5 * Copyright (C) 2007-2010 Intel Corporation. All rights reserved.
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
28 #include <sys/ioctl.h>
30 #include <linux/sockios.h>
34 #define BRIDGE_NAME "tether"
36 static connman_bool_t tethering_status = FALSE;
37 static const char *default_interface = NULL;
38 static volatile gint tethering_enabled;
40 connman_bool_t __connman_tethering_get_status(void)
42 return tethering_status;
45 static int create_bridge(const char *name)
51 sk = socket(AF_INET, SOCK_STREAM, 0);
55 err = ioctl(sk, SIOCBRADDBR, name);
65 static int remove_bridge(const char *name)
71 sk = socket(AF_INET, SOCK_STREAM, 0);
75 err = ioctl(sk, SIOCBRDELBR, name);
85 static int enable_ip_forward(connman_bool_t enable)
90 f = fopen("/proc/sys/net/ipv4/ip_forward", "r+");
104 static int enable_nat(const char *interface)
108 if (interface == NULL)
111 /* Enable IPv4 forwarding */
112 ret = enable_ip_forward(TRUE);
116 /* TODO: Flush nat POSTROUTING chain */
117 /* Enable masquerading */
118 ret = __connman_iptables_command("-t nat -A POSTROUTING -o %s -j MASQUERADE", interface);
122 return __connman_iptables_commit("nat");
125 static void disable_nat(const char *interface)
127 /* Disable IPv4 forwarding */
128 enable_ip_forward(FALSE);
130 /* TODO: Flush nat POSTROUTING chain */
133 void __connman_tethering_set_enabled(void)
135 if (tethering_status == FALSE)
138 DBG("enabled %d", tethering_enabled + 1);
140 if (g_atomic_int_exchange_and_add(&tethering_enabled, 1) == 0) {
141 /* TODO Start DHCP server and DNS proxy on the bridge */
143 enable_nat(default_interface);
144 DBG("tethering started");
148 void __connman_tethering_set_disabled(void)
150 if (tethering_status == FALSE)
153 DBG("enabled %d", tethering_enabled - 1);
155 if (g_atomic_int_dec_and_test(&tethering_enabled) == 0) {
156 /* TODO Stop DHCP server and DNS proxy on the bridge */
158 disable_nat(default_interface);
159 DBG("tethering stopped");
163 int __connman_tethering_set_status(connman_bool_t status)
165 if (status == tethering_status)
168 if (status == TRUE) {
169 create_bridge(BRIDGE_NAME);
170 __connman_technology_enable_tethering(BRIDGE_NAME);
172 __connman_technology_disable_tethering(BRIDGE_NAME);
173 remove_bridge(BRIDGE_NAME);
176 tethering_status = status;
181 void __connman_tethering_update_interface(const char *interface)
183 DBG("interface %s", interface);
185 default_interface = interface;
187 if (interface == NULL) {
188 disable_nat(interface);
193 if (tethering_status == FALSE ||
194 !g_atomic_int_get(&tethering_enabled))
197 enable_nat(interface);
200 int __connman_tethering_init(void)
204 tethering_enabled = 0;
209 void __connman_tethering_cleanup(void)
213 if (tethering_status == TRUE)
214 remove_bridge(BRIDGE_NAME);