blob: 7006fee5937cf0a712ea6577259278ad8b27e6e3 [file] [log] [blame]
Dmitry Shmidt2eab1f72012-07-26 16:08:02 -07001/*
2 * Copyright (C) 2012 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
Sasha Levitskiy329c3b42012-07-30 16:11:23 -07008 * http://www.apache.org/licenses/LICENSE-2.0
Dmitry Shmidt2eab1f72012-07-26 16:08:02 -07009 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Lorenzo Colitti37f2e372013-04-12 00:44:06 +090017#include <dirent.h>
Dan Albertaa1be2b2015-01-06 09:36:17 -080018#include <errno.h>
Elliott Hughes5f4938f2015-01-28 11:22:38 -080019#include <malloc.h>
Chenbo Feng7e974052018-02-28 22:57:21 -080020#include <net/if.h>
Erik Klineb218a872016-07-04 09:57:18 +090021#include <sys/socket.h>
Dmitry Shmidt2eab1f72012-07-26 16:08:02 -070022
Joel Scherpelz31e25992017-03-24 12:40:00 +090023#include <functional>
24
Dmitry Shmidt2eab1f72012-07-26 16:08:02 -070025#define LOG_TAG "InterfaceController"
Elliott Hughesbbd56262015-12-04 15:45:10 -080026#include <android-base/file.h>
Joel Scherpelzde937962017-06-01 13:20:21 +090027#include <android-base/properties.h>
Elliott Hughesbbd56262015-12-04 15:45:10 -080028#include <android-base/stringprintf.h>
Erik Kline38e51f12018-09-06 20:14:44 +090029#include <android-base/strings.h>
Logan Chien3f461482018-04-23 14:31:32 +080030#include <log/log.h>
Lorenzo Colitti0ea8ff82014-10-28 00:15:07 +090031#include <logwrap/logwrap.h>
Erik Klinec296f092016-08-02 15:22:53 +090032#include <netutils/ifc.h>
Lorenzo Colitti70afde62013-03-04 17:58:40 +090033
Joel Scherpelzde937962017-06-01 13:20:21 +090034#include <android/net/INetd.h>
35#include <netdutils/Misc.h>
36#include <netdutils/Slice.h>
37#include <netdutils/Syscalls.h>
38
Dmitry Shmidt2eab1f72012-07-26 16:08:02 -070039#include "InterfaceController.h"
Sreeram Ramachandrana4811802014-04-10 12:10:24 -070040#include "RouteController.h"
Dmitry Shmidt2eab1f72012-07-26 16:08:02 -070041
Erik Klineb218a872016-07-04 09:57:18 +090042using android::base::ReadFileToString;
Joel Scherpelzde937962017-06-01 13:20:21 +090043using android::base::StringPrintf;
Erik Kline38e51f12018-09-06 20:14:44 +090044using android::base::Trim;
Dan Albert5407e142015-03-16 10:05:59 -070045using android::base::WriteStringToFile;
Joel Scherpelzde937962017-06-01 13:20:21 +090046using android::net::INetd;
Lorenzo Colitti7035f222017-02-13 18:29:00 +090047using android::net::RouteController;
Nathan Harold172f8e42018-04-19 13:10:19 -070048using android::netdutils::isOk;
Joel Scherpelzde937962017-06-01 13:20:21 +090049using android::netdutils::makeSlice;
50using android::netdutils::sSyscalls;
Erik Kline38e51f12018-09-06 20:14:44 +090051using android::netdutils::Status;
Joel Scherpelzde937962017-06-01 13:20:21 +090052using android::netdutils::statusFromErrno;
Erik Kline38e51f12018-09-06 20:14:44 +090053using android::netdutils::StatusOr;
Joel Scherpelzde937962017-06-01 13:20:21 +090054using android::netdutils::toString;
Erik Kline38e51f12018-09-06 20:14:44 +090055using android::netdutils::status::ok;
Dan Albert5407e142015-03-16 10:05:59 -070056
Erik Klinee1da4842015-05-12 15:56:06 +090057namespace {
58
Hugo Benichic4b3a0c2018-05-22 08:48:40 +090059const char ipv4_proc_path[] = "/proc/sys/net/ipv4/conf";
Lorenzo Colitti37f2e372013-04-12 00:44:06 +090060const char ipv6_proc_path[] = "/proc/sys/net/ipv6/conf";
61
Erik Kline145fd252015-05-12 15:58:49 +090062const char ipv4_neigh_conf_dir[] = "/proc/sys/net/ipv4/neigh";
Erik Kline145fd252015-05-12 15:58:49 +090063const char ipv6_neigh_conf_dir[] = "/proc/sys/net/ipv6/neigh";
64
Erik Klineb218a872016-07-04 09:57:18 +090065const char proc_net_path[] = "/proc/sys/net";
Dmitry Shmidt6d6c0e62013-06-11 16:18:06 -070066const char sys_net_path[] = "/sys/class/net";
67
Joel Scherpelz31e25992017-03-24 12:40:00 +090068constexpr int kRouteInfoMinPrefixLen = 48;
69
70// RFC 7421 prefix length.
