X-Git-Url: http://review.tizen.org/git/?a=blobdiff_plain;f=src%2Ftethering.c;h=e04756ff0be614f6ed2dbd2cd561c81a020621e2;hb=515ec5f2286e75d8a607d88fad3909a692a7e0dc;hp=420a3ca4a1cb948e017f502f619c97454b4852f2;hpb=d9046d22617a868e590894db7ee5009be5e90ecc;p=platform%2Fupstream%2Fconnman.git diff --git a/src/tethering.c b/src/tethering.c old mode 100644 new mode 100755 index 420a3ca..e04756f --- a/src/tethering.c +++ b/src/tethering.c @@ -2,7 +2,8 @@ * * Connection Manager * - * Copyright (C) 2007-2010 Intel Corporation. All rights reserved. + * Copyright (C) 2007-2013 Intel Corporation. All rights reserved. + * Copyright (C) 2011 ProFUSION embedded systems * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as @@ -23,178 +24,621 @@ #include #endif +#include +#include +#include #include #include #include #include +#include +#include +#include #include +#include +#include #include "connman.h" +#include + +#include + +#ifndef DBUS_TYPE_UNIX_FD +#define DBUS_TYPE_UNIX_FD -1 +#endif + #define BRIDGE_NAME "tether" -static connman_bool_t tethering_status = FALSE; -static const char *default_interface = NULL; -static volatile gint tethering_enabled; +#define DEFAULT_MTU 1500 + +static char *private_network_primary_dns = NULL; +static char *private_network_secondary_dns = NULL; + +static volatile int tethering_enabled; +static GDHCPServer *tethering_dhcp_server = NULL; +static struct connman_ippool *dhcp_ippool = NULL; +static DBusConnection *connection; +static GHashTable *pn_hash; + +static GHashTable *clients_table; + +struct _clients_notify { + int id; + GHashTable *remove; +} *clients_notify; + +struct connman_private_network { + char *owner; + char *path; + guint watch; + DBusMessage *msg; + DBusMessage *reply; + int fd; + char *interface; + int index; + guint iface_watch; + struct connman_ippool *pool; + char *primary_dns; + char *secondary_dns; +}; + +const char *__connman_tethering_get_bridge(void) +{ + int sk, err; + unsigned long args[3]; -connman_bool_t __connman_tethering_get_status(void) + sk = socket(AF_INET, SOCK_STREAM, 0); + if (sk < 0) + return NULL; + + args[0] = BRCTL_GET_VERSION; + args[1] = args[2] = 0; + err = ioctl(sk, SIOCGIFBR, &args); + close(sk); + if (err == -1) { + connman_error("Missing support for 802.1d ethernet bridging"); + return NULL; + } + + return BRIDGE_NAME; +} + +static void dhcp_server_debug(const char *str, void *data) { - return tethering_status; + connman_info("%s: %s\n", (const char *) data, str); } -static int create_bridge(const char *name) +static void dhcp_server_error(GDHCPServerError error) { - int sk, err; + switch (error) { + case G_DHCP_SERVER_ERROR_NONE: + connman_error("OK"); + break; + case G_DHCP_SERVER_ERROR_INTERFACE_UNAVAILABLE: + connman_error("Interface unavailable"); + break; + case G_DHCP_SERVER_ERROR_INTERFACE_IN_USE: + connman_error("Interface in use"); + break; + case G_DHCP_SERVER_ERROR_INTERFACE_DOWN: + connman_error("Interface down"); + break; + case G_DHCP_SERVER_ERROR_NOMEM: + connman_error("No memory"); + break; + case G_DHCP_SERVER_ERROR_INVALID_INDEX: + connman_error("Invalid index"); + break; + case G_DHCP_SERVER_ERROR_INVALID_OPTION: + connman_error("Invalid option"); + break; + case G_DHCP_SERVER_ERROR_IP_ADDRESS_INVALID: + connman_error("Invalid address"); + break; + } +} - DBG("name %s", name); +static GDHCPServer *dhcp_server_start(const char *bridge, + const char *router, const char *subnet, + const char *start_ip, const char *end_ip, + unsigned int lease_time, const char *dns) +{ + GDHCPServerError error; + GDHCPServer *dhcp_server; + int index; - sk = socket(AF_INET, SOCK_STREAM, 0); - if (sk < 0) - return -EOPNOTSUPP; + DBG(""); - err = ioctl(sk, SIOCBRADDBR, name); + index = connman_inet_ifindex(bridge); + if (index < 0) + return NULL; - close(sk); + dhcp_server = g_dhcp_server_new(G_DHCP_IPV4, index, &error); + if (!dhcp_server) { + dhcp_server_error(error); + return NULL; + } - if (err < 0) - return -EOPNOTSUPP; + g_dhcp_server_set_debug(dhcp_server, dhcp_server_debug, "DHCP server"); - return 0; + g_dhcp_server_set_lease_time(dhcp_server, lease_time); + g_dhcp_server_set_option(dhcp_server, G_DHCP_SUBNET, subnet); + g_dhcp_server_set_option(dhcp_server, G_DHCP_ROUTER, router); + g_dhcp_server_set_option(dhcp_server, G_DHCP_DNS_SERVER, dns); + g_dhcp_server_set_ip_range(dhcp_server, start_ip, end_ip); + + g_dhcp_server_start(dhcp_server); + + return dhcp_server; } -static int remove_bridge(const char *name) +static void dhcp_server_stop(GDHCPServer *server) { - int sk, err; + if (!server) + return; - DBG("name %s", name); + g_dhcp_server_unref(server); +} - sk = socket(AF_INET, SOCK_STREAM, 0); - if (sk < 0) +static void tethering_restart(struct connman_ippool *pool, void *user_data) +{ + DBG("pool %p", pool); + __connman_tethering_set_disabled(); + __connman_tethering_set_enabled(); +} + +static void unregister_client(gpointer key, + gpointer value, gpointer user_data) +{ + const char *addr = key; + __connman_tethering_client_unregister(addr); +} + +static void unregister_all_clients(void) +{ + g_hash_table_foreach(clients_table, unregister_client, NULL); +} + +int __connman_tethering_set_enabled(void) +{ + int index; + int err; + const char *gateway; + const char *broadcast; + const char *subnet_mask; + const char *start_ip; + const char *end_ip; + const char *dns; + unsigned char prefixlen; + char **ns; + + DBG("enabled %d", tethering_enabled + 1); + + if (__sync_fetch_and_add(&tethering_enabled, 1) != 0) + return 0; + + err = __connman_bridge_create(BRIDGE_NAME); + if (err < 0) { + __sync_fetch_and_sub(&tethering_enabled, 1); return -EOPNOTSUPP; + } - err = ioctl(sk, SIOCBRDELBR, name); + index = connman_inet_ifindex(BRIDGE_NAME); + dhcp_ippool = __connman_ippool_create(index, 2, 252, + tethering_restart, NULL); + if (!dhcp_ippool) { + connman_error("Fail to create IP pool"); + __connman_bridge_remove(BRIDGE_NAME); + __sync_fetch_and_sub(&tethering_enabled, 1); + return -EADDRNOTAVAIL; + } - close(sk); + gateway = __connman_ippool_get_gateway(dhcp_ippool); + broadcast = __connman_ippool_get_broadcast(dhcp_ippool); + subnet_mask = __connman_ippool_get_subnet_mask(dhcp_ippool); + start_ip = __connman_ippool_get_start_ip(dhcp_ippool); + end_ip = __connman_ippool_get_end_ip(dhcp_ippool); + + err = __connman_bridge_enable(BRIDGE_NAME, gateway, + connman_ipaddress_calc_netmask_len(subnet_mask), + broadcast); + if (err < 0 && err != -EALREADY) { + __connman_ippool_free(dhcp_ippool); + dhcp_ippool = NULL; + __connman_bridge_remove(BRIDGE_NAME); + __sync_fetch_and_sub(&tethering_enabled, 1); + return -EADDRNOTAVAIL; + } - if (err < 0) + ns = connman_setting_get_string_list("FallbackNameservers"); + if (ns) { + if (ns[0]) { + g_free(private_network_primary_dns); + private_network_primary_dns = g_strdup(ns[0]); + } + if (ns[1]) { + g_free(private_network_secondary_dns); + private_network_secondary_dns = g_strdup(ns[1]); + } + + DBG("Fallback ns primary %s secondary %s", + private_network_primary_dns, + private_network_secondary_dns); + } + + dns = gateway; + if (__connman_dnsproxy_add_listener(index) < 0) { + connman_error("Can't add listener %s to DNS proxy", + BRIDGE_NAME); + dns = private_network_primary_dns; + DBG("Serving %s nameserver to clients", dns); + } + + tethering_dhcp_server = dhcp_server_start(BRIDGE_NAME, + gateway, subnet_mask, + start_ip, end_ip, + 24 * 3600, dns); + if (!tethering_dhcp_server) { + __connman_bridge_disable(BRIDGE_NAME); + __connman_ippool_free(dhcp_ippool); + dhcp_ippool = NULL; + __connman_bridge_remove(BRIDGE_NAME); + __sync_fetch_and_sub(&tethering_enabled, 1); + return -EOPNOTSUPP; + } + + prefixlen = connman_ipaddress_calc_netmask_len(subnet_mask); + err = __connman_nat_enable(BRIDGE_NAME, start_ip, prefixlen); + if (err < 0) { + connman_error("Cannot enable NAT %d/%s", err, strerror(-err)); + dhcp_server_stop(tethering_dhcp_server); + __connman_bridge_disable(BRIDGE_NAME); + __connman_ippool_free(dhcp_ippool); + dhcp_ippool = NULL; + __connman_bridge_remove(BRIDGE_NAME); + __sync_fetch_and_sub(&tethering_enabled, 1); return -EOPNOTSUPP; + } + + err = __connman_ipv6pd_setup(BRIDGE_NAME); + if (err < 0 && err != -EINPROGRESS) + DBG("Cannot setup IPv6 prefix delegation %d/%s", err, + strerror(-err)); + + DBG("tethering started"); return 0; } -static int enable_ip_forward(connman_bool_t enable) +void __connman_tethering_set_disabled(void) { + int index; - FILE *f; + DBG("enabled %d", tethering_enabled - 1); - f = fopen("/proc/sys/net/ipv4/ip_forward", "r+"); - if (f == NULL) - return -errno; + if (__sync_fetch_and_sub(&tethering_enabled, 1) != 1) + return; - if (enable == TRUE) - fprintf(f, "1"); - else - fprintf(f, "0"); + unregister_all_clients(); - fclose(f); + __connman_ipv6pd_cleanup(); - return 0; -} + index = connman_inet_ifindex(BRIDGE_NAME); + __connman_dnsproxy_remove_listener(index); -static int enable_nat(const char *interface) -{ - int ret; + __connman_nat_disable(BRIDGE_NAME); - if (interface == NULL) - return 0; + dhcp_server_stop(tethering_dhcp_server); + + tethering_dhcp_server = NULL; + + __connman_bridge_disable(BRIDGE_NAME); - /* Enable IPv4 forwarding */ - ret = enable_ip_forward(TRUE); - if (ret < 0) - return ret; + __connman_ippool_free(dhcp_ippool); + dhcp_ippool = NULL; - /* TODO: Flush nat POSTROUTING chain */ - /* Enable masquerading */ - ret = __connman_iptables_command("-t nat -A POSTROUTING -o %s -j MASQUERADE", interface); - if (ret < 0) - return ret; + __connman_bridge_remove(BRIDGE_NAME); - return __connman_iptables_commit("nat"); + g_free(private_network_primary_dns); + private_network_primary_dns = NULL; + g_free(private_network_secondary_dns); + private_network_secondary_dns = NULL; + + DBG("tethering stopped"); } -static void disable_nat(const char *interface) +static void append_client(gpointer key, gpointer value, + gpointer user_data) { - /* Disable IPv4 forwarding */ - enable_ip_forward(FALSE); + const char *addr = key; + DBusMessageIter *array = user_data; + + dbus_message_iter_append_basic(array, DBUS_TYPE_STRING, + &addr); +} - /* TODO: Flush nat POSTROUTING chain */ +void __connman_tethering_list_clients(DBusMessageIter *array) +{ + g_hash_table_foreach(clients_table, append_client, array); } -void __connman_tethering_set_enabled(void) +static void setup_tun_interface(unsigned int flags, unsigned change, + void *data) { - if (tethering_status == FALSE) + struct connman_private_network *pn = data; + unsigned char prefixlen; + DBusMessageIter array, dict; + const char *server_ip; + const char *peer_ip; + const char *subnet_mask; + int err; + + DBG("index %d flags %d change %d", pn->index, flags, change); + + if (flags & IFF_UP) return; - DBG("enabled %d", tethering_enabled + 1); + subnet_mask = __connman_ippool_get_subnet_mask(pn->pool); + server_ip = __connman_ippool_get_start_ip(pn->pool); + peer_ip = __connman_ippool_get_end_ip(pn->pool); + prefixlen = connman_ipaddress_calc_netmask_len(subnet_mask); + + if ((__connman_inet_modify_address(RTM_NEWADDR, + NLM_F_REPLACE | NLM_F_ACK, pn->index, AF_INET, + server_ip, peer_ip, prefixlen, NULL)) < 0) { + DBG("address setting failed"); + return; + } + + connman_inet_ifup(pn->index); + + err = __connman_nat_enable(BRIDGE_NAME, server_ip, prefixlen); + if (err < 0) { + connman_error("failed to enable NAT"); + goto