Merge branch 'ipsec' into tizen
[platform/upstream/connman.git] / vpn / plugins / vpn.c
1 /*
2  *
3  *  ConnMan VPN daemon
4  *
5  *  Copyright (C) 2007-2013  Intel Corporation. All rights reserved.
6  *
7  *  This program is free software; you can redistribute it and/or modify
8  *  it under the terms of the GNU General Public License version 2 as
9  *  published by the Free Software Foundation.
10  *
11  *  This program is distributed in the hope that it will be useful,
12  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
13  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14  *  GNU General Public License for more details.
15  *
16  *  You should have received a copy of the GNU General Public License
17  *  along with this program; if not, write to the Free Software
18  *  Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
19  *
20  */
21
22 #ifdef HAVE_CONFIG_H
23 #include <config.h>
24 #endif
25
26 #define _GNU_SOURCE
27 #include <string.h>
28 #include <fcntl.h>
29 #include <unistd.h>
30 #include <sys/stat.h>
31 #include <stdio.h>
32 #include <errno.h>
33 #include <sys/ioctl.h>
34 #include <sys/types.h>
35 #include <linux/if_tun.h>
36 #include <net/if.h>
37
38 #include <dbus/dbus.h>
39
40 #include <glib/gprintf.h>
41
42 #include <connman/log.h>
43 #include <connman/rtnl.h>
44 #include <connman/task.h>
45 #include <connman/inet.h>
46
47 #include "../vpn-rtnl.h"
48 #include "../vpn-provider.h"
49
50 #include "vpn.h"
51
52 struct vpn_data {
53         struct vpn_provider *provider;
54         char *if_name;
55         unsigned flags;
56         unsigned int watch;
57         enum vpn_state state;
58         struct connman_task *task;
59 };
60
61 struct vpn_driver_data {
62         const char *name;
63         const char *program;
64         struct vpn_driver *vpn_driver;
65         struct vpn_provider_driver provider_driver;
66 };
67
68 GHashTable *driver_hash = NULL;
69
70 static int stop_vpn(struct vpn_provider *provider)
71 {
72         struct vpn_data *data = vpn_provider_get_data(provider);
73         struct vpn_driver_data *vpn_driver_data;
74         const char *name;
75         struct ifreq ifr;
76         int fd, err;
77
78         if (!data)
79                 return -EINVAL;
80
81         name = vpn_provider_get_driver_name(provider);
82         if (!name)
83                 return -EINVAL;
84
85         vpn_driver_data = g_hash_table_lookup(driver_hash, name);
86
87         if (vpn_driver_data && vpn_driver_data->vpn_driver &&
88                         vpn_driver_data->vpn_driver->flags == VPN_FLAG_NO_TUN)
89                 return 0;
90
91         memset(&ifr, 0, sizeof(ifr));
92         ifr.ifr_flags = IFF_TUN | IFF_NO_PI;
93         sprintf(ifr.ifr_name, "%s", data->if_name);
94
95         fd = open("/dev/net/tun", O_RDWR | O_CLOEXEC);
96         if (fd < 0) {
97                 err = -errno;
98                 connman_error("Failed to open /dev/net/tun to device %s: %s",
99                               data->if_name, strerror(errno));
100                 return err;
101         }
102
103         if (ioctl(fd, TUNSETIFF, (void *)&ifr)) {
104                 err = -errno;
105                 connman_error("Failed to TUNSETIFF for device %s to it: %s",
106                               data->if_name, strerror(errno));
107                 close(fd);
108                 return err;
109         }
110
111         if (ioctl(fd, TUNSETPERSIST, 0)) {
112                 err = -errno;
113                 connman_error("Failed to set tun device %s nonpersistent: %s",
114                               data->if_name, strerror(errno));
115                 close(fd);
116                 return err;
117         }
118         close(fd);
119         DBG("Killed tun device %s", data->if_name);
120         return 0;
121 }
122
123 void vpn_died(struct connman_task *task, int exit_code, void *user_data)
124 {
125         struct vpn_provider *provider = user_data;
126         struct vpn_data *data = vpn_provider_get_data(provider);
127         int state = VPN_STATE_FAILURE;
128         enum vpn_provider_error ret;
129
130         DBG("provider %p data %p", provider, data);
131
132         if (!data)
133                 goto vpn_exit;
134
135         state = data->state;
136
137         stop_vpn(provider);
138         vpn_provider_set_data(provider, NULL);
139
140         if (data->watch != 0) {
141                 vpn_rtnl_remove_watch(data->watch);
142                 data->watch = 0;
143                 vpn_provider_unref(provider);
144         }
145
146 vpn_exit:
147         if (state != VPN_STATE_READY && state != VPN_STATE_DISCONNECT) {
148                 const char *name;
149                 struct vpn_driver_data *vpn_data = NULL;
150
151                 name = vpn_provider_get_driver_name(provider);
152                 if (name)
153                         vpn_data = g_hash_table_lookup(driver_hash, name);
154
155                 if (vpn_data &&
156                                 vpn_data->vpn_driver->error_code)
157                         ret = vpn_data->vpn_driver->error_code(provider,
158                                         exit_code);
159                 else
