VirtualBox

source: vbox/trunk/src/VBox/Devices/Network/DrvNAT.cpp@ 24635

Last change on this file since 24635 was 24635, checked in by vboxsync, 15 years ago

slirp_urg_output: increase packet counter after possible failure returns

  • Property svn:eol-style set to native
  • Property svn:keywords set to Author Date Id Revision
File size: 42.0 KB
Line 
1/* $Id: DrvNAT.cpp 24635 2009-11-13 12:55:35Z vboxsync $ */
2/** @file
3 * DrvNAT - NAT network transport driver.
4 */
5
6/*
7 * Copyright (C) 2006-2009 Sun Microsystems, Inc.
8 *
9 * This file is part of VirtualBox Open Source Edition (OSE), as
10 * available from http://www.virtualbox.org. This file is free software;
11 * you can redistribute it and/or modify it under the terms of the GNU
12 * General Public License (GPL) as published by the Free Software
13 * Foundation, in version 2 as it comes in the "COPYING" file of the
14 * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
15 * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
16 *
17 * Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa
18 * Clara, CA 95054 USA or visit http://www.sun.com if you need
19 * additional information or have any questions.
20 */
21
22
23/*******************************************************************************
24* Header Files *
25*******************************************************************************/
26#define LOG_GROUP LOG_GROUP_DRV_NAT
27#define __STDC_LIMIT_MACROS
28#define __STDC_CONSTANT_MACROS
29#include "slirp/libslirp.h"
30#include "slirp/ctl.h"
31#include <VBox/pdmdrv.h>
32#include <iprt/assert.h>
33#include <iprt/file.h>
34#include <iprt/mem.h>
35#include <iprt/string.h>
36#include <iprt/critsect.h>
37#include <iprt/cidr.h>
38#include <iprt/stream.h>
39
40#include "Builtins.h"
41
42#ifndef RT_OS_WINDOWS
43# include <unistd.h>
44# include <fcntl.h>
45# include <poll.h>
46# include <errno.h>
47#endif
48#ifdef RT_OS_FREEBSD
49# include <netinet/in.h>
50#endif
51#include <iprt/semaphore.h>
52#include <iprt/req.h>
53
54#define COUNTERS_INIT
55#include "counters.h"
56
57
58/*******************************************************************************
59* Defined Constants And Macros *
60*******************************************************************************/
61#define GET_EXTRADATA(pthis, node, name, rc, type, type_name, var) \
62do { \
63 (rc) = CFGMR3Query ## type((node), name, &(var)); \
64 if (RT_FAILURE((rc)) && (rc) != VERR_CFGM_VALUE_NOT_FOUND) \
65 return PDMDrvHlpVMSetError((pthis)->pDrvIns, (rc), RT_SRC_POS, N_("NAT#%d: configuration query for \""name"\" " #type_name " failed"), \
66 (pthis)->pDrvIns->iInstance); \
67} while (0)
68
69#define GET_ED_STRICT(pthis, node, name, rc, type, type_name, var) \
70do { \
71 (rc) = CFGMR3Query ## type((node), name, &(var)); \
72 if (RT_FAILURE((rc))) \
73 return PDMDrvHlpVMSetError((pthis)->pDrvIns, (rc), RT_SRC_POS, N_("NAT#%d: configuration query for \""name"\" " #type_name " failed"), \
74 (pthis)->pDrvIns->iInstance); \
75} while (0)
76
77#define GET_EXTRADATA_N(pthis, node, name, rc, type, type_name, var, var_size) \
78do { \
79 (rc) = CFGMR3Query ## type((node), name, &(var), var_size); \
80 if (RT_FAILURE((rc)) && (rc) != VERR_CFGM_VALUE_NOT_FOUND) \
81 return PDMDrvHlpVMSetError((pthis)->pDrvIns, (rc), RT_SRC_POS, N_("NAT#%d: configuration query for \""name"\" " #type_name " failed"), \
82 (pthis)->pDrvIns->iInstance); \
83} while (0)
84
85#define GET_BOOL(rc, pthis, node, name, var) \
86 GET_EXTRADATA(pthis, node, name, (rc), Bool, bolean, (var))
87#define GET_STRING(rc, pthis, node, name, var, var_size) \
88 GET_EXTRADATA_N(pthis, node, name, (rc), String, string, (var), (var_size))
89#define GET_STRING_ALLOC(rc, pthis, node, name, var) \
90 GET_EXTRADATA(pthis, node, name, (rc), StringAlloc, string, (var))
91#define GET_S32(rc, pthis, node, name, var) \
92 GET_EXTRADATA(pthis, node, name, (rc), S32, int, (var))
93#define GET_S32_STRICT(rc, pthis, node, name, var) \
94 GET_ED_STRICT(pthis, node, name, (rc), S32, int, (var))
95
96
97
98#define DO_GET_IP(rc, node, instance, status, x) \
99do { \
100 char sz##x[32]; \
101 GET_STRING((rc), (node), (instance), #x, sz ## x[0], sizeof(sz ## x)); \
102 if (rc != VERR_CFGM_VALUE_NOT_FOUND) \
103 (status) = inet_aton(sz ## x, &x); \
104} while (0)
105
106#define GETIP_DEF(rc, node, instance, x, def) \
107do \
108{ \
109 int status = 0; \
110 DO_GET_IP((rc), (node), (instance), status, x); \
111 if (status == 0 || rc == VERR_CFGM_VALUE_NOT_FOUND) \
112 x.s_addr = def; \
113} while (0)
114
115/*******************************************************************************
116* Structures and Typedefs *
117*******************************************************************************/
118/**
119 * NAT network transport driver instance data.
