blob: a89c588780e87bc7d803d1f400b6b75c5d19cca9 [file] [log] [blame]
Daniel Drowna45056e2012-03-23 10:42:54 -05001/*
2 * Copyright 2012 Daniel Drown
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 *
16 * clatd.c - tun interface setup and main event loop
17 */
18#include <poll.h>
19#include <signal.h>
20#include <time.h>
21#include <stdio.h>
22#include <sys/types.h>
23#include <sys/ioctl.h>
24#include <sys/stat.h>
25#include <string.h>
26#include <errno.h>
27#include <stdlib.h>
28#include <unistd.h>
29#include <arpa/inet.h>
30#include <fcntl.h>
31
Nick Kralevich2edb7562013-02-28 14:15:22 -080032#include <sys/capability.h>
Lorenzo Colittid9084182013-03-22 00:42:21 +090033#include <sys/uio.h>
Daniel Drowna45056e2012-03-23 10:42:54 -050034#include <linux/prctl.h>
35#include <linux/if.h>
36#include <linux/if_tun.h>
37#include <linux/if_ether.h>
38
39#include <private/android_filesystem_config.h>
40
Lorenzo Colittid9084182013-03-22 00:42:21 +090041#include "translate.h"
Daniel Drowna45056e2012-03-23 10:42:54 -050042#include "clatd.h"
43#include "config.h"
44#include "logging.h"
45#include "setif.h"
46#include "setroute.h"
47#include "mtu.h"
48#include "getaddr.h"
49#include "dump.h"
50
51#define DEVICENAME6 "clat"
52#define DEVICENAME4 "clat4"
53
Lorenzo Colitti57d480d2014-02-09 10:35:38 +090054/* 40 bytes IPv6 header - 20 bytes IPv4 header + 8 bytes fragment header */
55#define MTU_DELTA 28
56
Daniel Drowna45056e2012-03-23 10:42:54 -050057int forwarding_fd = -1;
58volatile sig_atomic_t running = 1;
59
Daniel Drowna45056e2012-03-23 10:42:54 -050060/* function: set_forwarding
61 * enables/disables ipv6 forwarding
62 */
63void set_forwarding(int fd, const char *setting) {
64 /* we have to forward packets from the WAN to the tun interface */
65 if(write(fd, setting, strlen(setting)) < 0) {
66 logmsg(ANDROID_LOG_FATAL,"set_forwarding(%s) failed: %s", setting, strerror(errno));
67 exit(1);
68 }
69}
70
Lorenzo Colittibaf62992013-03-01 20:29:39 +090071/* function: stop_loop
72 * signal handler: stop the event loop
Daniel Drowna45056e2012-03-23 10:42:54 -050073 */
Lorenzo Colitti9477a462013-11-18 15:56:02 +090074void stop_loop() {
Daniel Drowna45056e2012-03-23 10:42:54 -050075 running = 0;
76}
77
78/* function: tun_open
79 * tries to open the tunnel device
80 */
81int tun_open() {
82 int fd;
83
84 fd = open("/dev/tun", O_RDWR);
85 if(fd < 0) {
86 fd = open("/dev/net/tun", O_RDWR);
87 }
88
89 return fd;
90}
91
92/* function: tun_alloc
93 * creates a tun interface and names it
94 * dev - the name for the new tun device
95 */
96int tun_alloc(char *dev, int fd) {
97 struct ifreq ifr;
98 int err;
99
100 memset(&ifr, 0, sizeof(ifr));
101
102 ifr.ifr_flags = IFF_TUN;
103 if( *dev ) {
104 strncpy(ifr.ifr_name, dev, IFNAMSIZ);
105 ifr.ifr_name[IFNAMSIZ-1] = '\0';
106 }
107
108 if( (err = ioctl(fd, TUNSETIFF, (void *) &ifr)) < 0 ){
