Test: TreeHugger Signed-off-by: Maciej Żenczykowski <maze@google.com> Change-Id: I18ccf19024f0617778799f548c8707a518eefadc git-subtree-dir: clatd git-subtree-mainline:655d0850acgit-subtree-split:2007830075
208 lines
6.9 KiB
C
208 lines
6.9 KiB
C
/*
|
|
* Copyright 2018 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*
|
|
* main.c - main function
|
|
*/
|
|
|
|
#include <arpa/inet.h>
|
|
#include <errno.h>
|
|
#include <netinet/in.h>
|
|
#include <stdbool.h>
|
|
#include <stdint.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <sys/personality.h>
|
|
#include <sys/utsname.h>
|
|
#include <unistd.h>
|
|
|
|
#include "clatd.h"
|
|
#include "common.h"
|
|
#include "config.h"
|
|
#include "logging.h"
|
|
|
|
#define DEVICEPREFIX "v4-"
|
|
|
|
/* function: stop_loop
|
|
* signal handler: stop the event loop
|
|
*/
|
|
static void stop_loop() { running = 0; };
|
|
|
|
/* function: print_help
|
|
* in case the user is running this on the command line
|
|
*/
|
|
void print_help() {
|
|
printf("android-clat arguments:\n");
|
|
printf("-i [uplink interface]\n");
|
|
printf("-p [plat prefix]\n");
|
|
printf("-4 [IPv4 address]\n");
|
|
printf("-6 [IPv6 address]\n");
|
|
printf("-t [tun file descriptor number]\n");
|
|
printf("-r [read socket descriptor number]\n");
|
|
printf("-w [write socket descriptor number]\n");
|
|
}
|
|
|
|
/* function: main
|
|
* allocate and setup the tun device, then run the event loop
|
|
*/
|
|
int main(int argc, char **argv) {
|
|
struct tun_data tunnel;
|
|
int opt;
|
|
char *uplink_interface = NULL, *plat_prefix = NULL;
|
|
char *v4_addr = NULL, *v6_addr = NULL, *tunfd_str = NULL, *read_sock_str = NULL,
|
|
*write_sock_str = NULL;
|
|
unsigned len;
|
|
|
|
while ((opt = getopt(argc, argv, "i:p:4:6:t:r:w:h")) != -1) {
|
|
switch (opt) {
|
|
case 'i':
|
|
uplink_interface = optarg;
|
|
break;
|
|
case 'p':
|
|
plat_prefix = optarg;
|
|
break;
|
|
case '4':
|
|
v4_addr = optarg;
|
|
break;
|
|
case '6':
|
|
v6_addr = optarg;
|
|
break;
|
|
case 't':
|
|
tunfd_str = optarg;
|
|
break;
|
|
case 'r':
|
|
read_sock_str = optarg;
|
|
break;
|
|
case 'w':
|
|
write_sock_str = optarg;
|
|
break;
|
|
case 'h':
|
|
print_help();
|
|
exit(0);
|
|
default:
|
|
logmsg(ANDROID_LOG_FATAL, "Unknown option -%c. Exiting.", (char)optopt);
|
|
exit(1);
|
|
}
|
|
}
|
|
|
|
if (uplink_interface == NULL) {
|
|
logmsg(ANDROID_LOG_FATAL, "clatd called without an interface");
|
|
exit(1);
|
|
}
|
|
|
|
if (tunfd_str != NULL && !parse_int(tunfd_str, &tunnel.fd4)) {
|
|
logmsg(ANDROID_LOG_FATAL, "invalid tunfd %s", tunfd_str);
|
|
exit(1);
|
|
}
|
|
if (!tunnel.fd4) {
|
|
logmsg(ANDROID_LOG_FATAL, "no tunfd specified on commandline.");
|
|
exit(1);
|
|
}
|
|
|
|
if (read_sock_str != NULL && !parse_int(read_sock_str, &tunnel.read_fd6)) {
|
|
logmsg(ANDROID_LOG_FATAL, "invalid read socket %s", read_sock_str);
|
|
exit(1);
|
|
}
|
|
if (!tunnel.read_fd6) {
|
|
logmsg(ANDROID_LOG_FATAL, "no read_fd6 specified on commandline.");
|
|
exit(1);
|
|
}
|
|
|
|
if (write_sock_str != NULL && !parse_int(write_sock_str, &tunnel.write_fd6)) {
|
|
logmsg(ANDROID_LOG_FATAL, "invalid write socket %s", write_sock_str);
|
|
exit(1);
|
|
}
|
|
if (!tunnel.write_fd6) {
|
|
logmsg(ANDROID_LOG_FATAL, "no write_fd6 specified on commandline.");
|
|
exit(1);
|
|
}
|
|
|
|
len = snprintf(tunnel.device4, sizeof(tunnel.device4), "%s%s", DEVICEPREFIX, uplink_interface);
|
|
if (len >= sizeof(tunnel.device4)) {
|
|
