blob: 9c5c74a444c412c3bbd06d10d40a1e5572b4adfd [file] [log] [blame]
Daniel Drowna45056e2012-03-23 10:42:54 -05001/*
2 * Copyright 2011 Daniel Drown
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 *
16 * translate.c - CLAT functions / partial implementation of rfc6145
17 */
18#include <string.h>
Daniel Drowna45056e2012-03-23 10:42:54 -050019
Lorenzo Colitti98de5952019-01-20 11:45:03 +090020#include "netutils/checksum.h"
21
Daniel Drowna45056e2012-03-23 10:42:54 -050022#include "clatd.h"
Lorenzo Colittieb92f482019-01-04 14:59:11 +090023#include "common.h"
Daniel Drowna45056e2012-03-23 10:42:54 -050024#include "config.h"
Daniel Drowna45056e2012-03-23 10:42:54 -050025#include "debug.h"
junyulaic4e591a2018-11-26 22:36:10 +090026#include "icmp.h"
27#include "logging.h"
28#include "translate.h"
Daniel Drowna45056e2012-03-23 10:42:54 -050029
Lorenzo Colittiee80ca62013-04-10 16:52:22 +090030/* function: packet_checksum
31 * calculates the checksum over all the packet components starting from pos
32 * checksum - checksum of packet components before pos
33 * packet - packet to calculate the checksum of
34 * pos - position to start counting from
35 * returns - the completed 16-bit checksum, ready to write into a checksum header field
36 */
Lorenzo Colittia4454bf2014-02-25 09:27:31 +090037uint16_t packet_checksum(uint32_t checksum, clat_packet packet, clat_packet_index pos) {
Lorenzo Colittiee80ca62013-04-10 16:52:22 +090038 int i;
39 for (i = pos; i < CLAT_POS_MAX; i++) {
40 if (packet[i].iov_len > 0) {
41 checksum = ip_checksum_add(checksum, packet[i].iov_base, packet[i].iov_len);
42 }
43 }
44 return ip_checksum_finish(checksum);
45}
46
47/* function: packet_length
48 * returns the total length of all the packet components after pos
Lorenzo Colittid9084182013-03-22 00:42:21 +090049 * packet - packet to calculate the length of
Lorenzo Colitticd70b352013-04-10 12:24:56 +090050 * pos - position to start counting after
Lorenzo Colittid9084182013-03-22 00:42:21 +090051 * returns: the total length of the packet components after pos
52 */
Lorenzo Colittia4454bf2014-02-25 09:27:31 +090053uint16_t packet_length(clat_packet packet, clat_packet_index pos) {
Lorenzo Colittid9084182013-03-22 00:42:21 +090054 size_t len = 0;
55 int i;
Lorenzo Colittiee80ca62013-04-10 16:52:22 +090056 for (i = pos + 1; i < CLAT_POS_MAX; i++) {
Lorenzo Colittid9084182013-03-22 00:42:21 +090057 len += packet[i].iov_len;
58 }
59 return len;
60}
61
Lorenzo Colittiee80ca62013-04-10 16:52:22 +090062/* function: is_in_plat_subnet
63 * returns true iff the given IPv6 address is in the plat subnet.
64 * addr - IPv6 address
65 */
66int is_in_plat_subnet(const struct in6_addr *addr6) {
67 // Assumes a /96 plat subnet.
68 return (addr6 != NULL) && (memcmp(addr6, &Global_Clatd_Config.plat_subnet, 12) == 0);
69}
70
71/* function: ipv6_addr_to_ipv4_addr
72 * return the corresponding ipv4 address for the given ipv6 address
73 * addr6 - ipv6 address
74 * returns: the IPv4 address
75 */
76uint32_t ipv6_addr_to_ipv4_addr(const struct in6_addr *addr6) {
Lorenzo Colittiee80ca62013-04-10 16:52:22 +090077 if (is_in_plat_subnet(addr6)) {
78 // Assumes a /96 plat subnet.
79 return addr6->s6_addr32[3];
Lorenzo Colitticd70b352013-04-10 12:24:56 +090080 } else if (IN6_ARE_ADDR_EQUAL(addr6, &Global_Clatd_Config.ipv6_local_subnet)) {
81 // Special-case our own address.
Lorenzo Colittiee80ca62013-04-10 16:52:22 +090082 return Global_Clatd_Config.ipv4_local_subnet.s_addr;
Lorenzo Colitticd70b352013-04-10 12:24:56 +090083 } else {
84 // Third party packet. Let the caller deal with it.
85 return INADDR_NONE;
Lorenzo Colittiee80ca62013-04-10 16:52:22 +090086 }
87}
88
89/* function: ipv4_addr_to_ipv6_addr
90 * return the corresponding ipv6 address for the given ipv4 address
91 * addr4 - ipv4 address
92 */
93struct in6_addr ipv4_addr_to_ipv6_addr(uint32_t addr4) {
94 struct in6_addr addr6;
95 // Both addresses are in network byte order (addr4 comes from a network packet, and the config
96 // file entry is read using inet_ntop).
