <sys/sysctl.h>
56 #include <sys/systm.h>
57 #include <sys/ttycom.h>
58 #include <sys/uio.h>
59 #include <sys/vnode.h>
60 #include <sys/serialize.h>
62 #include <sys/thread2.h>
63 #include <sys/mplock2.h>
65 #include <net/bpf.h>
66 #include <net/ethernet.h>
67 #include <net/if.h>
68 #include <net/ifq_var.h>
69 #include <net/if_arp.h>
70 #include <net/if_clone.h>
71 #include <net/route.h>
72 #include <sys/devfs.h>
74 #include <netinet/in.h>
76 #include "if_tapvar.h"
77 #include "if_tap.h"
79 #define TAP_IFFLAGS (IFF_BROADCAST|IFF_SIMPLEX|IFF_MULTICAST)
81 #define TAP_PREALLOCATED_UNITS 4
83 #define CDEV_NAME "tap"
84 #define CDEV_MAJOR 149
85 #define TAPDEBUG if (tapdebug) if_printf
87 #define TAP "tap"
88 #define VMNET "vmnet"
89 #define VMNET_DEV_MASK 0x00010000
91 DEVFS_DECLARE_CLONE_BITMAP(tap);
93 /* module */
94 static int tapmodevent (module_t, int, void *);
96 /* device */
97 static struct tap_softc *tapcreate(int, cdev_t);
98 static void tapdestroy(struct tap_softc *);
100 /* clone */
101 static int tap_clone_create(struct if_clone *, int);
102 static void tap_clone_destroy(struct ifnet *);
105 /* network interface */
106 static void tapifstart (struct ifnet *);
107 static int tapifioctl (struct ifnet *, u_long, caddr_t,
108 struct ucred *);
109 static void tapifinit (void *);
110 static void tapifstop(struct tap_softc *, int);
111 static void tapifflags(struct tap_softc *);
113 /* character device */
114 static d_open_t tapopen;
115 static d_clone_t tapclone;
116 static d_close_t tapclose;
117 static d_read_t tapread;
118 static d_write_t tapwrite;
119 static d_ioctl_t tapioctl;
120 static d_poll_t tappoll;
121 static d_kqfilter_t tapkqfilter;
123 static struct dev_ops tap_ops = {
124 { CDEV_NAME, CDEV_MAJOR, 0 },
125 .d_open = tapopen,
126 .d_close = tapclose,
127 .d_read = tapread,
128 .d_write = tapwrite,
129 .d_ioctl = tapioctl,
130 .d_poll = tappoll,
131 .d_kqfilter = tapkqfilter
134 static int taprefcnt = 0; /* module ref. counter */
135 static int taplastunit = -1; /* max. open unit number */
136 static int tapdebug = 0; /* debug flag */
137 static int tapuopen = 0; /* all user open() */
138 static int tapuponopen = 0; /* IFF_UP */
140 MALLOC_DECLARE(M_TAP);
141 MALLOC_DEFINE(M_TAP, CDEV_NAME, "Ethernet tunnel interface");
142 struct if_clone tap_cloner = IF_CLONE_INITIALIZER("tap",
143 tap_clone_create, tap_clone_destroy,
144 0, IF_MAXUNIT);
145 static SLIST_HEAD(,tap_softc) tap_listhead =
146 SLIST_HEAD_INITIALIZER(&tap_listhead);
148 SYSCTL_INT(_debug, OID_AUTO, if_tap_debug, CTLFLAG_RW, &tapdebug, 0, "");
149 SYSCTL_DECL(_net_link);
150 SYSCTL_NODE(_net_link, OID_AUTO, tap, CTLFLAG_RW, 0,
151 "Ethernet tunnel software network interface");
152 SYSCTL_INT(_net_link_tap, OID_AUTO, user_open, CTLFLAG_RW, &tapuopen, 0,
153 "Allow user to open /dev/tap (based on node permissions)");
