2009-10-22 18:49:12 +02:00
|
|
|
/*
|
|
|
|
* QEMU System Emulator
|
|
|
|
*
|
|
|
|
* Copyright (c) 2003-2008 Fabrice Bellard
|
|
|
|
* Copyright (c) 2009 Red Hat, Inc.
|
|
|
|
*
|
|
|
|
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
|
|
* of this software and associated documentation files (the "Software"), to deal
|
|
|
|
* in the Software without restriction, including without limitation the rights
|
|
|
|
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
|
|
* copies of the Software, and to permit persons to whom the Software is
|
|
|
|
* furnished to do so, subject to the following conditions:
|
|
|
|
*
|
|
|
|
* The above copyright notice and this permission notice shall be included in
|
|
|
|
* all copies or substantial portions of the Software.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
|
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
|
|
|
|
* THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
|
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
|
|
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
|
|
|
* THE SOFTWARE.
|
|
|
|
*/
|
|
|
|
|
2016-01-29 18:50:00 +01:00
|
|
|
#include "qemu/osdep.h"
|
2019-05-23 16:35:08 +02:00
|
|
|
#include "qemu-common.h"
|
2012-10-24 08:43:34 +02:00
|
|
|
#include "tap_int.h"
|
|
|
|
#include "tap-linux.h"
|
2009-10-22 18:49:12 +02:00
|
|
|
#include "net/tap.h"
|
|
|
|
|
|
|
|
#include <net/if.h>
|
|
|
|
#include <sys/ioctl.h>
|
|
|
|
|
include/qemu/osdep.h: Don't include qapi/error.h
Commit 57cb38b included qapi/error.h into qemu/osdep.h to get the
Error typedef. Since then, we've moved to include qemu/osdep.h
everywhere. Its file comment explains: "To avoid getting into
possible circular include dependencies, this file should not include
any other QEMU headers, with the exceptions of config-host.h,
compiler.h, os-posix.h and os-win32.h, all of which are doing a
similar job to this file and are under similar constraints."
qapi/error.h doesn't do a similar job, and it doesn't adhere to
similar constraints: it includes qapi-types.h. That's in excess of
100KiB of crap most .c files don't actually need.
Add the typedef to qemu/typedefs.h, and include that instead of
qapi/error.h. Include qapi/error.h in .c files that need it and don't
get it now. Include qapi-types.h in qom/object.h for uint16List.
Update scripts/clean-includes accordingly. Update it further to match
reality: replace config.h by config-target.h, add sysemu/os-posix.h,
sysemu/os-win32.h. Update the list of includes in the qemu/osdep.h
comment quoted above similarly.
This reduces the number of objects depending on qapi/error.h from "all
of them" to less than a third. Unfortunately, the number depending on
qapi-types.h shrinks only a little. More work is needed for that one.