160                         ret = VPN_PROVIDER_ERROR_UNKNOWN;
161
162                 vpn_provider_indicate_error(provider, ret);
163         } else
164                 vpn_provider_set_state(provider, VPN_PROVIDER_STATE_IDLE);
165
166         vpn_provider_set_index(provider, -1);
167
168         if (data) {
169                 vpn_provider_unref(data->provider);
170                 g_free(data->if_name);
171                 g_free(data);
172         }
173
174         connman_task_destroy(task);
175 }
176
177 int vpn_set_ifname(struct vpn_provider *provider, const char *ifname)
178 {
179         struct vpn_data *data = vpn_provider_get_data(provider);
180         int index;
181
182         if (!ifname || !data)
183                 return  -EIO;
184
185         index = connman_inet_ifindex(ifname);
186         if (index < 0)
187                 return  -EIO;
188
189         if (data->if_name)
190                 g_free(data->if_name);
191
192         data->if_name = (char *)g_strdup(ifname);
193         vpn_provider_set_index(provider, index);
194
195         return 0;
196 }
197
198 static void vpn_newlink(unsigned flags, unsigned change, void *user_data)
199 {
200         struct vpn_provider *provider = user_data;
201         struct vpn_data *data = vpn_provider_get_data(provider);
202
203         if ((data->flags & IFF_UP) != (flags & IFF_UP)) {
204                 if (flags & IFF_UP) {
205                         data->state = VPN_STATE_READY;
206                         vpn_provider_set_state(provider,
207                                         VPN_PROVIDER_STATE_READY);
208                 }
209         }
210         data->flags = flags;
211 }
212
213 static DBusMessage *vpn_notify(struct connman_task *task,
214                         DBusMessage *msg, void *user_data)
215 {
216         struct vpn_provider *provider = user_data;
217         struct vpn_data *data;
218         struct vpn_driver_data *vpn_driver_data;
219         const char *name;
220         int state, index, err;
221
222         data = vpn_provider_get_data(provider);
223
224         name = vpn_provider_get_driver_name(provider);
225
226         if (!name) {
227                 DBG("Cannot find VPN driver for provider %p", provider);
228                 vpn_provider_set_state(provider, VPN_PROVIDER_STATE_FAILURE);
229                 return NULL;
230         }
231
232         vpn_driver_data = g_hash_table_lookup(driver_hash, name);
233         if (!vpn_driver_data) {
234                 DBG("Cannot find VPN driver data for name %s", name);
235                 vpn_provider_set_state(provider, VPN_PROVIDER_STATE_FAILURE);
236                 return NULL;
237         }
238
239         state = vpn_driver_data->vpn_driver->notify(msg, provider);
240
241         DBG("provider %p driver %s state %d", provider, name, state);
242
243         switch (state) {
244         case VPN_STATE_CONNECT:
245         case VPN_STATE_READY:
246                 if (data->state == VPN_STATE_READY) {
247                         /*
248                          * This is the restart case, in which case we must
249                          * just set the IP address.
250                          *
251                          * We need to remove first the old address, just
252                          * replacing the old address will not work as expected
253                          * because the old address will linger in the interface
254                          * and not disapper so the clearing is needed here.
255                          *
256                          * Also the state must change, otherwise the routes
257                          * will not be set properly.
258                          */
259                         vpn_provider_set_state(provider,
260                                                 VPN_PROVIDER_STATE_CONNECT);
261
262                         vpn_provider_clear_address(provider, AF_INET);
263                         vpn_provider_clear_address(provider, AF_INET6);
264
265                         vpn_provider_change_address(provider);
266                         vpn_provider_set_state(provider,
267                                                 VPN_PROVIDER_STATE_READY);
268                         break;
269                 }
270
271                 index = vpn_provider_get_index(provider);
272                 vpn_provider_ref(provider);
273                 data->watch = vpn_rtnl_add_newlink_watch(index,
274                                                      vpn_newlink, provider);
275                 err = connman_inet_ifup(index);
276                 if (err < 0) {
277                         if (err == -EALREADY)
278                                 /*
279                                  * So the interface is up already, that is just
280                                  * great. Unfortunately in this case the
281                                  * newlink watch might not have been called at
282                                  * all. We must manually call it here so that
283                                  * the provider can go to ready state and the
284                                  * routes are setup properly.
