1
0
mirror of https://github.com/SoftEtherVPN/SoftEtherVPN.git synced 2024-11-14 05:30:41 +03:00
SoftEtherVPN/src/Cedar/VLanUnix.c
Davide Beatrici 37ced5c479 Cedar: custom TAP interface name support for FreeBSD, function refactor
The maximum number of TAP devices to iterate through has been increased from 16 to 512.
2018-08-26 04:20:57 +02:00

930 lines
19 KiB
C

// SoftEther VPN Source Code - Developer Edition Master Branch
// Cedar Communication Module
//
// SoftEther VPN Server, Client and Bridge are free software under GPLv2.
//
// Copyright (c) Daiyuu Nobori.
// Copyright (c) SoftEther VPN Project, University of Tsukuba, Japan.
// Copyright (c) SoftEther Corporation.
//
// All Rights Reserved.
//
// http://www.softether.org/
//
// Author: Daiyuu Nobori, Ph.D.
// Contributors:
// - nattoheaven (https://github.com/nattoheaven)
// Comments: Tetsuo Sugiyama, Ph.D.
//
// This program is free software; you can redistribute it and/or
// modify it under the terms of the GNU General Public License
// version 2 as published by the Free Software Foundation.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License version 2
// along with this program; if not, write to the Free Software
// Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
//
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
// EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
// IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
// CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
// TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
// SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
//
// THE LICENSE AGREEMENT IS ATTACHED ON THE SOURCE-CODE PACKAGE
// AS "LICENSE.TXT" FILE. READ THE TEXT FILE IN ADVANCE TO USE THE SOFTWARE.
//
//
// THIS SOFTWARE IS DEVELOPED IN JAPAN, AND DISTRIBUTED FROM JAPAN,
// UNDER JAPANESE LAWS. YOU MUST AGREE IN ADVANCE TO USE, COPY, MODIFY,
// MERGE, PUBLISH, DISTRIBUTE, SUBLICENSE, AND/OR SELL COPIES OF THIS
// SOFTWARE, THAT ANY JURIDICAL DISPUTES WHICH ARE CONCERNED TO THIS
// SOFTWARE OR ITS CONTENTS, AGAINST US (SOFTETHER PROJECT, SOFTETHER
// CORPORATION, DAIYUU NOBORI OR OTHER SUPPLIERS), OR ANY JURIDICAL
// DISPUTES AGAINST US WHICH ARE CAUSED BY ANY KIND OF USING, COPYING,
// MODIFYING, MERGING, PUBLISHING, DISTRIBUTING, SUBLICENSING, AND/OR
// SELLING COPIES OF THIS SOFTWARE SHALL BE REGARDED AS BE CONSTRUED AND
// CONTROLLED BY JAPANESE LAWS, AND YOU MUST FURTHER CONSENT TO
// EXCLUSIVE JURISDICTION AND VENUE IN THE COURTS SITTING IN TOKYO,
// JAPAN. YOU MUST WAIVE ALL DEFENSES OF LACK OF PERSONAL JURISDICTION
// AND FORUM NON CONVENIENS. PROCESS MAY BE SERVED ON EITHER PARTY IN
// THE MANNER AUTHORIZED BY APPLICABLE LAW OR COURT RULE.