154 SYSCTL_INT(_net_link_tap, OID_AUTO, up_on_open, CTLFLAG_RW, &tapuponopen, 0,
155 "Bring interface up when /dev/tap is opened");
156 SYSCTL_INT(_net_link_tap, OID_AUTO, debug, CTLFLAG_RW, &tapdebug, 0, "");
158 DEV_MODULE(if_tap, tapmodevent, NULL);
161 * tapmodevent
163 * module event handler
165 static int
166 tapmodevent(module_t mod, int type, void *data)
168 static int attached = 0;
169 struct tap_softc *tp, *ntp;
170 int i;
172 switch (type) {
173 case MOD_LOAD:
174 if (attached)
175 return (EEXIST);
177 make_autoclone_dev(&tap_ops, &DEVFS_CLONE_BITMAP(tap), tapclone,
178 UID_ROOT, GID_WHEEL, 0600, "tap");
179 SLIST_INIT(&tap_listhead);
180 if_clone_attach(&tap_cloner);
182 for (i = 0; i < TAP_PREALLOCATED_UNITS; ++i) {
183 make_dev(&tap_ops, i, UID_ROOT, GID_WHEEL,
184 0600, "tap%d", i);
185 devfs_clone_bitmap_set(&DEVFS_CLONE_BITMAP(tap), i);
188 attached = 1;
189 break;
191 case MOD_UNLOAD:
192 if (taprefcnt > 0)
193 return (EBUSY);
195 if_clone_detach(&tap_cloner);
197 /* Maintain tap ifs in a local list */
198 SLIST_FOREACH_MUTABLE(tp, &tap_listhead, tap_link, ntp)
199 tapdestroy(tp);
201 attached = 0;
203 devfs_clone_handler_del("tap");
204 dev_ops_remove_all(&tap_ops);
205 devfs_clone_bitmap_uninit(&DEVFS_CLONE_BITMAP(tap));
206 break;
208 default:
209 return (EOPNOTSUPP);
212 return (0);
213 } /* tapmodevent */
217 * tapcreate - create or clone an interface
219 static struct tap_softc *
220 tapcreate(int unit, cdev_t dev)
222 const char *name = TAP;
223 struct ifnet *ifp;
224 struct tap_softc *tp;
225 uint8_t ether_addr[ETHER_ADDR_LEN];
227 tp = kmalloc(sizeof(*tp), M_TAP, M_WAITOK | M_ZERO);
228 dev->si_drv1 = tp;
229 tp->tap_dev = dev;
230 tp->tap_unit = unit;
232 reference_dev(dev); /* tp association */
234 /* generate fake MAC address: 00 bd xx xx xx unit_no */
235 ether_addr[0] = 0x00;
236 ether_addr[1] = 0xbd;
237 bcopy(&ticks, &ether_addr[2], 3);
238 ether_addr[5] = (u_char)unit;
240 /* fill the rest and attach interface */
241 ifp = &tp->tap_if;
242 ifp->if_softc = tp;
244 if_initname(ifp, name, unit);
245 if (unit > taplastunit)
246 taplastunit = unit;
248 ifp->if_init = tapifinit;
249 ifp->if_start = tapifstart;
250 ifp->if_ioctl = tapifioctl;
251 ifp->if_mtu = ETHERMTU;
252 ifp->if_flags = TAP_IFFLAGS;
253 ifq_set_maxlen(&ifp->if_snd, ifqmaxlen);
254 ifq_set_ready(&ifp->if_snd);
256 ether_ifattach(ifp, ether_addr, NULL);
258 tp->tap_flags |= TAP_INITED;
259 tp->tap_devq.ifq_maxlen = ifqmaxlen;
261 SLIST_INSERT_HEAD(&tap_listhead, tp, tap_link);
263 TAPDEBUG(ifp, "created. minor = %#x\n", minor(dev));
264 return (tp);
267 static
268 struct tap_softc *
269 tapfind(int unit)
271 struct tap_softc *tp;
273 SLIST_FOREACH(tp, &tap_listhead, tap_link) {
274 if (tp->tap_unit == unit)
275 return(tp);
277 return (NULL);
281 * tap_clone_create:
283 * Create a new tap instance via ifconfig.
