5 * Copyright (C) 2007-2010 Intel Corporation. All rights reserved.
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
28 #include <sys/ioctl.h>
30 #include <linux/sockios.h>
34 #define BRIDGE_NAME "tether"
36 static connman_bool_t tethering_status = FALSE;
37 static const char *default_interface = NULL;
38 static volatile gint tethering_enabled;
40 connman_bool_t __connman_tethering_get_status(void)
42 return tethering_status;
45 static int create_bridge(const char *name)
51 sk = socket(AF_INET, SOCK_STREAM, 0);
55 err = ioctl(sk, SIOCBRADDBR, name);
65 static int remove_bridge(const char *name)
71 sk = socket(AF_INET, SOCK_STREAM, 0);
75 err = ioctl(sk, SIOCBRDELBR, name);
85 static int enable_ip_forward(connman_bool_t enable)
90 f = fopen("/proc/sys/net/ipv4/ip_forward", "r+");
104 static int enable_nat(const char *interface)
108 if (interface == NULL)
111 /* Enable IPv4 forwarding */
112 err = enable_ip_forward(TRUE);
116 /* TODO: Flush nat POSTROUTING chain */
117 /* Enable masquerading */
118 err = __connman_iptables_command("-t nat -A POSTROUTING "
119 "-o %s -j MASQUERADE", interface);
123 return __connman_iptables_commit("nat");
126 static void disable_nat(const char *interface)
128 /* Disable IPv4 forwarding */
129 enable_ip_forward(FALSE);
131 /* TODO: Flush nat POSTROUTING chain */
134 void __connman_tethering_set_enabled(void)
136 if (tethering_status == FALSE)
139 DBG("enabled %d", tethering_enabled + 1);
141 if (g_atomic_int_exchange_and_add(&tethering_enabled, 1) == 0) {
142 /* TODO Start DHCP server and DNS proxy on the bridge */
144 enable_nat(default_interface);
145 DBG("tethering started");
149 void __connman_tethering_set_disabled(void)
151 if (tethering_status == FALSE)
154 DBG("enabled %d", tethering_enabled - 1);
156 if (g_atomic_int_dec_and_test(&tethering_enabled) == 0) {
157 /* TODO Stop DHCP server and DNS proxy on the bridge */
159 disable_nat(default_interface);
160 DBG("tethering stopped");
164 int __connman_tethering_set_status(connman_bool_t status)
166 if (status == tethering_status)
169 if (status == TRUE) {
170 create_bridge(BRIDGE_NAME);
171 __connman_technology_enable_tethering(BRIDGE_NAME);
173 __connman_technology_disable_tethering(BRIDGE_NAME);
174 remove_bridge(BRIDGE_NAME);
177 tethering_status = status;
182 void __connman_tethering_update_interface(const char *interface)
184 DBG("interface %s", interface);
186 default_interface = interface;
188 if (interface == NULL) {
189 disable_nat(interface);
194 if (tethering_status == FALSE ||
195 !g_atomic_int_get(&tethering_enabled))
198 enable_nat(interface);
201 int __connman_tethering_init(void)
205 tethering_enabled = 0;
210 void __connman_tethering_cleanup(void)
214 if (tethering_status == TRUE)
215 remove_bridge(BRIDGE_NAME);