//
// USE ONLY IN JAPAN. DO NOT USE THIS SOFTWARE IN ANOTHER COUNTRY UNLESS
// YOU HAVE A CONFIRMATION THAT THIS SOFTWARE DOES NOT VIOLATE ANY
// CRIMINAL LAWS OR CIVIL RIGHTS IN THAT PARTICULAR COUNTRY. USING THIS
// SOFTWARE IN OTHER COUNTRIES IS COMPLETELY AT YOUR OWN RISK. THE
// SOFTETHER VPN PROJECT HAS DEVELOPED AND DISTRIBUTED THIS SOFTWARE TO
// COMPLY ONLY WITH THE JAPANESE LAWS AND EXISTING CIVIL RIGHTS INCLUDING
// PATENTS WHICH ARE SUBJECTS APPLY IN JAPAN. OTHER COUNTRIES' LAWS OR
// CIVIL RIGHTS ARE NONE OF OUR CONCERNS NOR RESPONSIBILITIES. WE HAVE
// NEVER INVESTIGATED ANY CRIMINAL REGULATIONS, CIVIL LAWS OR
// INTELLECTUAL PROPERTY RIGHTS INCLUDING PATENTS IN ANY OF OTHER 200+
// COUNTRIES AND TERRITORIES. BY NATURE, THERE ARE 200+ REGIONS IN THE
// WORLD, WITH DIFFERENT LAWS. IT IS IMPOSSIBLE TO VERIFY EVERY
// COUNTRIES' LAWS, REGULATIONS AND CIVIL RIGHTS TO MAKE THE SOFTWARE
// COMPLY WITH ALL COUNTRIES' LAWS BY THE PROJECT. EVEN IF YOU WILL BE
// SUED BY A PRIVATE ENTITY OR BE DAMAGED BY A PUBLIC SERVANT IN YOUR
// COUNTRY, THE DEVELOPERS OF THIS SOFTWARE WILL NEVER BE LIABLE TO
// RECOVER OR COMPENSATE SUCH DAMAGES, CRIMINAL OR CIVIL
// RESPONSIBILITIES. NOTE THAT THIS LINE IS NOT LICENSE RESTRICTION BUT
// JUST A STATEMENT FOR WARNING AND DISCLAIMER.
//
//
// SOURCE CODE CONTRIBUTION
// ------------------------
//
// Your contribution to SoftEther VPN Project is much appreciated.
// Please send patches to us through GitHub.
// Read the SoftEther VPN Patch Acceptance Policy in advance:
// http://www.softether.org/5-download/src/9.patch
//
//
// DEAR SECURITY EXPERTS
// ---------------------
//
// If you find a bug or a security vulnerability please kindly inform us
// about the problem immediately so that we can fix the security problem
// to protect a lot of users around the world as soon as possible.
//
// Our e-mail address for security reports is:
// softether-vpn-security [at] softether.org
//
// Please note that the above e-mail address is not a technical support
// inquiry address. If you need technical assistance, please visit
// http://www.softether.org/ and ask your question on the users forum.
//
// Thank you for your cooperation.
//
//
// NO MEMORY OR RESOURCE LEAKS
// ---------------------------
//
// The memory-leaks and resource-leaks verification under the stress
// test has been passed before release this source code.
// VLanUnix.c
// Virtual device driver library for UNIX
#include <GlobalConst.h>
#ifdef VLAN_C
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <wchar.h>
#include <stdarg.h>
#include <time.h>
#include <errno.h>
#include <Mayaqua/Mayaqua.h>
#include <Cedar/Cedar.h>
#ifdef UNIX_BSD
#ifdef UNIX_OPENBSD
#include <netinet/if_ether.h>
#else // UNIX_OPENBSD
#include <net/ethernet.h>
#endif // UNIX_OPENBSD
#endif // UNIX_BSD
#ifdef OS_UNIX
static LIST *unix_vlan = NULL;
#ifndef NO_VLAN
// Get the PACKET_ADAPTER
PACKET_ADAPTER *VLanGetPacketAdapter()
{
PACKET_ADAPTER *pa;