285 static int
286 tap_clone_create(struct if_clone *ifc __unused, int unit)
288 struct tap_softc *tp;
289 cdev_t dev;
291 tp = tapfind(unit);
292 if (tp == NULL) {
293 if (!devfs_clone_bitmap_chk(&DEVFS_CLONE_BITMAP(tap), unit)) {
294 devfs_clone_bitmap_set(&DEVFS_CLONE_BITMAP(tap), unit);
295 dev = make_dev(&tap_ops, unit, UID_ROOT, GID_WHEEL,
296 0600, "%s%d", TAP, unit);
297 } else {
298 dev = devfs_find_device_by_name("%s%d", TAP, unit);
301 KKASSERT(dev != NULL);
302 tp = tapcreate(unit, dev);
304 tp->tap_flags |= TAP_CLONE;
305 TAPDEBUG(&tp->tap_if, "clone created. minor = %#x tap_flags = 0x%x\n",
306 minor(tp->tap_dev), tp->tap_flags);
308 return (0);
312 * tapopen
314 * to open tunnel. must be superuser
316 static int
317 tapopen(struct dev_open_args *ap)
319 cdev_t dev = NULL;
320 struct tap_softc *tp = NULL;
321 struct ifnet *ifp = NULL;
322 int error;
324 if (tapuopen == 0 &&
325 (error = priv_check_cred(ap->a_cred, PRIV_ROOT, 0)) != 0)
326 return (error);
328 get_mplock();
329 dev = ap->a_head.a_dev;
330 tp = dev->si_drv1;
331 if (tp == NULL)
332 tp = tapcreate(minor(dev), dev);
333 if (tp->tap_flags & TAP_OPEN) {
334 rel_mplock();
335 return (EBUSY);
337 ifp = &tp->arpcom.ac_if;
339 if ((tp->tap_flags & TAP_CLONE) == 0) {
340 EVENTHANDLER_INVOKE(ifnet_attach_event, ifp);
342 /* Announce the return of the interface. */
343 rt_ifannouncemsg(ifp, IFAN_ARRIVAL);
346 bcopy(tp->arpcom.ac_enaddr, tp->ether_addr, sizeof(tp->ether_addr));
348 if (curthread->td_proc)
349 fsetown(curthread->td_proc->p_pid, &tp->tap_sigtd);
350 tp->tap_flags |= TAP_OPEN;
351 taprefcnt ++;
353 if (tapuponopen && (ifp->if_flags & IFF_UP) == 0) {
354 crit_enter();
355 if_up(ifp);
356 crit_exit();
358 ifnet_serialize_all(ifp);
359 tapifflags(tp);
360 ifnet_deserialize_all(ifp);
362 tp->tap_flags |= TAP_CLOSEDOWN;
365 TAPDEBUG(ifp, "opened. minor = %#x, refcnt = %d, taplastunit = %d\n",
366 minor(tp->tap_dev), taprefcnt, taplastunit);
368 rel_mplock();
369 return (0);
372 static int
373 tapclone(struct dev_clone_args *ap)
375 int unit;
377 unit = devfs_clone_bitmap_get(&DEVFS_CLONE_BITMAP(tap), 0);
378 ap->a_dev = make_only_dev(&tap_ops, unit, UID_ROOT, GID_WHEEL,
379 0600, "%s%d", TAP, unit);
380 tapcreate(unit, ap->a_dev);
381 return (0);
385 * tapclose
387 * close the device - mark i/f down & delete routing info
389 static int
390 tapclose(struct dev_close_args *ap)
392 cdev_t dev = ap->a_head.a_dev;
393 struct tap_softc *tp = dev->si_drv1;
394 struct ifnet *ifp = &tp->tap_if;
395 int clear_flags = 0;
397 get_mplock();
399 /* Junk all pending output */
400 ifq_purge(&ifp->if_snd);
403 * Do not bring the interface down, and do not anything with
404 * interface, if we are in VMnet mode. just close the device.
406 * If the interface is not cloned, we always bring it down.
408 * If the interface is cloned, then we bring it down during
409 * closing only if it was brought up during opening.