109 close(fd);
110 return err;
111 }
112 strcpy(dev, ifr.ifr_name);
113 return 0;
114}
115
116/* function: deconfigure_tun_ipv6
117 * removes the ipv6 route
118 * tunnel - tun device data
119 */
120void deconfigure_tun_ipv6(const struct tun_data *tunnel) {
121 int status;
122
123 status = if_route(tunnel->device6, AF_INET6, &Global_Clatd_Config.ipv6_local_subnet,
124 128, NULL, 1, 0, ROUTE_DELETE);
125 if(status < 0) {
126 logmsg(ANDROID_LOG_WARN,"deconfigure_tun_ipv6/if_route(6) failed: %s",strerror(-status));
127 }
128}
129
130/* function: configure_tun_ipv6
131 * configures the ipv6 route
132 * note: routes a /128 out of the (assumed routed to us) /64 to the CLAT interface
133 * tunnel - tun device data
134 */
135void configure_tun_ipv6(const struct tun_data *tunnel) {
Daniel Drowna45056e2012-03-23 10:42:54 -0500136 int status;
137
138 status = if_route(tunnel->device6, AF_INET6, &Global_Clatd_Config.ipv6_local_subnet,
139 128, NULL, 1, 0, ROUTE_CREATE);
140 if(status < 0) {
141 logmsg(ANDROID_LOG_FATAL,"configure_tun_ipv6/if_route(6) failed: %s",strerror(-status));
142 exit(1);
143 }
144}
145
146/* function: interface_poll
147 * polls the uplink network interface for address changes
148 * tunnel - tun device data
149 */
150void interface_poll(const struct tun_data *tunnel) {
151 union anyip *interface_ip;
152
153 interface_ip = getinterface_ip(Global_Clatd_Config.default_pdp_interface, AF_INET6);
154 if(!interface_ip) {
155 logmsg(ANDROID_LOG_WARN,"unable to find an ipv6 ip on interface %s",Global_Clatd_Config.default_pdp_interface);
156 return;
157 }
158
159 config_generate_local_ipv6_subnet(&interface_ip->ip6);
160
161 if(!IN6_ARE_ADDR_EQUAL(&interface_ip->ip6, &Global_Clatd_Config.ipv6_local_subnet)) {
162 char from_addr[INET6_ADDRSTRLEN], to_addr[INET6_ADDRSTRLEN];
163 inet_ntop(AF_INET6, &Global_Clatd_Config.ipv6_local_subnet, from_addr, sizeof(from_addr));
164 inet_ntop(AF_INET6, &interface_ip->ip6, to_addr, sizeof(to_addr));
165 logmsg(ANDROID_LOG_WARN, "clat subnet changed from %s to %s", from_addr, to_addr);
166
167 // remove old route
168 deconfigure_tun_ipv6(tunnel);
169
170 // add new route, start translating packets to the new prefix
171 memcpy(&Global_Clatd_Config.ipv6_local_subnet, &interface_ip->ip6, sizeof(struct in6_addr));
172 configure_tun_ipv6(tunnel);
173 }
174
175 free(interface_ip);
176}
177
178/* function: configure_tun_ip
179 * configures the ipv4 and ipv6 addresses on the tunnel interface
180 * tunnel - tun device data
181 */
182void configure_tun_ip(const struct tun_data *tunnel) {
Daniel Drowna45056e2012-03-23 10:42:54 -0500183 int status;
184
Lorenzo Colitti3ca03022013-03-27 12:39:10 +0900185 // Configure the interface before bringing it up. As soon as we bring the interface up, the
186 // framework will be notified and will assume the interface's configuration has been finalized.