Signed-off-by: Markus Armbruster <armbru@redhat.com>
[Fix compilation without the spice devel packages. - Paolo]
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2016-03-14 09:01:28 +01:00
|
|
|
#include "qapi/error.h"
|
2012-12-17 18:20:00 +01:00
|
|
|
#include "qemu/error-report.h"
|
2016-03-20 18:16:19 +01:00
|
|
|
#include "qemu/cutils.h"
|
2009-10-22 18:49:12 +02:00
|
|
|
|
2010-06-02 19:33:01 +02:00
|
|
|
#define PATH_NET_TUN "/dev/net/tun"
|
|
|
|
|
2013-01-30 12:12:34 +01:00
|
|
|
int tap_open(char *ifname, int ifname_size, int *vnet_hdr,
|
2015-05-15 13:58:58 +02:00
|
|
|
int vnet_hdr_required, int mq_required, Error **errp)
|
2009-10-22 18:49:12 +02:00
|
|
|
{
|
|
|
|
struct ifreq ifr;
|
|
|
|
int fd, ret;
|
2012-11-12 08:13:04 +01:00
|
|
|
int len = sizeof(struct virtio_net_hdr);
|
2013-02-25 10:17:08 +01:00
|
|
|
unsigned int features;
|
2009-10-22 18:49:12 +02:00
|
|
|
|
2010-06-02 19:33:01 +02:00
|
|
|
TFR(fd = open(PATH_NET_TUN, O_RDWR));
|
2009-10-22 18:49:12 +02:00
|
|
|
if (fd < 0) {
|
2015-05-15 13:58:59 +02:00
|
|
|
error_setg_errno(errp, errno, "could not open %s", PATH_NET_TUN);
|
2009-10-22 18:49:12 +02:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
|
|
ifr.ifr_flags = IFF_TAP | IFF_NO_PI;
|
|
|
|
|
2014-01-18 06:38:45 +01:00
|
|
|
if (ioctl(fd, TUNGETFEATURES, &features) == -1) {
|
2017-07-12 15:57:41 +02:00
|
|
|
warn_report("TUNGETFEATURES failed: %s", strerror(errno));
|
2014-01-18 06:38:45 +01:00
|
|
|
features = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (features & IFF_ONE_QUEUE) {
|
2013-02-25 10:17:08 +01:00
|
|
|
ifr.ifr_flags |= IFF_ONE_QUEUE;
|
|
|
|
}
|
2009-10-22 18:49:12 +02:00
|
|
|
|
2013-02-25 10:17:08 +01:00
|
|
|
if (*vnet_hdr) {
|
2014-01-18 06:38:45 +01:00
|
|
|
if (features & IFF_VNET_HDR) {
|
2009-10-22 18:49:12 +02:00
|
|
|
*vnet_hdr = 1;
|
|
|
|
ifr.ifr_flags |= IFF_VNET_HDR;
|
2009-11-25 19:49:34 +01:00
|
|
|
} else {
|
|
|
|
*vnet_hdr = 0;
|
2009-10-22 18:49:12 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (vnet_hdr_required && !*vnet_hdr) {
|
2015-05-15 13:58:59 +02:00
|
|
|
error_setg(errp, "vnet_hdr=1 requested, but no kernel "
|
|
|
|
"support for IFF_VNET_HDR available");
|
2009-10-22 18:49:12 +02:00
|
|
|
close(fd);
|
|
|
|
return -1;
|
|
|
|
}
|
2012-11-12 08:13:04 +01:00
|
|
|
/*
|
|
|
|
* Make sure vnet header size has the default value: for a persistent
|
|
|
|
* tap it might have been modified e.g. by another instance of qemu.
|
|
|
|
* Ignore errors since old kernels do not support this ioctl: in this
|
|
|
|
* case the header size implicitly has the correct value.
|
|
|
|
*/
|
|
|
|
ioctl(fd, TUNSETVNETHDRSZ, &len);
|
2009-10-22 18:49:12 +02:00
|
|
|
}
|
|
|
|
|
2013-01-30 12:12:31 +01:00
|
|
|
if (mq_required) {
|
2014-01-18 06:38:45 +01:00
|
|
|
if (!(features & IFF_MULTI_QUEUE)) {
|
2015-05-15 13:58:59 +02:00
|
|
|
error_setg(errp, "multiqueue required, but no kernel "
|
|
|
|
"support for IFF_MULTI_QUEUE available");
|
2013-01-30 12:12:31 +01:00
|
|
|
close(fd);
|
|
|
|
return -1;
|
|
|
|
} else {
|
|
|
|
ifr.ifr_flags |= IFF_MULTI_QUEUE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2009-10-22 18:49:12 +02:00
|
|
|
if (ifname[0] != '\0')
|
|
|
|
pstrcpy(ifr.ifr_name, IFNAMSIZ, ifname);
|
|
|
|
else
|
|
|
|
pstrcpy(ifr.ifr_name, IFNAMSIZ, "tap%d");
|
|
|
|
ret = ioctl(fd, TUNSETIFF, (void *) &ifr);
|
|
|
|
if (ret != 0) {
|
2011-10-14 20:05:10 +02:00
|
|
|
if (ifname[0] != '\0') {
|
2015-05-15 13:58:59 +02:00
|
|
|
error_setg_errno(errp, errno, "could not configure %s (%s)",
|
|
|
|
PATH_NET_TUN, ifr.ifr_name);
|
2011-10-14 20:05:10 +02:00
|
|
|
} else {
|
2015-05-15 13:58:59 +02:00
|
|
|
error_setg_errno(errp, errno, "could not configure %s",
|
|
|
|
PATH_NET_TUN);
|
2011-10-14 20:05:10 +02:00
|
|
|
}
|
2009-10-22 18:49:12 +02:00
|
|
|
close(fd);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
pstrcpy(ifname, ifname_size, ifr.ifr_name);
|
|
|
|
fcntl(fd, F_SETFL, O_NONBLOCK);
|
|
|
|
return fd;
|
|
|
|
}
|
2009-10-22 18:49:13 +02:00
|
|
|
|
2011-02-01 13:25:40 +01:00
|
|
|
/* sndbuf implements a kind of flow control for tap.