411 if ((tp->tap_flags & TAP_VMNET) == 0 &&
412 ((tp->tap_flags & TAP_CLONE) == 0 ||
413 (tp->tap_flags & TAP_CLOSEDOWN))) {
414 if (ifp->if_flags & IFF_UP)
415 if_down(ifp);
416 clear_flags = 1;
418 ifnet_serialize_all(ifp);
419 tapifstop(tp, clear_flags);
420 ifnet_deserialize_all(ifp);
422 if ((tp->tap_flags & TAP_CLONE) == 0) {
423 if_purgeaddrs_nolink(ifp);
425 EVENTHANDLER_INVOKE(ifnet_detach_event, ifp);
427 /* Announce the departure of the interface. */
428 rt_ifannouncemsg(ifp, IFAN_DEPARTURE);
431 funsetown(tp->tap_sigio);
432 tp->tap_sigio = NULL;
433 selwakeup(&tp->tap_rsel);
435 tp->tap_flags &= ~TAP_OPEN;
436 funsetown(tp->tap_sigtd);
437 tp->tap_sigtd = NULL;
439 taprefcnt --;
440 if (taprefcnt < 0) {
441 taprefcnt = 0;
442 if_printf(ifp, "minor = %#x, refcnt = %d is out of sync. "
443 "set refcnt to 0\n", minor(tp->tap_dev), taprefcnt);
446 TAPDEBUG(ifp, "closed. minor = %#x, refcnt = %d, taplastunit = %d\n",
447 minor(tp->tap_dev), taprefcnt, taplastunit);
449 if (tp->tap_unit >= TAP_PREALLOCATED_UNITS)
450 tapdestroy(tp);
452 rel_mplock();
453 return (0);
457 * tapdestroy:
459 * Destroy a tap instance.
461 static void
462 tapdestroy(struct tap_softc *tp)
464 struct ifnet *ifp = &tp->arpcom.ac_if;
465 cdev_t dev;
467 TAPDEBUG(ifp, "destroyed. minor = %#x, refcnt = %d, taplastunit = %d\n",
468 minor(tp->tap_dev), taprefcnt, taplastunit);
470 ifnet_serialize_all(ifp);
471 tapifstop(tp, 1);
472 ifnet_deserialize_all(ifp);
474 ether_ifdetach(ifp);
475 SLIST_REMOVE(&tap_listhead, tp, tap_softc, tap_link);
477 dev = tp->tap_dev;
478 tp->tap_dev = NULL;
479 dev->si_drv1 = NULL;
481 release_dev(dev); /* tp association */
484 * Also destroy the cloned device
486 if (tp->tap_unit >= TAP_PREALLOCATED_UNITS) {
487 destroy_dev(dev);
488 devfs_clone_bitmap_put(&DEVFS_CLONE_BITMAP(tap), tp->tap_unit);
491 kfree(tp, M_TAP);
493 taplastunit--;
497 * tap_clone_destroy:
499 * Destroy a tap instance.
501 static void
502 tap_clone_destroy(struct ifnet *ifp)
504 struct tap_softc *tp = ifp->if_softc;
506 TAPDEBUG(&tp->tap_if, "clone destroyed. minor = %#x tap_flags = 0x%x\n",
507 minor(tp->tap_dev), tp->tap_flags);
508 if (tp->tap_flags & TAP_CLONE)
509 tapdestroy(tp);
513 * tapifinit
515 * Network interface initialization function (called with if serializer held)
517 * MPSAFE
519 static void
520 tapifinit(void *xtp)
522 struct tap_softc *tp = xtp;
523 struct ifnet *ifp = &tp->tap_if;
525 TAPDEBUG(ifp, "initializing, minor = %#x tap_flags = 0x%x\n",
526 minor(tp->tap_dev), tp->tap_flags);
528 ASSERT_IFNET_SERIALIZED_ALL(ifp);
530 tapifstop(tp, 1);
532 ifp->if_flags |= IFF_RUNNING;
533 ifp->if_flags &= ~IFF_OACTIVE;
535 /* attempt to start output */
536 tapifstart(ifp);
541 * tapifioctl
543 * Process an ioctl request on network interface (called with if serializer
544 * held).