187 status = add_address(tunnel->device4, AF_INET, &Global_Clatd_Config.ipv4_local_subnet,
188 32, &Global_Clatd_Config.ipv4_local_subnet);
189 if(status < 0) {
190 logmsg(ANDROID_LOG_FATAL,"configure_tun_ip/if_address(4) failed: %s",strerror(-status));
191 exit(1);
192 }
Daniel Drowna45056e2012-03-23 10:42:54 -0500193
JP Abgrall4e0dd832013-12-20 14:51:26 -0800194 status = add_address(tunnel->device6, AF_INET6, &Global_Clatd_Config.ipv6_local_address,
195 64, NULL);
196 if(status < 0) {
197 logmsg(ANDROID_LOG_FATAL,"configure_tun_ip/if_address(6) failed: %s",strerror(-status));
198 exit(1);
199 }
200
Daniel Drowna45056e2012-03-23 10:42:54 -0500201 if((status = if_up(tunnel->device6, Global_Clatd_Config.mtu)) < 0) {
202 logmsg(ANDROID_LOG_FATAL,"configure_tun_ip/if_up(6) failed: %s",strerror(-status));
203 exit(1);
204 }
Lorenzo Colitti3ca03022013-03-27 12:39:10 +0900205
Daniel Drowna45056e2012-03-23 10:42:54 -0500206 if((status = if_up(tunnel->device4, Global_Clatd_Config.ipv4mtu)) < 0) {
207 logmsg(ANDROID_LOG_FATAL,"configure_tun_ip/if_up(4) failed: %s",strerror(-status));
208 exit(1);
209 }
Daniel Drowna45056e2012-03-23 10:42:54 -0500210
211 configure_tun_ipv6(tunnel);
Daniel Drowna45056e2012-03-23 10:42:54 -0500212}
213
214/* function: drop_root
215 * drops root privs but keeps the needed capability
216 */
217void drop_root() {
218 gid_t groups[] = { AID_INET };
219 if(setgroups(sizeof(groups)/sizeof(groups[0]), groups) < 0) {
220 logmsg(ANDROID_LOG_FATAL,"drop_root/setgroups failed: %s",strerror(errno));
221 exit(1);
222 }
223
224 prctl(PR_SET_KEEPCAPS, 1, 0, 0, 0);
225
226 if(setgid(AID_CLAT) < 0) {
227 logmsg(ANDROID_LOG_FATAL,"drop_root/setgid failed: %s",strerror(errno));
228 exit(1);
229 }
230 if(setuid(AID_CLAT) < 0) {
231 logmsg(ANDROID_LOG_FATAL,"drop_root/setuid failed: %s",strerror(errno));
232 exit(1);
233 }
234
235 struct __user_cap_header_struct header;
236 struct __user_cap_data_struct cap;
237 memset(&header, 0, sizeof(header));
238 memset(&cap, 0, sizeof(cap));
239
240 header.version = _LINUX_CAPABILITY_VERSION;
241 header.pid = 0; // 0 = change myself
242 cap.effective = cap.permitted = (1 << CAP_NET_ADMIN);
243
244 if(capset(&header, &cap) < 0) {
245 logmsg(ANDROID_LOG_FATAL,"drop_root/capset failed: %s",strerror(errno));
246 exit(1);
247 }
248}
249
250/* function: configure_interface
251 * reads the configuration and applies it to the interface
252 * uplink_interface - network interface to use to reach the ipv6 internet
253 * plat_prefix - PLAT prefix to use
254 * tunnel - tun device data
255 */
256void configure_interface(const char *uplink_interface, const char *plat_prefix, struct tun_data *tunnel) {
257 int error;
258
259 if(!read_config("/system/etc/clatd.conf", uplink_interface, plat_prefix)) {
260 logmsg(ANDROID_LOG_FATAL,"read_config failed");
261 exit(1);
262 }
263
264 if(Global_Clatd_Config.mtu > MAXMTU) {
265 logmsg(ANDROID_LOG_WARN,"Max MTU is %d, requested %d", MAXMTU, Global_Clatd_Config.mtu);
266 Global_Clatd_Config.mtu = MAXMTU;
267 }
268 if(Global_Clatd_Config.mtu <= 0) {
269 Global_Clatd_Config.mtu = getifmtu(Global_Clatd_Config.default_pdp_interface);
270 logmsg(ANDROID_LOG_WARN,"ifmtu=%d",Global_Clatd_Config.mtu);
271 }