|
|
|
|
* Unfortunately when it's enabled, and packets are sent
|
|
|
|
* to other guests on the same host, the receiver
|
|
|
|
* can lock up the transmitter indefinitely.
|
|
|
|
*
|
|
|
|
* To avoid packet loss, sndbuf should be set to a value lower than the tx
|
|
|
|
* queue capacity of any destination network interface.
|
2009-10-22 18:49:13 +02:00
|
|
|
* Ethernet NICs generally have txqueuelen=1000, so 1Mb is
|
2011-02-01 13:25:40 +01:00
|
|
|
* a good value, given a 1500 byte MTU.
|
2009-10-22 18:49:13 +02:00
|
|
|
*/
|
2011-02-01 13:25:40 +01:00
|
|
|
#define TAP_DEFAULT_SNDBUF 0
|
2009-10-22 18:49:13 +02:00
|
|
|
|
2015-05-15 13:58:55 +02:00
|
|
|
void tap_set_sndbuf(int fd, const NetdevTapOptions *tap, Error **errp)
|
2009-10-22 18:49:13 +02:00
|
|
|
{
|
|
|
|
int sndbuf;
|
|
|
|
|
2012-07-17 16:17:19 +02:00
|
|
|
sndbuf = !tap->has_sndbuf ? TAP_DEFAULT_SNDBUF :
|
|
|
|
tap->sndbuf > INT_MAX ? INT_MAX :
|
|
|
|
tap->sndbuf;
|
|
|
|
|
2009-10-22 18:49:13 +02:00
|
|
|
if (!sndbuf) {
|
|
|
|
sndbuf = INT_MAX;
|
|
|
|
}
|
|
|
|
|
2012-07-17 16:17:19 +02:00
|
|
|
if (ioctl(fd, TUNSETSNDBUF, &sndbuf) == -1 && tap->has_sndbuf) {
|
2015-05-15 13:58:55 +02:00
|
|
|
error_setg_errno(errp, errno, "TUNSETSNDBUF ioctl failed");
|
2009-10-22 18:49:13 +02:00
|
|
|
}
|
|
|
|
}
|
2009-10-22 18:49:14 +02:00
|
|
|
|
net: detect errors from probing vnet hdr flag for TAP devices
When QEMU sets up a tap based network device backend, it mostly ignores errors
reported from various ioctl() calls it makes, assuming the TAP file descriptor
is valid. This assumption can easily be violated when the user is passing in a
pre-opened file descriptor. At best, the ioctls may fail with a -EBADF, but if
the user passes in a bogus FD number that happens to clash with a FD number that
QEMU has opened internally for another reason, a wide variety of errnos may
result, as the TUNGETIFF ioctl number may map to a completely different command
on a different type of file.
By ignoring all these errors, QEMU sets up a zombie network backend that will
never pass any data. Even worse, when QEMU shuts down, or that network backend
is hot-removed, it will close this bogus file descriptor, which could belong to
another QEMU device backend.