546 * MPSAFE
548 static int
549 tapifioctl(struct ifnet *ifp, u_long cmd, caddr_t data, struct ucred *cr)
551 struct tap_softc *tp = (struct tap_softc *)(ifp->if_softc);
552 struct ifstat *ifs = NULL;
553 int dummy;
555 switch (cmd) {
556 case SIOCSIFADDR:
557 case SIOCGIFADDR:
558 case SIOCSIFMTU:
559 dummy = ether_ioctl(ifp, cmd, data);
560 return (dummy);
562 case SIOCSIFFLAGS:
563 tapifflags(tp);
564 break;
566 case SIOCADDMULTI: /* XXX -- just like vmnet does */
567 case SIOCDELMULTI:
568 break;
570 case SIOCGIFSTATUS:
571 ifs = (struct ifstat *)data;
572 dummy = strlen(ifs->ascii);
573 if ((tp->tap_flags & TAP_OPEN) &&
574 dummy < sizeof(ifs->ascii)) {
575 if (tp->tap_sigtd && tp->tap_sigtd->sio_proc) {
576 ksnprintf(ifs->ascii + dummy,
577 sizeof(ifs->ascii) - dummy,
578 "\tOpened by pid %d\n",
579 (int)tp->tap_sigtd->sio_proc->p_pid);
580 } else {
581 ksnprintf(ifs->ascii + dummy,
582 sizeof(ifs->ascii) - dummy,
583 "\tOpened by <unknown>\n");
586 break;
588 default:
589 return (EINVAL);
592 return (0);
597 * tapifstart
599 * Queue packets from higher level ready to put out (called with if serializer
600 * held)
602 * MPSAFE
604 static void
605 tapifstart(struct ifnet *ifp)
607 struct tap_softc *tp = ifp->if_softc;
608 struct ifqueue *ifq;
609 struct mbuf *m;
610 int has_data = 0;
612 TAPDEBUG(ifp, "starting, minor = %#x\n", minor(tp->tap_dev));
615 * do not junk pending output if we are in VMnet mode.
616 * XXX: can this do any harm because of queue overflow?
619 if (((tp->tap_flags & TAP_VMNET) == 0) &&
620 ((tp->tap_flags & TAP_READY) != TAP_READY)) {
621 TAPDEBUG(ifp, "not ready. minor = %#x, tap_flags = 0x%x\n",
622 minor(tp->tap_dev), tp->tap_flags);
623 ifq_purge(&ifp->if_snd);
624 return;
627 ifp->if_flags |= IFF_OACTIVE;
629 ifq = &tp->tap_devq;
630 while ((m = ifq_dequeue(&ifp->if_snd, NULL)) != NULL) {
631 if (IF_QFULL(ifq)) {
632 IF_DROP(ifq);
633 ifp->if_oerrors++;
634 m_freem(m);
635 } else {
636 IF_ENQUEUE(ifq, m);
637 ifp->if_opackets++;
638 has_data = 1;
642 if (has_data) {
643 if (tp->tap_flags & TAP_RWAIT) {
644 tp->tap_flags &= ~TAP_RWAIT;
645 wakeup((caddr_t)tp);
648 get_mplock();
649 KNOTE(&tp->tap_rsel.si_note, 0);
650 rel_mplock();
652 if ((tp->tap_flags & TAP_ASYNC) && (tp->tap_sigio != NULL)) {
653 get_mplock();
654 pgsigio(tp->tap_sigio, SIGIO, 0);
655 rel_mplock();
659 * selwakeup is not MPSAFE. tapifstart is.
661 get_mplock();
662 selwakeup(&tp->tap_rsel);
663 rel_mplock();
666 ifp->if_flags &= ~IFF_OACTIVE;
671 * tapioctl
673 * The ops interface is now pretty minimal. Called via fileops with nothing
674 * held.