97 if (addr4 == Global_Clatd_Config.ipv4_local_subnet.s_addr) {
98 return Global_Clatd_Config.ipv6_local_subnet;
99 } else {
100 // Assumes a /96 plat subnet.
junyulaic4e591a2018-11-26 22:36:10 +0900101 addr6 = Global_Clatd_Config.plat_subnet;
Lorenzo Colittiee80ca62013-04-10 16:52:22 +0900102 addr6.s6_addr32[3] = addr4;
103 return addr6;
104 }
105}
106
Daniel Drowna45056e2012-03-23 10:42:54 -0500107/* function: fill_tun_header
108 * fill in the header for the tun fd
109 * tun_header - tunnel header, already allocated
110 * proto - ethernet protocol id: ETH_P_IP(ipv4) or ETH_P_IPV6(ipv6)
111 */
Subash Abhinov Kasiviswanathan5c5b5342015-10-26 18:45:04 -0600112void fill_tun_header(struct tun_pi *tun_header, uint16_t proto, uint16_t skip_csum) {
113 tun_header->flags = htons(skip_csum);
Daniel Drowna45056e2012-03-23 10:42:54 -0500114 tun_header->proto = htons(proto);
115}
116
Daniel Drowna45056e2012-03-23 10:42:54 -0500117/* function: fill_ip_header
Lorenzo Colittid9084182013-03-22 00:42:21 +0900118 * generate an ipv4 header from an ipv6 header
119 * ip_targ - (ipv4) target packet header, source: original ipv4 addr, dest: local subnet addr
Daniel Drowna45056e2012-03-23 10:42:54 -0500120 * payload_len - length of other data inside packet
121 * protocol - protocol number (tcp, udp, etc)
Lorenzo Colittid9084182013-03-22 00:42:21 +0900122 * old_header - (ipv6) source packet header, source: nat64 prefix, dest: local subnet prefix
Daniel Drowna45056e2012-03-23 10:42:54 -0500123 */
Lorenzo Colittid9084182013-03-22 00:42:21 +0900124void fill_ip_header(struct iphdr *ip, uint16_t payload_len, uint8_t protocol,
125 const struct ip6_hdr *old_header) {
Lorenzo Colitticd70b352013-04-10 12:24:56 +0900126 int ttl_guess;
Lorenzo Colittid9084182013-03-22 00:42:21 +0900127 memset(ip, 0, sizeof(struct iphdr));
Daniel Drowna45056e2012-03-23 10:42:54 -0500128
junyulaic4e591a2018-11-26 22:36:10 +0900129 ip->ihl = 5;
130 ip->version = 4;
131 ip->tos = 0;
132 ip->tot_len = htons(sizeof(struct iphdr) + payload_len);
133 ip->id = 0;
Lorenzo Colittid9084182013-03-22 00:42:21 +0900134 ip->frag_off = htons(IP_DF);
junyulaic4e591a2018-11-26 22:36:10 +0900135 ip->ttl = old_header->ip6_hlim;
Lorenzo Colittid9084182013-03-22 00:42:21 +0900136 ip->protocol = protocol;
junyulaic4e591a2018-11-26 22:36:10 +0900137 ip->check = 0;
Daniel Drowna45056e2012-03-23 10:42:54 -0500138
Lorenzo Colittiee80ca62013-04-10 16:52:22 +0900139 ip->saddr = ipv6_addr_to_ipv4_addr(&old_header->ip6_src);
140 ip->daddr = ipv6_addr_to_ipv4_addr(&old_header->ip6_dst);
Lorenzo Colitticd70b352013-04-10 12:24:56 +0900141
142 // Third-party ICMPv6 message. This may have been originated by an native IPv6 address.
143 // In that case, the source IPv6 address can't be translated and we need to make up an IPv4
144 // source address. For now, use 255.0.0.<ttl>, which at least looks useful in traceroute.