logmsg(ANDROID_LOG_FATAL, "interface name too long '%s'", tunnel.device4);
|
|
exit(1);
|
|
}
|
|
|
|
Global_Clatd_Config.native_ipv6_interface = uplink_interface;
|
|
if (!plat_prefix || inet_pton(AF_INET6, plat_prefix, &Global_Clatd_Config.plat_subnet) <= 0) {
|
|
logmsg(ANDROID_LOG_FATAL, "invalid IPv6 address specified for plat prefix: %s", plat_prefix);
|
|
exit(1);
|
|
}
|
|
|
|
if (!v4_addr || !inet_pton(AF_INET, v4_addr, &Global_Clatd_Config.ipv4_local_subnet.s_addr)) {
|
|
logmsg(ANDROID_LOG_FATAL, "Invalid IPv4 address %s", v4_addr);
|
|
exit(1);
|
|
}
|
|
|
|
if (!v6_addr || !inet_pton(AF_INET6, v6_addr, &Global_Clatd_Config.ipv6_local_subnet)) {
|
|
logmsg(ANDROID_LOG_FATAL, "Invalid source address %s", v6_addr);
|
|
exit(1);
|
|
}
|
|
|
|
logmsg(ANDROID_LOG_INFO, "Starting clat version %s on %s plat=%s v4=%s v6=%s", CLATD_VERSION,
|
|
uplink_interface, plat_prefix ? plat_prefix : "(none)", v4_addr ? v4_addr : "(none)",
|
|
v6_addr ? v6_addr : "(none)");
|
|
|
|
{
|
|
// Compile time detection of 32 vs 64-bit build. (note: C does not have 'constexpr')
|
|
// Avoid use of preprocessor macros to get compile time syntax checking even on 64-bit.
|
|
const int user_bits = sizeof(void*) * 8;
|
|
const bool user32 = (user_bits == 32);
|
|
|
|
// Note that on 64-bit all this personality related code simply compile optimizes out.
|
|
// 32-bit: fetch current personality (see 'man personality': 0xFFFFFFFF means retrieve only)
|
|
// On Linux fetching personality cannot fail.
|
|
const int prev_personality = user32 ? personality(0xFFFFFFFFuL) : PER_LINUX;
|
|
// 32-bit: attempt to get rid of kernel spoofing of 'uts.machine' architecture,
|
|
// In theory this cannot fail, as PER_LINUX should always be supported.
|
|
if (user32) (void)personality((prev_personality & ~PER_MASK) | PER_LINUX);
|
|
// 64-bit: this will compile time evaluate to false.
|
|
const bool was_linux32 = (prev_personality & PER_MASK) == PER_LINUX32;
|
|
|
|
struct utsname uts = {};
|
|
if (uname(&uts)) exit(1); // only possible error is EFAULT, but 'uts' is on stack
|
|
|
|
// sysname is likely 'Linux', release is 'kver', machine is kernel's *true* architecture
|
|
logmsg(ANDROID_LOG_INFO, "%d-bit userspace on %s kernel %s for %s%s.", user_bits,
|
|
uts.sysname, uts.release, uts.machine, was_linux32 ? " (was spoofed)" : "");
|
|
|
|
// 32-bit: try to return to the 'default' personality
|
|
// In theory this cannot fail, because it was already previously in use.
|
|
if (user32) (void)personality(prev_personality);
|
|
}
|
|
|
|
// Loop until someone sends us a signal or brings down the tun interface.
|
|
if (signal(SIGTERM, stop_loop) == SIG_ERR) {
|
|
logmsg(ANDROID_LOG_FATAL, "sigterm handler failed: %s", strerror(errno));
|
|
exit(1);
|
|
}
|
|
|
|
event_loop(&tunnel);
|
|
|
|
logmsg(ANDROID_LOG_INFO, "Shutting down clat on %s", uplink_interface);
|
|
|
|
if (running) {
|
|
logmsg(ANDROID_LOG_INFO, "Clatd on %s waiting for SIGTERM", uplink_interface);
|
|
// let's give higher level java code 15 seconds to kill us,
|
|
// but eventually terminate anyway, in case system server forgets about us...
|
|
// sleep() should be interrupted by SIGTERM, the handler should clear running
|
|
sleep(15);
|
|
logmsg(ANDROID_LOG_INFO, "Clatd on %s %s SIGTERM", uplink_interface,
|
|
running ? "timed out waiting for" : "received");
|
|
} else {
|
|
logmsg(ANDROID_LOG_INFO, "Clatd on %s already received SIGTERM", uplink_interface);
|
|
}
|
|
return 0;
|
|
}
|