676 * MPSAFE
678 static int
679 tapioctl(struct dev_ioctl_args *ap)
681 cdev_t dev = ap->a_head.a_dev;
682 caddr_t data = ap->a_data;
683 struct tap_softc *tp = dev->si_drv1;
684 struct ifnet *ifp = &tp->tap_if;
685 struct tapinfo *tapp = NULL;
686 struct mbuf *mb;
687 short f;
688 int error;
690 ifnet_serialize_all(ifp);
691 error = 0;
693 switch (ap->a_cmd) {
694 case TAPSIFINFO:
695 tapp = (struct tapinfo *)data;
696 ifp->if_mtu = tapp->mtu;
697 ifp->if_type = tapp->type;
698 ifp->if_baudrate = tapp->baudrate;
699 break;
701 case TAPGIFINFO:
702 tapp = (struct tapinfo *)data;
703 tapp->mtu = ifp->if_mtu;
704 tapp->type = ifp->if_type;
705 tapp->baudrate = ifp->if_baudrate;
706 break;
708 case TAPSDEBUG:
709 tapdebug = *(int *)data;
710 break;
712 case TAPGDEBUG:
713 *(int *)data = tapdebug;
714 break;
716 case FIOASYNC:
717 if (*(int *)data)
718 tp->tap_flags |= TAP_ASYNC;
719 else
720 tp->tap_flags &= ~TAP_ASYNC;
721 break;
723 case FIONREAD:
724 *(int *)data = 0;
726 /* Take a look at devq first */
727 IF_POLL(&tp->tap_devq, mb);
728 if (mb == NULL)
729 mb = ifq_poll(&ifp->if_snd);
731 if (mb != NULL) {
732 for(; mb != NULL; mb = mb->m_next)
733 *(int *)data += mb->m_len;
735 break;
737 case FIOSETOWN:
738 error = fsetown(*(int *)data, &tp->tap_sigio);
739 break;
741 case FIOGETOWN:
742 *(int *)data = fgetown(tp->tap_sigio);
743 break;
745 /* this is deprecated, FIOSETOWN should be used instead */
746 case TIOCSPGRP:
747 error = fsetown(-(*(int *)data), &tp->tap_sigio);
748 break;
750 /* this is deprecated, FIOGETOWN should be used instead */
751 case TIOCGPGRP:
752 *(int *)data = -fgetown(tp->tap_sigio);
753 break;
755 /* VMware/VMnet port ioctl's */
757 case SIOCGIFFLAGS: /* get ifnet flags */
758 bcopy(&ifp->if_flags, data, sizeof(ifp->if_flags));
759 break;
761 case VMIO_SIOCSIFFLAGS: /* VMware/VMnet SIOCSIFFLAGS */
762 f = *(short *)data;
763 f &= 0x0fff;
764 f &= ~IFF_CANTCHANGE;
765 f |= IFF_UP;
766 ifp->if_flags = f | (ifp->if_flags & IFF_CANTCHANGE);
767 break;
769 case OSIOCGIFADDR: /* get MAC address of the remote side */
770 case SIOCGIFADDR:
771 bcopy(tp->ether_addr, data, sizeof(tp->ether_addr));
772 break;
774 case SIOCSIFADDR: /* set MAC address of the remote side */
775 bcopy(data, tp->ether_addr, sizeof(tp->ether_addr));
776 break;
778 default:
779 error = ENOTTY;
780 break;
782 ifnet_deserialize_all(ifp);
783 return (error);
788 * tapread
790 * The ops read interface - reads a packet at a time, or at
791 * least as much of a packet as can be read.
793 * Called from the fileops interface with nothing held.