285                                  */
286                                 vpn_newlink(IFF_UP, 0, provider);
287                         else
288                                 DBG("Cannot take interface %d up err %d/%s",
289                                         index, -err, strerror(-err));
290                 }
291                 break;
292
293         case VPN_STATE_UNKNOWN:
294         case VPN_STATE_IDLE:
295         case VPN_STATE_DISCONNECT:
296         case VPN_STATE_FAILURE:
297                 vpn_provider_set_state(provider,
298                                         VPN_PROVIDER_STATE_DISCONNECT);
299                 break;
300
301         case VPN_STATE_AUTH_FAILURE:
302                 vpn_provider_indicate_error(provider,
303                                         VPN_PROVIDER_ERROR_AUTH_FAILED);
304                 break;
305         }
306
307         return NULL;
308 }
309
310 static void vpn_event(struct vpn_provider *provider, int state)
311 {
312         struct vpn_data *data;
313         struct vpn_driver_data *vpn_driver_data;
314         const char *name;
315         int index, err;
316
317         data = vpn_provider_get_data(provider);
318
319         name = vpn_provider_get_driver_name(provider);
320
321         if (!name) {
322                 DBG("Cannot find VPN driver for provider %p", provider);
323                 vpn_provider_set_state(provider, VPN_PROVIDER_STATE_FAILURE);
324                 return;
325         }
326
327         vpn_driver_data = g_hash_table_lookup(driver_hash, name);
328         if (!vpn_driver_data) {
329                 DBG("Cannot find VPN driver data for name %s", name);
330                 vpn_provider_set_state(provider, VPN_PROVIDER_STATE_FAILURE);
331                 return;
332         }
333
334         DBG("provider %p driver %s state %d", provider, name, state);
335
336         switch (state) {
337         case VPN_STATE_CONNECT:
338         case VPN_STATE_READY:
339                 if (data->state == VPN_STATE_READY) {
340                         /*
341                          * This is the restart case, in which case we must
342                          * just set the IP address.
343                          *
344                          * We need to remove first the old address, just
345                          * replacing the old address will not work as expected
346                          * because the old address will linger in the interface
347                          * and not disapper so the clearing is needed here.
348                          *
349                          * Also the state must change, otherwise the routes
350                          * will not be set properly.
351                          */
352                         vpn_provider_set_state(provider,
353                                                 VPN_PROVIDER_STATE_CONNECT);
354
355                         vpn_provider_clear_address(provider, AF_INET);
356                         vpn_provider_clear_address(provider, AF_INET6);
357
358                         vpn_provider_change_address(provider);
359                         vpn_provider_set_state(provider,
360                                                 VPN_PROVIDER_STATE_READY);
361                         break;
362                 }
363
364                 index = vpn_provider_get_index(provider);
365                 vpn_provider_ref(provider);
366                 data->watch = vpn_rtnl_add_newlink_watch(index,
367                                                      vpn_newlink, provider);
368                 err = connman_inet_ifup(index);
369                 if (err < 0) {
370                         if (err == -EALREADY)
371                                 /*
372                                  * So the interface is up already, that is just
373                                  * great. Unfortunately in this case the
374                                  * newlink watch might not have been called at
375                                  * all. We must manually call it here so that
376                                  * the provider can go to ready state and the
377                                  * routes are setup properly.