There's no obvious guaranteed reliable way to detect that a FD genuinely is a
TAP device, as opposed to a UNIX socket, or pipe, or something else. Checking
the errno from probing vnet hdr flag though, does catch the big common cases.
ie calling TUNGETIFF will return EBADF for an invalid FD, and ENOTTY when FD is
a UNIX socket, or pipe which catches accidental collisions with FDs used for
stdio, or monitor socket.
Previously the example below where bogus fd 9 collides with the FD used for the
chardev saw:
$ ./x86_64-softmmu/qemu-system-x86_64 -netdev tap,id=hostnet0,fd=9 \
-chardev socket,id=charchannel0,path=/tmp/qga,server,nowait \
-monitor stdio -vnc :0
qemu-system-x86_64: -netdev tap,id=hostnet0,fd=9: TUNGETIFF ioctl() failed: Inappropriate ioctl for device
TUNSETOFFLOAD ioctl() failed: Bad address
QEMU 2.9.1 monitor - type 'help' for more information
(qemu) Warning: netdev hostnet0 has no peer
which gives a running QEMU with a zombie network backend.
With this change applied we get an error message and QEMU immediately exits
before carrying on and making a bigger disaster:
$ ./x86_64-softmmu/qemu-system-x86_64 -netdev tap,id=hostnet0,fd=9 \
-chardev socket,id=charchannel0,path=/tmp/qga,server,nowait \
-monitor stdio -vnc :0
qemu-system-x86_64: -netdev tap,id=hostnet0,vhost=on,fd=9: Unable to query TUNGETIFF on FD 9: Inappropriate ioctl for device
Reported-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
Tested-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
Message-id: 20171027085548.3472-1-berrange@redhat.com
[lv: to simplify, don't check on EINVAL with TUNGETIFF as it exists since v2.6.27]
Signed-off-by: Laurent Vivier <lvivier@redhat.com>
Signed-off-by: Jason Wang <jasowang@redhat.com>
2020-07-07 20:45:15 +02:00
|
|
|
int tap_probe_vnet_hdr(int fd, Error **errp)
|
2009-10-22 18:49:14 +02:00
|
|
|
{
|
|
|
|
struct ifreq ifr;
|
|
|
|
|
|
|
|
if (ioctl(fd, TUNGETIFF, &ifr) != 0) {
|
net: detect errors from probing vnet hdr flag for TAP devices
When QEMU sets up a tap based network device backend, it mostly ignores errors
reported from various ioctl() calls it makes, assuming the TAP file descriptor
is valid. This assumption can easily be violated when the user is passing in a
pre-opened file descriptor. At best, the ioctls may fail with a -EBADF, but if
the user passes in a bogus FD number that happens to clash with a FD number that
QEMU has opened internally for another reason, a wide variety of errnos may
result, as the TUNGETIFF ioctl number may map to a completely different command
on a different type of file.
By ignoring all these errors, QEMU sets up a zombie network backend that will
never pass any data. Even worse, when QEMU shuts down, or that network backend
is hot-removed, it will close this bogus file descriptor, which could belong to
another QEMU device backend.
There's no obvious guaranteed reliable way to detect that a FD genuinely is a
TAP device, as opposed to a UNIX socket, or pipe, or something else. Checking
the errno from probing vnet hdr flag though, does catch the big common cases.
ie calling TUNGETIFF will return EBADF for an invalid FD, and ENOTTY when FD is
a UNIX socket, or pipe which catches accidental collisions with FDs used for
stdio, or monitor socket.
Previously the example below where bogus fd 9 collides with the FD used for the
chardev saw:
$ ./x86_64-softmmu/qemu-system-x86_64 -netdev tap,id=hostnet0,fd=9 \
-chardev socket,id=charchannel0,path=/tmp/qga,server,nowait \
-monitor stdio -vnc :0
qemu-system-x86_64: -netdev tap,id=hostnet0,fd=9: TUNGETIFF ioctl() failed: Inappropriate ioctl for device
TUNSETOFFLOAD ioctl() failed: Bad address
QEMU 2.9.1 monitor - type 'help' for more information
(qemu) Warning: netdev hostnet0 has no peer
which gives a running QEMU with a zombie network backend.