795 * MPSAFE
797 static int
798 tapread(struct dev_read_args *ap)
800 cdev_t dev = ap->a_head.a_dev;
801 struct uio *uio = ap->a_uio;
802 struct tap_softc *tp = dev->si_drv1;
803 struct ifnet *ifp = &tp->tap_if;
804 struct mbuf *m0 = NULL;
805 int error = 0, len;
807 TAPDEBUG(ifp, "reading, minor = %#x\n", minor(tp->tap_dev));
809 if ((tp->tap_flags & TAP_READY) != TAP_READY) {
810 TAPDEBUG(ifp, "not ready. minor = %#x, tap_flags = 0x%x\n",
811 minor(tp->tap_dev), tp->tap_flags);
813 return (EHOSTDOWN);
816 tp->tap_flags &= ~TAP_RWAIT;
818 /* sleep until we get a packet */
819 do {
820 ifnet_serialize_all(ifp);
821 IF_DEQUEUE(&tp->tap_devq, m0);
822 if (m0 == NULL) {
823 if (ap->a_ioflag & IO_NDELAY) {
824 ifnet_deserialize_all(ifp);
825 return (EWOULDBLOCK);
827 tp->tap_flags |= TAP_RWAIT;
828 tsleep_interlock(tp, PCATCH);
829 ifnet_deserialize_all(ifp);
830 error = tsleep(tp, PCATCH | PINTERLOCKED, "taprd", 0);
831 if (error)
832 return (error);
833 } else {
834 ifnet_deserialize_all(ifp);
836 } while (m0 == NULL);
838 BPF_MTAP(ifp, m0);
840 /* xfer packet to user space */
841 while ((m0 != NULL) && (uio->uio_resid > 0) && (error == 0)) {
842 len = (int)szmin(uio->uio_resid, m0->m_len);
843 if (len == 0)
844 break;
846 error = uiomove(mtod(m0, caddr_t), (size_t)len, uio);
847 m0 = m_free(m0);
850 if (m0 != NULL) {
851 TAPDEBUG(ifp, "dropping mbuf, minor = %#x\n",
852 minor(tp->tap_dev));
853 m_freem(m0);
856 return (error);
860 * tapwrite
862 * The ops write interface - an atomic write is a packet - or else!
864 * Called from the fileops interface with nothing held.
866 * MPSAFE
868 static int
869 tapwrite(struct dev_write_args *ap)
871 cdev_t dev = ap->a_head.a_dev;
872 struct uio *uio = ap->a_uio;
873 struct tap_softc *tp = dev->si_drv1;
874 struct ifnet *ifp = &tp->tap_if;
875 struct mbuf *top = NULL, **mp = NULL, *m = NULL;
876 int error = 0;
877 size_t tlen, mlen;
879 TAPDEBUG(ifp, "writing, minor = %#x\n", minor(tp->tap_dev));
881 if ((tp->tap_flags & TAP_READY) != TAP_READY) {
882 TAPDEBUG(ifp, "not ready. minor = %#x, tap_flags = 0x%x\n",
883 minor(tp->tap_dev), tp->tap_flags);
884 return (EHOSTDOWN);
887 if (uio->uio_resid == 0)
888 return (0);
890 if (uio->uio_resid > TAPMRU) {
891 TAPDEBUG(ifp, "invalid packet len = %zu, minor = %#x\n",
892 uio->uio_resid, minor(tp->tap_dev));
894 return (EIO);
896 tlen = uio->uio_resid;
898 /* get a header mbuf */
899 MGETHDR(m, MB_DONTWAIT, MT_DATA);
900 if (m == NULL)
901 return (ENOBUFS);
902 mlen = MHLEN;
904 top = 0;
905 mp = &top;
906 while ((error == 0) && (uio->uio_resid > 0)) {
907 m->m_len = (int)szmin(mlen, uio->uio_resid);
908 error = uiomove(mtod(m, caddr_t), (size_t)m->m_len, uio);
909 *mp = m;
910 mp = &m->m_next;
911 if (uio->uio_resid > 0) {
912 MGET(m, MB_DONTWAIT, MT_DATA);
913 if (m == NULL) {
914 error = ENOBUFS;
915 break;
917 mlen = MLEN;
920 if (error) {
921 ifp->if_ierrors ++;
922 if (top)
923 m_freem(top);
924 return (error);
927 top->m_pkthdr.len = (int)tlen;
928 top->m_pkthdr.rcvif = ifp;
931 * Ethernet bridge and bpf are handled in ether_input
933 * adjust mbuf and give packet to the ether_input
935 ifnet_serialize_all(ifp);
936 ifp->if_input(ifp, top);
937 ifp->if_ipackets ++; /* ibytes are counted in ether_input */
938 ifnet_deserialize_all(ifp);
940 return (0);
944 * tappoll
946 * The poll interface, this is only useful on reads really. The write
947 * detect always returns true, write never blocks anyway, it either
948 * accepts the packet or drops it
950 * Called from the fileops interface with nothing held.