junyulaic4e591a2018-11-26 22:36:10 +0900145 if ((uint32_t)ip->saddr == INADDR_NONE) {
Lorenzo Colitticd70b352013-04-10 12:24:56 +0900146 ttl_guess = icmp_guess_ttl(old_header->ip6_hlim);
147 ip->saddr = htonl((0xff << 24) + ttl_guess);
148 }
Daniel Drowna45056e2012-03-23 10:42:54 -0500149}
150
151/* function: fill_ip6_header
Lorenzo Colittid9084182013-03-22 00:42:21 +0900152 * generate an ipv6 header from an ipv4 header
153 * ip6 - (ipv6) target packet header, source: local subnet prefix, dest: nat64 prefix
Daniel Drowna45056e2012-03-23 10:42:54 -0500154 * payload_len - length of other data inside packet
155 * protocol - protocol number (tcp, udp, etc)
Lorenzo Colittid9084182013-03-22 00:42:21 +0900156 * old_header - (ipv4) source packet header, source: local subnet addr, dest: internet's ipv4 addr
Daniel Drowna45056e2012-03-23 10:42:54 -0500157 */
Lorenzo Colittid9084182013-03-22 00:42:21 +0900158void fill_ip6_header(struct ip6_hdr *ip6, uint16_t payload_len, uint8_t protocol,
159 const struct iphdr *old_header) {
Daniel Drowna45056e2012-03-23 10:42:54 -0500160 memset(ip6, 0, sizeof(struct ip6_hdr));
161
junyulaic4e591a2018-11-26 22:36:10 +0900162 ip6->ip6_vfc = 6 << 4;
Daniel Drowna45056e2012-03-23 10:42:54 -0500163 ip6->ip6_plen = htons(payload_len);
junyulaic4e591a2018-11-26 22:36:10 +0900164 ip6->ip6_nxt = protocol;
Daniel Drowna45056e2012-03-23 10:42:54 -0500165 ip6->ip6_hlim = old_header->ttl;
166
Lorenzo Colittiee80ca62013-04-10 16:52:22 +0900167 ip6->ip6_src = ipv4_addr_to_ipv6_addr(old_header->saddr);
168 ip6->ip6_dst = ipv4_addr_to_ipv6_addr(old_header->daddr);
Daniel Drowna45056e2012-03-23 10:42:54 -0500169}
170
Lorenzo Colitti57d480d2014-02-09 10:35:38 +0900171/* function: maybe_fill_frag_header
172 * fills a fragmentation header
173 * generate an ipv6 fragment header from an ipv4 header
174 * frag_hdr - target (ipv6) fragmentation header
175 * ip6_targ - target (ipv6) header
176 * old_header - (ipv4) source packet header
177 * returns: the length of the fragmentation header if present, or zero if not present
178 */
179size_t maybe_fill_frag_header(struct ip6_frag *frag_hdr, struct ip6_hdr *ip6_targ,
180 const struct iphdr *old_header) {
181 uint16_t frag_flags = ntohs(old_header->frag_off);
junyulaic4e591a2018-11-26 22:36:10 +0900182 uint16_t frag_off = frag_flags & IP_OFFMASK;
Lorenzo Colitti57d480d2014-02-09 10:35:38 +0900183 if (frag_off == 0 && (frag_flags & IP_MF) == 0) {
184 // Not a fragment.
185 return 0;
186 }
187
junyulaic4e591a2018-11-26 22:36:10 +0900188 frag_hdr->ip6f_nxt = ip6_targ->ip6_nxt;
Lorenzo Colitti57d480d2014-02-09 10:35:38 +0900189 frag_hdr->ip6f_reserved = 0;
190 // In IPv4, the offset is the bottom 13 bits; in IPv6 it's the top 13 bits.
191 frag_hdr->ip6f_offlg = htons(frag_off << 3);
192 if (frag_flags & IP_MF) {
193 frag_hdr->ip6f_offlg |= IP6F_MORE_FRAG;
194 }
195 frag_hdr->ip6f_ident = htonl(ntohs(old_header->id));
junyulaic4e591a2018-11-26 22:36:10 +0900196 ip6_targ->ip6_nxt = IPPROTO_FRAGMENT;
Lorenzo Colitti57d480d2014-02-09 10:35:38 +0900197
198 return sizeof(*frag_hdr);
199}
200
201/* function: parse_frag_header
202 * return the length of the fragmentation header if present, or zero if not present
203 * generate an ipv6 fragment header from an ipv4 header
204 * frag_hdr - (ipv6) fragmentation header
205 * ip_targ - target (ipv4) header
206 * returns: the next header value
207 */
208uint8_t parse_frag_header(const struct ip6_frag *frag_hdr, struct iphdr *ip_targ) {
209 uint16_t frag_off = (ntohs(frag_hdr->ip6f_offlg & IP6F_OFF_MASK) >> 3);
210 if (frag_hdr->ip6f_offlg & IP6F_MORE_FRAG) {
211 frag_off |= IP_MF;
212 }
213 ip_targ->frag_off = htons(frag_off);
junyulaic4e591a2018-11-26 22:36:10 +0900214 ip_targ->id = htons(ntohl(frag_hdr->ip6f_ident) & 0xffff);