With this change applied we get an error message and QEMU immediately exits
before carrying on and making a bigger disaster:
$ ./x86_64-softmmu/qemu-system-x86_64 -netdev tap,id=hostnet0,fd=9 \
-chardev socket,id=charchannel0,path=/tmp/qga,server,nowait \
-monitor stdio -vnc :0
qemu-system-x86_64: -netdev tap,id=hostnet0,vhost=on,fd=9: Unable to query TUNGETIFF on FD 9: Inappropriate ioctl for device
Reported-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
Tested-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
Message-id: 20171027085548.3472-1-berrange@redhat.com
[lv: to simplify, don't check on EINVAL with TUNGETIFF as it exists since v2.6.27]
Signed-off-by: Laurent Vivier <lvivier@redhat.com>
Signed-off-by: Jason Wang <jasowang@redhat.com>
2020-07-07 20:45:15 +02:00
|
|
|
/* TUNGETIFF is available since kernel v2.6.27 */
|
|
|
|
error_setg_errno(errp, errno,
|
|
|
|
"Unable to query TUNGETIFF on FD %d", fd);
|
|
|
|
return -1;
|
2009-10-22 18:49:14 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return ifr.ifr_flags & IFF_VNET_HDR;
|
|
|
|
}
|
2009-10-22 18:49:15 +02:00
|
|
|
|
2009-10-22 18:49:16 +02:00
|
|
|
int tap_probe_has_ufo(int fd)
|
|
|
|
{
|
|
|
|
unsigned offload;
|
|
|
|
|
|
|
|
offload = TUN_F_CSUM | TUN_F_UFO;
|
|
|
|
|
|
|
|
if (ioctl(fd, TUNSETOFFLOAD, offload) < 0)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2010-07-16 10:16:06 +02:00
|
|
|
/* Verify that we can assign given length */
|
|
|
|
int tap_probe_vnet_hdr_len(int fd, int len)
|
|
|
|
{
|
|
|
|
int orig;
|
|
|
|
if (ioctl(fd, TUNGETVNETHDRSZ, &orig) == -1) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (ioctl(fd, TUNSETVNETHDRSZ, &len) == -1) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
/* Restore original length: we can't handle failure. */
|
|
|
|
if (ioctl(fd, TUNSETVNETHDRSZ, &orig) == -1) {
|
|
|
|
fprintf(stderr, "TUNGETVNETHDRSZ ioctl() failed: %s. Exiting.\n",
|
|
|
|
strerror(errno));
|
2013-01-30 12:12:21 +01:00
|
|
|
abort();
|
2010-07-16 10:16:06 +02:00
|
|
|
return -errno;
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
void tap_fd_set_vnet_hdr_len(int fd, int len)
|
|
|
|
{
|
|
|
|
if (ioctl(fd, TUNSETVNETHDRSZ, &len) == -1) {
|
|
|
|
fprintf(stderr, "TUNSETVNETHDRSZ ioctl() failed: %s. Exiting.\n",
|
|
|
|
strerror(errno));
|
2013-01-30 12:12:21 +01:00
|
|
|
abort();
|
2010-07-16 10:16:06 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-06-17 15:23:44 +02:00
|
|
|
int tap_fd_set_vnet_le(int fd, int is_le)
|
|
|
|
{
|
|
|
|
int arg = is_le ? 1 : 0;
|
|
|
|
|
|
|
|
if (!ioctl(fd, TUNSETVNETLE, &arg)) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check if our kernel supports TUNSETVNETLE */
|
|
|
|
if (errno == EINVAL) {
|
|
|
|
return -errno;
|
|
|
|
}
|
|
|
|
|
2015-06-29 22:56:26 +02:00
|
|
|
