blob: ca3e4c68a5b3c7185894af92810facd6c58719a0 [file] [log] [blame]
Daniel Drowna45056e2012-03-23 10:42:54 -05001/*
2 * Copyright 2011 Daniel Drown
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 *
16 * ipv6.c - takes ipv6 packets, finds their headers, and then calls translation functions on them
17 */
18#include <string.h>
19
Lorenzo Colittid9084182013-03-22 00:42:21 +090020#include <arpa/inet.h>
Daniel Drowna45056e2012-03-23 10:42:54 -050021
Lorenzo Colitti98de5952019-01-20 11:45:03 +090022#include "netutils/checksum.h"
23
Daniel Drowna45056e2012-03-23 10:42:54 -050024#include "config.h"
25#include "debug.h"
junyulaic4e591a2018-11-26 22:36:10 +090026#include "dump.h"
27#include "logging.h"
28#include "translate.h"
Daniel Drowna45056e2012-03-23 10:42:54 -050029
30/* function: icmp6_packet
31 * takes an icmp6 packet and sets it up for translation
Lorenzo Colittid9084182013-03-22 00:42:21 +090032 * out - output packet
33 * icmp6 - pointer to icmp6 header in packet
34 * checksum - pseudo-header checksum (unused)
35 * len - size of ip payload
36 * returns: the highest position in the output clat_packet that's filled in
Daniel Drowna45056e2012-03-23 10:42:54 -050037 */
Lorenzo Colittia4454bf2014-02-25 09:27:31 +090038int icmp6_packet(clat_packet out, clat_packet_index pos, const struct icmp6_hdr *icmp6,
39 size_t len) {
Brian Carlstromfcac4102014-02-24 20:03:01 -080040 const uint8_t *payload;
Daniel Drowna45056e2012-03-23 10:42:54 -050041 size_t payload_size;
42
junyulaic4e591a2018-11-26 22:36:10 +090043 if (len < sizeof(struct icmp6_hdr)) {
Lorenzo Colittid9084182013-03-22 00:42:21 +090044 logmsg_dbg(ANDROID_LOG_ERROR, "icmp6_packet/(too small)");
45 return 0;
Daniel Drowna45056e2012-03-23 10:42:54 -050046 }
47
junyulaic4e591a2018-11-26 22:36:10 +090048 payload = (const uint8_t *)(icmp6 + 1);
Lorenzo Colittid9084182013-03-22 00:42:21 +090049 payload_size = len - sizeof(struct icmp6_hdr);
Daniel Drowna45056e2012-03-23 10:42:54 -050050
Lorenzo Colitti9477a462013-11-18 15:56:02 +090051 return icmp6_to_icmp(out, pos, icmp6, payload, payload_size);
Daniel Drowna45056e2012-03-23 10:42:54 -050052}
53
54/* function: log_bad_address
55 * logs a bad address to android's log buffer if debugging is turned on
56 * fmt - printf-style format, use %s to place the address
57 * badaddr - the bad address in question
58 */
Daniel Drowna45056e2012-03-23 10:42:54 -050059#if CLAT_DEBUG
Lorenzo Colitti9477a462013-11-18 15:56:02 +090060void log_bad_address(const char *fmt, const struct in6_addr *src, const struct in6_addr *dst) {
Lorenzo Colitticd70b352013-04-10 12:24:56 +090061 char srcstr[INET6_ADDRSTRLEN];
62 char dststr[INET6_ADDRSTRLEN];
Daniel Drowna45056e2012-03-23 10:42:54 -050063
Lorenzo Colitticd70b352013-04-10 12:24:56 +090064 inet_ntop(AF_INET6, src, srcstr, sizeof(srcstr));
65 inet_ntop(AF_INET6, dst, dststr, sizeof(dststr));
66 logmsg_dbg(ANDROID_LOG_ERROR, fmt, srcstr, dststr);
Daniel Drowna45056e2012-03-23 10:42:54 -050067}
Lorenzo Colitti9477a462013-11-18 15:56:02 +090068#else
69#define log_bad_address(fmt, src, dst)
70#endif
Daniel Drowna45056e2012-03-23 10:42:54 -050071
72/* function: ipv6_packet
73 * takes an ipv6 packet and hands it off to the layer 4 protocol function
Lorenzo Colittid9084182013-03-22 00:42:21 +090074 * out - output packet
Daniel Drowna45056e2012-03-23 10:42:54 -050075 * packet - packet data
76 * len - size of packet