272 if(Global_Clatd_Config.mtu < 1280) {
273 logmsg(ANDROID_LOG_WARN,"mtu too small = %d", Global_Clatd_Config.mtu);
274 Global_Clatd_Config.mtu = 1280;
275 }
276
Lorenzo Colitti57d480d2014-02-09 10:35:38 +0900277 if(Global_Clatd_Config.ipv4mtu <= 0 ||
278 Global_Clatd_Config.ipv4mtu > Global_Clatd_Config.mtu - MTU_DELTA) {
279 Global_Clatd_Config.ipv4mtu = Global_Clatd_Config.mtu - MTU_DELTA;
Daniel Drowna45056e2012-03-23 10:42:54 -0500280 logmsg(ANDROID_LOG_WARN,"ipv4mtu now set to = %d",Global_Clatd_Config.ipv4mtu);
281 }
282
283 error = tun_alloc(tunnel->device6, tunnel->fd6);
284 if(error < 0) {
285 logmsg(ANDROID_LOG_FATAL,"tun_alloc failed: %s",strerror(errno));
286 exit(1);
287 }
288
289 error = tun_alloc(tunnel->device4, tunnel->fd4);
290 if(error < 0) {
291 logmsg(ANDROID_LOG_FATAL,"tun_alloc/4 failed: %s",strerror(errno));
292 exit(1);
293 }
294
295 configure_tun_ip(tunnel);
296}
297
Daniel Drowna45056e2012-03-23 10:42:54 -0500298/* function: read_packet
299 * reads a packet from the tunnel fd and passes it down the stack
300 * active_fd - tun file descriptor marked ready for reading
301 * tunnel - tun device data
302 */
303void read_packet(int active_fd, const struct tun_data *tunnel) {
304 ssize_t readlen;
305 char packet[PACKETLEN];
306
307 // in case something ignores the packet length
308 memset(packet, 0, PACKETLEN);
309
310 readlen = read(active_fd,packet,PACKETLEN);
311
312 if(readlen < 0) {
313 logmsg(ANDROID_LOG_WARN,"read_packet/read error: %s", strerror(errno));
314 return;
315 } else if(readlen == 0) {
316 logmsg(ANDROID_LOG_WARN,"read_packet/tun interface removed");
317 running = 0;
318 } else {
Daniel Drowna45056e2012-03-23 10:42:54 -0500319 ssize_t header_size = sizeof(struct tun_pi);
320
321 if(readlen < header_size) {
322 logmsg(ANDROID_LOG_WARN,"read_packet/short read: got %ld bytes", readlen);
323 return;
324 }
325
Lorenzo Colittif9390602014-02-13 12:53:35 +0900326 translate_packet(tunnel, (struct tun_pi *) packet, packet + header_size, readlen - header_size);
Daniel Drowna45056e2012-03-23 10:42:54 -0500327 }
328}
329
330/* function: event_loop
331 * reads packets from the tun network interface and passes them down the stack
332 * tunnel - tun device data
333 */
334void event_loop(const struct tun_data *tunnel) {
335 time_t last_interface_poll;
336 struct pollfd wait_fd[2];
337
338 // start the poll timer
339 last_interface_poll = time(NULL);
340
341 wait_fd[0].fd = tunnel->fd6;
342 wait_fd[0].events = POLLIN;
343 wait_fd[0].revents = 0;
344 wait_fd[1].fd = tunnel->fd4;
345 wait_fd[1].events = POLLIN;
346 wait_fd[1].revents = 0;
347
348 while(running) {
349 if(poll(wait_fd, 2, NO_TRAFFIC_INTERFACE_POLL_FREQUENCY*1000) == -1) {
350 if(errno != EINTR) {
351 logmsg(ANDROID_LOG_WARN,"event_loop/poll returned an error: %s",strerror(errno));
352 }
353 } else {
354 int i;
355 for(i = 0; i < 2; i++) {
356 if((wait_fd[i].revents & POLLIN) != 0) {
357 read_packet(wait_fd[i].fd,tunnel);
358 }
359 }
360 }
361
362 time_t now = time(NULL);
363 if(last_interface_poll < (now - INTERFACE_POLL_FREQUENCY)) {
364 interface_poll(tunnel);
365 last_interface_poll = now;
366 }
367 }
368}
369
370/* function: print_help
371 * in case the user is running this on the command line