952 * MPSAFE
954 static int
955 tappoll(struct dev_poll_args *ap)
957 cdev_t dev = ap->a_head.a_dev;
958 struct tap_softc *tp = dev->si_drv1;
959 struct ifnet *ifp = &tp->tap_if;
960 int revents = 0;
962 TAPDEBUG(ifp, "polling, minor = %#x\n", minor(tp->tap_dev));
964 if (ap->a_events & (POLLIN | POLLRDNORM)) {
965 if (!IF_QEMPTY(&tp->tap_devq)) {
966 TAPDEBUG(ifp,
967 "has data in queue. minor = %#x\n",
968 minor(tp->tap_dev));
970 revents |= (ap->a_events & (POLLIN | POLLRDNORM));
971 } else {
972 TAPDEBUG(ifp, "waiting for data, minor = %#x\n",
973 minor(tp->tap_dev));
975 get_mplock();
976 selrecord(curthread, &tp->tap_rsel);
977 rel_mplock();
981 if (ap->a_events & (POLLOUT | POLLWRNORM))
982 revents |= (ap->a_events & (POLLOUT | POLLWRNORM));
983 ap->a_events = revents;
984 return (0);
988 * tapkqfilter - called from the fileops interface with nothing held
990 * MPSAFE
992 static int filt_tapread(struct knote *kn, long hint);
993 static void filt_tapdetach(struct knote *kn);
994 static struct filterops tapread_filtops =
995 { 1, NULL, filt_tapdetach, filt_tapread };
997 static int
998 tapkqfilter(struct dev_kqfilter_args *ap)
1000 cdev_t dev = ap->a_head.a_dev;
1001 struct knote *kn = ap->a_kn;
1002 struct tap_softc *tp;
1003 struct klist *list;
1004 struct ifnet *ifp;
1006 get_mplock();
1007 tp = dev->si_drv1;
1008 ifp = &tp->tap_if;
1009 ap->a_result =0;
1011 switch(kn->kn_filter) {
1012 case EVFILT_READ:
1013 list = &tp->tap_rsel.si_note;
1014 kn->kn_fop = &tapread_filtops;
1015 kn->kn_hook = (void *)tp;
1016 break;
1017 case EVFILT_WRITE:
1018 /* fall through */
1019 default:
1020 ap->a_result = 1;
1021 rel_mplock();
1022 return(0);
1024 crit_enter();
1025 SLIST_INSERT_HEAD(list, kn, kn_selnext);
1026 crit_exit();
1027 rel_mplock();
1028 return(0);
1031 static int
1032 filt_tapread(struct knote *kn, long hint)
1034 struct tap_softc *tp = (void *)kn->kn_hook;
1036 if (IF_QEMPTY(&tp->tap_devq) == 0) /* XXX serializer */
1037 return(1);
1038 else
1039 return(0);
1042 static void
1043 filt_tapdetach(struct knote *kn)
1045 struct tap_softc *tp = (void *)kn->kn_hook;
1047 SLIST_REMOVE(&tp->tap_rsel.si_note, kn, knote, kn_selnext);
1050 static void
1051 tapifstop(struct tap_softc *tp, int clear_flags)
1053 struct ifnet *ifp = &tp->tap_if;
1055 ASSERT_IFNET_SERIALIZED_ALL(ifp);
1056 IF_DRAIN(&tp->tap_devq);
1057 tp->tap_flags &= ~TAP_CLOSEDOWN;
1058 if (clear_flags)
1059 ifp->if_flags &= ~(IFF_RUNNING | IFF_OACTIVE);
1062 static void
1063 tapifflags(struct tap_softc *tp)
1065 struct ifnet *ifp = &tp->arpcom.ac_if;
1067 ASSERT_IFNET_SERIALIZED_ALL(ifp);
1068 if ((tp->tap_flags & TAP_VMNET) == 0) {
1070 * Only for non-vmnet tap(4)
1072 if (ifp->if_flags & IFF_UP) {
1073 if ((ifp->if_flags & IFF_RUNNING) == 0)
1074 tapifinit(tp);
1075 } else {
1076 tapifstop(tp, 1);
1078 } else {
1079 /* XXX */