Lorenzo Colittid9084182013-03-22 00:42:21 +090077 * returns: the highest position in the output clat_packet that's filled in
Daniel Drowna45056e2012-03-23 10:42:54 -050078 */
Lorenzo Colittia4454bf2014-02-25 09:27:31 +090079int ipv6_packet(clat_packet out, clat_packet_index pos, const uint8_t *packet, size_t len) {
junyulaic4e591a2018-11-26 22:36:10 +090080 const struct ip6_hdr *ip6 = (struct ip6_hdr *)packet;
81 struct iphdr *ip_targ = (struct iphdr *)out[pos].iov_base;
Lorenzo Colitti57d480d2014-02-09 10:35:38 +090082 struct ip6_frag *frag_hdr = NULL;
Lorenzo Colittid9084182013-03-22 00:42:21 +090083 uint8_t protocol;
Brian Carlstromfcac4102014-02-24 20:03:01 -080084 const uint8_t *next_header;
Daniel Drowna45056e2012-03-23 10:42:54 -050085 size_t len_left;
Lorenzo Colitti5a50c022014-02-10 09:20:05 +090086 uint32_t old_sum, new_sum;
Lorenzo Colittid9084182013-03-22 00:42:21 +090087 int iov_len;
Daniel Drowna45056e2012-03-23 10:42:54 -050088
junyulaic4e591a2018-11-26 22:36:10 +090089 if (len < sizeof(struct ip6_hdr)) {
Lorenzo Colitticd70b352013-04-10 12:24:56 +090090 logmsg_dbg(ANDROID_LOG_ERROR, "ipv6_packet/too short for an ip6 header: %d", len);
Lorenzo Colittid9084182013-03-22 00:42:21 +090091 return 0;
Daniel Drowna45056e2012-03-23 10:42:54 -050092 }
93
junyulaic4e591a2018-11-26 22:36:10 +090094 if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst)) {
Lorenzo Colitticd70b352013-04-10 12:24:56 +090095 log_bad_address("ipv6_packet/multicast %s->%s", &ip6->ip6_src, &ip6->ip6_dst);
junyulaic4e591a2018-11-26 22:36:10 +090096 return 0; // silently ignore
Daniel Drowna45056e2012-03-23 10:42:54 -050097 }
98
Lorenzo Colitticd70b352013-04-10 12:24:56 +090099 // If the packet is not from the plat subnet to the local subnet, or vice versa, drop it, unless
100 // it's an ICMP packet (which can come from anywhere). We do not send IPv6 packets from the plat
101 // subnet to the local subnet, but these can appear as inner packets in ICMP errors, so we need
102 // to translate them. We accept third-party ICMPv6 errors, even though their source addresses
103 // cannot be translated, so that things like unreachables and traceroute will work. fill_ip_header
104 // takes care of faking a source address for them.
105 if (!(is_in_plat_subnet(&ip6->ip6_src) &&
106 IN6_ARE_ADDR_EQUAL(&ip6->ip6_dst, &Global_Clatd_Config.ipv6_local_subnet)) &&
107 !(is_in_plat_subnet(&ip6->ip6_dst) &&
108 IN6_ARE_ADDR_EQUAL(&ip6->ip6_src, &Global_Clatd_Config.ipv6_local_subnet)) &&
109 ip6->ip6_nxt != IPPROTO_ICMPV6) {
110 log_bad_address("ipv6_packet/wrong source address: %s->%s", &ip6->ip6_src, &ip6->ip6_dst);
Lorenzo Colittid9084182013-03-22 00:42:21 +0900111 return 0;
Daniel Drowna45056e2012-03-23 10:42:54 -0500112 }
113
Lorenzo Colittid9084182013-03-22 00:42:21 +0900114 next_header = packet + sizeof(struct ip6_hdr);
junyulaic4e591a2018-11-26 22:36:10 +0900115 len_left = len - sizeof(struct ip6_hdr);
Lorenzo Colittid9084182013-03-22 00:42:21 +0900116
117 protocol = ip6->ip6_nxt;
Lorenzo Colittid9084182013-03-22 00:42:21 +0900118
119 /* Fill in the IPv4 header. We need to do this before we translate the packet because TCP and
120 * UDP include parts of the IP header in the checksum. Set the length to zero because we don't
121 * know it yet.
122 */
123 fill_ip_header(ip_targ, 0, protocol, ip6);
124 out[pos].iov_len = sizeof(struct iphdr);
125
Lorenzo Colitti57d480d2014-02-09 10:35:38 +0900126 // If there's a Fragment header, parse it and decide what the next header is.