378                                  */
379                                 vpn_newlink(IFF_UP, 0, provider);
380                         else
381                                 DBG("Cannot take interface %d up err %d/%s",
382                                         index, -err, strerror(-err));
383                 }
384                 break;
385
386         case VPN_STATE_UNKNOWN:
387         case VPN_STATE_IDLE:
388         case VPN_STATE_DISCONNECT:
389         case VPN_STATE_FAILURE:
390                 vpn_provider_set_state(provider,
391                                         VPN_PROVIDER_STATE_DISCONNECT);
392                 break;
393
394         case VPN_STATE_AUTH_FAILURE:
395                 vpn_provider_indicate_error(provider,
396                                         VPN_PROVIDER_ERROR_AUTH_FAILED);
397                 break;
398         }
399
400         return;
401 }
402
403 static int vpn_create_tun(struct vpn_provider *provider)
404 {
405         struct vpn_data *data = vpn_provider_get_data(provider);
406         struct ifreq ifr;
407         int i, fd, index;
408         int ret = 0;
409
410         if (!data)
411                 return -EISCONN;
412
413         fd = open("/dev/net/tun", O_RDWR | O_CLOEXEC);
414         if (fd < 0) {
415                 i = -errno;
416                 connman_error("Failed to open /dev/net/tun: %s",
417                               strerror(errno));
418                 ret = i;
419                 goto exist_err;
420         }
421
422         memset(&ifr, 0, sizeof(ifr));
423         ifr.ifr_flags = IFF_TUN | IFF_NO_PI;
424
425         for (i = 0; i < 256; i++) {
426                 sprintf(ifr.ifr_name, "vpn%d", i);
427
428                 if (!ioctl(fd, TUNSETIFF, (void *)&ifr))
429                         break;
430         }
431
432         if (i == 256) {
433                 connman_error("Failed to find available tun device");
434                 close(fd);
435                 ret = -ENODEV;
436                 goto exist_err;
437         }
438
439         data->if_name = (char *)g_strdup(ifr.ifr_name);
440         if (!data->if_name) {
441                 connman_error("Failed to allocate memory");
442                 close(fd);
443                 ret = -ENOMEM;
444                 goto exist_err;
445         }
446
447         if (ioctl(fd, TUNSETPERSIST, 1)) {
448                 i = -errno;
449                 connman_error("Failed to set tun persistent: %s",
450                               strerror(errno));
451                 close(fd);
452                 ret = i;
453                 goto exist_err;
454         }
455
456         close(fd);
457
458         index = connman_inet_ifindex(data->if_name);
459         if (index < 0) {
460                 connman_error("Failed to get tun ifindex");
461                 stop_vpn(provider);
462                 ret = -EIO;
463                 goto exist_err;
464         }
465         vpn_provider_set_index(provider, index);
466
467         return 0;
468
469 exist_err:
470         return ret;
471 }
472
473 static int vpn_connect(struct vpn_provider *provider,
474                         vpn_provider_connect_cb_t cb,
475                         const char *dbus_sender, void *user_data)
476 {
477         struct vpn_data *data = vpn_provider_get_data(provider);
478         struct vpn_driver_data *vpn_driver_data;
479         const char *name;
480         int ret = 0;
481         enum vpn_state state = VPN_STATE_UNKNOWN;
482
483         if (data)
484                 state = data->state;
485
486         DBG("data %p state %d", data, state);
487
488         switch (state) {
489         case VPN_STATE_UNKNOWN:
490                 data = g_try_new0(struct vpn_data, 1);
491                 if (!data)
492                         return -ENOMEM;
493
494                 data->provider = vpn_provider_ref(provider);
495                 data->watch = 0;
496                 data->flags = 0;
497                 data->task = NULL;
498
499                 vpn_provider_set_data(provider, data);
500                 /* fall through */
501
502         case VPN_STATE_DISCONNECT:
503         case VPN_STATE_IDLE:
504         case VPN_STATE_FAILURE:
505         case VPN_STATE_AUTH_FAILURE:
506                 data->state = VPN_STATE_IDLE;
507                 break;
508
509         case VPN_STATE_CONNECT:
510                 return -EINPROGRESS;
511
512         case VPN_STATE_READY:
513                 return -EISCONN;
514         }
515
516         name = vpn_provider_get_driver_name(provider);
517         if (!name)
518                 return -EINVAL;
519
520         vpn_driver_data = g_hash_table_lookup(driver_hash, name);
521
522         if (!vpn_driver_data || !vpn_driver_data->vpn_driver) {
523                 ret = -EINVAL;
524                 goto exist_err;
525         }
526
527         if (vpn_driver_data->vpn_driver->flags != VPN_FLAG_NO_TUN) {
528                 ret = vpn_create_tun(provider);
529                 if (ret < 0)
530                         goto exist_err;
531         }
532
533         data->task = connman_task_create(vpn_driver_data->program);
534
535         if (!data->task) {
536                 ret = -ENOMEM;
537                 stop_vpn(provider);
538                 goto exist_err;
539         }
540
541         if (connman_task_set_notify(data->task, "notify",
542                                         vpn_notify, provider)) {
543                 ret = -ENOMEM;
544                 stop_vpn(provider);
545                 connman_task_destroy(data->task);
546                 data->task = NULL;
547                 goto exist_err;
548         }
549
550
551         if(vpn_driver_data->vpn_driver->set_event_cb)
552                 vpn_driver_data->vpn_driver->set_event_cb(vpn_event, provider);
553
554         ret = vpn_driver_data->vpn_driver->connect(provider, data->task,
555                                                 data->if_name, cb, dbus_sender,
556                                                 user_data);
557         if (ret < 0 && ret != -EINPROGRESS) {
558                 stop_vpn(provider);
559                 connman_task_destroy(data->task);
560                 data->task = NULL;
561                 goto exist_err;
562         }
563
564         DBG("%s started with dev %s",
565                 vpn_driver_data->provider_driver.name, data->if_name);
566
567         data->state = VPN_STATE_CONNECT;
568
569         return -EINPROGRESS;
570
571 exist_err:
572         vpn_provider_set_index(provider, -1);
573         vpn_provider_set_data(provider, NULL);
574         vpn_provider_unref(data->provider);
575         g_free(data->if_name);
576         g_free(data);
577
578         return ret;
579 }
580
581 static int vpn_probe(struct vpn_provider *provider)
582 {
583         return 0;
584 }
585
586 static int vpn_disconnect(struct vpn_provider *provider)
587 {
588         struct vpn_data *data = vpn_provider_get_data(provider);
589         struct vpn_driver_data *vpn_driver_data;
590         const char *name;
591
592         DBG("disconnect provider %p:", provider);
593
594         if (!data)
595                 return 0;
596
597         name = vpn_provider_get_driver_name(provider);
598         if (!name)
599                 return 0;
600
601         vpn_driver_data = g_hash_table_lookup(driver_hash, name);
602         if (vpn_driver_data->vpn_driver->disconnect)
603                 vpn_driver_data->vpn_driver->disconnect(provider);
604
605         if (data->watch != 0) {
606                 vpn_provider_unref(provider);
607                 vpn_rtnl_remove_watch(data->watch);
608                 data->watch = 0;
609         }
610
611         data->state = VPN_STATE_DISCONNECT;
612         connman_task_stop(data->task);
613
614         return 0;
615 }
616
617 static int vpn_remove(struct vpn_provider *provider)
618 {
619         struct vpn_data *data;
620
621         data = vpn_provider_get_data(provider);
622         if (!data)
623                 return 0;
624
625         if (data->watch != 0) {
626                 vpn_provider_unref(provider);
627                 vpn_rtnl_remove_watch(data->watch);
628                 data->watch = 0;
629         }
630
631         connman_task_stop(data->task);
632
633         g_usleep(G_USEC_PER_SEC);
634         stop_vpn(provider);
635         return 0;
636 }
637
638 static int vpn_save(struct vpn_provider *provider, GKeyFile *keyfile)
639 {
640         struct vpn_driver_data *vpn_driver_data;
641         const char *name;
642
643         name = vpn_provider_get_driver_name(provider);
644         vpn_driver_data = g_hash_table_lookup(driver_hash, name);
645         if (vpn_driver_data &&
646                         vpn_driver_data->vpn_driver->save)
647                 return vpn_driver_data->vpn_driver->save(provider, keyfile);
648
649         return 0;
650 }
651
652 int vpn_register(const char *name, struct vpn_driver *vpn_driver,
653                         const char *program)
654 {
655         struct vpn_driver_data *data;
656
657         data = g_try_new0(struct vpn_driver_data, 1);
658         if (!data)
659                 return -ENOMEM;
660
661         data->name = name;
662         data->program = program;
663
664         data->vpn_driver = vpn_driver;
665
666         data->provider_driver.name = name;
667         data->provider_driver.disconnect = vpn_disconnect;
668         data->provider_driver.connect = vpn_connect;
669         data->provider_driver.probe = vpn_probe;
670         data->provider_driver.remove = vpn_remove;
671         data->provider_driver.save = vpn_save;
672
673         if (!driver_hash)
674                 driver_hash = g_hash_table_new_full(g_str_hash,
675                                                         g_str_equal,
676                                                         NULL, g_free);
677
678         if (!driver_hash) {
679                 connman_error("driver_hash not initialized for %s", name);
680                 g_free(data);
681                 return -ENOMEM;
682         }
683
684         g_hash_table_replace(driver_hash, (char *)name, data);
685
686         vpn_provider_driver_register(&data->provider_driver);
687
688         return 0;
689 }
690
691 void vpn_unregister(const char *name)
692 {
693         struct vpn_driver_data *data;
694
695         data = g_hash_table_lookup(driver_hash, name);
696         if (!data)
697                 return;
698
699         vpn_provider_driver_unregister(&data->provider_driver);
700
701         g_hash_table_remove(driver_hash, name);
702
703         if (g_hash_table_size(driver_hash) == 0)
704                 g_hash_table_destroy(driver_hash);
705 }