Lorenzo Colitti57d480d2014-02-09 10:35:38 +0900215 ip_targ->protocol = frag_hdr->ip6f_nxt;
216 return frag_hdr->ip6f_nxt;
217}
Lorenzo Colittif9390602014-02-13 12:53:35 +0900218
Daniel Drowna45056e2012-03-23 10:42:54 -0500219/* function: icmp_to_icmp6
Lorenzo Colitticd70b352013-04-10 12:24:56 +0900220 * translate ipv4 icmp to ipv6 icmp
Lorenzo Colittid9084182013-03-22 00:42:21 +0900221 * out - output packet
Daniel Drowna45056e2012-03-23 10:42:54 -0500222 * icmp - source packet icmp header
Lorenzo Colittid9084182013-03-22 00:42:21 +0900223 * checksum - pseudo-header checksum
Daniel Drowna45056e2012-03-23 10:42:54 -0500224 * payload - icmp payload
225 * payload_size - size of payload
Lorenzo Colittid9084182013-03-22 00:42:21 +0900226 * returns: the highest position in the output clat_packet that's filled in
Daniel Drowna45056e2012-03-23 10:42:54 -0500227 */
Lorenzo Colittia4454bf2014-02-25 09:27:31 +0900228int icmp_to_icmp6(clat_packet out, clat_packet_index pos, const struct icmphdr *icmp,
229 uint32_t checksum, const uint8_t *payload, size_t payload_size) {
Lorenzo Colittid9084182013-03-22 00:42:21 +0900230 struct icmp6_hdr *icmp6_targ = out[pos].iov_base;
Lorenzo Colitticd70b352013-04-10 12:24:56 +0900231 uint8_t icmp6_type;
232 int clat_packet_len;
Daniel Drowna45056e2012-03-23 10:42:54 -0500233
Lorenzo Colittid9084182013-03-22 00:42:21 +0900234 memset(icmp6_targ, 0, sizeof(struct icmp6_hdr));
Lorenzo Colitticd70b352013-04-10 12:24:56 +0900235
junyulaic4e591a2018-11-26 22:36:10 +0900236 icmp6_type = icmp_to_icmp6_type(icmp->type, icmp->code);
Lorenzo Colitticd70b352013-04-10 12:24:56 +0900237 icmp6_targ->icmp6_type = icmp6_type;
238 icmp6_targ->icmp6_code = icmp_to_icmp6_code(icmp->type, icmp->code);
Daniel Drowna45056e2012-03-23 10:42:54 -0500239
Lorenzo Colittid9084182013-03-22 00:42:21 +0900240 out[pos].iov_len = sizeof(struct icmp6_hdr);
Lorenzo Colitticd70b352013-04-10 12:24:56 +0900241
junyulaic4e591a2018-11-26 22:36:10 +0900242 if (pos == CLAT_POS_TRANSPORTHDR && is_icmp_error(icmp->type) && icmp6_type != ICMP6_PARAM_PROB) {
Lorenzo Colitticd70b352013-04-10 12:24:56 +0900243 // An ICMP error we understand, one level deep.
244 // Translate the nested packet (the one that caused the error).
245 clat_packet_len = ipv4_packet(out, pos + 1, payload, payload_size);
246
247 // The pseudo-header checksum was calculated on the transport length of the original IPv4
248 // packet that we were asked to translate. This transport length is 20 bytes smaller than it
249 // needs to be, because the ICMP error contains an IPv4 header, which we will be translating to
Lorenzo Colitti5a50c022014-02-10 09:20:05 +0900250 // an IPv6 header, which is 20 bytes longer. Fix it up here.
Lorenzo Colitticd70b352013-04-10 12:24:56 +0900251 // We only need to do this for ICMP->ICMPv6, not ICMPv6->ICMP, because ICMP does not use the
252 // pseudo-header when calculating its checksum (as the IPv4 header has its own checksum).
Lorenzo Colitti5a50c022014-02-10 09:20:05 +0900253 checksum = checksum + htons(20);
Lorenzo Colitticd70b352013-04-10 12:24:56 +0900254 } else if (icmp6_type == ICMP6_ECHO_REQUEST || icmp6_type == ICMP6_ECHO_REPLY) {
255 // Ping packet.
junyulaic4e591a2018-11-26 22:36:10 +0900256 icmp6_targ->icmp6_id = icmp->un.echo.id;
257 icmp6_targ->icmp6_seq = icmp->un.echo.sequence;
258 out[CLAT_POS_PAYLOAD].iov_base = (uint8_t *)payload;
259 out[CLAT_POS_PAYLOAD].iov_len = payload_size;
260 clat_packet_len = CLAT_POS_PAYLOAD + 1;
Lorenzo Colitticd70b352013-04-10 12:24:56 +0900261 } else {
262 // Unknown type/code. The type/code conversion functions have already logged an error.
263 return 0;
264 }
Daniel Drowna45056e2012-03-23 10:42:54 -0500265
Lorenzo Colittiee80ca62013-04-10 16:52:22 +0900266 icmp6_targ->icmp6_cksum = 0; // Checksum field must be 0 when calculating checksum.