120 */
121typedef struct DRVNAT
122{
123 /** The network interface. */
124 PDMINETWORKCONNECTOR INetworkConnector;
125 /** The port we're attached to. */
126 PPDMINETWORKPORT pPort;
127 /** The network config of the port we're attached to. */
128 PPDMINETWORKCONFIG pConfig;
129 /** Pointer to the driver instance. */
130 PPDMDRVINS pDrvIns;
131 /** Link state */
132 PDMNETWORKLINKSTATE enmLinkState;
133 /** NAT state for this instance. */
134 PNATState pNATState;
135 /** TFTP directory prefix. */
136 char *pszTFTPPrefix;
137 /** Boot file name to provide in the DHCP server response. */
138 char *pszBootFile;
139 /** tftp server name to provide in the DHCP server response. */
140 char *pszNextServer;
141 /* polling thread */
142 PPDMTHREAD pSlirpThread;
143 /** Queue for NAT-thread-external events. */
144 PRTREQQUEUE pSlirpReqQueue;
145
146#ifdef VBOX_WITH_SLIRP_MT
147 PPDMTHREAD pGuestThread;
148#endif
149#ifndef RT_OS_WINDOWS
150 /** The write end of the control pipe. */
151 RTFILE PipeWrite;
152 /** The read end of the control pipe. */
153 RTFILE PipeRead;
154# if HC_ARCH_BITS == 32
155 /** Alignment padding. */
156 uint32_t u32Alignment;
157# endif
158#else
159 /** for external notification */
160 HANDLE hWakeupEvent;
161#endif
162
163#define DRV_PROFILE_COUNTER(name, dsc) STAMPROFILE Stat ## name
164#define DRV_COUNTING_COUNTER(name, dsc) STAMCOUNTER Stat ## name
165#include "counters.h"
166 /** thread delivering packets for receiving by the guest */
167 PPDMTHREAD pRecvThread;
168 /** thread delivering urg packets for receiving by the guest */
169 PPDMTHREAD pUrgRecvThread;
170 /** event to wakeup the guest receive thread */
171 RTSEMEVENT EventRecv;
172 /** event to wakeup the guest urgent receive thread */
173 RTSEMEVENT EventUrgRecv;
174 /** Receive Req queue (deliver packets to the guest) */
175 PRTREQQUEUE pRecvReqQueue;
176 /** Receive Urgent Req queue (deliver packets to the guest) */
177 PRTREQQUEUE pUrgRecvReqQueue;
178
179 /* makes access to device func RecvAvail and Recv atomical */
180 RTCRITSECT csDevAccess;
181 volatile uint32_t cUrgPkt;
182 volatile uint32_t cPkt;
183 PTMTIMERR3 pTmrSlow;
184 PTMTIMERR3 pTmrFast;
185} DRVNAT;
186AssertCompileMemberAlignment(DRVNAT, StatNATRecvWakeups, 8);
187/** Pointer the NAT driver instance data. */
188typedef DRVNAT *PDRVNAT;
189
190/**
191 * NAT queue item.
192 */
193typedef struct DRVNATQUEUITEM
194{
195 /** The core part owned by the queue manager. */
196 PDMQUEUEITEMCORE Core;
197 /** The buffer for output to guest. */
198 const uint8_t *pu8Buf;
199 /* size of buffer */
200 size_t cb;
201 void *mbuf;
202} DRVNATQUEUITEM;
203/** Pointer to a NAT queue item. */
204typedef DRVNATQUEUITEM *PDRVNATQUEUITEM;
205
206
207static void drvNATNotifyNATThread(PDRVNAT pThis);
208static DECLCALLBACK(void) drvNATSlowTimer(PPDMDRVINS pDrvIns, PTMTIMER pTimer, void *pvUser);
209static DECLCALLBACK(void) drvNATFast(PPDMDRVINS pDrvIns, PTMTIMER pTimer, void *pvUser);
210
211
212/** Converts a pointer to NAT::INetworkConnector to a PRDVNAT. */
213#define PDMINETWORKCONNECTOR_2_DRVNAT(pInterface) ( (PDRVNAT)((uintptr_t)pInterface - RT_OFFSETOF(DRVNAT, INetworkConnector)) )
214
215static DECLCALLBACK(void) drvNATSlowTimer(PPDMDRVINS pDrvIns, PTMTIMER pTimer, void *pvUser)
216{
217 Assert(pvUser);
218 PDRVNAT pThis = (PDRVNAT)pvUser;
219 drvNATNotifyNATThread(pThis);
220}
221
222static DECLCALLBACK(void) drvNATFastTimer(PPDMDRVINS pDrvIns, PTMTIMER pTimer, void *pvUser)
223{
224 Assert(pvUser);
225 PDRVNAT pThis = (PDRVNAT)pvUser;
226 drvNATNotifyNATThread(pThis);
227}
228
229
230static DECLCALLBACK(int) drvNATRecv(PPDMDRVINS pDrvIns, PPDMTHREAD pThread)
231{
232 PDRVNAT pThis = PDMINS_2_DATA(pDrvIns, PDRVNAT);
233
234 if (pThread->enmState == PDMTHREADSTATE_INITIALIZING)
235 return VINF_SUCCESS;
236
237 while (pThread->enmState == PDMTHREADSTATE_RUNNING)
238 {
239 RTReqProcess(pThis->pRecvReqQueue, 0);
240 if (ASMAtomicReadU32(&pThis->cPkt) == 0)
241 RTSemEventWait(pThis->EventRecv, RT_INDEFINITE_WAIT);
242 }
243 return VINF_SUCCESS;
244}
245
246
247static DECLCALLBACK(int) drvNATRecvWakeup(PPDMDRVINS pDrvIns, PPDMTHREAD pThread)
248{
249 PDRVNAT pThis = PDMINS_2_DATA(pDrvIns, PDRVNAT);
250 int rc = RTSemEventSignal(pThis->EventRecv);
251
252 STAM_COUNTER_INC(&pThis->StatNATRecvWakeups);
253 AssertReleaseRC(rc);
254 return VINF_SUCCESS;
255}
256
257static DECLCALLBACK(int) drvNATUrgRecv(PPDMDRVINS pDrvIns, PPDMTHREAD pThread)
258{
259 PDRVNAT pThis = PDMINS_2_DATA(pDrvIns, PDRVNAT);
260
261 if (pThread->enmState == PDMTHREADSTATE_INITIALIZING)
262 return VINF_SUCCESS;
263
264 while (pThread->enmState == PDMTHREADSTATE_RUNNING)
265 {
266 RTReqProcess(pThis->pUrgRecvReqQueue, 0);
267 if (ASMAtomicReadU32(&pThis->cUrgPkt) == 0)
268 RTSemEventWait(pThis->EventUrgRecv, RT_INDEFINITE_WAIT);
269 }
270 return VINF_SUCCESS;
271}
272static DECLCALLBACK(int) drvNATUrgRecvWakeup(PPDMDRVINS pDrvIns, PPDMTHREAD pThread)
273{
274 PDRVNAT pThis = PDMINS_2_DATA(pDrvIns, PDRVNAT);
275 int rc = RTSemEventSignal(pThis->EventUrgRecv);
276
277 AssertReleaseRC(rc);
278 return VINF_SUCCESS;
279}
280
281static DECLCALLBACK(void) drvNATUrgRecvWorker(PDRVNAT pThis, uint8_t *pu8Buf, int cb, void *pvArg)
282{
283 int rc = RTCritSectEnter(&pThis->csDevAccess);
284 AssertReleaseRC(rc);
285 rc = pThis->pPort->pfnWaitReceiveAvail(pThis->pPort, RT_INDEFINITE_WAIT);
286 if (RT_SUCCESS(rc))
287 {
288 rc = pThis->pPort->pfnReceive(pThis->pPort, pu8Buf, cb);
289 AssertReleaseRC(rc);
290 }
291 else if ( RT_FAILURE(rc)
292 && ( rc == VERR_TIMEOUT
293 && rc == VERR_INTERRUPTED))
294 {
295 AssertReleaseRC(rc);
296 }
297
298 rc = RTCritSectLeave(&pThis->csDevAccess);
299 AssertReleaseRC(rc);
300
301 if (ASMAtomicDecU32(&pThis->cUrgPkt) == 0)
302 {
303 drvNATRecvWakeup(pThis->pDrvIns, pThis->pRecvThread);
304 drvNATNotifyNATThread(pThis);
305 }
306 slirp_ext_m_free(pThis->pNATState, pvArg);
307}
308
309
310static DECLCALLBACK(void) drvNATRecvWorker(PDRVNAT pThis, uint8_t *pu8Buf, int cb, void *pvArg)
311{
312 int rc;
313 STAM_PROFILE_START(&pThis->StatNATRecv, a);
314
315 STAM_PROFILE_START(&pThis->StatNATRecvWait, b);
316
317 while(ASMAtomicReadU32(&pThis->cUrgPkt) != 0)
318 {
319 rc = RTSemEventWait(pThis->EventRecv, RT_INDEFINITE_WAIT);
320 if ( RT_FAILURE(rc)
321 && ( rc == VERR_TIMEOUT
322 || rc == VERR_INTERRUPTED))
323 goto done_unlocked;
324 }
325
326 rc = RTCritSectEnter(&pThis->csDevAccess);
327
328 rc = pThis->pPort->pfnWaitReceiveAvail(pThis->pPort, RT_INDEFINITE_WAIT);
329 if (RT_SUCCESS(rc))
330 {
331 rc = pThis->pPort->pfnReceive(pThis->pPort, pu8Buf, cb);
332 AssertReleaseRC(rc);
333 }
334 else if ( RT_FAILURE(rc)
335 && ( rc != VERR_TIMEOUT
336 && rc != VERR_INTERRUPTED))
337 {
338 AssertReleaseRC(rc);
339 }
340
341 rc = RTCritSectLeave(&pThis->csDevAccess);
342 AssertReleaseRC(rc);
343done_unlocked:
344 slirp_ext_m_free(pThis->pNATState, pvArg);
345 ASMAtomicDecU32(&pThis->cPkt);
346
347 drvNATNotifyNATThread(pThis);
348
349 STAM_PROFILE_STOP(&pThis->StatNATRecvWait, b);
350 STAM_PROFILE_STOP(&pThis->StatNATRecv, a);
351}
352
353/**
354 * Worker function for drvNATSend().