pa = NewPacketAdapter(VLanPaInit, VLanPaGetCancel,
VLanPaGetNextPacket, VLanPaPutPacket, VLanPaFree);
if (pa == NULL)
{
return NULL;
}
return pa;
}
// PA initialization
bool VLanPaInit(SESSION *s)
{
VLAN *v;
// Validate arguments
if (s == NULL)
{
return false;
}
// Connect to the driver
v = NewVLan(s->ClientOption->DeviceName, NULL);
if (v == NULL)
{
// Failure
return false;
}
s->PacketAdapter->Param = v;
return true;
}
// Get the cancel object
CANCEL *VLanPaGetCancel(SESSION *s)
{
VLAN *v;
// Validate arguments
if ((s == NULL) || ((v = s->PacketAdapter->Param) == NULL))
{
return NULL;
}
return VLanGetCancel(v);
}
// Release the packet adapter
void VLanPaFree(SESSION *s)
{
VLAN *v;
// Validate arguments
if ((s == NULL) || ((v = s->PacketAdapter->Param) == NULL))
{
return;
}
// End the virtual LAN card
FreeVLan(v);
s->PacketAdapter->Param = NULL;
}
// Write a packet
bool VLanPaPutPacket(SESSION *s, void *data, UINT size)
{
VLAN *v;
// Validate arguments
if ((s == NULL) || ((v = s->PacketAdapter->Param) == NULL))
{
return false;
}
return VLanPutPacket(v, data, size);
}
// Get the next packet
UINT VLanPaGetNextPacket(SESSION *s, void **data)
{
VLAN *v;
UINT size;
// Validate arguments
if (data == NULL || (s == NULL) || ((v = s->PacketAdapter->Param) == NULL))
{
return INFINITE;
}
if (VLanGetNextPacket(v, data, &size) == false)
{
return INFINITE;
}
return size;
}
// Write a packet to the virtual LAN card
bool VLanPutPacket(VLAN *v, void *buf, UINT size)
{
UINT ret;
// Validate arguments
if (v == NULL)
{
return false;
}
if (v->Halt)
{
return false;
}
if (size > MAX_PACKET_SIZE)
{
return false;
}
if (buf == NULL || size == 0)
{
if (buf != NULL)
{
Free(buf);
}
return true;
}
ret = write(v->fd, buf, size);
if (ret >= 1)
{
Free(buf);
return true;
}
if (errno == EAGAIN || ret == 0)
{
Free(buf);
return true;
}
return false;
}
// Get the next packet from the virtual LAN card
bool VLanGetNextPacket(VLAN *v, void **buf, UINT *size)
{
UCHAR tmp[TAP_READ_BUF_SIZE];
int ret;
// Validate arguments
if (v == NULL || buf == NULL || size == 0)
{
return false;
}
if (v->Halt)
{
return false;
}
// Read
ret = read(v->fd, tmp, sizeof(tmp));
if (ret == 0 ||
(ret == -1 && errno == EAGAIN))
{
// No packet
*buf = NULL;
*size = 0;
return true;
}
else if (ret == -1 || ret > TAP_READ_BUF_SIZE)
{
// Error
return false;
}
else
{
// Reading packet success
*buf = Malloc(ret);
Copy(*buf, tmp, ret);
*size = ret;
return true;
}
}
// Get the cancel object
CANCEL *VLanGetCancel(VLAN *v)
{
CANCEL *c;
int fd;
int yes = 0;
// Validate arguments
if (v == NULL)
{
return NULL;
}
c = NewCancel();
UnixDeletePipe(c->pipe_read, c->pipe_write);
c->pipe_read = c->pipe_write = -1;
fd = v->fd;
UnixSetSocketNonBlockingMode(fd, true);
c->SpecialFlag = true;
c->pipe_read = fd;
return c;
}
// Close the Virtual LAN card
void FreeVLan(VLAN *v)
{
// Validate arguments
if (v == NULL)
{
return;
}
Free(v->InstanceName);
Free(v);
}
// Create a tap