267 icmp6_targ->icmp6_cksum = packet_checksum(checksum, out, pos);
268
Lorenzo Colitticd70b352013-04-10 12:24:56 +0900269 return clat_packet_len;
Daniel Drowna45056e2012-03-23 10:42:54 -0500270}
271
272/* function: icmp6_to_icmp
Lorenzo Colitticd70b352013-04-10 12:24:56 +0900273 * translate ipv6 icmp to ipv4 icmp
Lorenzo Colittid9084182013-03-22 00:42:21 +0900274 * out - output packet
Daniel Drowna45056e2012-03-23 10:42:54 -0500275 * icmp6 - source packet icmp6 header
276 * payload - icmp6 payload
277 * payload_size - size of payload
Lorenzo Colittid9084182013-03-22 00:42:21 +0900278 * returns: the highest position in the output clat_packet that's filled in
Daniel Drowna45056e2012-03-23 10:42:54 -0500279 */
Lorenzo Colittia4454bf2014-02-25 09:27:31 +0900280int icmp6_to_icmp(clat_packet out, clat_packet_index pos, const struct icmp6_hdr *icmp6,
Brian Carlstromfcac4102014-02-24 20:03:01 -0800281 const uint8_t *payload, size_t payload_size) {
Lorenzo Colittid9084182013-03-22 00:42:21 +0900282 struct icmphdr *icmp_targ = out[pos].iov_base;
Lorenzo Colitticd70b352013-04-10 12:24:56 +0900283 uint8_t icmp_type;
Lorenzo Colitticd70b352013-04-10 12:24:56 +0900284 int clat_packet_len;
Daniel Drowna45056e2012-03-23 10:42:54 -0500285
Lorenzo Colittid9084182013-03-22 00:42:21 +0900286 memset(icmp_targ, 0, sizeof(struct icmphdr));
Daniel Drowna45056e2012-03-23 10:42:54 -0500287
junyulaic4e591a2018-11-26 22:36:10 +0900288 icmp_type = icmp6_to_icmp_type(icmp6->icmp6_type, icmp6->icmp6_code);
Lorenzo Colitticd70b352013-04-10 12:24:56 +0900289 icmp_targ->type = icmp_type;
290 icmp_targ->code = icmp6_to_icmp_code(icmp6->icmp6_type, icmp6->icmp6_code);
Daniel Drowna45056e2012-03-23 10:42:54 -0500291
Lorenzo Colittid9084182013-03-22 00:42:21 +0900292 out[pos].iov_len = sizeof(struct icmphdr);
Lorenzo Colitticd70b352013-04-10 12:24:56 +0900293
junyulaic4e591a2018-11-26 22:36:10 +0900294 if (pos == CLAT_POS_TRANSPORTHDR && is_icmp6_error(icmp6->icmp6_type) &&
Lorenzo Colitticd70b352013-04-10 12:24:56 +0900295 icmp_type != ICMP_PARAMETERPROB) {
296 // An ICMPv6 error we understand, one level deep.
297 // Translate the nested packet (the one that caused the error).
298 clat_packet_len = ipv6_packet(out, pos + 1, payload, payload_size);
299 } else if (icmp_type == ICMP_ECHO || icmp_type == ICMP_ECHOREPLY) {
300 // Ping packet.
junyulaic4e591a2018-11-26 22:36:10 +0900301 icmp_targ->un.echo.id = icmp6->icmp6_id;
302 icmp_targ->un.echo.sequence = icmp6->icmp6_seq;
303 out[CLAT_POS_PAYLOAD].iov_base = (uint8_t *)payload;
304 out[CLAT_POS_PAYLOAD].iov_len = payload_size;
305 clat_packet_len = CLAT_POS_PAYLOAD + 1;
Lorenzo Colitticd70b352013-04-10 12:24:56 +0900306 } else {
junyulaic4e591a2018-11-26 22:36:10 +0900307 // Unknown type/code. The type/code conversion functions have already logged an error.
Lorenzo Colitticd70b352013-04-10 12:24:56 +0900308 return 0;
309 }
Daniel Drowna45056e2012-03-23 10:42:54 -0500310
Lorenzo Colittiee80ca62013-04-10 16:52:22 +0900311 icmp_targ->checksum = 0; // Checksum field must be 0 when calculating checksum.
312 icmp_targ->checksum = packet_checksum(0, out, pos);
313
Lorenzo Colitticd70b352013-04-10 12:24:56 +0900314 return clat_packet_len;
Lorenzo Colittid9084182013-03-22 00:42:21 +0900315}
Daniel Drowna45056e2012-03-23 10:42:54 -0500316
Lorenzo Colittic9f4c892013-11-18 12:59:44 +0900317/* function: generic_packet
318 * takes a generic IP packet and sets it up for translation
319 * out - output packet
320 * pos - position in the output packet of the transport header
321 * payload - pointer to IP payload
322 * len - size of ip payload
323 * returns: the highest position in the output clat_packet that's filled in
324 */
Lorenzo Colittia4454bf2014-02-25 09:27:31 +0900325int generic_packet(clat_packet out, clat_packet_index pos, const uint8_t *payload, size_t len) {
junyulaic4e591a2018-11-26 22:36:10 +0900326 out[pos].iov_len = 0;
327 out[CLAT_POS_PAYLOAD].iov_base = (uint8_t *)payload;
328 out[CLAT_POS_PAYLOAD].iov_len = len;
Lorenzo Colittic9f4c892013-11-18 12:59:44 +0900329
330 return CLAT_POS_PAYLOAD + 1;
331}
332
Lorenzo Colittid9084182013-03-22 00:42:21 +0900333/* function: udp_packet
334 * takes a udp packet and sets it up for translation
335 * out - output packet
336 * udp - pointer to udp header in packet
Lorenzo Colitti5a50c022014-02-10 09:20:05 +0900337 * old_sum - pseudo-header checksum of old header
338 * new_sum - pseudo-header checksum of new header
Lorenzo Colittid9084182013-03-22 00:42:21 +0900339 * len - size of ip payload
340 */