355 * @thread "NAT" thread.
356 */
357static void drvNATSendWorker(PDRVNAT pThis, void *pvBuf, size_t cb)
358{
359 Assert(pThis->enmLinkState == PDMNETWORKLINKSTATE_UP);
360 if (pThis->enmLinkState == PDMNETWORKLINKSTATE_UP)
361 slirp_input(pThis->pNATState, pvBuf);
362}
363
364
365/**
366 * Called by the guest to send data to the network.
367 *
368 * @returns VBox status code.
369 * @param pInterface Pointer to the interface structure containing the called function pointer.
370 * @param pvBuf Data to send.
371 * @param cb Number of bytes to send.
372 * @thread EMT
373 */
374static DECLCALLBACK(int) drvNATSend(PPDMINETWORKCONNECTOR pInterface, const void *pvBuf, size_t cb)
375{
376 PDRVNAT pThis = PDMINETWORKCONNECTOR_2_DRVNAT(pInterface);
377
378 LogFlow(("drvNATSend: pvBuf=%p cb=%#x\n", pvBuf, cb));
379 Log2(("drvNATSend: pvBuf=%p cb=%#x\n%.*Rhxd\n", pvBuf, cb, cb, pvBuf));
380
381 PRTREQ pReq = NULL;
382 int rc;
383 void *buf;
384
385 /* don't queue new requests when the NAT thread is about to stop */
386 if (pThis->pSlirpThread->enmState != PDMTHREADSTATE_RUNNING)
387 return VINF_SUCCESS;
388
389#ifndef VBOX_WITH_SLIRP_MT
390 rc = RTReqAlloc(pThis->pSlirpReqQueue, &pReq, RTREQTYPE_INTERNAL);
391#else
392 rc = RTReqAlloc((PRTREQQUEUE)slirp_get_queue(pThis->pNATState), &pReq, RTREQTYPE_INTERNAL);
393#endif
394 AssertReleaseRC(rc);
395
396 /* @todo: Here we should get mbuf instead temporal buffer */
397#if 0
398 buf = RTMemAlloc(cb);
399 if (buf == NULL)
400 {
401 LogRel(("NAT: Can't allocate send buffer\n"));
402 return VERR_NO_MEMORY;
403 }
404 memcpy(buf, pvBuf, cb);
405#else
406 void *pvmBuf = slirp_ext_m_get(pThis->pNATState);
407 Assert(pvmBuf);
408 slirp_ext_m_append(pThis->pNATState, pvmBuf, (uint8_t *)pvBuf, cb);
409#endif
410
411 pReq->u.Internal.pfn = (PFNRT)drvNATSendWorker;
412 pReq->u.Internal.cArgs = 2;
413 pReq->u.Internal.aArgs[0] = (uintptr_t)pThis;
414 pReq->u.Internal.aArgs[1] = (uintptr_t)pvmBuf;
415 pReq->fFlags = RTREQFLAGS_VOID|RTREQFLAGS_NO_WAIT;
416
417 rc = RTReqQueue(pReq, 0); /* don't wait, we have to wakeup the NAT thread fist */
418 AssertReleaseRC(rc);
419 drvNATNotifyNATThread(pThis);
420 LogFlow(("drvNATSend: end\n"));
421 return VINF_SUCCESS;
422}
423
424
425/**
426 * Get the NAT thread out of poll/WSAWaitForMultipleEvents
427 */
428static void drvNATNotifyNATThread(PDRVNAT pThis)
429{
430 int rc;
431#ifndef RT_OS_WINDOWS
432 /* kick select() */
433 rc = RTFileWrite(pThis->PipeWrite, "", 1, NULL);
434#else
435 /* kick WSAWaitForMultipleEvents */
436 rc = WSASetEvent(pThis->hWakeupEvent);
437#endif
438 AssertReleaseRC(rc);
439}
440
441
442/**
443 * Set promiscuous mode.
444 *
445 * This is called when the promiscuous mode is set. This means that there doesn't have
446 * to be a mode change when it's called.
447 *
448 * @param pInterface Pointer to the interface structure containing the called function pointer.
449 * @param fPromiscuous Set if the adaptor is now in promiscuous mode. Clear if it is not.
450 * @thread EMT
451 */
452static DECLCALLBACK(void) drvNATSetPromiscuousMode(PPDMINETWORKCONNECTOR pInterface, bool fPromiscuous)
453{
454 LogFlow(("drvNATSetPromiscuousMode: fPromiscuous=%d\n", fPromiscuous));
455 /* nothing to do */
456}
457
458/**
459 * Worker function for drvNATNotifyLinkChanged().
460 * @thread "NAT" thread.
461 */
462static void drvNATNotifyLinkChangedWorker(PDRVNAT pThis, PDMNETWORKLINKSTATE enmLinkState)
463{
464 pThis->enmLinkState = enmLinkState;
465
466 switch (enmLinkState)
467 {
468 case PDMNETWORKLINKSTATE_UP:
469 LogRel(("NAT: link up\n"));
470 slirp_link_up(pThis->pNATState);
471 break;
472
473 case PDMNETWORKLINKSTATE_DOWN:
474 case PDMNETWORKLINKSTATE_DOWN_RESUME:
475 LogRel(("NAT: link down\n"));
476 slirp_link_down(pThis->pNATState);
477 break;
478
479 default:
480 AssertMsgFailed(("drvNATNotifyLinkChanged: unexpected link state %d\n", enmLinkState));
481 }
482}
483
484
485/**
486 * Notification on link status changes.