VLAN *NewTap(char *name, char *mac_address, bool create_up)
{
int fd;
VLAN *v;
// Validate arguments
if (name == NULL || mac_address == NULL)
{
return NULL;
}
fd = UnixCreateTapDeviceEx(name, "tap", mac_address, create_up);
if (fd == -1)
{
return NULL;
}
v = ZeroMalloc(sizeof(VLAN));
v->Halt = false;
v->InstanceName = CopyStr(name);
v->fd = fd;
return v;
}
// Close the tap
void FreeTap(VLAN *v)
{
// Validate arguments
if (v == NULL)
{
return;
}
close(v->fd);
FreeVLan(v);
}
// Get the Virtual LAN card list
VLAN *NewVLan(char *instance_name, VLAN_PARAM *param)
{
int fd;
VLAN *v;
// Validate arguments
if (instance_name == NULL)
{
return NULL;
}
// Open the tap
fd = UnixVLanGet(instance_name);
if (fd == -1)
{
return NULL;
}
v = ZeroMalloc(sizeof(VLAN));
v->Halt = false;
v->InstanceName = CopyStr(instance_name);
v->fd = fd;
return v;
}
// Generate TUN interface name
void GenerateTunName(char *name, char *prefix, char *tun_name, size_t tun_name_len)
{
char instance_name_lower[MAX_SIZE];
// Generate the device name
StrCpy(instance_name_lower, sizeof(instance_name_lower), name);
Trim(instance_name_lower);
StrLower(instance_name_lower);
Format(tun_name, tun_name_len, "%s_%s", prefix, instance_name_lower);
tun_name[15] = 0;
}
// Create a tap device
int UnixCreateTapDeviceEx(char *name, char *prefix, UCHAR *mac_address, bool create_up)
{
int fd = -1, s = -1;
char tap_name[MAX_SIZE], tap_path[MAX_SIZE];
struct ifreq ifr;
// Validate arguments
if (name == NULL)
{
return -1;
}
GenerateTunName(name, prefix, tap_name, sizeof(tap_name));
// Open the tun / tap
#ifndef UNIX_BSD
if (GetOsInfo()->OsType == OSTYPE_LINUX)
{
// Linux
if (IsFile(TAP_FILENAME_1) == false)
{
char tmp[MAX_SIZE];
Format(tmp, sizeof(tmp), "%s c 10 200", TAP_FILENAME_1);
Run("mknod", tmp, true, true);
Format(tmp, sizeof(tmp), "600 %s", TAP_FILENAME_1);
Run("chmod", tmp, true, true);
}
}
fd = open(TAP_FILENAME_1, O_RDWR);
if (fd == -1)
{
// Failure
fd = open(TAP_FILENAME_2, O_RDWR);
if (fd == -1)
{
return -1;
}
}
#else // UNIX_BSD
{
sprintf(tap_path, "%s", TAP_DIR TAP_NAME);
for (int i = 0; i < TAP_MAX; i++) {
sprintf(tap_path + StrLen(TAP_DIR TAP_NAME), "%d", i);
fd = open(tap_path, O_RDWR);
if (fd != -1)
{
break;
}
}
if (fd == -1)
{
return -1;
}
}
#endif // UNIX_BSD
#ifdef UNIX_LINUX
// Create a TAP device for Linux
// Set the name and the flags
Zero(&ifr, sizeof(ifr));
StrCpy(ifr.ifr_name, sizeof(ifr.ifr_name), tap_name);
ifr.ifr_flags = IFF_TAP | IFF_NO_PI;
if (ioctl(fd, TUNSETIFF, &ifr) == -1)
{
// Failure
close(fd);
return -1;
}
s = socket(AF_INET, SOCK_DGRAM, 0);
if (s != -1)
{
// Set the MAC address
if (mac_address != NULL)
{
Zero(&ifr, sizeof(ifr));
StrCpy(ifr.ifr_name, sizeof(ifr.ifr_name), tap_name);
ifr.ifr_hwaddr.sa_family = ARPHRD_ETHER;
Copy(&ifr.ifr_hwaddr.sa_data, mac_address, ETHER_ADDR_LEN);
ioctl(s, SIOCSIFHWADDR, &ifr);
}
if (create_up)
{
Zero(&ifr, sizeof(ifr));
StrCpy(ifr.ifr_name, sizeof(ifr.ifr_name), tap_name);
ioctl(s, SIOCGIFFLAGS, &ifr);
ifr.ifr_flags |= IFF_UP;
