X-Git-Url: http://review.tizen.org/git/?a=blobdiff_plain;f=src%2Fconnection.c;h=d40f4281e78ff6eb785ac64ac14f3fcef657e42e;hb=230905c20905f2bc5ccf4b8fab75c1b5df2ac31d;hp=f7d43681c02ea0e2d8f7ca09452f71e926b9d262;hpb=d31f3c8e6b025820697669ac60637a1e942a3f33;p=framework%2Fconnectivity%2Fconnman.git diff --git a/src/connection.c b/src/connection.c index f7d4368..d40f428 100644 --- a/src/connection.c +++ b/src/connection.c @@ -2,7 +2,8 @@ * * Connection Manager * - * Copyright (C) 2007-2010 Intel Corporation. All rights reserved. + * Copyright (C) 2007-2012 Intel Corporation. All rights reserved. + * Copyright (C) 2011 BMW Car IT GmbH. All rights reserved. * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as @@ -24,389 +25,689 @@ #endif #include -#include #include -#include -#include #include -#include #include #include "connman.h" -struct gateway_data { - int index; - char *gateway; - struct connman_element *element; - unsigned int order; +struct gateway_config { gboolean active; + char *gateway; + /* VPN extra data */ gboolean vpn; char *vpn_ip; + int vpn_phy_index; + char *vpn_phy_ip; }; -static GSList *gateway_list = NULL; +struct gateway_data { + int index; + struct connman_service *service; + unsigned int order; + struct gateway_config *ipv4_gateway; + struct gateway_config *ipv6_gateway; + connman_bool_t default_checked; +}; + +static GHashTable *gateway_hash = NULL; -static struct gateway_data *find_gateway(int index, const char *gateway) +static struct gateway_config *find_gateway(int index, const char *gateway) { - GSList *list; + GHashTableIter iter; + gpointer value, key; if (gateway == NULL) return NULL; - for (list = gateway_list; list; list = list->next) { - struct gateway_data *data = list->data; + g_hash_table_iter_init(&iter, gateway_hash); - if (data->gateway == NULL) - continue; + while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) { + struct gateway_data *data = value; - if (data->index == index && - g_str_equal(data->gateway, gateway) == TRUE) - return data; + if (data->ipv4_gateway != NULL && data->index == index && + g_str_equal(data->ipv4_gateway->gateway, + gateway) == TRUE) + return data->ipv4_gateway; + + if (data->ipv6_gateway != NULL && data->index == index && + g_str_equal(data->ipv6_gateway->gateway, + gateway) == TRUE) + return data->ipv6_gateway; } return NULL; } -static int add_vpn_host(struct connman_element *element, - const char *gateway, - const char *host) +static struct gateway_data *lookup_gateway_data(struct gateway_config *config) { - struct ifreq ifr; - struct rtentry rt; - struct sockaddr_in addr; - int sk, err; - - DBG("element %p", element); - - sk = socket(PF_INET, SOCK_DGRAM, 0); - if (sk < 0) - return -1; - - memset(&ifr, 0, sizeof(ifr)); - ifr.ifr_ifindex = element->index; + GHashTableIter iter; + gpointer value, key; - if (ioctl(sk, SIOCGIFNAME, &ifr) < 0) { - close(sk); - return -1; - } - DBG("ifname %s", ifr.ifr_name); - - memset(&rt, 0, sizeof(rt)); - rt.rt_flags = RTF_UP | RTF_HOST | RTF_GATEWAY; - - memset(&addr, 0, sizeof(addr)); - addr.sin_family = AF_INET; - addr.sin_addr.s_addr = inet_addr(host); - memcpy(&rt.rt_dst, &addr, sizeof(rt.rt_dst)); - - memset(&addr, 0, sizeof(addr)); - addr.sin_family = AF_INET; - addr.sin_addr.s_addr = inet_addr(gateway); - memcpy(&rt.rt_gateway, &addr, sizeof(rt.rt_gateway)); + if (config == NULL) + return NULL; - memset(&addr, 0, sizeof(addr)); - addr.sin_family = AF_INET; - addr.sin_addr.s_addr = INADDR_NONE; - memcpy(&rt.rt_genmask, &addr, sizeof(rt.rt_genmask)); + g_hash_table_iter_init(&iter, gateway_hash); - rt.rt_dev = ifr.ifr_name; + while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) { + struct gateway_data *data = value; - err = ioctl(sk, SIOCADDRT, &rt); - if (err < 0) - connman_error("Setting VPN host failed (%s)", - strerror(errno)); + if (data->ipv4_gateway != NULL && + data->ipv4_gateway == config) + return data; - close(sk); + if (data->ipv6_gateway != NULL && + data->ipv6_gateway == config) + return data; + } - return err; + return NULL; } -static int del_vpn_host(const char *host) +/* + * Find the gateway that is serving the VPN link + */ +static struct gateway_data *find_phy_gateway(int index, const char *gateway) { - struct rtentry rt; - struct sockaddr_in addr; - int sk, err; + GHashTableIter iter; + gpointer value, key; - sk = socket(PF_INET, SOCK_DGRAM, 0); - if (sk < 0) - return -1; + if (gateway == NULL) + return NULL; - memset(&rt, 0, sizeof(rt)); - rt.rt_flags = RTF_UP | RTF_HOST; + g_hash_table_iter_init(&iter, gateway_hash); - memset(&addr, 0, sizeof(addr)); - addr.sin_family = AF_INET; - addr.sin_addr.s_addr = inet_addr(host); - memcpy(&rt.rt_dst, &addr, sizeof(rt.rt_dst)); + while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) { + struct gateway_data *data = value; - err = ioctl(sk, SIOCDELRT, &rt); - if (err < 0) - connman_error("Del vpn route