372 */
373void print_help() {
374 printf("android-clat arguments:\n");
375 printf("-i [uplink interface]\n");
376 printf("-p [plat prefix]\n");
377}
378
379/* function: main
380 * allocate and setup the tun device, then run the event loop
381 */
382int main(int argc, char **argv) {
383 struct tun_data tunnel;
384 int opt;
385 char *uplink_interface = NULL, *plat_prefix = NULL;
386
387 strcpy(tunnel.device6, DEVICENAME6);
388 strcpy(tunnel.device4, DEVICENAME4);
389
390 while((opt = getopt(argc, argv, "i:p:h")) != -1) {
391 switch(opt) {
392 case 'i':
393 uplink_interface = optarg;
394 break;
395 case 'p':
396 plat_prefix = optarg;
397 break;
398 case 'h':
399 default:
400 print_help();
401 exit(1);
402 break;
403 }
404 }
405
406 if(uplink_interface == NULL) {
Lorenzo Colittid9084182013-03-22 00:42:21 +0900407 logmsg(ANDROID_LOG_FATAL, "clatd called without an interface");
Daniel Drowna45056e2012-03-23 10:42:54 -0500408 printf("I need an interface\n");
409 exit(1);
410 }
Lorenzo Colittid9084182013-03-22 00:42:21 +0900411 logmsg(ANDROID_LOG_INFO, "Starting clat version %s on %s", CLATD_VERSION, uplink_interface);
Daniel Drowna45056e2012-03-23 10:42:54 -0500412
413 // open the tunnel device before dropping privs
414 tunnel.fd6 = tun_open();
415 if(tunnel.fd6 < 0) {
JP Abgrall4e0dd832013-12-20 14:51:26 -0800416 logmsg(ANDROID_LOG_FATAL, "tun_open6 failed: %s", strerror(errno));
Daniel Drowna45056e2012-03-23 10:42:54 -0500417 exit(1);
418 }
419
420 tunnel.fd4 = tun_open();
421 if(tunnel.fd4 < 0) {
Lorenzo Colittid9084182013-03-22 00:42:21 +0900422 logmsg(ANDROID_LOG_FATAL, "tun_open4 failed: %s", strerror(errno));
Daniel Drowna45056e2012-03-23 10:42:54 -0500423 exit(1);
424 }
425
426 // open the forwarding configuration before dropping privs
427 forwarding_fd = open("/proc/sys/net/ipv6/conf/all/forwarding", O_RDWR);
428 if(forwarding_fd < 0) {
Lorenzo Colittid9084182013-03-22 00:42:21 +0900429 logmsg(ANDROID_LOG_FATAL,"open /proc/sys/net/ipv6/conf/all/forwarding failed: %s",
430 strerror(errno));
Daniel Drowna45056e2012-03-23 10:42:54 -0500431 exit(1);
432 }
433
Daniel Drowna45056e2012-03-23 10:42:54 -0500434 // run under a regular user
435 drop_root();
436
Lorenzo Colittibaf62992013-03-01 20:29:39 +0900437 // When run from netd, the environment variable ANDROID_DNS_MODE is set to
438 // "local", but that only works for the netd process itself.
439 unsetenv("ANDROID_DNS_MODE");
Daniel Drowna45056e2012-03-23 10:42:54 -0500440
441 configure_interface(uplink_interface, plat_prefix, &tunnel);
442
Daniel Drowna45056e2012-03-23 10:42:54 -0500443 set_forwarding(forwarding_fd,"1\n");
444
Lorenzo Colittibaf62992013-03-01 20:29:39 +0900445 // Loop until someone sends us a signal or brings down the tun interface.
446 if(signal(SIGTERM, stop_loop) == SIG_ERR) {
447 logmsg(ANDROID_LOG_FATAL, "sigterm handler failed: %s", strerror(errno));
448 exit(1);
449 }
450 event_loop(&tunnel);
Daniel Drowna45056e2012-03-23 10:42:54 -0500451
452 set_forwarding(forwarding_fd,"0\n");
Lorenzo Colittibaf62992013-03-01 20:29:39 +0900453 logmsg(ANDROID_LOG_INFO,"Shutting down clat on %s", uplink_interface);
Daniel Drowna45056e2012-03-23 10:42:54 -0500454
455 return 0;
456}