error_report("TUNSETVNETLE ioctl() failed: %s.", strerror(errno));
|
2015-06-17 15:23:44 +02:00
|
|
|
abort();
|
|
|
|
}
|
|
|
|
|
|
|
|
int tap_fd_set_vnet_be(int fd, int is_be)
|
|
|
|
{
|
|
|
|
int arg = is_be ? 1 : 0;
|
|
|
|
|
|
|
|
if (!ioctl(fd, TUNSETVNETBE, &arg)) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check if our kernel supports TUNSETVNETBE */
|
|
|
|
if (errno == EINVAL) {
|
|
|
|
return -errno;
|
|
|
|
}
|
|
|
|
|
2015-06-29 22:56:26 +02:00
|
|
|
error_report("TUNSETVNETBE ioctl() failed: %s.", strerror(errno));
|
2015-06-17 15:23:44 +02:00
|
|
|
abort();
|
|
|
|
}
|
|
|
|
|
2009-10-22 18:49:15 +02:00
|
|
|
void tap_fd_set_offload(int fd, int csum, int tso4,
|
|
|
|
int tso6, int ecn, int ufo)
|
|
|
|
{
|
|
|
|
unsigned int offload = 0;
|
|
|
|
|
2009-11-25 19:49:35 +01:00
|
|
|
/* Check if our kernel supports TUNSETOFFLOAD */
|
|
|
|
if (ioctl(fd, TUNSETOFFLOAD, 0) != 0 && errno == EINVAL) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2009-10-22 18:49:15 +02:00
|
|
|
if (csum) {
|
|
|
|
offload |= TUN_F_CSUM;
|
|
|
|
if (tso4)
|
|
|
|
offload |= TUN_F_TSO4;
|
|
|
|
if (tso6)
|
|
|
|
offload |= TUN_F_TSO6;
|
|
|
|
if ((tso4 || tso6) && ecn)
|
|
|
|
offload |= TUN_F_TSO_ECN;
|
|
|
|
if (ufo)
|
|
|
|
offload |= TUN_F_UFO;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ioctl(fd, TUNSETOFFLOAD, offload) != 0) {
|
|
|
|
offload &= ~TUN_F_UFO;
|
|
|
|
if (ioctl(fd, TUNSETOFFLOAD, offload) != 0) {
|
|
|
|
fprintf(stderr, "TUNSETOFFLOAD ioctl() failed: %s\n",
|
|
|
|
strerror(errno));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2013-01-30 12:12:31 +01:00
|
|
|
|
|
|
|
/* Enable a specific queue of tap. */
|
|
|
|
int tap_fd_enable(int fd)
|
|
|
|
{
|
|
|
|
struct ifreq ifr;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
|
|
|
|
|
|
ifr.ifr_flags = IFF_ATTACH_QUEUE;
|
|
|
|
ret = ioctl(fd, TUNSETQUEUE, (void *) &ifr);
|
|
|
|
|
|
|
|
if (ret != 0) {
|
|
|
|
error_report("could not enable queue");
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Disable a specific queue of tap/ */
|
|
|
|
int tap_fd_disable(int fd)
|
|
|
|
{
|
|
|
|
struct ifreq ifr;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
|
|
|
|
|
|
ifr.ifr_flags = IFF_DETACH_QUEUE;
|
|
|
|
ret = ioctl(fd, TUNSETQUEUE, (void *) &ifr);
|
|
|
|
|
|
|
|
if (ret != 0) {
|
|
|
|
error_report("could not disable queue");
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2013-01-30 12:12:33 +01:00
|
|
|
int tap_fd_get_ifname(int fd, char *ifname)
|
|
|
|
{
|
|
|
|
struct ifreq ifr;
|
|
|
|
|
|
|
|
if (ioctl(fd, TUNGETIFF, &ifr) != 0) {
|
|
|
|
error_report("TUNGETIFF ioctl() failed: %s",
|
|
|
|
strerror(errno));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
pstrcpy(ifname, sizeof(ifr.ifr_name), ifr.ifr_name);
|
|
|
|
return 0;
|
|
|
|
}
|