ioctl(s, SIOCSIFFLAGS, &ifr);
}
close(s);
}
#endif // UNIX_LINUX
#ifdef UNIX_BSD
// Create a TAP device for BSD
Zero(&ifr, sizeof(ifr));
// Get the current name
StrCpy(ifr.ifr_name, sizeof(ifr.ifr_name), tap_path + StrLen(TAP_DIR));
s = socket(AF_INET, SOCK_DGRAM, 0);
if (s != -1)
{
// Set the name, if possible
#ifdef SIOCSIFNAME
ifr.ifr_data = tap_name;
ioctl(s, SIOCSIFNAME, &ifr);
#else // SIOCSIFNAME
StrCpy(tap_name, sizeof(tap_name), ifr.ifr_name);
#endif // SIOCSIFNAME
// Set the MAC address
if (mac_address != NULL)
{
Zero(&ifr, sizeof(ifr));
StrCpy(ifr.ifr_name, sizeof(ifr.ifr_name), tap_name);
ifr.ifr_addr.sa_len = ETHER_ADDR_LEN;
ifr.ifr_addr.sa_family = AF_LINK;
Copy(&ifr.ifr_addr.sa_data, mac_address, ETHER_ADDR_LEN);
ioctl(s, SIOCSIFLLADDR, &ifr);
}
if (create_up)
{
Zero(&ifr, sizeof(ifr));
StrCpy(ifr.ifr_name, sizeof(ifr.ifr_name), tap_name);
ioctl(s, SIOCGIFFLAGS, &ifr);
ifr.ifr_flags |= IFF_UP;
ioctl(s, SIOCSIFFLAGS, &ifr);
}
close(s);
}
#endif // UNIX_BSD
#ifdef UNIX_SOLARIS
// Create a TAP device for Solaris
{
int ip_fd;
int tun_fd;
int ppa;
tun_fd = open(tap_name, O_RDWR);
if (tun_fd == -1)
{
// Failure
close(fd);
return -1;
}
ip_fd = open("/dev/ip", O_RDWR);
if (ip_fd == -1)
{
// Failure
close(tun_fd);
close(fd);
return -1;
}
ppa = -1;
ppa = ioctl(tun_fd, TUNNEWPPA, ppa);
if (ppa == -1)
{
// Failure
close(tun_fd);
close(fd);
close(ip_fd);
return -1;
}
if (ioctl(fd, I_PUSH, "ip") < 0)
{
// Failure
close(tun_fd);
close(fd);
close(ip_fd);
return -1;
}
if (ioctl(fd, IF_UNITSEL, (char *)&ppa) < 0)
{
// Failure
close(tun_fd);
close(fd);
close(ip_fd);
return -1;
}
if (ioctl(ip_fd, I_LINK, fd) < 0)
{
// Failure
close(tun_fd);
close(fd);
close(ip_fd);
return -1;
}
close(tun_fd);
close(ip_fd);
}
#endif // UNIX_SOLARIS
return fd;
}
int UnixCreateTapDevice(char *name, UCHAR *mac_address, bool create_up)
{
return UnixCreateTapDeviceEx(name, "vpn", mac_address, create_up);
}
// Close the tap device
void UnixCloseTapDevice(int fd)
{
// Validate arguments
if (fd == -1)
{
return;
}
close(fd);
}
#else // NO_VLAN
void UnixCloseTapDevice(int fd)
{
}
int UnixCreateTapDeviceEx(char *name, char *prefix, UCHAR *mac_address, bool create_up)
{
return -1;
}
int UnixCreateTapDevice(char *name, UCHAR *mac_address, bool create_up)
{
return -1;
}
#endif // NO_VLAN
// Comparison of the VLAN list entries
int UnixCompareVLan(void *p1, void *p2)
{
UNIX_VLAN_LIST *v1, *v2;
if (p1 == NULL || p2 == NULL)
{
return 0;
}
v1 = *(UNIX_VLAN_LIST **)p1;
v2 = *(UNIX_VLAN_LIST **)p2;
if (v1 == NULL || v2 == NULL)
{
return 0;
}
return StrCmpi(v1->Name, v2->Name);
}
// Initialize the VLAN list
void UnixVLanInit()
{
unix_vlan = NewList(UnixCompareVLan);
}
// Create a VLAN
bool UnixVLanCreateEx(char *name, char *prefix, UCHAR *mac_address, bool create_up)
{
// Validate arguments
char tmp[MAX_SIZE];
if (name == NULL)
{
return false;
}
StrCpy(tmp, sizeof(tmp), name);
Trim(tmp);
name = tmp;
LockList(unix_vlan);
{
UNIX_VLAN_LIST *t, tt;
int fd;
// Check whether a device with the same name exists
Zero(&tt, sizeof(tt));
StrCpy(tt.Name, sizeof(tt.Name), name);
t = Search(unix_vlan, &tt);
if (t != NULL)
{
// Already exist
UnlockList(unix_vlan);
return false;
}
// Create a tap device
fd = UnixCreateTapDeviceEx(name, prefix, mac_address, create_up);
if (fd == -1)
{
// Failure to create
UnlockList(unix_vlan);
return false;
}
t = ZeroMalloc(sizeof(UNIX_VLAN_LIST));
t->fd = fd;
StrCpy(t->Name, sizeof(t->Name), name);
Insert(unix_vlan, t);
}
UnlockList(unix_vlan);
return true;
}
bool UnixVLanCreate(char *name, UCHAR *mac_address, bool create_up)
{
return UnixVLanCreateEx(name, "vpn", mac_address, create_up);
}
// Set a VLAN up/down
bool UnixVLanSetState(char* name, bool state_up)
{
#ifdef UNIX_LINUX
UNIX_VLAN_LIST *t, tt;
struct ifreq ifr;
int s;
char eth_name[MAX_SIZE];
LockList(unix_vlan);
{
int result;
// Find a device with the same name
Zero(&tt, sizeof(tt));
StrCpy(tt.Name, sizeof(tt.Name), name);
t = Search(unix_vlan, &tt);
if (t == NULL)
{
// No such device
UnlockList(unix_vlan);
return false;
}
GenerateTunName(name, "vpn", eth_name, sizeof(eth_name));
Zero(&ifr, sizeof(ifr));
StrCpy(ifr.ifr_name, sizeof(ifr.ifr_name), eth_name);
s = socket(AF_INET, SOCK_DGRAM, 0);
if (s == -1)
{
// Failed to create socket
UnlockList(unix_vlan);
return false;
}
ioctl(s, SIOCGIFFLAGS, &ifr);
if (state_up)
{
ifr.ifr_flags |= IFF_UP;
}
else
{
ifr.ifr_flags &= ~IFF_UP;
}
result = ioctl(s, SIOCSIFFLAGS, &ifr);
close(s);
}
UnlockList(unix_vlan);
#endif // UNIX_LINUX
return true;
}
// Enumerate VLANs
TOKEN_LIST *UnixVLanEnum()
{
TOKEN_LIST *ret;
UINT i;
if (unix_vlan == NULL)
{
return NullToken();
}
ret = ZeroMalloc(sizeof(TOKEN_LIST));
LockList(unix_vlan);
{
ret->NumTokens = LIST_NUM(unix_vlan);
ret->Token = ZeroMalloc(sizeof(char *) * ret->NumTokens);
for (i = 0;i < ret->NumTokens;i++)
{
UNIX_VLAN_LIST *t = LIST_DATA(unix_vlan, i);
ret->Token[i] = CopyStr(t->Name);
}
}
UnlockList(unix_vlan);
return ret;
}
// Delete the VLAN
void UnixVLanDelete(char *name)
{
// Validate arguments
if (name == NULL || unix_vlan == NULL)
{
return;
}
LockList(unix_vlan);
{
UINT i;
UNIX_VLAN_LIST *t, tt;
Zero(&tt, sizeof(tt));
StrCpy(tt.Name, sizeof(tt.Name), name);
t = Search(unix_vlan, &tt);
if (t != NULL)
{
UnixCloseTapDevice(t->fd);
Delete(unix_vlan, t);
Free(t);
}
}
UnlockList(unix_vlan);
}
// Get the VLAN
int UnixVLanGet(char *name)
{
int fd = -1;
// Validate arguments
if (name == NULL || unix_vlan == NULL)
{
return -1;
}
LockList(unix_vlan);
{
UINT i;
UNIX_VLAN_LIST *t, tt;
Zero(&tt, sizeof(tt));
StrCpy(tt.Name, sizeof(tt.Name), name);
t = Search(unix_vlan, &tt);
if (t != NULL)
{
fd = t->fd;
}
}
UnlockList(unix_vlan);
return fd;
}
// Release the VLAN list
void UnixVLanFree()
{
UINT i;
for (i = 0;i < LIST_NUM(unix_vlan);i++)
{
UNIX_VLAN_LIST *t = LIST_DATA(unix_vlan, i);
UnixCloseTapDevice(t->fd);
Free(t);
}
ReleaseList(unix_vlan);
unix_vlan = NULL;
}
#endif // OS_UNIX
#endif // VLAN_C