487 *
488 * @param pInterface Pointer to the interface structure containing the called function pointer.
489 * @param enmLinkState The new link state.
490 * @thread EMT
491 */
492static DECLCALLBACK(void) drvNATNotifyLinkChanged(PPDMINETWORKCONNECTOR pInterface, PDMNETWORKLINKSTATE enmLinkState)
493{
494 PDRVNAT pThis = PDMINETWORKCONNECTOR_2_DRVNAT(pInterface);
495
496 LogFlow(("drvNATNotifyLinkChanged: enmLinkState=%d\n", enmLinkState));
497
498 PRTREQ pReq = NULL;
499
500 /* don't queue new requests when the NAT thread is about to stop */
501 if (pThis->pSlirpThread->enmState != PDMTHREADSTATE_RUNNING)
502 return;
503
504 int rc = RTReqAlloc(pThis->pSlirpReqQueue, &pReq, RTREQTYPE_INTERNAL);
505 AssertReleaseRC(rc);
506 pReq->u.Internal.pfn = (PFNRT)drvNATNotifyLinkChangedWorker;
507 pReq->u.Internal.cArgs = 2;
508 pReq->u.Internal.aArgs[0] = (uintptr_t)pThis;
509 pReq->u.Internal.aArgs[1] = (uintptr_t)enmLinkState;
510 pReq->fFlags = RTREQFLAGS_VOID;
511 rc = RTReqQueue(pReq, 0); /* don't wait, we have to wakeup the NAT thread fist */
512 if (RT_LIKELY(rc == VERR_TIMEOUT))
513 {
514 drvNATNotifyNATThread(pThis);
515 rc = RTReqWait(pReq, RT_INDEFINITE_WAIT);
516 AssertReleaseRC(rc);
517 }
518 else
519 AssertReleaseRC(rc);
520 RTReqFree(pReq);
521}
522
523/**
524 * NAT thread handling the slirp stuff. The slirp implementation is single-threaded
525 * so we execute this enginre in a dedicated thread. We take care that this thread
526 * does not become the bottleneck: If the guest wants to send, a request is enqueued
527 * into the pSlirpReqQueue and handled asynchronously by this thread. If this thread
528 * wants to deliver packets to the guest, it enqueues a request into pRecvReqQueue
529 * which is later handled by the Recv thread.
530 */
531static DECLCALLBACK(int) drvNATAsyncIoThread(PPDMDRVINS pDrvIns, PPDMTHREAD pThread)
532{
533 PDRVNAT pThis = PDMINS_2_DATA(pDrvIns, PDRVNAT);
534 int nFDs = -1;
535 unsigned int ms;
536#ifdef RT_OS_WINDOWS
537 DWORD event;
538 HANDLE *phEvents;
539 unsigned int cBreak = 0;
540#else /* RT_OS_WINDOWS */
541 struct pollfd *polls = NULL;
542 unsigned int cPollNegRet = 0;
543#endif /* !RT_OS_WINDOWS */
544
545 LogFlow(("drvNATAsyncIoThread: pThis=%p\n", pThis));
546
547 if (pThread->enmState == PDMTHREADSTATE_INITIALIZING)
548 return VINF_SUCCESS;
549
550#ifdef RT_OS_WINDOWS
551 phEvents = slirp_get_events(pThis->pNATState);
552#endif /* RT_OS_WINDOWS */
553
554 /*
555 * Polling loop.
556 */
557 while (pThread->enmState == PDMTHREADSTATE_RUNNING)
558 {
559 nFDs = -1;
560 /*
561 * To prevent concurent execution of sending/receving threads
562 */
563#ifndef RT_OS_WINDOWS
564 nFDs = slirp_get_nsock(pThis->pNATState);
565 polls = NULL;
566 /* allocation for all sockets + Management pipe */
567 polls = (struct pollfd *)RTMemAlloc((1 + nFDs) * sizeof(struct pollfd) + sizeof(uint32_t));
568 if (polls == NULL)
569 return VERR_NO_MEMORY;
570
571 /* don't pass the managemant pipe */
572 slirp_select_fill(pThis->pNATState, &nFDs, &polls[1]);
573#if 0
574 ms = slirp_get_timeout_ms(pThis->pNATState);
575#else
576 ms = 0;
577#endif
578
579 polls[0].fd = pThis->PipeRead;
580 /* POLLRDBAND usually doesn't used on Linux but seems used on Solaris */
581 polls[0].events = POLLRDNORM|POLLPRI|POLLRDBAND;
582 polls[0].revents = 0;
583
584 int cChangedFDs = poll(polls, nFDs + 1, ms ? ms : -1);
585 if (cChangedFDs < 0)
586 {
587 if (errno == EINTR)
588 {
589 Log2(("NAT: signal was caught while sleep on poll\n"));
590 /* No error, just process all outstanding requests but don't wait */
591 cChangedFDs = 0;
592 }
593 else if (cPollNegRet++ > 128)
594 {
595 LogRel(("NAT:Poll returns (%s) suppressed %d\n", strerror(errno), cPollNegRet));
596 cPollNegRet = 0;
597 }
598 }
599
600 if (cChangedFDs >= 0)
601 {
602 slirp_select_poll(pThis->pNATState, &polls[1], nFDs);
603 if (polls[0].revents & (POLLRDNORM|POLLPRI|POLLRDBAND))
604 {
605 /* drain the pipe */
606 char ch[1];
607 size_t cbRead;
608 int counter = 0;
609 /*
610 * drvNATSend decoupled so we don't know how many times
611 * device's thread sends before we've entered multiplex,
612 * so to avoid false alarm drain pipe here to the very end
613 *
614 * @todo: Probably we should counter drvNATSend to count how
615 * deep pipe has been filed before drain.
616 *
617 * XXX:Make it reading exactly we need to drain the pipe.