error; + } + + dbus_message_iter_init_append(pn->reply, &array); + + dbus_message_iter_append_basic(&array, DBUS_TYPE_OBJECT_PATH, + &pn->path); + + connman_dbus_dict_open(&array, &dict); + + connman_dbus_dict_append_basic(&dict, "ServerIPv4", + DBUS_TYPE_STRING, &server_ip); + connman_dbus_dict_append_basic(&dict, "PeerIPv4", + DBUS_TYPE_STRING, &peer_ip); + if (pn->primary_dns) + connman_dbus_dict_append_basic(&dict, "PrimaryDNS", + DBUS_TYPE_STRING, &pn->primary_dns); + + if (pn->secondary_dns) + connman_dbus_dict_append_basic(&dict, "SecondaryDNS", + DBUS_TYPE_STRING, &pn->secondary_dns); - if (g_atomic_int_exchange_and_add(&tethering_enabled, 1) == 0) { - /* TODO Start DHCP server and DNS proxy on the bridge */ + connman_dbus_dict_close(&array, &dict); - enable_nat(default_interface); - DBG("tethering started"); + dbus_message_iter_append_basic(&array, DBUS_TYPE_UNIX_FD, &pn->fd); + + g_dbus_send_message(connection, pn->reply); + + return; + +error: + pn->reply = __connman_error_failed(pn->msg, -err); + g_dbus_send_message(connection, pn->reply); + + g_hash_table_remove(pn_hash, pn->path); +} + +static void remove_private_network(gpointer user_data) +{ + struct connman_private_network *pn = user_data; + + __connman_nat_disable(BRIDGE_NAME); + connman_rtnl_remove_watch(pn->iface_watch); + __connman_ippool_free(pn->pool); + + if (pn->watch > 0) { + g_dbus_remove_watch(connection, pn->watch); + pn->watch = 0; } + + close(pn->fd); + + g_free(pn->interface); + g_free(pn->owner); + g_free(pn->path); + g_free(pn->primary_dns); + g_free(pn->secondary_dns); + g_free(pn); } -void __connman_tethering_set_disabled(void) +static void owner_disconnect(DBusConnection *conn, void *user_data) +{ + struct connman_private_network *pn = user_data; + + DBG("%s died", pn->owner); + + pn->watch = 0; + + g_hash_table_remove(pn_hash, pn->path); +} + +static void ippool_disconnect(struct connman_ippool *pool, void *user_data) { - if (tethering_status == FALSE) + struct connman_private_network *pn = user_data; + + DBG("block used externally"); + + g_hash_table_remove(pn_hash, pn->path); +} + +static gboolean client_send_changed(gpointer data) +{ + DBusMessage *signal; + DBusMessageIter iter, array; + + DBG(""); + + clients_notify->id = 0; + + signal = dbus_message_new_signal(CONNMAN_MANAGER_PATH, + CONNMAN_MANAGER_INTERFACE, "TetheringClientsChanged"); + if (!signal) + return FALSE; + + dbus_message_iter_init_append(signal, &iter); + dbus_message_iter_open_container(&iter, DBUS_TYPE_ARRAY, + DBUS_TYPE_STRING_AS_STRING, &array); + + g_hash_table_foreach(clients_table, append_client, &array); + + dbus_message_iter_close_container(&iter, &array); + + dbus_message_iter_init_append(signal, &iter); + dbus_message_iter_open_container(&iter, DBUS_TYPE_ARRAY, + DBUS_TYPE_STRING_AS_STRING, &array); + + g_hash_table_foreach(clients_notify->remove, append_client, &array); + + dbus_message_iter_close_container(&iter, &array); + + dbus_connection_send(connection, signal, NULL); + dbus_message_unref(signal); + + g_hash_table_remove_all(clients_notify->remove); + + return FALSE; +} + +static void client_schedule_changed(void) +{ + if (clients_notify->id != 0) return; - DBG("enabled %d", tethering_enabled - 1); + clients_notify->id = g_timeout_add(100, client_send_changed, NULL); +} - if (g_atomic_int_dec_and_test(&tethering_enabled) == 0) { - /* TODO Stop DHCP server and DNS proxy on the bridge */ +static void client_added(const char *addr) +{ + DBG("client %s", addr); - disable_nat(default_interface); - DBG("tethering stopped"); - } + g_hash_table_remove(clients_notify->remove, addr); + + client_schedule_changed(); } -int __connman_tethering_set_status(connman_bool_t status) +static void client_removed(const char *addr) { - if (status == tethering_status) - return -EALREADY; + DBG("client %s", addr); + + g_hash_table_replace(clients_notify->remove, g_strdup(addr), NULL); + + client_schedule_changed(); +} - if (status == TRUE) { - create_bridge(BRIDGE_NAME); - __connman_technology_enable_tethering(BRIDGE_NAME); - } else { - __connman_technology_disable_tethering(BRIDGE_NAME); - remove_bridge(BRIDGE_NAME); +int __connman_private_network_request(DBusMessage *msg, const char *owner) +{ + struct connman_private_network *pn; + char *iface = NULL; + char *path = NULL; + int index, fd, err; + + if (DBUS_TYPE_UNIX_FD < 0) + return -EINVAL; + + fd = connman_inet_create_tunnel(&iface); + if (fd < 0) + return fd; + + path = g_strdup_printf("/tethering/%s", iface); + + pn = g_hash_table_lookup(pn_hash, path); + if (pn) { + g_free(path); + g_free(iface); + close(fd); + return -EEXIST; + } + + index = connman_inet_ifindex(iface); + if (index < 0) { + err = -ENODEV; + goto error; + } + DBG("interface %s", iface); + + err = connman_inet_set_mtu(index, DEFAULT_MTU); + + pn = g_try_new0(struct connman_private_network, 1); + if (!pn) { + err = -ENOMEM; + goto error; + } + + pn->owner = g_strdup(owner); + pn->path = path; + pn->watch = g_dbus_add_disconnect_watch(connection, pn->owner, + owner_disconnect, pn, NULL); + pn->msg = msg; + pn->reply = dbus_message_new_method_return(pn->msg); + if (!pn->reply) + goto error; + + pn->fd = fd; + pn->interface = iface; + pn->index = index; + pn->pool = __connman_ippool_create(pn->index, 1, 1, ippool_disconnect, pn); + if (!pn->pool) { + errno = -ENOMEM; + goto error; } - tethering_status = status; + pn->primary_dns = g_strdup(private_network_primary_dns); + pn->secondary_dns = g_strdup(private_network_secondary_dns); + + pn->iface_watch = connman_rtnl_add_newlink_watch(index, + setup_tun_interface, pn); + + g_hash_table_insert(pn_hash, pn->path, pn); return 0; + +error: + close(fd); + g_free(iface); + g_free(path); + if (pn) + g_free(pn->owner); + g_free(pn); + return err; } -void __connman_tethering_update_interface(const char *interface) +int __connman_private_network_release(const char *path) { - DBG("interface %s", interface); - - default_interface = interface; + struct connman_private_network *pn; - if (interface == NULL) { - disable_nat(interface); + pn = g_hash_table_lookup(pn_hash, path); + if (!pn) + return -EACCES; - return; - } + g_hash_table_remove(pn_hash, path); + return 0; +} - if (tethering_status == FALSE || - !g_atomic_int_get(&tethering_enabled)) - return; +void __connman_tethering_client_register(const char *addr) +{ + g_hash_table_insert(clients_table, g_strdup(addr), NULL); + client_added(addr); +} - enable_nat(interface); +void __connman_tethering_client_unregister(const char *addr) +{ + g_hash_table_remove(clients_table, addr); + client_removed(addr); } int __connman_tethering_init(void) @@ -203,13 +647,46 @@ int __connman_tethering_init(void) tethering_enabled = 0; + connection = connman_dbus_get_connection(); + if (!connection) + return -EFAULT; + + pn_hash = g_hash_table_new_full(g_str_hash, g_str_equal, + NULL, remove_private_network); + + clients_table = g_hash_table_new_full(g_str_hash, g_str_equal, + g_free, NULL); + + clients_notify = g_new0(struct _clients_notify, 1); + clients_notify->remove = g_hash_table_new_full(g_str_hash, g_str_equal, + g_free, NULL); return 0; } void __connman_tethering_cleanup(void) { - DBG(""); + DBG("enabled %d", tethering_enabled); + + __sync_synchronize(); + if (tethering_enabled > 0) { + if (tethering_dhcp_server) + dhcp_server_stop(tethering_dhcp_server); + __connman_bridge_disable(BRIDGE_NAME); + __connman_bridge_remove(BRIDGE_NAME); + __connman_nat_disable(BRIDGE_NAME); + } + + if (!connection) + return; + + g_hash_table_destroy(pn_hash); + + g_hash_table_destroy(clients_notify->remove); + g_free(clients_notify); + clients_notify = NULL; + + g_hash_table_destroy(clients_table); + clients_table = NULL; - if (tethering_status == TRUE) - remove_bridge(BRIDGE_NAME); + dbus_connection_unref(connection); }