xref: /openbmc/qemu/net/tap-win32.c (revision 1fd6bb44)
1 /*
2  *  TAP-Win32 -- A kernel driver to provide virtual tap device functionality
3  *               on Windows.  Originally derived from the CIPE-Win32
4  *               project by Damion K. Wilson, with extensive modifications by
5  *               James Yonan.
6  *
7  *  All source code which derives from the CIPE-Win32 project is
8  *  Copyright (C) Damion K. Wilson, 2003, and is released under the
9  *  GPL version 2 (see below).
10  *
11  *  All other source code is Copyright (C) James Yonan, 2003-2004,
12  *  and is released under the GPL version 2 (see below).
13  *
14  *  This program is free software; you can redistribute it and/or modify
15  *  it under the terms of the GNU General Public License as published by
16  *  the Free Software Foundation; either version 2 of the License, or
17  *  (at your option) any later version.
18  *
19  *  This program is distributed in the hope that it will be useful,
20  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
21  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
22  *  GNU General Public License for more details.
23  *
24  *  You should have received a copy of the GNU General Public License
25  *  along with this program (see the file COPYING included with this
26  *  distribution); if not, see <http://www.gnu.org/licenses/>.
27  */
28 
29 #include "tap_int.h"
30 
31 #include "qemu-common.h"
32 #include "clients.h"            /* net_init_tap */
33 #include "net/net.h"
34 #include "net/tap.h"            /* tap_has_ufo, ... */
35 #include "sysemu/sysemu.h"
36 #include "qemu/error-report.h"
37 #include <stdio.h>
38 #include <windows.h>
39 #include <winioctl.h>
40 
41 //=============
42 // TAP IOCTLs
43 //=============
44 
45 #define TAP_CONTROL_CODE(request,method) \
46   CTL_CODE (FILE_DEVICE_UNKNOWN, request, method, FILE_ANY_ACCESS)
47 
48 #define TAP_IOCTL_GET_MAC               TAP_CONTROL_CODE (1, METHOD_BUFFERED)
49 #define TAP_IOCTL_GET_VERSION           TAP_CONTROL_CODE (2, METHOD_BUFFERED)
50 #define TAP_IOCTL_GET_MTU               TAP_CONTROL_CODE (3, METHOD_BUFFERED)
51 #define TAP_IOCTL_GET_INFO              TAP_CONTROL_CODE (4, METHOD_BUFFERED)
52 #define TAP_IOCTL_CONFIG_POINT_TO_POINT TAP_CONTROL_CODE (5, METHOD_BUFFERED)
53 #define TAP_IOCTL_SET_MEDIA_STATUS      TAP_CONTROL_CODE (6, METHOD_BUFFERED)
54 #define TAP_IOCTL_CONFIG_DHCP_MASQ      TAP_CONTROL_CODE (7, METHOD_BUFFERED)
55 #define TAP_IOCTL_GET_LOG_LINE          TAP_CONTROL_CODE (8, METHOD_BUFFERED)
56 #define TAP_IOCTL_CONFIG_DHCP_SET_OPT   TAP_CONTROL_CODE (9, METHOD_BUFFERED)
57 
58 //=================
59 // Registry keys
60 //=================
61 
62 #define ADAPTER_KEY "SYSTEM\\CurrentControlSet\\Control\\Class\\{4D36E972-E325-11CE-BFC1-08002BE10318}"
63 
64 #define NETWORK_CONNECTIONS_KEY "SYSTEM\\CurrentControlSet\\Control\\Network\\{4D36E972-E325-11CE-BFC1-08002BE10318}"
65 
66 //======================
67 // Filesystem prefixes
68 //======================
69 
70 #define USERMODEDEVICEDIR "\\\\.\\Global\\"
71 #define TAPSUFFIX         ".tap"
72 
73 
74 //======================
75 // Compile time configuration
76 //======================
77 
78 //#define DEBUG_TAP_WIN32
79 
80 #define TUN_ASYNCHRONOUS_WRITES 1
81 
82 #define TUN_BUFFER_SIZE 1560
83 #define TUN_MAX_BUFFER_COUNT 32
84 
85 /*
86  * The data member "buffer" must be the first element in the tun_buffer
87  * structure. See the function, tap_win32_free_buffer.
88  */
89 typedef struct tun_buffer_s {
90     unsigned char buffer [TUN_BUFFER_SIZE];
91     unsigned long read_size;
92     struct tun_buffer_s* next;
93 } tun_buffer_t;
94 
95 typedef struct tap_win32_overlapped {
96     HANDLE handle;
97     HANDLE read_event;
98     HANDLE write_event;
99     HANDLE output_queue_semaphore;
100     HANDLE free_list_semaphore;
101     HANDLE tap_semaphore;
102     CRITICAL_SECTION output_queue_cs;
103     CRITICAL_SECTION free_list_cs;
104     OVERLAPPED read_overlapped;
105     OVERLAPPED write_overlapped;
106     tun_buffer_t buffers[TUN_MAX_BUFFER_COUNT];
107     tun_buffer_t* free_list;
108     tun_buffer_t* output_queue_front;
109     tun_buffer_t* output_queue_back;
110 } tap_win32_overlapped_t;
111 
112 static tap_win32_overlapped_t tap_overlapped;
113 
114 static tun_buffer_t* get_buffer_from_free_list(tap_win32_overlapped_t* const overlapped)
115 {
116     tun_buffer_t* buffer = NULL;
117     WaitForSingleObject(overlapped->free_list_semaphore, INFINITE);
118     EnterCriticalSection(&overlapped->free_list_cs);
119     buffer = overlapped->free_list;
120 //    assert(buffer != NULL);
121     overlapped->free_list = buffer->next;
122     LeaveCriticalSection(&overlapped->free_list_cs);
123     buffer->next = NULL;
124     return buffer;
125 }
126 
127 static void put_buffer_on_free_list(tap_win32_overlapped_t* const overlapped, tun_buffer_t* const buffer)
128 {
129     EnterCriticalSection(&overlapped->free_list_cs);
130     buffer->next = overlapped->free_list;
131     overlapped->free_list = buffer;
132     LeaveCriticalSection(&overlapped->free_list_cs);
133     ReleaseSemaphore(overlapped->free_list_semaphore, 1, NULL);
134 }
135 
136 static tun_buffer_t* get_buffer_from_output_queue(tap_win32_overlapped_t* const overlapped, const int block)
137 {
138     tun_buffer_t* buffer = NULL;
139     DWORD result, timeout = block ? INFINITE : 0L;
140 
141     // Non-blocking call
142     result = WaitForSingleObject(overlapped->output_queue_semaphore, timeout);
143 
144     switch (result)
145     {
146         // The semaphore object was signaled.
147         case WAIT_OBJECT_0:
148             EnterCriticalSection(&overlapped->output_queue_cs);
149 
150             buffer = overlapped->output_queue_front;
151             overlapped->output_queue_front = buffer->next;
152 
153             if(overlapped->output_queue_front == NULL) {
154                 overlapped->output_queue_back = NULL;
155             }
156 
157             LeaveCriticalSection(&overlapped->output_queue_cs);
158             break;
159 
160         // Semaphore was nonsignaled, so a time-out occurred.
161         case WAIT_TIMEOUT:
162             // Cannot open another window.
163             break;
164     }
165 
166     return buffer;
167 }
168 
169 static tun_buffer_t* get_buffer_from_output_queue_immediate (tap_win32_overlapped_t* const overlapped)
170 {
171     return get_buffer_from_output_queue(overlapped, 0);
172 }
173 
174 static void put_buffer_on_output_queue(tap_win32_overlapped_t* const overlapped, tun_buffer_t* const buffer)
175 {
176     EnterCriticalSection(&overlapped->output_queue_cs);
177 
178     if(overlapped->output_queue_front == NULL && overlapped->output_queue_back == NULL) {
179         overlapped->output_queue_front = overlapped->output_queue_back = buffer;
180     } else {
181         buffer->next = NULL;
182         overlapped->output_queue_back->next = buffer;
183         overlapped->output_queue_back = buffer;
184     }
185 
186     LeaveCriticalSection(&overlapped->output_queue_cs);
187 
188     ReleaseSemaphore(overlapped->output_queue_semaphore, 1, NULL);
189 }
190 
191 
192 static int is_tap_win32_dev(const char *guid)
193 {
194     HKEY netcard_key;
195     LONG status;
196     DWORD len;
197     int i = 0;
198 
199     status = RegOpenKeyEx(
200         HKEY_LOCAL_MACHINE,
201         ADAPTER_KEY,
202         0,
203         KEY_READ,
204         &netcard_key);
205 
206     if (status != ERROR_SUCCESS) {
207         return FALSE;
208     }
209 
210     for (;;) {
211         char enum_name[256];
212         char unit_string[256];
213         HKEY unit_key;
214         char component_id_string[] = "ComponentId";
215         char component_id[256];
216         char net_cfg_instance_id_string[] = "NetCfgInstanceId";
217         char net_cfg_instance_id[256];
218         DWORD data_type;
219 
220         len = sizeof (enum_name);
221         status = RegEnumKeyEx(
222             netcard_key,
223             i,
224             enum_name,
225             &len,
226             NULL,
227             NULL,
228             NULL,
229             NULL);
230 
231         if (status == ERROR_NO_MORE_ITEMS)
232             break;
233         else if (status != ERROR_SUCCESS) {
234             return FALSE;
235         }
236 
237         snprintf (unit_string, sizeof(unit_string), "%s\\%s",
238                   ADAPTER_KEY, enum_name);
239 
240         status = RegOpenKeyEx(
241             HKEY_LOCAL_MACHINE,
242             unit_string,
243             0,
244             KEY_READ,
245             &unit_key);
246 
247         if (status != ERROR_SUCCESS) {
248             return FALSE;
249         } else {
250             len = sizeof (component_id);
251             status = RegQueryValueEx(
252                 unit_key,
253                 component_id_string,
254                 NULL,
255                 &data_type,
256                 (LPBYTE)component_id,
257                 &len);
258 
259             if (!(status != ERROR_SUCCESS || data_type != REG_SZ)) {
260                 len = sizeof (net_cfg_instance_id);
261                 status = RegQueryValueEx(
262                     unit_key,
263                     net_cfg_instance_id_string,
264                     NULL,
265                     &data_type,
266                     (LPBYTE)net_cfg_instance_id,
267                     &len);
268 
269                 if (status == ERROR_SUCCESS && data_type == REG_SZ) {
270                     if (/* !strcmp (component_id, TAP_COMPONENT_ID) &&*/
271                         !strcmp (net_cfg_instance_id, guid)) {
272                         RegCloseKey (unit_key);
273                         RegCloseKey (netcard_key);
274                         return TRUE;
275                     }
276                 }
277             }
278             RegCloseKey (unit_key);
279         }
280         ++i;
281     }
282 
283     RegCloseKey (netcard_key);
284     return FALSE;
285 }
286 
287 static int get_device_guid(
288     char *name,
289     int name_size,
290     char *actual_name,
291     int actual_name_size)
292 {
293     LONG status;
294     HKEY control_net_key;
295     DWORD len;
296     int i = 0;
297     int stop = 0;
298 
299     status = RegOpenKeyEx(
300         HKEY_LOCAL_MACHINE,
301         NETWORK_CONNECTIONS_KEY,
302         0,
303         KEY_READ,
304         &control_net_key);
305 
306     if (status != ERROR_SUCCESS) {
307         return -1;
308     }
309 
310     while (!stop)
311     {
312         char enum_name[256];
313         char connection_string[256];
314         HKEY connection_key;
315         char name_data[256];
316         DWORD name_type;
317         const char name_string[] = "Name";
318 
319         len = sizeof (enum_name);
320         status = RegEnumKeyEx(
321             control_net_key,
322             i,
323             enum_name,
324             &len,
325             NULL,
326             NULL,
327             NULL,
328             NULL);
329 
330         if (status == ERROR_NO_MORE_ITEMS)
331             break;
332         else if (status != ERROR_SUCCESS) {
333             return -1;
334         }
335 
336         snprintf(connection_string,
337              sizeof(connection_string),
338              "%s\\%s\\Connection",
339              NETWORK_CONNECTIONS_KEY, enum_name);
340 
341         status = RegOpenKeyEx(
342             HKEY_LOCAL_MACHINE,
343             connection_string,
344             0,
345             KEY_READ,
346             &connection_key);
347 
348         if (status == ERROR_SUCCESS) {
349             len = sizeof (name_data);
350             status = RegQueryValueEx(
351                 connection_key,
352                 name_string,
353                 NULL,
354                 &name_type,
355                 (LPBYTE)name_data,
356                 &len);
357 
358             if (status != ERROR_SUCCESS || name_type != REG_SZ) {
359                     return -1;
360             }
361             else {
362                 if (is_tap_win32_dev(enum_name)) {
363                     snprintf(name, name_size, "%s", enum_name);
364                     if (actual_name) {
365                         if (strcmp(actual_name, "") != 0) {
366                             if (strcmp(name_data, actual_name) != 0) {
367                                 RegCloseKey (connection_key);
368                                 ++i;
369                                 continue;
370                             }
371                         }
372                         else {
373                             snprintf(actual_name, actual_name_size, "%s", name_data);
374                         }
375                     }
376                     stop = 1;
377                 }
378             }
379 
380             RegCloseKey (connection_key);
381         }
382         ++i;
383     }
384 
385     RegCloseKey (control_net_key);
386 
387     if (stop == 0)
388         return -1;
389 
390     return 0;
391 }
392 
393 static int tap_win32_set_status(HANDLE handle, int status)
394 {
395     unsigned long len = 0;
396 
397     return DeviceIoControl(handle, TAP_IOCTL_SET_MEDIA_STATUS,
398                 &status, sizeof (status),
399                 &status, sizeof (status), &len, NULL);
400 }
401 
402 static void tap_win32_overlapped_init(tap_win32_overlapped_t* const overlapped, const HANDLE handle)
403 {
404     overlapped->handle = handle;
405 
406     overlapped->read_event = CreateEvent(NULL, FALSE, FALSE, NULL);
407     overlapped->write_event = CreateEvent(NULL, FALSE, FALSE, NULL);
408 
409     overlapped->read_overlapped.Offset = 0;
410     overlapped->read_overlapped.OffsetHigh = 0;
411     overlapped->read_overlapped.hEvent = overlapped->read_event;
412 
413     overlapped->write_overlapped.Offset = 0;
414     overlapped->write_overlapped.OffsetHigh = 0;
415     overlapped->write_overlapped.hEvent = overlapped->write_event;
416 
417     InitializeCriticalSection(&overlapped->output_queue_cs);
418     InitializeCriticalSection(&overlapped->free_list_cs);
419 
420     overlapped->output_queue_semaphore = CreateSemaphore(
421         NULL,   // default security attributes
422         0,   // initial count
423         TUN_MAX_BUFFER_COUNT,   // maximum count
424         NULL);  // unnamed semaphore
425 
426     if(!overlapped->output_queue_semaphore)  {
427         fprintf(stderr, "error creating output queue semaphore!\n");
428     }
429 
430     overlapped->free_list_semaphore = CreateSemaphore(
431         NULL,   // default security attributes
432         TUN_MAX_BUFFER_COUNT,   // initial count
433         TUN_MAX_BUFFER_COUNT,   // maximum count
434         NULL);  // unnamed semaphore
435 
436     if(!overlapped->free_list_semaphore)  {
437         fprintf(stderr, "error creating free list semaphore!\n");
438     }
439 
440     overlapped->free_list = overlapped->output_queue_front = overlapped->output_queue_back = NULL;
441 
442     {
443         unsigned index;
444         for(index = 0; index < TUN_MAX_BUFFER_COUNT; index++) {
445             tun_buffer_t* element = &overlapped->buffers[index];
446             element->next = overlapped->free_list;
447             overlapped->free_list = element;
448         }
449     }
450     /* To count buffers, initially no-signal. */
451     overlapped->tap_semaphore = CreateSemaphore(NULL, 0, TUN_MAX_BUFFER_COUNT, NULL);
452     if(!overlapped->tap_semaphore)
453         fprintf(stderr, "error creating tap_semaphore.\n");
454 }
455 
456 static int tap_win32_write(tap_win32_overlapped_t *overlapped,
457                            const void *buffer, unsigned long size)
458 {
459     unsigned long write_size;
460     BOOL result;
461     DWORD error;
462 
463     result = GetOverlappedResult( overlapped->handle, &overlapped->write_overlapped,
464                                   &write_size, FALSE);
465 
466     if (!result && GetLastError() == ERROR_IO_INCOMPLETE)
467         WaitForSingleObject(overlapped->write_event, INFINITE);
468 
469     result = WriteFile(overlapped->handle, buffer, size,
470                        &write_size, &overlapped->write_overlapped);
471 
472     if (!result) {
473         switch (error = GetLastError())
474         {
475         case ERROR_IO_PENDING:
476 #ifndef TUN_ASYNCHRONOUS_WRITES
477             WaitForSingleObject(overlapped->write_event, INFINITE);
478 #endif
479             break;
480         default:
481             return -1;
482         }
483     }
484 
485     return write_size;
486 }
487 
488 static DWORD WINAPI tap_win32_thread_entry(LPVOID param)
489 {
490     tap_win32_overlapped_t *overlapped = (tap_win32_overlapped_t*)param;
491     unsigned long read_size;
492     BOOL result;
493     DWORD dwError;
494     tun_buffer_t* buffer = get_buffer_from_free_list(overlapped);
495 
496 
497     for (;;) {
498         result = ReadFile(overlapped->handle,
499                           buffer->buffer,
500                           sizeof(buffer->buffer),
501                           &read_size,
502                           &overlapped->read_overlapped);
503         if (!result) {
504             dwError = GetLastError();
505             if (dwError == ERROR_IO_PENDING) {
506                 WaitForSingleObject(overlapped->read_event, INFINITE);
507                 result = GetOverlappedResult( overlapped->handle, &overlapped->read_overlapped,
508                                               &read_size, FALSE);
509                 if (!result) {
510 #ifdef DEBUG_TAP_WIN32
511                     LPVOID lpBuffer;
512                     dwError = GetLastError();
513                     FormatMessage( FORMAT_MESSAGE_ALLOCATE_BUFFER | FORMAT_MESSAGE_FROM_SYSTEM,
514                                    NULL, dwError, MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT),
515                                    (LPTSTR) & lpBuffer, 0, NULL );
516                     fprintf(stderr, "Tap-Win32: Error GetOverlappedResult %d - %s\n", dwError, lpBuffer);
517                     LocalFree( lpBuffer );
518 #endif
519                 }
520             } else {
521 #ifdef DEBUG_TAP_WIN32
522                 LPVOID lpBuffer;
523                 FormatMessage( FORMAT_MESSAGE_ALLOCATE_BUFFER | FORMAT_MESSAGE_FROM_SYSTEM,
524                                NULL, dwError, MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT),
525                                (LPTSTR) & lpBuffer, 0, NULL );
526                 fprintf(stderr, "Tap-Win32: Error ReadFile %d - %s\n", dwError, lpBuffer);
527                 LocalFree( lpBuffer );
528 #endif
529             }
530         }
531 
532         if(read_size > 0) {
533             buffer->read_size = read_size;
534             put_buffer_on_output_queue(overlapped, buffer);
535             ReleaseSemaphore(overlapped->tap_semaphore, 1, NULL);
536             buffer = get_buffer_from_free_list(overlapped);
537         }
538     }
539 
540     return 0;
541 }
542 
543 static int tap_win32_read(tap_win32_overlapped_t *overlapped,
544                           uint8_t **pbuf, int max_size)
545 {
546     int size = 0;
547 
548     tun_buffer_t* buffer = get_buffer_from_output_queue_immediate(overlapped);
549 
550     if(buffer != NULL) {
551         *pbuf = buffer->buffer;
552         size = (int)buffer->read_size;
553         if(size > max_size) {
554             size = max_size;
555         }
556     }
557 
558     return size;
559 }
560 
561 static void tap_win32_free_buffer(tap_win32_overlapped_t *overlapped,
562                                   uint8_t *pbuf)
563 {
564     tun_buffer_t* buffer = (tun_buffer_t*)pbuf;
565     put_buffer_on_free_list(overlapped, buffer);
566 }
567 
568 static int tap_win32_open(tap_win32_overlapped_t **phandle,
569                           const char *preferred_name)
570 {
571     char device_path[256];
572     char device_guid[0x100];
573     int rc;
574     HANDLE handle;
575     BOOL bret;
576     char name_buffer[0x100] = {0, };
577     struct {
578         unsigned long major;
579         unsigned long minor;
580         unsigned long debug;
581     } version;
582     DWORD version_len;
583     DWORD idThread;
584 
585     if (preferred_name != NULL) {
586         snprintf(name_buffer, sizeof(name_buffer), "%s", preferred_name);
587     }
588 
589     rc = get_device_guid(device_guid, sizeof(device_guid), name_buffer, sizeof(name_buffer));
590     if (rc)
591         return -1;
592 
593     snprintf (device_path, sizeof(device_path), "%s%s%s",
594               USERMODEDEVICEDIR,
595               device_guid,
596               TAPSUFFIX);
597 
598     handle = CreateFile (
599         device_path,
600         GENERIC_READ | GENERIC_WRITE,
601         0,
602         0,
603         OPEN_EXISTING,
604         FILE_ATTRIBUTE_SYSTEM | FILE_FLAG_OVERLAPPED,
605         0 );
606 
607     if (handle == INVALID_HANDLE_VALUE) {
608         return -1;
609     }
610 
611     bret = DeviceIoControl(handle, TAP_IOCTL_GET_VERSION,
612                            &version, sizeof (version),
613                            &version, sizeof (version), &version_len, NULL);
614 
615     if (bret == FALSE) {
616         CloseHandle(handle);
617         return -1;
618     }
619 
620     if (!tap_win32_set_status(handle, TRUE)) {
621         return -1;
622     }
623 
624     tap_win32_overlapped_init(&tap_overlapped, handle);
625 
626     *phandle = &tap_overlapped;
627 
628     CreateThread(NULL, 0, tap_win32_thread_entry,
629                  (LPVOID)&tap_overlapped, 0, &idThread);
630     return 0;
631 }
632 
633 /********************************************/
634 
635  typedef struct TAPState {
636      NetClientState nc;
637      tap_win32_overlapped_t *handle;
638  } TAPState;
639 
640 static void tap_cleanup(NetClientState *nc)
641 {
642     TAPState *s = DO_UPCAST(TAPState, nc, nc);
643 
644     qemu_del_wait_object(s->handle->tap_semaphore, NULL, NULL);
645 
646     /* FIXME: need to kill thread and close file handle:
647        tap_win32_close(s);
648     */
649 }
650 
651 static ssize_t tap_receive(NetClientState *nc, const uint8_t *buf, size_t size)
652 {
653     TAPState *s = DO_UPCAST(TAPState, nc, nc);
654 
655     return tap_win32_write(s->handle, buf, size);
656 }
657 
658 static void tap_win32_send(void *opaque)
659 {
660     TAPState *s = opaque;
661     uint8_t *buf;
662     int max_size = 4096;
663     int size;
664 
665     size = tap_win32_read(s->handle, &buf, max_size);
666     if (size > 0) {
667         qemu_send_packet(&s->nc, buf, size);
668         tap_win32_free_buffer(s->handle, buf);
669     }
670 }
671 
672 static NetClientInfo net_tap_win32_info = {
673     .type = NET_CLIENT_OPTIONS_KIND_TAP,
674     .size = sizeof(TAPState),
675     .receive = tap_receive,
676     .cleanup = tap_cleanup,
677 };
678 
679 static int tap_win32_init(NetClientState *peer, const char *model,
680                           const char *name, const char *ifname)
681 {
682     NetClientState *nc;
683     TAPState *s;
684     tap_win32_overlapped_t *handle;
685 
686     if (tap_win32_open(&handle, ifname) < 0) {
687         printf("tap: Could not open '%s'\n", ifname);
688         return -1;
689     }
690 
691     nc = qemu_new_net_client(&net_tap_win32_info, peer, model, name);
692 
693     s = DO_UPCAST(TAPState, nc, nc);
694 
695     snprintf(s->nc.info_str, sizeof(s->nc.info_str),
696              "tap: ifname=%s", ifname);
697 
698     s->handle = handle;
699 
700     qemu_add_wait_object(s->handle->tap_semaphore, tap_win32_send, s);
701 
702     return 0;
703 }
704 
705 int net_init_tap(const NetClientOptions *opts, const char *name,
706                  NetClientState *peer)
707 {
708     const NetdevTapOptions *tap;
709 
710     assert(opts->kind == NET_CLIENT_OPTIONS_KIND_TAP);
711     tap = opts->tap;
712 
713     if (!tap->has_ifname) {
714         error_report("tap: no interface name");
715         return -1;
716     }
717 
718     if (tap_win32_init(peer, "tap", name, tap->ifname) == -1) {
719         return -1;
720     }
721 
722     return 0;
723 }
724 
725 bool tap_has_ufo(NetClientState *nc)
726 {
727     return false;
728 }
729 
730 int tap_has_vnet_hdr(NetClientState *nc)
731 {
732     return 0;
733 }
734 
735 int tap_probe_vnet_hdr_len(int fd, int len)
736 {
737     return 0;
738 }
739 
740 void tap_fd_set_vnet_hdr_len(int fd, int len)
741 {
742 }
743 
744 void tap_using_vnet_hdr(NetClientState *nc, bool using_vnet_hdr)
745 {
746 }
747 
748 void tap_set_offload(NetClientState *nc, int csum, int tso4,
749                      int tso6, int ecn, int ufo)
750 {
751 }
752 
753 struct vhost_net *tap_get_vhost_net(NetClientState *nc)
754 {
755     return NULL;
756 }
757 
758 int tap_has_vnet_hdr_len(NetClientState *nc, int len)
759 {
760     return 0;
761 }
762 
763 void tap_set_vnet_hdr_len(NetClientState *nc, int len)
764 {
765     abort();
766 }
767 
768 int tap_enable(NetClientState *nc)
769 {
770     abort();
771 }
772 
773 int tap_disable(NetClientState *nc)
774 {
775     abort();
776 }
777