618 */
619 RTFileRead(pThis->PipeRead, &ch, 1, &cbRead);
620 }
621 }
622 /* process _all_ outstanding requests but don't wait */
623 RTReqProcess(pThis->pSlirpReqQueue, 0);
624 RTMemFree(polls);
625#else /* RT_OS_WINDOWS */
626 slirp_select_fill(pThis->pNATState, &nFDs);
627#if 0
628 ms = slirp_get_timeout_ms(pThis->pNATState);
629#else
630 ms = 0;
631#endif
632 struct timeval tv = { 0, ms*1000 };
633 event = WSAWaitForMultipleEvents(nFDs, phEvents, FALSE, ms ? ms : WSA_INFINITE, FALSE);
634 if ( (event < WSA_WAIT_EVENT_0 || event > WSA_WAIT_EVENT_0 + nFDs - 1)
635 && event != WSA_WAIT_TIMEOUT)
636 {
637 int error = WSAGetLastError();
638 LogRel(("NAT: WSAWaitForMultipleEvents returned %d (error %d)\n", event, error));
639 RTAssertReleasePanic();
640 }
641
642 if (event == WSA_WAIT_TIMEOUT)
643 {
644 /* only check for slow/fast timers */
645 slirp_select_poll(pThis->pNATState, /* fTimeout=*/true, /*fIcmp=*/false);
646 continue;
647 }
648 /* poll the sockets in any case */
649 Log2(("%s: poll\n", __FUNCTION__));
650 slirp_select_poll(pThis->pNATState, /* fTimeout=*/false, /* fIcmp=*/(event == WSA_WAIT_EVENT_0));
651 /* process _all_ outstanding requests but don't wait */
652 RTReqProcess(pThis->pSlirpReqQueue, 0);
653# ifdef VBOX_NAT_DELAY_HACK
654 if (cBreak++ > 128)
655 {
656 cBreak = 0;
657 RTThreadSleep(2);
658 }
659# endif
660#endif /* RT_OS_WINDOWS */
661 }
662
663 return VINF_SUCCESS;
664}
665
666
667/**
668 * Unblock the send thread so it can respond to a state change.
669 *
670 * @returns VBox status code.
671 * @param pDevIns The pcnet device instance.
672 * @param pThread The send thread.
673 */
674static DECLCALLBACK(int) drvNATAsyncIoWakeup(PPDMDRVINS pDrvIns, PPDMTHREAD pThread)
675{
676 PDRVNAT pThis = PDMINS_2_DATA(pDrvIns, PDRVNAT);
677
678 drvNATNotifyNATThread(pThis);
679 return VINF_SUCCESS;
680}
681
682#ifdef VBOX_WITH_SLIRP_MT
683
684static DECLCALLBACK(int) drvNATAsyncIoGuest(PPDMDRVINS pDrvIns, PPDMTHREAD pThread)
685{
686 PDRVNAT pThis = PDMINS_2_DATA(pDrvIns, PDRVNAT);
687
688 if (pThread->enmState == PDMTHREADSTATE_INITIALIZING)
689 return VINF_SUCCESS;
690
691 while (pThread->enmState == PDMTHREADSTATE_RUNNING)
692 slirp_process_queue(pThis->pNATState);
693
694 return VINF_SUCCESS;
695}
696
697
698static DECLCALLBACK(int) drvNATAsyncIoGuestWakeup(PPDMDRVINS pDrvIns, PPDMTHREAD pThread)
699{
700 PDRVNAT pThis = PDMINS_2_DATA(pDrvIns, PDRVNAT);
701
702 return VINF_SUCCESS;
703}
704
705#endif /* VBOX_WITH_SLIRP_MT */
706
707void slirp_arm_fast_timer(void *pvUser)
708{
709 PDRVNAT pThis = (PDRVNAT)pvUser;
710 Assert(pThis);
711 TMTimerSetMillies(pThis->pTmrFast, 2);
712}
713
714void slirp_arm_slow_timer(void *pvUser)
715{
716 PDRVNAT pThis = (PDRVNAT)pvUser;
717 Assert(pThis);
718 TMTimerSetMillies(pThis->pTmrSlow, 500);
719}
720
721/**
722 * Function called by slirp to check if it's possible to feed incoming data to the network port.
723 * @returns 1 if possible.
724 * @returns 0 if not possible.
725 */
726int slirp_can_output(void *pvUser)
727{
728 return 1;
729}
730
731void slirp_push_recv_thread(void *pvUser)
732{
733 PDRVNAT pThis = (PDRVNAT)pvUser;
734 Assert(pThis);
735 drvNATUrgRecvWakeup(pThis->pDrvIns, pThis->pUrgRecvThread);
736}
737
738void slirp_urg_output(void *pvUser, void *pvArg, const uint8_t *pu8Buf, int cb)
739{
740 PDRVNAT pThis = (PDRVNAT)pvUser;
741 Assert(pThis);
742
743 PRTREQ pReq = NULL;
744
745 /* don't queue new requests when the NAT thread is about to stop */
746 if (pThis->pSlirpThread->enmState != PDMTHREADSTATE_RUNNING)
747 return;
748
749 int rc = RTReqAlloc(pThis->pUrgRecvReqQueue, &pReq, RTREQTYPE_INTERNAL);
750 AssertReleaseRC(rc);
751 ASMAtomicIncU32(&pThis->cUrgPkt);
752 pReq->u.Internal.pfn = (PFNRT)drvNATUrgRecvWorker;
753 pReq->u.Internal.cArgs = 4;
754 pReq->u.Internal.aArgs[0] = (uintptr_t)pThis;
755 pReq->u.Internal.aArgs[1] = (uintptr_t)pu8Buf;
756 pReq->u.Internal.aArgs[2] = (uintptr_t)cb;
757 pReq->u.Internal.aArgs[3] = (uintptr_t)pvArg;
758 pReq->fFlags = RTREQFLAGS_VOID|RTREQFLAGS_NO_WAIT;
759 rc = RTReqQueue(pReq, 0);
760 AssertReleaseRC(rc);
761 drvNATUrgRecvWakeup(pThis->pDrvIns, pThis->pUrgRecvThread);
762}
763
764/**
765 * Function called by slirp to feed incoming data to the network port.
766 */
767void slirp_output(void *pvUser, void *pvArg, const uint8_t *pu8Buf, int cb)
768{
769 PDRVNAT pThis = (PDRVNAT)pvUser;
770 Assert(pThis);
771
772 LogFlow(("slirp_output BEGIN %x %d\n", pu8Buf, cb));
773 Log2(("slirp_output: pu8Buf=%p cb=%#x (pThis=%p)\n%.*Rhxd\n", pu8Buf, cb, pThis, cb, pu8Buf));
774
775 PRTREQ pReq = NULL;
776
777 /* don't queue new requests when the NAT thread is about to stop */
778 if (pThis->pSlirpThread->enmState != PDMTHREADSTATE_RUNNING)
779 return;
780
781 int rc = RTReqAlloc(pThis->pRecvReqQueue, &pReq, RTREQTYPE_INTERNAL);
782 AssertReleaseRC(rc);
783 ASMAtomicIncU32(&pThis->cPkt);
784 pReq->u.Internal.pfn = (PFNRT)drvNATRecvWorker;
785 pReq->u.Internal.cArgs = 4;
786 pReq->u.Internal.aArgs[0] = (uintptr_t)pThis;
787 pReq->u.Internal.aArgs[1] = (uintptr_t)pu8Buf;
788 pReq->u.Internal.aArgs[2] = (uintptr_t)cb;
789 pReq->u.Internal.aArgs[3] = (uintptr_t)pvArg;
790 pReq->fFlags = RTREQFLAGS_VOID|RTREQFLAGS_NO_WAIT;
791 rc = RTReqQueue(pReq, 0);
792 AssertReleaseRC(rc);
793 drvNATRecvWakeup(pThis->pDrvIns, pThis->pRecvThread);
794 STAM_COUNTER_INC(&pThis->StatQueuePktSent);
795}
796
797
798/**
799 * Queries an interface to the driver.