junyulaic4e591a2018-11-26 22:36:10 +0900341int udp_packet(clat_packet out, clat_packet_index pos, const struct udphdr *udp, uint32_t old_sum,
342 uint32_t new_sum, size_t len) {
Brian Carlstromfcac4102014-02-24 20:03:01 -0800343 const uint8_t *payload;
Lorenzo Colittid9084182013-03-22 00:42:21 +0900344 size_t payload_size;
345
junyulaic4e591a2018-11-26 22:36:10 +0900346 if (len < sizeof(struct udphdr)) {
347 logmsg_dbg(ANDROID_LOG_ERROR, "udp_packet/(too small)");
Lorenzo Colittid9084182013-03-22 00:42:21 +0900348 return 0;
349 }
350
junyulaic4e591a2018-11-26 22:36:10 +0900351 payload = (const uint8_t *)(udp + 1);
Lorenzo Colittid9084182013-03-22 00:42:21 +0900352 payload_size = len - sizeof(struct udphdr);
353
Lorenzo Colitti5a50c022014-02-10 09:20:05 +0900354 return udp_translate(out, pos, udp, old_sum, new_sum, payload, payload_size);
Lorenzo Colittid9084182013-03-22 00:42:21 +0900355}
356
357/* function: tcp_packet
358 * takes a tcp packet and sets it up for translation
359 * out - output packet
360 * tcp - pointer to tcp header in packet
361 * checksum - pseudo-header checksum
362 * len - size of ip payload
363 * returns: the highest position in the output clat_packet that's filled in
364 */
junyulaic4e591a2018-11-26 22:36:10 +0900365int tcp_packet(clat_packet out, clat_packet_index pos, const struct tcphdr *tcp, uint32_t old_sum,
366 uint32_t new_sum, size_t len) {
Brian Carlstromfcac4102014-02-24 20:03:01 -0800367 const uint8_t *payload;
Lorenzo Colittid9084182013-03-22 00:42:21 +0900368 size_t payload_size, header_size;
369
junyulaic4e591a2018-11-26 22:36:10 +0900370 if (len < sizeof(struct tcphdr)) {
371 logmsg_dbg(ANDROID_LOG_ERROR, "tcp_packet/(too small)");
Lorenzo Colittid9084182013-03-22 00:42:21 +0900372 return 0;
373 }
374
junyulaic4e591a2018-11-26 22:36:10 +0900375 if (tcp->doff < 5) {
376 logmsg_dbg(ANDROID_LOG_ERROR, "tcp_packet/tcp header length set to less than 5: %x", tcp->doff);
Lorenzo Colittid9084182013-03-22 00:42:21 +0900377 return 0;
378 }
379
junyulaic4e591a2018-11-26 22:36:10 +0900380 if ((size_t)tcp->doff * 4 > len) {
381 logmsg_dbg(ANDROID_LOG_ERROR, "tcp_packet/tcp header length set too large: %x", tcp->doff);
Lorenzo Colittid9084182013-03-22 00:42:21 +0900382 return 0;
383 }
384
junyulaic4e591a2018-11-26 22:36:10 +0900385 header_size = tcp->doff * 4;
386 payload = ((const uint8_t *)tcp) + header_size;
Lorenzo Colittid9084182013-03-22 00:42:21 +0900387 payload_size = len - header_size;
388
Lorenzo Colitti5a50c022014-02-10 09:20:05 +0900389 return tcp_translate(out, pos, tcp, header_size, old_sum, new_sum, payload, payload_size);
Daniel Drowna45056e2012-03-23 10:42:54 -0500390}
391
392/* function: udp_translate
393 * common between ipv4/ipv6 - setup checksum and send udp packet
Lorenzo Colittid9084182013-03-22 00:42:21 +0900394 * out - output packet
395 * udp - udp header
Lorenzo Colitti5a50c022014-02-10 09:20:05 +0900396 * old_sum - pseudo-header checksum of old header
397 * new_sum - pseudo-header checksum of new header
Lorenzo Colittid9084182013-03-22 00:42:21 +0900398 * payload - tcp payload
Daniel Drowna45056e2012-03-23 10:42:54 -0500399 * payload_size - size of payload
Lorenzo Colittid9084182013-03-22 00:42:21 +0900400 * returns: the highest position in the output clat_packet that's filled in
Daniel Drowna45056e2012-03-23 10:42:54 -0500401 */
Lorenzo Colittia4454bf2014-02-25 09:27:31 +0900402int udp_translate(clat_packet out, clat_packet_index pos, const struct udphdr *udp,
403 uint32_t old_sum, uint32_t new_sum, const uint8_t *payload, size_t payload_size) {
Lorenzo Colittid9084182013-03-22 00:42:21 +0900404 struct udphdr *udp_targ = out[pos].iov_base;
Daniel Drowna45056e2012-03-23 10:42:54 -0500405
Lorenzo Colittid9084182013-03-22 00:42:21 +0900406 memcpy(udp_targ, udp, sizeof(struct udphdr));
Daniel Drowna45056e2012-03-23 10:42:54 -0500407
junyulaic4e591a2018-11-26 22:36:10 +0900408 out[pos].iov_len = sizeof(struct udphdr);
409 out[CLAT_POS_PAYLOAD].iov_base = (uint8_t *)payload;
410 out[CLAT_POS_PAYLOAD].iov_len = payload_size;
Daniel Drowna45056e2012-03-23 10:42:54 -0500411
Lorenzo Colitti5a50c022014-02-10 09:20:05 +0900412 if (udp_targ->check) {
413 udp_targ->check = ip_checksum_adjust(udp->check, old_sum, new_sum);
414 } else {
415 // Zero checksums are special. RFC 768 says, "An all zero transmitted checksum value means that
416 // the transmitter generated no checksum (for debugging or for higher level protocols that
417 // don't care)." However, in IPv6 zero UDP checksums were only permitted by RFC 6935 (2013). So
418 // for safety we recompute it.