failed (%s)", - strerror(errno)); + if (data->ipv4_gateway != NULL && data->index != index && + g_str_equal(data->ipv4_gateway->gateway, + gateway) == TRUE) + return data; - close(sk); + if (data->ipv6_gateway != NULL && data->index != index && + g_str_equal(data->ipv6_gateway->gateway, + gateway) == TRUE) + return data; + } - return err; + return NULL; } -static int set_vpn_route(struct connman_element *element, const char *gateway) +static void set_vpn_routes(struct gateway_data *new_gateway, + struct connman_service *service, + const char *gateway, + enum connman_ipconfig_type type, + const char *peer, + struct gateway_data *active_gateway) { - struct ifreq ifr; - struct rtentry rt; - struct sockaddr_in addr; - int sk, err; + struct gateway_config *config; + struct gateway_data *data; + struct connman_ipconfig *ipconfig; + char *dest; + int index; - DBG("set_rout1: element %p", element); + if (type == CONNMAN_IPCONFIG_TYPE_IPV4) { + ipconfig = __connman_service_get_ip4config(service); + config = new_gateway->ipv4_gateway; + } else if (type == CONNMAN_IPCONFIG_TYPE_IPV6) { + ipconfig = __connman_service_get_ip6config(service); + config = new_gateway->ipv6_gateway; + } else + return; - sk = socket(PF_INET, SOCK_DGRAM, 0); - if (sk < 0) - return -1; + if (config == NULL) + goto done; - memset(&ifr, 0, sizeof(ifr)); - ifr.ifr_ifindex = element->index; + config->vpn = TRUE; + if (peer != NULL) + config->vpn_ip = g_strdup(peer); + else if (gateway != NULL) + config->vpn_ip = g_strdup(gateway); - if (ioctl(sk, SIOCGIFNAME, &ifr) < 0) { - close(sk); - return -1; - } + index = __connman_ipconfig_get_index(ipconfig); + data = find_phy_gateway(index, gateway); - DBG("ifname %s", ifr.ifr_name); + if (data == NULL) + goto done; - memset(&ifr, 0, sizeof(ifr)); - ifr.ifr_ifindex = element->index; + /* + * data->service points now to original + * service that is serving the VPN link + */ + if (type == CONNMAN_IPCONFIG_TYPE_IPV4) + ipconfig = __connman_service_get_ip4config(data->service); + else if (type == CONNMAN_IPCONFIG_TYPE_IPV6) + ipconfig = __connman_service_get_ip6config(data->service); + else + return; - memset(&rt, 0, sizeof(rt)); - rt.rt_flags = RTF_UP | RTF_GATEWAY; + if (ipconfig != NULL) { + const char *address; - memset(&addr, 0, sizeof(addr)); - addr.sin_family = AF_INET; - addr.sin_addr.s_addr = INADDR_ANY; - memcpy(&rt.rt_dst, &addr, sizeof(rt.rt_dst)); + address = __connman_ipconfig_get_local(ipconfig); + config->vpn_phy_ip = g_strdup(address); + } - memset(&addr, 0, sizeof(addr)); - addr.sin_family = AF_INET; - addr.sin_addr.s_addr = inet_addr(gateway); - memcpy(&rt.rt_gateway, &addr, sizeof(rt.rt_gateway)); + config->vpn_phy_index = data->index; - memset(&addr, 0, sizeof(addr)); - addr.sin_family = AF_INET; - addr.sin_addr.s_addr = INADDR_ANY; - memcpy(&rt.rt_genmask, &addr, sizeof(rt.rt_genmask)); + DBG("vpn %s phy %s index %d", config->vpn_ip, + config->vpn_phy_ip, config->vpn_phy_index); - err = ioctl(sk, SIOCADDRT, &rt); - if (err < 0) - connman_error("Setting VPN route failed (%s)", - strerror(errno)); +done: + if (active_gateway == NULL) + return; - close(sk); + if (type == CONNMAN_IPCONFIG_TYPE_IPV4) { + /* + * Special route to VPN server via gateway. This + * is needed so that we can access hosts behind + * the VPN. The route might already exist depending + * on network topology. + */ + if (active_gateway->ipv4_gateway == NULL) + return; - return err; -} + if (g_strcmp0(active_gateway->ipv4_gateway->gateway, + "0.0.0.0") != 0) + dest = active_gateway->ipv4_gateway->gateway; + else + dest = NULL; -static int del_route(struct connman_element *element, const char *gateway) -{ - struct ifreq ifr; - struct rtentry rt; - struct sockaddr_in addr; - int sk, err; + connman_inet_add_host_route(active_gateway->index, gateway, + dest); - DBG("element %p", element); + } else if (type == CONNMAN_IPCONFIG_TYPE_IPV6) { - sk = socket(PF_INET, SOCK_DGRAM, 0); - if (sk < 0) - return -1; + if (active_gateway->ipv6_gateway == NULL) + return; - memset(&ifr, 0, sizeof(ifr)); - ifr.ifr_ifindex = element->index; + if (g_strcmp0(active_gateway->ipv6_gateway->gateway, + "::") != 0) + dest = active_gateway->ipv6_gateway->gateway; + else + dest = NULL; - if (ioctl(sk, SIOCGIFNAME, &ifr) < 0) { - close(sk); - return -1; + connman_inet_add_ipv6_host_route(active_gateway->index, + gateway, dest); } - - DBG("ifname %s", ifr.ifr_name); - - memset(&rt, 0, sizeof(rt)); - rt.rt_flags = RTF_UP | RTF_GATEWAY; - - memset(&addr, 0, sizeof(addr)); - addr.sin_family = AF_INET; - addr.sin_addr.s_addr = INADDR_ANY; - memcpy(&rt.rt_dst, &addr, sizeof(rt.rt_dst)); - - memset(&addr, 0, sizeof(addr)); - addr.sin_family = AF_INET; - addr.sin_addr.s_addr = inet_addr(gateway); - memcpy(&rt.rt_gateway, &addr, sizeof(rt.rt_gateway)); - - memset(&addr, 0, sizeof(addr)); - addr.sin_family = AF_INET; - addr.sin_addr.s_addr = INADDR_ANY; - memcpy(&rt.rt_genmask, &addr, sizeof(rt.rt_genmask)); - - err = ioctl(sk, SIOCDELRT, &rt); - if (err < 0) - connman_error("Removing default route failed (%s)", - strerror(errno)); - - close(sk); - - return err; } -static int del_route_all(struct gateway_data *data) +static int del_routes(struct gateway_data *data, + enum connman_ipconfig_type type) { - int err = 0; - - if (data->vpn) { - del_vpn_host(data->gateway); + int status4 = 0, status6 = 0; + int do_ipv4 = FALSE, do_ipv6 = FALSE; + + if (type == CONNMAN_IPCONFIG_TYPE_IPV4) + do_ipv4 = TRUE; + else if (type == CONNMAN_IPCONFIG_TYPE_IPV6) + do_ipv6 = TRUE; + else + do_ipv4 = do_ipv6 = TRUE; + + if (do_ipv4 == TRUE && data->ipv4_gateway != NULL) { + if (data->ipv4_gateway->vpn == TRUE) { + status4 = connman_inet_clear_gateway_address( + data->index, + data->ipv4_gateway->vpn_ip); + + } else if (g_strcmp0(data->ipv4_gateway->gateway, + "0.0.0.0") == 0) { + status4 = connman_inet_clear_gateway_interface( + data->index); + } else { + connman_inet_del_host_route(data->index, + data->ipv4_gateway->gateway); + status4 = connman_inet_clear_gateway_address( + data->index, + data->ipv4_gateway->gateway); + } + } - err = del_route(data->element, data->vpn_ip); - } else - err = del_route(data->element, data->gateway); + if (do_ipv6 == TRUE && data->ipv6_gateway != NULL) { + if (data->ipv6_gateway->vpn == TRUE) { + status6 = connman_inet_clear_ipv6_gateway_address( + data->index, + data->ipv6_gateway->vpn_ip); + + } else if (g_strcmp0(data->ipv6_gateway->gateway, "::") == 0) { + status6 = connman_inet_clear_ipv6_gateway_interface( + data->index); + } else { + connman_inet_del_ipv6_host_route(data->index, + data->ipv6_gateway->gateway); + status6 = connman_inet_clear_ipv6_gateway_address( + data->index, + data->ipv6_gateway->gateway); + } + } - return err; + return (status4 < 0 ? status4 : status6); } -static void find_element(struct connman_element *element, gpointer user_data) +static int disable_gateway(struct gateway_data *data, + enum connman_ipconfig_type type) { - struct gateway_data *data = user_data; + gboolean active = FALSE; + + if (type == CONNMAN_IPCONFIG_TYPE_IPV4) { + if (data->ipv4_gateway != NULL) + active = data->ipv4_gateway->active; + } else if (type == CONNMAN_IPCONFIG_TYPE_IPV6) { + if (data->ipv6_gateway != NULL) + active = data->ipv6_gateway->active; + } else + active = TRUE; - DBG("element %p name %s", element, element->name); + DBG("type %d active %d", type, active); - if (data->element != NULL) - return; + if (active == TRUE) + return del_routes(data, type); - if (element->index != data->index) - return; - - data->element = element; + return 0; } -static struct gateway_data *add_gateway(int index, const char *gateway) +static struct gateway_data *add_gateway(struct connman_service *service, + int index, const char *gateway, + enum connman_ipconfig_type type) { - struct gateway_data *data; - struct connman_service *service; + struct gateway_data *data, *old; + struct gateway_config *config; + + if (gateway == NULL || strlen(gateway) == 0) + return NULL; data = g_try_new0(struct gateway_data, 1); if (data == NULL) return NULL; data->index = index; - data->gateway = g_strdup(gateway); - data->active = FALSE; - data->element = NULL; - data->vpn_ip = NULL; - data->vpn = FALSE; - __connman_element_foreach(NULL, CONNMAN_ELEMENT_TYPE_CONNECTION, - find_element, data); + config = g_try_new0(struct gateway_config, 1); + if (config == NULL) { + g_free(data); + return NULL; + } + + config->gateway = g_strdup(gateway); + config->vpn_ip = NULL; + config->vpn_phy_ip = NULL; + config->vpn = FALSE; + config->vpn_phy_index = -1; + config->active = FALSE; + + if (type == CONNMAN_IPCONFIG_TYPE_IPV4) + data->ipv4_gateway = config; + else if (type == CONNMAN_IPCONFIG_TYPE_IPV6) + data->ipv6_gateway = config; + else { + g_free(config->gateway); + g_free(config); + g_free(data); + return NULL; + } + + data->service = service; - service = __connman_element_get_service(data->element); data->order = __connman_service_get_order(service); - gateway_list = g_slist_append(gateway_list, data); + /* + * If the service is already in the hash, then we + * must not replace it blindly but disable the gateway + * of the type we are replacing and take the other type + * from old gateway settings. + */ + old = g_hash_table_lookup(gateway_hash, service); + if (old != NULL) { + DBG("Replacing gw %p ipv4 %p ipv6 %p", old, + old->ipv4_gateway, old->ipv6_gateway); + disable_gateway(old, type); + if (type == CONNMAN_IPCONFIG_TYPE_IPV4) { + data->ipv6_gateway = old->ipv6_gateway; + old->ipv6_gateway = NULL; + } else if (type == CONNMAN_IPCONFIG_TYPE_IPV6) { + data->ipv4_gateway = old->ipv4_gateway; + old->ipv4_gateway = NULL; + } + } else { + /* + * Only take a ref if we are adding new stuff to hash. + */ + connman_service_ref(service); + } + + g_hash_table_replace(gateway_hash, service, data); return data; } -static void connection_newgateway(int index, const char *gateway) +static void set_default_gateway(struct gateway_data *data, + enum connman_ipconfig_type type) { - struct gateway_data *data; - - DBG("index %d gateway %s", index, gateway); + int index; + int status4 = 0, status6 = 0; + int do_ipv4 = FALSE, do_ipv6 = FALSE; + + if (type == CONNMAN_IPCONFIG_TYPE_IPV4) + do_ipv4 = TRUE; + else if (type == CONNMAN_IPCONFIG_TYPE_IPV6) + do_ipv6 = TRUE; + else + do_ipv4 = do_ipv6 = TRUE; + + DBG("type %d gateway ipv4 %p ipv6 %p", type, data->ipv4_gateway, + data->ipv6_gateway); + + if (do_ipv4 == TRUE && data->ipv4_gateway != NULL && + data->ipv4_gateway->vpn == TRUE) { + connman_inet_set_gateway_address(data->index, + data->ipv4_gateway->vpn_ip); + connman_inet_add_host_route(data->index, + data->ipv4_gateway->vpn_ip, NULL); + data->ipv4_gateway->active = TRUE; + + DBG("set %p index %d vpn %s index %d phy %s", + data, data->index, data->ipv4_gateway->vpn_ip, + data->ipv4_gateway->vpn_phy_index, + data->ipv4_gateway->vpn_phy_ip); + + __connman_service_indicate_default(data->service); - data = find_gateway(index, gateway); - if (data == NULL) return; + } - data->active = TRUE; -} - -static void set_default_gateway(struct gateway_data *data) -{ - struct connman_element *element = data->element; - struct connman_service *service = NULL; - short int ifflags; + if (do_ipv6 == TRUE && data->ipv6_gateway != NULL && + data->ipv6_gateway->vpn == TRUE) { + connman_inet_set_ipv6_gateway_address(data->index, + data->ipv6_gateway->vpn_ip); + connman_inet_add_ipv6_host_route(data->index, + data->ipv6_gateway->vpn_ip, NULL); + data->ipv6_gateway->active = TRUE; - DBG("gateway %s", data->gateway); + DBG("set %p index %d vpn %s index %d phy %s", + data, data->index, data->ipv6_gateway->vpn_ip, + data->ipv6_gateway->vpn_phy_index, + data->ipv6_gateway->vpn_phy_ip); - if (data->vpn == TRUE) { + __connman_service_indicate_default(data->service); - set_vpn_route(element, data->vpn_ip); - /* vpn gateway going away no changes in services */ return; } - ifflags = connman_inet_ifflags(element->index); - if (ifflags < 0) { - connman_error("Fail to get network interface flags"); - return; + index = __connman_service_get_index(data->service); + + if (do_ipv4 == TRUE && data->ipv4_gateway != NULL && + g_strcmp0(data->ipv4_gateway->gateway, + "0.0.0.0") == 0) { + if (connman_inet_set_gateway_interface(index) < 0) + return; + goto done; } - if (ifflags & IFF_POINTOPOINT) { - if (connman_inet_set_gateway_interface(element->index) < 0) + if (do_ipv6 == TRUE && data->ipv6_gateway != NULL && + g_strcmp0(data->ipv6_gateway->gateway, + "::") == 0) { + if (connman_inet_set_ipv6_gateway_interface(index) < 0) return; goto done; } - connman_inet_add_host_route(element->index, data->gateway); + if (do_ipv6 == TRUE && data->ipv6_gateway != NULL) + status6 = connman_inet_set_ipv6_gateway_address(index, + data->ipv6_gateway->gateway); - if (connman_inet_set_gateway_address(element->index, data->gateway) < 0) + if (do_ipv4 == TRUE && data->ipv4_gateway != NULL) + status4 = connman_inet_set_gateway_address(index, + data->ipv4_gateway->gateway); + + if (status4 < 0 || status6 < 0) return; done: - service = __connman_element_get_service(element); - __connman_service_indicate_default(service); + __connman_service_indicate_default(data->service); +} + +static void unset_default_gateway(struct gateway_data *data, + enum connman_ipconfig_type type) +{ + int index; + int do_ipv4 = FALSE, do_ipv6 = FALSE; + + if (type == CONNMAN_IPCONFIG_TYPE_IPV4) + do_ipv4 = TRUE; + else if (type == CONNMAN_IPCONFIG_TYPE_IPV6) + do_ipv6 = TRUE; + else + do_ipv4 = do_ipv6 = TRUE; + + DBG("type %d gateway ipv4 %p ipv6 %p", type, data->ipv4_gateway, + data->ipv6_gateway); + + if (do_ipv4 == TRUE && data->ipv4_gateway != NULL && + data->ipv4_gateway->vpn == TRUE) { + connman_inet_del_host_route(data->index, + data->ipv4_gateway->vpn_ip); + connman_inet_clear_gateway_address(data->index, + data->ipv4_gateway->vpn_ip); + data->ipv4_gateway->active = FALSE; + + DBG("unset %p index %d vpn %s index %d phy %s", + data, data->index, data->ipv4_gateway->vpn_ip, + data->ipv4_gateway->vpn_phy_index, + data->ipv4_gateway->vpn_phy_ip); + + return; + } + + if (do_ipv6 == TRUE && data->ipv6_gateway != NULL && + data->ipv6_gateway->vpn == TRUE) { + connman_inet_del_ipv6_host_route(data->index, + data->ipv6_gateway->vpn_ip); + connman_inet_clear_ipv6_gateway_address(data->index, + data->ipv6_gateway->vpn_ip); + data->ipv6_gateway->active = FALSE; + + DBG("unset %p index %d vpn %s index %d phy %s", + data, data->index, data->ipv6_gateway->vpn_ip, + data->ipv6_gateway->vpn_phy_index, + data->ipv6_gateway->vpn_phy_ip); + + return; + } + + index = __connman_service_get_index(data->service); + + if (do_ipv4 == TRUE && data->ipv4_gateway != NULL && + g_strcmp0(data->ipv4_gateway->gateway, + "0.0.0.0") == 0) { + connman_inet_clear_gateway_interface(index); + return; + } + + if (do_ipv6 == TRUE && data->ipv6_gateway != NULL && + g_strcmp0(data->ipv6_gateway->gateway, + "::") == 0) { + connman_inet_clear_ipv6_gateway_interface(index); + return; + } + + if (do_ipv6 == TRUE && data->ipv6_gateway != NULL) + connman_inet_clear_ipv6_gateway_address(index, + data->ipv6_gateway->gateway); + + if (do_ipv4 == TRUE && data->ipv4_gateway != NULL) + connman_inet_clear_gateway_address(index, + data->ipv4_gateway->gateway); } static struct gateway_data *find_default_gateway(void) { struct gateway_data *found = NULL; unsigned int order = 0; - GSList *list; + GHashTableIter iter; + gpointer value, key; - for (list = gateway_list; list; list = list->next) { - struct gateway_data *data = list->data; + g_hash_table_iter_init(&iter, gateway_hash); + + while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) { + struct gateway_data *data = value; if (found == NULL || data->order > order) { found = data; order = data->order; + + DBG("default %p order %d", found, order); } } return found; } -static void remove_gateway(struct gateway_data *data) +static gboolean choose_default_gateway(struct gateway_data *data, + struct gateway_data *candidate) { - DBG("gateway %s", data->gateway); + gboolean downgraded = FALSE; - gateway_list = g_slist_remove(gateway_list, data); + /* + * If the current default is not active, then we mark + * this one as default. If the other one is already active + * we mark this one as non default. + */ + if (data->ipv4_gateway != NULL) { + if (candidate->ipv4_gateway != NULL && + candidate->ipv4_gateway->active == FALSE) { + DBG("ipv4 downgrading %p", candidate); + unset_default_gateway(candidate, + CONNMAN_IPCONFIG_TYPE_IPV4); + } + if (candidate->ipv4_gateway != NULL && + candidate->ipv4_gateway->active == TRUE && + candidate->order > data->order) { + DBG("ipv4 downgrading this %p", data); + unset_default_gateway(data, + CONNMAN_IPCONFIG_TYPE_IPV4); + downgraded = TRUE; + } + } - if (data->active == TRUE) - del_route_all(data); + if (data->ipv6_gateway != NULL) { + if (candidate->ipv6_gateway != NULL && + candidate->ipv6_gateway->active == FALSE) { + DBG("ipv6 downgrading %p", candidate); + unset_default_gateway(candidate, + CONNMAN_IPCONFIG_TYPE_IPV6); + } + + if (candidate->ipv6_gateway != NULL && + candidate->ipv6_gateway->active == TRUE && + candidate->order > data->order) { + DBG("ipv6 downgrading this %p", data); + unset_default_gateway(data, + CONNMAN_IPCONFIG_TYPE_IPV6); + downgraded = TRUE; + } + } + + return downgraded; +} + +static void connection_newgateway(int index, const char *gateway) +{ + struct gateway_config *config; + struct gateway_data *data; + GHashTableIter iter; + gpointer value, key; + gboolean found = FALSE; + + DBG("index %d gateway %s", index, gateway); + + config = find_gateway(index, gateway); + if (config == NULL) + return; + + config->active = TRUE; + + /* + * It is possible that we have two default routes atm + * if there are two gateways waiting rtnl activation at the + * same time. + */ + data = lookup_gateway_data(config); + if (data == NULL) + return; + + if (data->default_checked == TRUE) + return; + + /* + * The next checks are only done once, otherwise setting + * the default gateway could lead into rtnl forever loop. + */ + + g_hash_table_iter_init(&iter, gateway_hash); + + while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) { + struct gateway_data *candidate = value; + + if (candidate == data) + continue; + + found = choose_default_gateway(data, candidate); + if (found == TRUE) + break; + } + + if (found == FALSE) { + if (data->ipv4_gateway != NULL) + set_default_gateway(data, CONNMAN_IPCONFIG_TYPE_IPV4); + + if (data->ipv6_gateway != NULL) + set_default_gateway(data, CONNMAN_IPCONFIG_TYPE_IPV6); + } + + data->default_checked = TRUE; +} + +static void remove_gateway(gpointer user_data) +{ + struct gateway_data *data = user_data; + + DBG("gateway ipv4 %p ipv6 %p", data->ipv4_gateway, data->ipv6_gateway); + + if (data->ipv4_gateway != NULL) { + g_free(data->ipv4_gateway->gateway); + g_free(data->ipv4_gateway->vpn_ip); + g_free(data->ipv4_gateway->vpn_phy_ip); + g_free(data->ipv4_gateway); + } + + if (data->ipv6_gateway != NULL) { + g_free(data->ipv6_gateway->gateway); + g_free(data->ipv6_gateway->vpn_ip); + g_free(data->ipv6_gateway->vpn_phy_ip); + g_free(data->ipv6_gateway); + } - g_free(data->gateway); - g_free(data->vpn_ip); g_free(data); } static void connection_delgateway(int index, const char *gateway) { + struct gateway_config *config; struct gateway_data *data; DBG("index %d gateway %s", index, gateway); - data = find_gateway(index, gateway); - if (data != NULL) - data->active = FALSE; + config = find_gateway(index, gateway); + if (config != NULL) + config->active = FALSE; data = find_default_gateway(); if (data != NULL) - set_default_gateway(data); + set_default_gateway(data, CONNMAN_IPCONFIG_TYPE_ALL); } static struct connman_rtnl connection_rtnl = { @@ -417,201 +718,407 @@ static struct connman_rtnl connection_rtnl = { static struct gateway_data *find_active_gateway(void) { - GSList *list; + GHashTableIter iter; + gpointer value, key; DBG(""); - for (list = gateway_list; list; list = list->next) { - struct gateway_data *data = list->data; - if (data->active == TRUE) + g_hash_table_iter_init(&iter, gateway_hash); + + while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) { + struct gateway_data *data = value; + + if (data->ipv4_gateway != NULL && + data->ipv4_gateway->active == TRUE) + return data; + + if (data->ipv6_gateway != NULL && + data->ipv6_gateway->active == TRUE) return data; } return NULL; } -static int connection_probe(struct connman_element *element) +static void update_order(void) +{ + GHashTableIter iter; + gpointer value, key; + + DBG(""); + + g_hash_table_iter_init(&iter, gateway_hash); + + while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) { + struct gateway_data *data = value; + + data->order = __connman_service_get_order(data->service); + } +} + +void __connman_connection_gateway_activate(struct connman_service *service, + enum connman_ipconfig_type type) +{ + struct gateway_data *data = NULL; + + data = g_hash_table_lookup(gateway_hash, service); + if (data == NULL) + return; + + DBG("gateway %p/%p type %d", data->ipv4_gateway, + data->ipv6_gateway, type); + + if (type == CONNMAN_IPCONFIG_TYPE_IPV4) + data->ipv4_gateway->active = TRUE; + else if (type == CONNMAN_IPCONFIG_TYPE_IPV6) + data->ipv6_gateway->active = TRUE; +} + +static void add_host_route(int family, int index, const char *gateway, + enum connman_service_type service_type) +{ + switch (family) { + case AF_INET: + if (g_strcmp0(gateway, "0.0.0.0") != 0) { + /* + * We must not set route to the phy dev gateway in + * VPN link. The packets to VPN link might be routed + * back to itself and not routed into phy link gateway. + */ + if (service_type != CONNMAN_SERVICE_TYPE_VPN) + connman_inet_add_host_route(index, gateway, + NULL); + } else { + /* + * Add host route to P-t-P link so that services can + * be moved around and we can have some link to P-t-P + * network (although those P-t-P links have limited + * usage if default route is not directed to them) + */ + char *dest; + if (connman_inet_get_dest_addr(index, &dest) == 0) { + connman_inet_add_host_route(index, dest, NULL); + g_free(dest); + } + } + break; + + case AF_INET6: + if (g_strcmp0(gateway, "::") != 0) { + if (service_type != CONNMAN_SERVICE_TYPE_VPN) + connman_inet_add_ipv6_host_route(index, + gateway, NULL); + } else { + /* P-t-P link, add route to destination */ + char *dest; + if (connman_inet_ipv6_get_dest_addr(index, + &dest) == 0) { + connman_inet_add_ipv6_host_route(index, dest, + NULL); + g_free(dest); + } + } + break; + } +} + +int __connman_connection_gateway_add(struct connman_service *service, + const char *gateway, + enum connman_ipconfig_type type, + const char *peer) { - struct connman_service *service = NULL; - const char *gateway = NULL; - const char *vpn_ip = NULL; struct gateway_data *active_gateway = NULL; struct gateway_data *new_gateway = NULL; + enum connman_ipconfig_type type4 = CONNMAN_IPCONFIG_TYPE_UNKNOWN, + type6 = CONNMAN_IPCONFIG_TYPE_UNKNOWN; + enum connman_service_type service_type = + connman_service_get_type(service); + int index; - DBG("element %p name %s", element, element->name); + index = __connman_service_get_index(service); - if (element->parent == NULL) - return -ENODEV; + /* + * If gateway is NULL, it's a point to point link and the default + * gateway for ipv4 is 0.0.0.0 and for ipv6 is ::, meaning the + * interface + */ + if (gateway == NULL && type == CONNMAN_IPCONFIG_TYPE_IPV4) + gateway = "0.0.0.0"; - if (element->parent->type != CONNMAN_ELEMENT_TYPE_IPV4) - return -ENODEV; + if (gateway == NULL && type == CONNMAN_IPCONFIG_TYPE_IPV6) + gateway = "::"; - connman_element_get_value(element, - CONNMAN_PROPERTY_ID_IPV4_GATEWAY, &gateway); + DBG("service %p index %d gateway %s vpn ip %s type %d", + service, index, gateway, peer, type); - connman_element_get_value(element, - CONNMAN_PROPERTY_ID_IPV4_ADDRESS, &vpn_ip); + new_gateway = add_gateway(service, index, gateway, type); + if (new_gateway == NULL) + return -EINVAL; - DBG("gateway %s", gateway); + active_gateway = find_active_gateway(); - service = __connman_element_get_service(element); - __connman_service_indicate_state(service, - CONNMAN_SERVICE_STATE_READY); + DBG("active %p index %d new %p", active_gateway, + active_gateway ? active_gateway->index : -1, new_gateway); - connman_element_set_enabled(element, TRUE); + if (type == CONNMAN_IPCONFIG_TYPE_IPV4 && + new_gateway->ipv4_gateway != NULL) { + add_host_route(AF_INET, index, gateway, service_type); + __connman_service_nameserver_add_routes(service, + new_gateway->ipv4_gateway->gateway); + type4 = CONNMAN_IPCONFIG_TYPE_IPV4; + } - if (gateway == NULL) - return 0; + if (type == CONNMAN_IPCONFIG_TYPE_IPV6 && + new_gateway->ipv6_gateway != NULL) { + add_host_route(AF_INET6, index, gateway, service_type); + __connman_service_nameserver_add_routes(service, + new_gateway->ipv6_gateway->gateway); + type6 = CONNMAN_IPCONFIG_TYPE_IPV6; + } - active_gateway = find_active_gateway(); - new_gateway = add_gateway(element->index, gateway); + if (service_type == CONNMAN_SERVICE_TYPE_VPN) { - if (service == NULL) { - new_gateway->vpn = TRUE; - new_gateway->vpn_ip = g_strdup(vpn_ip); - /* make sure vpn gateway are at higher priority */ - new_gateway->order = 10; - } else - new_gateway->vpn = FALSE; + set_vpn_routes(new_gateway, service, gateway, type, peer, + active_gateway); - if (active_gateway == NULL) { - set_default_gateway(new_gateway); - return 0; + } else { + if (type == CONNMAN_IPCONFIG_TYPE_IPV4 && + new_gateway->ipv4_gateway != NULL) + new_gateway->ipv4_gateway->vpn = FALSE; + + if (type == CONNMAN_IPCONFIG_TYPE_IPV6 && + new_gateway->ipv6_gateway != NULL) + new_gateway->ipv6_gateway->vpn = FALSE; } - if (new_gateway->vpn == TRUE) { - add_vpn_host(active_gateway->element, - active_gateway->gateway, - new_gateway->gateway); + if (active_gateway == NULL) { + set_default_gateway(new_gateway, type); + goto done; + } + if (type == CONNMAN_IPCONFIG_TYPE_IPV4 && + new_gateway->ipv4_gateway != NULL && + new_gateway->ipv4_gateway->vpn == TRUE) { + if (__connman_service_is_split_routing(new_gateway->service) == + FALSE) + connman_inet_clear_gateway_address( + active_gateway->index, + active_gateway->ipv4_gateway->gateway); } - if (new_gateway->order >= active_gateway->order) { - del_route_all(active_gateway); - return 0; + if (type == CONNMAN_IPCONFIG_TYPE_IPV6 && + new_gateway->ipv6_gateway != NULL && + new_gateway->ipv6_gateway->vpn == TRUE) { + if (__connman_service_is_split_routing(new_gateway->service) == + FALSE) + connman_inet_clear_ipv6_gateway_address( + active_gateway->index, + active_gateway->ipv6_gateway->gateway); } +done: + if (type4 == CONNMAN_IPCONFIG_TYPE_IPV4) + __connman_service_ipconfig_indicate_state(service, + CONNMAN_SERVICE_STATE_READY, + CONNMAN_IPCONFIG_TYPE_IPV4); + + if (type6 == CONNMAN_IPCONFIG_TYPE_IPV6) + __connman_service_ipconfig_indicate_state(service, + CONNMAN_SERVICE_STATE_READY, + CONNMAN_IPCONFIG_TYPE_IPV6); return 0; } -static void connection_remove(struct connman_element *element) +void __connman_connection_gateway_remove(struct connman_service *service, + enum connman_ipconfig_type type) { - struct connman_service *service; - const char *gateway = NULL; struct gateway_data *data = NULL; - gboolean set_default = FALSE; + gboolean set_default4 = FALSE, set_default6 = FALSE; + int do_ipv4 = FALSE, do_ipv6 = FALSE; + int err; - DBG("element %p name %s", element, element->name); + DBG("service %p type %d", service, type); - service = __connman_element_get_service(element); - __connman_service_indicate_state(service, - CONNMAN_SERVICE_STATE_DISCONNECT); + if (type == CONNMAN_IPCONFIG_TYPE_IPV4) + do_ipv4 = TRUE; + else if (type == CONNMAN_IPCONFIG_TYPE_IPV6) + do_ipv6 = TRUE; + else + do_ipv4 = do_ipv6 = TRUE; - connman_element_set_enabled(element, FALSE); + __connman_service_nameserver_del_routes(service, type); - connman_element_get_value(element, - CONNMAN_PROPERTY_ID_IPV4_GATEWAY, &gateway); + data = g_hash_table_lookup(gateway_hash, service); + if (data == NULL) + return; - DBG("gateway %s", gateway); + if (do_ipv4 == TRUE && data->ipv4_gateway != NULL) + set_default4 = data->ipv4_gateway->vpn; - if (gateway == NULL) - return; + if (do_ipv6 == TRUE && data->ipv6_gateway != NULL) + set_default6 = data->ipv6_gateway->vpn; - data = find_gateway(element->index, gateway); - if (data == NULL) - return; + DBG("ipv4 gateway %s ipv6 gateway %s vpn %d/%d", + data->ipv4_gateway ? data->ipv4_gateway->gateway : "", + data->ipv6_gateway ? data->ipv6_gateway->gateway : "", + set_default4, set_default6); + + if (do_ipv4 == TRUE && data->ipv4_gateway != NULL && + data->ipv4_gateway->vpn == TRUE && data->index >= 0) + connman_inet_del_host_route(data->index, + data->ipv4_gateway->gateway); - set_default = data->vpn; + if (do_ipv6 == TRUE && data->ipv6_gateway != NULL && + data->ipv6_gateway->vpn == TRUE && data->index >= 0) + connman_inet_del_ipv6_host_route(data->index, + data->ipv6_gateway->gateway); - if (data->vpn == TRUE) - del_vpn_host(data->gateway); + err = disable_gateway(data, type); - remove_gateway(data); + /* + * We remove the service from the hash only if all the gateway + * settings are to be removed. + */ + if (do_ipv4 == do_ipv6 || + (data->ipv4_gateway != NULL && data->ipv6_gateway == NULL + && do_ipv4 == TRUE) || + (data->ipv6_gateway != NULL && data->ipv4_gateway == NULL + && do_ipv6 == TRUE) + ) { + connman_service_unref(service); + g_hash_table_remove(gateway_hash, service); + } else + DBG("Not yet removing gw ipv4 %p/%d ipv6 %p/%d", + data->ipv4_gateway, do_ipv4, + data->ipv6_gateway, do_ipv6); /* with vpn this will be called after the network was deleted, * we need to call set_default here because we will not recieve any * gateway delete notification. + * We hit the same issue if remove_gateway() fails. */ - if (set_default) { + if (set_default4 || set_default6 || err < 0) { data = find_default_gateway(); if (data != NULL) - set_default_gateway(data); + set_default_gateway(data, type); } } -static struct connman_driver connection_driver = { - .name = "connection", - .type = CONNMAN_ELEMENT_TYPE_CONNECTION, - .priority = CONNMAN_DRIVER_PRIORITY_LOW, - .probe = connection_probe, - .remove = connection_remove, -}; - -int __connman_connection_init(void) +gboolean __connman_connection_update_gateway(void) { - DBG(""); + struct gateway_data *default_gateway; + gboolean updated = FALSE; + GHashTableIter iter; + gpointer value, key; - if (connman_rtnl_register(&connection_rtnl) < 0) - connman_error("Failed to setup RTNL gateway driver"); + if (gateway_hash == NULL) + return updated; - return connman_driver_register(&connection_driver); -} + update_order(); -void __connman_connection_cleanup(void) -{ - GSList *list; + default_gateway = find_default_gateway(); - DBG(""); + __connman_service_update_ordering(); - connman_driver_unregister(&connection_driver); + DBG("default %p", default_gateway); - connman_rtnl_unregister(&connection_rtnl); + /* + * There can be multiple active gateways so we need to + * check them all. + */ + g_hash_table_iter_init(&iter, gateway_hash); - for (list = gateway_list; list; list = list->next) { - struct gateway_data *data = list->data; + while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) { + struct gateway_data *active_gateway = value; - DBG("index %d gateway %s", data->index, data->gateway); + if (active_gateway == default_gateway) + continue; - g_free(data->gateway); - g_free(data); - list->data = NULL; + if (active_gateway->ipv4_gateway != NULL && + active_gateway->ipv4_gateway->active == TRUE) { + + unset_default_gateway(active_gateway, + CONNMAN_IPCONFIG_TYPE_IPV4); + updated = TRUE; + } + + if (active_gateway->ipv6_gateway != NULL && + active_gateway->ipv6_gateway->active == TRUE) { + + unset_default_gateway(active_gateway, + CONNMAN_IPCONFIG_TYPE_IPV6); + updated = TRUE; + } } - g_slist_free(gateway_list); - gateway_list = NULL; + if (updated && default_gateway != NULL) { + if (default_gateway->ipv4_gateway) + set_default_gateway(default_gateway, + CONNMAN_IPCONFIG_TYPE_IPV4); + + if (default_gateway->ipv6_gateway) + set_default_gateway(default_gateway, + CONNMAN_IPCONFIG_TYPE_IPV6); + } + + return updated; } -static void update_order(void) +int __connman_connection_get_vpn_index(int phy_index) { - GSList *list = NULL; + GHashTableIter iter; + gpointer value, key; - for (list = gateway_list; list; list = list->next) { - struct gateway_data *data = list->data; - struct connman_service *service; + g_hash_table_iter_init(&iter, gateway_hash); - /* vpn gataway is not attached to a service. */ - if (data->vpn) - continue; + while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) { + struct gateway_data *data = value; + + if (data->ipv4_gateway != NULL && + data->ipv4_gateway->vpn_phy_index == phy_index) + return data->index; - service = __connman_element_get_service(data->element); - data->order = __connman_service_get_order(service); + if (data->ipv6_gateway != NULL && + data->ipv6_gateway->vpn_phy_index == phy_index) + return data->index; } + + return -1; } -gboolean __connman_connection_update_gateway(void) +int __connman_connection_init(void) { - struct gateway_data *active_gateway, *default_gateway; - gboolean updated = FALSE; + int err; - update_order(); + DBG(""); - active_gateway = find_active_gateway(); - default_gateway = find_default_gateway(); + gateway_hash = g_hash_table_new_full(g_direct_hash, g_direct_equal, + NULL, remove_gateway); + + err = connman_rtnl_register(&connection_rtnl); + if (err < 0) + connman_error("Failed to setup RTNL gateway driver"); + + return err; +} + +void __connman_connection_cleanup(void) +{ + GHashTableIter iter; + gpointer value, key; - if (active_gateway && active_gateway != default_gateway) { - del_route_all(active_gateway); - updated = TRUE; + DBG(""); + + connman_rtnl_unregister(&connection_rtnl); + + g_hash_table_iter_init(&iter, gateway_hash); + + while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) { + struct gateway_data *data = value; + + disable_gateway(data, CONNMAN_IPCONFIG_TYPE_ALL); } - return updated; + g_hash_table_destroy(gateway_hash); + gateway_hash = NULL; }