800 *
801 * @returns Pointer to interface.
802 * @returns NULL if the interface was not supported by the driver.
803 * @param pInterface Pointer to this interface structure.
804 * @param enmInterface The requested interface identification.
805 * @thread Any thread.
806 */
807static DECLCALLBACK(void *) drvNATQueryInterface(PPDMIBASE pInterface, PDMINTERFACE enmInterface)
808{
809 PPDMDRVINS pDrvIns = PDMIBASE_2_PDMDRV(pInterface);
810 PDRVNAT pThis = PDMINS_2_DATA(pDrvIns, PDRVNAT);
811 switch (enmInterface)
812 {
813 case PDMINTERFACE_BASE:
814 return &pDrvIns->IBase;
815 case PDMINTERFACE_NETWORK_CONNECTOR:
816 return &pThis->INetworkConnector;
817 default:
818 return NULL;
819 }
820}
821
822
823/**
824 * Get the MAC address into the slirp stack.
825 *
826 * Called by drvNATLoadDone and drvNATPowerOn.
827 */
828static void drvNATSetMac(PDRVNAT pThis)
829{
830 if (pThis->pConfig)
831 {
832 RTMAC Mac;
833 pThis->pConfig->pfnGetMac(pThis->pConfig, &Mac);
834 slirp_set_ethaddr(pThis->pNATState, Mac.au8);
835 }
836}
837
838
839/**
840 * After loading we have to pass the MAC address of the ethernet device to the slirp stack.
841 * Otherwise the guest is not reachable until it performs a DHCP request or an ARP request
842 * (usually done during guest boot).
843 */
844static DECLCALLBACK(int) drvNATLoadDone(PPDMDRVINS pDrvIns, PSSMHANDLE pSSMHandle)
845{
846 PDRVNAT pThis = PDMINS_2_DATA(pDrvIns, PDRVNAT);
847 drvNATSetMac(pThis);
848 return VINF_SUCCESS;
849}
850
851
852/**
853 * Some guests might not use DHCP to retrieve an IP but use a static IP.
854 */
855static DECLCALLBACK(void) drvNATPowerOn(PPDMDRVINS pDrvIns)
856{
857 PDRVNAT pThis = PDMINS_2_DATA(pDrvIns, PDRVNAT);
858 drvNATSetMac(pThis);
859}
860
861
862/**
863 * Sets up the redirectors.
864 *
865 * @returns VBox status code.
866 * @param pCfgHandle The drivers configuration handle.
867 */
868static int drvNATConstructRedir(unsigned iInstance, PDRVNAT pThis, PCFGMNODE pCfgHandle, RTIPV4ADDR Network)
869{
870 RTMAC Mac;
871 memset(&Mac, 0, sizeof(RTMAC)); /*can't get MAC here */
872 /*
873 * Enumerate redirections.
874 */
875 for (PCFGMNODE pNode = CFGMR3GetFirstChild(pCfgHandle); pNode; pNode = CFGMR3GetNextChild(pNode))
876 {
877 /*
878 * Validate the port forwarding config.
879 */
880 if (!CFGMR3AreValuesValid(pNode, "Protocol\0UDP\0HostPort\0GuestPort\0GuestIP\0BindIP\0"))
881 return PDMDRV_SET_ERROR(pThis->pDrvIns, VERR_PDM_DRVINS_UNKNOWN_CFG_VALUES, N_("Unknown configuration in port forwarding"));
882
883 /* protocol type */
884 bool fUDP;
885 char szProtocol[32];
886 int rc;
887 GET_STRING(rc, pThis, pNode, "Protocol", szProtocol[0], sizeof(szProtocol));
888 if (rc == VERR_CFGM_VALUE_NOT_FOUND)
889 {
890 fUDP = false;
891 GET_BOOL(rc, pThis, pNode, "UDP", fUDP);
892 }
893 else if (RT_SUCCESS(rc))
894 {
895 if (!RTStrICmp(szProtocol, "TCP"))
896 fUDP = false;
897 else if (!RTStrICmp(szProtocol, "UDP"))
898 fUDP = true;
899 else
900 return PDMDrvHlpVMSetError(pThis->pDrvIns, VERR_INVALID_PARAMETER, RT_SRC_POS,
901 N_("NAT#%d: Invalid configuration value for \"Protocol\": \"%s\""),
902 iInstance, szProtocol);
903 }
904 /* host port */
905 int32_t iHostPort;
906 GET_S32_STRICT(rc, pThis, pNode, "HostPort", iHostPort);
907
908 /* guest port */
909 int32_t iGuestPort;
910 GET_S32_STRICT(rc, pThis, pNode, "GuestPort", iGuestPort);
911
912 /* guest address */
913 struct in_addr GuestIP;
914 /* @todo (vvl) use CTL_* */
915 GETIP_DEF(rc, pThis, pNode, GuestIP, htonl(Network | CTL_GUEST));
916
917 /*
918 * Call slirp about it.
919 */
920 struct in_addr BindIP;
921 GETIP_DEF(rc, pThis, pNode, BindIP, INADDR_ANY);
922 if (slirp_redir(pThis->pNATState, fUDP, BindIP, iHostPort, GuestIP, iGuestPort, Mac.au8) < 0)
923 return PDMDrvHlpVMSetError(pThis->pDrvIns, VERR_NAT_REDIR_SETUP, RT_SRC_POS,
924 N_("NAT#%d: configuration error: failed to set up "
925 "redirection of %d to %d. Probably a conflict with "
926 "existing services or other rules"), iInstance, iHostPort,
927 iGuestPort);
928 } /* for each redir rule */
929
930 return VINF_SUCCESS;
931}
932
933
934/**
935 * Destruct a driver instance.
936 *
937 * Most VM resources are freed by the VM. This callback is provided so that any non-VM
938 * resources can be freed correctly.
939 *
940 * @param pDrvIns The driver instance data.
941 */
942static DECLCALLBACK(void) drvNATDestruct(PPDMDRVINS pDrvIns)
943{
944 PDRVNAT pThis = PDMINS_2_DATA(pDrvIns, PDRVNAT);
945
946 LogFlow(("drvNATDestruct:\n"));
947
948 slirp_term(pThis->pNATState);
949 slirp_deregister_statistics(pThis->pNATState, pDrvIns);
950 pThis->pNATState = NULL;
951#ifdef VBOX_WITH_STATISTICS
952# define DRV_PROFILE_COUNTER(name, dsc) DEREGISTER_COUNTER(name, pThis)
953# define DRV_COUNTING_COUNTER(name, dsc) DEREGISTER_COUNTER(name, pThis)
954# include "counters.h"
955#endif
956}
957
958
959/**
960 * Construct a NAT network transport driver instance.
961 *
962 * @copydoc FNPDMDRVCONSTRUCT
963 */
964static DECLCALLBACK(int) drvNATConstruct(PPDMDRVINS pDrvIns, PCFGMNODE pCfgHandle, uint32_t fFlags)
965{
966 PDRVNAT pThis = PDMINS_2_DATA(pDrvIns, PDRVNAT);
967
968 LogFlow(("drvNATConstruct:\n"));
969
970 /*
971 * Validate the config.