71constexpr int kRouteInfoMaxPrefixLen = 64;
72
Joel Scherpelzde937962017-06-01 13:20:21 +090073// Property used to persist RFC 7217 stable secret. Protected by SELinux policy.
74const char kStableSecretProperty[] = "persist.netd.stable_secret";
75
76// RFC 7217 stable secret on linux is formatted as an IPv6 address.
77// This function uses 128 bits of high quality entropy to generate an
78// address for this purpose. This function should be not be called
79// frequently.
80StatusOr<std::string> randomIPv6Address() {
81 in6_addr addr = {};
82 const auto& sys = sSyscalls.get();
83 ASSIGN_OR_RETURN(auto fd, sys.open("/dev/random", O_RDONLY));
84 RETURN_IF_NOT_OK(sys.read(fd, makeSlice(addr)));
85 return toString(addr);
86}
87
Erik Klineb218a872016-07-04 09:57:18 +090088inline bool isNormalPathComponent(const char *component) {
89 return (strcmp(component, ".") != 0) &&
90 (strcmp(component, "..") != 0) &&
91 (strchr(component, '/') == nullptr);
92}
93
94inline bool isAddressFamilyPathComponent(const char *component) {
95 return strcmp(component, "ipv4") == 0 || strcmp(component, "ipv6") == 0;
96}
97
98inline bool isInterfaceName(const char *name) {
99 return isNormalPathComponent(name) &&
100 (strcmp(name, "default") != 0) &&
101 (strcmp(name, "all") != 0);
Erik Klinee1da4842015-05-12 15:56:06 +0900102}
103
104int writeValueToPath(
105 const char* dirname, const char* subdirname, const char* basename,
106 const char* value) {
107 std::string path(StringPrintf("%s/%s/%s", dirname, subdirname, basename));
Erik Kline3f957772015-06-03 17:44:24 +0900108 return WriteStringToFile(value, path) ? 0 : -1;
Erik Klinee1da4842015-05-12 15:56:06 +0900109}
110
Joel Scherpelz31e25992017-03-24 12:40:00 +0900111// Run @fn on each interface as well as 'default' in the path @dirname.
Bernie Innocenti15bb55c2018-06-03 16:19:51 +0900112void forEachInterface(
113 const std::string& dirname,
114 const std::function<void(const std::string& path, const std::string& iface)>& fn) {
Joel Scherpelz31e25992017-03-24 12:40:00 +0900115 // Run on default, which controls the behavior of any interfaces that are created in the future.
116 fn(dirname, "default");
117 DIR* dir = opendir(dirname.c_str());
Erik Klinee1da4842015-05-12 15:56:06 +0900118 if (!dir) {
Joel Scherpelz31e25992017-03-24 12:40:00 +0900119 ALOGE("Can't list %s: %s", dirname.c_str(), strerror(errno));
Erik Klinee1da4842015-05-12 15:56:06 +0900120 return;
121 }
Joel Scherpelz31e25992017-03-24 12:40:00 +0900122 while (true) {
123 const dirent *ent = readdir(dir);
124 if (!ent) {
125 break;
126 }
127 if ((ent->d_type != DT_DIR) || !isInterfaceName(ent->d_name)) {
Erik Klinee1da4842015-05-12 15:56:06 +0900128 continue;
129 }
Joel Scherpelz31e25992017-03-24 12:40:00 +0900130 fn(dirname, ent->d_name);
Erik Klinee1da4842015-05-12 15:56:06 +0900131 }
132 closedir(dir);
133}
134
Joel Scherpelz31e25992017-03-24 12:40:00 +0900135void setOnAllInterfaces(const char* dirname, const char* basename, const char* value) {
136 auto fn = [basename, value](const std::string& path, const std::string& iface) {
137 writeValueToPath(path.c_str(), iface.c_str(), basename, value);
138 };
139 forEachInterface(dirname, fn);
140}
141
Erik Kline7adf8d72015-07-28 18:51:01 +0900142void setIPv6UseOutgoingInterfaceAddrsOnly(const char *value) {
143 setOnAllInterfaces(ipv6_proc_path, "use_oif_addrs_only", value);
144}
145
Erik Klineb218a872016-07-04 09:57:18 +0900146std::string getParameterPathname(
147 const char *family, const char *which, const char *interface, const char *parameter) {
148 if (!isAddressFamilyPathComponent(family)) {
149 errno = EAFNOSUPPORT;
150 return "";
151 } else if (!isNormalPathComponent(which) ||
152 !isInterfaceName(interface) ||
153 !isNormalPathComponent(parameter)) {
154 errno = EINVAL;
155 return "";
156 }
157
158 return StringPrintf("%s/%s/%s/%s/%s", proc_net_path, family, which, interface, parameter);
159}
160
Joel Scherpelz31e25992017-03-24 12:40:00 +0900161void setAcceptIPv6RIO(int min, int max) {
162 auto fn = [min, max](const std::string& prefix, const std::string& iface) {
163 int rv = writeValueToPath(prefix.c_str(), iface.c_str(), "accept_ra_rt_info_min_plen",
164 std::to_string(min).c_str());
165 if (rv != 0) {
166 // Only update max_plen if the write to min_plen succeeded. This ordering will prevent
167 // RIOs from being accepted unless both min and max are written successfully.
168 return;
169 }
170 writeValueToPath(prefix.c_str(), iface.c_str(), "accept_ra_rt_info_max_plen",
171 std::to_string(max).c_str());
172 };
173 forEachInterface(ipv6_proc_path, fn);
174}
175
Joel Scherpelzde937962017-06-01 13:20:21 +0900176// Ideally this function would return StatusOr<std::string>, however
177// there is no safe value for dflt that will always differ from the
178// stored property. Bugs code could conceivably end up persisting the
179// reserved value resulting in surprising behavior.
180std::string getProperty(const std::string& key, const std::string& dflt) {
181 return android::base::GetProperty(key, dflt);
182};
183
184Status setProperty(const std::string& key, const std::string& val) {
Lorenzo Colitti516764f2017-07-10 19:13:23 +0900185 // SetProperty does not dependably set errno to a meaningful value. Use our own error code so
186 // callers don't get confused.
Joel Scherpelzde937962017-06-01 13:20:21 +0900187 return android::base::SetProperty(key, val)
188 ? ok
Lorenzo Colitti516764f2017-07-10 19:13:23 +0900189 : statusFromErrno(EREMOTEIO, "SetProperty failed, see libc logs");
Joel Scherpelzde937962017-06-01 13:20:21 +0900190};
191
192
Erik Klinee1da4842015-05-12 15:56:06 +0900193} // namespace
194
Bernie Innocenti4debf3b2018-09-12 13:54:50 +0900195namespace android {
196namespace net {
197
Joel Scherpelzde937962017-06-01 13:20:21 +0900198android::netdutils::Status InterfaceController::enableStablePrivacyAddresses(
Bernie Innocenti15bb55c2018-06-03 16:19:51 +0900199 const std::string& iface,
200 const GetPropertyFn& getProperty,
201 const SetPropertyFn& setProperty) {
Joel Scherpelzde937962017-06-01 13:20:21 +0900202 const auto& sys = sSyscalls.get();
203 const std::string procTarget = std::string(ipv6_proc_path) + "/" + iface + "/stable_secret";
204 auto procFd = sys.open(procTarget, O_CLOEXEC | O_WRONLY);
205
206 // Devices with old kernels (typically < 4.4) don't support
207 // RFC 7217 stable privacy addresses.
208 if (equalToErrno(procFd, ENOENT)) {
209 return statusFromErrno(EOPNOTSUPP,
210 "Failed to open stable_secret. Assuming unsupported kernel version");
211 }
212
213 // If stable_secret exists but we can't open it, something strange is going on.
214 RETURN_IF_NOT_OK(procFd);
215
216 const char kUninitialized[] = "uninitialized";
217 const auto oldSecret = getProperty(kStableSecretProperty, kUninitialized);
218 std::string secret = oldSecret;
219
220 // Generate a new secret if no persistent property existed.
221 if (oldSecret == kUninitialized) {
222 ASSIGN_OR_RETURN(secret, randomIPv6Address());
223 }
224
225 // Ask the OS to generate SLAAC addresses on iface using secret.
226 RETURN_IF_NOT_OK(sys.write(procFd.value(), makeSlice(secret)));
227
228 // Don't persist an existing secret.
229 if (oldSecret != kUninitialized) {
230 return ok;
231 }
232
233 return setProperty(kStableSecretProperty, secret);
234}
235
Erik Kline2c5aaa12016-06-08 13:24:45 +0900236void InterfaceController::initializeAll() {
237 // Initial IPv6 settings.
238 // By default, accept_ra is set to 1 (accept RAs unless forwarding is on) on all interfaces.
239 // This causes RAs to work or not work based on whether forwarding is on, and causes routes
240 // learned from RAs to go away when forwarding is turned on. Make this behaviour predictable
241 // by always setting accept_ra to 2.
242 setAcceptRA("2");
Lorenzo Colitti37f2e372013-04-12 00:44:06 +0900243
Joel Scherpelz31e25992017-03-24 12:40:00 +0900244 // Accept RIOs with prefix length in the closed interval [48, 64].
245 setAcceptIPv6RIO(kRouteInfoMinPrefixLen, kRouteInfoMaxPrefixLen);
246
Erik Kline2c5aaa12016-06-08 13:24:45 +0900247 setAcceptRARouteTable(-RouteController::ROUTE_TABLE_OFFSET_FROM_INDEX);
Erik Kline59273ed2014-12-08 16:05:28 +0900248
Erik Kline2c5aaa12016-06-08 13:24:45 +0900249 // Enable optimistic DAD for IPv6 addresses on all interfaces.
250 setIPv6OptimisticMode("1");
Erik Kline145fd252015-05-12 15:58:49 +0900251
Erik Kline2c5aaa12016-06-08 13:24:45 +0900252 // Reduce the ARP/ND base reachable time from the default (30sec) to 15sec.
253 setBaseReachableTimeMs(15 * 1000);
Erik Kline7adf8d72015-07-28 18:51:01 +0900254
Erik Kline2c5aaa12016-06-08 13:24:45 +0900255 // When sending traffic via a given interface use only addresses configured
Hugo Benichic4b3a0c2018-05-22 08:48:40 +0900256 // on that interface as possible source addresses.
Erik Kline2c5aaa12016-06-08 13:24:45 +0900257 setIPv6UseOutgoingInterfaceAddrsOnly("1");
Hugo Benichic4b3a0c2018-05-22 08:48:40 +0900258
259 // Ensure that ICMP redirects are rejected globally on all interfaces.
260 disableIcmpRedirects();
Dmitry Shmidt2eab1f72012-07-26 16:08:02 -0700261}
Lorenzo Colitti70afde62013-03-04 17:58:40 +0900262
Lorenzo Colitti70afde62013-03-04 17:58:40 +0900263int InterfaceController::setEnableIPv6(const char *interface, const int on) {
Erik Klinee1da4842015-05-12 15:56:06 +0900264 if (!isIfaceName(interface)) {
265 errno = ENOENT;
266 return -1;
267 }
268 // When disable_ipv6 changes from 1 to 0, the kernel starts autoconf.
269 // When disable_ipv6 changes from 0 to 1, the kernel clears all autoconf
270 // addresses and routes and disables IPv6 on the interface.
271 const char *disable_ipv6 = on ? "0" : "1";
272 return writeValueToPath(ipv6_proc_path, interface, "disable_ipv6", disable_ipv6);
Lorenzo Colitti70afde62013-03-04 17:58:40 +0900273}
274
Joel Scherpelzde937962017-06-01 13:20:21 +0900275// Changes to addrGenMode will not fully take effect until the next
276// time disable_ipv6 transitions from 1 to 0.
277Status InterfaceController::setIPv6AddrGenMode(const std::string& interface, int mode) {
278 if (!isIfaceName(interface)) {
279 return statusFromErrno(ENOENT, "invalid iface name: " + interface);
280 }
281
282 switch (mode) {
283 case INetd::IPV6_ADDR_GEN_MODE_EUI64:
284 // Ignore return value. If /proc/.../stable_secret is
285 // missing we're probably in EUI64 mode already.
286 writeValueToPath(ipv6_proc_path, interface.c_str(), "stable_secret", "");
287 break;
288 case INetd::IPV6_ADDR_GEN_MODE_STABLE_PRIVACY: {
289 return enableStablePrivacyAddresses(interface, getProperty, setProperty);
290 }
291 case INetd::IPV6_ADDR_GEN_MODE_NONE:
292 case INetd::IPV6_ADDR_GEN_MODE_RANDOM:
293 default:
294 return statusFromErrno(EOPNOTSUPP, "unsupported addrGenMode");
295 }
296
297 return ok;
298}
299
Erik Kline2c5aaa12016-06-08 13:24:45 +0900300int InterfaceController::setAcceptIPv6Ra(const char *interface, const int on) {
301 if (!isIfaceName(interface)) {
302 errno = ENOENT;
303 return -1;
304 }
305 // Because forwarding can be enabled even when tethering is off, we always
306 // use mode "2" (accept RAs, even if forwarding is enabled).
307 const char *accept_ra = on ? "2" : "0";
308 return writeValueToPath(ipv6_proc_path, interface, "accept_ra", accept_ra);
309}
310
311int InterfaceController::setAcceptIPv6Dad(const char *interface, const int on) {
312 if (!isIfaceName(interface)) {
313 errno = ENOENT;
314 return -1;
315 }
316 const char *accept_dad = on ? "1" : "0";
317 return writeValueToPath(ipv6_proc_path, interface, "accept_dad", accept_dad);
318}
319
Erik Kline59d8c482016-08-09 15:28:42 +0900320int InterfaceController::setIPv6DadTransmits(const char *interface, const char *value) {
321 if (!isIfaceName(interface)) {
322 errno = ENOENT;
323 return -1;
324 }
325 return writeValueToPath(ipv6_proc_path, interface, "dad_transmits", value);
326}
327
Lorenzo Colitti70afde62013-03-04 17:58:40 +0900328int InterfaceController::setIPv6PrivacyExtensions(const char *interface, const int on) {
Erik Klinee1da4842015-05-12 15:56:06 +0900329 if (!isIfaceName(interface)) {
330 errno = ENOENT;
331 return -1;
332 }
333 // 0: disable IPv6 privacy addresses
Joel Scherpelzde937962017-06-01 13:20:21 +0900334 // 2: enable IPv6 privacy addresses and prefer them over non-privacy ones.
Erik Klinee1da4842015-05-12 15:56:06 +0900335 return writeValueToPath(ipv6_proc_path, interface, "use_tempaddr", on ? "2" : "0");
Lorenzo Colitti70afde62013-03-04 17:58:40 +0900336}
Lorenzo Colitti37f2e372013-04-12 00:44:06 +0900337
Sreeram Ramachandrana4811802014-04-10 12:10:24 -0700338void InterfaceController::setAcceptRA(const char *value) {
Erik Klinee1da4842015-05-12 15:56:06 +0900339 setOnAllInterfaces(ipv6_proc_path, "accept_ra", value);
Sreeram Ramachandrana4811802014-04-10 12:10:24 -0700340}
341
Sreeram Ramachandrana01d6ef2014-04-10 19:37:59 -0700342// |tableOrOffset| is interpreted as:
Sreeram Ramachandrana4811802014-04-10 12:10:24 -0700343// If == 0: default. Routes go into RT6_TABLE_MAIN.
344// If > 0: user set. Routes go into the specified table.
345// If < 0: automatic. The absolute value is intepreted as an offset and added to the interface
346// ID to get the table. If it's set to -1000, routes from interface ID 5 will go into
347// table 1005, etc.
Sreeram Ramachandrana01d6ef2014-04-10 19:37:59 -0700348void InterfaceController::setAcceptRARouteTable(int tableOrOffset) {
Erik Klinee1da4842015-05-12 15:56:06 +0900349 std::string value(StringPrintf("%d", tableOrOffset));
350 setOnAllInterfaces(ipv6_proc_path, "accept_ra_rt_table", value.c_str());
Lorenzo Colitti37f2e372013-04-12 00:44:06 +0900351}
Dmitry Shmidt6d6c0e62013-06-11 16:18:06 -0700352
Dmitry Shmidt6d6c0e62013-06-11 16:18:06 -0700353int InterfaceController::setMtu(const char *interface, const char *mtu)
354{
Erik Klinee1da4842015-05-12 15:56:06 +0900355 if (!isIfaceName(interface)) {
356 errno = ENOENT;
357 return -1;
358 }
359 return writeValueToPath(sys_net_path, interface, "mtu", mtu);
Dmitry Shmidt6d6c0e62013-06-11 16:18:06 -0700360}
Erik Kline59273ed2014-12-08 16:05:28 +0900361
Erik Klinec296f092016-08-02 15:22:53 +0900362int InterfaceController::addAddress(const char *interface,
363 const char *addrString, int prefixLength) {
364 return ifc_add_address(interface, addrString, prefixLength);
365}
366
367int InterfaceController::delAddress(const char *interface,
368 const char *addrString, int prefixLength) {
369 return ifc_del_address(interface, addrString, prefixLength);
370}
371
Hugo Benichic4b3a0c2018-05-22 08:48:40 +0900372int InterfaceController::disableIcmpRedirects() {
373 int rv = 0;
374 rv |= writeValueToPath(ipv4_proc_path, "all", "accept_redirects", "0");
375 rv |= writeValueToPath(ipv6_proc_path, "all", "accept_redirects", "0");
376 setOnAllInterfaces(ipv4_proc_path, "accept_redirects", "0");
377 setOnAllInterfaces(ipv6_proc_path, "accept_redirects", "0");
378 return rv;
379}
380
Erik Klineb218a872016-07-04 09:57:18 +0900381int InterfaceController::getParameter(
382 const char *family, const char *which, const char *interface, const char *parameter,
383 std::string *value) {
384 const std::string path(getParameterPathname(family, which, interface, parameter));
385 if (path.empty()) {
386 return -errno;
387 }
Erik Kline38e51f12018-09-06 20:14:44 +0900388 if (ReadFileToString(path, value)) {
389 *value = Trim(*value);
390 return 0;
391 }
392 return -errno;
Erik Klineb218a872016-07-04 09:57:18 +0900393}
394
395int InterfaceController::setParameter(
396 const char *family, const char *which, const char *interface, const char *parameter,
397 const char *value) {
398 const std::string path(getParameterPathname(family, which, interface, parameter));
399 if (path.empty()) {
400 return -errno;
401 }
402 return WriteStringToFile(value, path) ? 0 : -errno;
403}
404
Erik Kline145fd252015-05-12 15:58:49 +0900405void InterfaceController::setBaseReachableTimeMs(unsigned int millis) {
406 std::string value(StringPrintf("%u", millis));
407 setOnAllInterfaces(ipv4_neigh_conf_dir, "base_reachable_time_ms", value.c_str());
408 setOnAllInterfaces(ipv6_neigh_conf_dir, "base_reachable_time_ms", value.c_str());
409}
410
Erik Kline59273ed2014-12-08 16:05:28 +0900411void InterfaceController::setIPv6OptimisticMode(const char *value) {
Erik Klinee1da4842015-05-12 15:56:06 +0900412 setOnAllInterfaces(ipv6_proc_path, "optimistic_dad", value);
413 setOnAllInterfaces(ipv6_proc_path, "use_optimistic", value);
Erik Kline59273ed2014-12-08 16:05:28 +0900414}
Chenbo Feng7e974052018-02-28 22:57:21 -0800415
Nathan Harold172f8e42018-04-19 13:10:19 -0700416StatusOr<std::vector<std::string>> InterfaceController::getIfaceNames() {
417 std::vector<std::string> ifaceNames;
Chenbo Feng7e974052018-02-28 22:57:21 -0800418 DIR* d;
419 struct dirent* de;
420
421 if (!(d = opendir("/sys/class/net"))) {
422 return statusFromErrno(errno, "Cannot open iface directory");
423 }
424 while ((de = readdir(d))) {
425 if (de->d_name[0] == '.') continue;
Nathan Harold172f8e42018-04-19 13:10:19 -0700426 ifaceNames.push_back(std::string(de->d_name));
Chenbo Feng7e974052018-02-28 22:57:21 -0800427 }
428 closedir(d);
Nathan Harold172f8e42018-04-19 13:10:19 -0700429 return ifaceNames;
430}
431
432StatusOr<std::map<std::string, uint32_t>> InterfaceController::getIfaceList() {
433 std::map<std::string, uint32_t> ifacePairs;
434
435 ASSIGN_OR_RETURN(auto ifaceNames, getIfaceNames());
436
437 for (const auto& name : ifaceNames) {
438 uint32_t ifaceIndex = if_nametoindex(name.c_str());
439 if (ifaceIndex) {
440 ifacePairs.insert(std::pair<std::string, uint32_t>(name, ifaceIndex));
441 }
442 }
Chenbo Feng7e974052018-02-28 22:57:21 -0800443 return ifacePairs;
444}
Bernie Innocenti4debf3b2018-09-12 13:54:50 +0900445
446} // namespace net
447} // namespace android