127 // Do this before calculating the pseudo-header checksum because it updates the next header value.
128 if (protocol == IPPROTO_FRAGMENT) {
junyulaic4e591a2018-11-26 22:36:10 +0900129 frag_hdr = (struct ip6_frag *)next_header;
Lorenzo Colitti57d480d2014-02-09 10:35:38 +0900130 if (len_left < sizeof(*frag_hdr)) {
131 logmsg_dbg(ANDROID_LOG_ERROR, "ipv6_packet/too short for fragment header: %d", len);
132 return 0;
133 }
134
135 next_header += sizeof(*frag_hdr);
136 len_left -= sizeof(*frag_hdr);
137
138 protocol = parse_frag_header(frag_hdr, ip_targ);
139 }
140
141 // ICMP and ICMPv6 have different protocol numbers.
142 if (protocol == IPPROTO_ICMPV6) {
junyulaic4e591a2018-11-26 22:36:10 +0900143 protocol = IPPROTO_ICMP;
Lorenzo Colitti57d480d2014-02-09 10:35:38 +0900144 ip_targ->protocol = IPPROTO_ICMP;
145 }
146
147 /* Calculate the pseudo-header checksum.
148 * Technically, the length that is used in the pseudo-header checksum is the transport layer
149 * length, which is not the same as len_left in the case of fragmented packets. But since
150 * translation does not change the transport layer length, the checksum is unaffected.
151 */
Lorenzo Colitti07f02652014-02-20 14:28:43 +0900152 old_sum = ipv6_pseudo_header_checksum(ip6, len_left, protocol);
153 new_sum = ipv4_pseudo_header_checksum(ip_targ, len_left);
Lorenzo Colittid9084182013-03-22 00:42:21 +0900154
Lorenzo Colitti57d480d2014-02-09 10:35:38 +0900155 // Does not support IPv6 extension headers except Fragment.
156 if (frag_hdr && (frag_hdr->ip6f_offlg & IP6F_OFF_MASK)) {
157 iov_len = generic_packet(out, pos + 2, next_header, len_left);
158 } else if (protocol == IPPROTO_ICMP) {
junyulaic4e591a2018-11-26 22:36:10 +0900159 iov_len = icmp6_packet(out, pos + 2, (const struct icmp6_hdr *)next_header, len_left);
Lorenzo Colitti57d480d2014-02-09 10:35:38 +0900160 } else if (protocol == IPPROTO_TCP) {
junyulaic4e591a2018-11-26 22:36:10 +0900161 iov_len =
162 tcp_packet(out, pos + 2, (const struct tcphdr *)next_header, old_sum, new_sum, len_left);
Lorenzo Colitti57d480d2014-02-09 10:35:38 +0900163 } else if (protocol == IPPROTO_UDP) {
junyulaic4e591a2018-11-26 22:36:10 +0900164 iov_len =
165 udp_packet(out, pos + 2, (const struct udphdr *)next_header, old_sum, new_sum, len_left);
Maciej Żenczykowski5f689822019-08-20 17:48:48 -0700166 } else if (protocol == IPPROTO_GRE || protocol == IPPROTO_ESP) {
Lorenzo Colitti57d480d2014-02-09 10:35:38 +0900167 iov_len = generic_packet(out, pos + 2, next_header, len_left);
Daniel Drowna45056e2012-03-23 10:42:54 -0500168 } else {
169#if CLAT_DEBUG
Lorenzo Colitticd70b352013-04-10 12:24:56 +0900170 logmsg(ANDROID_LOG_ERROR, "ipv6_packet/unknown next header type: %x", ip6->ip6_nxt);
Daniel Drowna45056e2012-03-23 10:42:54 -0500171 logcat_hexdump("ipv6/nxthdr", packet, len);
172#endif
Lorenzo Colittid9084182013-03-22 00:42:21 +0900173 return 0;
Daniel Drowna45056e2012-03-23 10:42:54 -0500174 }
Lorenzo Colittid9084182013-03-22 00:42:21 +0900175
176 // Set the length and calculate the checksum.
Lorenzo Colittiee80ca62013-04-10 16:52:22 +0900177 ip_targ->tot_len = htons(ntohs(ip_targ->tot_len) + packet_length(out, pos));
junyulaic4e591a2018-11-26 22:36:10 +0900178 ip_targ->check = ip_checksum(ip_targ, sizeof(struct iphdr));
Lorenzo Colittid9084182013-03-22 00:42:21 +0900179 return iov_len;
Daniel Drowna45056e2012-03-23 10:42:54 -0500180}