972 */
973 if (!CFGMR3AreValuesValid(pCfgHandle,
974 "PassDomain\0TFTPPrefix\0BootFile\0Network"
975 "\0NextServer\0DNSProxy\0BindIP\0UseHostResolver\0"
976#ifdef VBOX_WITH_SLIRP_BSD_MBUF
977 "SlirpMTU\0"
978#endif
979 "SocketRcvBuf\0SocketSndBuf\0TcpRcvSpace\0TcpSndSpace\0"))
980 return PDMDRV_SET_ERROR(pDrvIns, VERR_PDM_DRVINS_UNKNOWN_CFG_VALUES,
981 N_("Unknown NAT configuration option, only supports PassDomain,"
982 " TFTPPrefix, BootFile and Network"));
983
984 /*
985 * Init the static parts.
986 */
987 pThis->pDrvIns = pDrvIns;
988 pThis->pNATState = NULL;
989 pThis->pszTFTPPrefix = NULL;
990 pThis->pszBootFile = NULL;
991 pThis->pszNextServer = NULL;
992 /* IBase */
993 pDrvIns->IBase.pfnQueryInterface = drvNATQueryInterface;
994 /* INetwork */
995 pThis->INetworkConnector.pfnSend = drvNATSend;
996 pThis->INetworkConnector.pfnSetPromiscuousMode = drvNATSetPromiscuousMode;
997 pThis->INetworkConnector.pfnNotifyLinkChanged = drvNATNotifyLinkChanged;
998
999 /*
1000 * Get the configuration settings.
1001 */
1002 int rc;
1003 bool fPassDomain = true;
1004 GET_BOOL(rc, pThis, pCfgHandle, "PassDomain", fPassDomain);
1005
1006 GET_STRING_ALLOC(rc, pThis, pCfgHandle, "TFTPPrefix", pThis->pszTFTPPrefix);
1007 GET_STRING_ALLOC(rc, pThis, pCfgHandle, "BootFile", pThis->pszBootFile);
1008 GET_STRING_ALLOC(rc, pThis, pCfgHandle, "NextServer", pThis->pszNextServer);
1009
1010 int fDNSProxy = 0;
1011 GET_S32(rc, pThis, pCfgHandle, "DNSProxy", fDNSProxy);
1012 int fUseHostResolver = 0;
1013 GET_S32(rc, pThis, pCfgHandle, "UseHostResolver", fUseHostResolver);
1014#ifdef VBOX_WITH_SLIRP_BSD_MBUF
1015 int MTU = 1500;
1016 GET_S32(rc, pThis, pCfgHandle, "SlirpMTU", MTU);
1017#endif
1018
1019 /*
1020 * Query the network port interface.
1021 */
1022 pThis->pPort =
1023 (PPDMINETWORKPORT)pDrvIns->pUpBase->pfnQueryInterface(pDrvIns->pUpBase,
1024 PDMINTERFACE_NETWORK_PORT);
1025 if (!pThis->pPort)
1026 return PDMDRV_SET_ERROR(pDrvIns, VERR_PDM_MISSING_INTERFACE_ABOVE,
1027 N_("Configuration error: the above device/driver didn't "
1028 "export the network port interface"));
1029 pThis->pConfig =
1030 (PPDMINETWORKCONFIG)pDrvIns->pUpBase->pfnQueryInterface(pDrvIns->pUpBase,
1031 PDMINTERFACE_NETWORK_CONFIG);
1032 if (!pThis->pConfig)
1033 return PDMDRV_SET_ERROR(pDrvIns, VERR_PDM_MISSING_INTERFACE_ABOVE,
1034 N_("Configuration error: the above device/driver didn't "
1035 "export the network config interface"));
1036
1037 /* Generate a network address for this network card. */
1038 char szNetwork[32]; /* xxx.xxx.xxx.xxx/yy */
1039 GET_STRING(rc, pThis, pCfgHandle, "Network", szNetwork[0], sizeof(szNetwork));
1040 if (rc == VERR_CFGM_VALUE_NOT_FOUND)
1041 RTStrPrintf(szNetwork, sizeof(szNetwork), "10.0.%d.0/24", pDrvIns->iInstance + 2);
1042
1043 RTIPV4ADDR Network;
1044 RTIPV4ADDR Netmask;
1045 rc = RTCidrStrToIPv4(szNetwork, &Network, &Netmask);
1046 if (RT_FAILURE(rc))
1047 return PDMDrvHlpVMSetError(pDrvIns, rc, RT_SRC_POS, N_("NAT#%d: Configuration error: "
1048 "network '%s' describes not a valid IPv4 network"),
1049 pDrvIns->iInstance, szNetwork);
1050
1051 char szNetAddr[16];
1052 RTStrPrintf(szNetAddr, sizeof(szNetAddr), "%d.%d.%d.%d",
1053 (Network & 0xFF000000) >> 24, (Network & 0xFF0000) >> 16,
1054 (Network & 0xFF00) >> 8, Network & 0xFF);
1055
1056 /*
1057 * Initialize slirp.
1058 */
1059 rc = slirp_init(&pThis->pNATState, &szNetAddr[0], Netmask, fPassDomain, !!fUseHostResolver, pThis);
1060 if (RT_SUCCESS(rc))
1061 {
1062 slirp_set_dhcp_TFTP_prefix(pThis->pNATState, pThis->pszTFTPPrefix);
1063 slirp_set_dhcp_TFTP_bootfile(pThis->pNATState, pThis->pszBootFile);
1064 slirp_set_dhcp_next_server(pThis->pNATState, pThis->pszNextServer);
1065 slirp_set_dhcp_dns_proxy(pThis->pNATState, !!fDNSProxy);
1066#ifdef VBOX_WITH_SLIRP_BSD_MBUF
1067 slirp_set_mtu(pThis->pNATState, MTU);
1068#endif
1069 char *pszBindIP = NULL;
1070 GET_STRING_ALLOC(rc, pThis, pCfgHandle, "BindIP", pszBindIP);
1071 rc = slirp_set_binding_address(pThis->pNATState, pszBindIP);
1072 if (rc != 0)
1073 LogRel(("NAT: value of BindIP has been ignored\n"));
1074
1075 if(pszBindIP != NULL)
1076 MMR3HeapFree(pszBindIP);
1077#define SLIRP_SET_TUNING_VALUE(name, setter) \
1078 do \
1079 { \
1080 int len = 0; \
1081 rc = CFGMR3QueryS32(pCfgHandle, name, &len); \
1082 if (RT_SUCCESS(rc)) \
1083 setter(pThis->pNATState, len); \
1084 } while(0)
1085
1086 SLIRP_SET_TUNING_VALUE("SocketRcvBuf", slirp_set_rcvbuf);
1087 SLIRP_SET_TUNING_VALUE("SocketSndBuf", slirp_set_sndbuf);
1088 SLIRP_SET_TUNING_VALUE("TcpRcvSpace", slirp_set_tcp_rcvspace);
1089 SLIRP_SET_TUNING_VALUE("TcpSndSpace", slirp_set_tcp_sndspace);
1090
1091 slirp_register_statistics(pThis->pNATState, pDrvIns);
1092#ifdef VBOX_WITH_STATISTICS
1093# define DRV_PROFILE_COUNTER(name, dsc) REGISTER_COUNTER(name, pThis, STAMTYPE_PROFILE, STAMUNIT_TICKS_PER_CALL, dsc)
1094# define DRV_COUNTING_COUNTER(name, dsc) REGISTER_COUNTER(name, pThis, STAMTYPE_COUNTER, STAMUNIT_COUNT, dsc)
1095# include "counters.h"
1096#endif
1097
1098 int rc2 = drvNATConstructRedir(pDrvIns->iInstance, pThis, pCfgHandle, Network);
1099 if (RT_SUCCESS(rc2))
1100 {
1101 /*
1102 * Register a load done notification to get the MAC address into the slirp
1103 * engine after we loaded a guest state.