419 udp_targ->check = 0; // Checksum field must be 0 when calculating checksum.
420 udp_targ->check = packet_checksum(new_sum, out, pos);
421 }
422
423 // RFC 768: "If the computed checksum is zero, it is transmitted as all ones (the equivalent
424 // in one's complement arithmetic)."
425 if (!udp_targ->check) {
426 udp_targ->check = 0xffff;
427 }
Lorenzo Colittiee80ca62013-04-10 16:52:22 +0900428
429 return CLAT_POS_PAYLOAD + 1;
Daniel Drowna45056e2012-03-23 10:42:54 -0500430}
431
432/* function: tcp_translate
433 * common between ipv4/ipv6 - setup checksum and send tcp packet
Lorenzo Colittid9084182013-03-22 00:42:21 +0900434 * out - output packet
435 * tcp - tcp header
436 * header_size - size of tcp header including options
437 * checksum - partial checksum covering ipv4/ipv6 header
Daniel Drowna45056e2012-03-23 10:42:54 -0500438 * payload - tcp payload
439 * payload_size - size of payload
Lorenzo Colittid9084182013-03-22 00:42:21 +0900440 * returns: the highest position in the output clat_packet that's filled in
Daniel Drowna45056e2012-03-23 10:42:54 -0500441 */
Lorenzo Colittia4454bf2014-02-25 09:27:31 +0900442int tcp_translate(clat_packet out, clat_packet_index pos, const struct tcphdr *tcp,
junyulaic4e591a2018-11-26 22:36:10 +0900443 size_t header_size, uint32_t old_sum, uint32_t new_sum, const uint8_t *payload,
444 size_t payload_size) {
Lorenzo Colittid9084182013-03-22 00:42:21 +0900445 struct tcphdr *tcp_targ = out[pos].iov_base;
junyulaic4e591a2018-11-26 22:36:10 +0900446 out[pos].iov_len = header_size;
Daniel Drowna45056e2012-03-23 10:42:54 -0500447
Lorenzo Colittid9084182013-03-22 00:42:21 +0900448 if (header_size > MAX_TCP_HDR) {
449 // A TCP header cannot be more than MAX_TCP_HDR bytes long because it's a 4-bit field that
450 // counts in 4-byte words. So this can never happen unless there is a bug in the caller.
junyulaic4e591a2018-11-26 22:36:10 +0900451 logmsg(ANDROID_LOG_ERROR, "tcp_translate: header too long %d > %d, truncating", header_size,
452 MAX_TCP_HDR);
Lorenzo Colittid9084182013-03-22 00:42:21 +0900453 header_size = MAX_TCP_HDR;
Daniel Drowna45056e2012-03-23 10:42:54 -0500454 }
Lorenzo Colitti5cc877d2013-04-08 19:12:43 +0900455
Lorenzo Colittid9084182013-03-22 00:42:21 +0900456 memcpy(tcp_targ, tcp, header_size);
Lorenzo Colitti5cc877d2013-04-08 19:12:43 +0900457
junyulaic4e591a2018-11-26 22:36:10 +0900458 out[CLAT_POS_PAYLOAD].iov_base = (uint8_t *)payload;
459 out[CLAT_POS_PAYLOAD].iov_len = payload_size;
Daniel Drowna45056e2012-03-23 10:42:54 -0500460
Lorenzo Colitti5a50c022014-02-10 09:20:05 +0900461 tcp_targ->check = ip_checksum_adjust(tcp->check, old_sum, new_sum);
Daniel Drowna45056e2012-03-23 10:42:54 -0500462
Lorenzo Colittiee80ca62013-04-10 16:52:22 +0900463 return CLAT_POS_PAYLOAD + 1;
Daniel Drowna45056e2012-03-23 10:42:54 -0500464}
Lorenzo Colittif9390602014-02-13 12:53:35 +0900465
Lorenzo Colitti10e88272014-06-02 21:20:40 +0900466// Weak symbol so we can override it in the unit test.
467void send_rawv6(int fd, clat_packet out, int iov_len) __attribute__((weak));
468
469void send_rawv6(int fd, clat_packet out, int iov_len) {
470 // A send on a raw socket requires a destination address to be specified even if the socket's
471 // protocol is IPPROTO_RAW. This is the address that will be used in routing lookups; the
472 // destination address in the packet header only affects what appears on the wire, not where the
473 // packet is sent to.
474 static struct sockaddr_in6 sin6 = { AF_INET6, 0, 0, { { { 0, 0, 0, 0 } } }, 0 };
junyulaic4e591a2018-11-26 22:36:10 +0900475 static struct msghdr msg = {
476 .msg_name = &sin6,
Lorenzo Colitti10e88272014-06-02 21:20:40 +0900477 .msg_namelen = sizeof(sin6),
478 };
479
junyulaic4e591a2018-11-26 22:36:10 +0900480 msg.msg_iov = out, msg.msg_iovlen = iov_len,
481 sin6.sin6_addr = ((struct ip6_hdr *)out[CLAT_POS_IPHDR].iov_base)->ip6_dst;
Lorenzo Colitti10e88272014-06-02 21:20:40 +0900482 sendmsg(fd, &msg, 0);
483}
484
Lorenzo Colittif9390602014-02-13 12:53:35 +0900485/* function: translate_packet
Lorenzo Colitti91d0f1b2014-06-02 15:49:36 +0900486 * takes a packet, translates it, and writes it to fd
487 * fd - fd to write translated packet to
488 * to_ipv6 - true if translating to ipv6, false if translating to ipv4
Lorenzo Colittif9390602014-02-13 12:53:35 +0900489 * packet - packet
490 * packetsize - size of packet
Subash Abhinov Kasiviswanathan5c5b5342015-10-26 18:45:04 -0600491 * skip_csum - true if kernel has to skip checksum validation, false if it has to validate checksum.
Lorenzo Colittif9390602014-02-13 12:53:35 +0900492 */
Subash Abhinov Kasiviswanathan5c5b5342015-10-26 18:45:04 -0600493void translate_packet(int fd, int to_ipv6, const uint8_t *packet, size_t packetsize, uint16_t skip_csum) {
Lorenzo Colittif9390602014-02-13 12:53:35 +0900494 int iov_len = 0;
495
496 // Allocate buffers for all packet headers.
497 struct tun_pi tun_targ;
498 char iphdr[sizeof(struct ip6_hdr)];
Lorenzo Colitti57d480d2014-02-09 10:35:38 +0900499 char fraghdr[sizeof(struct ip6_frag)];
Lorenzo Colittif9390602014-02-13 12:53:35 +0900500 char transporthdr[MAX_TCP_HDR];
501 char icmp_iphdr[sizeof(struct ip6_hdr)];
Lorenzo Colitti57d480d2014-02-09 10:35:38 +0900502 char icmp_fraghdr[sizeof(struct ip6_frag)];
Lorenzo Colittif9390602014-02-13 12:53:35 +0900503 char icmp_transporthdr[MAX_TCP_HDR];
504
505 // iovec of the packets we'll send. This gets passed down to the translation functions.
506 clat_packet out = {
junyulaic4e591a2018-11-26 22:36:10 +0900507 { &tun_targ, 0 }, // Tunnel header.
508 { iphdr, 0 }, // IP header.
509 { fraghdr, 0 }, // Fragment header.
510 { transporthdr, 0 }, // Transport layer header.
511 { icmp_iphdr, 0 }, // ICMP error inner IP header.
512 { icmp_fraghdr, 0 }, // ICMP error fragmentation header.
513 { icmp_transporthdr, 0 }, // ICMP error transport layer header.
514 { NULL, 0 }, // Payload. No buffer, it's a pointer to the original payload.
Lorenzo Colittif9390602014-02-13 12:53:35 +0900515 };
516
Lorenzo Colitti91d0f1b2014-06-02 15:49:36 +0900517 if (to_ipv6) {
Lorenzo Colittif9390602014-02-13 12:53:35 +0900518 iov_len = ipv4_packet(out, CLAT_POS_IPHDR, packet, packetsize);
Lorenzo Colitti10e88272014-06-02 21:20:40 +0900519 if (iov_len > 0) {
520 send_rawv6(fd, out, iov_len);
521 }
Lorenzo Colittif9390602014-02-13 12:53:35 +0900522 } else {
Lorenzo Colitti91d0f1b2014-06-02 15:49:36 +0900523 iov_len = ipv6_packet(out, CLAT_POS_IPHDR, packet, packetsize);
Lorenzo Colitti10e88272014-06-02 21:20:40 +0900524 if (iov_len > 0) {
Subash Abhinov Kasiviswanathan5c5b5342015-10-26 18:45:04 -0600525 fill_tun_header(&tun_targ, ETH_P_IP, skip_csum);
Lorenzo Colitti10e88272014-06-02 21:20:40 +0900526 out[CLAT_POS_TUNHDR].iov_len = sizeof(tun_targ);
Maciej Żenczykowski73a5f202020-06-03 08:08:20 +0000527 writev(fd, out, iov_len);
Lorenzo Colitti10e88272014-06-02 21:20:40 +0900528 }
Lorenzo Colittif9390602014-02-13 12:53:35 +0900529 }
530}