1104 */
1105 rc2 = PDMDrvHlpSSMRegisterLoadDone(pDrvIns, drvNATLoadDone);
1106 AssertRC(rc2);
1107 rc = RTReqCreateQueue(&pThis->pSlirpReqQueue);
1108 if (RT_FAILURE(rc))
1109 {
1110 LogRel(("NAT: Can't create request queue\n"));
1111 return rc;
1112 }
1113
1114
1115 rc = RTReqCreateQueue(&pThis->pRecvReqQueue);
1116 if (RT_FAILURE(rc))
1117 {
1118 LogRel(("NAT: Can't create request queue\n"));
1119 return rc;
1120 }
1121 rc = RTReqCreateQueue(&pThis->pUrgRecvReqQueue);
1122 if (RT_FAILURE(rc))
1123 {
1124 LogRel(("NAT: Can't create request queue\n"));
1125 return rc;
1126 }
1127 rc = PDMDrvHlpPDMThreadCreate(pDrvIns, &pThis->pRecvThread, pThis, drvNATRecv,
1128 drvNATRecvWakeup, 128 * _1K, RTTHREADTYPE_IO, "NATRX");
1129 AssertReleaseRC(rc);
1130 rc = RTSemEventCreate(&pThis->EventRecv);
1131
1132 rc = PDMDrvHlpPDMThreadCreate(pDrvIns, &pThis->pUrgRecvThread, pThis, drvNATUrgRecv,
1133 drvNATUrgRecvWakeup, 128 * _1K, RTTHREADTYPE_IO, "NATURGRX");
1134 AssertReleaseRC(rc);
1135 rc = RTSemEventCreate(&pThis->EventRecv);
1136 rc = RTSemEventCreate(&pThis->EventUrgRecv);
1137 rc = RTCritSectInit(&pThis->csDevAccess);
1138 rc = PDMDrvHlpTMTimerCreate(pThis->pDrvIns, TMCLOCK_REAL/*enmClock*/, drvNATSlowTimer,
1139 pThis, TMTIMER_FLAGS_NO_CRIT_SECT/*flags*/, "NATSlowTmr", &pThis->pTmrSlow);
1140 rc = PDMDrvHlpTMTimerCreate(pThis->pDrvIns, TMCLOCK_REAL/*enmClock*/, drvNATFastTimer,
1141 pThis, TMTIMER_FLAGS_NO_CRIT_SECT/*flags*/, "NATFastTmr", &pThis->pTmrFast);
1142
1143#ifndef RT_OS_WINDOWS
1144 /*
1145 * Create the control pipe.
1146 */
1147 int fds[2];
1148 if (pipe(&fds[0]) != 0) /** @todo RTPipeCreate() or something... */
1149 {
1150 int rc = RTErrConvertFromErrno(errno);
1151 AssertRC(rc);
1152 return rc;
1153 }
1154 pThis->PipeRead = fds[0];
1155 pThis->PipeWrite = fds[1];
1156#else
1157 pThis->hWakeupEvent = CreateEvent(NULL, FALSE, FALSE, NULL); /* auto-reset event */
1158 slirp_register_external_event(pThis->pNATState, pThis->hWakeupEvent,
1159 VBOX_WAKEUP_EVENT_INDEX);
1160#endif
1161
1162 rc = PDMDrvHlpPDMThreadCreate(pDrvIns, &pThis->pSlirpThread, pThis, drvNATAsyncIoThread,
1163 drvNATAsyncIoWakeup, 128 * _1K, RTTHREADTYPE_IO, "NAT");
1164 AssertReleaseRC(rc);
1165
1166#ifdef VBOX_WITH_SLIRP_MT
1167 rc = PDMDrvHlpPDMThreadCreate(pDrvIns, &pThis->pGuestThread, pThis, drvNATAsyncIoGuest,
1168 drvNATAsyncIoGuestWakeup, 128 * _1K, RTTHREADTYPE_IO, "NATGUEST");
1169 AssertReleaseRC(rc);
1170#endif
1171
1172 pThis->enmLinkState = PDMNETWORKLINKSTATE_UP;
1173
1174 /* might return VINF_NAT_DNS */
1175 return rc;
1176 }
1177 /* failure path */
1178 rc = rc2;
1179 slirp_term(pThis->pNATState);
1180 pThis->pNATState = NULL;
1181 }
1182 else
1183 {
1184 PDMDRV_SET_ERROR(pDrvIns, rc, N_("Unknown error during NAT networking setup: "));
1185 AssertMsgFailed(("Add error message for rc=%d (%Rrc)\n", rc, rc));
1186 }
1187
1188 return rc;
1189}
1190
1191
1192/**
1193 * NAT network transport driver registration record.
1194 */
1195const PDMDRVREG g_DrvNAT =
1196{
1197 /* u32Version */
1198 PDM_DRVREG_VERSION,
1199 /* szDriverName */
1200 "NAT",
1201 /* pszDescription */
1202 "NAT Network Transport Driver",
1203 /* fFlags */
1204 PDM_DRVREG_FLAGS_HOST_BITS_DEFAULT,
1205 /* fClass. */
1206 PDM_DRVREG_CLASS_NETWORK,
1207 /* cMaxInstances */
1208 16,
1209 /* cbInstance */
1210 sizeof(DRVNAT),
1211 /* pfnConstruct */
1212 drvNATConstruct,
1213 /* pfnDestruct */
1214 drvNATDestruct,
1215 /* pfnIOCtl */
1216 NULL,
1217 /* pfnPowerOn */
1218 drvNATPowerOn,
1219 /* pfnReset */
1220 NULL,
1221 /* pfnSuspend */
1222 NULL,
1223 /* pfnResume */
1224 NULL,
1225 /* pfnAttach */
1226 NULL,
1227 /* pfnDetach */
1228 NULL,
1229 /* pfnPowerOff */
1230 NULL,
1231 /* pfnSoftReset */
1232 NULL,
1233 /* u32EndVersion */
1234 PDM_DRVREG_VERSION
1235};
1236
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette